Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaâ diskretnaâ matematika
Année 2010
no. 12
Précédent
Suivant
Volume (2010) no. 12
Sommaire
Optimal curves of genus~
$3$
over finite field with discriminant~
$-19$
E. S. Alekseenko
;
S. I. Aleshnikov
;
A. I. Zaytsev
p. 6-7
Some properties of the discrete Fourier transform in the field of complex numbers and in the fields of finite characteristics
A. M. Grishin
p. 7-9
Constructing the classes of Boolean functions with guaranteed cryptographic properties on the base of coordinate functions of the finite field power mappings
A. V. Ivanov
;
V. N. Romanov
p. 10-11
Connections between subspaces on which bent function and its dual function are affine
N. A. Kolomeec
p. 11-12
A new combinatorial construction of bent functions
N. N. Tokareva
p. 13-14
Generation of the alternating group by semiregular involutions
M. E. Tuzhilin
p. 14-15
The properties of external control sequences
V. M. Fomichev
p. 15-19
Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key information
V. U. Zolotukhin
;
T. A. Chalkin
p. 20-21
On the reduction of key space for A5/1
S. A. Kiselyov
p. 21-23
A hardware implementation of the cryptosystem based on the Zakrevskij FSM
A. V. Miloshenko
p. 23-24
Complexity estimation for a~differential attack on a~block cipher with given parameters
A. I. Pestunov
p. 25-27
On weak key-scheduling algorithms relatively the related-key attack
M. A. Pudovkina
p. 27-29
Attacks on full block cipher GOST 28147-89 with~2 or~4 related keys
M. A. Pudovkina
;
G. I. Khoruzhenko
p. 29-30
Differential attack on 6-round Whirlpool-like block ciphers
M. A. Pudovkina
p. 30-31
High-speed pseudorandom sequence generators based on cellular automata
B. M. Sukhinin
p. 32-34
The relationship between structure of the key space and hardness of the McEliece--Sidelnikov Public Key Cryptosystem
I. V. Chizhov
p. 34-35
Symmetric cipher on the base of non-commutative algebra of polynomials
I. V. Shirokov
p. 35-36
Steganography and steganalysis in video files
O. V. Modenova
p. 37-39
On steganographic system selection rule
E. V. Razinkov
;
R. Kh. Latypov
p. 39-41
Fingerprints resistant to collusion attacks
T. M. Solovjev
;
R. I. Chernyak
p. 41-44
About the fact of detecting the noise in finite Markov chain with an unknown transition probability matrix
A. M. Shoytov
p. 44-45
The search of
$\operatorname{tg}$
-paths and islands for Take-Grant security model
D. M. Brechka
p. 46-47
Electronic mail systems access control and information flow control modeling
K. A. Grishchenko
p. 47-49
Security analysis of systems with simple trajectories functioning within framework of the base role DP-model
P. N. Devyanin
p. 49-51
About time information flows in computer systems
M. A. Kachanov
p. 52-53
Teaching the protected computer nets design at the Cisco platform
D. N. Kolegov
p. 53-55
Adaptive algorithm for anomalous network traffic indication based on alternating process
O. V. Nissenbaum
;
A. S. Prisyazhnuk
p. 55-58
Authentication in multi-tier system using commutative encryption
P. A. Pautov
p. 59-60
The code injection to the process under an operating system GNU/Linux
I. V. Smith
p. 61-62
Design and development of Capture the Flag game server for competitions in information security
N. O. Tkachenko
;
D. V. Chernov
p. 62-64
Using Scyther for analysis SKID3 security
M. I. Tsoy
p. 65-66
On minimal edge
$k$
-extensions of oriented stars
M. B. Abrosimov
p. 67-68
On minimal vertex 1-extensions of special form superslim trees
M. B. Abrosimov
;
D. D. Komarov
p. 68-70
Application of unreliable tests for self-diagnostics of modular computing systems with multiple faults
Yu. K. Dimitriev
;
A. F. Zadorozhny
p. 70-72
About one family of exact 2-extensions of tournaments
A. A. Dolgov
p. 72-73
An analytical approach to the synthesis of regular structures of fault-tolerant systems
V. A. Melent'ev
p. 74-75
Elasticity of algorithms
V. V. Bykova
p. 76-78
Resource usage analysis in software
V. V. Gorelov
p. 78-79
An approach to fuzz testing data generation for applied and system software
A. N. Makarov
p. 79-81
Software translating of combinatorial problems to propositional logic
I. V. Otpuschennikov
;
A. A. Semenov
p. 81-82
On representation of context-free languages by diagonals of linear laguages
K. V. Safonov
;
D. A. Kalugin-Balashov
p. 82-83
Formal proof of the semantic equivalence between the core of the AOP language AspectTalk and the OOP language Smalltalk
D. A. Stephantsov
;
A. E. Kryukova
p. 84-85
Cryptanalysis with graphical processing units (GPU)
D. V. Bespalov
;
V. G. Bulavintsev
;
A. A. Semenov
p. 86-87
Experimental estimation for software implementation speed of some block cipher's transformations
A. A. Dmukh
p. 87-88
Estimatiing complexity of directed enumeration in non-uniformly distributed key spaces
I. V. Pankratov
;
O. A. Teploukhova
p. 88-90
Minimization procedure for Hamiltonian Circuit and Graph Isomorphism problems
R. T. Faizullin
p. 90-91
On constructing minimal deterministic finite automaton recognizing a~prefix-code of given cardinality
I. R. Akishev
;
M. E. Dvorkin
p. 92-94
About relationship between parameters of certain graphs
I. A. Badeha
;
P. V. Roldugin
p. 94-95
Bent functions and linear codes for CDMA
A. V. Pavlov
p. 95-97
On a~new complete invariant for acyclic graphs
A. V. Prolubnikov
p. 97-98
On the frame of an automaton
V. N. Salii
p. 98-99
Classes of graphs reconstructed with
E. A. Tatarinov
p. 99-101
Reconfigurable finite state machines with shared memory
V. N. Trenkaev
p. 101-102
State estimation for stochastic object on the base of modeling trend in time series
S. I. Kolesnikova
;
A. A. Belous
p. 103-105
Logical inference on the base of optimal subset of mixed diagnostic tests for intelligent systems
A. E. Yankovskaya
;
A. I. Gedike
p. 105-108