default search action
Jovan Dj. Golic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j52]Somayeh Salimi, Mikael Skoglund, Jovan Dj. Golic, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback. IEEE J. Sel. Areas Commun. 31(9): 1765-1778 (2013) - [c47]Jovan Dj. Golic:
Cryptanalytic Attacks on MIFARE Classic Protocol. CT-RSA 2013: 239-258 - [c46]Cettina Barcellona, Pietro Cassarà, Giuseppe Di Bella, Jovan Dj. Golic, Ilenia Tinnirello:
Multi-party metering: An architecture for privacy-preserving profiling schemes. SustainIT 2013: 1-6 - 2012
- [j51]Jovan Dj. Golic:
A new authentication model for ad hoc networks. Int. J. Inf. Sec. 11(5): 333-347 (2012) - 2011
- [j50]Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Reza Aref, Jovan Dj. Golic:
Key Agreement Over Multiple Access Channel. IEEE Trans. Inf. Forensics Secur. 6(3-1): 775-790 (2011)
2000 – 2009
- 2009
- [j49]Jovan Dj. Golic, Guglielmo Morgari:
Optimal correlation attack on the multiplexer generator. Inf. Process. Lett. 109(15): 838-841 (2009) - [j48]Jovan Dj. Golic:
Moving dispersion method for statistical anomaly detection in intrusion detection systems. ISC Int. J. Inf. Secur. 1(2): 71-90 (2009) - 2008
- [j47]Jovan Dj. Golic, Madalina Baltatu:
Entropy Analysis and New Constructions of Biometric Key Generation Systems. IEEE Trans. Inf. Theory 54(5): 2026-2040 (2008) - [i7]Jovan Dj. Golic, Guglielmo Morgari:
Iterative Probabilistic Reconstruction of RC4 Internal States. IACR Cryptol. ePrint Arch. 2008: 348 (2008) - 2007
- [j46]Jovan Dj. Golic:
Techniques for Random Masking in Hardware. IEEE Trans. Circuits Syst. I Regul. Pap. 54-I(2): 291-300 (2007) - [j45]Jovan Dj. Golic:
Exact Probabilistic Analysis of Memoryless Combiners. IEEE Trans. Inf. Theory 53(11): 3958-3972 (2007) - [c45]Jovan Dj. Golic, Madalina Baltatu:
Soft Generation of Secure Biometric Keys. ACISP 2007: 107-121 - [c44]Markus Dichtl, Jovan Dj. Golic:
High-Speed True Random Number Generation with Logic Gates Only. CHES 2007: 45-62 - 2006
- [j44]Jovan Dj. Golic:
New Methods for Digital Generation and Postprocessing of Random Data. IEEE Trans. Computers 55(10): 1217-1229 (2006) - [j43]Jovan Dj. Golic:
Vectorial Boolean functions and induced algebraic equations. IEEE Trans. Inf. Theory 52(2): 528-537 (2006) - [j42]Jovan Dj. Golic, Renato Menicocci:
Statistical distinguishers for irregularly decimated linear recurring sequences. IEEE Trans. Inf. Theory 52(3): 1153-1159 (2006) - 2005
- [j41]Jovan Dj. Golic, Philip Hawkes:
Vectorial Approach to Fast Correlation Attacks. Des. Codes Cryptogr. 35(1): 5-19 (2005) - [j40]Jovan Dj. Golic:
Embedding probabilities for the Alternating Step Generator. IEEE Trans. Inf. Theory 51(7): 2543-2553 (2005) - [c43]Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golic:
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. ICISC 2005: 210-228 - [i6]Jovan Dj. Golic:
Techniques for random maskin in hardware. IACR Cryptol. ePrint Arch. 2005: 26 (2005) - 2004
- [j39]Jovan Dj. Golic, Renato Menicocci:
Correlation Analysis of the Alternating Step Generator. Des. Codes Cryptogr. 31(1): 51-74 (2004) - [c42]Jovan Dj. Golic:
A Weakness of the Linear Part of Stream Cipher MUGI. FSE 2004: 178-192 - [i5]Jovan Dj. Golic:
Vectorial Boolean functions and induced algebraic equations. IACR Cryptol. ePrint Arch. 2004: 225 (2004) - [i4]Jovan Dj. Golic, Guglielmo Morgari:
Vectorial fast correlation attacks. IACR Cryptol. ePrint Arch. 2004: 247 (2004) - [i3]Jovan Dj. Golic:
New paradigms for digital generation and post-processing of random data. IACR Cryptol. ePrint Arch. 2004: 254 (2004) - 2003
- [j38]Jovan Dj. Golic, Renato Menicocci:
