关注
Tihanyi Norbert
Tihanyi Norbert
在 inf.elte.hu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Computing extremely large values of the Riemann zeta function
N Tihanyi, A Kovács, J Kovács
Journal of Grid Computing 15, 527-534, 2017
142017
Efficient computing of n-dimensional simultaneous Diophantine approximation problems
A Kovács, N Tihanyi
Acta Universitatis Sapientiae, Informatica 5 (1), 16-34, 2013
132013
Distributed computing of simultaneous Diophantine approximation problems
N Tihanyi, A Kovács, A Szucs
Stud. Univ. Babes-Bolyai Math 59 (4), 557-566, 2014
72014
Fast method for locating peak values of the Riemann Zeta function on the critical line
N Tihanyi
2014 16th International Symposium on Symbolic and Numeric Algorithms for …, 2014
72014
Improvements on finding large candidates of the Riemann zeta function on the critical line
A Kovács, N Tihanyi
Annales Univ. Sci. Budapest., Sect. Comp. 48, 53-64, 2018
52018
Unrevealed patterns in password databases Part one: analyses of cleartext passwords
N Tihanyi, A Kovács, G Vargha, Á Lénárt
Technology and Practice of Passwords: International Conference on Passwords …, 2015
52015
Comparison of two Hungarian password databases
N Tihanyi
Pollack Periodica 8 (2), 179-186, 2013
32013
Tight upper and lower bounds for the reciprocal sum of Proth primes
B Borsos, A Kovács, N Tihanyi
The Ramanujan Journal 59 (1), 181-198, 2022
22022
Statistical analysis of DH1 cryptosystem
P Dömösi, J Gáll, G Horváth, N Tihanyi
Acta Cybernetica 23 (1), 371-378, 2017
22017
Fault-injection based backdoors in pseudo random number generators
N Tihanyi
Studia Scientiarum Mathematicarum Hungarica 52 (2), 233-245, 2015
22015
Report on the first des fixed points for non-weak keys: Case-study of hacking an iot environment
N Tihanyi
IEEE Access 10, 77802-77809, 2022
12022
Computation Results of the Riemann Zeta Search Project
N Tihanyi, A Kovács
2018 20th International Symposium on Symbolic and Numeric Algorithms for …, 2018
12018
A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification
Y Charalambous, N Tihanyi, R Jain, Y Sun, MA Ferrag, LC Cordeiro
arXiv preprint arXiv:2305.14752, 2023
2023
Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate
R Carvalho, N Tihanyi
2021 International Carnahan Conference on Security Technology (ICCST), 1-6, 2021
2021
A Full Cycle Length Pseudorandom Number Generator Based on Compositions of Automata
P Dömösi, J Gáll, G Horváth, B Borsos, N Tihanyi, Y Alhammadi
Informatica 45 (2), 2021
2021
The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments
N Tihanyi, B Borsos
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2021
2021
A general construction for generating pseudorandom sequences using the digit expansion of real functions
N Tihanyi, B Borsos
2020 22nd International Symposium on Symbolic and Numeric Algorithms for …, 2020
2020
Some Remarks and Tests on the Dh1 Cryptosystem Based on Automata Compositions
P Dömösi, J Gáll, G Horváth, N Tihanyi
Informatica 43 (2), 2019
2019
Numerical computing of extremely large values of the Riemann-Siegel Z-function
N Tihanyi
2019
Computing Extremely Large Values of the Riemann Zeta Function
JK Norbert Tihanyi, Attila Kovács
Journal of Grid Computing, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–20