Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaya Diskretnaya Matematika. Supplement
Année 2017
Précédent
Suivant
Sommaire du
Fascicule no. 10
Generalized 312-avoiding GS-permutations and Lehmer's transformation
L. N. Bondarenko
;
M. L. Sharapova
p. 7-9
Characterization of linear transformations defined by Finite Field Hadamard Matrices and circulant matrices
A. V. Volgin
;
G. V. Kryuchkov
p. 10-11
On reducing the order of linear recurrence equations with constant coefficients
K. L. Geut
;
S. S. Titov
p. 12-13
On primitivity of mixing digraphs for substitutions of shift registers
V. S. Grigoriev
;
V. M. Fomichev
p. 14-16
Digit-polynomial construction of substitutions over Galois ring
M. V. Zaets
p. 17-19
The Cayley graph of a~subgroup of the Burnside group~
$B_0(2,5)$
A. A. Kuznetsov
;
A. S. Kuznetsova
p. 19-21
On homogeneous matroids and block-schemes
N. V. Medvedev
;
S. S. Titov
p. 21-23
On maximal metrically regular sets
A. K. Oblaukhov
p. 23-24
On the anisometric index of a~transformation
B. A. Pogorelov
;
M. A. Pudovkina
p. 25-27
One approach to constructing a~transitive class of block transformations
I. V. Cherednik
p. 27-29
Hyperelliptic curves, Cartier--Manin matrices and Legendre polynomials
S. A. Novoselov
p. 29-32
On connection between affine splitting of a~Boolean function and its algebraic, combinatorial and cryptographic properties
A. A. Babueva
p. 33-34
A classification of differentially nonequivalent quadratic APN function in~5 and~6 variables
A. A. Gorodilova
p. 35-36
On constructing special APN functions and their link with APN permutations
V. A. Idrisova
p. 36-38
Properties of coordinate functions for a~class of permutations on~
$\mathbb F_2^n$
L. A. Karpova
;
I. A. Pankratova
p. 38-40
A bent function construction by a~bent function that is affine on several cosets of a~linear subspace
N. A. Kolomeec
p. 41-42
On some properties of known isometric mappings of the set of bent functions
A. V. Kutsenko
p. 43-44
Permutation binomials over finite fields. Conditions of existence
A. V. Miloserdov
p. 44-45
Lower bounds of dimension of linear codes for~CDMA
N. S. Odinokikh
p. 45-46
Refined asymptotic estimates for the number of
$(n,m,k)$
-resilient Boolean mappings
K. N. Pankov
p. 46-49
Component algebraic immunity of S-boxes used in some block ciphers
D. P. Pokrasenko
p. 49-51
The method for implementation of substitutions
$S_{16}$
by algebraic threshold functions
D. A. Soshin
p. 51-54
A condition for uniqueness of linear decomposition of a~Boolean function into disjunctive sum of indecomposable functions
A. V. Cheremushkin
p. 55-56
Some decompositions for quadratic Boolean threshold functions
A. N. Shurupov
p. 56-59
On primitivity of some sets of shift registers mixing digraphs
Y. E. Avezova
p. 60-62
Solving the problem of Boolean satisfiability for estimating the security of block ciphers Magma and PRESENT to algebraic cryptanalysis
L. K. Babenko
;
E. A. Maro
p. 62-64
Cryptographic analysis of the generalized ElGamal's cipher over~
$\operatorname{GL}(8,\mathbb F_{251})$
D. D. Bolotov
;
E. A. Magdin
p. 64-66
The Reed--Muller code square and equivalence classes of McEliece--Sidelnikov cryptosystem private keys
V. V. Vysotskaya
p. 66-68
On explicit constructions for solving the problem ``A~secret sharing''
K. L. Geut
;
K. A. Kirienko
;
P. O. Sadkov
;
R. I. Taskin
;
S. S. Titov
p. 68-70
The assembler program is a~container for a~text
E. Yu. Gracheva
;
M. Ya. Tovsteyn
p. 71-73
About handwritten signature verification
A. V. Epishkina
;
A. V. Beresneva
;
S. S. Babkin
;
A. S. Kurnev
;
V. U. Lermontov
p. 73-76
Self-programmable cellular automata for cryptography
A. A. Efremova
;
A. N. Gamova
p. 76-81
Construction of
$(4,8)$
