Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaya Diskretnaya Matematika. Supplement
Année 2017
no. 10
Précédent
Suivant
Volume (2017) no. 10
Sommaire
Generalized 312-avoiding GS-permutations and Lehmer's transformation
L. N. Bondarenko
;
M. L. Sharapova
p. 7-9
Characterization of linear transformations defined by Finite Field Hadamard Matrices and circulant matrices
A. V. Volgin
;
G. V. Kryuchkov
p. 10-11
On reducing the order of linear recurrence equations with constant coefficients
K. L. Geut
;
S. S. Titov
p. 12-13
On primitivity of mixing digraphs for substitutions of shift registers
V. S. Grigoriev
;
V. M. Fomichev
p. 14-16
Digit-polynomial construction of substitutions over Galois ring
M. V. Zaets
p. 17-19
The Cayley graph of a~subgroup of the Burnside group~
$B_0(2,5)$
A. A. Kuznetsov
;
A. S. Kuznetsova
p. 19-21
On homogeneous matroids and block-schemes
N. V. Medvedev
;
S. S. Titov
p. 21-23
On maximal metrically regular sets
A. K. Oblaukhov
p. 23-24
On the anisometric index of a~transformation
B. A. Pogorelov
;
M. A. Pudovkina
p. 25-27
One approach to constructing a~transitive class of block transformations
I. V. Cherednik
p. 27-29
Hyperelliptic curves, Cartier--Manin matrices and Legendre polynomials
S. A. Novoselov
p. 29-32
On connection between affine splitting of a~Boolean function and its algebraic, combinatorial and cryptographic properties
A. A. Babueva
p. 33-34
A classification of differentially nonequivalent quadratic APN function in~5 and~6 variables
A. A. Gorodilova
p. 35-36
On constructing special APN functions and their link with APN permutations
V. A. Idrisova
p. 36-38
Properties of coordinate functions for a~class of permutations on~
$\mathbb F_2^n$
L. A. Karpova
;
I. A. Pankratova
p. 38-40
A bent function construction by a~bent function that is affine on several cosets of a~linear subspace
N. A. Kolomeec
p. 41-42
On some properties of known isometric mappings of the set of bent functions
A. V. Kutsenko
p. 43-44
Permutation binomials over finite fields. Conditions of existence
A. V. Miloserdov
p. 44-45
Lower bounds of dimension of linear codes for~CDMA
N. S. Odinokikh
p. 45-46
Refined asymptotic estimates for the number of
$(n,m,k)$
-resilient Boolean mappings
K. N. Pankov
p. 46-49
Component algebraic immunity of S-boxes used in some block ciphers
D. P. Pokrasenko
p. 49-51
The method for implementation of substitutions
$S_{16}$
by algebraic threshold functions
D. A. Soshin
p. 51-54
A condition for uniqueness of linear decomposition of a~Boolean function into disjunctive sum of indecomposable functions
A. V. Cheremushkin
p. 55-56
Some decompositions for quadratic Boolean threshold functions
A. N. Shurupov
p. 56-59
On primitivity of some sets of shift registers mixing digraphs
Y. E. Avezova
p. 60-62
Solving the problem of Boolean satisfiability for estimating the security of block ciphers Magma and PRESENT to algebraic cryptanalysis
L. K. Babenko
;
E. A. Maro
p. 62-64
Cryptographic analysis of the generalized ElGamal's cipher over~
$\operatorname{GL}(8,\mathbb F_{251})$
D. D. Bolotov
;
E. A. Magdin
p. 64-66
The Reed--Muller code square and equivalence classes of McEliece--Sidelnikov cryptosystem private keys
V. V. Vysotskaya
p. 66-68
On explicit constructions for solving the problem ``A~secret sharing''
K. L. Geut
;
K. A. Kirienko
;
P. O. Sadkov
;
R. I. Taskin
;
S. S. Titov
p. 68-70
The assembler program is a~container for a~text
E. Yu. Gracheva
;
M. Ya. Tovsteyn
p. 71-73
About handwritten signature verification
A. V. Epishkina
;
A. V. Beresneva
;
S. S. Babkin
;
A. S. Kurnev
;
V. U. Lermontov
p. 73-76
Self-programmable cellular automata for cryptography
A. A. Efremova
;
A. N. Gamova
p. 76-81
Construction of
$(4,8)$
