Topological analysis of bitcoin’s lightning network IA Seres, L Gulyás, DA Nagy, P Burcsi Mathematical Research for Blockchain Economy: 1st International Conference …, 2020 | 147 | 2020 |
Algorithms for jumbled pattern matching in strings P Burcsi, F Cicalese, G Fici, Z Lipták International Journal of Foundations of Computer Science 23 (02), 357-374, 2012 | 91 | 2012 |
Mixeth: efficient, trustless coin mixing service for ethereum IA Seres, DA Nagy, C Buckland, P Burcsi Cryptology ePrint Archive, 2019 | 61 | 2019 |
On approximate jumbled pattern matching in strings P Burcsi, F Cicalese, G Fici, Z Lipták Theory of Computing Systems 50, 35-51, 2012 | 59 | 2012 |
On table arrangements, scrabble freaks, and jumbled pattern matching P Burcsi, F Cicalese, G Fici, Z Lipták Fun with Algorithms: 5th International Conference, FUN 2010, Ischia, Italy …, 2010 | 47 | 2010 |
The legendre pseudorandom function as a multivariate quadratic cryptosystem: Security and applications IA Seres, M Horváth, P Burcsi Applicable Algebra in Engineering, Communication and Computing, 1-31, 2023 | 32 | 2023 |
The method of double chains for largest families with excluded subposets P Burcsi, DT Nagy arXiv preprint arXiv:1204.5355, 2012 | 32 | 2012 |
Exhaustive search methods for CNS polynomials P Burcsi, A Kovács Monatshefte für Mathematik 155, 421-430, 2008 | 30 | 2008 |
On prefix normal words and prefix normal forms P Burcsi, G Fici, Z Lipták, F Ruskey, J Sawada Theoretical Computer Science 659, 1-13, 2017 | 24 | 2017 |
On combinatorial generation of prefix normal words P Burcsi, G Fici, Z Lipták, F Ruskey, J Sawada Combinatorial Pattern Matching: 25th Annual Symposium, CPM 2014, Moscow …, 2014 | 20 | 2014 |
Decision and classification algorithms for generalized number systems P Burcsi, A Kovács, Z Papp-Varga Ann. Univ. Sci. Budapest. Sect. Comput 28, 141-156, 2008 | 17 | 2008 |
Computational investigation of Lehmer’s totient problem P Burcsi, S Czirbusz, G Farkas Ann. Univ. Sci. Budapest. Sect. Comput 35, 43-49, 2011 | 16 | 2011 |
The effect of false positives: Why fuzzy message detection leads to fuzzy privacy guarantees? IA Seres, B Pejó, P Burcsi International Conference on Financial Cryptography and Data Security, 123-148, 2022 | 12 | 2022 |
Normal, abby normal, prefix normal P Burcsi, G Fici, Z Lipták, F Ruskey, J Sawada International Conference on Fun with Algorithms, 74-88, 2014 | 11 | 2014 |
An algorithm checking a necessary condition of number system constructions P Burcsi, A Kovács Ann. Univ. Sci. Budapest. Sect. Comput 25, 143-152, 2005 | 9 | 2005 |
A note on low order assumptions in RSA groups IA Seres, P Burcsi Rad Hrvatske akademije znanosti i umjetnosti. Matematičke znanosti, 15-31, 2021 | 7 | 2021 |
Generating a Gray code for prefix normal words in amortized polylogarithmic time per word P Burcsi, G Fici, Z Lipták, R Raman, J Sawada Theoretical Computer Science 842, 86-99, 2020 | 7 | 2020 |
Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time IA Seres, P Burcsi Cryptology ePrint Archive, 2023 | 6 | 2023 |
Reconstructibility of trees from subtree size frequencies. D Bartha, P Burcsi Studia Universitatis Babeş-Bolyai, Mathematica 59 (4), 2014 | 5 | 2014 |
Algorithmic aspects of generalized number systems P Burcsi Eötvös Loránd University, Hungary, 2009 | 5 | 2009 |