-schemes of visual cryptography on the base of a~class of linear hash functions
N. A. Zorina
;
Y. V. Kosolapov
p. 81-83
Exponents of mixing digraphs associated with one and two feedbacks shift registers
A. M. Koreneva
p. 84-87
Structure of local primitive digraphs
S. N. Kyazhin
p. 87-89
A version of the Diffie--Hellman protocol based on using additional hidden factors
A. A. Obzor
p. 89-91
On properties of
$W$
-permutations over the residue ring
M. A. Pudovkina
;
A. S. Makeyev
p. 92-93
On mathematical models of key mixing for iterative block encryption algorithms
D. A. Romanko
;
V. M. Fomichev
p. 93-96
On characteristics of local primitive matrices and digraphs
V. M. Fomichev
p. 96-99
On characteristics of a~three-stage key generator with an alternating step modified with key generator ``stop-forward''
V. M. Fomichev
;
D. M. Kolesova
p. 99-101
S-boxes algorithmic realization based on modified additive generators
V. M. Fomichev
;
D. M. Lolich
;
A. V. Yuzbashev
p. 102-104
On the construction of
$s$
-boxes of
$4\times4$
size
V. M. Fomichev
;
P. V. Ovchinnikov
p. 104-106
Cryptautomata: definition, cryptanalysis, example
G. P. Agibalov
p. 106-110
Implementation of a~non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-model
P. N. Devyanin
p. 111-114
Towards ABAC Engine framework
D. N. Kolegov
;
O. V. Broslavsky
;
N. E. Oleksov
p. 115-120
Machine learning based anomaly detection method for SQL
A. I. Murzina
p. 121-122
Identification method for function calling conventions in binary applications
M. A. Stanchin
;
N. V. Sorokovikov
p. 122-123
The reliability of circuits in Rosser--Turkett basis (in
$P_3$
) with faults of type~
$0$
at the outputs of gates
M. A. Alekhina
;
O. Yu. Barsukova
p. 124-126
On the reliability of circuits in some full bases (in
$P_3$
) with inverse faults at the gate outputs
M. A. Alekhina
;
O. Yu. Barsukova
p. 126-128
The unreliability of logic circuits of unreliable functional elements
M. A. Alekhina
;
Yu. S. Gusynina
;
T. A. Shornikova
p. 128-130
About primitive regular graphs with exponent~2
M. B. Abrosimov
;
S. V. Kostin
p. 131-134
Upper and lower bounds of the number of additional arcs in a~minimal edge
$1$
-extension of oriented path
M. B. Abrosimov
;
O. V. Modenova
p. 134-136
About generation of non-isomorphic vertex
$k$
-colorings
M. B. Abrosimov
;
P. V. Razumovsky
p. 136-138
On the number of spanning trees in labeled cactus
V. A. Voblyi
p. 139-140
Identification method for invertible finite state machine with known output function
A. O. Zhukovskaja
;
V. N. Trenkaev
p. 140-142
Application of edge local complementation to McEliece cryptosystem structural analysis
A. A. Sokolova
p. 142-144
Cyclic permutation of elements in one-dimensional array
V. V. Gotsulenko
p. 145-149
An analogue of implicit mapping theorem to formal grammars
O. I. Egorushkin
;
I. V. Kolbasina
;
K. V. Safonov
p. 149-151
Sketch completion for predicate programs by counterexamples guided synthesis
M. S. Chushkin
p. 151-153
Algorithm for constructing a~non-redundant minimax basis of strong associative rules
V. V. Bykova
;
A. V. Kataeva
p. 154-157
The inversion of cryptographic hash functions using unbalanced approximations of round functions
I. A. Gribanova
p. 157-160
Based on the relative similarity coefficients ranking characteristics forming the cluster partition
S. V. Dronov
;
E. A. Evdokimov
p. 160-162
About the potential for the ellipsoid method application to the threshold function recognition
I. I. Lapikov
p. 163-165
Threshold interpolations in solving nonlinear Boolean equation by method of separating planes
V. G. Nikonov
;
A. N. Shurupov
p. 165-168
Two-phase routing algorithm in the time-dependent networks
A. A. Soldatenko
p. 168-171