| 9 | 2016 | Refinement of lower bounds for the number of additional arcs in a minimal vertex 1-ex-tension of oriented path | Modenova O. V., Abrosimov M. B. | 667 |
| 2 | 2009 | Cryptographic protocols | Cheremushkin A. V. | 653 |
| 9 | 2016 | On the number of optimal 1-hamilto-nian graphs with the number of vertices up to 26 and 28 | Abrosimov M.B., Suhov S. A. | 617 |
| 5 | 2012 | Network security architectures fundamentals laboratory practice in Cisco Packet Tracer | Kolegov D. N., Hasanov B. S. | 570 |
| 9 | 2016 | On attractors in finite dynamic systems of complete graphs orientations | Zharkova A. V. | 538 |
| 6 | 2013 | Correctness of state transformation rules in MROSL DP-model | Devyanin P. N. | 429 |
| 7 | 2014 | Hybrid compression algorithm for discrete-tone graphics processing | Druzhinin D. V. | 420 |
| 1 | 2009 | Closure of basic role DP-model | Kachanov M. A. | 415 |
| 7 | 2014 | Model of complication function for generator of pseudorandom sequences over the field GF(2) | Shalagin S.V., Zelinsky P. V., Zakharov V.M. | 410 |
| 7 | 2014 | Structural decomposition of graphs and its application for solving optimization problems on sparse graphs | Bykova V. V. | 406 |
| 4 | 2011 | Hypotheses for the number of bent functions | Tokareva N. N. | 405 |
| 9 | 2016 | About results of designing hierarchical representation of mrosl DP-model | Devyanin P. N. | 403 |
| 3 | 2010 | Steganography and steganalysis in video files | Modenova O. V. | 400 |
| 6 | 2013 | An iterative construction of almost perfect nonlinear functions | Frolova A. A. | 400 |
| 11 | 2018 | On the number of attractors in finite dynamic systems of complete graphs orientations | Zharkova A. V. | 400 |
| 5 | 2012 | One-time ring signature in e-cash | Chikishev G. O. | 394 |
| 2 | 2009 | Finite automata in cryptography | Agibalov G. P. | 391 |
| 4 | 2011 | Algebraic cryptanalysis of one-round S-AES | Voronin R. I. | 384 |
| 7 | 2014 | On probabilities of r-round differences of a markov xsl block cipher with a reducible linear transformation | Pudovkina M. A. | 383 |
| 7 | 2014 | Quantitative steganalysis using binary classifier | Almeev A.N., Razinkov E.V. | 382 |
| 5 | 2012 | Hierarchical role-based access control development | Kolegov D. N. | 379 |
| 7 | 2014 | SIBCiphers - symmetric iterative block ciphers composed of boolean functions depending on small number of variables | Agibalov G. P. | 379 |
| 6 | 2013 | Project of hardware implementation of Russian programming language | Lipsky V. B., Agibalov G. P., Pankratova I. A. | 376 |
| 7 | 2014 | Constructing transitive polynomials over the ring Z
p2 | Kovalevskaya A. O. | 374 |
| 7 | 2014 | Euler's numbers on sets of permutations and analogues of wilson's theorem | Sharapova M. L., Bondarenko L.N. | 373 |
| 3 | 2010 | Reconfigurable finite state machines with shared memory | Trenkaev V. N. | 364 |
| 3 | 2010 | A new combinatorial construction of bent functions | Tokareva N. N. | 362 |
| 7 | 2014 | A new highly accurate approach to non-distorted bitmap images quantitative steganalysis | Monarev V.A. | 359 |
| 7 | 2014 | Forming indicators vectors for neural networks training to detect attacks on Web applications | Sorokin S. N. | 359 |
| 8 | 2015 | On algebraic immunity of vector boolean functions | Pokrasenko D. P. | 357 |
| 6 | 2013 | Dynamical properties of some discrete automaton mappings defined by random graphs | Semenov A. A., Evdokimov A. A., Otpushennikov I. V., Kochemazov S. E. | 354 |
| 7 | 2014 | About the minimal primitive matrices | Bar-Gnar R.I., Fomichev V. | 354 |
| 5 | 2012 | The search for bridges in Take-Grant security model | Brechka D. M. | 353 |
| 5 | 2012 | Attribute based access control models | Chernov D. V. | 353 |
| 7 | 2014 | Number of discrete functions on a primary cyclic group with a given nonlinearity degree | Cheremushkin A. V. | 352 |
| 3 | 2010 | Minimization procedure for HAMILTONIAN CIRCUIT and GRAPH ISOMORPHISM problems | Faizullin R. T. | 350 |
| 8 | 2015 | Perfect binary codes of infinite length | Malyugin S. A. | 347 |
| 7 | 2014 | The reliability of circuits in the basis of unreliable and absolutely reliable gates | Alekhina M. A., Lakomkina A. E. | 345 |
| 11 | 2018 | Approaches to formal modelling access control in postgresql within framework of the mrosl DP-model | Devyanin P. N. | 345 |
| 7 | 2014 | Computationally secure dbms based on order-preserving encryption | Glotov I, Trenkaev V., Ovsyannikov S. | 344 |
| 7 | 2014 | Integrity control in mandatory DP-model of DBMS MySQL | Chernov D. V. | 343 |
| 7 | 2014 | Implementation of RDBMS MySQL security monitor in DBF/DAM systems | Tkachenko N. O. | 341 |
| 7 | 2014 | About covert timing channels in os android | Milovanov T. I. | 340 |
| 5 | 2012 | Estimates of collision resistance complexity for the hash function RIPEMD | Karpunin G. A., Ermolaeva E. Z. | 339 |
| 6 | 2013 | Functional graph trees for circulants with linear boolean functions at the vertices | Kornienko A. S. | 338 |
| 7 | 2014 | Software implementation of operations over large numbers in LYaPAS-T | Sibiryakova V.A., Gribanov A. S. | 337 |
| 1 | 2009 | Experimental program estimation for the quantity of prime numbers necessary for elimination of polynomial equations with out integer roots | Zachesov Y. L, Salikhov N. P. | 336 |
| 7 | 2014 | Characterization of apn functions by means of subfunctions | Gorodilova A. A. | 336 |
| 7 | 2014 | Classification of the functions over primary ring of residues considered in connection with the method of coordinate linearization | Zaets M. V. | 336 |
| 7 | 2014 | Nonlinearity bounds for vectorial boolean functions of special form | Korsakova E. P. | 336 |