G. C. Meletiou
G. C. Meletiou
Professor of Mathematics, T.E.I. of Epirus
Verified email at teiep.gr
Title
Cited by
Cited by
Year
Evolutionary computation based cryptanalysis: A first study
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e823-e830, 2005
472005
Studying the performance of artificial neural networks on problems related to cryptography
EC Laskari, GC Meletiou, DK Tasoulis, MN Vrahatis
Nonlinear analysis: real world applications 7 (5), 937-942, 2006
422006
Modeling the relationship between water uptake by cucumber and NaCl accumulation in a closed hydroponic system
D Savvas, G Meletiou, S Margariti, I Tsirogiannis, A Kotsiras
HortScience 40 (3), 802-807, 2005
362005
Utilizing evolutionary computation methods for the design of S-boxes
EC Laskari, GC Meletiou, MN Vrahatis
2006 international conference on computational intelligence and security 2 …, 2006
342006
Cryptography and Cryptanalysis Through Computational Intelligence
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Computational Intelligence in Information Assurance and Security, 1-49, 2007
332007
A note on discrete logarithms in finite fields
G Meletiou, GL Mullen
Applicable Algebra in Engineering, Communication and Computing 3 (1), 75-78, 1992
221992
Computational intelligence in information assurance and security
A Abraham
Springer, 2007
19*2007
A first study of the neural network approach to the RSA cryptosystem
G Meletiou, DK Tasoulis, MN Vrahatis
IASTED 2002 Conference on Artificial Intelligence, 483-488, 2002
192002
Explicit form for the discrete logarithm over the field
GC Meletiou
Archivum Mathematicum 29 (1), 25-28, 1993
191993
Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
EC Laskari, GC Meletiou, YC Stamatiou, MN Vrahatis
Applied mathematics and computation 184 (1), 63-72, 2007
172007
Problems of cryptography as discrete optimization tasks
EC Laskari, GC Meletiou, MN Vrahatis
Nonlinear Analysis: Theory, Methods & Applications 63 (5-7), e831-e837, 2005
172005
Interpolation of the double discrete logarithm
GC Meletiou, A Winterhof
International Workshop on the Arithmetic of Finite Fields, 1-10, 2008
122008
Privacy preserving electronic data gathering
EC Laskari, GC Meletiou, DK Tasoulis, MN Vrahatis
Mathematical and computer modelling 42 (7), 739-746, 2005
92005
Aitken and Neville inverse interpolation methods over finite fields
EC Laskari, GC Meletiou, MN Vrahatis
Applied Numerical Analysis & Computational Mathematics 2 (1), 100-107, 2005
82005
Cryptography through interpolation approximation and computational intelligence methods
GC Meletiou, DK Tasoulis, MN Vrahatis
Bulletin of the Greek Mathematical Society 48, 61-75, 2003
72003
An algebraic setting for near-unanimity consensus
HJ Bandelt, GC Meletiou
Order 7 (2), 169-178, 1990
71990
Designing bijective S-boxes using Algorithm Portfolios with limited time budgets
D Souravlias, KE Parsopoulos, GC Meletiou
Applied Soft Computing 59, 475-486, 2017
62017
Privacy preserving unsupervised clustering over vertically partitioned data
DK Tasoulis, EC Laskari, GC Meletiou, MN Vrahatis
Computational Science and Its Applications-ICCSA 2006, 635-643, 2006
62006
On incidence algebras and triangular matrices
S Foldes, G Meletiou
Rutcor Res. Report 2002 (35), 2002
62002
A polynomial representation for exponents in Zp
GC Meletiou
Δελτίο της Ελληνικής Μαθηματικής Εταιρίας 34 (34), 59-63, 1992
61992
The system can't perform the operation now. Try again later.
Articles 1–20