Cryptographers' World
 

Jovan Dj. Golic



36 papers in database with 1399 citations StarStar

H-number: 21

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Jovan Dj. Golic,  Philip Hawkes,  Vectorial Approach to Fast Correlation Attacks, Designs, Codes and Cryptography, Volume 35(1), pp. 5 - 19, Springer, 2005.

[Electronic Edition][Cited 5 times ]

2. Jovan Dj. Golic,  Renato Menicocci,  Correlation Analysis of the Alternating Step Generator, Designs, Codes and Cryptography, Volume 31(1), pp. 51 - 74, Springer, 2004.

[Electronic Edition][Cited 8 times ]

3. Jovan Dj. Golic,  Renato Menicocci,  Edit Probability Correlation Attacks on Stop/ Go Clocked Keystream Generators, Journal of Cryptology, Volume 16(1), pp. 41 - 68, Springer, 2003.

[Cited 5 times ]

4. Jovan Dj. Golic,  Mahmoud Salmasizadeh,  Ed Dawson,  Fast Correlation Attacks on the Summation Generator, Journal of Cryptology, Volume 13(2), pp. 245 - 262, Springer, 2000.

[Cited 18 times ]

5. Jovan Dj. Golic,  On Matroid Characterization of Ideal Secret Sharing Schemes, Journal of Cryptology, Volume 11(2), pp. 75 - 86, Springer, 1998.

[Cited 8 times ]

6. Jovan Dj. Golic,  Correlation Properties of a General Binary Combiner with Memory, Journal of Cryptology, Volume 9(2), pp. 111 - 126, Springer, 1996.

[Cited 40 times ]

7. Jovan Dj. Golic,  Miodrag J. Mihaljevic,  A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance, Journal of Cryptology, Volume 3(3), pp. 201 - 212, Springer, 1991.

[Cited 88 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Markus Dichtl,  Jovan Dj. Golic,  High-Speed True Random Number Generation with Logic Gates Only, pp. 45 - 62, CHES 2007.

[Electronic Edition][Cited 41 times ]

2. Jovan Dj. Golic,  A Weakness of the Linear Part of Stream Cipher MUGI, pp. 178 - 192, FSE 2004.

[Electronic Edition][Cited 6 times ]

3. Jovan Dj. Golic,  DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits, pp. 98 - 112, CHES 2003.

[Electronic Edition][Cited 13 times ]

4. Jovan Dj. Golic,  On the Success of the Embedding Attack on the Alternating Step Generator, pp. 262 - 274, SAC 2003.

[Electronic Edition][Cited 1 times ]

5. Jovan Dj. Golic,  Guglielmo Morgari,  On the Resynchronization Attack, pp. 100 - 110, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

6. Jovan Dj. Golic,  Christophe Tymen,  Multiplicative Masking and Power Analysis of AES, pp. 198 - 212, CHES 2002.

[Electronic Edition][Cited 150 times Red StarRed Star]

7. Jovan Dj. Golic,  Vittorio Bagini,  Guglielmo Morgari,  Linear Cryptanalysis of Bluetooth Stream Cipher, pp. 238 - 255, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 42 times ]

8. Jovan Dj. Golic,  Correlation Analysis of the Shrinking Generator, pp. 440 - 457, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 32 times ]

9. Leonie Ruth Simpson,  Ed Dawson,  Jovan Dj. Golic,  William Millan,  LILI Keystream Generator, pp. 248 - 261, SAC 2000.

[Electronic Edition][Cited 45 times ]

10. Jovan Dj. Golic,  Modes of Operation of Stream Ciphers, pp. 233 - 247, SAC 2000.

[Electronic Edition][Cited 7 times ]

11. Jovan Dj. Golic,  Renato Menicocci,  Edit Distance Correlation Attack on the Alternating Step Generator, pp. 499 - 512, CRYPTO 1997.

[Electronic Edition][Cited 27 times ]

12. Jovan Dj. Golic,  Linear Statistical Weakness of Alleged RC4 Keystream Generator, pp. 226 - 238, EUROCRYPT 1997.

[Electronic Edition][Cited 105 times Red StarRed Star]

13. Jovan Dj. Golic,  Cryptanalysis of Alleged A5 Stream Cipher, pp. 239 - 255, EUROCRYPT 1997.

[Electronic Edition][Cited 198 times Red StarRed Star]

14. Jovan Dj. Golic,  Fast Low Order Approximation of Cryptographic Functions, pp. 268 - 282, EUROCRYPT 1996.

[Electronic Edition][Cited 21 times ]

15. Jovan Dj. Golic,  On the Security of Nonlinear Filter Generators, pp. 173 - 188, FSE 1996.

[Electronic Edition][Cited 89 times Red Star]

16. Andrew J. Clark,  Jovan Dj. Golic,  Ed Dawson,  A Comparison of Fast Correlation Attacks, pp. 145 - 157, FSE 1996.

[Electronic Edition][Cited 19 times ]

17. Jovan Dj. Golic,  Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers, pp. 248 - 262, EUROCRYPT 1995.

[Electronic Edition][Cited 44 times ]

18. Jovan Dj. Golic,  Linear Cryptanalysis of Stream Ciphers, pp. 154 - 169, FSE 1994.

[Electronic Edition][Cited 33 times ]

19. Luke O'Connor,  Jovan Dj. Golic,  A Unified Markov Approach to Differential and Linear Cryptanalysis, pp. 387 - 397, ASIACRYPT 1994.

[Electronic Edition][Cited 11 times ]

20. Jovan Dj. Golic,  Intrinsic Statistical Weakness of Keystream Generators, pp. 91 - 103, ASIACRYPT 1994.

[Electronic Edition][Cited 31 times ]

21. Jovan Dj. Golic,  Luke O'Connor,  Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers, pp. 230 - 243, EUROCRYPT 1994.

[Electronic Edition][Cited 66 times Red Star]

22. Jovan Dj. Golic,  On the Security of Shift Register Based Keystream Generators, pp. 90 - 100, FSE 1993.

[Electronic Edition][Cited 31 times ]

23. Miodrag J. Mihaljevic,  Jovan Dj. Golic,  Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence, pp. 124 - 137, EUROCRYPT 1992.

[Electronic Edition][Cited 29 times ]

24. Jovan Dj. Golic,  Slobodan V. Petrovic,  A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance, pp. 472 - 476, EUROCRYPT 1992.

[Electronic Edition][Cited 34 times ]

25. Jovan Dj. Golic,  Correlation via Linear Sequential Circuit Approximation of Combiners with memory, pp. 113 - 123, EUROCRYPT 1992.

[Electronic Edition][Cited 35 times ]

26. Miodrag J. Mihaljevic,  Jovan Dj. Golic,  A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction, pp. 527 - 531, EUROCRYPT 1991.

[Electronic Edition][Cited 36 times ]

27. Jovan Dj. Golic,  The Number of Output Sequences of a Binary Sequence Generator, pp. 160 - 167, EUROCRYPT 1991.

[Electronic Edition][Cited 4 times ]

28. Jovan Dj. Golic,  Miodrag J. Mihaljevic,  A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparison Approach, pp. 487 - 491, EUROCRYPT 1990.

[Electronic Edition][Cited 9 times ]

29. Miodrag J. Mihaljevic,  Jovan Dj. Golic,  A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Noisy Output Sequence, pp. 165 - 175, ASIACRYPT 1990.

[Electronic Edition][Cited 49 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...