Dr. Miodrag Mihaljevic -- List of selected publications

 


Selected Patents
International Journals
Selected Book Chapters
Selected Papers in Proceedings of the International Conferences
National Journals
Selected Miscellaneous Publications


Selected Patents

  1. Japan Patent JP 4863283: M.J. Mihaljevic and H. Watanabe
    Authentication system using light-weight authentication protocol,
    November 18, 2011.

  2. United States Patent US 8023649: M.J. Mihaljevic and J. Abe
    Method and apparatus for cellular automata based generation of pseudorandom sequences with controllable period,
    September 20, 2011.
    available at http://worldwide.espacenet.com/publicationDetails/originalDocument?FT=D&date=20110920&DB=EPODOC&locale=en_EP&CC=US&NR=8023649B2&KC=B2

  3. China Patent CN 1698306: M.J. Mihaljevic and J. Abe
    Data processing method,
    October 06, 2010.
    available at http://worldwide.espacenet.com/publicationDetails/originalDocument?FT=D&date=20101006&DB=EPODOC&locale=en_EP&CC=CN&NR=1698306B&KC=B
    http://worldwide.espacenet.com/publicationDetails/biblio?DB=EPODOC&at=7&locale=en_EP&FT=D&CC=US&NR=2005213765A1&KC=A1)

  4. Japan Patent JP 4432350: M.J. Mihaljevic and J. Abe
    Data Processing Method, Program Thereof, Data Processor, and Receiver,
    35 pages, March 2010.
    available at http://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20100317&DB=&locale=en_EP&CC=JP&NR=4432350B2&KC=B2&ND=1

  5. United States Patent US 7502941: L. Michael and M.J. Mihaljevic
    Wireless data communication method and apparatus for software download system,
    March 10, 2009.
    available at http://worldwide.espacenet.com/publicationDetails/originalDocument?FT=D&date=20090310&DB=EPODOC&locale=en_EP&CC=US&NR=7502941B2&KC=B2

  6. Japan Patent JP 3918578: R. Morelos Zaragoza and M.J. Mihaljevic
    Method and apparatus for loss correction and limited reception in streaming data, and data communication apparatus,
    May 23, 2007.
    available at http://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20070523&DB=EPODOC&locale=en_EP&CC=JP&NR=3918578B2&KC=B2




  7. M.J. Mihaljevic, A. Kavcic and K. Matsuura, "An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One",
    Mathematical Problems in Engineering (accepted) .

  8. S. Tomovic, M.J. Mihaljevic, A. Perovic and Z. Ognjanovic, "A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One",
    Mathematical Problems in Engineering (accepted) .

  9. F. Oggier and M.J. Mihaljevic, "An Information-Theoretic Security Evaluation of a Class of Randomized Encryption Schemes",
    IEEE Transactions on Information Forensics and Security, vol. 9, no. 2, pp. 158-168, Feb. 2014. (DOI: 10.1109/TIFS.2013.2294763).

  10. M.J. Mihaljevic, S. Gangopadhyay, G. Paul and H. Imai, "Internal State Recovery of Keystream Generator LILI-128 Based on a Novel Weakness of the Employed Boolean Function",
    Information Processing Letters, vol. 112, no. 21, pp. 805-810, November 2012.

  11. M.J. Mihaljevic, S. Gangopadhyay, G. Paul and H. Imai, "State Recovery of Grain-v1 Employing Normality Order of the Filter Function",
    IET Information Security, vol. 6, no. 2, pp. 55-64, June 2012.

  12. M.J. Mihaljevic, S. Gangopadhyay, G. Paul and H. Imai, "Generic Cryptographic Weakness of k-normal Boolean Functions in Certain Stream Ciphers and Cryptanalysis of Grain-128",
    Periodica Mathematica Hungarica, vol. 65, no. 2, pp. 205-227, Dec. 2012.

  13. M. Mihaljevic and H. Imai, "An approach for stream ciphers design based on joint computing over random and secret data",
    Computing, vol. 85, no. 1-2, pp. 153-168, June 2009. (DOI: 10.1007/s00607-009-0035-x)

  14. M. Mihaljevic, M. Fossorier and H. Imai, "Security Evaluation of Certain Broadcast Encryption Schemes Employing a Generalized Time-Memory-Data Trade-Off",
    IEEE Communications Letters, vol. 11, no. 12, pp. 988-990, Dec. 2007.

  15. M. Fossorier, M. Mihaljevic and H. Imai, "Modeling Block ecoding Approaches for Fast Correlation Attack",
    IEEE Transactions on Information Theory, vol. 53, no. 12, pp. 4728-4737, Dec. 2007.

  16. M. Mihaljevic, "Generic framework for secure Yuan 2000 quantum encryption protocol employing the wire-tap channel approach'",
    Physical Review A, vol. 75, no. 5, pp. 052334-1-5, May 2007.

  17. M. Mihaljevic, M. Fossorier and H. Imai, "Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes",
    IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, vol. E90-A, no. 6, pp. 1248-1251, June 2007.

  18. M.P.C. Fossorier, M.J. Mihaljevic, H. Imai, Y. Cui and K. Matsuura, "An Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocols for RFID Authentication",
    Lecture Notes in Computer Science, vol. 4329, pp. 48-62, Dec. 2006.

  19. M. Mihaljevic, M. Fossorier and H. Imai, "Security Weaknesses of Certain Broadcast Encryption Schemes",
    Lecture Notes in Computer Science, vol. 3919, pp. 228-245, July 2006.

