Issues

IssueYearTitleAuthorsDownloads
92016Refinement of lower bounds for the number of additional arcs in a minimal vertex 1-ex-tension of oriented pathAbrosimov M. B., Modenova O. V.659
22009Cryptographic protocolsCheremushkin A. V.650
92016On the number of optimal 1-hamilto-nian graphs with the number of vertices up to 26 and 28Abrosimov M.B., Suhov S. A.609
52012Network security architectures fundamentals laboratory practice in Cisco Packet TracerKolegov D. N., Hasanov B. S.567
92016On attractors in finite dynamic systems of complete graphs orientationsZharkova A. V.532
62013Correctness of state transformation rules in MROSL DP-modelDevyanin P. N.426
72014Hybrid compression algorithm for discrete-tone graphics processingDruzhinin D. V.417
12009Closure of basic role DP-modelKachanov M. A.412
72014Model of complication function for generator of pseudorandom sequences over the field GF(2)Zakharov V.M., Shalagin S.V., Zelinsky P. V.407
72014Structural decomposition of graphs and its application for solving optimization problems on sparse graphsBykova V. V.403
42011Hypotheses for the number of bent functionsTokareva N. N.402
92016About results of designing hierarchical representation of mrosl DP-modelDevyanin P. N.399
32010Steganography and steganalysis in video filesModenova O. V.397
62013An iterative construction of almost perfect nonlinear functionsFrolova A. A.397
112018On the number of attractors in finite dynamic systems of complete graphs orientationsZharkova A. V.395
52012One-time ring signature in e-cashChikishev G. O.391
22009Finite automata in cryptographyAgibalov G. P.388
42011Algebraic cryptanalysis of one-round S-AESVoronin R. I.381
72014On probabilities of r-round differences of a markov xsl block cipher with a reducible linear transformationPudovkina M. A.380
72014Quantitative steganalysis using binary classifierRazinkov E.V., Almeev A.N.379
52012Hierarchical role-based access control developmentKolegov D. N.376
72014SIBCiphers - symmetric iterative block ciphers composed of boolean functions depending on small number of variablesAgibalov G. P.376
62013Project of hardware implementation of Russian programming languagePankratova I. A., Lipsky V. B., Agibalov G. P.374
72014Constructing transitive polynomials over the ring Z p2Kovalevskaya A. O.371
72014Euler's numbers on sets of permutations and analogues of wilson's theoremSharapova M. L., Bondarenko L.N.370
32010Reconfigurable finite state machines with shared memoryTrenkaev V. N.361
32010A new combinatorial construction of bent functionsTokareva N. N.359
72014A new highly accurate approach to non-distorted bitmap images quantitative steganalysisMonarev V.A.356
72014Forming indicators vectors for neural networks training to detect attacks on Web applicationsSorokin S. N.356
82015On algebraic immunity of vector boolean functionsPokrasenko D. P.353
72014About the minimal primitive matricesBar-Gnar R.I., Fomichev V.351
52012The search for bridges in Take-Grant security modelBrechka D. M.350
52012Attribute based access control modelsChernov D. V.350
62013Dynamical properties of some discrete automaton mappings defined by random graphsKochemazov S. E., Semenov A. A., Evdokimov A. A., Otpushennikov I. V.349
72014Number of discrete functions on a primary cyclic group with a given nonlinearity degreeCheremushkin A. V.349
32010Minimization procedure for HAMILTONIAN CIRCUIT and GRAPH ISOMORPHISM problemsFaizullin R. T.348
82015Perfect binary codes of infinite lengthMalyugin S. A.344
72014The reliability of circuits in the basis of unreliable and absolutely reliable gatesLakomkina A. E., Alekhina M. A.342
72014Computationally secure dbms based on order-preserving encryptionOvsyannikov S., Glotov I, Trenkaev V.341
72014Integrity control in mandatory DP-model of DBMS MySQLChernov D. V.339
112018Approaches to formal modelling access control in postgresql within framework of the mrosl DP-modelDevyanin P. N.339
72014About covert timing channels in os androidMilovanov T. I.337
52012Estimates of collision resistance complexity for the hash function RIPEMDKarpunin G. A., Ermolaeva E. Z.336
62013Functional graph trees for circulants with linear boolean functions at the verticesKornienko A. S.336
72014Implementation of RDBMS MySQL security monitor in DBF/DAM systemsTkachenko N. O.336
72014Software implementation of operations over large numbers in LYaPAS-TSibiryakova V.A., Gribanov A. S.334
12009Experimental program estimation for the quantity of prime numbers necessary for elimination of polynomial equations with out integer rootsSalikhov N. P., Zachesov Y. L333
72014Classification of the functions over primary ring of residues considered in connection with the method of coordinate linearizationZaets M. V.333
72014Nonlinearity bounds for vectorial boolean functions of special formKorsakova E. P.333
72014Characterization of apn functions by means of subfunctionsGorodilova A. A.332
Страница 1 из 16 123456...16
Всего: 763