Construction of a Reversible Full-cycle Transformation in a Threshold Basis
( Pp. 36-41)

More about authors
Nikonov Vladimir G. Doctor of Engineering, Professor; member at the Presidium
Russian Academy of Natural Sciences
Moscow, Russian Federation Zobov Anton I. research employee of Foundation for the Promotion of Secure Information Technologies. Moscow, Russian Federation. E-mail: zobowai@gmail.com
Foundation for the Promotion of Secure Information Technologies
Moscow, Russian Federation
Abstract:
The article describes a class of full-cycle transformations in the threshold basis, defined by matrices of coefficients of linear forms, and proves that the definition of the inverse transformation is carried out using a system of threshold functions, the coefficients of which form the transposed matrix with respect to the original one.
How to Cite:
Nikonov V.G., Zobov A.I. Construction of a Reversible Full-cycle Transformation in a Threshold Basis. Computational Nanotechnology. 2023. Vol. 10. No. 2. Pp. 36–41. (In Rus.) DOI: 10.33693/2313-223X-2023-10-2-36-41. EDN: BHHIVN
Reference list:
Zobov A.I., Nikonov V.G. On the possibility of applying fractal models in the construction of information security systems. Comp. nanotechnol. 2017. No. 1. Pp. 39–49. (In Rus.)
Logachev O.A., Salnikov A.A., Smyshlyaev S.V., Yashchenko V.V. Boolean functions in coding theory and cryptography. 2nd ed., add. Moscow: MCCME, 2012. 584 p.
Logachev O.A., Fedorov S.N., Yashchenko V.V. Boolean functions as points on the hypersphere in Euclidean space. Discrete Mathematics. 2018. Vol. 30. No. 1. Pp. 39–55. (In Rus.)
Nikonov V.G., Sarantsev A.V. Methods for compact implementation of bijective mappings defined by regular systems of identical Boolean functions. Bulletin of the Peoples’ Friendship University of Russia. Series: Applied Mathematics and Industrial Mathematics. 2003. Vol. 2. No. 1. Pp. 94–105. (In Rus.)
Yablonsky S.V. Introduction to discrete mathematics: textbook for universities. 2nd ed., rev. and add. Moscow: Nauka; Chief Ed. of Phys.-Math. Lit. 384 p.
Keywords:
substitution, threshold function, full cycle.


Related Articles

1. MATHEMATICAL MODELING, NUMERICAL METHODS AND COMPLEX PROGRAMS Pages: 7-14 Issue №9439
ABOUT THE NEW ALGORITM OF CHARACTERIZATION OF k-VALUED THRESHOLD FUNCTIONS
threshold function k-valued logic characterization of threshold functions growth factors the coefficients of increase
Show more
1. MATHEMATICAL MODELING, NUMERICAL METHODS AND COMPLEX PROGRAMS Pages: 6-13 Issue №6518
ABOUT BIJECTIVITY OF TRANSFORMATIONS DETERMINED BY QUASI-HADAMARD MATRIXES
bijective mapping threshold function quasidemocracy matrix
Show more
2. MATHEMATICAL MODELING, NUMERICAL METHODS AND COMPLEX PROGRAMS Pages: 26-30 Issue №5869
Geometrical approach to the argumentum of bijection of one coordinate-threshold reflection
bijective mapping threshold function multidimensional cones quasidemocracy matrix
Show more
Multiscale modeling for information control and processing Pages: 34-41 DOI: 10.33693/2313-223X-2020-7-2-34-41 Issue №16932
Combinatorial polynomially computable characteristics of substitutions and their properties
BelT Hazad Skipjack substitution S-box
Show more
2. MATHEMATICAL MODELING, NUMERICAL METHODS AND COMPLEX PROGRAMS Pages: 31-36 Issue №5869
The constructive method for synthesis of balanced k-valued algebraic threshold functions
multivalued logic threshold function algebraic threshold function balanced function
Show more
3. INFORMATION TECHNOLOGY AND AUTOMATION SYSTEMS Pages: 53-59 Issue №3742
ON A DECOMPOSITION OF BOOLEAN FUNCTIONS REPRESENTED BY QUADRATIC INEQUALITIES
Boolean functions threshold function decomposition quadratic inequalities
Show more
Multiscale modeling for information control and processing Pages: 50-58 DOI: 10.33693/2313-223X-2021-8-3-50-58 Issue №19706
On the Complexity of Specifying a Symmetric Group of Permutations of Degree 2n in a Threshold Basis on a Promising Element Base
threshold function symmetric group implementation of permutations threshold basis complexity of implementation
Show more
6. INFORMATION SECURITY Pages: 39-49 Issue №9439
ABOUT POSSIBILITY OF USING FRACTAL MODELS IN DATA SECURITY SYSTEM CONSTRUCTION
fractal protection of information function complications threshold function
Show more
2. MATHEMATICAL MODELING, NUMERICAL METHODS AND COMPLEX PROGRAMS Pages: 132-138 Issue №7537
The usage of equalprobable functions with mutal implicantive covering of straight diameter in the problem of constructing bijective mapping ф:Vr2 → Vr2
equiprobable function functions with full implicative coating bijective mapping substitution
Show more
INFORMATION SECURITY Pages: 132-139 Issue №11955
MODIFICATION OF A GEOMETRICAL ALGORITHM OF CHARACTERIZATIONk-VALUED THRESHOLD FUNCTIONS
threshold function k-valued logic geometric algorithm the characterization of threshold functions the proof of convergence
Show more