- Japan Patent JP 6667174 B2 : M.J. Mihaljevic and K. Matsuura,
Communication Data Encryption/decryption Method And System,
February 2020.
- Japan Patent JP 6602210 B2: K. Matsuura and M.J. Mihaljevic,
Authentication System and Method,,
November, 2019.
- Japan Patent JP 4863283 B2: M.J.
Mihaljevic and H. Watanabe
Authentication system using light-weight authentication protocol,
November 18, 2011.
- United States Patent US 8023649 B2: M.J.
Mihaljevic and J. Abe
Method and apparatus for cellular automata based
generation of pseudorandom sequences with controllable period, September 20, 2011.
available at http://worldwide.espacenet.com/publicationDetails/originalDocument?FT=D&date=20110920&DB=EPODOC&locale=en_EP&CC=US&NR=8023649B2&KC=B2
- China Patent CN 1698306 B2: M.J.
Mihaljevic and J. Abe
Data processing method,
October 06, 2010.
available at http://worldwide.espacenet.com/publicationDetails/originalDocument?FT=D&date=20101006&DB=EPODOC&locale=en_EP&CC=CN&NR=1698306B&KC=B
http://worldwide.espacenet.com/publicationDetails/biblio?DB=EPODOC&at=7&locale=en_EP&FT=D&CC=US&NR=2005213765A1&KC=A1)
- Japan Patent JP 4432350 B2: M.J.
Mihaljevic and J. Abe
Data Processing Method, Program Thereof,
Data
Processor, and Receiver,
35 pages, March 2010.
available at
http://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20100317&DB=&locale=en_EP&CC=JP&NR=4432350B2&KC=B2&ND=1
- United States Patent US 7502941 B2: L. Michael and M.J.
Mihaljevic
Wireless data communication method and apparatus for software
download system, March 10, 2009.
available at http://worldwide.espacenet.com/publicationDetails/originalDocument?FT=D&date=20090310&DB=EPODOC&locale=en_EP&CC=US&NR=7502941B2&KC=B2
- Japan Patent JP 3918578 B2: R. Morelos Zaragoza
and M.J.
Mihaljevic
Method and apparatus for loss
correction and limited reception in streaming data, and data
communication apparatus, May 23, 2007.
available at
http://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20070523&DB=EPODOC&locale=en_EP&CC=JP&NR=3918578B2&KC=B2
-
Q. Wang, L. Wang, S. Xu, S. Zhang, W. Shao, M.J. Mihaljević ,
"Single-Layer Trainable Neural Network for Secure Inference",
IEEE Internet of Things Journal, 2024, DOI: 10.1109/JIOT.2024.3480195
-
A. Labus, M. Despotović-Zrakić, Z. Bogdanović, M.J. Mihaljević , M.
Suvajdžić, B. Radenković,
"Guest Editorial of Thematic Issue on Blockchain Technologies and
Applications",
FACTA UNIVERSITATIS
Series: Electronics and Energetics Vol. 37, No 1, March, 2024, pp. i-iv.
-
S. Xu, L. Zhang, L. Wang, M.J. Mihaljevic, S. Zhang, W. Shao, Q. Wang,
"Relay network-based cross-chain data interaction protocol with
integrity audit",
Computers and Electrical Engineering, vol. 117 (2024), paper no. 109262,
(17 pages)
https://doi.org/10.1016/j.compeleceng.2024.109262
-
S. Xu, F. Wang, L. Wang,M.J. Mihaljevic, S. Zhang, W. Shao, and Q. Huang,
"A Sharding Scheme Based on Graph Partitioning Algorithm for Public
Blockchain", Computer Modeling in Engineering & Sciences, (CMES), vol.139, no.3,
pp. 3311-3327, March 2024
(DOI: 10.32604/cmes.2023.046164)
-
M.J. Mihaljevic, M. Todorovic, and M. Kneževic,
"An Evaluation of Power Consumption Gain and Security of Flexible Green
Pool Mining in Public Blockchain Systems",
Symmetry, 2023, vol. 15, 924. doi.org/10.3390/sym15040924
-
S. Zhang, C. Hu, L. Wang, M.J. Mihaljevic, S. Xu, and T. Lan,
"A Malware Detection Approach Based on Deep Learning and Memory Forensics",
Symmetry, 2023, vol. 15, 758. doi: 10.3390/sym15030758
-
M.J. Mihaljević, M. Knežević, D. Urošević, L. Wang, and S. Xu,
"An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based
Access Control in IoT",
Symmetry, 2023, vol. 15, 299. doi: 10.3390/sym15020299
-
M.J. Mihaljevic, L. Wang, S. Xu and M. Todorovic,
"An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks",
Symmetry 2022, 14 (8), 1711. (28 pages)
-
M.J. Mihaljevic, L. Wang and S. Xu,,
"An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors",
Entropy 2022, 24(3), 406; (10 pages)
-
M.J. Mihaljevic, A. Radonjic, L. Wang and S. Xu,,
"Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel",
Symmetry 2022, 14 (8), 1709. (21 pages)
-
S. Tomovic, M. Knezevic, and M.J. Mihaljevic, "Analysis and Correction
of the Attack against the LPN-Problem Based Authentication Protocols",
Mathematics, vol. 9, Iss. 5, (27 pages), March 2021, doi:10.3390/math9050573.
https://www.mdpi.com/2227-7390/9/5/573
- M.J. Mihaljevic,
"A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off",
IEEE Access, vol. 8, pp. 141258-141268, Avg 2020
- M. Kneževic, S. Tomovic and M.J. Mihaljevic,
"Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation",
Electronics, vol. 9 (8), 1296 (23 pages) Avg. 2020
- M.J. Mihaljevic, "A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security",
Entropy , vol 21 (7), July 2019 (11 pages);
https://doi.org/10.3390/e21070701 ,
https://www.mdpi.com/1099-4300/21/7/701
- M.J. Mihaljevic and F. Oggier,
"Security Evaluation and Design Elements for a Class of Randomized
Encryptions",
IET Information Security, 12 pages, Vol. 13, no. 1, pp. 36–47, Jan. 2019,
DOI: 10.1049/iet-ifs.2017.0271,
https://digital-library.theiet.org/content/journals/10.1049/iet-ifs.2017.0271
&
https://ieeexplore.ieee.org/document/8611527
- M.J. Mihaljevic, A. Kavcic and K.
Matsuura, "An Encryption Technique for Provably Secure Transmission from
a High Performance Computing Entity to a Tiny One",
Mathematical Problems in Engineering, Volume 2016, Article ID 7920495, 10 pages,
http://dx.doi.org/10.1155/2016/7920495
.
- S. Tomovic, M.J. Mihaljevic, A. Perovic and Z. Ognjanovic,
"A Protocol for Provably Secure Authentication of a Tiny Entity to
a High Performance Computing One",
Mathematical Problems in Engineering, Volume 2016, Article ID 9289050, 9 pages,
http://dx.doi.org/10.1155/2016/9289050
.
- F. Oggier and M.J. Mihaljevic,
"An Information-Theoretic Security Evaluation of a Class of
Randomized Encryption Schemes",
IEEE Transactions on Information Forensics and Security, vol. 9, no.
2, pp. 158-168, Feb. 2014. (DOI:
10.1109/TIFS.2013.2294763).
- M.J. Mihaljevic, S. Gangopadhyay, G. Paul and H. Imai,
"Internal State Recovery of Keystream Generator LILI-128
Based on a Novel Weakness of the Employed Boolean Function",
Information Processing Letters, vol. 112, no. 21, pp. 805-810,
November 2012.
