Search dblp for Publications

export results for "toc:db/journals/fuin/fuin114.bht:"

 download as .bib file

@article{DBLP:journals/fuin/AvronK12,
  author       = {Arnon Avron and
                  Beata Konikowska},
  title        = {Finite-valued Logics for Information Processing},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {1},
  pages        = {1--30},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2011-615},
  doi          = {10.3233/FI-2011-615},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/AvronK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/BiryukovG12,
  author       = {Alex Biryukov and
                  Johann Gro{\ss}sch{\"{a}}dl},
  title        = {Cryptanalysis of the Full {AES} Using GPU-Like Special-Purpose Hardware},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {3-4},
  pages        = {221--237},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-626},
  doi          = {10.3233/FI-2012-626},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fuin/BiryukovG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/BorowieckiS12,
  author       = {Piotr Borowiecki and
                  Elzbieta Sidorowicz},
  title        = {Dynamic Coloring of Graphs},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {2},
  pages        = {105--128},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-620},
  doi          = {10.3233/FI-2012-620},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fuin/BorowieckiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/CelaniJ12,
  author       = {Sergio A. Celani and
                  Ramon Jansana},
  title        = {A Note on the Model Theory for Positive Modal Logic},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {1},
  pages        = {31--54},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2011-616},
  doi          = {10.3233/FI-2011-616},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fuin/CelaniJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/ChiniforooshanKX12,
  author       = {Ehsan Chiniforooshan and
                  Lila Kari and
                  Zhi Xu},
  title        = {Pseudopower Avoidance},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {1},
  pages        = {55--72},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2011-617},
  doi          = {10.3233/FI-2011-617},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/ChiniforooshanKX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/ChmielGS12,
  author       = {Krzysztof Chmiel and
                  Anna Grocholewska{-}Czurylo and
                  Janusz Stoklosa},
  title        = {Evaluation of {PP-1} Cipher Resistance against Differential and Linear
                  Cryptanalysis in Comparison to a DES-like Cipher},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {3-4},
  pages        = {239--269},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-627},
  doi          = {10.3233/FI-2012-627},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/ChmielGS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/GangopadhyayS12,
  author       = {Sugata Gangopadhyay and
                  Brajesh Kumar Singh},
  title        = {On Second-order Nonlinearities of Some {D0} Type Bent Functions},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {3-4},
  pages        = {271--285},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-628},
  doi          = {10.3233/FI-2012-628},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/GangopadhyayS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Grzeskowiak12,
  author       = {Maciej Grzeskowiak},
  title        = {Algorithm for Generating Primes p and q Such that q Divides p4 {\(\pm\)}
                  p3 + p2 {\(\pm\)} p + 1},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {3-4},
  pages        = {287--299},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-629},
  doi          = {10.3233/FI-2012-629},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Grzeskowiak12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/GuerraL12,
  author       = {Esther Guerra and
                  Juan de Lara},
  title        = {An Algebraic Semantics for QVT-Relations Check-only Transformations},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {1},
  pages        = {73--101},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2011-618},
  doi          = {10.3233/FI-2011-618},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/GuerraL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/HermanS12,
  author       = {Grzegorz Herman and
                  Michael Soltys},
  title        = {Unambiguous Functions in Logarithmic Space},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {2},
  pages        = {129--147},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-621},
  doi          = {10.3233/FI-2012-621},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fuin/HermanS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/JaworskiKNU12,
  author       = {Jerzy Jaworski and
                  Mieczyslaw Kula and
                  Damian Niwinski and
                  Jerzy Urbanowicz},
  title        = {Preface},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {3-4},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-625},
  doi          = {10.3233/FI-2012-625},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/JaworskiKNU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Merai12,
  author       = {L{\'{a}}szl{\'{o}} M{\'{e}}rai},
  title        = {Remarks on Pseudorandom Binary Sequences Over Elliptic Curves},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {3-4},
  pages        = {301--308},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-630},
  doi          = {10.3233/FI-2012-630},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Merai12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/MroczkowskiS12,
  author       = {Piotr Mroczkowski and
                  Janusz Szmidt},
  title        = {The Cube Attack on Stream Cipher Trivium and Quadraticity Tests},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {3-4},
  pages        = {309--318},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-631},
  doi          = {10.3233/FI-2012-631},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/MroczkowskiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/PaszynskaGP12,
  author       = {Anna Paszynska and
                  Ewa Grabska and
                  Maciej Paszynski},
  title        = {A Graph Grammar Model of the hp Adaptive Three Dimensional Finite
                  Element Method. Part {I}},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {2},
  pages        = {149--182},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-622},
  doi          = {10.3233/FI-2012-622},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/PaszynskaGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/PaszynskaGP12a,
  author       = {Anna Paszynska and
                  Ewa Grabska and
                  Maciej Paszynski},
  title        = {A Graph Grammar Model of the hp Adaptive Three Dimensional Finite
                  Element Method. Part {II}},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {2},
  pages        = {183--201},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-623},
  doi          = {10.3233/FI-2012-623},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/PaszynskaGP12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/RjaskoS12,
  author       = {Michal Rjasko and
                  Martin Stanek},
  title        = {Attacking M{\&}M Collective Signature Scheme},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {3-4},
  pages        = {319--323},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-632},
  doi          = {10.3233/FI-2012-632},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/RjaskoS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/RoettgerW12,
  author       = {Eric L. Roettger and
                  Hugh C. Williams},
  title        = {Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {3-4},
  pages        = {325--344},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-633},
  doi          = {10.3233/FI-2012-633},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/RoettgerW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/SpiezSU12,
  author       = {Stanislaw Spiez and
                  Marian Srebrny and
                  Jerzy Urbanowicz},
  title        = {Remarks on the Classical Threshold Secret Sharing Schemes},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {3-4},
  pages        = {345--357},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-634},
  doi          = {10.3233/FI-2012-634},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/SpiezSU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/YaoL12,
  author       = {Chih{-}Chia Yao and
                  Kang Lee},
  title        = {Ellipse Invariant Algorithm for Texture Classification},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {2},
  pages        = {203--220},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-624},
  doi          = {10.3233/FI-2012-624},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/YaoL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/YuKCHF12,
  author       = {Jia Yu and
                  Fanyu Kong and
                  Xiangguo Cheng and
                  Rong Hao and
                  Jianxi Fan},
  title        = {Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption
                  without Random Oracles},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {1},
  pages        = {103},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2011-619},
  doi          = {10.3233/FI-2011-619},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/YuKCHF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Zajac12,
  author       = {Pavol Zajac},
  title        = {Solving Trivium-based Boolean Equations Using the Method of Syllogisms},
  journal      = {Fundam. Informaticae},
  volume       = {114},
  number       = {3-4},
  pages        = {359--373},
  year         = {2012},
  url          = {https://doi.org/10.3233/FI-2012-635},
  doi          = {10.3233/FI-2012-635},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Zajac12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics