|
Theoretical Foundations of Applied Discrete Mathematics
|
|
The unicity distance of а coordinate sequences family generated by complications of LRS over a Galois ring D. N. Bilkov
|
5–7 |
|
On a solving of algebraic equations systems associated with context-free languages O. I. Yegorushkin, D. A. Kalugin-Balashov, K. V. Safonov
|
8–11 |
|
On quasigroups arising from physical structure of $(2,2)$ rank R. M. Muradov, V. A. Kirov
|
12–14 |
|
Generating the normal periodic sequences on the base of cyclically minimal numbers A. G. Pozdeyev
|
15–17 |
|
The algebraic immunity of boolean functions M. Tuzhilin
|
18–22 |
|
On $c$-width of finite noncyclic groups V. M. Fomichev
|
23–27 |
|
|
Mathematical Methods of Cryptography
|
|
Some applications of quasigroups in cryptography M. M. Glukhov
|
28–32 |
|
Presentation of cryptosystems via polybasic algebraic system E. A. Ivaschenko, V. G. Skobelev
|
33–38 |
|
Inverse dynamical systems with variable dimension of phase space in problems of cryptographic information transformation A. M. Kovalev, V. A. Kozlovskii, V. F. Shcherbak
|
39–44 |
|
About the direct operational analysis of symmetric ciphers A. M. Kukartsev, A. M. Popov, V. S. Shestakov
|
45–49 |
|
Perfect secret sharing schemes N. G. Parvatov
|
50–57 |
|
Properties of Feistel's ciphers relative to two wreath products M. A. Pudovkina
|
58–61 |
|
Analysis of attacks onto quantum public key distribution system V. G. Skobelev
|
62–66 |
|
|
Mathematical Foundations of Computer Security
|
|
Methods for protecting speech information A. M. Grishin
|
67–70 |
|
Foundations of the methods for the base expert analysis of information risks V. V. Zolotarev, E. A. Shirkova
|
71–75 |
|
Security linux extension based on system calls interposition M. A. Kachanov, D. N. Kolegov
|
76–80 |
|
About the CTF – computer security competitions D. N. Kolegov, Yu. N. Chernushenko
|
81–83 |
|
Centralized analysis of geographically-distributed network traffic V. V. Lapshin
|
84–86 |
|
The problem of authentication in the multi-tier applications P. A. Pautov
|
87–90 |
|
Process management of access rights distribution on the basis of the business-processes analysis T. M. Pestunova, Z. V. Rodionova
|
91–95 |
|
|
Mathematical Foundations of Reliability of Computing and Control Systems
|
|
Efficiency of local self-diagnosing in computing systems with circulant diagnostic structure Yu. K. Dimitriev
|
96–101 |
|
Function of structural fault tolerance and $d$-limited connected component of cs graph V. A. Melent'ev
|
102–106 |
|
Searching $(s,t)$-cutsets of computing system graph with diameter limiting of connected components V. A. Melent'ev
|
107–112 |
|
|
Computational Methods in Discrete Mathematics
|
|
Global optimization problems associated with cryptographic analysis of asymmetric ciphers V. I. Dulkeyt, R. T. Faizullin, I. G. Khnikin
|
113–119 |
|
Analysis of some cryptographic primitives on computer clusters A. A. Semenov, O. S. Zaikin, D. V. Bespalov, P. S. Burov, A. E. Hmelnov
|
120–130 |
|
|
Applied Coding Theory
|
|
Arithmetic coding of messages using random sequence V. N. Potapov
|
131–133 |