| 6 (Приложение) | 2013 | About the lower bounds for the number of additional arcs in a minimal vertex 1-extension of oriented path | Abrosimov M. B, Modenova O. V. | 1054 |
| 7 (Приложение) | 2014 | Security conditions for information flows by memory within the mrosl DP-model | Devyanin P. N. | 562 |
| 2(32) | 2016 | Planarity testing and constructing the topological drawing of a plane graph (DFS) | Davidovsky M. V., Kurapov S. V. | 552 |
| 3(29) | 2015 | Number of inaccessible states in finite dynamic systems of binary vectors associated with palms orientations | Zharkova A. V. | 550 |
| 35 | 2017 | Detecting DOM-based XSS vulnerabilities using debug API of the modern web-browser | Petukhov A. A., Razdobarov A. V., Sigalov D. A. | 548 |
| 2 (28) | 2015 | Covert timing channels over HTTP cache-control headers | Oleksov N. E., Broslavsky O. V., Kolegov D.N. | 546 |
| 3(29) | 2015 | Problems, solutions and experience of the first international student's Olympiad in cryptography | Gorodilova A., Shushuev G., Nikova Svetla, Agievich S., Vitkup V., Rijmen Vincent, Kolomeec N., Tokareva N., Preneel Bart | 526 |
| 3(29) | 2015 | Maximal outerplane graphs with two simplicial vertices | Nosov Y. L. | 469 |
| 2 (28) | 2015 | Cryptanalysis of Ushakov - Shpilrain's authentication protocol based on the twisted conjugacy problem | Romankov V. A., Kukina E. G., Gornova M. N. | 454 |
| 2(32) | 2016 | On the number of Sperner vertices in a tree | Salii V. N. | 448 |
| 6 (Приложение) | 2013 | The discrete dynamic system on a double circulant with different functions at the vertices | Nazhmidenova A. M. | 439 |
| 39 | 2018 | Fast algorithm of cluster analysis k-medoids | Dmitriev I. N. | 429 |
| 6 (Приложение) | 2013 | Parallelization of the decoding algorithm in video compression standard H.265/HEVC | Chernyak R. I. | 426 |
| 2 (28) | 2015 | On generic complexity of the quadratic residuosity problem | Rybalov A. N. | 423 |
| 2 (28) | 2015 | Developing safe protocol for distributed task-based CTF holding system | Anisenya N. I. | 420 |
| 6 (Приложение) | 2013 | On relations between the basic notions of differential cryptanalysis | Pestunov A. I. | 415 |
| 2 (28) | 2015 | Statistical methods of search for coordinate set on which a random vector has bans | Denisov O. V. | 408 |
| 3(29) | 2015 | On lower bounds for complexity over infinite basises for functions of multi-valued logic | Andreev A. A. | 408 |
| 4(30) | 2015 | Comparison of the binary Golay code with the algebro-geometric code | Shiriaev Petr M. | 408 |
| 1(31) | 2016 | System state transformation rules in DP-model of access control in computer networks based on operating systems of Linux | Telezhnikov Vladimir Yu. | 401 |
| 2 (28) | 2015 | Almost nilpotent varieties of Leibniz algebras | Shulezhko O. V., Frolova Yu. Yu. | 386 |
| 2(32) | 2016 | Enhancing steganalysis accuracy via tentative filtering of stego-containers | Pestunov A. I., Monarev V. A. | 385 |
| 3(33) | 2016 | From cryptanalysis to cryptographic property of a Boolean function | Gorodilova A. A. | 383 |
| 42 | 2018 | The unicellular microorganisms "Amoeba Proteus" locomotion simulation with the use of movable cellular automata method | Ostapov S. E., Hazdiuk Ye. P., Nikitina O.M., Zhikharevich V. V. | 383 |
| 57 | 2022 | The security of the code-based signature scheme based on the Stern identification protocol | Vysotskaya Victoria V., Chizhov Ivan V. | 379 |
| 2 (28) | 2015 | Properties of minimal primitive digraphs | Fomichev V. M. | 378 |
| 4(30) | 2015 | About some classes of extremal oriented graphs | Zubov Anatoliy Yu. | 378 |
| 36 | 2017 | On solvability of regular equations in the variety of metabelian groups | Roman'kov V. A. | 377 |
| 6 (Приложение) | 2013 | Properties of gene networks with threshold functions | Batueva T. | 373 |
| 6 (Приложение) | 2013 | About possibility of reduction of sort out in Balash's algorithm | Anashkina N. V. | 370 |
| 4(22) | 2013 | The travelling salesman problem: improved lower bound in the branch-and-bound method | Kostyuk Yu. L. | 370 |
| 4(30) | 2015 | Hooked-browser network with BeEF and Google Drive | Broslavsky Oleg V., Kolegov Denis N., Oleksov Nikita E. | 369 |
| 6 (Приложение) | 2013 | Development and implementation of mandatory access control mechanisms in DBMS MySQL | Kolegov D.N, Chernov D. V., Tkachenko N.O. | 364 |
| 2(4) | 2009 | 50 YEARS OF CRYPTOGRAPHY IN TOMSK STATE UNIVERSITY | Agibalov G. P. | 361 |
| 6 (Приложение) | 2013 | Project of hardware implementation of Russian programming language | Agibalov G. P., Pankratova I. A., Lipsky V. B. | 360 |
| 1(31) | 2016 | Modeling of impurities segregation phenomenon in the melt crystallization process by continuous cellular automata method | Shumylyak Lilia M., Ostapov Sergey E., Zhykharevych Vladimir V. | 360 |
| 2 (28) | 2015 | Functional decomposability criteria for quadratic threshold Boolean functions | Shurupov A. N. | 358 |
| 6 (Приложение) | 2013 | An affine property of boolean functions on subspaces and their shifts | Kolomeec N. A. | 356 |
| 6 (Приложение) | 2013 | Modification of compiled applications for the android platform by means of aspect-oriented programming | Zaytsev G. Yu, Stefantsov D. A., Potapkin A.I | 354 |
| 1(31) | 2016 | Generating function for representations of graphs by k-partite graphs | Ganopolsky Rodion M. | 352 |
| 36 | 2017 | Cryptautomata with functional keys | Agibalov G. P. | 351 |
| 2 (28) | 2015 | On the complexity of discrete logarithm problem in an interval in a finite cyclic group with efficient inversion | Nikolaev M. V. | 349 |
| 40 | 2018 | Construction of a Hamming network based on a crossbar with binary memristors | Tarkov M. S. | 349 |
| 42 | 2018 | Deterministic methods of Ramanujan graph construction for use in cryptographic algorithms based on generalized cellular automata | Klyucharev P. G. | 349 |
| 3(33) | 2016 | Solution of graph problems by means of the STAR-machine being implemented on GPUs | Snytnikova T. V., Nepomniaschaya A. Sh. | 348 |
| 42 | 2018 | Constructing an aggregated relation with a minimum distance from the expert preferences | Smerchinskaya S.O., Nefedov V. N., Yashina N. P. | 347 |
| 41 | 2018 | Criteria for Markov block ciphers | Denisov O. V. | 341 |
| 2 (28) | 2015 | Cellular automaton simulation of the fracture process for brittle materials | Alekseev D. V., Cherednichenko A. V., Kazunina G. A. | 339 |
| 1(31) | 2016 | On the complexity of computing prime tables on the Turing machine | Sergeev Igor S. | 336 |
| 6 (Приложение) | 2013 | Cryptographic extension of Russian programming language | Agibalov G.P., Pankratova I. A., Lipsky V. B. | 335 |