| 1(15) | 2012 | Theory of complete orthogonal direct decompositions of vectorspaces | Anokhin M. I. | 73 |
| 1(15) | 2012 | Properties of coefficients in some superpositions of generatingfunctions | Kruchinin D. V. | 73 |
| 2(16) | 2012 | Congruence relations of paths: some combinatorial properties | Karmanova E. O. | 73 |
| 2(20) | 2013 | Fast algorithm for recovering the true solution with fixed weight of a system of linear Boolean equations with noised right-hand side | Gryaznukhin A. Yu., Alekseychuk A. N. | 73 |
| 3(21) | 2013 | About linear and affine equivalence of substitutions | Pankratov I. V. | 73 |
| 3 (25) | 2014 | Functions with variative-coordinate polynomiality over primary rings of residues | Zaets M. V. | 73 |
| 56 | 2022 | The construction of circulant matrices related to MDS matrices | Rozhkov M. I., Malakhov S. S. | 73 |
| 63 | 2024 | Contextual analysis of the bipolar structures connectivity | Losev Alexander S. | 73 |
| 1(1) | 2008 | COMBINATORIAL - GEOMETRIC TECHNIQUE TO DESIGN A KEY DISTRIBUTION PATTERNS(AN OVERVIEW) | Cheremushkin A.V. | 72 |
| 2(2) | 2008 | THE PROBLEM OF AUTHENTICATION IN THE MULTI-TIER APPLICATIONS | Pautov P.A. | 72 |
| 2(2) | 2008 | FUNCTION OF STRUCTURAL FAULT TOLERANCE AND d-LIMITED CONNECTED COMPONENT OF CS GRAPH | Melent'ev V.A. | 72 |
| 2(2) | 2008 | ANALYSIS OF SOME CRYPTOGRAPHIC PRIMITIVES ON COMPUTER CLUSTERS | Burov P.S. , Zaikin O.S. , Hmelnov A.E. , Semenov A.A. , Bespalov D.V. | 72 |
| 3(5) | 2009 | ON COMPLEXITY OF FORMAL CODING METHOD FOR ANALYSIS OF GENERATOR WITH MONOCYCLE SUBSTITUTIONAL TRANSITION FUNCTION | Fomichev V.M. | 72 |
| 4(6) | 2009 | ABOUT INVARIANTS FOR SOME CLASSES OF QUASI-MONOTONIC FUNCTIONS ON A SEMILATTICE | Parvatov N. G. | 72 |
| 1(7) | 2010 | INTEGRATING SECURITY POLICIES WITHCOMPUTER SYSTEMS BY MEANS OF AOP WITH APPLICATION TOAPACHE FTP SERVER | Filimonov A. Y., Stephantsov D. A. | 72 |
| 3(9) | 2010 | A FAMILY OF EXACT 2-EXTENSIONS OF TOURNAMENTS | Dolgov A.A. | 72 |
| 4(10) | 2010 | ON MAPPING GRAPHS OF PARALLEL PROGRAMS ONTO GRAPHS OF DISTRIBUTED COMPUTER SYSTEMS BY RECURRENT NEURAL NETWORKS | Tarkov M. S. | 72 |
| 2(12) | 2011 | FPT-algorithms and their classification on the basis of elasticity | Bykova V. V. | 72 |
| 2(16) | 2012 | Indices in dynamic system of binary vectors associated with cyclesorientations | Zharkova A. V. | 72 |
| 3(17) | 2012 | On the notion of Electronic Signature | Cheremushkin A. V. | 72 |
| 3(17) | 2012 | About some features of the transformed problems images | Murin D. M. | 72 |
| 2(20) | 2013 | Timeand space-efficient evaluation of the real logarithmic function on Schonhage machine | Yakhontov S. V. | 72 |
| 4(22) | 2013 | Modelling the tissue growth with the possibility of external influence on tissue shape | Nazarov M. N. | 72 |
| 2(24) | 2014 | Analysis of the conditions for granting and obtaining access rights in the MS SQL Server access control model | Smolyaninov V. Y. | 72 |
| 2(2) | 2008 | PRESENTATION OF CRYPTOSYSTEMS VIA POLYBASIC ALGEBRAIC SYSTEM | Ivaschenko E.A. , Skobelev V.G. | 71 |
