Follow
G. C. Meletiou
G. C. Meletiou
Professor of Mathematics, T.E.I. of Epirus
Verified email at teiep.gr
Title
Cited by
Cited by
Year
Computational intelligence in information assurance and security
A Abraham
Springer, 2007
70*2007
Evolutionary computation based cryptanalysis: A first study
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e823-e830, 2005
472005
Studying the performance of artificial neural networks on problems related to cryptography
EC Laskari, GC Meletiou, DK Tasoulis, MN Vrahatis
Nonlinear analysis: real world applications 7 (5), 937-942, 2006
462006
Modeling the relationship between water uptake by cucumber and NaCl accumulation in a closed hydroponic system
D Savvas, G Meletiou, S Margariti, I Tsirogiannis, A Kotsiras
HortScience 40 (3), 802-807, 2005
432005
Cryptography and Cryptanalysis Through Computational Intelligence
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Computational Intelligence in Information Assurance and Security, 1-49, 2007
402007
Utilizing evolutionary computation methods for the design of S-boxes
EC Laskari, GC Meletiou, MN Vrahatis
2006 international conference on computational intelligence and security 2 …, 2006
402006
A note on discrete logarithms in finite fields
G Meletiou, GL Mullen
Applicable Algebra in Engineering, Communication and Computing 3, 75-78, 1992
271992
Designing bijective S-boxes using Algorithm Portfolios with limited time budgets
D Souravlias, KE Parsopoulos, GC Meletiou
Applied Soft Computing 59, 475-486, 2017
232017
A first study of the neural network approach to the RSA cryptosystem
G Meletiou, DK Tasoulis, MN Vrahatis
IASTED 2002 Conference on Artificial Intelligence, 483-488, 2002
232002
Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Applied mathematics and computation 184 (1), 63-72, 2007
192007
Explicit form for the discrete logarithm over the field
GC Meletiou
Archivum Mathematicum 29 (1), 25-28, 1993
181993
Problems of cryptography as discrete optimization tasks
EC Laskari, GC Meletiou, MN Vrahatis
Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e831-e837, 2005
172005
Interpolation of the double discrete logarithm
GC Meletiou, A Winterhof
Arithmetic of Finite Fields: 2nd International Workshop, WAIFI 2008 Siena …, 2008
122008
Cryptography through interpolation approximation and computational intelligence methods
GC Meletiou, DK Tasoulis, MN Vrahatis
Bulletin of the Greek Mathematical Society 48, 61-75, 2003
92003
Aitken and Neville inverse interpolation methods over finite fields
EC Laskari, GC Meletiou, MN Vrahatis
Applied Numerical Analysis & Computational Mathematics 2 (1), 100-107, 2005
82005
Privacy preserving electronic data gathering
EC Laskari, GC Meletiou, DK Tasoulis, MN Vrahatis
Mathematical and computer modelling 42 (7), 739-746, 2005
72005
An algebraic setting for near-unanimity consensus
HJ Bandelt, GC Meletiou
Order 7 (2), 169-178, 1990
71990
On incidence algebras and triangular martrices
S Foldes, G Meletiou
62002
A polynomial representation for exponents in Zp
GC Meletiou
Δελτίο της Ελληνικής Μαθηματικής Εταιρίας 34 (34), 59-63, 1992
61992
Assessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptography
EC Laskari, GC Meletiou, YC Stamatiou, DK Tasoulis, MN Vrahatis
Mathematical and computer modelling 46 (1), 174-179, 2007
52007
The system can't perform the operation now. Try again later.
Articles 1–20