  20. M. Mihaljevic, M. Fossorier and H. Imai, " A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys",
    Lecture Notes in Computer Science, vol. 3919, pp. 258-276, July 2006.

  21. J. Wang, M. Mihaljevic, L. Harn, and H. Imai, "A Hierarchical Key Management Approach for Secure Multicast",
    Lecture Notes in Computer Science, vol. 3894, pp. 422-434, March 2006.

  22. M. Mihaljevic, M. Fossorier and H. Imai, "A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation",
    Lecture Notes in Computer Science, vol. 3857, pp. 203-212, Feb. 2006.

  23. M. Mihaljevic, M. Fossorier and H. Imai, "Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks",
    Lecture Notes in Computer Science, vol. 3797, pp. 155-168, Dec. 2005.

  24. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "Key management with minimized secret storage employing an erasure channel approach",
    IEEE Communications Letters, vol. 9, pp. 741-743, Aug. 2005.

  25. M. Mihaljevic and H. Imai, "The decimated sample based improved algebraic attacks on nonlinear filters",
    Lecture Notes in Computer Science, vol. 3352, pp. 310-323, Jan 2005.

  26. M. Mihaljevic, M. Fossorier and H. Imai, "Secret-public storage trade-off for broadcast encryption key management",
    Lecture Notes in Computer Science, vol. 3269, pp. 375-387, October 2004.

  27. M. Mihaljevic, "Reconfigurable key management for broadcast encryption",
    IEEE Communications Letters, vol. 8, pp. 440-442, July 2004.

  28. M. Mihaljevic, "Key management schemes for stateless receivers based on time varying heterogeneous logical key hierarchy",
    Lecture Notes in Computer Science, vol. 2894, pp. 137-154, 2003.

  29. M. Mihaljevic, "On vulnerabilities and improvements of fast encription algorithm for multimedia FEA-M",
    IEEE Trans. Cons. Electr., vol. 49, no. 4, pp. 1199-1206, Nov. 2003.

  30. M. Mihaljevic, "Broadcast encryption schemes based on the sectioned key tree",
    Lecture Notes in Computer Science, vol. 2836, pp. 158-169, Oct. 2003.

  31. P. Camion, M. Mihaljevic and H. Imai, "Two allerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q)",
    Lecture Notes in Computer Science, vol. 2595, pp. 196-213, 2003.

  32. L. Michael, M. Mihaljevic, S. Haruyama and R. Kohno, "Security issues for Software Defined Radio: Design of a Secure Download System",
    IEICE Trans. Communications, vol. E85-B, pp. 2588-2600, Dec. 2002.

  33. M. Mihaljevic and R. Kohno, "Cryptanalysis of fast encryption algorithm for multimedia FEA-M",
    IEEE Communications Letters, vol. 6, pp.382-384, September 2002.

  34. L. Michael, M. Mihaljevic, S. Haruyama and R. Kohno, "A framework for secure download for software defined radio",
    IEEE Communications Magazine, vol. 40, no. 7, pp. 88-96, July 2002.

  35. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "Fast correlation attack algorithm with the list decoding and an application",
    Lecture Notes in Computer Science, vol. 2355, pp. 196-210, 2002.

  36. M. Mihaljevic and H. Imai, "Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher",
    IEICE Trans. Fundamentals, vol. E85-A, pp. 66-73, Jan. 2002.

  37. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "On decoding techniques for cryptanalysis of certain encryption algorithms",
    IEICE Transactions on Fundamentals, vol. E84-A, pp. 919-930, Apr. 2001.

  38. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "A low-complexity and high-performance algorithm for the fast correlation attack",
    Lecture Notes in Computer Science, vol. 1978, pp.196-212, 2001.

  39. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "An algorithm for cryptanalysis of certain keystream generators suitable for high-speed software and hardware implementations",
    IEICE Transactions on Fundamentals, vol. E84-A, pp. 311-318, Jan. 2001.

  40. M. Mihaljevic and J. Golic, "A method for convergence analysis of iterative probabilistic decoding",
    IEEE Transactions on Information Theory, vol. 46, pp. 2206-2211, Sept. 2000.

  41. M. Fossorier, M. Mihaljevic and H. Imai, "Reduced complexity iterative decoding of Low Density Parity Check codes based on Belief Propagation",
    IEEE Transactions on Communications, vol. 47, pp. 673-680, 1999.

  42. M. Fossorier, M. Mihaljevic and H. Imai, "Critical noise for convergence of iterative probabilistic decoding with Belief Propagation in cryptographic applications",
    Lecture Notes in Computer Science, vol. 1719, pp. 282-293, 1999.

  43. M. Mihaljevic and H. Imai, "A family of fast keystream generators based on programmable linear cellular automata over GF(q) and time variant table",
    IEICE Transactions on Fundamentals, vol. E82-A, pp. 32-39, Jan. 1999.

  44. M. Mihaljevic, Y. Zheng and H. Imai, "A family of fast dedicated one-way hash functions based on linear cellular automata over GF(q)",
    IEICE Transactions on Fundamentals, vol. E82-A, pp. 40-47, Jan. 1999.

  45. M. Mihaljevic, Y. Zheng and H. Imai, "A cellular automaton based fast one-way hash function suitable for hardware implementation",
    Lecture Notes in Computer Science, vol. 1431, pp. 217-233, 1998.

