6–7
Alekseenko E.S., Aleshnikov S. I., Zaytsev A.I. Optimal curves of genus 3 over finite field with discriminant -19 . // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 6–7.
7–9
Grishin A. M. Some properties of the discrete Fourier transform in the field of complex numbers and in the fields of finite characteristics // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 7–9.
10–11
Ivanov A. V., Romanov V.N. Constructing the classes of boolean functions with guaranteed cryptographic properties on the base of coordinate functions of the finite field power mappings // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 10–11.
11–12
Kolomeec N. A. Connections between subspaces on which bent function and its dual function are affine. // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 11–12.
13–14
Tokareva N. N. A new combinatorial construction of bent functions // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 13–14.
14–15
Tuzhilm M. E. Generation of the alternating group by semiregular involutions // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 14–15.
15–19
Fomichev V. M. The properties of external control sequences // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 15–19.
20–21
Zolotukhin V. U, Chaikin T.A. Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key information // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 20–21.
21–23
Kiselyov S. A. On the reduction of key space for A5/1 // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 21–23.
23–24
Miloshenko A. V. A hardware implementation of the cryptosystem based on the zakrevskij FSM // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 23–24.
25–27
Pestunov A.I. Complexity estimation for a differential attack on a block cipher with given parameters // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 25–27.
27–29
Pudovkina M. A. On weak key-scheduling algorithms relatively the related-key attack // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 27–29.
29–30
Pudovkina M. A, Khoruzhenko G. I. Attacks on full block cipher GOST 28147-89 with 2 or 4 related keys // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 29–30.
30–31
Pudovkina M. A. Differential at tack on 6-round whirlpoollike block ciphers // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 30–31.
32–34
Sukhinin B.M. High-speed pseudorandom sequence generators based on cellular automata // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 32–34.
34–35
Chizhov I. V. The relationship between structure of the key space and hardness of the Mceliece-Sidelnikov public key crypto system // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 34–35.
35–36
Shirokov I. V. Symmetric cipher on the base of non-commutative algebra of polynomials // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 35–36.
37–39
Modenova O. V. Steganography and steganalysis in video files // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 37–39.
39–41
Razinkov E. V., Latypov R. Kh. On steganographic system selection rule // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 39–41.
41–44
Solovjev T.M., Chernyak R. I. Fingerprints resistant to collusion attacks // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 41–44.
44–45
Shoytov A.M. Bout the fact of detecting the noise in finite Markov chain with an unknown transition probability matrix // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 44–45.
46–47
Brechka D.M. he search of tg-paths and islands for Take-Grant security model // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 46–47.
47–49
Grishchenko K. A. Telectronic mail systems access control and information flow control modeling // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 47–49.
49–51
Devyanin P. N. Security analysis of systems with simple trajectories functioning within framework of the base role dp-model // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 49–51.
52–53
Kachanov M. A. About time information flows in computer systems // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 52–53.
53–55
Kolegov D. N. Teaching the protected computer nets design at the Cisco platform // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 53–55.
55–58
Nissenbaum O. V, Prisyazhnuk A. S. Adaptive algorithm for anomalous network traffic indication based on alternating process // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 55–58.
59–60
Pautov P. A. Authentication in multi-tier system using commutative encryption // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 59–60.
61–62
Smith I. V. The code injection to the process under an operating system GNU/Linux // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 61–62.
62–64
Tkachenko N. O, Chernov D. V. Design and development of capture the flag game server for competitions in information security // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 62–64.
65–66
Tsoy M. I. Using Scyther for analysis SKID3 security // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 65–66.
67–68
Abrosimov M.B. On minimal edge k-extensions of oriented stars // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 67–68.
68–70
Abrosimov M.B., Komarov D.D. On minimal vertex 1-extensions of special form superslim trees // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 68–70.
70–72
Dimitriev Yu. K, Zadorozhny A. F. Application of unreliable tests for self-diagnostics of modular computing systems with multiple faults // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 70–72.
72–73
Dolgov A. A. About one family of exact 2-extensions of tournaments // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 72–73.
74–75
Melent'ev V. A. An analytical approach to the synthesis of regular structures of fault-tolerant systems // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 74–75.
76–78
Bykova V. V. Elasticity of algorithms // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 76–78.
78–79
Gorelov V. V. Resource usage analysis in software // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 78–79.
79–81
Makarov A. N. An approach to fuzz testing data generation for applied and system software // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 79–81.
81–82
Otpuschennikov I. V., Semenov A. A. Software translating of combinatorial problems to propositional logic // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 81–82.
82–83
Safonov K. V., Kalugin-Balashov D.A. On representation of contextfree languages by diagonals of linear laguages // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 82–83.
84–85
Stephantsov D. A., Kryukova A. E. Formal proof of the semantic equivalence between the core of the AOP language AspectTalk and the OOP language smalltalk // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 84–85.
86–87
Bespalov D. V., Bulavintsev V. G, Semenov A. A. Cryptanalysis with graphical processing units (GPU ) // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 86–87.
87–88
Dmukh A. A. Experimental estimation for software implementation speed of some block cipher's transformations // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 87–88.
88–90
Pankratov I.V., Teploukhova O. A. Estimating complexity of directed enumeration in non-uniformly distributed key spaces // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 88–90.
90–91
Faizullin R. T. Minimization procedure for HAMILTONIAN CIRCUIT and GRAPH ISOMORPHISM problems // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 90–91.
92–94
Akishev I.R., Dvorkin M. E. On constructing minimal deterministic finite automaton recognizing a prefix-code of given cardinality // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 92–94.
94–95
Badeha I. A, Roldugm P. V. About relationship between parameters of certain graphs // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 94–95.
95–97
Pavlov A. V. Bent functions and linear codes for CDMA // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 95–97.
97–98
Prolubnikov A. V. On a new complete invariant for acyclic graphs // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 97–98.
98–99
Salii V. N. On the frame of an automaton // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 98–99.
99–101
Tatarinov E. A. Classes of graphs reconstructed with linear time complexity. // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 99–101.
101–102
Trenkaev V. N. Reconfigurable finite state machines with shared memory // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 101–102.
103–105
Kolesnikova S. I., Belous A. A. State estimation for stochastic object on the base of modeling trend in time series // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 103–105.
105–108
Yankovskaya A.E., Gedike A. I. Logical inference on the base of optimal subset of mixed diagnostic tests for intelligent systems // Applied Discrete Mathematics. Supplement. 2010. № 3. P. 105–108.