| 4(6) | 2009 | A RECURSIVE ALGORITHM FOR COVER-FREE FAMILY CONSTRUCTION | Cheremushkin A. V. | 71 |
| 4(10) | 2010 | RESEARCH OF EVOLUTION OF CELLULAR AUTOMATA MODELING "PHASE SEPARATION" PROCESS ON TRIANGULAR MESH. | Afanasyev I. V. | 71 |
| 4(10) | 2010 | A METHOD FOR CONSTRUCTION OF CELLULAR AUTOMATA SIMULATING PATTERN FORMATION PROCESSES | Bandman O. L. | 71 |
| 2(12) | 2011 | Minimal edge extensions of oriented and directed stars | Abrosimov M. B. | 71 |
| 2(12) | 2011 | Attractors of dynamical systems associated with cycles | Vlasova A. V. | 71 |
| 4(14) | 2011 | Almost perfect ciphers and authentication codes | Zubov A. U. | 71 |
| 4(18) | 2012 | Speeds of convergence in limit theorems for joint distributions of some random binary mappings characteristics | Pestunov A. I. | 71 |
| 1(19) | 2013 | Study of discrete optimization problems with logical constraints based on regular partitions | Yagofarova D. I., Kolokolov A. A., Adelshin A. V. | 71 |
| 1(19) | 2013 | Fast multiplication in finite two-generated groups of exponent five | Kuznetsov A. A., Kuznetsova A. S. | 71 |
| 2(20) | 2013 | Modification of the Lagarias — Odlyzhko method for solving the generalized knapsack problem and the systems of knapsack problems | Murin D. M. | 71 |
| 1(23) | 2014 | On asymptotically optimal enumeration for irreducible coverings of Boolean matrix | Prokofjev P. A., Djukova E. V. | 71 |
| 4(26) | 2014 | Relationship between the coefficients of polynomials over GF(2 n) and weights of Boolean functions represented by them | Kuzmin A. S., Nozdrunov V. I. | 71 |
| 4(6) | 2009 | DIFFERENTIAL CRYPTANALYSIS OF THE MARS BLOCKCIPHER | Pestunov A.I. | 70 |
| 3(9) | 2010 | CONSTRUCTION OF PERFECTLY BALANCED FUNCTIONS WITHOUT BARRIERS. | Smyshlyaev S. V. | 70 |
| 4(10) | 2010 | REGULAR FORM OF DETERMINISTIC FSMS SPECIFICATIONS IN THE LANGUAGE L. | Chebotarev A. N. | 70 |
| 1(11) | 2011 | Conditions for maximality of subclones | Parvatov Nikolay G. | 70 |
| 2(16) | 2012 | Semantic Role Based Access Control Model | Semenova N. A. | 70 |
| 2(16) | 2012 | The system of abstract connected subgraphs of a linear graph | Salii V. N. | 70 |
| 3(17) | 2012 | Influence of template specialization degree on the search space inevolutionary synthesis of models | Monakhov O. G. | 70 |
| 4(18) | 2012 | Speeds of convergence in limit theorems for joint distributions of some random binary mappings characteristics | Pankov K. N. | 70 |
| 3 (25) | 2014 | Computational complexity of the synthesis of composite models for Lipschitz-bounded functions | Kalinnikov I. S. | 70 |
| 2(2) | 2008 | ANALYSIS OF ATTACKS ONTO QUANTUM PUBLIC KEY DISTRIBUTION SYSTEM | Skobelev V.G. | 69 |
| 1(3) | 2009 | Approximate solution of the traveling salesmanproblem | Dulkeyt V. I. , Faizulin R. T. | 69 |
| 1(3) | 2009 | Approaches to the construction of the DP-model of file systems | Burenin P. V. | 69 |
| 4(6) | 2009 | CELLULAR AUTOMATA SIMULATION ON SURFACE TRIANGULATION FOR DIFFUSION PROCESSES | Nechaeva O.I. , Evseev A. A. | 69 |