On Bernoulli sums and Bernstein polynomials J Cichoń, Z Gołębiewski Discrete Mathematics & Theoretical Computer Science, 2012 | 27 | 2012 |
Stealing secrets with SSL/TLS and SSH-kleptographic attacks Z Golebiewski, M Kutylowski, F Zagórski CANS, 191-202, 2006 | 22 | 2006 |
Practical attacks on HB and HB+ protocols Z Gołębiewski, K Majcher, F Zagorski, M Zawada IFIP International Workshop on Information Security Theory and Practices …, 2011 | 20 | 2011 |
On the number of lambda terms with prescribed size of their de Bruijn representation B Gittenberger, Z Gołębiewski arXiv preprint arXiv:1509.06139, 2015 | 17 | 2015 |
Towards fair leader election in wireless networks Z Gołȩbiewski, M Klonowski, M Koza, M Kutyłowski International Conference on Ad-Hoc Networks and Wireless, 166-179, 2009 | 17 | 2009 |
On the number of unary-binary tree-like structures with restrictions on the unary height O Bodini, D Gardy, B Gittenberger, Z Gołębiewski Annals of Combinatorics 22 (1), 45-91, 2018 | 14 | 2018 |
From key predistribution to key redistribution J Cichoń, Z Gołębiewski, M Kutyłowski Theoretical Computer Science 453, 75-87, 2012 | 12 | 2012 |
From key predistribution to key redistribution J Cichoń, Z Gołębiewski, M Kutyłowski Theoretical Computer Science 453, 75-87, 2012 | 12 | 2012 |
From key predistribution to key redistribution J Cichoń, Z Gołębiewski, M Kutyłowski Theoretical Computer Science 453, 75-87, 2012 | 12 | 2012 |
Enumerating lambda terms by weighted length of their De Bruijn representation O Bodini, B Gittenberger, Z Gołębiewski Discrete Applied Mathematics 239, 45-61, 2018 | 11 | 2018 |
Attacks on CKK family of RFID authentication protocols Z Gołębiewski, K Majcher, F Zagórski International Conference on Ad-Hoc Networks and Wireless, 241-250, 2008 | 11 | 2008 |
On delta-method of moments and probabilistic sums J Cichoń, Z Gołębiewski, M Kardas, M Klonowski 2013 Proceedings of the Tenth Workshop on Analytic Algorithmics and …, 2013 | 8 | 2013 |
Stealing secrets with SSL/TLS and SSH–kleptographic attacks Z Gołȩbiewski, M Kutyłowski, F Zagórski International Conference on Cryptology and Network Security, 191-202, 2006 | 7 | 2006 |
Protection numbers in simply generated trees and Pólya trees B Gittenberger, Z Gołębiewski, I Larcher, M Sulkowska Applicable Analysis and Discrete Mathematics 17 (1), 1-24, 2023 | 6* | 2023 |
Entropy and optimal compression of some general plane trees Z Golebiewski, A Magner, W Szpankowski ACM Transactions on Algorithms 15 (1), 2019 | 5 | 2019 |
Practical attacks on HB and HB+ protocols Z Golebiewski, K Majcher, F Zagorski, M Zawada Cryptology ePrint Archive, 2008 | 5 | 2008 |
Protection number of recursive trees Z Gołębiewski, M Klimczak 2019 Proceedings of the Sixteenth Workshop on Analytic Algorithmics and …, 2019 | 4 | 2019 |
Entropy and optimal compression of some general plane trees Z Gołębiewski, A Magner, W Szpankowski ACM Transactions on Algorithms (TALG) 15 (1), 1-23, 2018 | 4 | 2018 |
Entropy of some general plane trees Z Golebiewski, A Magner, W Szpankowski 2017 IEEE International Symposium on Information Theory (ISIT), 301-305, 2017 | 4 | 2017 |
Counting embeddings of rooted trees into families of rooted trees B Gittenberger, Z Gołębiewski, I Larcher, M Sulkowska arXiv preprint arXiv:2008.08312, 2020 | 3 | 2020 |