Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaâ diskretnaâ matematika
Année 2010
Précédent
Suivant
Sommaire du
Fascicule no. 1
On cryptographic weaknesses of some classes of binary sequence transformations
S. V. Smyshlyaev
p. 5-15
Security analysis of systems with simple trajectories of functioning within the base role DP-model
P. N. Devyanin
p. 16-36
Using temporary logics and model checkers for dynamic control abnormal deviations of the system
S. E. Prokopyev
p. 37-42
Integrating security policies with computer systems by means of AOP with application to Apache Ftp Server
D. A. Stephantsov
;
A. Y. Filimonov
p. 43-62
Frame of an automaton
V. N. Salii
p. 63-67
Analysis of non-linear automata with delay~2 over a~finite ring
V. V. Skobelev
;
V. G. Skobelev
p. 68-85
Algorithms using ROBDD as a~base for Boolean constraints
A. S. Ignatiev
;
A. A. Semenov
p. 86-104
Minimal edge extensions of some precomplete graphs
M. B. Abrosimov
p. 105-117
Properties of paths in graphs and multigraphs
V. M. Fomichev
p. 118-124
Sommaire du
Fascicule no. 2
Necessary and sufficient conditions of linear structure triviality for monomial mapping on the field of
$2^{2^t}$
elements
A. N. Alekseychuk
;
R. V. Proskurovskiy
p. 5-9
Galois relation for closed classes of discrete functions
N. G. Parvatov
p. 10-15
The properties of
$h$
-periodic sequences
V. M. Fomichev
p. 16-21
An additive approach to nonlinear degree of discrete function
A. V. Cheremushkin
p. 22-33
High-speed pseudorandom sequence generators based on cellular automata
B. M. Sukhinin
p. 34-41
Modified Hotelling's chart excluding trend influence and its application for digital watermarks detection
B. B. Borisenko
p. 42-58
Application of unreliable tests for self-diagnostics of modular computing systems at multiple faults
Yu. K. Dimitriev
;
A. F. Zadorozhny
p. 59-73
An analytical approach to the synthesis of regular graphs with preset values of the order, degree and girth
V. A. Melent'ev
p. 74-86
Elasticity of algorithms
V. V. Bykova
p. 87-95
The discovery of faulty work with resources in the software
V. V. Gorelov
p. 96-103
On constructing minimal deterministic finite automaton recognizing a~prefix-code of a~given cardinality
I. R. Akishev
;
M. E. Dvorkin
p. 104-116
Solving parallel equations over
$\omega$
-languages
V. G. Bushkov
;
N. V. Yevtushenko
p. 117-123
Sommaire du
Fascicule no. 3
On automorphism groups of matrices
V. N. Egorov
p. 5-16
On values of affinity level for almost all Boolean functions
O. A. Logachev
p. 17-21
Point functions on semilatties
N. G. Parvatov
p. 22-40
Construction of perfectly balanced functions without barriers
S. V. Smyshlyaev
p. 41-50
Statistical approximation theory for discrete functions with application in cryptanalysis of iterative block ciphers
G. P. Agibalov
;
I. A. Pankratova
p. 51-68
Zakrevskij's cipher based on reconfigurable FSM
V. N. Trenkaev
p. 69-76
Security analysis of information flows in \textit{GNU/Linux} operating systems
M. A. Kachanov
p. 77-89
Authentication in trusted subsystem model using commutative encryption
P. A. Pautov
p. 90-95
A family of exact 2-extensions of tournaments
A. A. Dolgov
p. 96-99
Solving inequalities over finite state machines in the reactive systems design
A. N. Chebotarev
p. 100-110
Cumulative synthesis: a~cellular-automata model of target coating formation by means of cumulative flow of particles
O. L. Bandman
;
S. A. Gromilov
;
S. A. Kinelovsky
p. 111-120
Sommaire du
Fascicule no. 4
The number of disordered covers of a~finite set by subsets having fixed cardinalities
R. M. Ganopolsky
p. 5-17
Authentication in multi-tier systems using proxy signatures
P. A. Pautov
p. 18-22
A secure computer architecture model and its emulation
V. V. Gorelov
p. 23-32
On mapping graphs of parallel programs onto graphs of distributed computer systems by recurrent neural networks
M. S. Tarkov
p. 33-40
Multi-parametric classification of automaton Markov models based on the sequences they generate
A. R. Nurutdinova
;
S. V. Shalagin
p. 41-54
Series parallel decomposition of a~system of incompletely specified Boolean functions
Yu. V. Pottosin
;
E. A. Shestakov
p. 55-63
Regular form of deterministic FSMs specifications in the language~L
A. N. Chebotarev
p. 64-72
New algorithms for optimal resourse allocation
V. I. Struchenkov
p. 73-78
Research of evolution of cellular automata modeling ``phase separation'' process on triangular mesh
I. V. Afanasyev
p. 79-90
A method for construction of cellular automata simulating pattern formation processes
O. L. Bandman
p. 91-99
Simulating a~piston motion by a~gas-lattice model
Yu. G. Medvedev
p. 100-108
Sibecrypt'10 review
G. P. Agibalov
p. 109-124
Sommaire du
Fascicule no. 12
Optimal curves of genus~
$3$
over finite field with discriminant~
$-19$
E. S. Alekseenko
;
S. I. Aleshnikov
;
A. I. Zaytsev
p. 6-7
Some properties of the discrete Fourier transform in the field of complex numbers and in the fields of finite characteristics
A. M. Grishin
p. 7-9
Constructing the classes of Boolean functions with guaranteed cryptographic properties on the base of coordinate functions of the finite field power mappings
A. V. Ivanov
;
V. N. Romanov
p. 10-11