- M.J. Mihaljevic, S. Gangopadhyay, G. Paul and H. Imai,
"State Recovery of Grain-v1 Employing Normality Order of
the Filter Function",
IET Information Security, vol. 6, no. 2, pp. 55-64, June 2012.
- M.J. Mihaljevic, S. Gangopadhyay, G. Paul and H. Imai,
"Generic Cryptographic Weakness of k-normal Boolean
Functions in Certain Stream Ciphers and Cryptanalysis of
Grain-128",
Periodica Mathematica Hungarica, vol. 65, no.
2, pp. 205-227, Dec. 2012.
- M. Mihaljevic and H. Imai, "An approach for
stream ciphers design based on joint computing over random and
secret data",
Computing, vol. 85, no. 1-2, pp. 153-168, June
2009. (DOI: 10.1007/s00607-009-0035-x)
-
M. Mihaljevic, M. Fossorier and H. Imai,
"Security Evaluation of Certain Broadcast Encryption Schemes
Employing a Generalized Time-Memory-Data Trade-Off",
IEEE Communications Letters, vol. 11, no. 12, pp. 988-990, Dec. 2007.
-
M. Fossorier, M. Mihaljevic and H. Imai,
"Modeling Block ecoding Approaches for Fast Correlation Attack",
IEEE Transactions on Information Theory, vol. 53, no. 12, pp.
4728-4737, Dec. 2007.
- M. Mihaljevic, "Generic framework for secure Yuan
2000 quantum encryption protocol employing the wire-tap channel
approach'",
Physical Review A, vol. 75, no. 5, pp. 052334-1-5, May 2007.
- M. Mihaljevic, M. Fossorier and H. Imai,
"Birthday Paradox Based Security Analysis of Certain Broadcast
Encryption Schemes",
IEICE Transactions on Fundamentals of
Electronics Communications and Computer Sciences, vol. E90-A,
no. 6, pp. 1248-1251, June 2007.
- M.P.C. Fossorier, M.J. Mihaljevic, H. Imai, Y. Cui
and K. Matsuura,
"An Algorithm for Solving the LPN Problem and its Application
to Security Evaluation of the HB Protocols for RFID Authentication",
Lecture Notes in Computer Science, vol. 4329, pp. 48-62, Dec. 2006.
- M. Mihaljevic, M. Fossorier and H. Imai,
"Security Weaknesses of Certain Broadcast Encryption Schemes",
Lecture Notes in Computer Science, vol. 3919, pp. 228-245, July 2006.
- M. Mihaljevic, M. Fossorier and H. Imai, " A Novel
Broadcast Encryption Based on Time-Bound Cryptographic
Keys",
Lecture Notes in Computer Science, vol. 3919, pp. 258-276, July 2006.
- J. Wang, M. Mihaljevic, L. Harn, and H. Imai,
"A Hierarchical Key Management Approach for Secure Multicast",
Lecture Notes in Computer Science, vol. 3894,
pp. 422-434, March 2006.
- M. Mihaljevic, M. Fossorier and H. Imai,
"A General Formulation of Algebraic and Fast Correlation
Attacks Based on Dedicated Sample Decimation",
Lecture Notes in Computer Science, vol. 3857, pp. 203-212,
Feb. 2006.
- M. Mihaljevic, M. Fossorier and H. Imai,
"Cryptanalysis of keystream generator by decimated
sample based algebraic and fast correlation attacks",
Lecture Notes in Computer Science, vol. 3797, pp. 155-168, Dec.
2005.
- M. Mihaljevic, M.P.C. Fossorier and H. Imai,
"Key management with minimized secret storage
employing an erasure channel approach",
IEEE Communications Letters, vol. 9, pp.
741-743, Aug. 2005.
- M. Mihaljevic and H. Imai,
"The decimated sample based improved algebraic attacks on
nonlinear filters",
Lecture Notes in Computer Science, vol. 3352, pp. 310-323, Jan
2005.
- M. Mihaljevic, M. Fossorier and H. Imai,
"Secret-public storage trade-off for broadcast encryption
key management",
Lecture Notes in Computer Science, vol. 3269, pp.
375-387, October 2004.
- M. Mihaljevic, "Reconfigurable key management for
broadcast encryption",
IEEE Communications Letters, vol. 8, pp. 440-442, July 2004.
- M. Mihaljevic, "Key management schemes for stateless receivers
based on time varying heterogeneous logical key hierarchy",
Lecture Notes in Computer Science, vol. 2894, pp. 137-154, 2003.
- M. Mihaljevic, "On vulnerabilities and improvements of fast
encription algorithm for multimedia FEA-M",
IEEE Trans. Cons. Electr., vol. 49, no. 4, pp. 1199-1206, Nov. 2003.
- M. Mihaljevic, "Broadcast encryption schemes based on the
sectioned key tree",
Lecture Notes in Computer Science, vol. 2836, pp. 158-169, Oct. 2003.
- P. Camion, M. Mihaljevic and H. Imai,
"Two allerts for design of certain stream ciphers: Trapped LFSR
and weak resilient function over GF(q)",
Lecture Notes in Computer Science, vol. 2595, pp. 196-213, 2003.
- L. Michael, M. Mihaljevic, S. Haruyama and R. Kohno,
"Security issues for Software Defined Radio: Design of
a Secure Download System",
IEICE Trans. Communications,
vol. E85-B, pp. 2588-2600, Dec. 2002.
-
M. Mihaljevic and R. Kohno,
"Cryptanalysis of fast encryption algorithm for multimedia
FEA-M",
IEEE Communications Letters, vol. 6, pp.382-384,
September 2002.
-
L. Michael, M. Mihaljevic, S. Haruyama and R. Kohno,
"A framework for secure download for software defined radio",
IEEE Communications Magazine, vol. 40, no. 7, pp. 88-96, July 2002.
- M. Mihaljevic, M.P.C. Fossorier and H. Imai, "Fast correlation
attack algorithm with the list decoding and an application",
Lecture Notes in Computer Science, vol. 2355, pp. 196-210, 2002.
- M. Mihaljevic and H. Imai, "Cryptanalysis of TOYOCRYPT-HS1
Stream Cipher",
IEICE Trans. Fundamentals, vol. E85-A, pp. 66-73, Jan. 2002.
- M. Mihaljevic, M.P.C. Fossorier and H. Imai, "On decoding
techniques
for cryptanalysis of certain encryption algorithms",
IEICE Transactions on Fundamentals, vol. E84-A, pp. 919-930, Apr. 2001.
- M. Mihaljevic, M.P.C. Fossorier and H. Imai, "A low-complexity and
high-performance algorithm for the fast correlation attack",
Lecture Notes in Computer Science, vol. 1978, pp.196-212, 2001.
- M. Mihaljevic, M.P.C. Fossorier and H. Imai, "An algorithm
for cryptanalysis of certain keystream generators suitable for
high-speed software and hardware implementations",
IEICE Transactions on Fundamentals, vol. E84-A, pp. 311-318, Jan. 2001.
- M. Mihaljevic and J. Golic, "A method for convergence analysis
of iterative probabilistic decoding",
IEEE Transactions on Information Theory, vol. 46, pp. 2206-2211,
Sept. 2000.
- M. Fossorier, M. Mihaljevic and H. Imai, "Reduced complexity
iterative decoding of Low Density Parity Check codes based on
Belief Propagation",
IEEE Transactions on Communications, vol. 47, pp. 673-680, 1999.