-schemes of visual cryptography on the base of a~class of linear hash functions
N. A. Zorina
;
Y. V. Kosolapov
p. 81-83
Exponents of mixing digraphs associated with one and two feedbacks shift registers
A. M. Koreneva
p. 84-87
Structure of local primitive digraphs
S. N. Kyazhin
p. 87-89
A version of the Diffie--Hellman protocol based on using additional hidden factors
A. A. Obzor
p. 89-91
On properties of
$W$
-permutations over the residue ring
M. A. Pudovkina
;
A. S. Makeyev
p. 92-93
On mathematical models of key mixing for iterative block encryption algorithms
D. A. Romanko
;
V. M. Fomichev
p. 93-96
On characteristics of local primitive matrices and digraphs
V. M. Fomichev
p. 96-99
On characteristics of a~three-stage key generator with an alternating step modified with key generator ``stop-forward''
V. M. Fomichev
;
D. M. Kolesova
p. 99-101
S-boxes algorithmic realization based on modified additive generators
V. M. Fomichev
;
D. M. Lolich
;
A. V. Yuzbashev
p. 102-104
On the construction of
$s$
-boxes of
$4\times4$
size
V. M. Fomichev
;
P. V. Ovchinnikov
p. 104-106
Cryptautomata: definition, cryptanalysis, example
G. P. Agibalov
p. 106-110
Implementation of a~non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-model
P. N. Devyanin
p. 111-114
Towards ABAC Engine framework
D. N. Kolegov
;
O. V. Broslavsky
;
N. E. Oleksov
p. 115-120
Machine learning based anomaly detection method for SQL
A. I. Murzina
p. 121-122
Identification method for function calling conventions in binary applications
M. A. Stanchin
;
N. V. Sorokovikov
p. 122-123
The reliability of circuits in Rosser--Turkett basis (in
$P_3$
) with faults of type~
$0$
at the outputs of gates
M. A. Alekhina
;
O. Yu. Barsukova
p. 124-126
On the reliability of circuits in some full bases (in
$P_3$
) with inverse faults at the gate outputs
M. A. Alekhina
;
O. Yu. Barsukova
p. 126-128
The unreliability of logic circuits of unreliable functional elements
M. A. Alekhina
;
Yu. S. Gusynina
;
T. A. Shornikova
p. 128-130
About primitive regular graphs with exponent~2
M. B. Abrosimov
;
S. V. Kostin
p. 131-134
Upper and lower bounds of the number of additional arcs in a~minimal edge
$1$
-extension of oriented path
M. B. Abrosimov
;
O. V. Modenova
p. 134-136
About generation of non-isomorphic vertex
$k$
-colorings
M. B. Abrosimov
;
P. V. Razumovsky
p. 136-138
On the number of spanning trees in labeled cactus
V. A. Voblyi
p. 139-140
Identification method for invertible finite state machine with known output function
A. O. Zhukovskaja
;
V. N. Trenkaev
p. 140-142
Application of edge local complementation to McEliece cryptosystem structural analysis
A. A. Sokolova
p. 142-144
Cyclic permutation of elements in one-dimensional array
V. V. Gotsulenko
p. 145-149
An analogue of implicit mapping theorem to formal grammars
O. I. Egorushkin
;
I. V. Kolbasina
;
K. V. Safonov
p. 149-151
Sketch completion for predicate programs by counterexamples guided synthesis
M. S. Chushkin
p. 151-153
Algorithm for constructing a~non-redundant minimax basis of strong associative rules
V. V. Bykova
;
A. V. Kataeva
p. 154-157
The inversion of cryptographic hash functions using unbalanced approximations of round functions
I. A. Gribanova
p. 157-160
Based on the relative similarity coefficients ranking characteristics forming the cluster partition
S. V. Dronov
;
E. A. Evdokimov
p. 160-162
About the potential for the ellipsoid method application to the threshold function recognition
I. I. Lapikov
p. 163-165
Threshold interpolations in solving nonlinear Boolean equation by method of separating planes
V. G. Nikonov
;
A. N. Shurupov
p. 165-168
Two-phase routing algorithm in the time-dependent networks
A. A. Soldatenko
p. 168-171