Miodrag J. Mihaljević

From MaRDI portal
(Redirected from Person:456132)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A faster cryptanalysis of the self-shrinking generator2024-07-11Paper
A protocol for provably secure authentication of a tiny entity to a high performance computing one
Mathematical Problems in Engineering
2018-10-12Paper
On message protection in cryptosystems modelled as the generalized wire-tap channel II
Lecture Notes in Computer Science
2018-04-26Paper
On certain approaches for analysis and design of cryptographic techniques2015-06-26Paper
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
Periodica Mathematica Hungarica
2014-02-17Paper
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function
Information Processing Letters
2012-10-23Paper
Advances in Cryptology - ASIACRYPT 2003
Lecture Notes in Computer Science
2010-01-05Paper
An approach for stream ciphers design based on joint computing over random and secret data
Computing
2009-08-10Paper
Decimation based algebraic and correlation attacks and design of Boolean functions2009-02-09Paper
Modeling Block Decoding Approaches for the Fast Correlation Attack
IEEE Transactions on Information Theory
2008-12-21Paper
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Fast Correlation Attack Algorithm with List Decoding and an Application
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 2077096 (Why is no real title available?)2004-07-01Paper
scientific article; zbMATH DE number 2077097 (Why is no real title available?)2004-07-01Paper
scientific article; zbMATH DE number 1951613 (Why is no real title available?)2003-07-21Paper
scientific article; zbMATH DE number 1759271 (Why is no real title available?)2002-06-25Paper
A method for convergence analysis of iterative probabilistic decoding
IEEE Transactions on Information Theory
2001-03-19Paper
scientific article; zbMATH DE number 1504673 (Why is no real title available?)2001-01-14Paper
scientific article; zbMATH DE number 1511967 (Why is no real title available?)2000-09-28Paper
scientific article; zbMATH DE number 1107686 (Why is no real title available?)1998-02-16Paper
scientific article; zbMATH DE number 1186881 (Why is no real title available?)1998-01-01Paper
MHD Free Convection from a Vertical Semi‐Infinite Flat Plate with a Step Change in the Magnetic Field
ZAMM - Journal of Applied Mathematics and Mechanics / Zeitschrift für Angewandte Mathematik und Mechanik
1997-11-12Paper
scientific article; zbMATH DE number 1024086 (Why is no real title available?)1997-10-20Paper
scientific article; zbMATH DE number 1024021 (Why is no real title available?)1997-08-14Paper
scientific article; zbMATH DE number 988753 (Why is no real title available?)1997-03-09Paper
scientific article; zbMATH DE number 503333 (Why is no real title available?)1994-05-24Paper
scientific article; zbMATH DE number 177619 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177058 (Why is no real title available?)1993-05-18Paper
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
Journal of Cryptology
1991-01-01Paper
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
Advances in Cryptology — AUSCRYPT '90
1990-01-01Paper
Minimal linear equivalent analysis of a variable-memory binary sequence generator
IEEE Transactions on Information Theory
1990-01-01Paper


Research outcomes over time


This page was built for person: Miodrag J. Mihaljević