  46. M. Mihaljevic, "An improved key stream generator based on the programmable cellular automata",
    Lecture Notes in Computer Science, vol. 1334, pp. 181-191, 1997.

  47. M. Mihaljevic, "Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach",
    Lecture Notes in Computer Science, vol. 1255, pp. 250-262, 1997.

  48. M. Mihaljevic, "An iterative probabilistic decoding algorithm for binary linear block codes beyond the half minimum distance",
    Lecture Notes in Computer Science, vol. 1255, pp. 237-249, 1997.

  49. M. Mihaljevic, "A faster cryptanalysis of the self-shrinking generator",
    Lecture Notes in Computer Science, vol. 1172, pp. 182-188, 1996.

  50. M. Mihaljevic, "A sequence comparison approach for decoding of general binary block codes after the binary symmetric channel with synchronization errors",
    Zeitschrift fur Angewandte Mathematik und Mechanik - ZAMM, vol. 76, pp. 479-481, 1996.

  51. M. Mihaljevic, "A correlation attack on the binary sequence generators with time-varying output function",
    Lecture Notes in Computer Science, vol. 917, pp. 67-79, 1995.

  52. M. Mihaljevic, "On message protection in crypto systems modeled as the generalized wire-tap channel II",
    Lecture Notes in Computer Science, vol. 829, pp. 13-24, 1994.

  53. M. Mihaljevic, "An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure",
    Lecture Notes in Computer Science, vol. 718, pp. 349-356, 1993.

  54. M. Mihaljevic, J. Golic, "Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence",
    Lecture Notes in Computer Science, vol. 658, pp. 124-137, 1993. (reprinted in Lecture Notes in Computer Science, vol. 1440, 1999)

  55. M. Mihaljevic, J. Golic, "A comparison of cryptanalytic principles based on iterative error-correction",
    Lecture Notes in Computer Science, vol. 547, pp. 527-531, 1992. (reprinted in Lecture Notes in Computer Science, vol. 1440, 1999)

  56. J. Golic, M. Mihaljevic, "A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance",
    Journal of Cryptology, vol. 3, pp. 201-212, 1991.

  57. J. Golic, M. Mihaljevic, "A noisy clock-controlled shift register cryptanalysis concept based on sequence comparison approach",
    Lecture Notes in Computer Science, vol. 473, pp. 487-491, 1991. (reprinted in Lecture Notes in Computer Science, vol. 1440, 1999)

  58. M. Mihaljevic, J. Golic, "A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence",
    Lecture Notes in Computer Science, vol. 453, pp. 165-175, 1990.

  59. J. Golic, M. Mihaljevic, "Minimal linear equivalent analysis of a variable memory binary sequence generator",
    IEEE Transactions on Information Theory, vol. 36, pp. 190-192, Jan. 1990.
  60. M.J. Mihaljevic and H. Imai, "Security Issues of Cloud Computing and a Dedicated Encryption Approach", to appear as a book chaper in High Performance and Cloud Computing in Scientific Research and Education, IGI Global, US, pp. 388-408, March 2014. (DOI: 10.4018/978-1-4666-5784-7, ISBN13: 9781466657847, ISBN10: 1466657847, EISBN13: 9781466657854)

  61. M.J. Mihaljevic, "On Certain Approaches for Analysis and Design of Cryptographic Techniques for Symmetric Encryption and Key Management", in Selected Topics of Image Processing and Cryptology, Zbornik Radova , vol. 15, pp. 119-186, Mathematical Institute, Serbian Academy of Sciences and Arts, Belgrade, Dec. 2012. (ISBN: 978-86-80593-47-0, ISSN: 0351-9406) http://elib.mi.sanu.ac.rs/files/journals/zr/23/mihaljevic2.pdf

  62. M.J. Mihaljevic, "A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Error-Correcting Coding", in Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, Editors B. Preneel, S. Dodunekov, V. Rijmen and S. Nikova, Vol. 23 in the Series Information and Communication Security, pp. 117-139, IOS Press, Amsterdam, The Netherlands, June 2009. (ISSN: 1874-6268; ISBN: 978-1-60750-002-5) DOI: 10.3233/978-1-60750-002-5-117

  63. M. Mihaljevic, "Decimation Based Correlation and Algebraic Attacks and Design of Boolean Functions", in Boolean Functions in Cryptology and Information Security, Editors B. Preneel and O. A. Logachev, Vol. 18 in the Series - D: Information and Communication Security, IOS Press, Amsterdam, The Netherlands, pp. 183-199, July 2008. (ISSN: 1874-6268; ISBN 978-1-58603-878-6)

  64. M. Matsui and M. Mihaljevic, "Security Evaluation Techniques for Symmetric Cryptography", Chapter in Information Security Handbook, Editors H. Imai and E. Okamoto, IEICE, Ohmusha Ltd., Tokyo, Japan, pp. 145-160, 2004.(in Japanese) (ISBN 4-274-07980-5)
  65. A. Kavcic, M.J. Mihaljevic, and K. Matsuura, "Light-Weight Secrecy System Using Channels with Insertion Errors: Cryptographic Implications",
    IEEE Information Theory Workshop (ITW) 2015, Jeju Island, Korea, 11-15 Oct. 2015, Proceedings, pp. 257-261, 2015.