- M. Fossorier, M. Mihaljevic and H. Imai, "Critical noise for
convergence of iterative probabilistic decoding with Belief Propagation in
cryptographic applications",
Lecture Notes in Computer Science, vol. 1719, pp. 282-293, 1999.
- M. Mihaljevic and H. Imai, "A family of fast keystream
generators based on programmable linear cellular automata over GF(q)
and time variant table",
IEICE Transactions on Fundamentals, vol. E82-A, pp. 32-39, Jan. 1999.
- M. Mihaljevic, Y. Zheng and H. Imai, "A family of fast dedicated
one-way hash functions based on linear cellular automata over GF(q)",
IEICE Transactions on Fundamentals, vol. E82-A, pp. 40-47, Jan. 1999.
- M. Mihaljevic, Y. Zheng and H. Imai, "A cellular automaton
based fast one-way hash function suitable for hardware implementation",
Lecture Notes in Computer Science,
vol. 1431, pp. 217-233, 1998.
- M. Mihaljevic, "An improved key stream generator based on the
programmable cellular automata",
Lecture Notes in Computer Science,
vol. 1334, pp. 181-191, 1997.
- M. Mihaljevic, "Security examination of a cellular automata based
pseudorandom bit generator using an algebraic replica approach",
Lecture Notes in Computer Science, vol. 1255, pp. 250-262, 1997.
- M. Mihaljevic, "An iterative probabilistic decoding algorithm
for binary linear block codes beyond the half minimum distance",
Lecture Notes in Computer Science, vol. 1255, pp. 237-249, 1997.
- M. Mihaljevic, "A faster cryptanalysis of the self-shrinking
generator",
Lecture Notes in Computer Science, vol. 1172, pp. 182-188, 1996.
- M. Mihaljevic, "A sequence comparison approach for decoding
of general binary block codes after the binary symmetric channel with
synchronization errors",
Zeitschrift fur Angewandte Mathematik und
Mechanik - ZAMM, vol. 76, pp. 479-481, 1996.
- M. Mihaljevic, "A correlation attack on the binary sequence
generators with time-varying output function",
Lecture Notes in Computer Science, vol. 917, pp. 67-79, 1995.
- M. Mihaljevic, "On message protection in crypto systems
modeled as the generalized wire-tap channel II",
Lecture Notes in
Computer Science, vol. 829, pp. 13-24, 1994.
- M. Mihaljevic, "An approach to the initial state
reconstruction of a clock-controlled shift register based on
a novel distance measure",
Lecture Notes in Computer Science,
vol. 718, pp. 349-356, 1993.
- M. Mihaljevic, J. Golic, "Convergence of a Bayesian iterative
error-correction procedure on a noisy shift register sequence",
Lecture Notes in Computer Science, vol. 658,
pp. 124-137, 1993.
(reprinted in Lecture Notes in Computer Science, vol. 1440, 1999)
- M. Mihaljevic, J. Golic, "A comparison of cryptanalytic
principles based on iterative error-correction",
Lecture Notes in Computer Science, vol. 547, pp. 527-531, 1992.
(reprinted in Lecture Notes in Computer Science, vol. 1440, 1999)
- J. Golic, M. Mihaljevic, "A generalized correlation attack
on a class of stream ciphers based on the Levenshtein distance",
Journal of Cryptology, vol. 3, pp. 201-212, 1991.
- J. Golic, M. Mihaljevic, "A noisy clock-controlled shift
register cryptanalysis concept based on sequence comparison approach",
Lecture Notes in Computer Science, vol. 473, pp. 487-491, 1991.
(reprinted in Lecture Notes in Computer Science, vol. 1440, 1999)
- M. Mihaljevic, J. Golic, "A fast iterative algorithm for a
shift register initial state reconstruction given the noisy
output sequence",
Lecture Notes in Computer Science, vol. 453,
pp. 165-175, 1990.
- J. Golic, M. Mihaljevic, "Minimal linear equivalent analysis
of a variable memory binary sequence generator",
IEEE Transactions on Information Theory, vol. 36, pp. 190-192,
Jan. 1990.
-
M.J. Mihaljevic,
"Блокчејн технологија за напредне електроенергетске мреже"
("Blockchain Technology for Advanced Power Grids")
u ЕНЕРГЕТИКА И КЛИМАТСКЕ ПРОМЕНЕ , pp. 97-119,
Српска академија наука и уметности, 2023. ISBN 978-86-7025-974-4
- V. Mikhalev, M.J. Mihaljevic, O. Kara and F. Armknecht, “Selected Design
and
Analysis Techniques of Contemporary Symmetric Encryption”, to appear in
Security
of Ubiquitous Computing Systems, Eds. G. Avoine and J. Hernandez-Castro,
Springer, pp. 49-62, Springer 2021.
- A. Mileva, V. Dimitrova, O. Kara and M.J. Mihaljevic, “Catalog and
Illustrative
Examples on Lightweight Cryptographic Primitives”, to appear in Security of
Ubiquitous Computing Systems, Eds. G. Avoine and J. Hernandez-Castro,
Springer, pp. 21-47, Springer 2021.
- M.J. Mihaljevic and H. Imai, "Security Issues of Cloud Computing and a
Dedicated Encryption Approach", to appear as a book chaper in
High Performance and Cloud Computing in Scientific Research and Education,
IGI Global, US, pp. 388-408, March 2014.
(DOI: 10.4018/978-1-4666-5784-7, ISBN13: 9781466657847, ISBN10: 1466657847,
EISBN13: 9781466657854)
- M.J. Mihaljevic, "On Certain Approaches for
Analysis and Design of Cryptographic Techniques for Symmetric
Encryption and Key Management", in Selected Topics of Image
Processing and Cryptology, Zbornik Radova , vol. 15, pp.
119-186, Mathematical Institute, Serbian Academy of Sciences and
Arts, Belgrade, Dec. 2012.
(ISBN: 978-86-80593-47-0, ISSN:
0351-9406)
http://elib.mi.sanu.ac.rs/files/journals/zr/23/mihaljevic2.pdf
- M.J. Mihaljevic, "A Framework for Stream Ciphers
Based on Pseudorandomness, Randomness and Error-Correcting
Coding", in Enhancing Cryptographic Primitives with Techniques from
Error Correcting Codes, Editors B. Preneel, S. Dodunekov, V. Rijmen and S.
Nikova,
Vol. 23 in the Series Information and Communication Security, pp.
117-139,
IOS Press, Amsterdam, The Netherlands, June 2009. (ISSN: 1874-6268;
ISBN: 978-1-60750-002-5) DOI: 10.3233/978-1-60750-002-5-117
- M. Mihaljevic, "Decimation Based Correlation and
Algebraic Attacks and Design of Boolean Functions", in
Boolean Functions in Cryptology and Information Security, Editors
B. Preneel and O. A. Logachev, Vol. 18 in the
Series - D:
Information and Communication Security,
IOS Press, Amsterdam, The Netherlands, pp. 183-199, July 2008.
(ISSN: 1874-6268; ISBN 978-1-58603-878-6)
- M. Matsui and M. Mihaljevic, "Security Evaluation
Techniques for Symmetric Cryptography", Chapter in
Information Security Handbook, Editors H. Imai and E. Okamoto,
IEICE, Ohmusha Ltd., Tokyo, Japan, pp. 145-160, 2004.(in Japanese)
(ISBN 4-274-07980-5)
-
S. Xu, F. Wang, L. Wang, M.J. Mihaljević, S. Zhang, W. Shao, and Q. Huang,
"Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain
and TEE",
2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications,
Big Data & Cloud Computing, Sustainable Computing & Communications, Social
Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom),
Dec. 21-24 Dec 2023, Proceedings, pp. 447-455.
