Prikladnaya Diskretnaya Matematika. Supplement
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat. Suppl.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


2021, Issue 14  


Воспоминания коллег и учеников о Геннадии Петровиче Агибалове
6

Theoretical Foundations of Applied Discrete Mathematics
On construction of maximal genus $3$ hyperelliptic curves
Yu. F. Boltnev, S. A. Novoselov, V. A. Osipov
24
Central limit theorem for $U$-statistics of tuples of vertex labels on a complete graph
N. M. Mezhennaya, V. G. Mikhailov
30
On the largest order of substitutions of a given degree
V. M. Fomichev
32

Discrete Functions
Hybrid approach to the search for Boolean functions with high algebraic immunity based on heuristics
N. D. Atutova
37
$\mathrm{S}$-blocks with maximum component algebraic immunity on a small number of variables
D. A. Zyubina, N. N. Tokareva
40
On some properties of self-dual generalized bent functions
A. V. Kutsenko
42
On properties of additive differential probabilities of XOR
N. Mouha, N. A. Kolomeets, D. A. Ahtyamov, I. A. Sutormin, M. A. Panferov, K. M. Titova, T. A. Bonich, E. A. Ishchukova, N. N. Tokareva, B. F. Zhantulikov
46
Improved estimates for the number of $(n, m, k)$-resilient and correlation-immune Boolean mappings
K. N. Pankov
48
On the way of constructing differentially $2\delta$-uniform permutations over $\mathbb{F}_{2^{2m}}$
D. B. Fomin
51
A conditions for uniqueness reresentation of $p$-logic function into disjunctive product of functions
A. V. Cheremushkin
55
On derivatives of Boolean bent functions
A. S. Shaporenko
57

Mathematical Methods of Cryptography
XS-circuits: hiding round oracles
S. V. Agievich
59
Development and analysis of oracle for the hibrid attack on a cryptographic system NTRU using a quantum search algorithm
A. O. Bakharev
62
Cryptanalytic invertibility of two-argument functions
N. Yu. Berdnikova, I. A. Pankratova
67
Experimental study of the characteristics of one method of integrity checking of large volume data storage
D. A. Bobrovskiy, D. I. Zadorozhny, A. M. Koreneva, T. R. Nabiev, V. M. Fomichev
71
On the padding algorithm of large-sized blocks in integrity control systems
D. A. Bobrovskiy, T. R. Nabiev, V. M. Fomichev
74
Threshold Diffie — Hellman Protocol
D. N. Kolegov, Yu. R. Khalniyazova
79
WireGuard protocol with GOST cipher suites
D. N. Kolegov, Yu. R. Khalniyazova
81
Algebraic cryptanalysis of round-reduced lightweight ciphers Simon and Speck
A. V. Kutsenko, N. D. Atutova, D. A. Zyubina, E. A. Maro, S. D. Filippov
84
To the task of description minimal by inclusion perfect ciphers
N. V. Medvedeva, S. S. Titov
91
Post-quantum lattice-based e-voting for multiple candidates
D. A. Nabokov
95
On ARX-like ciphers based on different codings of $2$-groups with a cyclic subgroup of index $2$
B. A. Pogorelov, M. A. Pudovkina
100
Generating additional constraints in algebraic cryptanalysis using SAT oracles
A. A. Semenov, K. V. Antonov, I. A. Gribanova
104
Choosing parameters for one $\mathrm{IND}$-$\mathrm{CCA2}$ secure McEliece modification in the standard model
Y. V. Kosolapov, O. Y. Turchenko
110
An improvement of cryptographic schemes based on the conjugacy search problem
V. A. Roman'kov
114

Mathematical Foundations of Computer Security
On privacy in decentralized systems with tokens
L. R. Akhmetzyanova, A. A. Babueva, S. N. Kyazhin, V. A. Popov
119
About methods of developing consistent description of the MROSL DP-model for OS and DBMS for its verification with Rodin and ProB tools
P. N. Devyanin, M. A. Leonova
126
zk-SNARK-based data privacy method
D. O. Kondyrev
132
Control Flow Flattening deobfuscation using symbolic execution
V. V. Lebedev
134
Application of x86 extensions for code protection
R. K. Lebedev, I. A. Koryakin
138
Extended grammar-based fuzzing algorithm for JavaScript Engines
M. S. Nedyak
140
Extension and analysis of information hiding method Deep Steganography
A. A. Nikolaev
146
Adaptation of the Rosenblatt — Parzen method for the experimental evaluation of the computing system reliability
V. S. Nikulin
148

Applied Theory of Coding and Graphs
Bases over the field $\mathrm{GF(2)}$ generated by the Schur — Hadamard operation
K. L. Geut, S. S. Titov
154
On decomposability of Schur — Hadamard product of the tensor products sum of Reed — Muller codes
Yu. V. Kosolapov, E. A. Lelyuk
158
Regular vertex $1$-extension for $2$-dimension meshes
A. A. Lobov, M. B. Abrosimov
161
On attractors in one discrete binary dynamic system with bipartite dependency graph
R. I. Panteleev, A. V. Zharkova
163
Schemes for constructing minimal vertex $1$-extensions of complete bicolored graphs
P. V. Razumovskii, M. B. Abrosimov
165
Towards the security of McEliece's cryptosystem based on Hermitian subfield subcodes
G. P. Nagy, S. El Khalfaoui
168

Mathematical Foundations of Informatics and Programming
On a solution of polynomial grammars and the general algebraic equation
O. I. Egorushkin, I. V. Kolbasina, K. V. Safonov
176
On generic complexity of the isomorphism problem for finite semigroups
A. N. Rybalov
178

Computational methods in discrete mathematics
On a heuristic approach to constructing bijective vector Boolean functions with given cryptographic properties
M. A. Kovrizhnykh, D. B. Fomin
181
Some subgroups of the Burnside group $B_0(2,5)$
A. A. Kuznetsov, A. S. Kuznetsova
184
DPLL-like satisfiability problem solver over the system of ANF equations
A. V. Tkachev, K. V. Kalgin
187
Prikladnaya Diskretnaya Matematika. Supplement
 
Contact us:
 Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2022