G. C. Meletiou
G. C. Meletiou
Professor of Mathematics, T.E.I. of Epirus
Email verificata su teiep.gr
TitoloCitata daAnno
Evolutionary computation based cryptanalysis: A first study
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e823-e830, 2005
432005
Studying the performance of artificial neural networks on problems related to cryptography
EC Laskari, GC Meletiou, DK Tasoulis, MN Vrahatis
Nonlinear Analysis: Real World Applications 7 (5), 937-942, 2006
422006
Modeling the relationship between water uptake by cucumber and NaCl accumulation in a closed hydroponic system
D Savvas, G Meletiou, S Margariti, I Tsirogiannis, A Kotsiras
HortScience 40 (3), 802-807, 2005
332005
Cryptography and Cryptanalysis Through Computational Intelligence
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Computational Intelligence in Information Assurance and Security, 1-49, 2007
242007
Utilizing evolutionary computation methods for the design of S-boxes
EC Laskari, GC Meletiou, MN Vrahatis
2006 International Conference on Computational Intelligence and Security 2 …, 2006
232006
A note on discrete logarithms in finite fields
G Meletiou, GL Mullen
Applicable Algebra in Engineering, Communication and Computing 3 (1), 75-78, 1992
221992
Explicit form for the discrete logarithm over the field
GC Meletiou
Archivum Mathematicum 29 (1), 25-28, 1993
191993
Problems of cryptography as discrete optimization tasks
EC Laskari, GC Meletiou, MN Vrahatis
Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e831-e837, 2005
152005
A first study of the neural network approach to the RSA cryptosystem
G Meletiou, DK Tasoulis, MN Vrahatis
IASTED 2002 Conference on Artificial Intelligence, 483-488, 2002
152002
Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Applied mathematics and computation 184 (1), 63-72, 2007
132007
Interpolation of the double discrete logarithm
GC Meletiou, A Winterhof
International Workshop on the Arithmetic of Finite Fields, 1-10, 2008
122008
Computational intelligence in information assurance and security
A Abraham
Springer, 2007
112007
Privacy preserving electronic data gathering
EC Laskari, GC Meletiou, DK Tasoulis, MN Vrahatis
Mathematical and computer modelling 42 (7), 739-746, 2005
82005
Aitken and Neville inverse interpolation methods over finite fields
EC Laskari, GC Meletiou, MN Vrahatis
Applied Numerical Analysis & Computational Mathematics 2 (1), 100-107, 2005
82005
An algebraic setting for near-unanimity consensus
HJ Bandelt, GC Meletiou
Order 7 (2), 169-178, 1990
71990
Privacy preserving unsupervised clustering over vertically partitioned data
DK Tasoulis, EC Laskari, GC Meletiou, MN Vrahatis
Computational Science and Its Applications-ICCSA 2006, 635-643, 2006
62006
On incidence algebras and triangular matrices
S Foldes, G Meletiou
Rutcor Res. Report 2002 (35), 2002
62002
A polynomial representation for exponents in Zp
GC Meletiou
Δελτίο της Ελληνικής Μαθηματικής Εταιρίας 34 (34), 59-63, 1992
61992
Cryptography through interpolation approximation and computational inteligence methods
GC Meletiou, DK Tasoulis, MN Vrahatis
Bulletin of the Greek Mathematical Society 48, 61-75, 2003
52003
Matrix representation of cryptographic functions
GC Meletiou, EC Laskari, DK Tasoulis, MN Vrahatis
Journal of Applied Mathematics and Bioinformatics 3 (1), 205, 2013
42013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20