191 research outputs found

    Cryptographic properties of a simple S-box construction based on a Boolean function and a permutation

    Get PDF
    We propose a simple method of constructing S-boxes using Boolean functions and permutations. Let n be an arbitrary permutation on n elements, f be a Boolean function in n variables. Define a vectorial Boolean function Fn : F^ F^ as Fn(x) = = (f (x), f (n(x)), f (n2(x)),..., f (nn-1(x))). We study cryptographic properties of Fn such as high nonlinearity, balancedness, low differential 5-uniformity in dependence on properties of f and n for small n

    Metrical properties of the set of bent functions in view of duality

    Get PDF
    In the paper, we give a review of metrical properties of the entire set of bent functions and its significant subclasses of self-dual and anti-self-dual bent functions. We present results for iterative construction of bent functions in n + 2 variables based on the concatenation of four bent functions and consider related open problem proposed by one of the authors. Criterion of self-duality of such functions is discussed. It is explored that the pair of sets of bent functions and affine functions as well as a pair of sets of self-dual and anti-self-dual bent functions in n > 4 variables is a pair of mutually maximally distant sets that implies metrical duality. Groups of automorphisms of the sets of bent functions and (anti-)self-dual bent functions are discussed. The solution to the problem of preserving bentness and the Hamming distance between bent function and its dual within automorphisms of the set of all Boolean functions in n variables is considered

    Mathematical methods in solutions of the problems from the Third International Students' Olympiad in Cryptography

    Get PDF
    The mathematical problems and their solutions of the Third International Students' Olympiad in Cryptography NSUCRYPTO'2016 are presented. We consider mathematical problems related to the construction of algebraic immune vectorial Boolean functions and big Fermat numbers, problems about secrete sharing schemes and pseudorandom binary sequences, biometric cryptosystems and the blockchain technology, etc. Two open problems in mathematical cryptography are also discussed and a solution for one of them proposed by a participant during the Olympiad is described. It was the first time in the Olympiad history

    On the number of unsuitable boolean functions in constructions of filter and combining models of stream ciphers

    Get PDF
    It is well known that every stream cipher is based on a good pseudorandom generator. For cryptographic purposes, we are interested in generation of pseudorandom sequences of the maximal possible period. A feedback register is one of the most known cryptographic primitives that is used in construction of stream generators. We analyze periodic properties of pseudorandom sequences produced by filter and combiner generators equipped with nonlinear Boolean functions. We determine which nonlinear functions in these schemes lead to pseudorandom sequences of not maximal possible period. We call such functions unsuitable and count the exact number of them for an arbitrary n

    Problems and prospects of implementation controlling as a modern enterprise management tool

    No full text
    The article includes problematic aspects implementation of the introduction of controlling in the enterprise. Identified the basic approaches and principles of organizations and implementation controlling. Described the basic problem faced by enterprises in the during organization and implementation controlling. Considered problems arising in case of implementing controlling service in the enterprise, and ways of solutions. Also developed the scheme implementing a mechanism for controlling in management system and provided characteristics of the stages of implementation of this scheme. Today controlling system is not implemented in administrative practice of Ukraine, so you should prioritize the direction of domestic enterprises, the possibility of their competition with foreign enterprises in the future and prospects of economic development, which allows the introduction of controlling.У статті розглянуто проблемні аспекти впровадження системи контролінгу на підприємстві. Визначено основні підходи та принципи організації і впровадження контролінгу. Описано основні проблеми, з якими стикаються підприємства в ході організації, а потім - і впровадження контролінгу. Розглянуто проблеми, які виникають в умовах впровадження служби контролінгу на підприємстві, та шляхи їх вирішення. Також розроблено схему впровадження механізму контролінгу в систему управління підприємством та надано характеристику етапам реалізації цієї схеми. Сьогодні система контролінгу ще недостатньо впроваджена в управлінську практику підприємств України, тому варто визначити пріоритети щодо напряму діяльності вітчизняних підприємств, можливості їх конкуренції з іноземними підприємствами в майбутньому та перспективи економічного розвитку, які дає впровадження системи контролінгу.В статье рассмотрены проблемные аспекты внедрения системы контроллинга на предприятии. Определены основные подходы и принципы организации и внедрения контроллинга. Описаны основные проблемы, с которыми сталкиваются предприятия в ходе организации, а затем - и внедрения контроллинга. Рассмотрены проблемы, возникающие в условиях внедрения контроллинга на предприятии, и пути их решения. Разработана схема внедрения механизма контроллинга в систему управления предприятием и охарактеризованы этапы реализации этой схемы. Сегодня система контроллинга еще недостаточно внедрена в управленческую практику предприятий Украины, поэтому следует определить приоритеты относительно направления деятельности отечественных предприятий, возможности их конкуренции с иностранными предприятиями в будущем и перспективы экономического развития, которые дает внедрение системы контроллинга