  66. M.J. Mihaljevic, "Light-Weight and Provable Secure Cryptographic Techniques - The Key Components for Cyber Security and Efficient Smart Grid Deployment",
    Global Wireless Summit (GSW) 2013, Atlantic City, US, June 24-27, GSW 2013 Record, River Publishers, US, pp. 141-142. (print ISBN: 978-87-92982-51-3; cd ISBN: 978-87-92982-52-0)

  67. M.J. Mihaljevic, and A. Kavcic, "An Approach for Reduction of the Security Overhead in Smart Grid Communication Infrastructure Employing Dedicated Encryption",
    The Twelfth International Conference on Networks - ICN 2013 at IARIA GlobNet-2013, Jan. 27 - Feb. 1, 2013, Seville, Spain Proceedings of ICN-2013, pp. 46-52 (ISBN: 978-1-61208-245-5)

  68. M.J. Mihaljevic, "An Approach for Light-Weight Encryption Employing Dedicated Coding",
    Proceedings of IEEE GLOBECOM 2012, pp. 892-898, Dec 2012. ISBN: 978-1-4673-0919-6 (and IEEE Xplore http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000308 )

  69. M.J. Mihaljevic, H. Imai, M. David, K. Kobara and H. Watanabe, "On Advanced Cryptographic Techniques for Information Security of Smart Grid AMI",
    Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW 2011,Oak Ridge National Laboratory, Tennessee, US, October 11-14, ACM International Conferences Series, March 2012. ISBN: 978-1-4503-0945-5; doi: 10.1145/2179298.2179371 (Article no. 64, 4 pages)

  70. M.J. Mihaljevic and H. Imai, "An Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Model",
    4th Western European Workshop on Research in Cryptology - WEWoRC 2011, July 20-22, 2011, Weimar, Germany, Conference Record, pp. 21-25.
    http://2011.weworc.org/
    http://www.uni-weimar.de/cms/fileadmin/medien/medsicherheit/WEWoRC2011/files/conference_record3.pdf#page=27

  71. M.J. Mihaljevic and H. Imai, "OEmployment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem",
    2011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark, February 16-17, 2011, E-Proceedings (17 pages).
    http://skew2011.mat.dtu.dk/program.html
    http://skew2011.mat.dtu.dk/proceedings/Employment%20of%20Homophonic%20Coding%20for%20Improvement%20of%20Certain%20Encryption%20Approaches%20Based%20on%20the%20LPN%20Problem.pdf

  72. M.J. Mihaljevic and H. Imai, "A Security Evaluation of Certain Stream Ciphers which Involve Randomness and Coding",
    2010 Int. Symp. on Inform. Theory and its Appl. - ISITA 2010, Taichung, Taiwan, Oct. 17-20, 2010, Proceedings, pp. 789-794, IEEE, 2010.
    DOI: 10.1109/ISITA.2010.5649616
    (IEEE Catalog Number: CFP 10767-USB; ISBN: 078-1-4244-6014-4; Print ISBN: 978-1-4244-6016-8; ISSN: 1943-7439)
    http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5649616

  73. M.J. Mihaljevic, H. Watanabe and H. Imai, "A Low Complexity Authentication Protocol Based on Pseudorandomness, Randomness and Homophonic Coding",
    2010 Int. Symp. on Inform. Theory and its Appl. - ISITA 2010, T, Taichung, Taiwan, Oct. 17-20, 2010, Proceedings, pp. 690-695, IEEE, 2010.
    DOI: 10.1109/ISITA.2010.5649666
    (IEEE Catalog Number: CFP 10767-USB; ISBN: 078-1-4244-6014-4; Print ISBN: 978-1-4244-6016-8; ISSN: 1943-7439)
    http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5649666

  74. M.J. Mihaljevic, S. Gangopadhyay, G. Paul and H. Imai, "A Generic Weakness of the $k$-normal Boolean Functions Exposed to Dedicated Algebraic Attack",
    2010 Int. Symp. on Inform. Theory and its Appl. - ISITA 2010, Taichung, Taiwan, Oct. 17-20, 2010, IEEE Proceedings, pp. 911-916.
    DOI: 10.1109/ISITA.2010.5649555
    (IEEE Catalog Number: CFP 10767-USB; ISBN: 078-1-4244-6014-4; Print ISBN: 978-1-4244-6016-8; ISSN: 1943-7439)
    http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5649555

  75. M. Fossorier, M.J. Mihaljevic and H. Imai, "Time-Memory and Time-Memory-Data Trade-OŽs for Noisy Ciphertext",
    Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis 2010, Francois-Xavier Standaert (Ed.), pp. 27-36, June 2010.
    (Proceedings available at: http://www.ecrypt.eu.org/symlab/tools2010/tools2010-proceedings.pdf

  76. M.J. Mihaljevicand F. Oggier, "A Wire-tap Approach to Enhance Security in Communication Systems using the Encoding-Encryption Paradigm",
    2010 IEEE 17th International Conf. on Telecommunications - ICT 2010, Proceedings, pp. 484-489, April 2010., pp. 83-88
    DOI: 10.1109/ICTEL.2010.5478824
    (E-ISBN: 978-1-4244-5247-7 Print ISBN: 978-1-4244-5246-0)
    (Proceedings available at: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5478824

  77. M.J. Mihaljevic and H. Imai, "A Stream Cipher Design Based on Embedding of Random Bits",
    IEEE 2008 Int. Symp. on Inform. Theory and its Appl. - ISITA2008, Auckland, New Zealand, Dec. 7-10, 2008, Proceedings, pp. 1497-1502. (ISBN: 978-1-4244-2069-8; Library of Congress: 2008900302; copyright2008 IEEE)

