Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/fuin/fuin114.bht:"
@article{DBLP:journals/fuin/AvronK12, author = {Arnon Avron and Beata Konikowska}, title = {Finite-valued Logics for Information Processing}, journal = {Fundam. Informaticae}, volume = {114}, number = {1}, pages = {1--30}, year = {2012}, url = {https://doi.org/10.3233/FI-2011-615}, doi = {10.3233/FI-2011-615}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/AvronK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/BiryukovG12, author = {Alex Biryukov and Johann Gro{\ss}sch{\"{a}}dl}, title = {Cryptanalysis of the Full {AES} Using GPU-Like Special-Purpose Hardware}, journal = {Fundam. Informaticae}, volume = {114}, number = {3-4}, pages = {221--237}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-626}, doi = {10.3233/FI-2012-626}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fuin/BiryukovG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/BorowieckiS12, author = {Piotr Borowiecki and Elzbieta Sidorowicz}, title = {Dynamic Coloring of Graphs}, journal = {Fundam. Informaticae}, volume = {114}, number = {2}, pages = {105--128}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-620}, doi = {10.3233/FI-2012-620}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fuin/BorowieckiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/CelaniJ12, author = {Sergio A. Celani and Ramon Jansana}, title = {A Note on the Model Theory for Positive Modal Logic}, journal = {Fundam. Informaticae}, volume = {114}, number = {1}, pages = {31--54}, year = {2012}, url = {https://doi.org/10.3233/FI-2011-616}, doi = {10.3233/FI-2011-616}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fuin/CelaniJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/ChiniforooshanKX12, author = {Ehsan Chiniforooshan and Lila Kari and Zhi Xu}, title = {Pseudopower Avoidance}, journal = {Fundam. Informaticae}, volume = {114}, number = {1}, pages = {55--72}, year = {2012}, url = {https://doi.org/10.3233/FI-2011-617}, doi = {10.3233/FI-2011-617}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/ChiniforooshanKX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/ChmielGS12, author = {Krzysztof Chmiel and Anna Grocholewska{-}Czurylo and Janusz Stoklosa}, title = {Evaluation of {PP-1} Cipher Resistance against Differential and Linear Cryptanalysis in Comparison to a DES-like Cipher}, journal = {Fundam. Informaticae}, volume = {114}, number = {3-4}, pages = {239--269}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-627}, doi = {10.3233/FI-2012-627}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/ChmielGS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/GangopadhyayS12, author = {Sugata Gangopadhyay and Brajesh Kumar Singh}, title = {On Second-order Nonlinearities of Some {D0} Type Bent Functions}, journal = {Fundam. Informaticae}, volume = {114}, number = {3-4}, pages = {271--285}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-628}, doi = {10.3233/FI-2012-628}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/GangopadhyayS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Grzeskowiak12, author = {Maciej Grzeskowiak}, title = {Algorithm for Generating Primes p and q Such that q Divides p4 {\(\pm\)} p3 + p2 {\(\pm\)} p + 1}, journal = {Fundam. Informaticae}, volume = {114}, number = {3-4}, pages = {287--299}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-629}, doi = {10.3233/FI-2012-629}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Grzeskowiak12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/GuerraL12, author = {Esther Guerra and Juan de Lara}, title = {An Algebraic Semantics for QVT-Relations Check-only Transformations}, journal = {Fundam. Informaticae}, volume = {114}, number = {1}, pages = {73--101}, year = {2012}, url = {https://doi.org/10.3233/FI-2011-618}, doi = {10.3233/FI-2011-618}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/GuerraL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/HermanS12, author = {Grzegorz Herman and Michael Soltys}, title = {Unambiguous Functions in Logarithmic Space}, journal = {Fundam. Informaticae}, volume = {114}, number = {2}, pages = {129--147}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-621}, doi = {10.3233/FI-2012-621}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fuin/HermanS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/JaworskiKNU12, author = {Jerzy Jaworski and Mieczyslaw Kula and Damian Niwinski and Jerzy Urbanowicz}, title = {Preface}, journal = {Fundam. Informaticae}, volume = {114}, number = {3-4}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-625}, doi = {10.3233/FI-2012-625}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/JaworskiKNU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Merai12, author = {L{\'{a}}szl{\'{o}} M{\'{e}}rai}, title = {Remarks on Pseudorandom Binary Sequences Over Elliptic Curves}, journal = {Fundam. Informaticae}, volume = {114}, number = {3-4}, pages = {301--308}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-630}, doi = {10.3233/FI-2012-630}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Merai12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/MroczkowskiS12, author = {Piotr Mroczkowski and Janusz Szmidt}, title = {The Cube Attack on Stream Cipher Trivium and Quadraticity Tests}, journal = {Fundam. Informaticae}, volume = {114}, number = {3-4}, pages = {309--318}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-631}, doi = {10.3233/FI-2012-631}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/MroczkowskiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/PaszynskaGP12, author = {Anna Paszynska and Ewa Grabska and Maciej Paszynski}, title = {A Graph Grammar Model of the hp Adaptive Three Dimensional Finite Element Method. Part {I}}, journal = {Fundam. Informaticae}, volume = {114}, number = {2}, pages = {149--182}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-622}, doi = {10.3233/FI-2012-622}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/PaszynskaGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/PaszynskaGP12a, author = {Anna Paszynska and Ewa Grabska and Maciej Paszynski}, title = {A Graph Grammar Model of the hp Adaptive Three Dimensional Finite Element Method. Part {II}}, journal = {Fundam. Informaticae}, volume = {114}, number = {2}, pages = {183--201}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-623}, doi = {10.3233/FI-2012-623}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/PaszynskaGP12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/RjaskoS12, author = {Michal Rjasko and Martin Stanek}, title = {Attacking M{\&}M Collective Signature Scheme}, journal = {Fundam. Informaticae}, volume = {114}, number = {3-4}, pages = {319--323}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-632}, doi = {10.3233/FI-2012-632}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/RjaskoS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/RoettgerW12, author = {Eric L. Roettger and Hugh C. Williams}, title = {Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions}, journal = {Fundam. Informaticae}, volume = {114}, number = {3-4}, pages = {325--344}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-633}, doi = {10.3233/FI-2012-633}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/RoettgerW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/SpiezSU12, author = {Stanislaw Spiez and Marian Srebrny and Jerzy Urbanowicz}, title = {Remarks on the Classical Threshold Secret Sharing Schemes}, journal = {Fundam. Informaticae}, volume = {114}, number = {3-4}, pages = {345--357}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-634}, doi = {10.3233/FI-2012-634}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/SpiezSU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/YaoL12, author = {Chih{-}Chia Yao and Kang Lee}, title = {Ellipse Invariant Algorithm for Texture Classification}, journal = {Fundam. Informaticae}, volume = {114}, number = {2}, pages = {203--220}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-624}, doi = {10.3233/FI-2012-624}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/YaoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/YuKCHF12, author = {Jia Yu and Fanyu Kong and Xiangguo Cheng and Rong Hao and Jianxi Fan}, title = {Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles}, journal = {Fundam. Informaticae}, volume = {114}, number = {1}, pages = {103}, year = {2012}, url = {https://doi.org/10.3233/FI-2011-619}, doi = {10.3233/FI-2011-619}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/YuKCHF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Zajac12, author = {Pavol Zajac}, title = {Solving Trivium-based Boolean Equations Using the Method of Syllogisms}, journal = {Fundam. Informaticae}, volume = {114}, number = {3-4}, pages = {359--373}, year = {2012}, url = {https://doi.org/10.3233/FI-2012-635}, doi = {10.3233/FI-2012-635}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Zajac12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.