Computing extremely large values of the Riemann zeta function N Tihanyi, A Kovács, J Kovács Journal of Grid Computing 15, 527-534, 2017 | 14 | 2017 |
Efficient computing of n-dimensional simultaneous Diophantine approximation problems A Kovács, N Tihanyi Acta Universitatis Sapientiae, Informatica 5 (1), 16-34, 2013 | 13 | 2013 |
Distributed computing of simultaneous Diophantine approximation problems N Tihanyi, A Kovács, A Szucs Stud. Univ. Babes-Bolyai Math 59 (4), 557-566, 2014 | 7 | 2014 |
Fast method for locating peak values of the Riemann Zeta function on the critical line N Tihanyi 2014 16th International Symposium on Symbolic and Numeric Algorithms for …, 2014 | 7 | 2014 |
Improvements on finding large candidates of the Riemann zeta function on the critical line A Kovács, N Tihanyi Annales Univ. Sci. Budapest., Sect. Comp. 48, 53-64, 2018 | 5 | 2018 |
Unrevealed patterns in password databases Part one: analyses of cleartext passwords N Tihanyi, A Kovács, G Vargha, Á Lénárt Technology and Practice of Passwords: International Conference on Passwords …, 2015 | 5 | 2015 |
Comparison of two Hungarian password databases N Tihanyi Pollack Periodica 8 (2), 179-186, 2013 | 3 | 2013 |
Tight upper and lower bounds for the reciprocal sum of Proth primes B Borsos, A Kovács, N Tihanyi The Ramanujan Journal 59 (1), 181-198, 2022 | 2 | 2022 |
Statistical analysis of DH1 cryptosystem P Dömösi, J Gáll, G Horváth, N Tihanyi Acta Cybernetica 23 (1), 371-378, 2017 | 2 | 2017 |
Fault-injection based backdoors in pseudo random number generators N Tihanyi Studia Scientiarum Mathematicarum Hungarica 52 (2), 233-245, 2015 | 2 | 2015 |
Report on the first des fixed points for non-weak keys: Case-study of hacking an iot environment N Tihanyi IEEE Access 10, 77802-77809, 2022 | 1 | 2022 |
Computation Results of the Riemann Zeta Search Project N Tihanyi, A Kovács 2018 20th International Symposium on Symbolic and Numeric Algorithms for …, 2018 | 1 | 2018 |
A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification Y Charalambous, N Tihanyi, R Jain, Y Sun, MA Ferrag, LC Cordeiro arXiv preprint arXiv:2305.14752, 2023 | | 2023 |
Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate R Carvalho, N Tihanyi 2021 International Carnahan Conference on Security Technology (ICCST), 1-6, 2021 | | 2021 |
A Full Cycle Length Pseudorandom Number Generator Based on Compositions of Automata P Dömösi, J Gáll, G Horváth, B Borsos, N Tihanyi, Y Alhammadi Informatica 45 (2), 2021 | | 2021 |
The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments N Tihanyi, B Borsos Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2021 | | 2021 |
A general construction for generating pseudorandom sequences using the digit expansion of real functions N Tihanyi, B Borsos 2020 22nd International Symposium on Symbolic and Numeric Algorithms for …, 2020 | | 2020 |
Some Remarks and Tests on the Dh1 Cryptosystem Based on Automata Compositions P Dömösi, J Gáll, G Horváth, N Tihanyi Informatica 43 (2), 2019 | | 2019 |
Numerical computing of extremely large values of the Riemann-Siegel Z-function N Tihanyi | | 2019 |
Computing Extremely Large Values of the Riemann Zeta Function JK Norbert Tihanyi, Attila Kovács Journal of Grid Computing, 2017 | | 2017 |