Reduced complexity iterative decoding of low-density parity check codes based on belief propagation MPC Fossorier, M Mihaljevic, H Imai IEEE Transactions on communications 47 (5), 673-680, 1999 | 1572 | 1999 |
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance JD Golić, MJ Mihaljević Journal of Cryptology 3, 201-212, 1991 | 137 | 1991 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 114 | 2006 |
An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication MPC Fossorier, MJ Mihaljević, H Imai, Y Cui, K Matsuura Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006 | 97 | 2006 |
Fast correlation attack algorithm with list decoding and an application MJ Mihaljevi, MPC Fossorier, H Imai Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama …, 2002 | 91 | 2002 |
A low-complexity and high-performance algorithm for the fast correlation attack MJ Mihaljević, MPC Fossorier, H Imai International Workshop on Fast Software Encryption, 196-212, 2000 | 87 | 2000 |
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence MJ Mihaljevic, JD Golic Advances in Cryptology—AUSCRYPT'90: International Conference on Cryptology …, 1990 | 86 | 1990 |
Cryptanalysis of Toyocrypt-HS1 stream cipher MJ Mihaljevic, H Imai IEICE Transactions on Fundamentals of Electronics, Communications and …, 2002 | 79 | 2002 |
A faster cryptanalysis of the self-shrinking generator MJ Mihaljević Australasian Conference on Information Security and Privacy, 182-189, 1996 | 69 | 1996 |
A comparison of cryptanalytic principles based on iterative error-correction MJ Mihaljević, JD Golić Advances in Cryptology—EUROCRYPT’91: Workshop on the Theory and Application …, 1991 | 52 | 1991 |
A framework for secure download for software-defined radio LB Michael, MJ Mihaljevic, S Haruyama, R Kohno IEEE Communications Magazine 40 (7), 88-96, 2002 | 51 | 2002 |
Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence MJ Mihaljević, JD Golić Workshop on the Theory and Application of of Cryptographic Techniques, 124-137, 1992 | 51 | 1992 |
An approach for stream ciphers design based on joint computing over random and secret data MJ Mihaljević, H Imai Computing 85, 153-168, 2009 | 49 | 2009 |
A cellular automaton based fast one-way hash function suitable for hardware implementation M Mihaljević, Y Zheng, H Imai International Workshop on Public Key Cryptography, 217-233, 1998 | 48 | 1998 |
Internal state recovery of grain-v1 employing normality order of the filter function MJ Mihaljević, S Gangopadhyay, G Paul, H Imai IET Information Security 6 (2), 55-64, 2012 | 44 | 2012 |
Wireless data communication method and apparatus for software download system L Michael, M Mihaljevic US Patent 7,502,941, 2009 | 44 | 2009 |
Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128 M Mihaljević, S Gangopadhyay, G Paul, H Imai Periodica Mathematica Hungarica 65 (2), 205-227, 2012 | 36 | 2012 |
A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q) M Mihaljevic, Y Zheng, H Imai IEICE transactions on fundamentals of electronics, communications and …, 1999 | 35 | 1999 |
Generic framework for the secure Yuen 2000 quantum-encryption protocol employing the wire-tap channel approach MJ Mihaljević Physical Review A—Atomic, Molecular, and Optical Physics 75 (5), 052334, 2007 | 33 | 2007 |
An information-theoretic security evaluation of a class of randomized encryption schemes F Oggier, MJ Mihaljević IEEE Transactions on Information Forensics and Security 9 (2), 158-168, 2013 | 32 | 2013 |