Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaya Diskretnaya Matematika. Supplement
Année 2020
Précédent
Suivant
Sommaire du
Fascicule no. 13
Refractive bijections in Steiner triples
M. V. Vedunova
;
K. L. Geut
;
A. O. Ignatova
;
S. S. Titov
p. 6-8
On homogeneous matroids corresponding to block-schemes
N. V. Medvedev
;
S. S. Titov
p. 8-12
An algorithm for computing the Stickelberger elements for imaginary multiquadratic fields
D. O. Olefirenko
;
E. A. Kirshanova
;
E. S. Malygina
;
S. A. Novoselov
p. 12-17
On the continuation to bent functions and upper bounds on their number
S. V. Agievich
p. 18-21
On metrical properties of the set of self-dual bent functions
A. V. Kutsenko
p. 21-27
Cryptographic properties of some vectorial Boolean functions compositions
E. S. Lipatova
p. 27-29
Cryptographic properties of orthomorphic permutations
J. P. Maksimluk
p. 29-31
On the decomposition of a vectorial Boolean function into a composition of two functions
G. M. Pintus
p. 31-32
An estimation of the nonlinearity of balanced Boolean functions generated by generalized Dobbertin's construction
I. A. Sutormin
p. 33-35
Connections between quaternary and component Boolean bent functions
A. S. Shaporenko
p. 35-37
On a secondary construction of quadratic APN functions
K. V. Kalgin
;
V. A. Idrisova
p. 37-39
On one-to-one property of a vectorial Boolean function of the special type
M. M. Zapolskiy
;
N. N. Tokareva
p. 40-41
Cryptographic properties of a simple S-box construction based on a Boolean function and a permutation
D. A. Zyubina
;
N. N. Tokareva
p. 41-43
Post-quantum signature proposal for standardisation
E. A. Kirshanova
;
N. S. Kolesnikov
;
E. S. Malygina
;
S. A. Novoselov
p. 44-51
Constructions of non-endomorphic perfect ciphers
N. V. Medvedeva
;
S. S. Titov
p. 51-54
Construction of distinguishers for iterative block ciphers on the base of neural networks
A. A. Perov
;
A. I. Pestunov
p. 54-56
About the hidden compact way to store data
V. A. Roman'kov
p. 56-59
Experimental estimates of the computational complexity of one class of cryptoalgorithms based on the generalization of Feistel networks
V. M. Fomichev
;
D. A. Bobrovskiy
;
A. M. Koreneva
p. 59-62
Characteristics of the data integrity check algorithm based on additive generators and
$s$
-boxes
V. M. Fomichev
;
A. M. Koreneva
;
T. R. Nabiev
p. 62-66
Analysis of block cipher modes of operation for RFID devices
K. D. Tsaregorodtsev
p. 67-69
One approach to constructing a multiply transitive class of block transformations
I. V. Cherednik
p. 69-71
Elaboration of selfish-mine strategy
A. V. Cheremushkin
p. 71-77
On the number of unsuitable Boolean functions in constructions of filter and combining models of stream ciphers
T. A. Bonich
;
M. A. Panferov
;
N. N. Tokareva
p. 78-80
Efficient
$S$
-repetition method for constructing an IND-CCA2 secure McEliece modification in the standard model
Y. V. Kosolapov
;
O. Y. Turchenko
p. 80-84
Neural network obfuscation for computations over encrypted data
V. L. Eliseev
p. 85-93
Method for hiding private data in the blockchain tender system
D. O. Kondyrev
p. 93-94
Validation-free offchain transactions with unlinkable double spend detection
S. N. Kyazhin
;
K. A. Klimenko
p. 94-97
New estimates for dimension of Reed~--- Muller subcodes with maximum Hadamard square
V. V. Vysotskaya
p. 98-100
On number of inaccessible states in finite dynamic systems of complete graphs orientations
A. V. Zharkova
p. 100-103
On the optimality of graph implementations with prescribed connectivities
B. A. Terebin
;
M. B. Abrosimov
p. 103-105
Geometric condition of formal grammars solvability
O. I. Egorushkin
;
I. V. Kolbasina
;
K. V. Safonov
p. 106-108
An algorithm for solving the extended parsing problem
V. V. Kishkan
;
K. V. Safonov
p. 108-111
On generic complexity of the problem to represent natural numbers by sum of two squares
A. N. Rybalov
p. 111-113
Application of SAT oracles for generation of additional linear constraints in cryptanalysis of some lightweight ciphers
K. V. Antonov
;
A. A. Semenov
p. 114-119
On differentials for the modification of the cipher Simon based on the Lai~--- Messi scheme
A. A. Belousova
;
N. N. Tokareva
p. 119-121
Coding information by Walsh matrices
M. S. Bespalov
;
K. M. Malkova
p. 121-124
Using inverse backdoors sets to construct guess-and-determine attacks on hash-functions MD4
I. A. Gribanova
;
A. A. Semenov
p. 124-129
Construction of cryptographic Boolean functions using SAT-solvers
A. E. Doronin
;
K. V. Kalgin
p. 129-132
Computation of rewriting systems in finite groups
A. A. Kuznetsov
p. 132-134
A compact translator of algorithms into Boolean formulas for use in cryptanalysis
D. A. Sofronova
;
K. V. Kalgin
p. 135-136