(DOI 10.1109/ISPA/BDCloud/SocialCom/SustainCom59178.2023.00091)
-
M. Todorović, M. Knežević, D. Ševerdija, S. Jelić, and M.J. Mihaljević,
"Implementation Framework of a Blockchain Based Infrastructure for
Electricity Trading within a Microgrid",
EAI CollaborateCom 2023 - 19th EAI International Conference on
Collaborative Computing: Networking, Applications and Worksharing",
October 4-6, 2023, Corfu Island, Greece, Proceedings,
Springer LNICST vol. 561, pp. 38-53, March 2024
(https://doi.org/10.1007/978-3-031-54521-4_3)
-
M. Savic, N. Vuksa, M.J. Mihaljevic,
"An architecture for verified medical data distribution employing
blockchain technology",
in Mathematics for human flourishing in the time of COVID-19 and post
COVID-19 , pp. 41-52, De Gruyter, 2023. ISBN 978-3-11-073862-9
- A. Kavcic, M.J. Mihaljevic, and K. Matsuura,
"Light-Weight Secrecy System Using Channels with Insertion Errors:
Cryptographic Implications",
IEEE Information Theory Workshop (ITW) 2015, Jeju Island, Korea,
11-15 Oct. 2015, Proceedings, pp. 257-261, 2015.
- M.J. Mihaljevic, "Light-Weight and Provable Secure
Cryptographic Techniques - The Key Components for Cyber Security
and Efficient Smart Grid Deployment",
Global Wireless Summit (GSW)
2013, Atlantic City, US, June 24-27, GSW 2013 Record, River
Publishers, US, pp. 141-142.
(print ISBN: 978-87-92982-51-3; cd ISBN: 978-87-92982-52-0)
- M.J. Mihaljevic, and A. Kavcic, "An
Approach for Reduction of the Security Overhead in Smart Grid
Communication Infrastructure Employing Dedicated Encryption",
The Twelfth International Conference on Networks - ICN 2013 at
IARIA GlobNet-2013, Jan. 27 - Feb. 1, 2013, Seville,
Spain Proceedings of ICN-2013, pp. 46-52 (ISBN:
978-1-61208-245-5)
- M.J. Mihaljevic, "An Approach for Light-Weight Encryption
Employing
Dedicated Coding",
Proceedings of IEEE GLOBECOM 2012, pp. 892-898, Dec 2012. ISBN:
978-1-4673-0919-6
(and IEEE Xplore
http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000308 )
- M.J. Mihaljevic, H. Imai, M. David, K. Kobara and H. Watanabe,
"On Advanced Cryptographic Techniques for Information Security of Smart
Grid AMI",
Proceedings of the Seventh Annual Workshop on Cyber Security and
Information Intelligence Research - CSIIRW 2011,Oak Ridge National
Laboratory, Tennessee, US, October 11-14, ACM International Conferences
Series, March 2012. ISBN: 978-1-4503-0945-5; doi: 10.1145/2179298.2179371
(Article no. 64, 4 pages)
- M.J. Mihaljevic and H. Imai, "An
Information-Theoretic and Computational Complexity Security
Analysis of a Randomized Stream Cipher Model",
4th Western
European Workshop on Research in Cryptology - WEWoRC 2011, July
20-22, 2011, Weimar, Germany, Conference Record, pp. 21-25.
http://2011.weworc.org/
http://www.uni-weimar.de/cms/fileadmin/medien/medsicherheit/WEWoRC2011/files/conference_record3.pdf#page=27
- M.J. Mihaljevic and H. Imai, "OEmployment of Homophonic Coding for Improvement of Certain Encryption
Approaches
Based on the LPN Problem",
2011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark, February 16-17, 2011,
E-Proceedings (17 pages).
http://skew2011.mat.dtu.dk/program.html
http://skew2011.mat.dtu.dk/proceedings/Employment%20of%20Homophonic%20Coding%20for%20Improvement%20of%20Certain%20Encryption%20Approaches%20Based%20on%20the%20LPN%20Problem.pdf
- M.J. Mihaljevic and H. Imai, "A Security Evaluation of Certain Stream Ciphers which Involve Randomness and
Coding",
2010 Int. Symp. on Inform. Theory and its Appl. - ISITA 2010, Taichung,
Taiwan, Oct. 17-20, 2010, Proceedings, pp. 789-794, IEEE, 2010.
DOI: 10.1109/ISITA.2010.5649616
(IEEE Catalog Number: CFP 10767-USB; ISBN: 078-1-4244-6014-4;
Print ISBN: 978-1-4244-6016-8; ISSN: 1943-7439)
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5649616
- M.J. Mihaljevic, H. Watanabe and H. Imai, "A Low Complexity Authentication Protocol Based on Pseudorandomness,
Randomness and Homophonic Coding",
2010 Int. Symp. on Inform. Theory and its Appl. - ISITA 2010, T, Taichung,
Taiwan, Oct. 17-20, 2010, Proceedings, pp. 690-695, IEEE, 2010.
DOI: 10.1109/ISITA.2010.5649666
(IEEE Catalog Number: CFP 10767-USB; ISBN: 078-1-4244-6014-4;
Print ISBN: 978-1-4244-6016-8; ISSN: 1943-7439)
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5649666
- M.J. Mihaljevic, S. Gangopadhyay, G. Paul and H. Imai, "A Generic Weakness of the $k$-normal Boolean Functions Exposed to
Dedicated Algebraic Attack",
2010 Int. Symp. on Inform. Theory and its Appl. - ISITA 2010, Taichung,
Taiwan, Oct. 17-20, 2010, IEEE Proceedings, pp. 911-916.
DOI: 10.1109/ISITA.2010.5649555
(IEEE Catalog Number: CFP 10767-USB; ISBN: 078-1-4244-6014-4;
Print ISBN: 978-1-4244-6016-8; ISSN: 1943-7439)
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5649555
- M. Fossorier, M.J. Mihaljevic and H. Imai, "Time-Memory and Time-Memory-Data Trade-O®s for Noisy Ciphertext",
Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis
2010, Francois-Xavier Standaert (Ed.), pp. 27-36, June 2010.
(Proceedings available at:
http://www.ecrypt.eu.org/symlab/tools2010/tools2010-proceedings.pdf
- M.J. Mihaljevicand F. Oggier, "A Wire-tap Approach to Enhance Security in Communication Systems using the
Encoding-Encryption Paradigm",
2010 IEEE 17th International Conf. on Telecommunications - ICT 2010, Proceedings, pp. 484-489, April 2010., pp. 83-88
DOI: 10.1109/ICTEL.2010.5478824
(E-ISBN: 978-1-4244-5247-7 Print ISBN: 978-1-4244-5246-0)
(Proceedings available at:
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5478824
-
M.J. Mihaljevic and H. Imai, "A Stream Cipher
Design Based on Embedding of Random Bits",
IEEE 2008 Int.
Symp. on Inform. Theory and its Appl. - ISITA2008, Auckland, New
Zealand, Dec. 7-10, 2008, Proceedings, pp. 1497-1502. (ISBN:
978-1-4244-2069-8; Library of Congress: 2008900302; copyright2008
IEEE)
- M.J. Mihaljevic, H. Watanabe and H. Imai, "A
Cellular Automata Based HB#-like Low Complexity Authentication
Technique",
IEEE 2008 Int. Symp. on Inform. Theory and its
Appl. - ISITA2008, Auckland, New Zealand, Dec. 7-10, 2008,
Proceedings, pp. 1355-1360. (ISBN: 978-1-4244-2069-8; Library of
Congress: 2008900302; copyright2008 IEEE)
-
M. Fossorier, M. Mihaljevic and H. Imai,
"Decimation Based Fast Correlation Attack",
2007 IEEE Int. Symp. Inform. Theory - ISIT'2007,
Nice, France, June 24-29, 2007, Proceedings, pp. 456-460. (ISBN
1-4244-1429-6).