  78. M.J. Mihaljevic, H. Watanabe and H. Imai, "A Cellular Automata Based HB#-like Low Complexity Authentication Technique",
    IEEE 2008 Int. Symp. on Inform. Theory and its Appl. - ISITA2008, Auckland, New Zealand, Dec. 7-10, 2008, Proceedings, pp. 1355-1360. (ISBN: 978-1-4244-2069-8; Library of Congress: 2008900302; copyright2008 IEEE)

  79. M. Fossorier, M. Mihaljevic and H. Imai, "Decimation Based Fast Correlation Attack",
    2007 IEEE Int. Symp. Inform. Theory - ISIT'2007, Nice, France, June 24-29, 2007, Proceedings, pp. 456-460. (ISBN 1-4244-1429-6).

  80. M.P.C. Fossorier, M. Mihaljevic and H. Imai, "A Unified Analysis for the
    Fast Correlation Attack",
    2005 IEEE Int. Symp. Inform. Theory - ISIT'2005, Adelaide, Australia, Sept. 2005, Proceedings, pp. 2012-2015 (ISBN 0-7803-9151-9).

  81. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "A Novel Approach to Algebraic and
    Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators",
    HISC 2005, Hawaii, USA, May 2005, Proceedings, pp. 183-188 (ISBN 4-902087-13-8).

  82. M. Mihaljevic and H. Imai, "Novel method for implementation of certain key management schemes to minimize secret storage",
    IEEE CCNC 2005, Las Vegas, USA, January 2005, Proceedings, pp. 54-59. (ISBN Softbound: 0-7803-8784-8; ISBN CD-Rom: 0-7803-87845-6.)

  83. M. Mihaljevic and H. Imai, "Framework of a novel technique for algebraic and fast correlation attacks based on dedicated sample decimation",
    The State of the Art of Stream Ciphers - SASC2004, Bruge, Belgium, October 2004, Workshop Record, pp. 190-201.

  84. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "One-way mapping of keys and the overheads trade-off in key management schemes for broadcast encryption",
    Int. Symp. Inform. Theory and its Appl. - ISITA2004, Parma, Italy, October 2004, Proceedings, pp. 486-491.

  85. M. Mihaljevic and H. Imai, "A method for data access control in certain storage area networks",
    7th Int. Symp. on Wireless Personal Multimedia Comm. - WPMC2004, Albano Terme, Italy, September 2004, Proceedings, pp. V3:488-491.

  86. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "An Improved Fast Correlation Attack Based on List Decoding",
    IEEE Int. Symp. Inform. Theory - ISIT'2003, Yokohama, Japan, July 2003, Proceedings, p.165.

  87. M. Mihaljevic and R. Kohno, "On a framework for employment of cryptographic components in software defined radio",
    IEEE WPMC'02 - The 5th Int. Symp. on Wireless Personal Multimedia Communications, Honolulu, Hawaii, USA, October 2002, Proceedings, vol. II, pp. 835-839.

  88. L. Michael, M. Mihaljevic, S. Haruyama and R. Kohno, "A proposal of architectural elements for implementing secure software download service in software defined radio",
    IEEE PIMRC 2002 - The 13th IEEE Int. Symp. on Personal, Indoor and Mobile Radio Communications, Lisbon, Portugal, September 2002, Proceedings, vol. I, pp. 442-446.

  89. P. Camion, M. Mihaljevic and H. Imai, "Two allerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q)",
    Selected Areas in Cryptography - SAC2002, St.John's, Newfoundland, Canada, August 2002, Conference Record, pp. 203-217.

  90. M. Mihaljevic and R. Kohno, "Security issues of downloading for software reconfigurable radio systems versus usual Internet downloading",
    invited talk, XXVIIth General Assembly of the International Union of Radio Science, Maastricht, The Netherlands, Aug. 2002, Proceedings, 4 pages.

  91. P. Camion, M. Mihaljevic and H. Imai, "On employment of LFSRs over GF(q) in certain stream ciphers",
    IEEE Int. Symp. Inform. Theory - ISIT'2002, Lausanne, Switzerland, July 2002, Proceedings, p. 210.

  92. M. Mihaljevic and R. Kohno, "On wirelss communications privacy and security evaluation of encryption techniques",
    IEEE Wireless Communications and Networking Conf. - WCNC2002, Orlando, FL, USA, March 2002, Proceedings, pp. 865-868.

  93. M. Mihaljevic and R. Kohno, "Cryptographic evaluation of a fast encryption for multimedia",
    SONY Research Forum - SRF2001, Tokyo, Japan, Dec. 2001, Proceedings, pp. 59-64, March, 2002.

  94. M. Mihaljevic and H. Imai, "On employment of different weigth parity-checks for the fast correlation attack",
    IEEE Int. Symp. Inform. Theory - ISIT'2001, Washington, D.C., USA, June 2001, Proceedings p. 119.

  95. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "Fast correlation attack algorithm with the list decoding and an application",
    Fast software Encription Workshop - FSE2001, Yokohama, Japan, April, 2001, Pre-proceedings, pp. 208-222.

  96. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "A time-memory trade-off for the fast correlation attack",
    ISITA2000, Hawaii, USA, Nov. 2000, Proceedings, pp. 55-58.

