Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaya Diskretnaya Matematika. Supplement
Année 2021
no. 14
Précédent
Suivant
Volume (2021) no. 14
Sommaire
Воспоминания коллег и учеников о Геннадии Петровиче Агибалове
p. 6-23
On construction of maximal genus
$3$
hyperelliptic curves
Yu. F. Boltnev
;
S. A. Novoselov
;
V. A. Osipov
p. 24-30
Central limit theorem for
$U$
-statistics of tuples of vertex labels on a complete graph
N. M. Mezhennaya
;
V. G. Mikhailov
p. 30-32
On the largest order of substitutions of a given degree
V. M. Fomichev
p. 32-36
Hybrid approach to the search for Boolean functions with high algebraic immunity based on heuristics
N. D. Atutova
p. 37-40
$\mathrm{S}$
-blocks with maximum component algebraic immunity on a small number of variables
D. A. Zyubina
;
N. N. Tokareva
p. 40-42
On some properties of self-dual generalized bent functions
A. V. Kutsenko
p. 42-45
On properties of additive differential probabilities of XOR
N. Mouha
;
N. A. Kolomeets
;
D. A. Ahtyamov
;
I. A. Sutormin
;
M. A. Panferov
;
K. M. Titova
;
T. A. Bonich
;
E. A. Ishchukova
;
N. N. Tokareva
;
B. F. Zhantulikov
p. 46-48
Improved estimates for the number of
$(n, m, k)$
-resilient and correlation-immune Boolean mappings
K. N. Pankov
p. 48-51
On the way of constructing differentially
$2\delta$
-uniform permutations over
$\mathbb{F}_{2^{2m}}$
D. B. Fomin
p. 51-55
A conditions for uniqueness reresentation of
$p$
-logic function into disjunctive product of functions
A. V. Cheremushkin
p. 55-57
On derivatives of Boolean bent functions
A. S. Shaporenko
p. 57-58
XS-circuits: hiding round oracles
S. V. Agievich
p. 59-61
Development and analysis of oracle for the hibrid attack on a cryptographic system NTRU using a quantum search algorithm
A. O. Bakharev
p. 62-67
Cryptanalytic invertibility of two-argument functions
N. Yu. Berdnikova
;
I. A. Pankratova
p. 67-71
Experimental study of the characteristics of one method of integrity checking of large volume data storage
D. A. Bobrovskiy
;
D. I. Zadorozhny
;
A. M. Koreneva
;
T. R. Nabiev
;
V. M. Fomichev
p. 71-74
On the padding algorithm of large-sized blocks in integrity control systems
D. A. Bobrovskiy
;
T. R. Nabiev
;
V. M. Fomichev
p. 74-79
Threshold Diffie~--- Hellman Protocol
D. N. Kolegov
;
Yu. R. Khalniyazova
p. 79-81
WireGuard protocol with GOST cipher suites
D. N. Kolegov
;
Yu. R. Khalniyazova
p. 81-84
Algebraic cryptanalysis of round-reduced lightweight ciphers \textsc{Simon} and \textsc{Speck}
A. V. Kutsenko
;
N. D. Atutova
;
D. A. Zyubina
;
E. A. Maro
;
S. D. Filippov
p. 84-91
To the task of description minimal by inclusion perfect ciphers
N. V. Medvedeva
;
S. S. Titov
p. 91-95
Post-quantum lattice-based e-voting for multiple candidates
D. A. Nabokov
p. 95-100
On ARX-like ciphers based on different codings of
$2$
-groups with a cyclic subgroup of index~
$2$
B. A. Pogorelov
;
M. A. Pudovkina
p. 100-104
Generating additional constraints in algebraic cryptanalysis using SAT oracles
A. A. Semenov
;
K. V. Antonov
;
I. A. Gribanova
p. 104-110
Choosing parameters for one
$\mathrm{IND}$
-
$\mathrm{CCA2}$
secure McEliece modification in the standard model
Y. V. Kosolapov
;
O. Y. Turchenko
p. 110-114
An improvement of cryptographic schemes based on the conjugacy search problem
V. A. Roman'kov
p. 114-118
On privacy in decentralized systems with tokens
L. R. Akhmetzyanova
;
A. A. Babueva
;
S. N. Kyazhin
;
V. A. Popov
p. 119-125
About methods of developing consistent description of the MROSL DP-model for OS and DBMS for its verification with Rodin and ProB tools
P. N. Devyanin
;
M. A. Leonova
p. 126-132
zk-SNARK-based data privacy method
D. O. Kondyrev
p. 132-134
Control Flow Flattening deobfuscation using symbolic execution
V. V. Lebedev
p. 134-138
Application of x86 extensions for code protection
R. K. Lebedev
;
I. A. Koryakin
p. 138-140
Extended grammar-based fuzzing algorithm for JavaScript Engines
M. S. Nedyak
p. 140-146
Extension and analysis of information hiding method Deep Steganography
A. A. Nikolaev
p. 146-148
Adaptation of the Rosenblatt~--- Parzen method for the experimental evaluation of the computing system reliability
V. S. Nikulin
p. 148-153
Bases over the field
$\mathrm{GF(2)}$
generated by the Schur~--- Hadamard operation
K. L. Geut
;
S. S. Titov
p. 154-158
On decomposability of Schur~--- Hadamard product of the tensor products sum of Reed~--- Muller codes
Yu. V. Kosolapov
;
E. A. Lelyuk
p. 158-161
Regular vertex
$1$
-extension for
$2$
-dimension meshes
A. A. Lobov
;
M. B. Abrosimov
p. 161-163
On attractors in one discrete binary dynamic system with bipartite dependency graph
R. I. Panteleev
;
A. V. Zharkova
p. 163-165
Schemes for constructing minimal vertex
$1$
-extensions of complete bicolored graphs
P. V. Razumovskii
;
M. B. Abrosimov
p. 165-168
Towards the security of McEliece's cryptosystem based on Hermitian subfield subcodes
G. P. Nagy
;
S. El Khalfaoui
p. 168-175
On a solution of polynomial grammars and the general algebraic equation
O. I. Egorushkin
;
I. V. Kolbasina
;
K. V. Safonov
p. 176-178
On generic complexity of the isomorphism problem for finite semigroups
A. N. Rybalov
p. 178-180
On a heuristic approach to constructing bijective vector Boolean functions with given cryptographic properties
M. A. Kovrizhnykh
;
D. B. Fomin
p. 181-184
Some subgroups of the Burnside group
$B_0(2,5)$
A. A. Kuznetsov
;
A. S. Kuznetsova
p. 184-186
DPLL-like satisfiability problem solver over the system of ANF equations
A. V. Tkachev
;
K. V. Kalgin
p. 187-190