Effect of security increment to symmetric data encryption through AES methodology MN Islam, M Mia, M Chowdhury, MA Matin Software Engineering, Artificial Intelligence, Networking, and Parallel …, 2008 | 61 | 2008 |
Faster Algorithms for Multivariate Interpolation with Multiplicities and Simultaneous Polynomial Approximations MFI Chowdhury, C Jeannerod, V Neiger, E Schost, G Villard Information Theory, IEEE Tran 61 (5), 2370 - 2387, 2015 | 42 | 2015 |
Examining branch and bound strategy on multiprocessor task scheduling MM Rahman, MFI Chowdhury 2009 12th International Conference on Computers and Information Technology …, 2009 | 21 | 2009 |
Performance evaluation of symmetric encryption algorithm in MANET and WLAN MA Matin, MM Hossain, MF Islam, MN Islam, MM Hossain 2009 International Conference for Technical Postgraduates (TECHPOS), 1-4, 2009 | 18 | 2009 |
Homotopy techniques for multiplication modulo triangular sets A Bostan, MFI Chowdhury, J van Der Hoeven, É Schost Journal of Symbolic Computation 46 (12), 1378-1402, 2011 | 16 | 2011 |
Power series solutions of singular (q)-differential equations A Bostan, B Salvy, MFI Chowdhury, É Schost, R Lebreton Proceedings of the 37th International Symposium on Symbolic and Algebraic …, 2012 | 11 | 2012 |
Complexity and Performance Results for Non FFT‐Based Univariate Polynomial Multiplication MFI Chowdhury, MM Maza, W Pan, É Schost AIP Conference Proceedings 1368 (1), 259-262, 2011 | 6 | 2011 |
MA Matin―Effect of Security Increment to Symmetric Data Encryption through AES Methodology‖ Ninth ACIS International Conference on Software Engineering MN Islam, MMH Mia, MFI Chowdhury Artificial Intelligence, Networking, and Parallel/Distributed Computing, 978-0, 0 | 4 | |
On the complexity of multivariate interpolation with multiplicities and of simultaneous polynomial approximations MFI Chowdhury, CP Jeannerod, V Neiger, É Schost, G Villard 10th Asian Symposium on Computer Mathematics (ASCM), Beijing, China, 2012 | 1 | 2012 |
Root lifting techniques and applications to list decoding MFI Chowdhury, R Lebreton ACM Communications in Computer Algebra 45 (1/2), 113-114, 2011 | 1 | 2011 |
Application of Computer Algebra in List Decoding MFI Chowdhury University of Western Ontario, 2014 | | 2014 |
Homotopy techniques for multiplication modulo triangular sets (Spine Title: Homotopy techniques for triangular multiplication) MFI Chowdhury The University of Western Ontario London, 2009 | | 2009 |
Homotopy techniques for multiplication modulo triangular sets MFI Chowdhury | | 2009 |
Elliptic Curve Point Counting MFI Chowdhury | | 2009 |
A Study on Network Security Using Symmetric Data Encryption MMH Mia, MFI Chowdhury Khulna University of Engineering & Technology, 2004 | | 2004 |
A Remark on Cluzeau et al.’s Algorithm to Compute the Reliability of Consecutive-k-Out-of-n: F Systems MFI Chowdhury, E Schost | | |
A Remark on the Computation of the Reliability of Consecutive-k-Out-of-n: F Systems MFI Chowdhury, É Schost | | |