| 6 (Приложение) | 2013 | About the lower bounds for the number of additional arcs in a minimal vertex 1-extension of oriented path | Modenova O. V., Abrosimov M. B | 1054 |
| 7 (Приложение) | 2014 | Security conditions for information flows by memory within the mrosl DP-model | Devyanin P. N. | 560 |
| 3(29) | 2015 | Number of inaccessible states in finite dynamic systems of binary vectors associated with palms orientations | Zharkova A. V. | 550 |
| 2(32) | 2016 | Planarity testing and constructing the topological drawing of a plane graph (DFS) | Kurapov S. V., Davidovsky M. V. | 550 |
| 35 | 2017 | Detecting DOM-based XSS vulnerabilities using debug API of the modern web-browser | Sigalov D. A., Petukhov A. A., Razdobarov A. V. | 548 |
| 2 (28) | 2015 | Covert timing channels over HTTP cache-control headers | Broslavsky O. V., Kolegov D.N., Oleksov N. E. | 545 |
| 3(29) | 2015 | Problems, solutions and experience of the first international student's Olympiad in cryptography | Vitkup V., Agievich S., Rijmen Vincent, Kolomeec N., Tokareva N., Preneel Bart, Gorodilova A., Shushuev G., Nikova Svetla | 526 |
| 3(29) | 2015 | Maximal outerplane graphs with two simplicial vertices | Nosov Y. L. | 469 |
| 2 (28) | 2015 | Cryptanalysis of Ushakov - Shpilrain's authentication protocol based on the twisted conjugacy problem | Kukina E. G., Gornova M. N., Romankov V. A. | 453 |
| 2(32) | 2016 | On the number of Sperner vertices in a tree | Salii V. N. | 447 |
| 6 (Приложение) | 2013 | The discrete dynamic system on a double circulant with different functions at the vertices | Nazhmidenova A. M. | 439 |
| 39 | 2018 | Fast algorithm of cluster analysis k-medoids | Dmitriev I. N. | 429 |
| 6 (Приложение) | 2013 | Parallelization of the decoding algorithm in video compression standard H.265/HEVC | Chernyak R. I. | 426 |
| 2 (28) | 2015 | On generic complexity of the quadratic residuosity problem | Rybalov A. N. | 422 |
| 2 (28) | 2015 | Developing safe protocol for distributed task-based CTF holding system | Anisenya N. I. | 419 |
| 6 (Приложение) | 2013 | On relations between the basic notions of differential cryptanalysis | Pestunov A. I. | 414 |
| 2 (28) | 2015 | Statistical methods of search for coordinate set on which a random vector has bans | Denisov O. V. | 408 |
| 3(29) | 2015 | On lower bounds for complexity over infinite basises for functions of multi-valued logic | Andreev A. A. | 408 |
| 4(30) | 2015 | Comparison of the binary Golay code with the algebro-geometric code | Shiriaev Petr M. | 407 |
| 1(31) | 2016 | System state transformation rules in DP-model of access control in computer networks based on operating systems of Linux | Telezhnikov Vladimir Yu. | 400 |
| 2 (28) | 2015 | Almost nilpotent varieties of Leibniz algebras | Shulezhko O. V., Frolova Yu. Yu. | 385 |
| 2(32) | 2016 | Enhancing steganalysis accuracy via tentative filtering of stego-containers | Pestunov A. I., Monarev V. A. | 384 |
| 3(33) | 2016 | From cryptanalysis to cryptographic property of a Boolean function | Gorodilova A. A. | 382 |
| 42 | 2018 | The unicellular microorganisms "Amoeba Proteus" locomotion simulation with the use of movable cellular automata method | Hazdiuk Ye. P., Nikitina O.M., Zhikharevich V. V., Ostapov S. E. | 381 |
| 4(30) | 2015 | About some classes of extremal oriented graphs | Zubov Anatoliy Yu. | 378 |
| 2 (28) | 2015 | Properties of minimal primitive digraphs | Fomichev V. M. | 377 |
| 36 | 2017 | On solvability of regular equations in the variety of metabelian groups | Roman'kov V. A. | 376 |
| 57 | 2022 | The security of the code-based signature scheme based on the Stern identification protocol | Vysotskaya Victoria V., Chizhov Ivan V. | 375 |
| 6 (Приложение) | 2013 | Properties of gene networks with threshold functions | Batueva T. | 373 |
| 6 (Приложение) | 2013 | About possibility of reduction of sort out in Balash's algorithm | Anashkina N. V. | 370 |
| 4(22) | 2013 | The travelling salesman problem: improved lower bound in the branch-and-bound method | Kostyuk Yu. L. | 370 |
| 4(30) | 2015 | Hooked-browser network with BeEF and Google Drive | Kolegov Denis N., Oleksov Nikita E., Broslavsky Oleg V. | 369 |
| 6 (Приложение) | 2013 | Development and implementation of mandatory access control mechanisms in DBMS MySQL | Tkachenko N.O., Kolegov D.N, Chernov D. V. | 363 |
| 2(4) | 2009 | 50 YEARS OF CRYPTOGRAPHY IN TOMSK STATE UNIVERSITY | Agibalov G. P. | 361 |
| 6 (Приложение) | 2013 | Project of hardware implementation of Russian programming language | Lipsky V. B., Agibalov G. P., Pankratova I. A. | 360 |
| 1(31) | 2016 | Modeling of impurities segregation phenomenon in the melt crystallization process by continuous cellular automata method | Zhykharevych Vladimir V., Shumylyak Lilia M., Ostapov Sergey E. | 359 |
| 2 (28) | 2015 | Functional decomposability criteria for quadratic threshold Boolean functions | Shurupov A. N. | 357 |
| 6 (Приложение) | 2013 | An affine property of boolean functions on subspaces and their shifts | Kolomeec N. A. | 356 |
| 6 (Приложение) | 2013 | Modification of compiled applications for the android platform by means of aspect-oriented programming | Stefantsov D. A., Potapkin A.I, Zaytsev G. Yu | 354 |
| 1(31) | 2016 | Generating function for representations of graphs by k-partite graphs | Ganopolsky Rodion M. | 352 |
| 36 | 2017 | Cryptautomata with functional keys | Agibalov G. P. | 350 |
| 40 | 2018 | Construction of a Hamming network based on a crossbar with binary memristors | Tarkov M. S. | 349 |
| 42 | 2018 | Deterministic methods of Ramanujan graph construction for use in cryptographic algorithms based on generalized cellular automata | Klyucharev P. G. | 349 |
| 2 (28) | 2015 | On the complexity of discrete logarithm problem in an interval in a finite cyclic group with efficient inversion | Nikolaev M. V. | 348 |
| 42 | 2018 | Constructing an aggregated relation with a minimum distance from the expert preferences | Smerchinskaya S.O., Nefedov V. N., Yashina N. P. | 347 |
| 3(33) | 2016 | Solution of graph problems by means of the STAR-machine being implemented on GPUs | Nepomniaschaya A. Sh., Snytnikova T. V. | 346 |
| 41 | 2018 | Criteria for Markov block ciphers | Denisov O. V. | 340 |
| 2 (28) | 2015 | Cellular automaton simulation of the fracture process for brittle materials | Kazunina G. A., Alekseev D. V., Cherednichenko A. V. | 339 |
| 1(31) | 2016 | On the complexity of computing prime tables on the Turing machine | Sergeev Igor S. | 336 |
| 6 (Приложение) | 2013 | Cryptographic extension of Russian programming language | Pankratova I. A., Lipsky V. B., Agibalov G.P. | 335 |