| 44 | 2019 | Analysis of the methods for attribute-based access control | Biyashev R. G., Kalimoldayev M. N., Rog O. A. | 198 |
| 45 | 2019 | Decidability of the restricted theories of a class of partial orders | Nikitin A. Yu. | 197 |
| 45 | 2019 | The traveling salesman problem: approximate algorithm by branch-and-bound method with guaranteed precision | Kostyuk Yu. L. | 197 |
| 6 (Приложение) | 2013 | On non-minimal perfect ciphers | Medvedeva N. V., Titov S. S. | 196 |
| 7 (Приложение) | 2014 | Nonlinearity bounds for vectorial boolean functions of special form | Korsakova E. P. | 196 |
| 7 (Приложение) | 2014 | Formalization of combinatorial numbers in terms of entire solutions of systems of linear diophan-tine equations | Gotsulenko V. V. | 195 |
| 3(13) | 2011 | Computational aspects of graph treewidth | Bykova V. V. | 195 |
| 6 (Приложение) | 2013 | An improved estimate for the convergence rate in the multidimensional central limit theorem | Volgin A. V. | 194 |
| 7 (Приложение) | 2014 | Estimates for exponents of mixing graphs relating to some modifications of additive generators | Dorokhova A.M. | 194 |
| 6 (Приложение) | 2013 | Pipelining of combinational circuits | Kardash S.N., Pottosin Yu.V. | 193 |
| 7 (Приложение) | 2014 | About the minimal primitive matrices | Fomichev V., Bar-Gnar R.I. | 193 |
| 43 | 2019 | Characterizations of non associative ordered semigroups by the properties of their fuzzy ideals with thresholds (α, β] | Nasreen Kausar | 193 |
| 4(22) | 2013 | Implementing main steps of Wiedemann — Coppersmith algorithm for binary systems of linear equations on clusters | Ryzhov A. S. | 193 |
| 37 | 2017 | Estimations of unreliability of circuits in Rosser - Turkett basis (in P3) with faults of type 0 at the outputs of gates | Barsukova O. Yu., Alekhina M. A. | 192 |
| 6 (Приложение) | 2013 | On probability characteristics of random graphs generated by algorithms for finding hash function collisions | Karpunin G. A. | 187 |
| 6 (Приложение) | 2013 | On the upper bound for the number of additional edges in minimal vertex extensions of colored circles | Bondarenko P. P. | 187 |
| 7 (Приложение) | 2014 | About basises with unreliability coefficient 5 | Vasin A. V. | 187 |
| 7 (Приложение) | 2014 | An algorithm for generating a pair of special primes | Rybakov A. S., Zhukov K.D. | 187 |
| 3(33) | 2016 | An algorithm for computation of the growth functions in finite two-generated groups of exponent 5 | Kuznetsov A. A. | 187 |
| 39 | 2018 | List decoding of the biorthogonal wavelet code with predetermined code distance on a field of odd characteristic | Litichevskiy D. V. | 187 |
| 43 | 2019 | An algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomial | Belov S. A. | 187 |
| 51 | 2021 | Group authentication scheme based on zeroknowledge proof | Gamayunov D. Yu., Shliakhtina E. A. | 187 |
| 7 (Приложение) | 2014 | On cycles in functional graphs of circulant type gene networks with threshold functions | Bykov I. S. | 186 |
| 7 (Приложение) | 2014 | Research of differentiable modulo p
functions | Ivachev A. S. | 185 |
| 36 | 2017 | Improving the rate of convergence in the multidimensional central limit theorem for sums of locally dependent random vectors | Volgin A. V. | 185 |
| 37 | 2017 | Reduction of synapses in the Hopfield autoassociative memory | Tarkov M. S. | 185 |
| 38 | 2017 | On irreducible algebraic sets over linearly ordered semilattices II | Shevlyakov A. N. | 185 |
| 41 | 2018 | New families of multiplicative circulant networks | Monakhova E. A. | 185 |
| 1(19) | 2013 | All-pairs shortest paths algorithm for highdimensional sparse graphs | Urakov A. R., Timeryaev T. V. | 185 |
| 6 (Приложение) | 2013 | The blackbox service for hosting capture the flag computer security competitions | Stefantsov D. A., Anisenya N.I, Torgaeva T. A. | 184 |
| 7 (Приложение) | 2014 | About covert timing channels in os android | Milovanov T. I. | 184 |
| 37 | 2017 | On generic complexity of decidability problem for diophantine systems in the Skolem's form | Rybalov A. N. | 184 |
| 7 (Приложение) | 2014 | On a comparison of underdetermined alphabets | Sholomov L.A. | 183 |
| 7 (Приложение) | 2014 | Every cubic Boolean function in 8 variables is the sum of not more than 4 bent functions | Tokareva N. N. | 183 |
| 36 | 2017 | Compactly supported functions in cryptography algorithms | Leontiev V. L., Shchurenko A. V. | 183 |
| 56 | 2022 | Methodology for assessing the security of cryptographic protocols | Semenov A. M., Nesterenko A. Yu. | 183 |
| 39 | 2018 | Convergence of an iterative algorithm for computing parameters of multi-valued threshold functions | Burdelev A. V. | 182 |
| 41 | 2018 | On the number of homogeneous nondegenerate p-ary functions of the given degree | Anokhin M. I. | 182 |
| 37 | 2017 | Optimal routing by landmarks in the timedependent networks | Soldatenko A. A., Bykova V. V. | 180 |
| 41 | 2018 | Structural properties of minimal primitive digraphs | Lebedev P. V. | 180 |
| 41 | 2018 | Minimization of syntax diagrams with multiport components | Ryazanov Yu. D. | 179 |
| 45 | 2019 | On complexity of the existential and universal theories of finite fields | Rybalov A. N. | 179 |
| 6 (Приложение) | 2013 | A parallel algorithm for computation of growth functions in the finite two-generator groups of period 5 | Kuznetsov A. A., Kuznetsova A.S, Safonov K. V. | 178 |
| 41 | 2018 | A nonlinear decomposition method in analysis of some encryption schemes using group automorphisms | Roman'kov V. A., Obzor A. A. | 178 |
| 6 (Приложение) | 2013 | Statistical independence of general superposition of boolean functions | Mironenko O. L. | 177 |
| 6 (Приложение) | 2013 | On the effective representation of disjunctive normal forms by diagrams of a special kind | Semenov A. A. | 177 |
| 7 (Приложение) | 2014 | On estimations for exponents of digraphs using frobenius's numbers | Fomichev V. M. | 177 |
| 45 | 2019 | On the one edge algorithm for the orthogonal double covers | El-Mesady A., El-Shanawany R. | 177 |
| 7 (Приложение) | 2014 | Constructing transitive polynomials over the ring Z
p2 | Kovalevskaya A. O. | 175 |
| 6 (Приложение) | 2013 | The failure of Mceliece PKC based on Reed — Muller codes | Borodin M.A., Chizhov I. V. | 174 |