|
Issue |
Title |
|
Vol 59 (2014): Number Theory '14 |
The order of appearance of the product of five consecutive Lucas numbers |
Abstract
PDF
|
Diego Marques, Pavel Trojovský |
|
Vol 66 (2016): Applied Mathematics |
The q-Gamma White Noise |
Abstract
|
Hakeem Ahmed Othman |
|
Vol 52 (2012): Real Functions '11 Riemann Derangement Theorem, Multifunctions, Generalized Continuities, Vector Measures and Functions |
The Riemann derangement theorem and divergent permutations |
Abstract
PDF
|
Roman Wituła |
|
Vol 44 (2009): Real Functions '08 Functional Equations, Measures, Integration and Harmonic Analysis |
The set of discontinuities of density-type-aproximately continuous functions |
Abstract
PDF
|
Grażyna Horbaczewska |
|
Vol 67 (2016): Number theory and Cryptology '16 |
The State of the Authenticated Encryption |
Abstract
PDF
|
Damian Vizár |
|
Vol 44 (2009): Real Functions '08 Functional Equations, Measures, Integration and Harmonic Analysis |
The structure of the Fr\'echet space $s$ regarding the series $\sum f_n\left(x_n\right)$ |
Abstract
PDF
|
Tibor Šalát, Peter Vadovič |
|
Vol 71 (2018): CDDEA '17 |
The sturm separation theorem for impulsive delay differential equations |
Abstract
PDF
|
Alexander Domoshnitsky, Vladimir Raichik |
|
Vol 54 (2013): Differential and Difference Equations '2012 |
The Sturm--Liouville problem with singular potential and the extrema of the first eigenvalue |
Abstract
PDF
|
E. S. Karulina, A. A. Vladimirov |
|
Vol 74 (2019): Real Functons, Ideals, Measurable Functions, Functional Equations |
The Zariski topology on the graded primary spectrum over graded commutative rings |
Abstract
PDF
|
Khaldoun falah Al-Zoubi, Malik Jaradat |
|
Vol 45 (2010): NILCRYPT '10 |
The zodiac killer ciphers |
Abstract
PDF
|
Håvard Raddum, Marek Sýs |
|
Vol 69 (2017): Applied Mathematics 2017 |
Three ways of defining OWA operator on the set of all normal convex fuzzy sets |
Abstract
PDF
|
Zdenko Takáč |
|
Vol 61 (2014): Applied Mathematics '14 |
Three-polar space over the semi-field of double numbers |
Abstract
PDF
|
Tomáš Gregor |
|
Vol 77 (2020): Number Theory and Cryptology '20 |
Towards a combination of discriminative power of fingerprints and finger vein patterns in multimodal biometric system |
Abstract
PDF
|
Ivan Kováč, Pavol Marák |
|
Vol 53 (2012): TatraCrypt '12 |
Towards provable security of Rijndael-like SPN ciphers against differential attacks |
Abstract
PDF
|
Victor Ruzhentsev, Victor Dolgov |
|
Vol 83 (2023): Algebra, Number Theory and their Applications |
TOWER BUILDING TECHNIQUE ON ELLIPTIC CURVE WITH EMBEDDING DEGREE 18 |
Abstract
|
Ismail ASSOUJAA Assoujaa, Siham Ezzouak, Hakima Mouanis |
|
Vol 66 (2016): Applied Mathematics |
T-superiority and t-norm-based images of fuzzy sets |
Abstract
|
Slavka Bodjanova, Martin Kalina |
|
Vol 83 (2023): Algebra, Number Theory and their Applications |
TWISTED EDWARDS CURVE OVER THE RING |
Abstract
|
Moha Ben Taleb El Hamam, Abdelhakim Chillali, Lhoussain El Fadil |
|
Vol 83 (2023): Algebra, Number Theory and their Applications |
Two disjoint and infinite sets of solutions for an elliptic equation with critical Hardy-Sobolev-Maz'ya term and concave-convex nonlinearities |
Abstract
|
Rachid Echarghaoui, Zakaria Zaimi |
|
Vol 79 (2021): Advances and Applications in Dynamical Systems |
Two non algebraic limit cycles of a class of polynomial differential systems with non-elementary equilibrium point |
Abstract
|
SABAH BENADOUANE, Aziza Berbache, Ahmed Bendjeddou |
|
Vol 84 (2023): Progress in Dynamics Equations '22 |
Uniqueness for an inverse quantum-Dirac problem with given Weyl function |
Abstract
|
Martin Bohner, F. Ayça Çetinkaya |
|
Vol 43 (2009): Differential and Difference Equations and Applications '08 |
Uniqueness intervals and two-point boundary value problems |
Abstract
PDF
|
Grant B. Gustafson |
|
Vol 56 (2013): Number Theory 2012 |
Unsolved Problems |
Abstract
PDF
|
Oto Strauch |
|
Vol 61 (2014): Applied Mathematics '14 |
Using Poly-Dragon cryptosystem in a pseudorandom number generator MSTg |
Abstract
PDF
|
Viliam Hromada, Milan Vojvoda |
|
Vol 64 (2015): Number Theory and Cryptology '15 |
Using SAT solvers in large scale distributed algebraic attacks against low entropy keys |
Abstract
PDF
|
Viliam Hromada, Ladislav Öllös, Pavol Zajac |
|
Real Function and Algebra |
Variational McShane and Pettis integrals of multifuntions |
Abstract
|
Sokol Bush Kaliaj |
|
501 - 525 of 534 Items |
<< < 16 17 18 19 20 21 22 > >> |