|
Theoretical Foundations of Applied Discrete Mathematics
|
|
The unicity distance of à coordinate sequences family generated by complications of LRS over a Galois ring D. N. Bilkov
|
5 |
|
On a solving of algebraic equations systems associated with context-free languages O. I. Yegorushkin, D. A. Kalugin-Balashov, K. V. Safonov
|
8 |
|
On quasigroups arising from physical structure of $(2,2)$ rank R. M. Muradov, V. A. Kirov
|
12 |
|
Generating the normal periodic sequences on the base of cyclically minimal numbers A. G. Pozdeyev
|
15 |
|
The algebraic immunity of boolean functions M. Tuzhilin
|
18 |
|
On $c$-width of finite noncyclic groups V. M. Fomichev
|
23 |
|
|
Mathematical Methods of Cryptography
|
|
Some applications of quasigroups in cryptography M. M. Glukhov
|
28 |
|
Presentation of cryptosystems via polybasic algebraic system E. A. Ivaschenko, V. G. Skobelev
|
33 |
|
Inverse dynamical systems with variable dimension of phase space in problems of cryptographic information transformation A. M. Kovalev, V. A. Kozlovskii, V. F. Shcherbak
|
39 |
|
About the direct operational analysis of symmetric ciphers A. M. Kukartsev, A. M. Popov, V. S. Shestakov
|
45 |
|
Perfect secret sharing schemes N. G. Parvatov
|
50 |
|
Properties of Feistel's ciphers relative to two wreath products M. A. Pudovkina
|
58 |
|
Analysis of attacks onto quantum public key distribution system V. G. Skobelev
|
62 |
|
|
Mathematical Foundations of Computer Security
|
|
Methods for protecting speech information A. M. Grishin
|
67 |
|
Foundations of the methods for the base expert analysis of information risks V. V. Zolotarev, E. A. Shirkova
|
71 |
|
Security linux extension based on system calls interposition M. A. Kachanov, D. N. Kolegov
|
76 |
|
About the CTF – computer security competitions D. N. Kolegov, Yu. N. Chernushenko
|
81 |
|
Centralized analysis of geographically-distributed network traffic V. V. Lapshin
|
84 |
|
The problem of authentication in the multi-tier applications P. A. Pautov
|
87 |
|
Process management of access rights distribution on the basis of the business-processes analysis T. M. Pestunova, Z. V. Rodionova
|
91 |
|
|
Mathematical Foundations of Reliability of Computing and Control Systems
|
|
Efficiency of local self-diagnosing in computing systems with circulant diagnostic structure Yu. K. Dimitriev
|
96 |
|
Function of structural fault tolerance and $d$-limited connected component of cs graph V. A. Melent'ev
|
102 |
|
Searching $(s,t)$-cutsets of computing system graph with diameter limiting of connected components V. A. Melent'ev
|
107 |
|
|
Computational Methods in Discrete Mathematics
|
|
Global optimization problems associated with cryptographic analysis of asymmetric ciphers V. I. Dulkeyt, R. T. Faizullin, I. G. Khnikin
|
113 |
|
Analysis of some cryptographic primitives on computer clusters A. A. Semenov, O. S. Zaikin, D. V. Bespalov, P. S. Burov, A. E. Hmelnov
|
120 |
|
|
Applied Coding Theory
|
|
Arithmetic coding of messages using random sequence V. N. Potapov
|
131 |