  97. P. Camion, M. Mihaljevic and H. Imai, "Vulnerability of certain keystream generators based on resilient functions",
    ISITA2000, Hawaii, USA, Nov. 2000, Proceedings, pp. 70-73.

  98. H. Imai, M. Mihaljevic, M. Isaka and M.P.C. Fossorier, "Applications of iterative decoding techniques to cryptography",
    2nd Int. Symp. on Turbo Codes & Related Topics, Brest, France, Sept. 2000, invited paper, Proceedings, pp. 227-234.

  99. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "Novel fast correlation attack via iterative decoding of punctured simplex code",
    IEEE ISIT'2000, Sorento, Italy, June 2000, Proceedings p. 214

  100. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "A low-complexity and high-performance algorithm for the fast correlation attack", Pre-proceedings,
    Fast Software Encryption Workshop - FSE2000, New York, USA, April 2000,

  101. M. Mihaljevic, M.P.C. Fossorier and H. Imai, "A novel fast correlation attack suitable for simple hardware implementation",
    Proc. JW-ISC'2000, pp.1-8, Okinawa, Japan, Jan. 2000; also published as Technical report of IEICE: ISEC99-74, pp 1-8, Jan. 2000.

  102. M. Mihaljevic, Y. Zheng and H. Imai, "A Fast and Secure Stream Cipher Based on Cellular Automata over GF(q)",
    IEEE GLOBECOM '98, Sydney, Australia, Nov. 1998, Proceedings, pp. 3250-3255.

  103. M. Mihaljevic and H. Imai, "Construction of Fast MAC Based Linear Cellular Automata
    GF(q)",
    ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City, Oct. 1998, Proceedings, pp. 40-43.

  104. M. Fossorier, M. Mihaljevic and H. Imai, "Reduced Complexity Iterative Decoding of Low Density Parity Check Codes Based on Belief Propagation",
    ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City, Oct. 1998, Proceedings, pp. 654-658.

  105. M. Mihaljevic, Y. Zheng and H. Imai, "A Fast Cryptographic Hash Function Based on Cellular Automata over GF(q)",
    in Global IT Security, IFIP, pp. 96-107, 1998 (Proc. 14th IFIP Int. Conf. on Information Security at 15th World Comput. Congress - IFIP/SEC '98, Vienna - Budapest, Sept. 1998).

  106. M. Mihaljevic, "Fast Reconstruction of the Programmable Cellular Automata Initial State Using Ciphertext Only",
    4th International Symposium on Communication Theory and Applications, UK, Lake district, July 1997, Proceedings, 5 pages.

  107. M. Mihaljevic, J. Dj. Golic, "A Method for Convergence Analysis of Error-Correction Decoding",
    ISITA '96 - 1996 IEEE International Symposium on Information Theory and Its Applications, Canada, Victoria, B.C., Sept. 1996, Proceedings, pp. 802-805.

  108. M. Mihaljevic "Effective Key Size Estimation of the Self-Shrinking Generator",
    ISITA '96 - 1996 IEEE International Symposium on Information Theory and Its Applications, Canada, Victoria, B.C., Sept. 1996, Proceedings, pp. 250-253.

  109. M. Mihaljevic, "Security Examination of Certain Cellular Automata Based Key Stream Generator",
    ISITA '96 - 1996 IEEE International Symposium on Information Theory and Its Applications, Canada, Victoria, B.C., Sept. 1996, Proceedings, pp. 246-249.

  110. M. Mihaljevic, "Security Examination of a Key Stream Generator Based on Programmable Cellular Automata with ROM",
    4th UK / Australian International Symposium on DSP for Communication Systems, Australia, Perth, Sept. 1996, Proceedings, pp.53-60.

  111. M. Mihaljevic, "Novel Sequence Comparison Approaches for Binary Information Strings",
    PSI'96: Perspectives of System Informatics - Andrei Ershov Second International Memorial Conference, Russia, Novosibirsk, Academgorodok, June 1996, Proceedings, pp. 273-277.

  112. M. Mihaljevic, "Novel Tests for the Security Examination of Pseudorandom Bit Generators",
    International Symposium on Information Theory and Its Applications 1994 (ISITA '94), Australia, Sydney, Nov. 1994, Proceedings, pp. 277-282.


  113. M. Mihaljevic "On Certain Coding Approaches for Security Evaluation and Design of Stream Ciphers",
    Transaction on Advanced Research, vol. 8, no. 2, July 2012, pp. 28-34 (ISSN 1820 - 4511; http://www.internetjournals.net/ )

  114. M. Mihaljevic, Y. Watanabe and H. Imai, "Security evaluation of stream ciphers",
    Computer Today, vol. 107, pp. 4-10, Jan. 2002. (in Japanese)

  115. M. Mihaljevic and Z. Markovic, "On cryptographic approaches for security of information technologies",
    Facta Universitatis, vol. 2 (10), pp. 1393-1402, Oct. 2000. (ISSN: 1820-6417)

  116. M. Mihaljevic, D. Stijovic, B. Maric, S. Popadic i M. Ivanovic, "Koncept za uporedjivanje i uporedni pregled tri tehnike za zastitu informacionih sistema: Kerberos, SESAME i SSH",
    Info-Science, br. 6, str. 8-13, decembar 1999. (ISSN: 0354-5334)

