What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jovan Dj. Golic
Google Scholar
47
publications in security and cryptology related venues
Year
Venue
Title
2013
conf/ctrsa
Cryptanalytic Attacks on MIFARE Classic Protocol.
Jovan Dj. Golic
2011
journals/tifs
Key Agreement Over Multiple Access Channel.
Somayeh Salimi
Mahmoud Salmasizadeh
Mohammad Reza Aref
Jovan Dj. Golic
2007
conf/acisp
Soft Generation of Secure Biometric Keys.
Jovan Dj. Golic
Madalina Baltatu
2007
conf/ches
High-Speed True Random Number Generation with Logic Gates Only.
Markus Dichtl
Jovan Dj. Golic
2005
conf/icisc
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.
Josef Pieprzyk
Xian-Mo Zhang
Jovan Dj. Golic
2004
conf/fse
A Weakness of the Linear Part of Stream Cipher MUGI.
Jovan Dj. Golic
2003
journals/joc
Edit Probability Correlation Attacks on Stop/ Go Clocked Keystream Generators.
Jovan Dj. Golic
Renato Menicocci
2003
conf/fse
On the Resynchronization Attack.
Jovan Dj. Golic
Guglielmo Morgari
2003
conf/ches
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits.
Jovan Dj. Golic
2003
conf/sacrypt
On the Success of the Embedding Attack on the Alternating Step Generator.
Jovan Dj. Golic
2002
conf/acisp
The LILI-II Keystream Generator.
Andrew J. Clark
Ed Dawson
Joanne Fuller
Jovan Dj. Golic
Hoon-Jae Lee
William Millan
Sang-Jae Moon
Leonie Simpson
2002
conf/ches
Multiplicative Masking and Power Analysis of AES.
Jovan Dj. Golic
Christophe Tymen
2002
conf/eurocrypt
Linear Cryptanalysis of Bluetooth Stream Cipher.
Jovan Dj. Golic
Vittorio Bagini
Guglielmo Morgari
2001
journals/compsec
How to Construct Cryptographic Primitives from Stream Ciphers.
Jovan Dj. Golic
2001
conf/crypto
Correlation Analysis of the Shrinking Generator.
Jovan Dj. Golic
2000
journals/joc
Fast Correlation Attacks on the Summation Generator.
Jovan Dj. Golic
Mahmoud Salmasizadeh
Ed Dawson
2000
conf/acisp
Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator.
Jovan Dj. Golic
2000
conf/sacrypt
LILI Keystream Generator.
Leonie Ruth Simpson
Ed Dawson
Jovan Dj. Golic
William Millan
2000
conf/sacrypt
Modes of Operation of Stream Ciphers.
Jovan Dj. Golic
1999
conf/acisp
Inversion Attack and Branching.
Jovan Dj. Golic
Andrew J. Clark
Ed Dawson
1998
journals/joc
On Matroid Characterization of Ideal Secret Sharing Schemes.
Jovan Dj. Golic
1998
conf/acisp
Correlation Attacks on Up/Down Cascades.
Jovan Dj. Golic
Renato Menicocci
1998
conf/acisp
A Probabilistic Correlation Attack on the Shrinking Generator.
Leonie Simpson
Jovan Dj. Golic
Ed Dawson
1997
conf/acisp
Fast Correlation Attacks and Multiple Linear Approximations.
M. Salmasidazeh
Leonie Simpson
Jovan Dj. Golic
Ed Dawson
1997
conf/crypto
Edit Distance Correlation Attack on the Alternating Step Generator.
Jovan Dj. Golic
Renato Menicocci
1997
conf/eurocrypt
Linear Statistical Weakness of Alleged RC4 Keystream Generator.
Jovan Dj. Golic
1997
conf/eurocrypt
Cryptanalysis of Alleged A5 Stream Cipher.
Jovan Dj. Golic
1996
journals/joc
Correlation Properties of a General Binary Combiner with Memory.
Jovan Dj. Golic
1996
conf/fse
A Comparison of Fast Correlation Attacks.
Andrew J. Clark
Jovan Dj. Golic
Ed Dawson
1996
conf/fse
On the Security of Nonlinear Filter Generators.
Jovan Dj. Golic
1996
conf/acisp
On period of multiplexed sequences.
Jovan Dj. Golic
1996
conf/acisp
Edit distance correlation attacks on clock-controlled combiners with memory.
Jovan Dj. Golic
1996
conf/eurocrypt
Fast Low Order Approximation of Cryptographic Functions.
Jovan Dj. Golic
1995
conf/eurocrypt
Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers.
Jovan Dj. Golic
1994
conf/fse
Linear Cryptanalysis of Stream Ciphers.
Jovan Dj. Golic
1994
conf/eurocrypt
Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers.
Jovan Dj. Golic
Luke O'Connor
1994
conf/asiacrypt
A Unified Markow Approach to Differential and Linear Cryptanalysis.
Luke O'Connor
Jovan Dj. Golic
1994
conf/asiacrypt
Intrinsic Statistical Weakness of Keystream Generators.
Jovan Dj. Golic
1993
conf/fse
On the Security of Shift Register Based Keystream Generators.
Jovan Dj. Golic
1992
conf/eurocrypt
Correlation via Linear Sequential Circuit Approximation of Combiners with memory.
Jovan Dj. Golic
1992
conf/eurocrypt
Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence.
Miodrag J. Mihaljevic
Jovan Dj. Golic
1992
conf/eurocrypt
A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance.
Jovan Dj. Golic
Slobodan V. Petrovic
1991
journals/joc
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance.
Jovan Dj. Golic
Miodrag J. Mihaljevic
1991
conf/eurocrypt
A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction.
Miodrag J. Mihaljevic
Jovan Dj. Golic
1991
conf/eurocrypt
The Number of Output Sequences of a Binary Sequence Generator.
Jovan Dj. Golic
1990
conf/eurocrypt
A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach.
Jovan Dj. Golic
Miodrag J. Mihaljevic
1990
conf/asiacrypt
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence.
Miodrag J. Mihaljevic
Jovan Dj. Golic
Coauthors
Andrew J. Clark
(3)
Christophe Tymen
(1)
Ed Dawson
(7)
Guglielmo Morgari
(2)
Hoon-Jae Lee
(1)
Joanne Fuller
(1)
Josef Pieprzyk
(1)
Jovan Dj. Golic
(47)
Leonie Ruth Simpson
(1)
Leonie Simpson
(3)
Luke O'Connor
(2)
M. Salmasidazeh
(1)
Madalina Baltatu
(1)
Mahmoud Salmasizadeh
(2)
Markus Dichtl
(1)
Miodrag J. Mihaljevic
(5)
Mohammad Reza Aref
(1)
Renato Menicocci
(3)
Sang-Jae Moon
(1)
Slobodan V. Petrovic
(1)
Somayeh Salimi
(1)
Vittorio Bagini
(1)
William Millan
(2)
Xian-Mo Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to