Issues

IssueYearTitleAuthorsDownloads
1(15)2012Theory of complete orthogonal direct decompositions of vectorspacesAnokhin M. I.73
1(15)2012Properties of coefficients in some superpositions of generatingfunctionsKruchinin D. V.73
2(16)2012Congruence relations of paths: some combinatorial propertiesKarmanova E. O.73
2(20)2013Fast algorithm for recovering the true solution with fixed weight of a system of linear Boolean equations with noised right-hand sideGryaznukhin A. Yu., Alekseychuk A. N.73
3(21)2013About linear and affine equivalence of substitutionsPankratov I. V.73
3 (25)2014Functions with variative-coordinate polynomiality over primary rings of residuesZaets M. V.73
562022The construction of circulant matrices related to MDS matricesRozhkov M. I., Malakhov S. S.73
632024Contextual analysis of the bipolar structures connectivityLosev Alexander S.73
1(1)2008COMBINATORIAL - GEOMETRIC TECHNIQUE TO DESIGN A KEY DISTRIBUTION PATTERNS(AN OVERVIEW) Cheremushkin A.V. 72
2(2)2008THE PROBLEM OF AUTHENTICATION IN THE MULTI-TIER APPLICATIONS Pautov P.A. 72
2(2)2008FUNCTION OF STRUCTURAL FAULT TOLERANCE AND d-LIMITED CONNECTED COMPONENT OF CS GRAPH Melent'ev V.A. 72
2(2)2008ANALYSIS OF SOME CRYPTOGRAPHIC PRIMITIVES ON COMPUTER CLUSTERS Burov P.S. , Zaikin O.S. , Hmelnov A.E. , Semenov A.A. , Bespalov D.V. 72
3(5)2009ON COMPLEXITY OF FORMAL CODING METHOD FOR ANALYSIS OF GENERATOR WITH MONOCYCLE SUBSTITUTIONAL TRANSITION FUNCTION Fomichev V.M. 72
4(6)2009ABOUT INVARIANTS FOR SOME CLASSES OF QUASI-MONOTONIC FUNCTIONS ON A SEMILATTICE Parvatov N. G. 72
1(7)2010INTEGRATING SECURITY POLICIES WITHCOMPUTER SYSTEMS BY MEANS OF AOP WITH APPLICATION TOAPACHE FTP SERVERFilimonov A. Y., Stephantsov D. A.72
3(9)2010A FAMILY OF EXACT 2-EXTENSIONS OF TOURNAMENTSDolgov A.A.72
4(10)2010ON MAPPING GRAPHS OF PARALLEL PROGRAMS ONTO GRAPHS OF DISTRIBUTED COMPUTER SYSTEMS BY RECURRENT NEURAL NETWORKSTarkov M. S.72
2(12)2011FPT-algorithms and their classification on the basis of elasticityBykova V. V.72
2(16)2012Indices in dynamic system of binary vectors associated with cyclesorientationsZharkova A. V.72
3(17)2012On the notion of Electronic SignatureCheremushkin A. V.72
3(17)2012About some features of the transformed problems imagesMurin D. M.72
2(20)2013Timeand space-efficient evaluation of the real logarithmic function on Schonhage machineYakhontov S. V.72
4(22)2013Modelling the tissue growth with the possibility of external influence on tissue shapeNazarov M. N.72
2(24)2014Analysis of the conditions for granting and obtaining access rights in the MS SQL Server access control modelSmolyaninov V. Y.72
2(2)2008PRESENTATION OF CRYPTOSYSTEMS VIA POLYBASIC ALGEBRAIC SYSTEM Ivaschenko E.A. , Skobelev V.G. 71
4(6)2009A RECURSIVE ALGORITHM FOR COVER-FREE FAMILY CONSTRUCTION Cheremushkin A. V. 71
4(10)2010RESEARCH OF EVOLUTION OF CELLULAR AUTOMATA MODELING "PHASE SEPARATION" PROCESS ON TRIANGULAR MESH.Afanasyev I. V.71
4(10)2010A METHOD FOR CONSTRUCTION OF CELLULAR AUTOMATA SIMULATING PATTERN FORMATION PROCESSESBandman O. L.71
2(12)2011Minimal edge extensions of oriented and directed starsAbrosimov M. B.71
2(12)2011Attractors of dynamical systems associated with cyclesVlasova A. V.71
4(14)2011Almost perfect ciphers and authentication codesZubov A. U.71
4(18)2012Speeds of convergence in limit theorems for joint distributions of some random binary mappings characteristicsPestunov A. I.71
1(19)2013Study of discrete optimization problems with logical constraints based on regular partitionsYagofarova D. I., Kolokolov A. A., Adelshin A. V.71
1(19)2013Fast multiplication in finite two-generated groups of exponent fiveKuznetsov A. A., Kuznetsova A. S.71
2(20)2013Modification of the Lagarias — Odlyzhko method for solving the generalized knapsack problem and the systems of knapsack problemsMurin D. M.71
1(23)2014On asymptotically optimal enumeration for irreducible coverings of Boolean matrixProkofjev P. A., Djukova E. V.71
4(26)2014Relationship between the coefficients of polynomials over GF(2 n) and weights of Boolean functions represented by themKuzmin A. S., Nozdrunov V. I.71
4(6)2009DIFFERENTIAL CRYPTANALYSIS OF THE MARS BLOCKCIPHER Pestunov A.I. 70
3(9)2010CONSTRUCTION OF PERFECTLY BALANCED FUNCTIONS WITHOUT BARRIERS.Smyshlyaev S. V.70
4(10)2010REGULAR FORM OF DETERMINISTIC FSMS SPECIFICATIONS IN THE LANGUAGE L.Chebotarev A. N.70
1(11)2011Conditions for maximality of subclonesParvatov Nikolay G.70
2(16)2012Semantic Role Based Access Control ModelSemenova N. A.70
2(16)2012The system of abstract connected subgraphs of a linear graphSalii V. N.70
3(17)2012Influence of template specialization degree on the search space inevolutionary synthesis of modelsMonakhov O. G.70
4(18)2012Speeds of convergence in limit theorems for joint distributions of some random binary mappings characteristicsPankov K. N.70
3 (25)2014Computational complexity of the synthesis of composite models for Lipschitz-bounded functionsKalinnikov I. S.70
2(2)2008ANALYSIS OF ATTACKS ONTO QUANTUM PUBLIC KEY DISTRIBUTION SYSTEM Skobelev V.G. 69
1(3)2009Approximate solution of the traveling salesmanproblem Dulkeyt V. I. , Faizulin R. T. 69
1(3)2009Approaches to the construction of the DP-model of file systems Burenin P. V. 69
4(6)2009CELLULAR AUTOMATA SIMULATION ON SURFACE TRIANGULATION FOR DIFFUSION PROCESSES Nechaeva O.I. , Evseev A. A. 69
Страница 13 из 17 1...121314151617
Всего: 831