RUS  ENG JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB
 General information Latest issue Archive Impact factor Search papers Search references RSS Latest issue Current issues Archive issues What is RSS

 Prikl. Diskr. Mat.: Year: Volume: Issue: Page: Find

 Theoretical Foundations of Applied Discrete Mathematics Optimal curves of genus $3$ over finite field with discriminant $-19$E. S. Alekseenko, S. I. Aleshnikov, A. I. Zaytsev 6 Some properties of the discrete Fourier transform in the field of complex numbers and in the fields of finite characteristicsA. M. Grishin 7 Constructing the classes of Boolean functions with guaranteed cryptographic properties on the base of coordinate functions of the finite field power mappingsA. V. Ivanov, V. N. Romanov 10 Connections between subspaces on which bent function and its dual function are affineN. A. Kolomeec 11 A new combinatorial construction of bent functionsN. N. Tokareva 13 Generation of the alternating group by semiregular involutionsM. E. Tuzhilin 14 The properties of external control sequencesV. M. Fomichev 15 Mathematical Methods of Cryptography Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key informationV. U. Zolotukhin, T. A. Chalkin 20 On the reduction of key space for A5/1S. A. Kiselyov 21 A hardware implementation of the cryptosystem based on the Zakrevskij FSMA. V. Miloshenko 23 Complexity estimation for a differential attack on a block cipher with given parametersA. I. Pestunov 25 On weak key-scheduling algorithms relatively the related-key attackM. A. Pudovkina 27 Attacks on full block cipher GOST 28147-89 with 2 or 4 related keysM. A. Pudovkina, G. I. Khoruzhenko 29 Differential attack on 6-round Whirlpool-like block ciphersM. A. Pudovkina 30 High-speed pseudorandom sequence generators based on cellular automataB. M. Sukhinin 32 The relationship between structure of the key space and hardness of the McEliece–Sidelnikov Public Key CryptosystemI. V. Chizhov 34 Symmetric cipher on the base of non-commutative algebra of polynomialsI. V. Shirokov 35 Mathematical Methods of Steganography Steganography and steganalysis in video filesO. V. Modenova 37 On steganographic system selection ruleE. V. Razinkov, R. Kh. Latypov 39 Fingerprints resistant to collusion attacksT. M. Solovjev, R. I. Chernyak 41 About the fact of detecting the noise in finite Markov chain with an unknown transition probability matrixA. M. Shoytov 44 Mathematical Foundations of Computer Security The search of $\operatorname{tg}$-paths and islands for Take-Grant security modelD. M. Brechka 46 Electronic mail systems access control and information flow control modelingK. A. Grishchenko 47 Security analysis of systems with simple trajectories functioning within framework of the base role DP-modelP. N. Devyanin 49 About time information flows in computer systemsM. A. Kachanov 52 Teaching the protected computer nets design at the Cisco platformD. N. Kolegov 53 Adaptive algorithm for anomalous network traffic indication based on alternating processO. V. Nissenbaum, A. S. Prisyazhnuk 55 Authentication in multi-tier system using commutative encryptionP. A. Pautov 59 The code injection to the process under an operating system GNU/LinuxI. V. Smith 61 Design and development of Capture the Flag game server for competitions in information securityN. O. Tkachenko, D. V. Chernov 62 Using Scyther for analysis SKID3 securityM. I. Tsoy 65 Mathematical Foundations of Reliability of Computing and Control Systems On minimal edge $k$-extensions of oriented starsM. B. Abrosimov 67 On minimal vertex 1-extensions of special form superslim treesM. B. Abrosimov, D. D. Komarov 68 Application of unreliable tests for self-diagnostics of modular computing systems with multiple faultsYu. K. Dimitriev, A. F. Zadorozhny 70 About one family of exact 2-extensions of tournamentsA. A. Dolgov 72 An analytical approach to the synthesis of regular structures of fault-tolerant systemsV. A. Melent'ev 74 Mathematical Foundations of Informatics and Programming Elasticity of algorithmsV. V. Bykova 76 Resource usage analysis in softwareV. V. Gorelov 78 An approach to fuzz testing data generation for applied and system softwareA. N. Makarov 79 Software translating of combinatorial problems to propositional logicI. V. Otpuschennikov, A. A. Semenov 81 On representation of context-free languages by diagonals of linear laguagesK. V. Safonov, D. A. Kalugin-Balashov 82 Formal proof of the semantic equivalence between the core of the AOP language AspectTalk and the OOP language SmalltalkD. A. Stephantsov, A. E. Kryukova 84 Computational Methods in Discrete Mathematics Cryptanalysis with graphical processing units (GPU)D. V. Bespalov, V. G. Bulavintsev, A. A. Semenov 86 Experimental estimation for software implementation speed of some block cipher's transformationsA. A. Dmukh 87 Estimatiing complexity of directed enumeration in non-uniformly distributed key spacesI. V. Pankratov, O. A. Teploukhova 88 Minimization procedure for Hamiltonian Circuit and Graph Isomorphism problemsR. T. Faizullin 90 Applied Theory of Coding, Automata and Graphs On constructing minimal deterministic finite automaton recognizing a prefix-code of given cardinalityI. R. Akishev, M. E. Dvorkin 92 About relationship between parameters of certain graphsI. A. Badeha, P. V. Roldugin 94 Bent functions and linear codes for CDMAA. V. Pavlov 95 On a new complete invariant for acyclic graphsA. V. Prolubnikov 97 On the frame of an automatonV. N. Salii 98 Classes of graphs reconstructed with linear time complexityE. A. Tatarinov 99 Reconfigurable finite state machines with shared memoryV. N. Trenkaev 101 Mathematical Foundations of Intelligent Systems State estimation for stochastic object on the base of modeling trend in time seriesS. I. Kolesnikova, A. A. Belous 103 Logical inference on the base of optimal subset of mixed diagnostic tests for intelligent systemsA. E. Yankovskaya, A. I. Gedike 105