Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaya Diskretnaya Matematika. Supplement
Année 2024
no. 17
Précédent
Volume (2024) no. 17
Sommaire
Isomorphisms of
$5$
-configurations obtained from
$2$
-digraphs
M. M. Komiagin
p. 6-9
Exact formula for expectation of number of pairs of coinciding
$s$
-chains in a random binary sequence with fixed number of zeroes and ones
V. I. Kruglov
p. 9-11
The characteristic polynomials of geometrically split ordinary abelian varieties of dimension
$3$
S. A. Novoselov
p. 12-16
On permutations perfectly diffusing classes of partitions of
$V_n^l(2^m)$
B. A. Pogorelov
;
M. A. Pudovkina
p. 16-19
Medial and paramedial alebras with strong dependable operations
A. V. Cheremushkin
p. 19-23
On the number of the closest bent functions to some Maiorana--McFarland bent functions
D. A. Bykov
;
N. A. Kolomeets
p. 24-27
Research of boomerang uniformity of quadratic permutations
Y. S. Kalinin
p. 28-34
On the number of functions that break subspaces of dimension
$3$
and higher
N. A. Kolomeets
p. 34-37
Characterization of generalized bent functions of algebraic degree
$1$
A. V. Kutsenko
p. 37-40
On the construction of invertible vector Boolean functions
I. A. Pankratova
;
P. R. Garchukova
p. 40-44
Cryptanalytic invertibility of three-argument functions
I. A. Pankratova
;
A. D. Sorokoumova
p. 44-48
On possibility to construct algebraic immune S-boxes by choosing coordinate Boolean functions
I. S. Khilchuk
p. 48-50
Related-Key Attacks on Signature-based Authenticated Key Establishment Protocols
E. K. Alekseev
;
S. N. Kyazhin
p. 51-57
Constructing algebraic attacks on lightweight symmetric ciphers using functions with small number of output bits
K. V. Antonov
;
A. A. Semenov
;
I. V. Otpushchennikov
;
A. L. Pavlenko
p. 57-63
On the security of some algorithms over a group of points of elliptic curves
A. O. Bakharev
;
K. D. Tsaregorodtsev
p. 63-70
Investigation of signal conversion designs with TRNG based on ring oscillators
D. A. Bobrovskiy
;
D. A. Shilikov
p. 70-74
Some properties of sequences generated by the GEA-1 encryption algorithm
A. D. Bugrov
;
O. V. Kamlovskii
;
V. V. Mizerov
p. 75-78
Matrix of transition probabilities of differentials of 8-round Luby~--- Rackoff scheme
M. M. Glukhov
;
O. V. Denisov
p. 79-81
Differential-linear distinguishing attacks on block ciphers
O. V. Denisov
;
S. M. Ramodanov
p. 81-90
Preimage attack on 44-step MD4 compression function with weakened last step
O. S. Zaikin
p. 90-93
Algorithm for quickly generating a key sequence using a quantum communication channel
S. Yu. Kazantsev
;
K. N. Pankov
p. 93-98
Post-quantum distinguishing attack on one block ciphers mode of operation
A. M. Koreneva
;
G. V. Firsov
p. 98-102
Independence of events in spaces of equally probable ciphervalues
N. V. Medvedeva
;
S. S. Titov
p. 102-106
Lightweight Authentication Encryption: a Review of Approaches
S. P. Panasenko
p. 106-111
Quantum cryptanalysis of the KB-256 block cipher
M. V. Polyakov
;
A. M. Koreneva
p. 112-115
An attack on 6-round XSL-block ciphers
M. A. Pudovkina
;
A. M. Smirnov
p. 115-117
Ten years of the International Olympiad in Cryptography NSUCRYPTO
N. N. Tokareva
p. 117-118
Parameter analysis of the post-quantum Hypericum signature scheme
O. Yu. Turchenko
;
S. R. Usmanov
p. 119-120
On mixing properties of register transformations of ciphers TEA1 and TEA2
P. A. Chezhegova
;
A. M. Koreneva
;
M. V. Polyakov
;
G. V. Firsov
p. 120-122
On solving linear homogeneous grammars generating linear languages
O. I. Egorushkin
;
I. V. Kolbasina
;
K. V. Safonov
p. 123-125
Application of finite dynamic systems for information security
A. V. Zharkova
p. 125-129
Efficiency measurement system for zk-SNARK circuits internal representation
D. O. Kondyrev
p. 129-131
Using ELF relocations for executable encryption
R. K. Lebedev
;
V. E. Sitnov
p. 131-134
Classification of trees whose maximal subtrees are all isomorphic
M. B. Abrosimov
;
D. A. Tomilov
p. 135-137
On codes with unique decoding to the nearest
D. S. Ananichev
;
K. L. Geut
;
S. S. Titov
p. 138-140
Generalized
$(L,G)$
-codes in weighted Haming metric for information security
S. V. Bezzateev
p. 140-143
Properties of the polarizing matrix of a polar code and calculation of Bhattacharyya parameters
A. D. Bolotnikova
;
S. G. Kolesnikov
;
V. M. Leontiev
;
A. I. Semenov
p. 144-147
Quasi-cyclic alternant codes and analysis of their security in cryptographic applications
A. A. Kuninets
p. 147-152
Finite-state generators with maximal period
E. S. Prudnikov
p. 152-154
On the structure of tournaments consisting of only kings
A. O. Shabarkova
;
M. B. Abrosimov
p. 154-156
Research of
$k$
-sieve algorithm for solving the shortest vector problem in a lattice
A. O. Bakharev
p. 157-162
Modular arithmetic optimization in Kyber KEM
A. S. Zelenetsky
;
P. G. Klyucharev
p. 162-166