Miodrag J. Mihaljević
YOU?
Author Swipe
View article: An Integer Erasure Correction Coding and Its Application for Security Enhancement of Encryption
An Integer Erasure Correction Coding and Its Application for Security Enhancement of Encryption Open
This paper presents a new class of erasure-correcting codes (ECCs) aimed at enhancing cryptographic security of certain encryption schemes. The proposed ECCs employ integer arithmetic to encode and decode data bits and can correct all data…
View article: A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain Open
Blockchain technology, with its attributes of decentralization, immutability, and traceability, has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business processes.However, transaction performa…
View article: Contents
Contents Open
Knowledge status
View article: An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems
An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems Open
This paper proposes a variant of the recently reported pool mining approach and provides a reduction in the energy that is consumed by the blockchain consensus protocol. The novelty of the proposed architecture lies in the employment of an…
View article: A Malware Detection Approach Based on Deep Learning and Memory Forensics
A Malware Detection Approach Based on Deep Learning and Memory Forensics Open
As cyber attacks grow more complex and sophisticated, new types of malware become more dangerous and challenging to detect. In particular, fileless malware injects malicious code into the physical memory directly without leaving attack tra…
View article: An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT
An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT Open
This paper considers the problem of data access control when the subscribers are IoT devices with initialization that cannot be updated during the entire life cycle. A generic framework and a particular instance for conditional data access…
View article: Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel Open
An instance of the framework for cryptographic security enhancement of symmetric-key encryption employing a dedicated error correction encoding is addressed. The main components of the proposal are: (i) a dedicated error correction coding …
View article: An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks
An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks Open
This paper proposes an approach for pool mining in public blockchain systems based on the employment of a recently reported consensus protocol with the puzzle based on a symmetric encryption that provides an energy–space trade-off and redu…
View article: An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors
An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors Open
An approach for the cryptographic security enhancement of encryption is proposed and analyzed. The enhancement is based on the employment of a coding scheme and degradation of the ciphertext. From the perspective of the legitimate parties …
View article: Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols
Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols Open
This paper reconsiders a powerful man-in-the-middle attack against Random-HB# and HB# authentication protocols, two prominent representatives of the HB family of protocols, which are built based on the Learning Parity in Noise (LPN) proble…
View article: Catalog and Illustrative Examples of Lightweight Cryptographic Primitives
Catalog and Illustrative Examples of Lightweight Cryptographic Primitives Open
The main objective of this chapter is to offer to practitioners, researchers and all interested parties a brief categorized catalog of existing lightweight symmetric primitives with their main cryptographic features, ultimate hardware perf…
View article: Selected Design and Analysis Techniques for Contemporary Symmetric Encryption
Selected Design and Analysis Techniques for Contemporary Symmetric Encryption Open
In this chapter we provide an overview of selected methods for the design and analysis of symmetric encryption algorithms that have recently been published. We start by discussing the practical advantages, limitations and security of the k…
View article: Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation
Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation Open
We address a class of authentication protocols called “HB” ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). Analysis of the considered attack and its systemati…
View article: A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off
A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off Open
A problem of developing the consensus protocols in public blockchain systems which spend a combination of energy and space resources is addressed. A technique is proposed that provides a flexibility for selection of the energy and space re…
View article: A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data\n Trade-Off
A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data\n Trade-Off Open
A problem of developing the consensus protocols in public blockchain systems\nwhich spend a combination of energy and space resources is addressed. A\ntechnique is proposed that provides a flexibility for selection of the energy\nand space…
View article: A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security
A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security Open
An approach for security enhancement of a class of encryption schemes is pointed out and its security is analyzed. The approach is based on certain results of coding and information theory regarding communication channels with erasures and…
View article: A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One
A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One Open
The problem of developing authentication protocols dedicated to a specific scenario where an entity with limited computational capabilities should prove the identity to a computationally powerful Verifier is addressed. An authentication pr…
View article: An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One
An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One Open
An encryption/decryption approach is proposed dedicated to one-way communication between a transmitter which is a computationally powerful party and a receiver with limited computational capabilities. The proposed encryption technique comb…