9 | 2016 | Refinement of lower bounds for the number of additional arcs in a minimal vertex 1-ex-tension of oriented path | Abrosimov M. B., Modenova O. V. | 659 |
2 | 2009 | Cryptographic protocols | Cheremushkin A. V. | 650 |
9 | 2016 | On the number of optimal 1-hamilto-nian graphs with the number of vertices up to 26 and 28 | Abrosimov M.B., Suhov S. A. | 609 |
5 | 2012 | Network security architectures fundamentals laboratory practice in Cisco Packet Tracer | Kolegov D. N., Hasanov B. S. | 567 |
9 | 2016 | On attractors in finite dynamic systems of complete graphs orientations | Zharkova A. V. | 532 |
6 | 2013 | Correctness of state transformation rules in MROSL DP-model | Devyanin P. N. | 426 |
7 | 2014 | Hybrid compression algorithm for discrete-tone graphics processing | Druzhinin D. V. | 417 |
1 | 2009 | Closure of basic role DP-model | Kachanov M. A. | 412 |
7 | 2014 | Model of complication function for generator of pseudorandom sequences over the field GF(2) | Zakharov V.M., Shalagin S.V., Zelinsky P. V. | 407 |
7 | 2014 | Structural decomposition of graphs and its application for solving optimization problems on sparse graphs | Bykova V. V. | 403 |
4 | 2011 | Hypotheses for the number of bent functions | Tokareva N. N. | 402 |
9 | 2016 | About results of designing hierarchical representation of mrosl DP-model | Devyanin P. N. | 399 |
3 | 2010 | Steganography and steganalysis in video files | Modenova O. V. | 397 |
6 | 2013 | An iterative construction of almost perfect nonlinear functions | Frolova A. A. | 397 |
11 | 2018 | On the number of attractors in finite dynamic systems of complete graphs orientations | Zharkova A. V. | 395 |
5 | 2012 | One-time ring signature in e-cash | Chikishev G. O. | 391 |
2 | 2009 | Finite automata in cryptography | Agibalov G. P. | 388 |
4 | 2011 | Algebraic cryptanalysis of one-round S-AES | Voronin R. I. | 381 |
7 | 2014 | On probabilities of r-round differences of a markov xsl block cipher with a reducible linear transformation | Pudovkina M. A. | 380 |
7 | 2014 | Quantitative steganalysis using binary classifier | Razinkov E.V., Almeev A.N. | 379 |
5 | 2012 | Hierarchical role-based access control development | Kolegov D. N. | 376 |
7 | 2014 | SIBCiphers - symmetric iterative block ciphers composed of boolean functions depending on small number of variables | Agibalov G. P. | 376 |
6 | 2013 | Project of hardware implementation of Russian programming language | Pankratova I. A., Lipsky V. B., Agibalov G. P. | 374 |
7 | 2014 | Constructing transitive polynomials over the ring Z
p2 | Kovalevskaya A. O. | 371 |
7 | 2014 | Euler's numbers on sets of permutations and analogues of wilson's theorem | Sharapova M. L., Bondarenko L.N. | 370 |
3 | 2010 | Reconfigurable finite state machines with shared memory | Trenkaev V. N. | 361 |
3 | 2010 | A new combinatorial construction of bent functions | Tokareva N. N. | 359 |
7 | 2014 | A new highly accurate approach to non-distorted bitmap images quantitative steganalysis | Monarev V.A. | 356 |
7 | 2014 | Forming indicators vectors for neural networks training to detect attacks on Web applications | Sorokin S. N. | 356 |
8 | 2015 | On algebraic immunity of vector boolean functions | Pokrasenko D. P. | 353 |
7 | 2014 | About the minimal primitive matrices | Bar-Gnar R.I., Fomichev V. | 351 |
5 | 2012 | The search for bridges in Take-Grant security model | Brechka D. M. | 350 |
5 | 2012 | Attribute based access control models | Chernov D. V. | 350 |
6 | 2013 | Dynamical properties of some discrete automaton mappings defined by random graphs | Kochemazov S. E., Semenov A. A., Evdokimov A. A., Otpushennikov I. V. | 349 |
7 | 2014 | Number of discrete functions on a primary cyclic group with a given nonlinearity degree | Cheremushkin A. V. | 349 |
3 | 2010 | Minimization procedure for HAMILTONIAN CIRCUIT and GRAPH ISOMORPHISM problems | Faizullin R. T. | 348 |
8 | 2015 | Perfect binary codes of infinite length | Malyugin S. A. | 344 |
7 | 2014 | The reliability of circuits in the basis of unreliable and absolutely reliable gates | Lakomkina A. E., Alekhina M. A. | 342 |
7 | 2014 | Computationally secure dbms based on order-preserving encryption | Ovsyannikov S., Glotov I, Trenkaev V. | 341 |
7 | 2014 | Integrity control in mandatory DP-model of DBMS MySQL | Chernov D. V. | 339 |
11 | 2018 | Approaches to formal modelling access control in postgresql within framework of the mrosl DP-model | Devyanin P. N. | 339 |
7 | 2014 | About covert timing channels in os android | Milovanov T. I. | 337 |
5 | 2012 | Estimates of collision resistance complexity for the hash function RIPEMD | Karpunin G. A., Ermolaeva E. Z. | 336 |
6 | 2013 | Functional graph trees for circulants with linear boolean functions at the vertices | Kornienko A. S. | 336 |
7 | 2014 | Implementation of RDBMS MySQL security monitor in DBF/DAM systems | Tkachenko N. O. | 336 |
7 | 2014 | Software implementation of operations over large numbers in LYaPAS-T | Sibiryakova V.A., Gribanov A. S. | 334 |
1 | 2009 | Experimental program estimation for the quantity of prime numbers necessary for elimination of polynomial equations with out integer roots | Salikhov N. P., Zachesov Y. L | 333 |
7 | 2014 | Classification of the functions over primary ring of residues considered in connection with the method of coordinate linearization | Zaets M. V. | 333 |
7 | 2014 | Nonlinearity bounds for vectorial boolean functions of special form | Korsakova E. P. | 333 |
7 | 2014 | Characterization of apn functions by means of subfunctions | Gorodilova A. A. | 332 |