George Petrides

Orcid: 0000-0002-1125-4343

According to our database1, George Petrides authored at least 16 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes.
IEEE Trans. Inf. Theory, October, 2023

Cost-Sensitive Stacking: an Empirical Evaluation.
CoRR, 2023

On decompositions of permutation polynomials into quadratic and cubic power permutations.
Cryptogr. Commun., 2023

2022
Cost-sensitive learning for profit-driven credit scoring.
J. Oper. Res. Soc., 2022

Cost-sensitive ensemble learning: a unifying framework.
Data Min. Knowl. Discov., 2022

A number theoretic view on binary shift registers.
Cryptogr. Commun., 2022

2021
Predicting employee absenteeism for cost effective interventions.
Decis. Support Syst., 2021

2020
Misclassification cost-sensitive ensemble learning: A unifying framework.
CoRR, 2020

2019
On Non-Completeness in Threshold Implementations.
Proceedings of ACM Workshop on Theory of Implementation Security, 2019

2018
Rhythmic Keccak: SCA Security and Low Latency in HW.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

2013
Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get?
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2011
A Novel Framework for Protocol Analysis.
J. Internet Serv. Inf. Secur., 2011

2008
Composition of recursions and nonlinear complexity of periodic binary sequences.
Des. Codes Cryptogr., 2008

2006
On the Classification of Periodic Binary Sequences into Nonlinear Complexity Classes.
Proceedings of the Sequences and Their Applications, 2006

2005
Generalised Bent Criteria for Boolean Functions (II)
CoRR, 2005

2003
Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups.
Proceedings of the Cryptography and Coding, 2003


  Loading...