Issues

IssueYearTitleAuthorsDownloads
6 (Приложение)2013About the lower bounds for the number of additional arcs in a minimal vertex 1-extension of oriented pathAbrosimov M. B, Modenova O. V.1054
7 (Приложение)2014Security conditions for information flows by memory within the mrosl DP-modelDevyanin P. N.562
2(32)2016Planarity testing and constructing the topological drawing of a plane graph (DFS)Davidovsky M. V., Kurapov S. V.552
3(29)2015Number of inaccessible states in finite dynamic systems of binary vectors associated with palms orientationsZharkova A. V.550
352017Detecting DOM-based XSS vulnerabilities using debug API of the modern web-browserPetukhov A. A., Razdobarov A. V., Sigalov D. A.548
2 (28)2015Covert timing channels over HTTP cache-control headersOleksov N. E., Broslavsky O. V., Kolegov D.N.546
3(29)2015Problems, solutions and experience of the first international student's Olympiad in cryptographyGorodilova A., Shushuev G., Nikova Svetla, Agievich S., Vitkup V., Rijmen Vincent, Kolomeec N., Tokareva N., Preneel Bart526
3(29)2015Maximal outerplane graphs with two simplicial verticesNosov Y. L.469
2 (28)2015Cryptanalysis of Ushakov - Shpilrain's authentication protocol based on the twisted conjugacy problemRomankov V. A., Kukina E. G., Gornova M. N.454
2(32)2016On the number of Sperner vertices in a treeSalii V. N.448
6 (Приложение)2013The discrete dynamic system on a double circulant with different functions at the verticesNazhmidenova A. M.439
392018Fast algorithm of cluster analysis k-medoidsDmitriev I. N.429
6 (Приложение)2013Parallelization of the decoding algorithm in video compression standard H.265/HEVCChernyak R. I.426
2 (28)2015On generic complexity of the quadratic residuosity problemRybalov A. N.423
2 (28)2015Developing safe protocol for distributed task-based CTF holding systemAnisenya N. I.420
6 (Приложение)2013On relations between the basic notions of differential cryptanalysisPestunov A. I.415
2 (28)2015Statistical methods of search for coordinate set on which a random vector has bansDenisov O. V.408
3(29)2015On lower bounds for complexity over infinite basises for functions of multi-valued logicAndreev A. A.408
4(30)2015Comparison of the binary Golay code with the algebro-geometric codeShiriaev Petr M.408
1(31)2016System state transformation rules in DP-model of access control in computer networks based on operating systems of LinuxTelezhnikov Vladimir Yu.401
2 (28)2015Almost nilpotent varieties of Leibniz algebrasShulezhko O. V., Frolova Yu. Yu.386
2(32)2016Enhancing steganalysis accuracy via tentative filtering of stego-containersPestunov A. I., Monarev V. A.385
3(33)2016From cryptanalysis to cryptographic property of a Boolean functionGorodilova A. A.383
422018The unicellular microorganisms "Amoeba Proteus" locomotion simulation with the use of movable cellular automata methodOstapov S. E., Hazdiuk Ye. P., Nikitina O.M., Zhikharevich V. V.383
572022The security of the code-based signature scheme based on the Stern identification protocolVysotskaya Victoria V., Chizhov Ivan V.379
2 (28)2015Properties of minimal primitive digraphsFomichev V. M.378
4(30)2015About some classes of extremal oriented graphsZubov Anatoliy Yu.378
362017On solvability of regular equations in the variety of metabelian groupsRoman'kov V. A.377
6 (Приложение)2013Properties of gene networks with threshold functionsBatueva T.373
6 (Приложение)2013About possibility of reduction of sort out in Balash's algorithmAnashkina N. V.370
4(22)2013The travelling salesman problem: improved lower bound in the branch-and-bound methodKostyuk Yu. L.370
4(30)2015Hooked-browser network with BeEF and Google DriveBroslavsky Oleg V., Kolegov Denis N., Oleksov Nikita E.369
6 (Приложение)2013Development and implementation of mandatory access control mechanisms in DBMS MySQLKolegov D.N, Chernov D. V., Tkachenko N.O.364
2(4)200950 YEARS OF CRYPTOGRAPHY IN TOMSK STATE UNIVERSITY Agibalov G. P. 361
6 (Приложение)2013Project of hardware implementation of Russian programming languageAgibalov G. P., Pankratova I. A., Lipsky V. B.360
1(31)2016Modeling of impurities segregation phenomenon in the melt crystallization process by continuous cellular automata methodShumylyak Lilia M., Ostapov Sergey E., Zhykharevych Vladimir V.360
2 (28)2015Functional decomposability criteria for quadratic threshold Boolean functionsShurupov A. N.358
6 (Приложение)2013An affine property of boolean functions on subspaces and their shiftsKolomeec N. A.356
6 (Приложение)2013Modification of compiled applications for the android platform by means of aspect-oriented programmingZaytsev G. Yu, Stefantsov D. A., Potapkin A.I354
1(31)2016Generating function for representations of graphs by k-partite graphsGanopolsky Rodion M.352
362017Cryptautomata with functional keysAgibalov G. P.351
2 (28)2015On the complexity of discrete logarithm problem in an interval in a finite cyclic group with efficient inversionNikolaev M. V.349
402018Construction of a Hamming network based on a crossbar with binary memristorsTarkov M. S.349
422018Deterministic methods of Ramanujan graph construction for use in cryptographic algorithms based on generalized cellular automataKlyucharev P. G.349
3(33)2016Solution of graph problems by means of the STAR-machine being implemented on GPUsSnytnikova T. V., Nepomniaschaya A. Sh.348
422018Constructing an aggregated relation with a minimum distance from the expert preferencesSmerchinskaya S.O., Nefedov V. N., Yashina N. P.347
412018Criteria for Markov block ciphersDenisov O. V.341
2 (28)2015Cellular automaton simulation of the fracture process for brittle materialsAlekseev D. V., Cherednichenko A. V., Kazunina G. A.339
1(31)2016On the complexity of computing prime tables on the Turing machineSergeev Igor S.336
6 (Приложение)2013Cryptographic extension of Russian programming languageAgibalov G.P., Pankratova I. A., Lipsky V. B.335
Страница 1 из 17 123456...17
Всего: 831