Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaya Diskretnaya Matematika. Supplement
Année 2015
Précédent
Suivant
Sommaire du
Fascicule no. 8
MacMahon's statistics properties on sets of words
L. N. Bondarenko
;
M. L. Sharapova
p. 6-8
Mixing digraphs of transformations based on shift registers with two feedbacks
A. M. Dorokhova
p. 8-11
On local exponents of the mixing graphs for the functions realized by A5/1 type algorithms
S. N. Kyazhin
;
V. M. Fomichev
p. 11-13
On some metrical properties of linear subspaces in Boolean cube
A. K. Oblaukhov
p. 13-15
Properties of the group generated by translation groups of the vector space and the residue ring
B. A. Pogorelov
;
M. A. Pudovkina
p. 15-16
$\otimes_{\mathbf W,\mathrm{ch}}$
-markovian transformations
B. A. Pogorelov
;
M. A. Pudovkina
p. 17-19
On degree structure of graphs
V. M. Fomichev
p. 20-22
On the number of symmetric coordinate functions of APN function
V. A. Vitkup
p. 23-25
On intersection of derivatives images for APN functions
A. A. Gorodilova
p. 25-27
Research of the group of bijective differentiable modulo
$p^n$
functions
A. S. Ivachev
p. 27-30
The inverse of differentiable permutations over groups
A. V. Karpov
p. 30-32
On the minimal distance graph connectivity for bent functions
N. A. Kolomeec
p. 33-34
On self dual bent functions
A. V. Kutsenko
p. 34-35
On the invertibility of vector Boolean functions
I. A. Pankratova
p. 35-37
On algebraic immunity of vector Boolean functions
D. P. Pokrasenko
p. 37-39
Properties of
$p$
-ary bent functions that are at minimal distance from each other
V. N. Potapov
p. 39-43
Enumeration of Boolean functions with a~fixed number of affine products
A. V. Cheremushkin
p. 43-47
Some structural properties of quadratic Boolean threshold functions
A. N. Shurupov
p. 48-51
On properties of the set of values of an arbitrary vector Boolean function
G. I. Shushuev
p. 51-53
Watermarking ciphers
G. P. Agibalov
p. 54-59
Public-key cryptosystem based on fully homomorphic encryption
V. V. Egorova
;
D. K. Chechulina
p. 59-61
Addition modulo
$2^n$
in block ciphers
A. M. Karondeev
p. 62-63
Non-endomorphic perfect ciphers with two elements in plaintext alphabet
N. V. Medvedeva
;
S. S. Titov
p. 63-66
Preliminary evaluation of a~minimal number of rounds in lightweight block ciphers for providing their satisfactory statistical properties
A. I. Pestunov
p. 66-68
$\otimes_{\mathbf W,\mathrm{ch}}$
-markovian and imprimitive properties of block ciphers
B. A. Pogorelov
;
M. A. Pudovkina
p. 69-71
On generic complexity of the quadratic residuosity problem
A. N. Rybalov
p. 71-73
NSUCRYPTO~-- a~student's olympiad in cryptography: an idea, realization and results
N. N. Tokareva
p. 74-75
Ciphertexts-only attack on a~linear fully homomorphic cryptosystem
A. V. Trepacheva
p. 75-78
A secure distributed protocol in a~competitive environment of a~CTF contests kind
N. I. Anisenya
p. 79-80
Security violation necessary conditions for time information flows in MROSL DP-model
P. N. Devyanin
p. 81-83
Implementation of covert timing channels based on HTTP cache headers in cloud file storage services
D. N. Kolegov
;
O. V. Broslavsky
;
N. E. Oleksov
p. 83-85
Non-invasive integrity control method for cookie in web applications
D. N. Kolegov
;
O. V. Broslavsky
;
N. E. Oleksov
p. 85-89
Non-invasive method of mandatory access control implementaion on DBMS layer in web applications
D. N. Kolegov
;
N. O. Tkachenko
p. 89-92
Implementation of DNS Rebinding
T. I. Milovanov
p. 92-95
Attribute based access control for key-value stores
S. Ovsyannikov
;
V. Trenkaev
p. 95-96
The capacity of a~packet length covert channel
A. V. Epishkina
;
K. G. Kogos
p. 96-99
Unreliability of circuits in case of constant failures on inputs and outputs of gates
M. A. Alekhina
p. 100-102
A lower bound for unreliability of circuits in the Webb basis
M. A. Alekhina
;
O. U. Barsukova
p. 102-103
Lower bounds for unreliability of circuits in the Rosser--Tourkett basis
M. A. Alekhina
;
S. P. Kargin
p. 104-105
An upper bound for reliability of non-branching programs with an unreliable stop-operator
S. M. Grabovskaya
p. 106-108
On length, height and reliability of circuits realizing selection function
A. V. Rybakov
p. 108-110
Number estimation for additional arcs in a~minimal
$1$
-vertex extension of tournament
M. B. Abrosimov
;
O. V. Modenova
p. 111-113
Primitiveness conditions for systems of two graphs
Y. E. Avezova
;
V. M. Fomichev
p. 113-114
On number of inaccessible states in finite dynamic systems of binary vectors associated with palms orientations
A. V. Zharkova
p. 115-117
Perfect binary codes of infinite length
S. A. Malyugin
p. 117-120
Low power race-free state assignment of an asynchronous automaton
Yu. V. Pottosin
p. 120-123
The Sperner property for trees
V. N. Salii
p. 124-127
On the diversity of balls in a~graph of a~given diameter
T. I. Fedoryaeva
p. 127-128
Modification of LYaPAS for operating systems development
S. Yu. Grechnev
;
D. A. Stefantsov
p. 129-131
Operational semantics for LYaPAS
A. O. Zhukovskaja
;
D. A. Stefantsov
p. 131-132
The programming-libraries management system for LYaPAS
V. O. Safonov
p. 133-134
The development of an operating system in LYaPAS
D. A. Stefantsov
;
P. A. Tomskih
p. 134-135
Solving linear inequalities systems with local search algorithms
N. V. Anashkina
;
A. N. Shurupov
p. 136-138
Application of algorithms solving SAT problem to cryptanalysis of hash functions of MD family
I. A. Bogachkova
;
O. S. Zaikin
;
S. E. Kochemazov
;
I. V. Otpuschennikov
;
A. A. Semenov
p. 139-142
Calculation of upper bounds for graph vertex integrity based on the minimal separators
V. V. Bykova
;
Y. I. Kirillov
p. 142-144
Construction of an error function for solving the text ranking identification problem
O. A. Kozhushko
p. 144-147
Hall's polynomials over Burnside groups of exponent three
A. A. Kuznetsov
;
K. V. Safonov
p. 147-149
On the complexity of discrete logarithm problem in a~finite cyclic group with the efficient inversion
M. V. Nikolaev
p. 149-151
Implementation of a~neural WTA-network on the memristor crossbar
M. S. Tarkov
p. 151-154