|
Theoretical Foundations of Applied Discrete Mathematics
|
|
Generalized Narayana polynomials and their $q$-analogues L. N. Bondarenko, M. L. Sharapova
|
6 |
|
A criterion for checking the hypothesis about the existence of embeddings into a binary Markov chain A. V. Volgin
|
9 |
|
An algorithm for recognizing the completeness of a set of words and dynamics of prohibitions A. A. Evdokimov
|
10 |
|
On a sufficient condition for impossibility to reduce the period of the high order binary digit position sequences over primary rings S. A. Kuzmin
|
12 |
|
On groups generated by mixed type permutations and key addition groups B. A. Pogorelov, M. A. Pudovkina
|
14 |
|
On the classification of distance-transitive orbital graphs of overgroups of the Jevons group B. A. Pogorelov, M. A. Pudovkina
|
16 |
|
|
Discrete Functions
|
|
On special class of vectorial Boolean functions and the problem of APN permutations existence V. A. Vitkup
|
19 |
|
On differential equivalence of quadratic APN functions A. A. Gorodilova
|
21 |
|
Functions with variative-coordinate polynomiality over group A. I. Zueva, A. V. Karpov
|
24 |
|
On the Hamming distance between two bent functions N. A. Kolomeec
|
27 |
|
On the set of values for Hamming distance between self-dual bent functions A. V. Kutsenko
|
29 |
|
Necessary condition for maximum component algebraic immunity of a vectorial Boolean function D. P. Pokrasenko
|
30 |
|
The presentation of Magma and $2$-GOST block cipher semibyte substitutions by algebraic threshold functions D. A. Soshin
|
32 |
|
On the set of derivatives of a Boolean bent function N. N. Tokareva
|
35 |
|
On quadratic form rank distribution and asymptotic bounds of affinity level A. V. Cheremushkin
|
36 |
|
Functions on distance one from APN functions in small number of variables G. I. Shushuev
|
39 |
|
|
Mathematical Methods of Cryptography
|
|
To cryptanalysis of $2$-cascade finite automata cryptographic generators G. P. Agibalov, I. A. Pankratova
|
41 |
|
On the group generated by the round functions of the block cipher Kuznechik V. V. Vlasova, M. A. Pudovkina
|
43 |
|
Estimations of cryptographic resistance of ciphers in the Trivium family to SAT-based cryptanalysis O. S. Zaikin, I. V. Otpuschennikov, A. A. Semenov
|
46 |
|
Experimental research on exponents of mixing matrices for generalized Feistel networks A. M. Koreneva, V. N. Martyshin
|
48 |
|
Sufficient variables for transition function of a modified additive generator A. M. Koreneva, V. M. Fomichev
|
51 |
|
Search of an information message in noisy code blocks at repeated data transmission Y. V. Kosolapov, O. Y. Turchenko
|
55 |
|
On the accuracy of matrix-graph approach to investigation of transformation mixing properties S. N. Kyazhin, P. V. Lebedev
|
57 |
|
Mixing properties of $2$-cascade generators S. N. Kyazhin, V. M. Fomichev
|
60 |
|
Analogues of the Shannon theorem for non-minimal endomorphic perfect ciphers N. V. Medvedeva, S. S. Titov
|
62 |
|
A method for building a cryptographic generator of sequences with specified index of unrepeatability D. A. Romanko, V. M. Fomichev
|
65 |
|
Applications of two-faced processes to pseudorandom number generation B. Ya. Ryabko
|
68 |
|
On key schedule for block ciphers without week keys V. M. Fomichev
|
70 |
|
Cryptanalysis of the McEliece PKC based on $(k-1)$-Reed–Muller subcodes I. V. Chizhov, M. A. Borodin
|
73 |
|
|
Mathematical Foundations of Computer Security
|
|
Undeniable onion routing protocol with message creation time verification N. I. Anisenya
|
76 |
|
On discrete automaton models of attacks in computer networks D. E. Gorbatenko, S. E. Kochemazov, A. A. Semenov
|
80 |
|
About results of designing hierarchical representation of MROSL DP-model P. N. Devyanin
|
83 |
|
Confidentiality preserving scheme for the algorithm RAID-PIR M. R. Kascheev, Y. V. Kosolapov
|
87 |
|
HMAC obfuscation method for implementation in untrusted systems D. N. Kolegov, O. V. Broslavsky, N. E. Oleksov
|
89 |
|
Web application firewalls identification in MitB-model D. N. Kolegov, P. A. Lineytsev
|
92 |
|
Lightweight implementation of ABAC mechanism on Database Firewall D. N. Kolegov, N. O. Tkachenko
|
93 |
|
|
Mathematical Foundations of Reliability of Computing and Control Systems
|
|
On the reliability of circuits in the Rosser–Tourkett basis (in $P_k$) M. A. Alekhina, O. Yu. Barsukova
|
96 |
|
The unreliability of circuits in case coalescences of elements inputs M. A. Alekhina, O. A. Logvina
|
98 |
|
|
Applied Theory of Automata and Graphs
|
|
Refinement of lower bounds for the number of additional arcs in a minimal vertex $1$-extension of oriented path M. B. Abrosimov, O. V. Modenova
|
101 |
|
On the number of optimal $1$-hamiltonian graphs with the number of vertices up to $26$ and $28$ M. B. Abrosimov, S. A. Suhov
|
103 |
|
About one heritage character in cyclic semigroups of graphs Y. E. Avezova, V. M. Fomichev
|
105 |
|
Enumeration of labelled flower wheel graphs V. A. Voblyi, A. K. Meleshko
|
109 |
|
On the full diversity of balls for graphs A. A. Evdokimov, E. P. Kutcenogaya, T. I. Fedoryaeva
|
110 |
|
On attractors in finite dynamic systems of complete graphs orientations A. V. Zharkova
|
112 |
|
About simple conditional experiments identifying invertible automata of a certain class A. O. Zhukovskaja, V. N. Trenkaev
|
115 |
|
About transitive property of mappings associated with a finite state machines from the groups $AS_p$ M. V. Karandashov
|
115 |
|
|
Mathematical Foundations of Informatics and Programming
|
|
On consistency of systems of symbolic polynomial equations and their application O. I. Egorushkin, I. V. Kolbasina, K. V. Safonov
|
119 |
|
LYaPAS-T into fasm translator for Windows and Linux V. N. Knyazev, M. S. Knyazeva
|
121 |
|
Modular translator from LYaPAS D. A. Stefantsov, V. O. Safonov, V. V. Pershin, S. Yu. Grechnev, P. A. Tomskikh
|
122 |
|
Methods for synthesizing predicate program pieces M. S. Chushkin, V. I. Shelekhov
|
126 |
|
|
Computational methods in discrete mathematics
|
|
Application of solving SAT algorithms to constructing differential paths for finding collisions of cryptographic hash functions in the MD family I. A. Gribanova
|
129 |
|
On the growth functions of finite two generator Burnside groups of exponent five A. A. Kuznetsov, S. S. Karchevsky
|
132 |