  117. M. Mihaljevic, D. Stijovic, B. Maric, S. Popadic i M. Ivanovic, "Elektronska trgovina, elektronski novac i kriptografske tehnike: Jedan osvrt na savremene trendove",
    JISA-INFO, br. 4, str. 31-34, jul-avgust 1999. (ISSN: 0354-5334)

  118. M. Mihaljevic and H. Imai, "A message authentication approach for for information systems",
    Info-Science, vol. 7, no. 1, pp. 4-7, Jan. 1999. (ISSN: 0354-5334)

  119. M. Mihaljevic and Z. Savic, "Zastita privatnosti informacija",
    Info-Science, vol. 3, no. 6, pp. 28-34, 1995.(ISSN: 0354-5334)



  120. M. Mihaljevic , M. Todorovic, P. Maksimovic, S. Roksandic, M. Milojevic-Jevric, B. Marinkovic, "Evaluacija podataka o ostvarivanju napredne informacione bezbednosti u Cloud Computing (A Comprehensive Overview of Colud Computing Security Issues)",
    Studija - Evaluacija, MI-SANU, Beograd, Dec. 2013

  121. M. Mihaljevic, S. Roksandic, M. Laban, B. Marinkovic, "Evaluacija podataka o ostvarivanju napredne informacione bezbednosti za M2M (masina-masina) komunikacije u okviru IoT (Internet of Things) (A Comprehensive Overview of Machine-to-Machine Secure Communications over IoT)",
    Studija - Evaluacija, MI-SANU, Beograd, Dec. 2013

  122. H. Imai and M.J. Mihaljevic, "Cryptography Policy of Japan and CRYPTREC" Invited talk, BalkanCrypt 2013, Sofia, Bulgaria, 07-08 Nov., 2013.
    http://balkancrypt.uist.edu.mk/docs/imai_mihaljevic_policy.pdf
    http://balkancrypt.uist.edu.mk/abstracts.html

  123. M.J. Mihaljevic and H. Imai, "Towards Lightweight Cryptographic Primitives Employing Coding Theory", Invited talk, BalkanCrypt 2013, Sofia, Bulgaria, 07-08 Nov., 2013.
    http://balkancrypt.uist.edu.mk/docs/mihaljevic_imai_lightweight.pdf
    http://balkancrypt.uist.edu.mk/abstracts.html

  124. M.J. Mihaljevic, (one of the co-authors), Specification of algorithms for static reconfiguration of Ad-Hoc network, for security and authentication and multimedia services.
    Technical Report, EU FP6 Project No. 026548, ADHOCSYS, Deliverable D11, 237 pages, Feb. 2007.

  125. M.J. Mihaljevic, (one of the co-authors), Software implementation, partial prototype.
    Technical report, EU FP6 Project No. 026548, ADHOCSYS, Deliverable D13, 75 pages, Feb. 2007.

  126. M. Mihaljevic, Report on Security Evaluation of RC4 Stream Cipher.
    Peer Reviewed Technical Report, CRYPTREC, Information-technology Promotion Agency (IPA), Japan, Tokyo, 51 pages, Sept. 2002.

  127. M. Mihaljevic, Report on Security Evaluation of MUGI Stream Cipher.
    Peer Reviewed Technical Report, CRYPTREC, Information-technology Promotion Agency (IPA), Japan, Tokyo, 47 pages, Sept. 2002.

  128. M. Mihaljevic, Report on Security Evaluation of PANAMA Stream Cipher.
    Peer Reviewed Technical Report, CRYPTREC, Information-technology Promotion Agency (IPA), Japan, Tokyo, 36 pages, Dec. 2001.

  129. M.J. Mihaljevic, Z. Markovic and T. Davidovic, "Security Evaluation of Certain Advanced Cryptographic Techniques for GSM network at Division for Mobile Telephony of Telecom Serbia", ("Tehnicki izvestaj o evaluaciji kriptografske sigurnosti odredjenih kriptografskih tehnika od perspektivnog interesa za GSM mrezu Mobilne telefonije, Telekoma Srbije"),
    Technical Report, Mathematical Institute, Serbian Academy of Sciences and Arts, Belgrade, 73 pages, May 2008.

  130. M. Mihaljevic,"A standardized framework for information security of the E-Register" (Prikaz opsteg standardizovanog okvira za ostvarivanje informaticke bezbednosti Elektronskog Registra u njegovom integralnom okruzenju - Projekat razvoja i implementacije savremenog eletronskog registra u Republickoj direkciji za imovinu),
    Technical Report, Mathematical Institute, Serbian Academy of Sciences and Arts, Belgrade, 55 pages, Dec. 2008.

  131. M. Mihaljevic,"An overview on security evaluation of certain cryptographic primitives" (Evaluacija sigurnosti odredjenih kriptografskih resenja - Projekat razvoja i implementacije savremenog eletronskog registra u Republickoj direkciji za imovinu),
    Technical Report, Mathematical Institute, Serbian Academy of Sciences and Arts, Belgrade, 33 pages, Dec. 2008.

  132. M. Mihaljevic, "A comparison of certain RSA and Entrust PKI systems: Elements of the methodology for comparison of PKI systems" ("Elaborat o uporednoj tehnickoj analizi odredjenih PKI resenja RSA i Entrust: Metodololoski elementi za evaluaciju i poredjenje PKI sistema"),
    Technical Report, Centralna Banka Crne Gore, Podgorica, 34 pages, Dec. 2008.

