| Publication | Date of Publication | Type |
|---|
The Ubiquitous Lambert Function and its Classes in Sciences and Engineering Contributions in Mathematics and Engineering | 2017-09-25 | Paper |
Partiality and approximation schemes for local consistency in networks of constraints Lecture Notes in Computer Science | 2017-01-19 | Paper |
On a new edge function on complete weighted graphs and its application for locating Hamiltonian cycles of small weight Optimization Letters | 2016-09-21 | Paper |
A method for creating private and anonymous digital territories using attribute-based credential technologies Computation, Cryptography, and Network Security | 2016-03-04 | Paper |
On the derivation of a closed-form expression for the solutions of a subclass of generalized Abel differential equations International Journal of Differential Equations | 2014-06-30 | Paper |
| An algorithm for computing the universal Gr\"obner Basis of graph ideals | 2013-07-27 | Paper |
An identity derived from the solution of a class of differential equations for the evolution of a key agreement protocol Journal of Discrete Mathematical Sciences and Cryptography | 2012-11-16 | Paper |
On the equivalence between random graph models Journal of Discrete Mathematical Sciences and Cryptography | 2011-02-28 | Paper |
On the efficient generation of prime-order elliptic curves Journal of Cryptology | 2010-09-21 | Paper |
An interactive, similarity increasing algorithm for random strings with applications to key agreement in ad hoc networks Studies in Applied Mathematics | 2010-05-19 | Paper |
| scientific article; zbMATH DE number 5604091 (Why is no real title available?) | 2009-09-15 | Paper |
| scientific article; zbMATH DE number 5504155 (Why is no real title available?) | 2009-02-09 | Paper |
| scientific article; zbMATH DE number 5504156 (Why is no real title available?) | 2009-02-09 | Paper |
Evolutionary computation based cryptanalysis: a first study Nonlinear Analysis. Theory, Methods & Applications. Series A: Theory and Methods | 2009-02-04 | Paper |
Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations Lecture Notes in Computer Science | 2008-03-17 | Paper |
Assessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptography Mathematical and Computer Modelling | 2008-02-13 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
An asymptotic expansion for theq-binomial series using singularity analysis for generating functions Journal of Discrete Mathematical Sciences and Cryptography | 2007-10-22 | Paper |
The unsatisfiability threshold revisited Discrete Applied Mathematics | 2007-08-23 | Paper |
Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers Applied Mathematics and Computation | 2007-03-12 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
| scientific article; zbMATH DE number 2044510 (Why is no real title available?) | 2004-02-18 | Paper |
Locating information with uncertainty in fully interconnected networks: The case of nondistributed memory Networks | 2003-10-29 | Paper |
| scientific article; zbMATH DE number 1979294 (Why is no real title available?) | 2003-09-11 | Paper |
| scientific article; zbMATH DE number 1953869 (Why is no real title available?) | 2003-07-28 | Paper |
| scientific article; zbMATH DE number 1947427 (Why is no real title available?) | 2003-07-08 | Paper |
Secure information hiding based on computationally intractable problems Journal of Discrete Mathematical Sciences and Cryptography | 2003-01-01 | Paper |
Upper Bounds and Asymptotics for the q‐Binomial Coefficients Studies in Applied Mathematics | 2002-12-11 | Paper |
Random constraint satisfaction: A more accurate picture Constraints | 2002-02-10 | Paper |
| scientific article; zbMATH DE number 1696681 (Why is no real title available?) | 2002-01-28 | Paper |
Locating information with uncertainty in fully interconnected networks with applications to world wide web information retrieval The Computer Journal. Section A Section B | 2002-01-23 | Paper |
| The unsatisfiability threshold revisited | 2001-09-24 | Paper |
| Monotonicity and inert fugitive search games | 2001-09-23 | Paper |
| Bounding the unsatisfiability threshold of random 3-SAT | 2001-02-06 | Paper |
On parallel partial solutions and approximation schemes for local consistency in networks of constraints Constraints | 2000-09-04 | Paper |
A note on the non-colorability threshold of a random graph The Electronic Journal of Combinatorics | 2000-06-07 | Paper |
A note on the non-colorability threshold of a random graph The Electronic Journal of Combinatorics | 2000-06-07 | Paper |
| Approximating the unsatisfiability threshold of random formulas | 2000-05-03 | Paper |