J. Dj. Golić

From MaRDI portal
(Redirected from Person:989501)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On period of multiplexed sequences2024-07-11Paper
Edit distance correlation attacks on clock-controlled combiners with memory2024-07-11Paper
A cryptanalysis of clock-controlled shift registers with multiple steps
Cryptography: Policy and Algorithms
2019-10-10Paper
A note on nonuniform decimation of periodic sequences
Cryptography: Policy and Algorithms
2019-10-10Paper
Randomness measures related to subset occurrence
Cryptography: Policy and Algorithms
2019-10-10Paper
Techniques for Random Masking in Hardware
IEEE Transactions on Circuits and Systems I: Regular Papers
2017-11-20Paper
On the security of nonlinear filter generators
Fast Software Encryption
2017-11-15Paper
Stream cipher encryption of random access files
Information Processing Letters
2016-06-16Paper
Fast correlation attacks on nonlinear filter generators
Information Processing Letters
2016-05-26Paper
Fast low order approximation of cryptographic functions
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Cryptanalytic attacks on MIFARE classic protocol
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Optimal correlation attack on the multiplexer generator
Information Processing Letters
2010-08-20Paper
On the resynchronization attack.
Lecture Notes in Computer Science
2010-01-05Paper
Soft Generation of Secure Biometric Keys
Information Security and Privacy
2009-03-06Paper
Entropy Analysis and New Constructions of Biometric Key Generation Systems
IEEE Transactions on Information Theory
2009-02-24Paper
Embedding Probabilities for the Alternating Step Generator
IEEE Transactions on Information Theory
2008-12-21Paper
Vectorial Boolean functions and induced algebraic equations
IEEE Transactions on Information Theory
2008-12-21Paper
Statistical distinguishers for irregularly decimated linear recurring sequences
IEEE Transactions on Information Theory
2008-12-21Paper
Exact Probabilistic Analysis of Memoryless Combiners
IEEE Transactions on Information Theory
2008-12-21Paper
High-Speed True Random Number Generation with Logic Gates Only
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Fibonacci numbers and decimation of binary sequences2007-03-30Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Vectorial approach to fast correlation attacks
Designs, Codes and Cryptography
2005-11-07Paper
scientific article; zbMATH DE number 2086710 (Why is no real title available?)2004-08-11Paper
Correlation analysis of the alternating step generator
Designs, Codes and Cryptography
2004-06-11Paper
scientific article; zbMATH DE number 1979285 (Why is no real title available?)2003-09-11Paper
Edit probability correlation attacks on stop/go clocked keystream generators
Journal of Cryptology
2003-08-27Paper
Linear models for keystream generators
IEEE Transactions on Computers
2003-06-25Paper
Statistical weakness of multiplexed sequences
Finite Fields and their Applications
2003-04-02Paper
scientific article; zbMATH DE number 1842506 (Why is no real title available?)2002-12-08Paper
Cryptanalysis of three mutually clock-controlled stop/go shift registers
IEEE Transactions on Information Theory
2002-10-30Paper
scientific article; zbMATH DE number 1500493 (Why is no real title available?)2002-08-14Paper
Iterative optimum symbol-by-symbol decoding and fast correlation attacks
IEEE Transactions on Information Theory
2002-08-04Paper
Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory
IEEE Transactions on Information Theory
2002-08-04Paper
A probabilistic cryptanalytic method for a time-variant permutation generator
Information Processing Letters
2002-07-14Paper
Computation of edit probabilities and edit distances for the A5-type keystream generator
Journal of Complexity
2002-06-05Paper
scientific article; zbMATH DE number 1744098 (Why is no real title available?)2002-05-22Paper
scientific article; zbMATH DE number 1740042 (Why is no real title available?)2002-05-14Paper
Recent advances in stream cipher cryptanalysis
Publications de l'Institut Mathématique. Nouvelle Série
2002-02-26Paper
scientific article; zbMATH DE number 1689010 (Why is no real title available?)2002-01-09Paper
