Issues

IssueYearTitleAuthorsDownloads
442019Analysis of the methods for attribute-based access controlBiyashev R. G., Kalimoldayev M. N., Rog O. A.198
452019Decidability of the restricted theories of a class of partial ordersNikitin A. Yu.197
452019The traveling salesman problem: approximate algorithm by branch-and-bound method with guaranteed precisionKostyuk Yu. L.197
6 (Приложение)2013On non-minimal perfect ciphersMedvedeva N. V., Titov S. S.196
7 (Приложение)2014Nonlinearity bounds for vectorial boolean functions of special formKorsakova E. P.196
7 (Приложение)2014Formalization of combinatorial numbers in terms of entire solutions of systems of linear diophan-tine equationsGotsulenko V. V.195
3(13)2011Computational aspects of graph treewidthBykova V. V.195
6 (Приложение)2013An improved estimate for the convergence rate in the multidimensional central limit theoremVolgin A. V.194
7 (Приложение)2014Estimates for exponents of mixing graphs relating to some modifications of additive generatorsDorokhova A.M.194
6 (Приложение)2013Pipelining of combinational circuitsKardash S.N., Pottosin Yu.V.193
7 (Приложение)2014About the minimal primitive matricesFomichev V., Bar-Gnar R.I.193
432019Characterizations of non associative ordered semigroups by the properties of their fuzzy ideals with thresholds (α, β]Nasreen Kausar193
4(22)2013Implementing main steps of Wiedemann — Coppersmith algorithm for binary systems of linear equations on clustersRyzhov A. S.193
372017Estimations of unreliability of circuits in Rosser - Turkett basis (in P3) with faults of type 0 at the outputs of gatesBarsukova O. Yu., Alekhina M. A.192
6 (Приложение)2013On probability characteristics of random graphs generated by algorithms for finding hash function collisionsKarpunin G. A.187
6 (Приложение)2013On the upper bound for the number of additional edges in minimal vertex extensions of colored circlesBondarenko P. P.187
7 (Приложение)2014About basises with unreliability coefficient 5Vasin A. V.187
7 (Приложение)2014An algorithm for generating a pair of special primesRybakov A. S., Zhukov K.D.187
3(33)2016An algorithm for computation of the growth functions in finite two-generated groups of exponent 5Kuznetsov A. A.187
392018List decoding of the biorthogonal wavelet code with predetermined code distance on a field of odd characteristicLitichevskiy D. V.187
432019An algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomialBelov S. A.187
512021Group authentication scheme based on zeroknowledge proofGamayunov D. Yu., Shliakhtina E. A.187
7 (Приложение)2014On cycles in functional graphs of circulant type gene networks with threshold functionsBykov I. S.186
7 (Приложение)2014Research of differentiable modulo p functionsIvachev A. S.185
362017Improving the rate of convergence in the multidimensional central limit theorem for sums of locally dependent random vectorsVolgin A. V.185
372017Reduction of synapses in the Hopfield autoassociative memoryTarkov M. S.185
382017On irreducible algebraic sets over linearly ordered semilattices IIShevlyakov A. N.185
412018New families of multiplicative circulant networksMonakhova E. A.185
1(19)2013All-pairs shortest paths algorithm for highdimensional sparse graphsUrakov A. R., Timeryaev T. V.185
6 (Приложение)2013The blackbox service for hosting capture the flag computer security competitionsStefantsov D. A., Anisenya N.I, Torgaeva T. A.184
7 (Приложение)2014About covert timing channels in os androidMilovanov T. I.184
372017On generic complexity of decidability problem for diophantine systems in the Skolem's formRybalov A. N.184
7 (Приложение)2014On a comparison of underdetermined alphabetsSholomov L.A.183
7 (Приложение)2014Every cubic Boolean function in 8 variables is the sum of not more than 4 bent functionsTokareva N. N.183
362017Compactly supported functions in cryptography algorithmsLeontiev V. L., Shchurenko A. V.183
562022Methodology for assessing the security of cryptographic protocolsSemenov A. M., Nesterenko A. Yu.183
392018Convergence of an iterative algorithm for computing parameters of multi-valued threshold functionsBurdelev A. V.182
412018On the number of homogeneous nondegenerate p-ary functions of the given degreeAnokhin M. I.182
372017Optimal routing by landmarks in the timedependent networksSoldatenko A. A., Bykova V. V.180
412018Structural properties of minimal primitive digraphsLebedev P. V.180
412018Minimization of syntax diagrams with multiport componentsRyazanov Yu. D.179
452019On complexity of the existential and universal theories of finite fieldsRybalov A. N.179
6 (Приложение)2013A parallel algorithm for computation of growth functions in the finite two-generator groups of period 5Kuznetsov A. A., Kuznetsova A.S, Safonov K. V.178
412018A nonlinear decomposition method in analysis of some encryption schemes using group automorphismsRoman'kov V. A., Obzor A. A.178
6 (Приложение)2013Statistical independence of general superposition of boolean functionsMironenko O. L.177
6 (Приложение)2013On the effective representation of disjunctive normal forms by diagrams of a special kindSemenov A. A.177
7 (Приложение)2014On estimations for exponents of digraphs using frobenius's numbersFomichev V. M.177
452019On the one edge algorithm for the orthogonal double coversEl-Mesady A., El-Shanawany R.177
7 (Приложение)2014Constructing transitive polynomials over the ring Z p2Kovalevskaya A. O.175
6 (Приложение)2013The failure of Mceliece PKC based on Reed — Muller codesBorodin M.A., Chizhov I. V.174
Страница 5 из 17 123456...17
Всего: 831