Follow
Muhammad F. I. Chowdhury, PhD
Muhammad F. I. Chowdhury, PhD
Senior S/W Engineer, Irdeto
Verified email at uwo.ca
Title
Cited by
Cited by
Year
Effect of security increment to symmetric data encryption through AES methodology
MN Islam, M Mia, M Chowdhury, MA Matin
Software Engineering, Artificial Intelligence, Networking, and Parallel …, 2008
612008
Faster Algorithms for Multivariate Interpolation with Multiplicities and Simultaneous Polynomial Approximations
MFI Chowdhury, C Jeannerod, V Neiger, E Schost, G Villard
Information Theory, IEEE Tran 61 (5), 2370 - 2387, 2015
412015
Examining branch and bound strategy on multiprocessor task scheduling
MM Rahman, MFI Chowdhury
2009 12th International Conference on Computers and Information Technology …, 2009
212009
Performance evaluation of symmetric encryption algorithm in MANET and WLAN
MA Matin, MM Hossain, MF Islam, MN Islam, MM Hossain
2009 International Conference for Technical Postgraduates (TECHPOS), 1-4, 2009
182009
Homotopy techniques for multiplication modulo triangular sets
A Bostan, MFI Chowdhury, J van Der Hoeven, É Schost
Journal of Symbolic Computation 46 (12), 1378-1402, 2011
162011
Power series solutions of singular (q)-differential equations
A Bostan, B Salvy, MFI Chowdhury, É Schost, R Lebreton
Proceedings of the 37th International Symposium on Symbolic and Algebraic …, 2012
112012
Complexity and Performance Results for Non FFT‐Based Univariate Polynomial Multiplication
MFI Chowdhury, MM Maza, W Pan, É Schost
AIP Conference Proceedings 1368 (1), 259-262, 2011
62011
MA Matin―Effect of Security Increment to Symmetric Data Encryption through AES Methodology‖ Ninth ACIS International Conference on Software Engineering
MN Islam, MMH Mia, MFI Chowdhury
Artificial Intelligence, Networking, and Parallel/Distributed Computing, 978-0, 0
4
On the complexity of multivariate interpolation with multiplicities and of simultaneous polynomial approximations
MFI Chowdhury, CP Jeannerod, V Neiger, É Schost, G Villard
10th Asian Symposium on Computer Mathematics (ASCM), Beijing, China, 2012
12012
Root lifting techniques and applications to list decoding
MFI Chowdhury, R Lebreton
ACM Communications in Computer Algebra 45 (1/2), 113-114, 2011
12011
Application of Computer Algebra in List Decoding
MFI Chowdhury
University of Western Ontario, 2014
2014
Homotopy techniques for multiplication modulo triangular sets (Spine Title: Homotopy techniques for triangular multiplication)
MFI Chowdhury
The University of Western Ontario London, 2009
2009
Homotopy techniques for multiplication modulo triangular sets
MFI Chowdhury
2009
Elliptic Curve Point Counting
MFI Chowdhury
2009
A Study on Network Security Using Symmetric Data Encryption
MMH Mia, MFI Chowdhury
Khulna University of Engineering & Technology, 2004
2004
A Remark on Cluzeau et al.’s Algorithm to Compute the Reliability of Consecutive-k-Out-of-n: F Systems
MFI Chowdhury, E Schost
A Remark on the Computation of the Reliability of Consecutive-k-Out-of-n: F Systems
MFI Chowdhury, É Schost
The system can't perform the operation now. Try again later.
Articles 1–17