scientific article; zbMATH DE number 1689041 (Why is no real title available?)2002-01-09Paper
scientific article; zbMATH DE number 1676647 (Why is no real title available?)2001-11-25Paper
scientific article; zbMATH DE number 1588475 (Why is no real title available?)2001-07-17Paper
scientific article; zbMATH DE number 1612513 (Why is no real title available?)2001-07-01Paper
On matroid characterization of ideal secret sharing schemes
Journal of Cryptology
2001-05-20Paper
A method for convergence analysis of iterative probabilistic decoding
IEEE Transactions on Information Theory
2001-03-19Paper
Linear models for a time-variant permutation generator
IEEE Transactions on Information Theory
2000-09-07Paper
On the security of shift register based keystream generators
Fast Software Encryption
2000-08-30Paper
scientific article; zbMATH DE number 1484323 (Why is no real title available?)2000-08-03Paper
scientific article; zbMATH DE number 1424172 (Why is no real title available?)2000-06-07Paper
scientific article; zbMATH DE number 1455088 (Why is no real title available?)2000-06-05Paper
Fast correlation attacks on the summation generator.
Journal of Cryptology
2000-01-01Paper
Correlation attacks on up/down and stop/go cascades
IEEE Transactions on Information Theory
1999-11-21Paper
Periods of interleaved and nonuniformly decimated sequences
IEEE Transactions on Information Theory
1999-05-26Paper
scientific article; zbMATH DE number 1189377 (Why is no real title available?)1998-10-08Paper
scientific article; zbMATH DE number 1191214 (Why is no real title available?)1998-08-16Paper
scientific article; zbMATH DE number 1088918 (Why is no real title available?)1998-01-14Paper
Constrained Embedding Probability for Two Binary Strings
SIAM Journal on Discrete Mathematics
1998-01-12Paper
scientific article; zbMATH DE number 1189375 (Why is no real title available?)1998-01-01Paper
scientific article; zbMATH DE number 1088256 (Why is no real title available?)1997-11-17Paper
Correlation properties of a general binary combiner with memory
Journal of Cryptology
1997-11-02Paper
scientific article; zbMATH DE number 1024497 (Why is no real title available?)1997-10-20Paper
Constrained many-to-one string editing with memory
Information Sciences
1997-06-23Paper
scientific article; zbMATH DE number 1024088 (Why is no real title available?)1997-06-18Paper
scientific article; zbMATH DE number 845720 (Why is no real title available?)1996-11-12Paper
Correlation attacks on clock-controlled shift registers in keystream generators
IEEE Transactions on Computers
1996-01-01Paper
scientific article; zbMATH DE number 503333 (Why is no real title available?)1994-05-24Paper
String editing under a combination of constraints
Information Sciences
1994-03-13Paper
scientific article; zbMATH DE number 503362 (Why is no real title available?)1994-02-22Paper
scientific article; zbMATH DE number 503332 (Why is no real title available?)1994-02-22Paper
scientific article; zbMATH DE number 177619 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177058 (Why is no real title available?)1993-05-18Paper
The Number of Output Sequences of a Binary Sequence Generator
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
Journal of Cryptology
1991-01-01Paper
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence
Advances in Cryptology — AUSCRYPT '90
1990-01-01Paper
Minimal linear equivalent analysis of a variable-memory binary sequence generator
IEEE Transactions on Information Theory
1990-01-01Paper
On the linear complexity of functions of periodic GF(q) sequences
IEEE Transactions on Information Theory
1989-01-01Paper
On the linear complexity of nonuniformity decimated PN-sequences
IEEE Transactions on Information Theory
1989-01-01Paper
On the relationship between the information measures and the Bayes probability of error
IEEE Transactions on Information Theory
1987-01-01Paper
On the relationship between the separability measures and the Bayes probability of error
IEEE Transactions on Information Theory
1987-01-01Paper
On the relationship between the efficiency measures of multicategory information systems
IEEE Transactions on Information Theory
1987-01-01Paper


Research outcomes over time


This page was built for person: J. Dj. Golić