Computational intelligence in information assurance and security A Abraham Springer, 2007 | 71* | 2007 |
Evolutionary computation based cryptanalysis: A first study EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e823-e830, 2005 | 49 | 2005 |
Modeling the relationship between water uptake by cucumber and NaCl accumulation in a closed hydroponic system D Savvas, G Meletiou, S Margariti, I Tsirogiannis, A Kotsiras HortScience 40 (3), 802-807, 2005 | 49 | 2005 |
Studying the performance of artificial neural networks on problems related to cryptography EC Laskari, GC Meletiou, DK Tasoulis, MN Vrahatis Nonlinear analysis: real world applications 7 (5), 937-942, 2006 | 47 | 2006 |
Cryptography and Cryptanalysis Through Computational Intelligence EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis Computational Intelligence in Information Assurance and Security, 1-49, 2007 | 42 | 2007 |
Utilizing evolutionary computation methods for the design of S-boxes EC Laskari, GC Meletiou, MN Vrahatis 2006 international conference on computational intelligence and security 2 …, 2006 | 41 | 2006 |
A note on discrete logarithms in finite fields G Meletiou, GL Mullen Applicable Algebra in Engineering, Communication and Computing 3, 75-78, 1992 | 28 | 1992 |
Designing bijective S-boxes using Algorithm Portfolios with limited time budgets D Souravlias, KE Parsopoulos, GC Meletiou Applied Soft Computing 59, 475-486, 2017 | 27 | 2017 |
A first study of the neural network approach to the RSA cryptosystem G Meletiou, DK Tasoulis, MN Vrahatis IASTED 2002 Conference on Artificial Intelligence, 483-488, 2002 | 24 | 2002 |
Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis Applied mathematics and computation 184 (1), 63-72, 2007 | 19 | 2007 |
Explicit form for the discrete logarithm over the field GC Meletiou Archivum Mathematicum 29 (1), 25-28, 1993 | 19 | 1993 |
Problems of cryptography as discrete optimization tasks EC Laskari, GC Meletiou, MN Vrahatis Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e831-e837, 2005 | 18 | 2005 |
Interpolation of the double discrete logarithm GC Meletiou, A Winterhof Arithmetic of Finite Fields: 2nd International Workshop, WAIFI 2008 Siena …, 2008 | 12 | 2008 |
Cryptography through interpolation approximation and computational intelligence methods GC Meletiou, DK Tasoulis, MN Vrahatis Bulletin of the Greek Mathematical Society 48, 61-75, 2003 | 10 | 2003 |
Aitken and Neville inverse interpolation methods over finite fields EC Laskari, GC Meletiou, MN Vrahatis Applied Numerical Analysis & Computational Mathematics 2 (1), 100-107, 2005 | 8 | 2005 |
Privacy preserving electronic data gathering EC Laskari, GC Meletiou, DK Tasoulis, MN Vrahatis Mathematical and computer modelling 42 (7), 739-746, 2005 | 7 | 2005 |
An algebraic setting for near-unanimity consensus HJ Bandelt, GC Meletiou Order 7 (2), 169-178, 1990 | 7 | 1990 |
On incidence algebras and triangular martrices S Foldes, G Meletiou | 6 | 2002 |
The algebra of majority consensus HJ Bandelt, GC Meletiou algebra universalis 29, 546-555, 1992 | 6 | 1992 |
A polynomial representation for exponents in Zp GC Meletiou Δελτίο της Ελληνικής Μαθηματικής Εταιρίας 34 (34), 59-63, 1992 | 6 | 1992 |