- M.P.C. Fossorier, M. Mihaljevic and H. Imai,
"A Unified Analysis for the
Fast Correlation Attack",
2005 IEEE Int. Symp. Inform. Theory - ISIT'2005,
Adelaide, Australia, Sept. 2005, Proceedings, pp. 2012-2015 (ISBN
0-7803-9151-9).
- M. Mihaljevic, M.P.C. Fossorier and H. Imai,
"A Novel Approach to Algebraic and
Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators",
HISC 2005, Hawaii, USA, May 2005, Proceedings, pp. 183-188
(ISBN 4-902087-13-8).
- M. Mihaljevic and H. Imai,
"Novel method for implementation of certain key management schemes
to minimize secret storage",
IEEE CCNC 2005, Las Vegas, USA, January 2005, Proceedings, pp. 54-59.
(ISBN Softbound: 0-7803-8784-8; ISBN
CD-Rom: 0-7803-87845-6.)
- M. Mihaljevic and H. Imai,
"Framework of a novel technique for algebraic and fast correlation attacks
based on dedicated sample decimation",
The State of the Art of Stream Ciphers - SASC2004,
Bruge, Belgium, October 2004, Workshop Record, pp. 190-201.
- M. Mihaljevic, M.P.C. Fossorier and H. Imai,
"One-way mapping of keys and the overheads trade-off in key management
schemes for broadcast encryption",
Int. Symp. Inform. Theory and its Appl. - ISITA2004,
Parma, Italy, October 2004, Proceedings, pp. 486-491.
- M. Mihaljevic and H. Imai,
"A method for data access control in certain storage area networks",
7th Int. Symp. on Wireless Personal Multimedia Comm. - WPMC2004,
Albano Terme, Italy, September 2004, Proceedings, pp. V3:488-491.
-
M. Mihaljevic, M.P.C. Fossorier and H. Imai,
"An Improved Fast Correlation Attack Based on List Decoding",
IEEE Int. Symp. Inform. Theory - ISIT'2003,
Yokohama, Japan, July 2003, Proceedings, p.165.
-
M. Mihaljevic and R. Kohno, "On a framework for employment
of cryptographic components in software defined radio",
IEEE WPMC'02 - The 5th Int. Symp. on Wireless Personal
Multimedia Communications,
Honolulu, Hawaii, USA, October 2002, Proceedings, vol. II, pp. 835-839.
-
L. Michael, M. Mihaljevic, S. Haruyama and R. Kohno,
"A proposal of architectural elements for implementing secure
software download service in software defined radio",
IEEE PIMRC 2002 - The 13th IEEE Int. Symp. on Personal, Indoor
and Mobile Radio Communications,
Lisbon, Portugal, September 2002, Proceedings, vol. I, pp. 442-446.
-
P. Camion, M. Mihaljevic and H. Imai,
"Two allerts for design of certain stream ciphers: Trapped LFSR
and weak resilient function over GF(q)",
Selected Areas in Cryptography - SAC2002, St.John's,
Newfoundland, Canada, August 2002, Conference Record, pp. 203-217.
-
M. Mihaljevic and R. Kohno,
"Security issues of downloading for software reconfigurable radio
systems versus usual Internet downloading",
invited talk, XXVIIth General Assembly of the International Union of
Radio Science, Maastricht, The Netherlands, Aug. 2002,
Proceedings, 4 pages.
-
P. Camion, M. Mihaljevic and H. Imai,
"On employment of LFSRs over GF(q) in certain stream ciphers",
IEEE Int. Symp. Inform. Theory - ISIT'2002,
Lausanne, Switzerland, July 2002, Proceedings, p. 210.
-
M. Mihaljevic and R. Kohno, "On wirelss communications
privacy and security evaluation of encryption techniques",
IEEE Wireless Communications and Networking Conf. - WCNC2002,
Orlando, FL, USA, March 2002, Proceedings, pp. 865-868.
-
M. Mihaljevic and R. Kohno, "Cryptographic evaluation of a
fast encryption for multimedia",
SONY Research Forum - SRF2001, Tokyo, Japan, Dec. 2001,
Proceedings, pp. 59-64, March, 2002.
- M. Mihaljevic and H. Imai, "On employment of different weigth
parity-checks for the fast correlation attack",
IEEE Int. Symp. Inform. Theory - ISIT'2001,
Washington, D.C., USA, June 2001, Proceedings p. 119.
- M. Mihaljevic, M.P.C. Fossorier and H. Imai, "Fast correlation
attack algorithm with the list decoding and an application",
Fast software Encription Workshop - FSE2001, Yokohama, Japan, April,
2001, Pre-proceedings, pp. 208-222.
- M. Mihaljevic, M.P.C. Fossorier and H. Imai, "A time-memory trade-off
for the fast correlation attack",
ISITA2000, Hawaii, USA, Nov. 2000, Proceedings, pp. 55-58.
- P. Camion, M. Mihaljevic and H. Imai, "Vulnerability of certain
keystream generators based on resilient functions",
ISITA2000, Hawaii, USA, Nov. 2000, Proceedings, pp. 70-73.
- H. Imai, M. Mihaljevic, M. Isaka and M.P.C. Fossorier,
"Applications of iterative decoding techniques to cryptography",
2nd Int. Symp. on Turbo Codes & Related Topics,
Brest, France, Sept. 2000, invited paper, Proceedings,
pp. 227-234.
- M. Mihaljevic, M.P.C. Fossorier and H. Imai, "Novel fast correlation
attack via iterative decoding of punctured simplex code",
IEEE ISIT'2000, Sorento, Italy, June 2000, Proceedings p. 214
- M. Mihaljevic, M.P.C. Fossorier and H. Imai, "A low-complexity and
high-performance algorithm for the fast correlation attack",
Pre-proceedings,
Fast Software Encryption Workshop - FSE2000, New York,
USA, April 2000,
- M. Mihaljevic, M.P.C. Fossorier and H. Imai, "A novel fast correlation
attack suitable for simple hardware implementation",
Proc. JW-ISC'2000, pp.1-8, Okinawa, Japan, Jan. 2000;
also published as Technical report of IEICE: ISEC99-74, pp 1-8,
Jan. 2000.
- M. Mihaljevic, Y. Zheng and H. Imai, "A Fast and Secure Stream
Cipher Based on Cellular Automata over GF(q)",
IEEE GLOBECOM '98, Sydney, Australia, Nov. 1998, Proceedings,
pp. 3250-3255.
- M. Mihaljevic and H. Imai, "Construction of Fast MAC Based
Linear Cellular Automata
GF(q)",
ISITA '98 - 1998 IEEE Int. Symp.
on Information Theory and Its Applications, Mexico, Mexico-City,
Oct. 1998, Proceedings, pp. 40-43.
- M. Fossorier, M. Mihaljevic and H. Imai, "Reduced Complexity
Iterative Decoding of Low Density Parity Check Codes Based on
Belief Propagation",
ISITA '98 - 1998 IEEE Int. Symp.
on Information Theory and Its Applications, Mexico, Mexico-City,
Oct. 1998, Proceedings, pp. 654-658.
