Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2018_2_a3, author = {N. Tokareva and A. Gorodilova and S. Agievich and V. Idrisova and N. Kolomeec and A. Kutsenko and A. Oblaukhov and G. Shushuev}, title = {Mathematical methods in solutions of the problems presented at the {Third} {International} {Students'} {Olympiad} in {Cryptography}}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {34--58}, publisher = {mathdoc}, number = {2}, year = {2018}, language = {en}, url = {http://geodesic.mathdoc.fr/item/PDM_2018_2_a3/} }
TY - JOUR AU - N. Tokareva AU - A. Gorodilova AU - S. Agievich AU - V. Idrisova AU - N. Kolomeec AU - A. Kutsenko AU - A. Oblaukhov AU - G. Shushuev TI - Mathematical methods in solutions of the problems presented at the Third International Students' Olympiad in Cryptography JO - Prikladnaâ diskretnaâ matematika PY - 2018 SP - 34 EP - 58 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDM_2018_2_a3/ LA - en ID - PDM_2018_2_a3 ER -
%0 Journal Article %A N. Tokareva %A A. Gorodilova %A S. Agievich %A V. Idrisova %A N. Kolomeec %A A. Kutsenko %A A. Oblaukhov %A G. Shushuev %T Mathematical methods in solutions of the problems presented at the Third International Students' Olympiad in Cryptography %J Prikladnaâ diskretnaâ matematika %D 2018 %P 34-58 %N 2 %I mathdoc %U http://geodesic.mathdoc.fr/item/PDM_2018_2_a3/ %G en %F PDM_2018_2_a3
N. Tokareva; A. Gorodilova; S. Agievich; V. Idrisova; N. Kolomeec; A. Kutsenko; A. Oblaukhov; G. Shushuev. Mathematical methods in solutions of the problems presented at the Third International Students' Olympiad in Cryptography. Prikladnaâ diskretnaâ matematika, no. 2 (2018), pp. 34-58. http://geodesic.mathdoc.fr/item/PDM_2018_2_a3/
[1] Agievich S., Gorodilova A., Kolomeec N., et al., “Problems, solutions and experience of the first international student's Olympiad in cryptography.”, Prikladnaya Diskretnaya Matematika, 2015, no. 3, 41–62 | DOI
[2] Agievich S., Gorodilova A., Idrisova V., et al., “Mathematical problems of the second international student's Olympiad in cryptography”, Cryptologia, 41:6 (2017), 534–565 | DOI
[3] Geut K., Kirienko K., Sadkov P., et al., “On explicit constructions for solving the problem ‘A secret sharing’ ”, Prikladnaya Diskretnaya Matematika. Prilozhenie, 2017, no. 10, 68–70 (in Russian) | DOI
[4] Rathgeb C., Uhl C., “A survey on biometric cryptosystems and cancelable biometrics”, EURASIP J. Inform. Security, 2011 (2011), 3 | DOI
[5] Diffie W., Van Oorschot P. C., Wiener M. J., “Authentication and authenticated key exchanges”, Designs, Codes and Cryptography, 2:2 (1992), 107–125 | DOI | MR
[6] Daemen J., Rijmen V., The Design of Rijndael: AES – the Advanced Encryption Standard, Springer Verlag, 2002 | MR | Zbl
[7] Nakamoto S., Bitcoin: a peer-to-peer electronic cash system, Available at , 2009 https://bitcoin.org/bitcoin.pdf
[8] Carlet C., “On the algebraic immunities and higher order nonlinearities of vectorial Boolean Functions”, Proc. NATO Advanced Research Workshop ACPTECC (Veliko Tarnovo, Bulgaria, October 6–9, 2008), IOS Press, Amsterdam, 2009, 104–116 | MR