Edit Profile (opens in new tab) Mihaljević, Miodrag J. Compute Distance To: Compute Author ID: mihaljevic.miodrag-j Published as: Mihaljević, Miodrag J.; Mihaljević, Miodrag; Mihaljevic, Miodrag J.; Mihaljević, M. Documents Indexed: 34 Publications since 1990 1 Contribution as Editor Co-Authors: 12 Co-Authors with 22 Joint Publications 471 Co-Co-Authors all top 5 Co-Authors 13 single-authored 14 Imai, Hideki 8 Fossorier, Marc P. C. 7 Golić, Jovan Dj. 2 Gangopadhyay, Sugata 2 Paul, Goutam 1 Camion, Paul F. 1 Cui, Yang 1 Matsuura, Kanta 1 Ognjanović, Zoran 1 Perović, Aleksandar 1 Tomović, Siniša 1 Zheng, Yuliang all top 5 Serials 3 IEEE Transactions on Information Theory 1 Information Processing Letters 1 Periodica Mathematica Hungarica 1 Zeitschrift für Angewandte Mathematik und Mechanik (ZAMM) 1 Computing 1 Journal of Cryptology 1 Mathematical Problems in Engineering 1 Zbornik Radova (Beograd) Fields 35 Information and communication theory, circuits (94-XX) 7 Computer science (68-XX) 1 Order, lattices, ordered algebraic structures (06-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 17 Publications have been cited 42 times in 30 Documents Cited by ▼ Year ▼ A low-complexity and high-performance algorithm for the fast correlation attack. Zbl 0994.68632Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 6 2001 An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication. Zbl 1175.94078Fossorier, Marc P. C.; Mihaljević, Miodrag J.; Imai, Hideki; Cui, Yang; Matsuura, Kanta 6 2006 Fast correlation attack algorithm with list decoding and an application. Zbl 1073.68638Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 5 2002 A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. Zbl 0724.94007Golić, Jovan Dj.; Mihaljević, Miodrag J. 4 1991 Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128. Zbl 1289.94056Mihaljević, Miodrag J.; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki 3 2012 Modeling block decoding approaches for the fast correlation attack. Zbl 1325.94118Fossorier, Marc P. C.; Mihaljevic, Miodrag J.; Imai, Hideki 3 2007 A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation. Zbl 1125.94009Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 2 2006 An approach for stream ciphers design based on joint computing over random and secret data. Zbl 1172.94009Mihaljević, Miodrag J.; Imai, Hideki 2 2009 A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence. Zbl 0722.68061Mihaljević, Miodrag J.; Golić, Jovan Dj. 2 1990 A comparison of cryptoanalytic principles based on iterative error- correction. Zbl 0825.94172Mihaljević, Miodrag J.; Golić, Jovan Dj. 2 1991 A cellular automaton based fast one-way hash function suitable for hardware implementation. Zbl 1067.94552Mihaljević, Miodrag; Zheng, Yuliang; Imai, Hideki 1 1998 An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure. Zbl 0877.94024Mihaljevic, Miodrag J. 1 1993 Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(\(q\)). Zbl 1066.94537Camion, Paul; Mihaljević, Miodrag J.; Imai, Hideki 1 2003 Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function. Zbl 1250.94039Mihaljević, Miodrag J.; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki 1 2012 A noisy clock-controlled shift register cryptanalysis concept based on sequence comparison approach. Zbl 0825.94169Golić, Jovan Dj.; Mihaljević, Miodrag J. 1 1991 Decimation based algebraic and correlation attacks and design of Boolean functions. Zbl 1198.94114Mihaljević, Miodrag J. 1 2008 Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications. Zbl 0953.94021Fossorier, Marc P. C.; Mihaljević, Miodrag J.; Imai, Hideki 1 1999 Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128. Zbl 1289.94056Mihaljević, Miodrag J.; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki 3 2012 Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function. Zbl 1250.94039Mihaljević, Miodrag