- M. Mihaljevic, Y. Zheng and H. Imai, "A Fast Cryptographic Hash
Function Based on Cellular Automata over GF(q)",
in Global IT Security,
IFIP, pp. 96-107, 1998
(Proc. 14th IFIP Int. Conf. on Information Security
at 15th World Comput. Congress - IFIP/SEC '98,
Vienna - Budapest, Sept. 1998).
- M. Mihaljevic, "Fast Reconstruction of the Programmable Cellular
Automata Initial State Using Ciphertext Only",
4th International Symposium on Communication Theory and Applications,
UK, Lake district, July 1997, Proceedings, 5 pages.
- M. Mihaljevic, J. Dj. Golic, "A Method for Convergence
Analysis of Error-Correction Decoding",
ISITA '96 - 1996 IEEE International
Symposium on Information Theory and Its Applications, Canada, Victoria, B.C.,
Sept. 1996, Proceedings, pp. 802-805.
- M. Mihaljevic "Effective Key Size Estimation of the
Self-Shrinking Generator",
ISITA '96 - 1996 IEEE International
Symposium on Information Theory and Its Applications, Canada, Victoria, B.C.,
Sept. 1996, Proceedings, pp. 250-253.
- M. Mihaljevic, "Security Examination of Certain Cellular Automata
Based Key Stream Generator",
ISITA '96 - 1996 IEEE International
Symposium on Information Theory and Its Applications, Canada, Victoria, B.C.,
Sept. 1996, Proceedings, pp. 246-249.
- M. Mihaljevic, "Security Examination of a Key Stream Generator
Based on Programmable Cellular Automata with ROM",
4th UK / Australian International
Symposium on DSP for Communication Systems, Australia, Perth,
Sept. 1996, Proceedings, pp.53-60.
- M. Mihaljevic, "Novel Sequence Comparison Approaches for
Binary Information Strings",
PSI'96: Perspectives of System Informatics
- Andrei Ershov Second International Memorial Conference, Russia,
Novosibirsk, Academgorodok, June 1996, Proceedings, pp. 273-277.
- M. Mihaljevic, "Novel Tests for the Security Examination of
Pseudorandom Bit Generators",
International Symposium on
Information Theory and Its Applications 1994 (ISITA '94), Australia, Sydney,
Nov. 1994, Proceedings, pp. 277-282.
-
M. Mihaljevic "On Certain Coding Approaches
for Security Evaluation and Design of Stream Ciphers",
Transaction on
Advanced Research, vol. 8, no. 2, July 2012, pp.
28-34 (ISSN 1820 - 4511; http://www.internetjournals.net/ )
-
M. Mihaljevic, Y. Watanabe and H. Imai, "Security
evaluation of stream ciphers",
Computer Today, vol. 107, pp. 4-10, Jan. 2002. (in Japanese)
-
M. Mihaljevic and Z. Markovic, "On cryptographic approaches for
security of information technologies",
Facta Universitatis,
vol. 2 (10), pp. 1393-1402, Oct. 2000. (ISSN: 1820-6417)
-
M. Mihaljevic, D. Stijovic, B. Maric, S. Popadic
i M. Ivanovic,
"Koncept za uporedjivanje i uporedni pregled
tri tehnike za
zastitu informacionih sistema: Kerberos, SESAME i SSH",
Info-Science,
br. 6, str. 8-13, decembar 1999. (ISSN: 0354-5334)
-
M. Mihaljevic, D. Stijovic, B. Maric, S. Popadic
i M. Ivanovic,
"Elektronska trgovina, elektronski novac i kriptografske
tehnike: Jedan osvrt na savremene trendove",
JISA-INFO, br. 4,
str. 31-34, jul-avgust 1999. (ISSN: 0354-5334)
-
M. Mihaljevic and H. Imai, "A message authentication approach for
for information systems",
Info-Science, vol. 7, no. 1,
pp. 4-7, Jan. 1999. (ISSN: 0354-5334)
-
M. Mihaljevic and Z. Savic, "Zastita
privatnosti informacija",
Info-Science, vol. 3, no. 6, pp.
28-34, 1995.(ISSN: 0354-5334)
-
M.J. Mihaljević,
"Data Security for AI Systems Training Employing Advanced Blockchain
Techniques",
Invited talk at 2023 International Conference on the Cooperation and
Integration of Industry,
Education, Research and Application (Data Science and Technology Session),
Shandong Academy of Sciences, Jinan, China, 08 Dec. 2023.
-
M.J. Mihaljević, "Ilustrativni napretci u tehnikama kriptologije i
blokčejn tehnologije" ("Illustrative Advances in Cryptology and
Blockchain Technology Techniques"),
Naučni simpozijum Nauka i male
zemlje: Sinergija Dijaspore, Matice i Prijatelja Crne Gore,
Zbornik radova, knjiga 162, str. 409-415, Crnogorska Akademija Nauka
i Umetnosti, 2023.
- M.J. Mihaljević,
"Artificial Intelligence for Blockchain Technology and Vice Versa",
Keynote Talk at The Second Serbian International Conference on Applied
Artificial Inteligence (SICAAI),
May 19-20, 2023, Kragujevac, Serbia,
Book of Abstracts, p. 23, ISBN 978-86-81037-77-5
- M.J. Mihaljević,
"Illustrative Examples on Interactions of Artificial Intelligence and Blockchain Technology",
Keynote Talk, 2022 International High-End Technology Seminar on Artificial Inteligence, Jinan, China, 13-15 Sept. 2022
- M. Savić, M. Todorović, M.J. Mihaljević ,
„Softver novog blokčejn konsenzus protokola i modifikovane Ethereum
platforme“
("Software of a Novel Blockchain Consensus Protocol and a Modified Etherum
Platform"),
Tehničko rešenje (referisano u [10])
(Technical Report), Mathematical Institute, The Serbian Academy of
Sciences and Arts,
Belgrade, 2020.
-
M. Knežević, S. Tomović, M.J. Mihaljević ,
„Softver za evaluaciju sigurnosti klase autentikacionih protokola“
("Software for Security Evaluation of a Class of Authentication Protocols"),
Tehničko rešenje (referisano u [9] i [11])
(Technical Report), Mathematical Institute, The Serbian Academy of
Sciences and Arts,
Belgrade, 2020.
- M.J. Mihaljevic, "On Some Advanced Techniques for Lightweight Blockchain Technology and Certain Applications",
Invited Talk at the International Supercomputing Industry Expo 2019,
Jinan, China, Dec. 26-28, 2019.
- M.J. Mihaljevic, K. Matsuura, "On the Consensus Protocols for Public Blockchains",
Invited Talk at a Panel of Interop Tokyo 2019 , 12-14 June 2019, Tokyo,
Japan;
https://www.interop.jp/?lang=en
-
Tomović, Siniša; M.J. Mihaljevic,; Todorović, Milan,
"Softver blokčejn sistema za upravljanje digitalnim pravima",
(Software of a Blockchain Based System for Digital Rights Management")
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2019.
-
Vukša, Nikolina; Savić, Milan; M.J. Mihaljevic,,
"Softver blokčejn sistema za kontrolu porekla poljoprivrednih proizvoda"
("Software of a Blockchain Based System for Origin Control of Farmers'
Products"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2019.
-
Knežević, Milica; Todorović, Milan; M.J. Mihaljevic,,
"Softver blokčejn sistema za kontrolu integriteta podataka u oblaku"
("Software of a Blockchain Based System for Data Integrity Control in
Cloud"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2019.
