Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaya Diskretnaya Matematika. Supplement
Année 2021
Précédent
Suivant
Sommaire du
Fascicule no. 14
Воспоминания коллег и учеников о Геннадии Петровиче Агибалове
p. 6-23
On construction of maximal genus
$3$
hyperelliptic curves
Yu. F. Boltnev
;
S. A. Novoselov
;
V. A. Osipov
p. 24-30
Central limit theorem for
$U$
-statistics of tuples of vertex labels on a complete graph
N. M. Mezhennaya
;
V. G. Mikhailov
p. 30-32
On the largest order of substitutions of a given degree
V. M. Fomichev
p. 32-36
Hybrid approach to the search for Boolean functions with high algebraic immunity based on heuristics
N. D. Atutova
p. 37-40
$\mathrm{S}$
-blocks with maximum component algebraic immunity on a small number of variables
D. A. Zyubina
;
N. N. Tokareva
p. 40-42
On some properties of self-dual generalized bent functions
A. V. Kutsenko
p. 42-45
On properties of additive differential probabilities of XOR
N. Mouha
;
N. A. Kolomeets
;
D. A. Ahtyamov
;
I. A. Sutormin
;
M. A. Panferov
;
K. M. Titova
;
T. A. Bonich
;
E. A. Ishchukova
;
N. N. Tokareva
;
B. F. Zhantulikov
p. 46-48
Improved estimates for the number of
$(n, m, k)$
-resilient and correlation-immune Boolean mappings
K. N. Pankov
p. 48-51
On the way of constructing differentially
$2\delta$
-uniform permutations over
$\mathbb{F}_{2^{2m}}$
D. B. Fomin
p. 51-55
A conditions for uniqueness reresentation of
$p$
-logic function into disjunctive product of functions
A. V. Cheremushkin
p. 55-57
On derivatives of Boolean bent functions
A. S. Shaporenko
p. 57-58
XS-circuits: hiding round oracles
S. V. Agievich
p. 59-61
Development and analysis of oracle for the hibrid attack on a cryptographic system NTRU using a quantum search algorithm
A. O. Bakharev
p. 62-67
Cryptanalytic invertibility of two-argument functions
N. Yu. Berdnikova
;
I. A. Pankratova
p. 67-71
Experimental study of the characteristics of one method of integrity checking of large volume data storage
D. A. Bobrovskiy
;
D. I. Zadorozhny
;
A. M. Koreneva
;
T. R. Nabiev
;
V. M. Fomichev
p. 71-74
On the padding algorithm of large-sized blocks in integrity control systems
D. A. Bobrovskiy
;
T. R. Nabiev
;
V. M. Fomichev
p. 74-79
Threshold Diffie~--- Hellman Protocol
D. N. Kolegov
;
Yu. R. Khalniyazova
p. 79-81
WireGuard protocol with GOST cipher suites
D. N. Kolegov
;
Yu. R. Khalniyazova
p. 81-84
Algebraic cryptanalysis of round-reduced lightweight ciphers \textsc{Simon} and \textsc{Speck}
A. V. Kutsenko
;
N. D. Atutova
;
D. A. Zyubina
;
E. A. Maro
;
S. D. Filippov
p. 84-91
To the task of description minimal by inclusion perfect ciphers
N. V. Medvedeva
;
S. S. Titov
p. 91-95
Post-quantum lattice-based e-voting for multiple candidates
D. A. Nabokov
p. 95-100
On ARX-like ciphers based on different codings of
$2$
-groups with a cyclic subgroup of index~
$2$
B. A. Pogorelov
;
M. A. Pudovkina
p. 100-104
Generating additional constraints in algebraic cryptanalysis using SAT oracles
A. A. Semenov
;
K. V. Antonov
;
I. A. Gribanova
p. 104-110
Choosing parameters for one
$\mathrm{IND}$
-
$\mathrm{CCA2}$
secure McEliece modification in the standard model
Y. V. Kosolapov
;
O. Y. Turchenko
p. 110-114
An improvement of cryptographic schemes based on the conjugacy search problem
V. A. Roman'kov
p. 114-118
On privacy in decentralized systems with tokens
L. R. Akhmetzyanova
;
A. A. Babueva
;
S. N. Kyazhin
;
V. A. Popov
p. 119-125
About methods of developing consistent description of the MROSL DP-model for OS and DBMS for its verification with Rodin and ProB tools
P. N. Devyanin
;
M. A. Leonova
p. 126-132
zk-SNARK-based data privacy method
D. O. Kondyrev
p. 132-134
Control Flow Flattening deobfuscation using symbolic execution
V. V. Lebedev
p. 134-138
Application of x86 extensions for code protection
R. K. Lebedev
;
I. A. Koryakin
p. 138-140
Extended grammar-based fuzzing algorithm for JavaScript Engines
M. S. Nedyak
p. 140-146
Extension and analysis of information hiding method Deep Steganography
A. A. Nikolaev
p. 146-148
Adaptation of the Rosenblatt~--- Parzen method for the experimental evaluation of the computing system reliability
V. S. Nikulin
p. 148-153
Bases over the field
$\mathrm{GF(2)}$
generated by the Schur~--- Hadamard operation
K. L. Geut
;
S. S. Titov
p. 154-158
On decomposability of Schur~--- Hadamard product of the tensor products sum of Reed~--- Muller codes
Yu. V. Kosolapov
;
E. A. Lelyuk
p. 158-161
Regular vertex
$1$
-extension for
$2$
-dimension meshes
A. A. Lobov
;
M. B. Abrosimov
p. 161-163
On attractors in one discrete binary dynamic system with bipartite dependency graph
R. I. Panteleev
;
A. V. Zharkova
p. 163-165
Schemes for constructing minimal vertex
$1$
-extensions of complete bicolored graphs
P. V. Razumovskii
;
M. B. Abrosimov
p. 165-168
Towards the security of McEliece's cryptosystem based on Hermitian subfield subcodes
G. P. Nagy
;
S. El Khalfaoui
p. 168-175
On a solution of polynomial grammars and the general algebraic equation
O. I. Egorushkin
;
I. V. Kolbasina
;
K. V. Safonov
p. 176-178
On generic complexity of the isomorphism problem for finite semigroups
A. N. Rybalov
p. 178-180
On a heuristic approach to constructing bijective vector Boolean functions with given cryptographic properties
M. A. Kovrizhnykh
;
D. B. Fomin
p. 181-184
Some subgroups of the Burnside group
$B_0(2,5)$
A. A. Kuznetsov
;
A. S. Kuznetsova
p. 184-186
DPLL-like satisfiability problem solver over the system of ANF equations
A. V. Tkachev
;
K. V. Kalgin
p. 187-190