


default search action
Miodrag J. Mihaljevic
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j29]Shujiang Xu, Haochen He, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qizheng Wang:
DBC-MulBiLSTM: A DistilBERT-CNN Feature Fusion Framework enhanced by multi-head self-attention and BiLSTM for smart contract vulnerability detection. Comput. Electr. Eng. 123: 110096 (2025) - [j28]Qizheng Wang
, Lianhai Wang
, Shujiang Xu
, Shuhui Zhang
, Wei Shao, Miodrag J. Mihaljevic:
Single-Layer Trainable Neural Network for Secure Inference. IEEE Internet Things J. 12(3): 2968-2978 (2025) - 2024
- [j27]Shujiang Xu
, Lulu Zhang
, Lianhai Wang, Miodrag J. Mihaljevic
, Shuhui Zhang
, Wei Shao, Qizheng Wang:
Relay network-based cross-chain data interaction protocol with integrity audit. Comput. Electr. Eng. 117: 109262 (2024) - 2023
- [j26]Miodrag J. Mihaljevic
, Milica Knezevic
, Dragan Urosevic
, Lianhai Wang
, Shujiang Xu
:
An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT. Symmetry 15(2): 299 (2023) - [j25]Shuhui Zhang
, Changdong Hu, Lianhai Wang, Miodrag J. Mihaljevic
, Shujiang Xu, Tian Lan:
A Malware Detection Approach Based on Deep Learning and Memory Forensics. Symmetry 15(3): 758 (2023) - [j24]Miodrag J. Mihaljevic
, Milan Todorovic
, Milica Knezevic
:
An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems. Symmetry 15(4): 924 (2023) - [c40]Shujiang Xu, Fansheng Wang, Lianhai Wang, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qihao Huang:
Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE. ISPA/BDCloud/SocialCom/SustainCom 2023: 447-455 - [c39]Milan Todorovic
, Milica Knezevic
, Domagoj Severdija
, Slobodan Jelic
, Miodrag J. Mihaljevic
:
Implementation Framework of a Blockchain Based Infrastructure for Electricity Trading Within a Microgrid. CollaborateCom (1) 2023: 38-53 - 2022
- [j23]Miodrag J. Mihaljevic
, Lianhai Wang, Shujiang Xu:
An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors. Entropy 24(3): 406 (2022) - [j22]Miodrag J. Mihaljevic
, Aleksandar Radonjic
, Lianhai Wang, Shujiang Xu
:
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel. Symmetry 14(8): 1709 (2022) - [j21]Miodrag J. Mihaljevic
, Lianhai Wang, Shujiang Xu
, Milan Todorovic:
An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks. Symmetry 14(8): 1711 (2022) - 2021
- [p3]Aleksandra Mileva, Vesna Dimitrova, Orhun Kara
, Miodrag J. Mihaljevic:
Catalog and Illustrative Examples of Lightweight Cryptographic Primitives. Security of Ubiquitous Computing Systems 2021: 21-47 - [p2]Vasily Mikhalev, Miodrag J. Mihaljevic, Orhun Kara
, Frederik Armknecht:
Selected Design and Analysis Techniques for Contemporary Symmetric Encryption. Security of Ubiquitous Computing Systems 2021: 49-62 - 2020
- [j20]Miodrag J. Mihaljevic
:
A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off. IEEE Access 8: 141258-141268 (2020)
2010 – 2019
- 2019
- [j19]Miodrag J. Mihaljevic:
A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security. Entropy 21(7): 701 (2019) - [j18]Miodrag J. Mihaljevic, Frédérique E. Oggier:
Security evaluation and design elements for a class of randomised encryptions. IET Inf. Secur. 13(1): 36-47 (2019) - [i5]Miodrag J. Mihaljevic:
A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off. CoRR abs/1911.07689 (2019) - 2015
- [c38]Aleksandar Kavcic, Miodrag J. Mihaljevic, Kanta Matsuura
:
Light-weight secrecy system using channels with insertion errors: Cryptographic implications. ITW Fall 2015: 257-261 - 2012
- [j17]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of grain-v1 employing normality order of the filter function. IET Inf. Secur. 6(2): 55-64 (2012) - [j16]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function. Inf. Process. Lett. 112(21): 805-810 (2012) - [j15]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128. Period. Math. Hung. 65(2): 205-227 (2012) - [c37]Miodrag J. Mihaljevic:
An approach for light-weight encryption employing dedicated coding. GLOBECOM 2012: 874-880 - 2011