Edit Probability Correlation Attacks on Stop/ Go Clocked Keystream Generators. J. Cryptol. 16(1): 41-68 (2003) - [c41]Jovan Dj. Golic:
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. CHES 2003: 98-112 - [c40]Jovan Dj. Golic, Guglielmo Morgari:
On the Resynchronization Attack. FSE 2003: 100-110 - [c39]Jovan Dj. Golic:
On the Success of the Embedding Attack on the Alternating Step Generator. Selected Areas in Cryptography 2003: 262-274 - [i2]Jovan Dj. Golic, Renato Menicocci:
A new statistical distinguisher for the shrinking generator. IACR Cryptol. ePrint Arch. 2003: 41 (2003) - 2002
- [j37]Helen Gustafson, Leonie Ruth Simpson, Jovan Dj. Golic:
Analysis of a measure of correlation between two binary strings of different lengths. Australas. J Comb. 25: 185-200 (2002) - [j36]Jovan Dj. Golic, Renato Menicocci:
Computation of Edit Probabilities and Edit Distances for the A5-Type Keystream Generator. J. Complex. 18(1): 356-374 (2002) - [c38]Andrew J. Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon-Jae Lee, William Millan, Sang-Jae Moon, Leonie Simpson:
The LILI-II Keystream Generator. ACISP 2002: 25-39 - [c37]Jovan Dj. Golic, Christophe Tymen:
Multiplicative Masking and Power Analysis of AES. CHES 2002: 198-212 - [c36]Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari:
Linear Cryptanalysis of Bluetooth Stream Cipher. EUROCRYPT 2002: 238-255 - [i1]Jovan Dj. Golic:
Multiplicative Masking and Power Analysis of AES. IACR Cryptol. ePrint Arch. 2002: 91 (2002) - 2001
- [j35]Jovan Dj. Golic:
How to Construct Cryptographic Primitives from Stream Ciphers. Comput. Secur. 20(1): 79-89 (2001) - [j34]Jovan Dj. Golic:
A probabilistic cryptanalytic method for a time-variant permutation generator. Inf. Process. Lett. 80(2): 67-73 (2001) - [j33]Jovan Dj. Golic:
Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory. IEEE Trans. Inf. Theory 47(3): 1032-1041 (2001) - [j32]Jovan Dj. Golic:
Iterative optimum symbol-by-symbol decoding and fast correlation attacks. IEEE Trans. Inf. Theory 47(7): 3040-3049 (2001) - [c35]Jovan Dj. Golic:
Correlation Analysis of the Shrinking Generator. CRYPTO 2001: 440-457 - 2000
- [j31]Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson:
Fast Correlation Attacks on the Summation Generator. J. Cryptol. 13(2): 245-262 (2000) - [j30]Jovan Dj. Golic, Andrew J. Clark, Ed Dawson:
Generalized Inversion Attack on Nonlinear Filter Generators. IEEE Trans. Computers 49(10): 1100-1109 (2000) - [j29]Jovan Dj. Golic:
Cryptanalysis of three mutually clock-controlled stop/go shift registers. IEEE Trans. Inf. Theory 46(3): 1081-1090 (2000) - [j28]Miodrag J. Mihaljevic, Jovan Dj. Golic:
A method for convergence analysis of iterative probabilistic decoding. IEEE Trans. Inf. Theory 46(6): 2206-2211 (2000) - [c34]Jovan Dj. Golic:
Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. ACISP 2000: 220-233 - [c33]Jovan Dj. Golic:
Modes of Operation of Stream Ciphers. Selected Areas in Cryptography 2000: 233-247 - [c32]Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan:
LILI Keystream Generator. Selected Areas in Cryptography 2000: 248-261
1990 – 1999
- 1999
- [j27]Jovan Dj. Golic, Andrew J. Clark, Ed Dawson:
Inversion Attack and Branching. Aust. Comput. J. 31(2): 44-53 (1999) - [j26]Jovan Dj. Golic:
Stream Cipher Encryption of Random Access Files. Inf. Process. Lett. 69(3): 145-148 (1999) - [j25]Leonie Simpson, Jovan Dj. Golic, Mahmoud Salmasizadeh, Ed Dawson:
A Fast Correlation Attack on Multiplexer Generators. Inf. Process. Lett. 70(2): 89-93 (1999) - [j24]Helen Gustafson, Ed Dawson, Jovan Dj. Golic, Anthony N. Pettitt:
Methods for testing subblock patterns. Stat. Comput. 9(4): 279-286 (1999) - [j23]Jovan Dj. Golic:
