Papers of School of Mathematics

  • Papers in Journals:
  • List of Papers
  • Papers Published
  • Papers to Appear
  • Refereed Papers in:
  • Proceedings
  • Handbooks
  • Books (Collected Articles)
  • Search for Papers
  • List of all Papers

  • Pages: 1 2 3 4

      [Search Papers] [Print this List]
    1. R. Rezaeian Farashahi (Joint with S. Gholamhossein Hosseini),
    Differential addition on twisted Edwards curves,
    J. Pieprzyk and S. Suriadi
    Springer International Publishing AG

    2. A. Hashemi (Joint with W. M. Seiler),
    Dimension-dependent upper bounds for Grobner bases,
    Proceedings of the 2017 ACM on Inernational Symposium on symbolic and Algebraic Computation (ISSAC'17)

    3. M. Ghari (Joint with S. Bucheli and T. Studer),
    Temporal Justification Logic,
    243 Electronic Proceedings in Theoretical Computer Science

    4. S. Beigi, O. Etesami and A. Gohari,
    The value of information-theoretic content of help bits for computation,
    DOI: 10.1109/IWCIT.2015.7140205 Iran Workshop on Communication and Information Theory (IWCIT)

    IEEE publisher
    5. S. Beigi, O. Etesami and A. Gohari,
    Deterministic randomness extraction from generalized and distributed Santha-Vazirani sources,
    ICALP 2015

    6. A. Mohammadian and B. Tayfeh-Rezaie,
    A note on order and eigenvalue multiplicity of strongly regular graphs,
    Algebraic Design Theory and Hadamard Matrices
    Charles Colbourn

    7. R. Rezaeian Farashahi (Joint with B. rashidi and S. M. Sayedi),
    High-speed and pipelined finite field bit-parallel multiplier over GF(2m) for elliptic curve cryptosystems,
    ISCISC, 2014

    8. Sh. Heidarkhani,
    Three solutions for systems of n fourth order partial differential equations,
    DOI 10.1007/978-1-4614-7333-6 35 Proceeding of International Conference on Differential & Difference Equations and Applications
    S. Pinelas
    9. S. Salehipourmehr ,
    Computation in Logic and Logic in Computation,
    Proceedings of the Third International Conference on Contemporary Issues in Computer and Information Sciences

    10. M. S. Fallah (Joint with B. Sattarzadeh),
    Is cryptic able to detect insider attacks?,


    back to top

    Pages : 1 2 3 4  


    webmaster |   Copyright © 2012, All rights reserved.