According to our database1, Juha Kortelainen authored at least 31 papers between 1981 and 2018.
Legend:Book In proceedings Article PhD thesis Other
Automatic Generation of Simulation-based Digital Twins of Industrial Process Plants.
ERCIM News, 2018
Thirty Years of Electro-Hybrid Powertrain Simulation.
IEEE Access, 2018
On simple generators of recursively enumerable languages.
J. Comput. Syst. Sci., 2015
Multi-parameterised compositional verification of safety properties.
Inf. Comput., 2015
Semantic restrictions and rules in applications of multibody dynamics.
Eng. Comput. (Lond.), 2015
New Second Preimage Attack Variants against the MD-Structure.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
On Diamond Structures and Trojan Message Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks.
Proceedings of the Progress in Cryptology, 2012
On Partitions Separating Words.
Combinatorics on words in information security: Unavoidable regularities in the construction of multicollision attacks on iterated hash functions.
Proceedings of the Proceedings 8th International Conference Words 2011, 2011
There Does Not Exist a Minimal Full Trio with Respect to Bounded Context-Free Languages.
Proceedings of the Developments in Language Theory - 15th International Conference, 2011
Unavoidable Regularities in Long Words with Bounded Number of Symbol Occurrences.
Proceedings of the Computing and Combinatorics - 17th Annual International Conference, 2011
Multicollision attacks and generalized iterated hash functions.
J. Mathematical Cryptology, 2010
CFD modelling as an integrated part of multi-level simulation of process plants: semantic modelling approach.
Proceedings of the SummerSim '10, 2010
Variants of Multicollision Attacks on Iterated Hash Functions.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010
Algorithmic Verification with Multiple and Nested Parameters.
Proceedings of the Formal Methods and Software Engineering, 2009
Parameterised Process Algebraic Verification by Precongruence Reduction.
Proceedings of the Ninth International Conference on Application of Concurrency to System Design, 2009
Towards a Ready-to-Use Drivers' Vigilance Monitoring System.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008
On systems of word equations with simple loop sets.
Theor. Comput. Sci., 2007
Polynomial Generators of Recursively Enumerable Languages.
Proceedings of the Developments in Language Theory, 9th International Conference, 2005
Linear size test sets for certain commutative languages.
On the System of Word Equations x0ui1x1ui2x2ui3x3=y0vi1y1vi2y2vi3y3(i=0, 1, 2, ...) in a Free Monoid.
Theor. Comput. Sci., 1999
Remarks about Commutative Context-Free Languages.
J. Comput. Syst. Sci., 1998
On the System of Word Equations x0u1ix1u2ix2 ... umixm = y0v1iy1v2iy2 ... vniyn (i=0, 1, 2, ...) in a Free Monoid.
Journal of Automata, Languages and Combinatorics, 1998
Polynomial Size Test Sets for Commutative Languages.
On the System of word equations x^i_1 x^i_2 ... x^i_m = y^i_1 y^i_2 ...y^i_n (i=1, 2, ...) in a Free Monoid.
Acta Inf., 1997
The conjecture of Fliess on commutative context-free languages.
J. ACM, 1989
Every Commutative Quasirational Language is Regular.
Proceedings of the Automata, 1985
A result concerning the trios generated by commutative slip-languages.
Discrete Applied Mathematics, 1982
Some Properties of Language Families Generated by Commutative Languages.
Proceedings of the Fundamentals of Computation Theory, 1981