|
Author Index, 2024, Volume 15
L. R. Akhmetzyanova, see E. K. Alekseev Mat. Vopr. Kriptogr., 2024, Volume 15:2, 7–28
|
E. K. Alekseev, L. R. Akhmetzyanova, A. A. Babueva, L. O. Nikiforova, S. V. Smyshlyaev Two-party GOST signature scheme Mat. Vopr. Kriptogr., 2024, Volume 15:2, 7–28
|
A. A. Babueva, see E. K. Alekseev Mat. Vopr. Kriptogr., 2024, Volume 15:2, 7–28
|
S. A. Davydov, Yu. D. Shkuratov Circulant matrices over $\mathbb{F}_2$ and their use for the construction of efficient linear transformations with high branch numbers Mat. Vopr. Kriptogr., 2024, Volume 15:2, 29–46
|
R. A. De La Krus Khimenes, see O. C. Puente Mat. Vopr. Kriptogr., 2024, Volume 15:1, 97–125
|
O. V. Denisov Difference characteristics of random maps and their compositions Mat. Vopr. Kriptogr., 2024, Volume 15:1, 5–20
|
V. O. Drelikhov On the constructions of Markov maps Mat. Vopr. Kriptogr., 2024, Volume 15:1, 21–34
|
M. A. Goltvanitsa Elementary Abelian regular subgroups of vector space affine group related to cryptanalysis. II Mat. Vopr. Kriptogr., 2024, Volume 15:3, 9–47
|
G. I. Ivchenko, Yu. I. Medvedev Random $A$-permutations in a parametric model Mat. Vopr. Kriptogr., 2024, Volume 15:1, 35–55
|
G. I. Ivchenko, Yu. I. Medvedev Records in random permutations Mat. Vopr. Kriptogr., 2024, Volume 15:3, 49–66
|
O. V. Kamlovskii, V. V. Mizerov Frequency characteristics of sequences generated by the stream encryption algorithm GEA-1 Mat. Vopr. Kriptogr., 2024, Volume 15:3, 67–82
|
V. A. Kiryukhin On the security aspects of protocol CRISP Mat. Vopr. Kriptogr., 2024, Volume 15:1, 57–81
|
V. A. Kiryukhin About «$k$-bit security» of MACs based on hash function Streebog Mat. Vopr. Kriptogr., 2024, Volume 15:2, 47–68
|
V. A. Kopyttsev Reliability estimate of the maximum likelihood method used for the solution of systems of equations with distorted right parts Mat. Vopr. Kriptogr., 2024, Volume 15:1, 83–95
|
Yu. V. Kosolapov, E. A. Lelyuk The McEliece-type cryptosystem based on $D$-codes Mat. Vopr. Kriptogr., 2024, Volume 15:2, 69–90
|
O. A. Kozlitin Remote voting protocols. II Mat. Vopr. Kriptogr., 2024, Volume 15:3, 83–100
|
D. A. Kronberg A quantum scheme for attack on a phase-time encoded quantum cryptography protocol Mat. Vopr. Kriptogr., 2024, Volume 15:2, 91–100
|
R. F. Leal, see O. C. Puente Mat. Vopr. Kriptogr., 2024, Volume 15:1, 97–125
|
E. A. Lelyuk, see Yu. V. Kosolapov Mat. Vopr. Kriptogr., 2024, Volume 15:2, 69–90
|
Yu. I. Medvedev, see G. I. Ivchenko Mat. Vopr. Kriptogr., 2024, Volume 15:1, 35–55
|
Yu. I. Medvedev, see G. I. Ivchenko Mat. Vopr. Kriptogr., 2024, Volume 15:3, 49–66
|
V. V. Mizerov, see O. V. Kamlovskii Mat. Vopr. Kriptogr., 2024, Volume 15:3, 67–82
|
L. O. Nikiforova, see E. K. Alekseev Mat. Vopr. Kriptogr., 2024, Volume 15:2, 7–28
|
O. C. Puente, R. F. Leal, R. A. de la Cruz Jiménez On the Bit-Slice representations of some nonlinear bijective transformations Mat. Vopr. Kriptogr., 2024, Volume 15:1, 97–125
|
V. G. Ryabov Distance between vectorial Boolean functions and affine analogues (following the Eighth International Olympiad in Cryptography) Mat. Vopr. Kriptogr., 2024, Volume 15:1, 127–142
|
A. V. Sarantsev Description of the feedback function of a nonlinear shift register Mat. Vopr. Kriptogr., 2024, Volume 15:3, 101–112
|
Yu. D. Shkuratov, see S. A. Davydov Mat. Vopr. Kriptogr., 2024, Volume 15:2, 29–46
|
S. V. Smyshlyaev, see E. K. Alekseev Mat. Vopr. Kriptogr., 2024, Volume 15:2, 7–28
|
K. D. Tsaregorodtsev Privacy and integrity properties of $\mathrm{ECIES}$ scheme Mat. Vopr. Kriptogr., 2024, Volume 15:2, 101–136
|
K. D. Tsaregorodtsev Alternative security models for a pseudorandom function Mat. Vopr. Kriptogr., 2024, Volume 15:3, 113–134
|
|
|