- M.J. Mihaljevic, "On Certain Challenges of Blockchain Technology
Deployment”,
Invited talk, ETRAN (IcETRAN) 2018, 5th International Conference on
Electrical, Electronic and Computing Engineering , Palic, Serbia,
June 11 - 14, 2018.
https://www.etran.rs/2018/IcETRAN/Recorded_events/
&
https://www.youtube.com/watch?v=F6IzKkokTj4
-
Todorović, Milan; Mihaljević, Miodrag J.; Arsić, Aleksandra,
"Softver za implementaciju konsenzus protokola na bazi dokaza kapaciteta
invertovanja jednosmerne funkcije korišćenjem Ethereum platforme"
("Software of the Blockchain Consensus Protocol Based on Proof of Inversion
Capacity for a Modification of Ethereum Platform"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2018
-
Mihaljević, Miodrag J.; Tomović, Siniša,
"Metod za ostvarivanje konsenzusa na bazi dokaza kapaciteta invertovanja
jednosmerne funkcije u otvorenim blokčejn sistemima"
("A Method for the Consensus Protocol Based on Proof of Inversion
Capacity in Public Blockchain Systems"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2018
-
Urošević, Dragan; Mihaljević, Miodrag J.; Knežević, Milica,
"Metod i softver za blokčejn zasnovanu kontrolu integriteta podataka
u udaljenim skladištima"
("A Method and Software for Blockchain Based Data Integrity Control in
Remote Strorages"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2018
-
Mihaljević, Miodrag J.; Arsić, Aleksandra,
"Metod i softver za jednosmernu funkciju u klasi konsenzus protokola
za blokčejn tehnologiju"
("A Method and Software for the One-Way Function in a Class of Blockchain
Consensus Protocols"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2018
-
Korać, Vanja; Todorović, Milan; Mihaljević, Miodrag J.,
"Metod i realizacija inicijalne zaštite bibliometrijskog sistema
Ministarstva prosvete, nauke i tehnološkog razvoja"
("Method and Implementaion of the Initial Protection for the Bibliometric
System
of the Ministry for Education, Science and Technological Development"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2017.
-
Mihaljević, Miodrag J. ; Knežević, Milica ; Tomović, Siniša
"Metod i softver za napredne tehnike za evaluaciju sigurnosti klase
autentikacionih protokola"
("Method and Software for Advanced Security Evaluation of a Class
of Authentication Protocols")
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2017.
-
Mihaljević, Miodrag J.; Arsić, Aleksandra; Jelisavčić, Vladisav,
"Metod i softver za napredne tehnike za zaštitu tajnosti sa asimetričnom
implementacionom složenošću"
("Method and Software for Advanced Security Evaluation of a Class
of Authentication Protocols")
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2017.
-
Mihaljević, Miodrag J.; Knežević, Milica; Tomović, Siniša,
"Metod i softver za napredne tehnike za autentikaciju u domenu Cloud
i Big Data"
("Method and Software for Advanced Security Evaluation of a Class
of Authentication Protocols"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2016.
- Mihaljević, Miodrag J.; Knežević, Milica; Jelisavčić, Vladisav;
Zdravković, Aleksandra,
"Metod i softer za napredne tehnike za zaštitu tajnosti/privatnosti u
domenu IoT i M2M"
("Method and Software for Advanced Techniques for Security/Privacy
Protection in IoT and M2M Domains"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2016.
- Mihaljević, Miodrag J.; Arsić, Aleksandra ; Tomović, Siniša ;
Perović, Aleksandar; Ognjanović, Zoran
"Metod i softver za napredne tehnike za autentikaciju u domenu IoT i M2M"
("Method and Software for Advanced Techniques for Authentication
in IoT and M2M Domains"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2016.
- Mihaljević, Miodrag J.; Ognjanović, Zoran; Šegan-Radonjić, Marija;
Vujošević, Sandra,
"Metod za prilagođeno upravljanje privatnošću informacija kroz implementaciju
principa iz familije standarda ISO 29100"
("Customized Method for Privacy Management Employing Recommendation from
ISO 29100 Standards"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2016.
- Mihaljević, Miodrag J.; Korać, Vanja; Todorović, Milan;
Marinković, Bojan,
"Kastomizovani metod i softfer za federativno upravljanje identitetima
FIM (Federated Identity Management)"
("Customized Method and Software for Federated Identity Management (FIM)"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2016.
- Korać, Vanja; Jelisavčić, Vladisav; Mihaljević, Miodrag J.;
Todorović, Milan; Davidovac, Zoran,
"Metod i softver za zaštitu sistema sa digitalizovanim dokumentima
o spoljnoj politici Kraljevine Srbije 1903-1914"
("Method and Software for Information Security of the System with
Digtal Documents on Foreign Affairs of Kingdom Serbia, 1903-1914"),
Tehničko rešenje (Technical Report),
Mathematical Institute, The Serbian Academy of Sciences and Arts,
Belgrade, 2016.
- M. Mihaljevic , M. Todorovic, P. Maksimovic, S. Roksandic, M.
Milojevic-Jevric, B. Marinkovic,
"Evaluacija podataka o ostvarivanju napredne informacione bezbednosti u
Cloud Computing (A Comprehensive Overview of Colud Computing Security Issues)",
Studija - Evaluacija, MI-SANU, Beograd, Dec. 2013
- M. Mihaljevic, S. Roksandic, M. Laban, B. Marinkovic,
"Evaluacija podataka o ostvarivanju napredne informacione bezbednosti za
M2M (masina-masina) komunikacije u okviru IoT (Internet of Things)
(A Comprehensive Overview of Machine-to-Machine Secure Communications over
IoT)",
Studija - Evaluacija, MI-SANU, Beograd, Dec. 2013
- H. Imai and M.J. Mihaljevic,
"Cryptography Policy of Japan and CRYPTREC"
Invited talk, BalkanCrypt 2013, Sofia, Bulgaria, 07-08 Nov., 2013.
http://balkancrypt.uist.edu.mk/docs/imai_mihaljevic_policy.pdf
http://balkancrypt.uist.edu.mk/abstracts.html
- M.J. Mihaljevic and H. Imai,
"Towards Lightweight Cryptographic Primitives Employing Coding Theory",
Invited talk, BalkanCrypt 2013, Sofia, Bulgaria, 07-08 Nov., 2013.
http://balkancrypt.uist.edu.mk/docs/mihaljevic_imai_lightweight.pdf
http://balkancrypt.uist.edu.mk/abstracts.html
- M.J. Mihaljevic, (one of the co-authors),
Specification of algorithms for static reconfiguration of Ad-Hoc
network, for security and authentication and multimedia services.
Technical Report, EU FP6 Project No. 026548, ADHOCSYS, Deliverable
D11, 237 pages, Feb. 2007.
- M.J. Mihaljevic, (one of the co-authors),
Software implementation, partial prototype.
Technical report, EU
FP6 Project No. 026548, ADHOCSYS, Deliverable D13, 75 pages, Feb.
2007.
-
M. Mihaljevic, Report on Security Evaluation of
RC4 Stream Cipher.
Peer Reviewed Technical Report, CRYPTREC,
Information-technology Promotion Agency (IPA), Japan, Tokyo,
51 pages, Sept. 2002.
-
M. Mihaljevic, Report on Security Evaluation of
MUGI Stream Cipher.
Peer Reviewed Technical Report, CRYPTREC,
Information-technology Promotion Agency (IPA), Japan, Tokyo,
47 pages, Sept. 2002.