- [c36]Miodrag J. Mihaljevic, Hideki Imai, Michael W. David, Kazukuni Kobara, Hajime Watanabe:
On advanced cryptographic techniques for information security of smart grid AMI. CSIIRW 2011: 64 - 2010
- [c35]Miodrag J. Mihaljevic, Frédérique E. Oggier:
A wire-tap approach to enhance security in communication systems using the encoding-encryption paradigm. ICT 2010: 83-88 - [c34]Miodrag J. Mihaljevic, Hajime Watanabe, Hideki Imai:
A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding. ISITA 2010: 690-695 - [c33]Miodrag J. Mihaljevic, Hideki Imai:
A Security evaluation of certain stream ciphers which involve randomness and coding. ISITA 2010: 789-794 - [c32]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack. ISITA 2010: 911-916 - [i4]Frédérique E. Oggier, Miodrag J. Mihaljevic:
An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm. CoRR abs/1008.0968 (2010) - [i3]Miodrag J. Mihaljevic, Frédérique E. Oggier, Hideki Imai:
Homophonic Coding Design for Communication Systems Employing the Encoding-Encryption Paradigm. CoRR abs/1012.5895 (2010)
2000 – 2009
- 2009
- [j14]Miodrag J. Mihaljevic, Hideki Imai:
An approach for stream ciphers design based on joint computing over random and secret data. Computing 85(1-2): 153-168 (2009) - [p1]Miodrag J. Mihaljevic:
A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Coding. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 2009: 117-139 - 2007
- [j13]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off. IEEE Commun. Lett. 11(12): 988-990 (2007) - [j12]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(6): 1248-1251 (2007) - [j11]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Modeling Block Decoding Approaches for the Fast Correlation Attack. IEEE Trans. Inf. Theory 53(12): 4728-4737 (2007) - [c31]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Decimation-Based Fast Correlation Attack. ISIT 2007: 456-460 - 2006
- [c30]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. AAECC 2006: 203-214 - [c29]Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai:
A Hierarchical Key Management Approach for Secure Multicast. ARCS 2006: 422-434 - [c28]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
:
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. INDOCRYPT 2006: 48-62 - [i2]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura:
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication. IACR Cryptol. ePrint Arch. 2006: 197 (2006) - 2005
- [j10]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Key management with minimized secret storage employing an erasure channel approach. IEEE Commun. Lett. 9(8): 741-743 (2005) - [c27]Miodrag J. Mihaljevic, Hideki Imai:
Novel method for implementation of certain key management schemes to minimize secret storage. CCNC 2005: 54-59 - [c26]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Security Weaknesses of Certain Broadcast Encryption Schemes. DRMTICS 2005: 228-245 - [c25]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. DRMTICS 2005: 258-276 - [c24]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. INDOCRYPT 2005: 155-168 - [c23]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
A unified analysis for the fast correlation attack. ISIT 2005: 2012-2015 - [i1]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes. IACR Cryptol. ePrint Arch. 2005: 99 (2005) - 2004
- [j9]Miodrag J. Mihaljevic:
Reconfigurable key management for broadcast encryption. IEEE Commun. Lett. 8(7): 440-442 (2004) - [c22]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. ICICS 2004: 375-387 - [c21]Miodrag J. Mihaljevic, Hideki Imai:
The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. SCN 2004: 310-323 - 2003
- [j8]Miodrag J. Mihaljevic:
On vulnerabilities and improvements of fast encryption algorithm for multimedia FEA-M. IEEE Trans. Consumer Electron. 49(4): 1199-1207 (2003) - [c20]Miodrag J. Mihaljevic:
