Prikladnaya Diskretnaya Matematika
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


2008, Number 2(2)  


Theoretical Foundations of Applied Discrete Mathematics
The unicity distance of а coordinate sequences family generated by complications of LRS over a Galois ring
D. N. Bilkov
5–7
On a solving of algebraic equations systems associated with context-free languages
O. I. Yegorushkin, D. A. Kalugin-Balashov, K. V. Safonov
8–11
On quasigroups arising from physical structure of $(2,2)$ rank
R. M. Muradov, V. A. Kirov
12–14
Generating the normal periodic sequences on the base of cyclically minimal numbers
A. G. Pozdeyev
15–17
The algebraic immunity of boolean functions
M. Tuzhilin
18–22
On $c$-width of finite noncyclic groups
V. M. Fomichev
23–27

Mathematical Methods of Cryptography
Some applications of quasigroups in cryptography
M. M. Glukhov
28–32
Presentation of cryptosystems via polybasic algebraic system
E. A. Ivaschenko, V. G. Skobelev
33–38
Inverse dynamical systems with variable dimension of phase space in problems of cryptographic information transformation
A. M. Kovalev, V. A. Kozlovskii, V. F. Shcherbak
39–44
About the direct operational analysis of symmetric ciphers
A. M. Kukartsev, A. M. Popov, V. S. Shestakov
45–49
Perfect secret sharing schemes
N. G. Parvatov
50–57
Properties of Feistel's ciphers relative to two wreath products
M. A. Pudovkina
58–61
Analysis of attacks onto quantum public key distribution system
V. G. Skobelev
62–66

Mathematical Foundations of Computer Security
Methods for protecting speech information
A. M. Grishin
67–70
Foundations of the methods for the base expert analysis of information risks
V. V. Zolotarev, E. A. Shirkova
71–75
Security linux extension based on system calls interposition
M. A. Kachanov, D. N. Kolegov
76–80
About the CTF – computer security competitions
D. N. Kolegov, Yu. N. Chernushenko
81–83
Centralized analysis of geographically-distributed network traffic
V. V. Lapshin
84–86
The problem of authentication in the multi-tier applications
P. A. Pautov
87–90
Process management of access rights distribution on the basis of the business-processes analysis
T. M. Pestunova, Z. V. Rodionova
91–95

Mathematical Foundations of Reliability of Computing and Control Systems
Efficiency of local self-diagnosing in computing systems with circulant diagnostic structure
Yu. K. Dimitriev
96–101
Function of structural fault tolerance and $d$-limited connected component of cs graph
V. A. Melent'ev
102–106
Searching $(s,t)$-cutsets of computing system graph with diameter limiting of connected components
V. A. Melent'ev
107–112

Computational Methods in Discrete Mathematics
Global optimization problems associated with cryptographic analysis of asymmetric ciphers
V. I. Dulkeyt, R. T. Faizullin, I. G. Khnikin
113–119
Analysis of some cryptographic primitives on computer clusters
A. A. Semenov, O. S. Zaikin, D. V. Bespalov, P. S. Burov, A. E. Hmelnov
120–130

Applied Coding Theory
Arithmetic coding of messages using random sequence
V. N. Potapov
131–133
Прикладная дискретная математика
 
  Contact us:
 Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2026