    Organizational and methodological approaches to development of accounting policy for formation of integrated accounting of interrelated agricultural companies

    Get PDF
    The purpose of the article is to determine advantages and drawbacks of existing organizational and methodological approaches to development of accounting policy and develop optimal approach to formation of integrated accounting of interrelated agricultural enterprises. For this purpose, the article uses methods of problem and comparative analysis, method of optimization, and methods of graphical presentation of information. The authors conduct comparative analysis of existing organizational and methodological approaches to development of accounting policy of enterprise and develop optimal approach to formation of integrated accounting of interrelated agricultural enterprises. As a result of the research, the authors come to the conclusion that Russian and international approach to development of accounting policy differ from each other, but neither of these approaches is optimal for formation of integrated accounting of interrelated agricultural enterprises. The developed optimal approach to formation of integrated accounting allows unifying the process of development of accounting policy of enterprise and thus is the best for interrelated agricultural enterprises. This approach is oriented at consumers, due to which it is able not only to simplify the process of formation of corporate accounting of interrelated agricultural enterprises but to turn it into the factor of their competitiveness.peer-reviewe

    A complete characterization of plateaued Boolean functions in terms of their Cayley graphs

    Get PDF
    In this paper we find a complete characterization of plateaued Boolean functions in terms of the associated Cayley graphs. Precisely, we show that a Boolean function ff is ss-plateaued (of weight =2(n+s2)/2=2^{(n+s-2)/2}) if and only if the associated Cayley graph is a complete bipartite graph between the support of ff and its complement (hence the graph is strongly regular of parameters e=0,d=2(n+s2)/2e=0,d=2^{(n+s-2)/2}). Moreover, a Boolean function ff is ss-plateaued (of weight 2(n+s2)/2\neq 2^{(n+s-2)/2}) if and only if the associated Cayley graph is strongly 33-walk-regular (and also strongly \ell-walk-regular, for all odd 3\ell\geq 3) with some explicitly given parameters.Comment: 7 pages, 1 figure, Proceedings of Africacrypt 201

    The Seventh International Olympiad in Cryptography: problems and solutions

    Full text link
    The International Olympiad in Cryptography NSUCRYPTO is the unique Olympiad containing scientific mathematical problems for professionals, school and university students from any country. Its aim is to involve young researchers in solving curious and tough scientific problems of modern cryptography. In 2020, it was held for the seventh time. Prizes and diplomas were awarded to 84 participants in the first round and 49 teams in the second round from 32 countries. In this paper, problems and their solutions of NSUCRYPTO'2020 are presented. We consider problems related to attacks on ciphers and hash functions, protocols, permutations, primality tests, etc. We discuss several open problems on JPEG encoding, Miller -- Rabin primality test, special bases in the vector space, AES-GCM. The problem of a modified Miller -- Rabin primality test was solved during the Olympiad. The problem for finding special bases was partially solved

    Current status of the problem of cardiovascular diseases in the Nizhny Novgorod region: possible ways to reduce mortality

    Get PDF
    The article considers the urgent problem of combating cardiovascular diseases (CVDs) in the Nizhny Novgorod region, including the high prevalence of CVDs and the timely identification of risk factors. The changes in mortality from all and individual causes was analyzed. Attention was paid to the negative impact of the coronavirus disease 2019 (COVID-19) pandemic on the health of people suffering from noncommunicable diseases. We also described the necessity to improve healthcare efficiency for CVD patients by improving the complex of managerial and preventive measures
    corecore