-
M. Mihaljevic, Report on Security Evaluation of
PANAMA Stream Cipher.
Peer Reviewed Technical Report, CRYPTREC,
Information-technology Promotion Agency (IPA), Japan, Tokyo,
36 pages, Dec. 2001.
- M.J. Mihaljevic, Z. Markovic and T.
Davidovic, "Security Evaluation of Certain Advanced
Cryptographic Techniques for GSM network at Division for Mobile
Telephony of Telecom Serbia", ("Tehnicki izvestaj o
evaluaciji kriptografske sigurnosti odredjenih kriptografskih
tehnika od perspektivnog interesa za GSM mrezu Mobilne
telefonije, Telekoma Srbije"),
Technical Report, Mathematical
Institute, Serbian Academy of Sciences and Arts, Belgrade, 73
pages, May 2008.
- M. Mihaljevic,"A standardized framework for
information security of the E-Register" (Prikaz opsteg
standardizovanog okvira za ostvarivanje informaticke
bezbednosti Elektronskog Registra u njegovom integralnom
okruzenju - Projekat razvoja i implementacije savremenog
eletronskog registra u Republickoj direkciji za imovinu),
Technical Report, Mathematical Institute, Serbian Academy of
Sciences and Arts, Belgrade, 55 pages, Dec. 2008.
- M. Mihaljevic,"An overview on security
evaluation of certain cryptographic primitives" (Evaluacija
sigurnosti odredjenih kriptografskih resenja - Projekat
razvoja i implementacije savremenog eletronskog registra u
Republickoj direkciji za imovinu),
Technical Report,
Mathematical Institute, Serbian Academy of Sciences and Arts,
Belgrade, 33 pages, Dec. 2008.
- M. Mihaljevic, "A comparison of certain RSA and
Entrust PKI systems: Elements of the methodology for comparison of
PKI systems" ("Elaborat o uporednoj tehnickoj analizi
odredjenih PKI resenja RSA i Entrust: Metodololoski
elementi za evaluaciju i poredjenje PKI sistema"),
Technical
Report, Centralna Banka Crne Gore, Podgorica, 34 pages, Dec. 2008.
- M.J. Mihaljevic, Z. Markovic and Z.
Ognjanovic, "Security Evaluation of the Cryptographic
Techniques in GSM network for the Data Services at Division for
Mobile Telephony of Telecom Serbia", ("Tehnicki izvestaj
o evaluaciji kriptografske sigurnosti tehnika za zastitu
negovornih servisa Mobilne telefonije, Telekoma Srbije"),
Technical Report, Mathematical Institute, Serbian Academy of
Sciences and Arts, Belgrade, 60 pages, Dec. 2007.
- M.J. Mihaljevic, Z. Markovic, Z.
Perisic and M. Markovic, Frameworks and
Particular Elements for Business Continuity and Disaster Recovery
of IT system in IT Infrastructure Management Department, IT
Division, Telecom Serbia (Metodoloska osnova, genericki
elementi i odredjena pravila za upravljanje kontinuitetom IT
poslovanja i oporavkom sistema u Sektoru za upravljanje IT
platformama, Direkcije za IT, Telekoma Srbija).
Collection of
Technical Reports, Volumes I - VIII, Mathematical Institute,
Serbian Academy of Sciences and Arts, Belgrade, in total more than
300 pages, Nov. 2007.
- M.J. Mihaljevic, Z. Markovic and Z.
Ognjanovic, "Security Evaluation of the Cryptographic
Techniques in GSM network for the Speach Service at Division for
Mobile Telephony of Telecom Serbia", (``Tehnicki izvestaj
o evaluaciji kriptografske sigurnosti tehnika za zastitu
govornog servisa Mobilne telefonije, Telekoma Srbije''),
Technical
Report, Mathematical Institute, Serbian Academy of Sciences and
Arts, Belgrade, 59 pages + Appendix, Sept. 2007.
- M. Mihaljevic, "Certain Elements for Security Evaluation of
Stream Ciphers",
Invited Talk by Cryptology Research Society of India, National Workshop on
Cryptology, India,
Mumbai-Pune, 08-10 September 2006.
- M. Mihaljevic, M.P.C. Fossorier, M. Isaka and H. Imai,
"Evaluation of
certain stream ciphers via message-passing decoding techniques",
2000 Workshop on Information-Based Induction Sciences
(IBIS2000), Izu, Japan, July 17-18, 2000, Proceedings, 6 pages.
-
M.J. Mihaljevic and H. Imai,
"Privacy Preserving Light-Weight Authentication Based on
a Variant of Niederreiter Public-Key Encryption",
Symp. on Crypology and Information Security - SCIS 2014,
Kagoshima, Japan, 21-24 January 2014, Proceedings,
paper no. 2B4-3, 6 pages.
- R. Hosoya, T. Kitagawa, M.Mihaljevic, K. Kobara and H. Imai,
"An Authentication Protocol Based on a Variant of Niederreiter
Public-Key Encryption",
Symp. on Crypology and Information Security - SCIS 2014,
Kagoshima, Japan, 21-24 January 2014, Proceedings,
paper no. 3F3-2, 6 pages.
- K. Yanagishima, T. Kitagawa,M.Mihaljevic and H. Imai,
"On computational complexity required to completely identify the key
from the CPA results",
Symp. on Crypology and Information Security - SCIS 2014,
Kagoshima, Japan, 21-24 January 2014, Proceedings,
paper no. 2A4-4, 6 pages.
- M. Mihaljevic and G. Hanaoka, "A Framework for
Provably Secure and Light-Weight Stream Cipher Like Encryption
Based on the LPN Problem and Dedicated Coding",
The 2013
Symposium on Cryptography and Information Security - SCIS2013,
Kyoto, Japan, January 22-25, 2013, CD-ROM Proceedings, paper
#2B4-3, 7 pages.
- M. Mihaljevic and G. Hanaoka, "A Framework for
Light-Weight Authentication Based on the LPN Problem and Random
Selection",
The 2013 Symposium on Cryptography and
Information Security - SCIS2013, Kyoto, Japan, January 22-25,
2013, CD-ROM Proceedings, paper #2D3-2, 6 pages.
- M. Mihaljevic and H. Imai, "Improved fast correlation attack based
on highly restricted search minimum distance decoding",
The 2001 Symposium on Cryptography and Information Security -
SCIS2001,
Oiso, Japan, January 23-26, 2001, Proceedings, pp. 283-288.
- M. Mihaljevic and H. Imai, "Improved decimation attack based on matrix
characterization of LFSR",
The 2001 Symposium on Cryptography and Information Security -
SCIS2001,
Oiso, Japan, January 23-26, 2001, Proceedings, pp. 289-291.
- M. Mihaljevic and H. Imai, "Effective secret key size of TOYOCRYPT-HS1
stream cipher",
The 2001 Symposium on Cryptography and Information Security -
SCIS2001,
Oiso, Japan, January 23-26, 2001, Proceedings, pp. 665-667.
-
M. Mihaljevic, "Zastita podataka na Internetu",
Internet i savremeno poslovanje, Beograd, str. 281-300, 1998.
-
M. Mihaljevic, J. Golic, "A Parity-Check Weight Distribution
for Maximum-Length Sequences",
Second International Conference on
Finite Fields, SAD, Las Vegas, Aug. 1993,
Abstracts p. 35.
-
J. Golic and M. Mihaljevic, "On a binary sequence generator",
EUROCRYPT '89, Belgium, Houthalen, Apr. 1989, Ext. Abstracts
pp. 59.1-59.6.
|