J.; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki 1 2012 An approach for stream ciphers design based on joint computing over random and secret data. Zbl 1172.94009Mihaljević, Miodrag J.; Imai, Hideki 2 2009 Decimation based algebraic and correlation attacks and design of Boolean functions. Zbl 1198.94114Mihaljević, Miodrag J. 1 2008 Modeling block decoding approaches for the fast correlation attack. Zbl 1325.94118Fossorier, Marc P. C.; Mihaljevic, Miodrag J.; Imai, Hideki 3 2007 An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication. Zbl 1175.94078Fossorier, Marc P. C.; Mihaljević, Miodrag J.; Imai, Hideki; Cui, Yang; Matsuura, Kanta 6 2006 A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation. Zbl 1125.94009Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 2 2006 Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(\(q\)). Zbl 1066.94537Camion, Paul; Mihaljević, Miodrag J.; Imai, Hideki 1 2003 Fast correlation attack algorithm with list decoding and an application. Zbl 1073.68638Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 5 2002 A low-complexity and high-performance algorithm for the fast correlation attack. Zbl 0994.68632Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki 6 2001 Critical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications. Zbl 0953.94021Fossorier, Marc P. C.; Mihaljević, Miodrag J.; Imai, Hideki 1 1999 A cellular automaton based fast one-way hash function suitable for hardware implementation. Zbl 1067.94552Mihaljević, Miodrag; Zheng, Yuliang; Imai, Hideki 1 1998 An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure. Zbl 0877.94024Mihaljevic, Miodrag J. 1 1993 A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. Zbl 0724.94007Golić, Jovan Dj.; Mihaljević, Miodrag J. 4 1991 A comparison of cryptoanalytic principles based on iterative error- correction. Zbl 0825.94172Mihaljević, Miodrag J.; Golić, Jovan Dj. 2 1991 A noisy clock-controlled shift register cryptanalysis concept based on sequence comparison approach. Zbl 0825.94169Golić, Jovan Dj.; Mihaljević, Miodrag J. 1 1991 A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence. Zbl 0722.68061Mihaljević, Miodrag J.; Golić, Jovan Dj. 2 1990 all cited Publications top 5 cited Publications all top 5 Cited by 44 Authors 5 Mihaljević, Miodrag J. 4 Golić, Jovan Dj. 4 Imai, Hideki 3 Vaudenay, Serge 2 Bogos, Sonia 2 Feng, Dengguo 2 Gangopadhyay, Sugata 2 Hell, Martin 2 Johansson, Thomas 2 Paul, Goutam 2 Petrović, Slobodan V. 2 Zhang, Bin 1 Ågren, Martin 1 Alekseychuk, Anton Nikolaevich 1 Caballero-Gil, Pino 1 Canteaut, Anne 1 Chen, Xiaosong 1 Clarridge, Adam G. 1 Datta, Pratish 1 Dubrova, Elena 1 Fúster-Sabater, Amparo 1 Gryshakov, S. V. 1 Hagiwara, Manabu 1 Jonsson, Fredrik 1 Kanso, Ali Adel 1 Katz, Jonathan N. 1 Khiabani, Yahya S. 1 Kühn, G. J. 1 Löndahl, Carl 1 Lu, Yi 1 Meidl, Wilfried 1 Meier, Willi 1 Menicocci, Renato 1 Mukhopadhyay, Sourav 1 Penzhorn, Walter T. 1 Pirsic, Isabel 1 Rotella, Yann 1 Roy, Dibyendu 1 Salomaa, Kai T. 1 Shin, Ji Sun 1 Sinha, Nishant 1 Tramèr, Florian 1 Wang, Chunpeng 1 Wei, Shuangqing all top 5 Cited in 15 Serials 4 Cryptography and Communications 3 Information Sciences 3 Journal of Cryptology 2 Information Processing Letters 1 Computers & Mathematics with Applications 1 Periodica Mathematica Hungarica 1 Computing 1 Journal of Complexity 1 Designs, Codes and Cryptography 1 Applicable Algebra in Engineering, Communication and Computing 1 Cybernetics and Systems Analysis 1 Journal of Discrete Mathematical Sciences & Cryptography 1 Journal of Applied Mathematics and Computing 1 Advances in Mathematics of Communications 1 Science China. Information Sciences Cited in 5 Fields 27 Information and communication theory, circuits (94-XX) 6 Computer science (68-XX) 2 Combinatorics (05-XX) 2 Order, lattices, ordered algebraic structures (06-XX) 2 Number theory (11-XX) Citations by Year