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. ASIACRYPT 2003: 137-154 - [c19]Miodrag J. Mihaljevic:
Broadcast Encryption Schemes Based on the Sectioned Key Tree. ICICS 2003: 158-169 - 2002
- [j7]Lachlan B. Michael
, Miodrag J. Mihaljevic, Shinichiro Haruyama, Ryuji Kohno:
A framework for secure download for software-defined radio. IEEE Commun. Mag. 40(7): 88-96 (2002) - [j6]Miodrag J. Mihaljevic, Ryuji Kohno:
Cryptanalysis of fast encryption algorithm for multimedia FEA-M. IEEE Commun. Lett. 6(9): 382-384 (2002) - [j5]Miodrag J. Mihaljevic, Hideki Imai:
Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 66-73 (2002) - [c18]Lachlan B. Michael
, Miodrag J. Mihaljevic, Shinichiro Haruyama, Ryuji Kohno:
A proposal of architectural elements for implementing secure software download service in software defined radio. PIMRC 2002: 442-446 - [c17]Paul Camion, Miodrag J. Mihaljevic, Hideki Imai:
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). Selected Areas in Cryptography 2002: 196-213 - [c16]Miodrag J. Mihaljevic, Ryuji Kohno:
On wireless communications privacy and security evaluation of encryption techniques. WCNC 2002: 865-868 - 2001
- [c15]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Fast Correlation Attack Algorithm with List Decoding and an Application. FSE 2001: 196-210 - 2000
- [j4]Miodrag J. Mihaljevic, Jovan Dj. Golic:
A method for convergence analysis of iterative probabilistic decoding. IEEE Trans. Inf. Theory 46(6): 2206-2211 (2000) - [c14]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. FSE 2000: 196-212
1990 – 1999
- 1999
- [j3]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Reduced complexity iterative decoding of low-density parity check codes based on belief propagation. IEEE Trans. Commun. 47(5): 673-680 (1999) - [c13]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications. AAECC 1999: 282-293 - 1998
- [c12]Miodrag J. Mihaljevic, Yuliang Zheng
, Hideki Imai:
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. Public Key Cryptography 1998: 217-233 - 1997
- [c11]Miodrag J. Mihaljevic:
An Iterative Probabilistic Decoding Algorithm for Binary Linear Block Codes Beyond the Half Minimum Distance. AAECC 1997: 237-249 - [c10]Miodrag J. Mihaljevic:
Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach. AAECC 1997: 250-262 - [c9]Miodrag J. Mihaljevic:
An improved key stream generator based on the programmable cellular automata. ICICS 1997: 181-191 - 1996
- [c8]Miodrag J. Mihaljevic:
A faster cryptanalysis of the self-shrinking generator. ACISP 1996: 182-189 - 1994
- [c7]Miodrag J. Mihaljevic:
A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. ASIACRYPT 1994: 67-79 - 1993
- [c6]Miodrag J. Mihaljevic:
On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II. Error Control, Cryptology, and Speech Compression 1993: 13-24 - 1992
- [c5]Miodrag J. Mihaljevic:
An Approach to the Initial State Reconstruction of a Clock-Controlled Shift Register Based on a Novel Distance Measure. AUSCRYPT 1992: 349-356 - [c4]Miodrag J. Mihaljevic, Jovan Dj. Golic:
Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. EUROCRYPT 1992: 124-137 - 1991
- [j2]Jovan Dj. Golic, Miodrag J. Mihaljevic:
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. J. Cryptol. 3(3): 201-212 (1991) - [c3]Miodrag J. Mihaljevic, Jovan Dj. Golic:
A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction. EUROCRYPT 1991: 527-531 - 1990
- [j1]Jovan Dj. Golic, Miodrag J. Mihaljevic:
Minimal linear equivalent analysis of a variable-memory binary sequence generator. IEEE Trans. Inf. Theory 36(1): 190-192 (1990) - [c2]Miodrag J. Mihaljevic, Jovan Dj. Golic:
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. AUSCRYPT 1990: 165-175 - [c1]Jovan Dj. Golic, Miodrag J. Mihaljevic:
A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach. EUROCRYPT 1990: 487-491
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-20 19:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint