default search action
Fundamenta Informaticae, Volume 114
Volume 114, Number 1, 2012
- Arnon Avron, Beata Konikowska:
Finite-valued Logics for Information Processing. 1-30 - Sergio A. Celani, Ramon Jansana:
A Note on the Model Theory for Positive Modal Logic. 31-54 - Ehsan Chiniforooshan, Lila Kari, Zhi Xu:
Pseudopower Avoidance. 55-72 - Esther Guerra, Juan de Lara:
An Algebraic Semantics for QVT-Relations Check-only Transformations. 73-101 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles. 103
Volume 114, Number 2, 2012
- Piotr Borowiecki, Elzbieta Sidorowicz:
Dynamic Coloring of Graphs. 105-128 - Grzegorz Herman, Michael Soltys:
Unambiguous Functions in Logarithmic Space. 129-147 - Anna Paszynska, Ewa Grabska, Maciej Paszynski:
A Graph Grammar Model of the hp Adaptive Three Dimensional Finite Element Method. Part I. 149-182 - Anna Paszynska, Ewa Grabska, Maciej Paszynski:
A Graph Grammar Model of the hp Adaptive Three Dimensional Finite Element Method. Part II. 183-201 - Chih-Chia Yao, Kang Lee:
Ellipse Invariant Algorithm for Texture Classification. 203-220
Volume 114, Numbers 3-4, 2012
- Jerzy Jaworski, Mieczyslaw Kula, Damian Niwinski, Jerzy Urbanowicz:
Preface. - Alex Biryukov, Johann Großschädl:
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware. 221-237 - Krzysztof Chmiel, Anna Grocholewska-Czurylo, Janusz Stoklosa:
Evaluation of PP-1 Cipher Resistance against Differential and Linear Cryptanalysis in Comparison to a DES-like Cipher. 239-269 - Sugata Gangopadhyay, Brajesh Kumar Singh:
On Second-order Nonlinearities of Some D0 Type Bent Functions. 271-285 - Maciej Grzeskowiak:
Algorithm for Generating Primes p and q Such that q Divides p4 ± p3 + p2 ± p + 1. 287-299 - László Mérai:
Remarks on Pseudorandom Binary Sequences Over Elliptic Curves. 301-308 - Piotr Mroczkowski, Janusz Szmidt:
The Cube Attack on Stream Cipher Trivium and Quadraticity Tests. 309-318 - Michal Rjasko, Martin Stanek:
Attacking M&M Collective Signature Scheme. 319-323 - Eric L. Roettger, Hugh C. Williams:
Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions. 325-344 - Stanislaw Spiez, Marian Srebrny, Jerzy Urbanowicz:
Remarks on the Classical Threshold Secret Sharing Schemes. 345-357 - Pavol Zajac:
Solving Trivium-based Boolean Equations Using the Method of Syllogisms. 359-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.