Issues

IssueYearTitleAuthorsDownloads
6 (Приложение)2013About the lower bounds for the number of additional arcs in a minimal vertex 1-extension of oriented pathModenova O. V., Abrosimov M. B1054
7 (Приложение)2014Security conditions for information flows by memory within the mrosl DP-modelDevyanin P. N.560
3(29)2015Number of inaccessible states in finite dynamic systems of binary vectors associated with palms orientationsZharkova A. V.550
2(32)2016Planarity testing and constructing the topological drawing of a plane graph (DFS)Kurapov S. V., Davidovsky M. V.550
352017Detecting DOM-based XSS vulnerabilities using debug API of the modern web-browserSigalov D. A., Petukhov A. A., Razdobarov A. V.548
2 (28)2015Covert timing channels over HTTP cache-control headersBroslavsky O. V., Kolegov D.N., Oleksov N. E.545
3(29)2015Problems, solutions and experience of the first international student's Olympiad in cryptographyVitkup V., Agievich S., Rijmen Vincent, Kolomeec N., Tokareva N., Preneel Bart, Gorodilova A., Shushuev G., Nikova Svetla526
3(29)2015Maximal outerplane graphs with two simplicial verticesNosov Y. L.469
2 (28)2015Cryptanalysis of Ushakov - Shpilrain's authentication protocol based on the twisted conjugacy problemKukina E. G., Gornova M. N., Romankov V. A.453
2(32)2016On the number of Sperner vertices in a treeSalii V. N.447
6 (Приложение)2013The discrete dynamic system on a double circulant with different functions at the verticesNazhmidenova A. M.439
392018Fast algorithm of cluster analysis k-medoidsDmitriev I. N.429
6 (Приложение)2013Parallelization of the decoding algorithm in video compression standard H.265/HEVCChernyak R. I.426
2 (28)2015On generic complexity of the quadratic residuosity problemRybalov A. N.422
2 (28)2015Developing safe protocol for distributed task-based CTF holding systemAnisenya N. I.419
6 (Приложение)2013On relations between the basic notions of differential cryptanalysisPestunov A. I.414
2 (28)2015Statistical methods of search for coordinate set on which a random vector has bansDenisov O. V.408
3(29)2015On lower bounds for complexity over infinite basises for functions of multi-valued logicAndreev A. A.408
4(30)2015Comparison of the binary Golay code with the algebro-geometric codeShiriaev Petr M.407
1(31)2016System state transformation rules in DP-model of access control in computer networks based on operating systems of LinuxTelezhnikov Vladimir Yu.400
2 (28)2015Almost nilpotent varieties of Leibniz algebrasShulezhko O. V., Frolova Yu. Yu.385
2(32)2016Enhancing steganalysis accuracy via tentative filtering of stego-containersPestunov A. I., Monarev V. A.384
3(33)2016From cryptanalysis to cryptographic property of a Boolean functionGorodilova A. A.382
422018The unicellular microorganisms "Amoeba Proteus" locomotion simulation with the use of movable cellular automata methodHazdiuk Ye. P., Nikitina O.M., Zhikharevich V. V., Ostapov S. E.381
4(30)2015About some classes of extremal oriented graphsZubov Anatoliy Yu.378
2 (28)2015Properties of minimal primitive digraphsFomichev V. M.377
362017On solvability of regular equations in the variety of metabelian groupsRoman'kov V. A.376
572022The security of the code-based signature scheme based on the Stern identification protocolVysotskaya Victoria V., Chizhov Ivan V.375
6 (Приложение)2013Properties of gene networks with threshold functionsBatueva T.373
6 (Приложение)2013About possibility of reduction of sort out in Balash's algorithmAnashkina N. V.370
4(22)2013The travelling salesman problem: improved lower bound in the branch-and-bound methodKostyuk Yu. L.370
4(30)2015Hooked-browser network with BeEF and Google DriveKolegov Denis N., Oleksov Nikita E., Broslavsky Oleg V.369
6 (Приложение)2013Development and implementation of mandatory access control mechanisms in DBMS MySQLTkachenko N.O., Kolegov D.N, Chernov D. V.363
2(4)200950 YEARS OF CRYPTOGRAPHY IN TOMSK STATE UNIVERSITY Agibalov G. P. 361
6 (Приложение)2013Project of hardware implementation of Russian programming languageLipsky V. B., Agibalov G. P., Pankratova I. A.360
1(31)2016Modeling of impurities segregation phenomenon in the melt crystallization process by continuous cellular automata methodZhykharevych Vladimir V., Shumylyak Lilia M., Ostapov Sergey E.359
2 (28)2015Functional decomposability criteria for quadratic threshold Boolean functionsShurupov A. N.357
6 (Приложение)2013An affine property of boolean functions on subspaces and their shiftsKolomeec N. A.356
6 (Приложение)2013Modification of compiled applications for the android platform by means of aspect-oriented programmingStefantsov D. A., Potapkin A.I, Zaytsev G. Yu354
1(31)2016Generating function for representations of graphs by k-partite graphsGanopolsky Rodion M.352
362017Cryptautomata with functional keysAgibalov G. P.350
402018Construction of a Hamming network based on a crossbar with binary memristorsTarkov M. S.349
422018Deterministic methods of Ramanujan graph construction for use in cryptographic algorithms based on generalized cellular automataKlyucharev P. G.349
2 (28)2015On the complexity of discrete logarithm problem in an interval in a finite cyclic group with efficient inversionNikolaev M. V.348
422018Constructing an aggregated relation with a minimum distance from the expert preferencesSmerchinskaya S.O., Nefedov V. N., Yashina N. P.347
3(33)2016Solution of graph problems by means of the STAR-machine being implemented on GPUsNepomniaschaya A. Sh., Snytnikova T. V.346
412018Criteria for Markov block ciphersDenisov O. V.340
2 (28)2015Cellular automaton simulation of the fracture process for brittle materialsKazunina G. A., Alekseev D. V., Cherednichenko A. V.339
1(31)2016On the complexity of computing prime tables on the Turing machineSergeev Igor S.336
6 (Приложение)2013Cryptographic extension of Russian programming languagePankratova I. A., Lipsky V. B., Agibalov G.P.335
Страница 1 из 17 123456...17
Всего: 831