|
Theoretical Backgrounds of Applied Discrete Mathematics
|
|
The class of balanced algebraic threshold functions D. A. Soshin
|
5–9 |
|
Linear decomposition of Boolean functions into a sum or a product of components A. V. Cheremushkin
|
10–22 |
|
|
Mathematical Methods of Cryptography
|
|
Asymmetric cryptosystems on Boolean functions G. P. Agibalov, I. A. Pankratova
|
23–33 |
|
Mathematical methods in solutions of the problems presented at the Third International Students' Olympiad in Cryptography N. Tokareva, A. Gorodilova, S. Agievich, V. Idrisova, N. Kolomeec, A. Kutsenko, A. Oblaukhov, G. Shushuev
|
34–58 |
|
|
Mathematical Methods of Steganography
|
|
Efficient steganography detection by means of compression-based integral classifier V. A. Monarev, A. I. Pestunov
|
59–71 |
|
|
Mathematical Foundations of Computer Security
|
|
Deniable group communications in the presence of global unlimited adversary V. F. Sheidaev, D. Y. Gamayunov
|
72–86 |
|
|
Applied Graph Theory
|
|
Study of graph isomorphism using Jordan forms of adjacency matrices M. I. Volodicheva, S. N. Leora
|
87–99 |
|
|
Mathematical Backgrounds of Informatics and Programming
|
|
Relativized generic classes $\mathrm P$ and $\mathrm{NP}$ A. N. Rybalov
|
100–104 |
|
Construction of a Hamming network based on a crossbar with binary memristors M. S. Tarkov
|
105–113 |
|
|
Discrete Models for Real Processes
|
|
Formal grammar of Russian language in examples Ya. M. Mirzabekov, Sh. B. Shihiev
|
114–126 |