Issues

IssueYearTitleAuthorsDownloads
2 (28)2015Compound Poisson approximation of the number distribution for monotone strings of fixed length in a random sequenceMinakov A. A.335
452019Comparison of sufficient degree based conditions for Hamiltonian graphAbrosimov M. B.333
7 (Приложение)2014SIBCiphers - symmetric iterative block ciphers composed of boolean functions depending on small number of variablesAgibalov G. P.330
7 (Приложение)2014Conditions for the existence of perfect ciphers with a fixed set of parametersRatseev S. M.328
1(31)2016Watermarking ciphersAgibalov Gennady P.327
3(33)2016The implementation of Magma and 2-GOST block cipher substitutions by algebraic threshold functionsSoshin D. A.326
2(32)2016On the security of AEAD-cryptosystem of the GCM typeZubov A. Yu.324
4(30)2015Description of non-endomorphic maximum perfect ciphers with two-valued plaintext alphabetMedvedeva Natalya V., Titov Sergey S.323
6 (Приложение)2013On branching and immediate predecessors of the states in finite dynamic system of all possible orientations of a graphZharkova A. V.322
6 (Приложение)2013On local primitiveness of graphs and nonnega-tive matricesKyazhin S. N.322
3(33)2016Chain structures in schedules tasksMagomedov A. M.318
1(31)2016Circular inversions of permutations and their use in sorting problemsZubov Anatoliy Yu.315
542021Series of families of degree six circulant graphsMonakhova E. A.315
6 (Приложение)2013Properties of statistics var on group of permutationsBondarenko L. N.314
392018Multilevel thematic-hierarchical access control (MLTHS-system)Gaydamakin N. A.311
6 (Приложение)2013Functional graph trees for circulants with linear boolean functions at the verticesKornienko A. S.310
402018Study of graph isomorphism using Jordan forms of adjacency matricesLeora S. N., Volodicheva M. I.308
6 (Приложение)2013On the representation of s-boxes in block ciphersVitkup V.A.307
4(30)2015Method for estimating connection power of binary and nominal variablesBoyko Ilya Yu., Dronov Sergey V.305
2(32)2016On generic complexity of the validity problem for Boolean formulasRybalov A. N.304
6 (Приложение)2013AES in LYaPASBroslavskiy O. V.302
4(30)2015The nonlinearity index for a piecewise-linear substitution of the additive group of the field F 2nTrishin Andrey E.299
4(34)2016Discrete stochastic simulation of the electrons and holes recombination in the 2D and 3D inhomogeneous semiconductorKireeva A. E., Sabelfeld K. K.299
432019Bernoulli's discrete periodic functionsBespalov M. S.299
6 (Приложение)2013About basises whose unreliability coefficient equals 1Vasin A. V.298
6 (Приложение)2013Correctness of state transformation rules in MROSL DP-modelDevyanin P. N.297
4(30)2015Upper bound for the number of additional edges in minimal 1-edge extensions of starlike treesKomarov Dmitriy D.296
402018Efficient steganography detection by means of compression-based integral classifierPestunov A.I., Monarev V. A.296
352017Overview of attacks on AES-128: to the 15 anniversary of AESZhukov K. D.295
412018The architecture of a neural network with a sequential division of images into pairsGeidarov P. Sh.295
6 (Приложение)2013Asymptotic solution of the recurrence relations in the analysis of splitting algorithms for satBykova V. V.294
2(32)2016Matrix formula for the spectrum of output distribution of block cipher scheme and statistical criterion based on this formulaBylina R. A., Denisov O. V.294
7 (Приложение)2014Implementation of RDBMS MySQL security monitor in DBF/DAM systemsTkachenko N. O.293
3(29)2015Evolutionarily-fragmented algorithm for finding a maximal flat part of a graphKozin I. V., Poljuga S.I., Kurapov S. V.293
3(29)2015An alternative way of defining finite graphsNazarov M. N.293
3(29)2015Construction of inhomogeneous 3D mesh for simulation of bacterial cell growth and division by cellular automataVitvitsky A. A.293
4(30)2015A new hybrid encryption schemePugachev Andrey V., Nesterenko Aleksey Yu.291
4(30)2015Piecewise-affine permutations of finite fieldsBugrov Alexey D.285
2(32)2016On bounds for balanced embedding degreeNovoselov S. A.284
3(29)2015Frequency characteristics of cycles in output sequences generated by combining generators over the field of two elementsKamlovskii O. V., Bilyak I. B.282
412018On constructing APN permutations using subfunctionsIdrisova V. A.281
1(31)2016On some recursive construction of plateaued resilient Boolean functions with step in 3 variablesKhinko Eugene V.280
1(31)2016Representation of geometric types of Boolean functions in three variables by algebraic threshold functionsSoshin Danil A.279
372017General algebraic cryptographic key exchange scheme and its cryptanalysisRoman'kov V. A., Obzor A. A.279
6 (Приложение)2013Development of a DDoS-attack detection system using queuing theoryShcherba E. V., Volkov D.A.277
3(29)2015A semantically secure public-key cryptosystem based on RSARomankov V. A.277
532021Detecting server-side endpoints in web applications based on static analysis of client-side JavaScript codeKhashaev A. A., Sigalov D.A., Gamayunov D.Yu.275
352017Conditions of primitivity and exponent bounds for sets of digraphsFomichev V. M., Avezova Y. E.271
4(30)2015Analysis and solution of discrete optimization problems with logical constraints on the base of L-partition approachKolokolov Alexander A., Adelshin Alexander V.270
1(31)2016On linear decomposition of Boolean functionsCheremushkin Alexander V.268
Страница 2 из 17 123456...17
Всего: 831