  133. M.J. Mihaljevic, Z. Markovic and Z. Ognjanovic, "Security Evaluation of the Cryptographic Techniques in GSM network for the Data Services at Division for Mobile Telephony of Telecom Serbia", ("Tehnicki izvestaj o evaluaciji kriptografske sigurnosti tehnika za zastitu negovornih servisa Mobilne telefonije, Telekoma Srbije"),
    Technical Report, Mathematical Institute, Serbian Academy of Sciences and Arts, Belgrade, 60 pages, Dec. 2007.

  134. M.J. Mihaljevic, Z. Markovic, Z. Perisic and M. Markovic, Frameworks and Particular Elements for Business Continuity and Disaster Recovery of IT system in IT Infrastructure Management Department, IT Division, Telecom Serbia (Metodoloska osnova, genericki elementi i odredjena pravila za upravljanje kontinuitetom IT poslovanja i oporavkom sistema u Sektoru za upravljanje IT platformama, Direkcije za IT, Telekoma Srbija).
    Collection of Technical Reports, Volumes I - VIII, Mathematical Institute, Serbian Academy of Sciences and Arts, Belgrade, in total more than 300 pages, Nov. 2007.

  135. M.J. Mihaljevic, Z. Markovic and Z. Ognjanovic, "Security Evaluation of the Cryptographic Techniques in GSM network for the Speach Service at Division for Mobile Telephony of Telecom Serbia", (``Tehnicki izvestaj o evaluaciji kriptografske sigurnosti tehnika za zastitu govornog servisa Mobilne telefonije, Telekoma Srbije''),
    Technical Report, Mathematical Institute, Serbian Academy of Sciences and Arts, Belgrade, 59 pages + Appendix, Sept. 2007.

  136. M. Mihaljevic, "Certain Elements for Security Evaluation of Stream Ciphers",
    Invited Talk by Cryptology Research Society of India, National Workshop on Cryptology, India, Mumbai-Pune, 08-10 September 2006.

  137. M. Mihaljevic, M.P.C. Fossorier, M. Isaka and H. Imai, "Evaluation of certain stream ciphers via message-passing decoding techniques",
    2000 Workshop on Information-Based Induction Sciences (IBIS2000), Izu, Japan, July 17-18, 2000, Proceedings, 6 pages.

  138. M.J. Mihaljevic and H. Imai, "Privacy Preserving Light-Weight Authentication Based on a Variant of Niederreiter Public-Key Encryption",
    Symp. on Crypology and Information Security - SCIS 2014, Kagoshima, Japan, 21-24 January 2014, Proceedings, paper no. 2B4-3, 6 pages.

  139. R. Hosoya, T. Kitagawa, M.Mihaljevic, K. Kobara and H. Imai, "An Authentication Protocol Based on a Variant of Niederreiter Public-Key Encryption",
    Symp. on Crypology and Information Security - SCIS 2014, Kagoshima, Japan, 21-24 January 2014, Proceedings, paper no. 3F3-2, 6 pages.

  140. K. Yanagishima, T. Kitagawa,M.Mihaljevic and H. Imai, "On computational complexity required to completely identify the key from the CPA results",
    Symp. on Crypology and Information Security - SCIS 2014, Kagoshima, Japan, 21-24 January 2014, Proceedings, paper no. 2A4-4, 6 pages.

  141. M. Mihaljevic and G. Hanaoka, "A Framework for Provably Secure and Light-Weight Stream Cipher Like Encryption Based on the LPN Problem and Dedicated Coding",
    The 2013 Symposium on Cryptography and Information Security - SCIS2013, Kyoto, Japan, January 22-25, 2013, CD-ROM Proceedings, paper #2B4-3, 7 pages.

  142. M. Mihaljevic and G. Hanaoka, "A Framework for Light-Weight Authentication Based on the LPN Problem and Random Selection",
    The 2013 Symposium on Cryptography and Information Security - SCIS2013, Kyoto, Japan, January 22-25, 2013, CD-ROM Proceedings, paper #2D3-2, 6 pages.

  143. M. Mihaljevic and H. Imai, "Improved fast correlation attack based on highly restricted search minimum distance decoding",
    The 2001 Symposium on Cryptography and Information Security - SCIS2001, Oiso, Japan, January 23-26, 2001, Proceedings, pp. 283-288.

  144. M. Mihaljevic and H. Imai, "Improved decimation attack based on matrix characterization of LFSR",
    The 2001 Symposium on Cryptography and Information Security - SCIS2001, Oiso, Japan, January 23-26, 2001, Proceedings, pp. 289-291.

  145. M. Mihaljevic and H. Imai, "Effective secret key size of TOYOCRYPT-HS1 stream cipher",
    The 2001 Symposium on Cryptography and Information Security - SCIS2001, Oiso, Japan, January 23-26, 2001, Proceedings, pp. 665-667.

  146. M. Mihaljevic, "Zastita podataka na Internetu",
    Internet i savremeno poslovanje, Beograd, str. 281-300, 1998.

  147. M. Mihaljevic, J. Golic, "A Parity-Check Weight Distribution for Maximum-Length Sequences",
    Second International Conference on Finite Fields, SAD, Las Vegas, Aug. 1993,
    Abstracts p. 35.

  148. J. Golic and M. Mihaljevic, "On a binary sequence generator",
    EUROCRYPT '89, Belgium, Houthalen, Apr. 1989, Ext. Abstracts pp. 59.1-59.6.

Back