RUS  ENG JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PERSONAL OFFICE
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat. Suppl.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


2016, Issue 9  


Theoretical Foundations of Applied Discrete Mathematics
Generalized Narayana polynomials and their $q$-analogues
L. N. Bondarenko, M. L. Sharapova
6
A criterion for checking the hypothesis about the existence of embeddings into a binary Markov chain
A. V. Volgin
9
An algorithm for recognizing the completeness of a set of words and dynamics of prohibitions
A. A. Evdokimov
10
On a sufficient condition for impossibility to reduce the period of the high order binary digit position sequences over primary rings
S. A. Kuzmin
12
On groups generated by mixed type permutations and key addition groups
B. A. Pogorelov, M. A. Pudovkina
14
On the classification of distance-transitive orbital graphs of overgroups of the Jevons group
B. A. Pogorelov, M. A. Pudovkina
16

Discrete Functions
On special class of vectorial Boolean functions and the problem of APN permutations existence
V. A. Vitkup
19
On differential equivalence of quadratic APN functions
A. A. Gorodilova
21
Functions with variative-coordinate polynomiality over group
A. I. Zueva, A. V. Karpov
24
On the Hamming distance between two bent functions
N. A. Kolomeec
27
On the set of values for Hamming distance between self-dual bent functions
A. V. Kutsenko
29
Necessary condition for maximum component algebraic immunity of a vectorial Boolean function
D. P. Pokrasenko
30
The presentation of Magma and $2$-GOST block cipher semibyte substitutions by algebraic threshold functions
D. A. Soshin
32
On the set of derivatives of a Boolean bent function
N. N. Tokareva
35
On quadratic form rank distribution and asymptotic bounds of affinity level
A. V. Cheremushkin
36
Functions on distance one from APN functions in small number of variables
G. I. Shushuev
39

Mathematical Methods of Cryptography
To cryptanalysis of $2$-cascade finite automata cryptographic generators
G. P. Agibalov, I. A. Pankratova
41
On the group generated by the round functions of the block cipher Kuznechik
V. V. Vlasova, M. A. Pudovkina
43
Estimations of cryptographic resistance of ciphers in the Trivium family to SAT-based cryptanalysis
O. S. Zaikin, I. V. Otpuschennikov, A. A. Semenov
46
Experimental research on exponents of mixing matrices for generalized Feistel networks
A. M. Koreneva, V. N. Martyshin
48
Sufficient variables for transition function of a modified additive generator
A. M. Koreneva, V. M. Fomichev
51
Search of an information message in noisy code blocks at repeated data transmission
Y. V. Kosolapov, O. Y. Turchenko
55
On the accuracy of matrix-graph approach to investigation of transformation mixing properties
S. N. Kyazhin, P. V. Lebedev
57
Mixing properties of $2$-cascade generators
S. N. Kyazhin, V. M. Fomichev
60
Analogues of the Shannon theorem for non-minimal endomorphic perfect ciphers
N. V. Medvedeva, S. S. Titov
62
A method for building a cryptographic generator of sequences with specified index of unrepeatability
D. A. Romanko, V. M. Fomichev
65
Applications of two-faced processes to pseudorandom number generation
B. Ya. Ryabko
68
On key schedule for block ciphers without week keys
V. M. Fomichev
70
Cryptanalysis of the McEliece PKC based on $(k-1)$-Reed–Muller subcodes
I. V. Chizhov, M. A. Borodin
73

Mathematical Foundations of Computer Security
Undeniable onion routing protocol with message creation time verification
N. I. Anisenya
76
On discrete automaton models of attacks in computer networks
D. E. Gorbatenko, S. E. Kochemazov, A. A. Semenov
80
About results of designing hierarchical representation of MROSL DP-model
P. N. Devyanin
83
Confidentiality preserving scheme for the algorithm RAID-PIR
M. R. Kascheev, Y. V. Kosolapov
87
HMAC obfuscation method for implementation in untrusted systems
D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov
89
Web application firewalls identification in MitB-model
D. N. Kolegov, P. A. Lineytsev
92
Lightweight implementation of ABAC mechanism on Database Firewall
D. N. Kolegov, N. O. Tkachenko
93

Mathematical Foundations of Reliability of Computing and Control Systems
On the reliability of circuits in the Rosser–Tourkett basis (in $P_k$)
M. A. Alekhina, O. Yu. Barsukova
96
The unreliability of circuits in case coalescences of elements inputs
M. A. Alekhina, O. A. Logvina
98

Applied Theory of Automata and Graphs
Refinement of lower bounds for the number of additional arcs in a minimal vertex $1$-extension of oriented path
M. B. Abrosimov, O. V. Modenova
101
On the number of optimal $1$-hamiltonian graphs with the number of vertices up to $26$ and $28$
M. B. Abrosimov, S. A. Suhov
103
About one heritage character in cyclic semigroups of graphs
Y. E. Avezova, V. M. Fomichev
105
Enumeration of labelled flower wheel graphs
V. A. Voblyi, A. K. Meleshko
109
On the full diversity of balls for graphs
A. A. Evdokimov, E. P. Kutcenogaya, T. I. Fedoryaeva
110
On attractors in finite dynamic systems of complete graphs orientations
A. V. Zharkova
112
About simple conditional experiments identifying invertible automata of a certain class
A. O. Zhukovskaja, V. N. Trenkaev
115
About transitive property of mappings associated with a finite state machines from the groups $AS_p$
M. V. Karandashov
115

Mathematical Foundations of Informatics and Programming
On consistency of systems of symbolic polynomial equations and their application
O. I. Egorushkin, I. V. Kolbasina, K. V. Safonov
119
LYaPAS-T into fasm translator for Windows and Linux
V. N. Knyazev, M. S. Knyazeva
121
Modular translator from LYaPAS
D. A. Stefantsov, V. O. Safonov, V. V. Pershin, S. Yu. Grechnev, P. A. Tomskikh
122
Methods for synthesizing predicate program pieces
M. S. Chushkin, V. I. Shelekhov
126

Computational methods in discrete mathematics
Application of solving SAT algorithms to constructing differential paths for finding collisions of cryptographic hash functions in the MD family
I. A. Gribanova
129
On the growth functions of finite two generator Burnside groups of exponent five
A. A. Kuznetsov, S. S. Karchevsky
132
 
Contact us:
 Terms of Use  Registration  Logotypes © Steklov Mathematical Institute RAS, 2019