Cryptographers' World
 

Miodrag J. Mihaljevic


Author's Web Page Link

14 papers in database with 452 citations Star

H-number: 10

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Jovan Dj. Golic,  Miodrag J. Mihaljevic,  A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance, Journal of Cryptology, Volume 3(3), pp. 201 - 212, Springer, 1991.

[Cited 88 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Marc P. C. Fossorier,  Miodrag J. Mihaljevic,  Hideki Imai,  Yang Cui,  Kanta Matsuura,  An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication, pp. 48 - 62, INDOCRYPT 2006.

[Electronic Edition][Cited 37 times ]

2. Miodrag J. Mihaljevic,  Marc P. C. Fossorier,  Hideki Imai,  Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks, pp. 155 - 168, INDOCRYPT 2005.

[Electronic Edition][Cited 7 times ]

3. Miodrag J. Mihaljevic,  Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy, pp. 137 - 154, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

4. Paul Camion,  Miodrag J. Mihaljevic,  Hideki Imai,  Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q), pp. 196 - 213, SAC 2002.

[Electronic Edition][Cited 9 times ]

5. Miodrag J. Mihaljevic,  Marc P. C. Fossorier,  Hideki Imai,  Fast Correlation Attack Algorithm with List Decoding and an Application, pp. 196 - 210, FSE 2001.

[Electronic Edition][Cited 54 times Red Star]

6. Miodrag J. Mihaljevic,  Marc P. C. Fossorier,  Hideki Imai,  A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack, pp. 196 - 212, FSE 2000.

[Electronic Edition][Cited 60 times Red Star]

7. Miodrag J. Mihaljevic,  Yuliang Zheng,  Hideki Imai,  A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation, pp. 217 - 233, PKC 1998.

[Electronic Edition][Cited 15 times ]

8. Miodrag J. Mihaljevic,  A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function, pp. 67 - 79, ASIACRYPT 1994.

[Electronic Edition][Cited 8 times ]

9. Miodrag J. Mihaljevic,  An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure, pp. 349 - 356, ASIACRYPT 1992.

[Electronic Edition][Cited 26 times ]

10. Miodrag J. Mihaljevic,  Jovan Dj. Golic,  Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence, pp. 124 - 137, EUROCRYPT 1992.

[Electronic Edition][Cited 29 times ]

11. Miodrag J. Mihaljevic,  Jovan Dj. Golic,  A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction, pp. 527 - 531, EUROCRYPT 1991.

[Electronic Edition][Cited 36 times ]

12. Jovan Dj. Golic,  Miodrag J. Mihaljevic,  A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparison Approach, pp. 487 - 491, EUROCRYPT 1990.

[Electronic Edition][Cited 9 times ]

13. Miodrag J. Mihaljevic,  Jovan Dj. Golic,  A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Noisy Output Sequence, pp. 165 - 175, ASIACRYPT 1990.

[Electronic Edition][Cited 49 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...