Comment on 'Relations Between Entropy and Error Probability'. IEEE Trans. Inf. Theory 45(1): 372 (1999) - [j22]Renato Menicocci, Jovan Dj. Golic:
Correlation Attacks on Up/Down and Stop/Go Cascades. IEEE Trans. Inf. Theory 45(2): 486-498 (1999) - [j21]Jovan Dj. Golic:
Linear models for a time-variant permutation generator. IEEE Trans. Inf. Theory 45(7): 2374-2382 (1999) - [c31]Jovan Dj. Golic, Andrew J. Clark, Ed Dawson:
Inversion Attack and Branching. ACISP 1999: 88-102 - [c30]Renato Menicocci, Jovan Dj. Golic:
Edit Probability Correlation Attack on the Bilateral Stop/Go Generator. IMACC 1999: 201-212 - 1998
- [j20]Jovan Dj. Golic:
Random correlation matrices. Australas. J Comb. 17: 147-156 (1998) - [j19]Jovan Dj. Golic:
On Matroid Characterization of Ideal Secret Sharing Schemes. J. Cryptol. 11(2): 75-86 (1998) - [j18]Jovan Dj. Golic:
Periods of Interleaved and Nonuniformly Decimated Sequences. IEEE Trans. Inf. Theory 44(3): 1257-1260 (1998) - [c29]Jovan Dj. Golic, Renato Menicocci:
Correlation Attacks on Up/Down Cascades. ACISP 1998: 123-134 - [c28]Leonie Simpson, Jovan Dj. Golic, Ed Dawson:
A Probabilistic Correlation Attack on the Shrinking Generator. ACISP 1998: 147-158 - [c27]Jovan Dj. Golic, Renato Menicocci:
Edit Probability Correlation Attack on the Alternating Step Generator. SETA 1998: 213-227 - 1997
- [j17]Jovan Dj. Golic, Mahmoud Salmasizadeh, Leonie Simpson, Ed Dawson:
Fast Correlation Attacks on Nonlinear Filter Generators. Inf. Process. Lett. 64(1): 37-42 (1997) - [j16]Helen Gustafson, Ed Dawson, Jovan Dj. Golic:
Automated statistical methods for measuring the strength of block ciphers. Stat. Comput. 7(2): 125-135 (1997) - [c26]M. Salmasidazeh, Leonie Simpson, Jovan Dj. Golic, Ed Dawson:
Fast Correlation Attacks and Multiple Linear Approximations. ACISP 1997: 228-239 - [c25]Jovan Dj. Golic, Renato Menicocci:
Edit Distance Correlation Attack on the Alternating Step Generator. CRYPTO 1997: 499-512 - [c24]Jovan Dj. Golic:
Linear Statistical Weakness of Alleged RC4 Keystream Generator. EUROCRYPT 1997: 226-238 - [c23]Jovan Dj. Golic:
Cryptanalysis of Alleged A5 Stream Cipher. EUROCRYPT 1997: 239-255 - 1996
- [j15]Jovan Dj. Golic:
Correlation Properties of a General Binary Combiner with Memory. J. Cryptol. 9(2): 111-126 (1996) - [j14]Jovan Dj. Golic:
Constrained Embedding Probability for Two Binary Strings. SIAM J. Discret. Math. 9(3): 360-364 (1996) - [j13]Jovan Dj. Golic:
Linear Models for Keystream Generators. IEEE Trans. Computers 45(1): 41-49 (1996) - [j12]Jovan Dj. Golic, Slobodan V. Petrovic:
Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators. IEEE Trans. Computers 45(4): 482-486 (1996) - [c22]Jovan Dj. Golic:
On period of multiplexed sequences. ACISP 1996: 158-168 - [c21]Jovan Dj. Golic:
Edit distance correlation attacks on clock-controlled combiners with memory. ACISP 1996: 169-181 - [c20]Jovan Dj. Golic:
Fast Low Order Approximation of Cryptographic Functions. EUROCRYPT 1996: 268-282 - [c19]Andrew J. Clark, Jovan Dj. Golic, Ed Dawson:
A Comparison of Fast Correlation Attacks. FSE 1996: 145-157 - [c18]Jovan Dj. Golic:
On the Security of Nonlinear Filter Generators. FSE 1996: 173-188 - 1995
- [j11]Jovan Dj. Golic, Slobodan V. Petrovic:
Constrained Many-to-One String Editing with Memory. Inf. Sci. 86(1-3): 61-76 (1995) - [c17]Jovan Dj. Golic:
A Note on Nonuniform Decimation of Periodic Sequences. Cryptography: Policy and Algorithms 1995: 125-131 - [c16]Helen Gustafson, Ed Dawson, Jovan Dj. Golic:
Randomness Measures Related to Subset Occurrence. Cryptography: Policy and Algorithms 1995: 132-143 - [c15]Jovan Dj. Golic, Luke O'Connor:
