@article{MVK_2010_1_3_a4,
author = {V. G. Smirnov},
title = {Methods of solution of systems of quasisymmetric equations with applications to the analysis of clock-controlled generators},
journal = {Matemati\v{c}eskie voprosy kriptografii},
pages = {67--91},
year = {2010},
volume = {1},
number = {3},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/MVK_2010_1_3_a4/}
}
TY - JOUR AU - V. G. Smirnov TI - Methods of solution of systems of quasisymmetric equations with applications to the analysis of clock-controlled generators JO - Matematičeskie voprosy kriptografii PY - 2010 SP - 67 EP - 91 VL - 1 IS - 3 UR - http://geodesic.mathdoc.fr/item/MVK_2010_1_3_a4/ LA - ru ID - MVK_2010_1_3_a4 ER -
%0 Journal Article %A V. G. Smirnov %T Methods of solution of systems of quasisymmetric equations with applications to the analysis of clock-controlled generators %J Matematičeskie voprosy kriptografii %D 2010 %P 67-91 %V 1 %N 3 %U http://geodesic.mathdoc.fr/item/MVK_2010_1_3_a4/ %G ru %F MVK_2010_1_3_a4
V. G. Smirnov. Methods of solution of systems of quasisymmetric equations with applications to the analysis of clock-controlled generators. Matematičeskie voprosy kriptografii, Tome 1 (2010) no. 3, pp. 67-91. http://geodesic.mathdoc.fr/item/MVK_2010_1_3_a4/
[1] Smirnov V. G., “Metody resheniya sistem diskretnykh uravnenii, osnovannye na postroenii grafa reshenii”, Trudy po diskretnoi matematike, 9, Gelios-ARV, M., 2006, 308–339
[2] Smirnov V. G., “Effektivnye algoritmy postroeniya grafa obschego resheniya dlya sistemy bulevykh uravnenii”, Trudy po diskretnoi matematike, 5, FIZMATLIT, M., 2002, 227–234
[3] Smirnov V. G., “Metody postroeniya grafov reshenii dlya sistem $k$-znachnykh uravnenii”, Trudy po diskretnoi matematike, 8, FIZMATLIT, M., 2004, 253–280
[4] Kormen T., Leizerson Ch., Rivest R., Algoritmy: postroenie i analiz, MTsNMO, M., 2001
[5] Balakin G. V., “Vvedenie v teoriyu sluchainykh sistem uravnenii”, Trudy po diskretnoi matematike, 1, TVP, M., 1997, 1–18 | MR | Zbl
[6] Birkgof G., Teoriya struktur, IL, M., 1951
[7] Sachkov V. N., Vvedenie v kombinatornye metody diskretnoi matematiki, Nauka, M., 1982 | MR | Zbl
[8] Potochnye shifry. Rezultaty zarubezhnoi otkrytoi kriptologii, M., 1997
[9] Shnaier B., Prikladnaya kriptografiya. Protokoly, algoritmy, iskhodnye teksty na yazyke Si, Triumf, M., 2002
[10] Al-Hinai S., Batten L., Colbert B., “Algebraic attacks on clock-controlled stream ciphers”, Lect. Notes Comput. Sci., 4058, 2006, 1–16 | Zbl