Contents of Fundamenta Informaticae Volume 114


Number 1,  2012

Number 2,  2012

Number 3-4,  2012


Contents of Volume 114, Number 1, 2012

Click on title for abstract


Finite-valued Logics for Information Processing
Arnon Avron,  Beata Konikowska

A Note on the Model Theory for Positive Modal Logic
Sergio Celani  Ramon Jansana

Pseudopower Avoidance
Ehsan Chiniforooshan, Lila Kari,  Zhi Xu

An Algebraic Semantics for QVT-Relations Check-only Transformations
Esther Guerra,  Juan de Lara 

Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, and Jianxi Fan


Contents of Volume 114, Number 2, 2012

Click on title for abstract


Dynamic Coloring of Graphs
Piotr Borowiecki,  Elżbieta Sidorowicz

Unambiguous Functions in Logarithmic Space
Grzegorz Herman,  Michael Soltys

A Graph Grammar Model of the hp Adaptive Three Dimensional Finite Element Method. Part I.
Anna Paszyńska,  Ewa Grabska,  Maciej Paszyński 

A Graph Grammar Model of the hp Adaptive Three Dimensional Finite Element Method. Part II.
Anna Paszyńska,  Ewa Grabska,  Maciej Paszyński

Ellipse Invariant Algorithm for Texture Classification
Chih-Chia Yao,  Kang Lee


Contents of Volume 114, Number 3-4, 2012

Click on title for abstract


Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo, Poland, 2010. Prefacei-ii

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Alex Biryukov,  Johann Großschädl

Evaluation of PP-1 Cipher Resistance against Differential and Linear Cryptanalysis in Comparison to a DES-like Cipher
Krzysztof Chmiel,  Anna Grocholewska-Czurylo,  Janusz Stoklosa

On Second-order Nonlinearities of Some D0 Type Bent Functions
Sugata Gangopadhyay,  Brajesh Kumar Singh

Algorithm for Generating Primes p and q Such that q Divides p4±p3+ p2±p+1
Maciej Grze¶kowiak

Remarks on Pseudorandom Binary Sequences Over Elliptic Curves
László Mérai

The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
Piotr Mroczkowski,  Janusz Szmidt

Attacking M&M Collective Signature Scheme
>Michal Rjasko,  Martin Stanek

Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions
Eric Roettger,  Hugh C. Williams

Remarks on the Classical Threshold Secret Sharing Schemes
Stanisaw Spież,  Marian Srebrny,  Jerzy Urbanowicz

Solving Trivium-based Boolean Equations Using the Method of Syllogisms
Pavol Zajac