A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps. Cryptography: Policy and Algorithms 1995: 174-185 - [c14]Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew J. Clark, Abdollah Khodkar, Ed Dawson:
Discrete Optimisation and Fast Correlation Attacks. Cryptography: Policy and Algorithms 1995: 186-200 - [c13]Jovan Dj. Golic:
Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers. EUROCRYPT 1995: 248-262 - [e1]Ed Dawson, Jovan Dj. Golic:
Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings. Lecture Notes in Computer Science 1029, Springer 1995, ISBN 3-540-60759-5 [contents] - 1994
- [c12]Jovan Dj. Golic:
Intrinsic Statistical Weakness of Keystream Generators. ASIACRYPT 1994: 91-103 - [c11]Luke O'Connor, Jovan Dj. Golic:
A Unified Markow Approach to Differential and Linear Cryptanalysis. ASIACRYPT 1994: 387-397 - [c10]Jovan Dj. Golic, Luke O'Connor:
Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. EUROCRYPT 1994: 230-243 - [c9]Jovan Dj. Golic:
Linear Cryptanalysis of Stream Ciphers. FSE 1994: 154-169 - 1993
- [j10]Slobodan V. Petrovic, Jovan Dj. Golic:
String editing under a combination of constraints. Inf. Sci. 74(1-2): 151-163 (1993) - [c8]Jovan Dj. Golic:
On the Security of Shift Register Based Keystream Generators. FSE 1993: 90-100 - 1992
- [c7]Jovan Dj. Golic:
Correlation via Linear Sequential Circuit Approximation of Combiners with memory. EUROCRYPT 1992: 113-123 - [c6]Miodrag J. Mihaljevic, Jovan Dj. Golic:
Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. EUROCRYPT 1992: 124-137 - [c5]Jovan Dj. Golic, Slobodan V. Petrovic:
A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. EUROCRYPT 1992: 472-476 - 1991
- [j9]Jovan Dj. Golic, Miodrag J. Mihaljevic:
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. J. Cryptol. 3(3): 201-212 (1991) - [c4]Jovan Dj. Golic:
The Number of Output Sequences of a Binary Sequence Generator. EUROCRYPT 1991: 160-167 - [c3]Miodrag J. Mihaljevic, Jovan Dj. Golic:
A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction. EUROCRYPT 1991: 527-531 - 1990
- [j8]Jovan Dj. Golic, Miodrag J. Mihaljevic:
Minimal linear equivalent analysis of a variable-memory binary sequence generator. IEEE Trans. Inf. Theory 36(1): 190-192 (1990) - [j7]Jovan Dj. Golic, Milorad M. Obradovic:
Correction to 'A lower bound on the redundancy of D-ary Huffman codes' (Nov 87 910-911). IEEE Trans. Inf. Theory 36(2): 443 (1990) - [c2]Miodrag J. Mihaljevic, Jovan Dj. Golic:
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. AUSCRYPT 1990: 165-175 - [c1]Jovan Dj. Golic, Miodrag J. Mihaljevic:
A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach. EUROCRYPT 1990: 487-491
1980 – 1989
- 1989
- [j6]Jovan Dj. Golic:
On the linear complexity of functions of periodic GF(q) sequences. IEEE Trans. Inf. Theory 35(1): 69-75 (1989) - 1988
- [j5]Jovan Dj. Golic, Miodrag V. Zivkovic:
On the linear complexity of nonuniformly decimated PN-sequences. IEEE Trans. Inf. Theory 34(5): 1077-1079 (1988) - 1987
- [j4]Jovan Dj. Golic:
On the relationship between the efficiency measures of multicategory information systems. IEEE Trans. Inf. Theory 33(4): 531-538 (1987) - [j3]Jovan Dj. Golic:
On the relationship between the information measures and the Bayes probability of error. IEEE Trans. Inf. Theory 33(5): 681-693 (1987) - [j2]Jovan Dj. Golic:
On the relationship between the separability measures and the Bayes probability of error. IEEE Trans. Inf. Theory 33(5): 694-701 (1987) - [j1]Jovan Dj. Golic, Milorad M. Obradovic:
A lower bound on the redundancy of D-ary Huffman codes. IEEE Trans. Inf. Theory 33(6): 910-911 (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint