RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika // Archive

2008, Number 2(2)


Theoretical Foundations of Applied Discrete Mathematics
The unicity distance of à coordinate sequences family generated by complications of LRS over a Galois ring
D. N. Bilkov
5
On a solving of algebraic equations systems associated with context-free languages
O. I. Yegorushkin, D. A. Kalugin-Balashov, K. V. Safonov
8
On quasigroups arising from physical structure of $(2,2)$ rank
R. M. Muradov, V. A. Kirov
12
Generating the normal periodic sequences on the base of cyclically minimal numbers
A. G. Pozdeyev
15
The algebraic immunity of boolean functions
M. Tuzhilin
18
On $c$-width of finite noncyclic groups
V. M. Fomichev
23

Mathematical Methods of Cryptography
Some applications of quasigroups in cryptography
M. M. Glukhov
28
Presentation of cryptosystems via polybasic algebraic system
E. A. Ivaschenko, V. G. Skobelev
33
Inverse dynamical systems with variable dimension of phase space in problems of cryptographic information transformation
A. M. Kovalev, V. A. Kozlovskii, V. F. Shcherbak
39
About the direct operational analysis of symmetric ciphers
A. M. Kukartsev, A. M. Popov, V. S. Shestakov
45
Perfect secret sharing schemes
N. G. Parvatov
50
Properties of Feistel's ciphers relative to two wreath products
M. A. Pudovkina
58
Analysis of attacks onto quantum public key distribution system
V. G. Skobelev
62

Mathematical Foundations of Computer Security
Methods for protecting speech information
A. M. Grishin
67
Foundations of the methods for the base expert analysis of information risks
V. V. Zolotarev, E. A. Shirkova
71
Security linux extension based on system calls interposition
M. A. Kachanov, D. N. Kolegov
76
About the CTF – computer security competitions
D. N. Kolegov, Yu. N. Chernushenko
81
Centralized analysis of geographically-distributed network traffic
V. V. Lapshin
84
The problem of authentication in the multi-tier applications
P. A. Pautov
87
Process management of access rights distribution on the basis of the business-processes analysis
T. M. Pestunova, Z. V. Rodionova
91

Mathematical Foundations of Reliability of Computing and Control Systems
Efficiency of local self-diagnosing in computing systems with circulant diagnostic structure
Yu. K. Dimitriev
96
Function of structural fault tolerance and $d$-limited connected component of cs graph
V. A. Melent'ev
102
Searching $(s,t)$-cutsets of computing system graph with diameter limiting of connected components
V. A. Melent'ev
107

Computational Methods in Discrete Mathematics
Global optimization problems associated with cryptographic analysis of asymmetric ciphers
V. I. Dulkeyt, R. T. Faizullin, I. G. Khnikin
113
Analysis of some cryptographic primitives on computer clusters
A. A. Semenov, O. S. Zaikin, D. V. Bespalov, P. S. Burov, A. E. Hmelnov
120

Applied Coding Theory
Arithmetic coding of messages using random sequence
V. N. Potapov
131


© Steklov Math. Inst. of RAS, 2026