Follow
Zbigniew Golebiewski
Zbigniew Golebiewski
Wroclaw University of Science and Technology
Verified email at pwr.edu.pl - Homepage
Title
Cited by
Cited by
Year
On Bernoulli sums and Bernstein polynomials
J Cichoń, Z Gołębiewski
Discrete Mathematics & Theoretical Computer Science, 2012
272012
Stealing secrets with SSL/TLS and SSH-kleptographic attacks
Z Golebiewski, M Kutylowski, F Zagórski
CANS, 191-202, 2006
222006
Practical attacks on HB and HB+ protocols
Z Gołębiewski, K Majcher, F Zagorski, M Zawada
IFIP International Workshop on Information Security Theory and Practices …, 2011
202011
On the number of lambda terms with prescribed size of their de Bruijn representation
B Gittenberger, Z Gołębiewski
arXiv preprint arXiv:1509.06139, 2015
172015
Towards fair leader election in wireless networks
Z Gołȩbiewski, M Klonowski, M Koza, M Kutyłowski
International Conference on Ad-Hoc Networks and Wireless, 166-179, 2009
172009
On the number of unary-binary tree-like structures with restrictions on the unary height
O Bodini, D Gardy, B Gittenberger, Z Gołębiewski
Annals of Combinatorics 22 (1), 45-91, 2018
142018
From key predistribution to key redistribution
J Cichoń, Z Gołębiewski, M Kutyłowski
Theoretical Computer Science 453, 75-87, 2012
122012
From key predistribution to key redistribution
J Cichoń, Z Gołębiewski, M Kutyłowski
Theoretical Computer Science 453, 75-87, 2012
122012
From key predistribution to key redistribution
J Cichoń, Z Gołębiewski, M Kutyłowski
Theoretical Computer Science 453, 75-87, 2012
122012
Enumerating lambda terms by weighted length of their De Bruijn representation
O Bodini, B Gittenberger, Z Gołębiewski
Discrete Applied Mathematics 239, 45-61, 2018
112018
Attacks on CKK family of RFID authentication protocols
Z Gołębiewski, K Majcher, F Zagórski
International Conference on Ad-Hoc Networks and Wireless, 241-250, 2008
112008
On delta-method of moments and probabilistic sums
J Cichoń, Z Gołębiewski, M Kardas, M Klonowski
2013 Proceedings of the Tenth Workshop on Analytic Algorithmics and …, 2013
82013
Stealing secrets with SSL/TLS and SSH–kleptographic attacks
Z Gołȩbiewski, M Kutyłowski, F Zagórski
International Conference on Cryptology and Network Security, 191-202, 2006
72006
Protection numbers in simply generated trees and Pólya trees
B Gittenberger, Z Gołębiewski, I Larcher, M Sulkowska
Applicable Analysis and Discrete Mathematics 17 (1), 1-24, 2023
6*2023
Entropy and optimal compression of some general plane trees
Z Golebiewski, A Magner, W Szpankowski
ACM Transactions on Algorithms 15 (1), 2019
52019
Practical attacks on HB and HB+ protocols
Z Golebiewski, K Majcher, F Zagorski, M Zawada
Cryptology ePrint Archive, 2008
52008
Protection number of recursive trees
Z Gołębiewski, M Klimczak
2019 Proceedings of the Sixteenth Workshop on Analytic Algorithmics and …, 2019
42019
Entropy and optimal compression of some general plane trees
Z Gołębiewski, A Magner, W Szpankowski
ACM Transactions on Algorithms (TALG) 15 (1), 1-23, 2018
42018
Entropy of some general plane trees
Z Golebiewski, A Magner, W Szpankowski
2017 IEEE International Symposium on Information Theory (ISIT), 301-305, 2017
42017
Counting embeddings of rooted trees into families of rooted trees
B Gittenberger, Z Gołębiewski, I Larcher, M Sulkowska
arXiv preprint arXiv:2008.08312, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20