Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaya Diskretnaya Matematika. Supplement
Année 2023
Précédent
Suivant
Sommaire du
Fascicule no. 16
Bounds on the number of partitions of the vector space over a finite field into affine subspaces of the same dimension
I. P. Baksova
;
Yu. V. Tarannikov
p. 5-8
Multipermutations and perfect diffusion of partitions
B. A. Pogorelov
;
M. A. Pudovkina
p. 8-11
Properties of classes of Boolean functions constructed from several linear recurrences over the ring of integers modulo
$2^n$
A. D. Bugrov
p. 12-14
On tightness of the lower bound for the number of bent functions at the minimum distance from a bent function from the Maiorana ---McFarland class
D. A. Bykov
p. 14-18
Some classes of resilient functions over Galois rings and their linear characteristics
O. V. Kamlovskii
;
K. N. Pankov
p. 18-22
On preserving the structure of a subspace by a vectorial Boolean function
N. A. Kolomeets
p. 23-26
Gram matrices of bent functions and properties of subfunctions of quadratic self-dual bent functions
A. V. Kutsenko
p. 26-29
Construction of a substitution on~
$\mathbb{F}_2^n$
based on a single Boolean function
I. A. Pankratova
;
A. A. Medvedev
p. 29-31
Distinguishing attack on four rounds of the Luby~--- Rackoff cipher by~differentials of two-block texts
O. V. Denisov
p. 32-36
Inverting 29-step MD5 compression function via SAT
O. S. Zaikin
p. 36-40
Comparative analysis of the graphic information transformation quality using block ciphers
E. A. Ishchukova
;
R. R. Borlakov
p. 40-46
On the number of impossible differentials of some ARX transformation
N. A. Kolomeec
p. 47-50
Efficiency analysis of cryptographic algorithms for applications in zk-SNARK
D. O. Kondyrev
p. 50-52
On one block cipher mode of operation for protection of block-oriented system storage devices
A. M. Koreneva
;
G. V. Firsov
p. 52-56
Construction of the difference relation for the KB-256 algorithm
A. V. Kurochkin
;
A. Chuhno
;
D. A. Bobrovskiy
p. 56-57
Main approaches in post-quantum cryptography: description, a comparative study
E. S. Malygina
;
A. V. Kutsenko
;
S. A. Novoselov
;
N. S. Kolesnikov
;
A. O. Bakharev
;
I. S. Khilchuk
;
A. S. Shaporenko
;
N. N. Tokareva
p. 58-65
Algebraic cryptanalysis of 9 rounds of lightweight block cipher Simon32/64
E. A. Maro
;
O. S. Zaikin
p. 65-70
On additive differentials that go through ARX transfromation with high probability
A. S. Mokrousov
;
N. A. Kolomeets
p. 70-73
Symmetric lightweight cryptography: principles, approaches, and tradeoffs
S. P. Panasenko
p. 74-78
Additional optimization of the guaranteed number of activations in
$\mathsf{XS}$
-circuits computation algorithm
D. R. Parfenov
;
A. O. Bakharev
p. 78-81
The boomerang attack on the 4-round LILLIPUT-TBC-II-256 cipher
M. A. Pudovkina
;
A. M. Smirnov
p. 81-84
FPGA implementation of an SD-card encryptor based on Magma cipher in counter mode
S. I. Razenkov
p. 85-87
The use of backdoors to estimate the hardness of propositional proofs and cryptographic attacks
A. A. Semenov
p. 87-95
Key-recovery security of keyed hash functions based on GOST 34.11-2018 (``Streebog'')
A. M. Sergeev
;
V. A. Kiryukhin
p. 96-98
On the security of Domingo-Ferrer's homomorphic cryptosystem against ciphertext-only attack
A. V. Trepacheva
p. 98-102
On the one quasigroup based format preserving encryption algorithm
K. D. Tsaregorodtsev
p. 102-104
An approach to construct a keyed PRF from the ``MAGMA'' block cipher
A. A. Shcherbachenko
p. 105-110
Public keys for e-coins: partially solved problem using signature with rerandomizable keys
A. A. Babueva
;
S. N. Kyazhin
p. 110-114
Efficient matrix multiplication for cryptography with~a companion matrix over
$\mathbb{F}_2$
S. Pal
p. 114-117
Cryptanalysis of LWE and SIS-based cryptosystems by using quantum annealing
A. Qayyum
;
M. Haris
p. 117-123
An analogue of the Kronecker~--- Cappelli theorem for systems of non-commutative linear equations generating linear languages
O. I. Egorushkin
;
I. V. Kolbasina
;
K. V. Safonov
p. 124-126
About algorithms for searching computer information
A. V. Zharkova
;
A. G. Musugalieva
p. 126-129
On one representation of elements of finite
$2$
-groups in the form of Boolean vectors
A. A. Kuznetsov
;
A. S. Kuznetsova
p. 129-131
On a class of algebraic geometric codes
M. M. Glukhov
;
K. N. Pankov
p. 132-134
A series of short exact formulas for the Bhattacharya parameter of coordinate channels
S. G. Kolesnikov
;
V. M. Leontiev
p. 134-136
Calculation of error-correcting pairs for an algebraic-geometric code
E. S. Malygina
;
A. A. Kuninets
p. 136-140
Periodic properties of a finite automaton generator
P. K. Obukhov
;
I. A. Pankratova
p. 141-143