Connections between subspaces on which bent function and its dual function are affine
N. A. Kolomeec
p. 11-12
A new combinatorial construction of bent functions
N. N. Tokareva
p. 13-14
Generation of the alternating group by semiregular involutions
M. E. Tuzhilin
p. 14-15
The properties of external control sequences
V. M. Fomichev
p. 15-19
Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key information
V. U. Zolotukhin
;
T. A. Chalkin
p. 20-21
On the reduction of key space for A5/1
S. A. Kiselyov
p. 21-23
A hardware implementation of the cryptosystem based on the Zakrevskij FSM
A. V. Miloshenko
p. 23-24
Complexity estimation for a~differential attack on a~block cipher with given parameters
A. I. Pestunov
p. 25-27
On weak key-scheduling algorithms relatively the related-key attack
M. A. Pudovkina
p. 27-29
Attacks on full block cipher GOST 28147-89 with~2 or~4 related keys
M. A. Pudovkina
;
G. I. Khoruzhenko
p. 29-30
Differential attack on 6-round Whirlpool-like block ciphers
M. A. Pudovkina
p. 30-31
High-speed pseudorandom sequence generators based on cellular automata
B. M. Sukhinin
p. 32-34
The relationship between structure of the key space and hardness of the McEliece--Sidelnikov Public Key Cryptosystem
I. V. Chizhov
p. 34-35
Symmetric cipher on the base of non-commutative algebra of polynomials
I. V. Shirokov
p. 35-36
Steganography and steganalysis in video files
O. V. Modenova
p. 37-39
On steganographic system selection rule
E. V. Razinkov
;
R. Kh. Latypov
p. 39-41
Fingerprints resistant to collusion attacks
T. M. Solovjev
;
R. I. Chernyak
p. 41-44
About the fact of detecting the noise in finite Markov chain with an unknown transition probability matrix
A. M. Shoytov
p. 44-45
The search of
$\operatorname{tg}$
-paths and islands for Take-Grant security model
D. M. Brechka
p. 46-47
Electronic mail systems access control and information flow control modeling
K. A. Grishchenko
p. 47-49
Security analysis of systems with simple trajectories functioning within framework of the base role DP-model
P. N. Devyanin
p. 49-51
About time information flows in computer systems
M. A. Kachanov
p. 52-53
Teaching the protected computer nets design at the Cisco platform
D. N. Kolegov
p. 53-55
Adaptive algorithm for anomalous network traffic indication based on alternating process
O. V. Nissenbaum
;
A. S. Prisyazhnuk
p. 55-58
Authentication in multi-tier system using commutative encryption
P. A. Pautov
p. 59-60
The code injection to the process under an operating system GNU/Linux
I. V. Smith
p. 61-62
Design and development of Capture the Flag game server for competitions in information security
N. O. Tkachenko
;
D. V. Chernov
p. 62-64
Using Scyther for analysis SKID3 security
M. I. Tsoy
p. 65-66
On minimal edge
$k$
-extensions of oriented stars
M. B. Abrosimov
p. 67-68
On minimal vertex 1-extensions of special form superslim trees
M. B. Abrosimov
;
D. D. Komarov
p. 68-70
Application of unreliable tests for self-diagnostics of modular computing systems with multiple faults
Yu. K. Dimitriev
;
A. F. Zadorozhny
p. 70-72
About one family of exact 2-extensions of tournaments
A. A. Dolgov
p. 72-73
An analytical approach to the synthesis of regular structures of fault-tolerant systems
V. A. Melent'ev
p. 74-75
Elasticity of algorithms
V. V. Bykova
p. 76-78
Resource usage analysis in software
V. V. Gorelov
p. 78-79
An approach to fuzz testing data generation for applied and system software
A. N. Makarov
p. 79-81
Software translating of combinatorial problems to propositional logic
I. V. Otpuschennikov
;
A. A. Semenov
p. 81-82
On representation of context-free languages by diagonals of linear laguages
K. V. Safonov
;
D. A. Kalugin-Balashov
p. 82-83
Formal proof of the semantic equivalence between the core of the AOP language AspectTalk and the OOP language Smalltalk
D. A. Stephantsov
;
A. E. Kryukova
p. 84-85
Cryptanalysis with graphical processing units (GPU)
D. V. Bespalov
;
V. G. Bulavintsev
;
A. A. Semenov
p. 86-87
Experimental estimation for software implementation speed of some block cipher's transformations
A. A. Dmukh
p. 87-88
Estimatiing complexity of directed enumeration in non-uniformly distributed key spaces
I. V. Pankratov
;
O. A. Teploukhova
p. 88-90
Minimization procedure for Hamiltonian Circuit and Graph Isomorphism problems
R. T. Faizullin
p. 90-91
On constructing minimal deterministic finite automaton recognizing a~prefix-code of given cardinality
I. R. Akishev
;
M. E. Dvorkin
p. 92-94
About relationship between parameters of certain graphs
I. A. Badeha
;
P. V. Roldugin
p. 94-95
Bent functions and linear codes for CDMA
A. V. Pavlov
p. 95-97
On a~new complete invariant for acyclic graphs
A. V. Prolubnikov
p. 97-98
On the frame of an automaton
V. N. Salii
p. 98-99
Classes of graphs reconstructed with
E. A. Tatarinov
p. 99-101
Reconfigurable finite state machines with shared memory
V. N. Trenkaev
p. 101-102
State estimation for stochastic object on the base of modeling trend in time series
S. I. Kolesnikova
;
A. A. Belous
p. 103-105
Logical inference on the base of optimal subset of mixed diagnostic tests for intelligent systems
A. E. Yankovskaya
;
A. I. Gedike
p. 105-108