@article{MVK_2015_6_3_a1,
author = {O. V. Denisov},
title = {On the algorithm of detecting the essential arguments of random {Boolean} function},
journal = {Matemati\v{c}eskie voprosy kriptografii},
pages = {19--32},
year = {2015},
volume = {6},
number = {3},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/MVK_2015_6_3_a1/}
}
O. V. Denisov. On the algorithm of detecting the essential arguments of random Boolean function. Matematičeskie voprosy kriptografii, Tome 6 (2015) no. 3, pp. 19-32. http://geodesic.mathdoc.fr/item/MVK_2015_6_3_a1/
[1] Ambrosimov A. S., “Svoistva bent-funktsii $q$-znachnoi logiki nad konechnymi polyami”, Diskretnaya matematika, 6:3 (1994), 50–60 | MR | Zbl
[2] Borovkov A. A., Teoriya veroyatnostei, Editorial URSS, M., 1999, 472 pp. | MR
[3] Viktorova I. I., Leontovich A. M., “O chisle proverok dlya opredeleniya znachimykh peremennykh bulevoi funktsii”, Problemy peredachi informatsii, 14:4 (1978), 85–97 | MR | Zbl
[4] Denisov O. V., “Statisticheskaya otsenka mnozhestva suschestvennykh argumentov dvoichnoi vektor-funktsii s iskazhennymi znacheniyami”, Matematicheskie voprosy kriptografii, 5:4 (2014), 41–61
[5] Ivchenko G. I., Medvedev Yu. I., Mironova V. A., “Analiz spektra simmetricheskikh bulevykh funktsii”, Matematicheskie voprosy kriptografii, 4:1 (2013), 59–76
[6] Malyutov M. B., “O randomizirovannom planirovanii otseivayuschikh eksperimentov”, Planirovanie i avtomatizatsiya v nauchnykh issledovaniyakh, Sb., Sov. radio, M., 1974, 60–72
[7] Malyutov M. B., Tsitovich I. I., “Posledovatelnyi poisk suschestvennykh peremennykh neizvestnoi funktsii”, Problemy peredachi informatsii, 33:4 (1997), 88–107 | MR | Zbl
[8] Tsitovich I. I., “Posledovatelnyi plan dlya opredeleniya znachimykh peremennykh bulevskoi funktsii”, Analiz sistem informatiki, Sb., Nauka, M., 1991, 10–16
[9] Shabanin O. V., “O slozhnosti diz'yunktivnoi normalnoi formy porogovykh funktsii”, Diskretnaya matematika, 12:2 (2000), 85–92 | DOI | MR | Zbl
[10] Erdesh P., Spenser Dzh., Veroyatnostnye metody v kombinatorike, Mir, M., 1976, 131 pp. | MR
[11] Siegenthaler T., “Descrypting a class of stream ciphers using ciphertext only”, IEEE Trans. Computers, 34:1 (1985), 81–85 | DOI