Issues

IssueYearTitleAuthorsDownloads
92016Refinement of lower bounds for the number of additional arcs in a minimal vertex 1-ex-tension of oriented pathModenova O. V., Abrosimov M. B.667
22009Cryptographic protocolsCheremushkin A. V.653
92016On the number of optimal 1-hamilto-nian graphs with the number of vertices up to 26 and 28Abrosimov M.B., Suhov S. A.617
52012Network security architectures fundamentals laboratory practice in Cisco Packet TracerKolegov D. N., Hasanov B. S.570
92016On attractors in finite dynamic systems of complete graphs orientationsZharkova A. V.538
62013Correctness of state transformation rules in MROSL DP-modelDevyanin P. N.429
72014Hybrid compression algorithm for discrete-tone graphics processingDruzhinin D. V.420
12009Closure of basic role DP-modelKachanov M. A.415
72014Model of complication function for generator of pseudorandom sequences over the field GF(2)Shalagin S.V., Zelinsky P. V., Zakharov V.M.410
72014Structural decomposition of graphs and its application for solving optimization problems on sparse graphsBykova V. V.406
42011Hypotheses for the number of bent functionsTokareva N. N.405
92016About results of designing hierarchical representation of mrosl DP-modelDevyanin P. N.403
32010Steganography and steganalysis in video filesModenova O. V.400
62013An iterative construction of almost perfect nonlinear functionsFrolova A. A.400
112018On the number of attractors in finite dynamic systems of complete graphs orientationsZharkova A. V.400
52012One-time ring signature in e-cashChikishev G. O.394
22009Finite automata in cryptographyAgibalov G. P.391
42011Algebraic cryptanalysis of one-round S-AESVoronin R. I.384
72014On probabilities of r-round differences of a markov xsl block cipher with a reducible linear transformationPudovkina M. A.383
72014Quantitative steganalysis using binary classifierAlmeev A.N., Razinkov E.V.382
52012Hierarchical role-based access control developmentKolegov D. N.379
72014SIBCiphers - symmetric iterative block ciphers composed of boolean functions depending on small number of variablesAgibalov G. P.379
62013Project of hardware implementation of Russian programming languageLipsky V. B., Agibalov G. P., Pankratova I. A.376
72014Constructing transitive polynomials over the ring Z p2Kovalevskaya A. O.374
72014Euler's numbers on sets of permutations and analogues of wilson's theoremSharapova M. L., Bondarenko L.N.373
32010Reconfigurable finite state machines with shared memoryTrenkaev V. N.364
32010A new combinatorial construction of bent functionsTokareva N. N.362
72014A new highly accurate approach to non-distorted bitmap images quantitative steganalysisMonarev V.A.359
72014Forming indicators vectors for neural networks training to detect attacks on Web applicationsSorokin S. N.359
82015On algebraic immunity of vector boolean functionsPokrasenko D. P.357
62013Dynamical properties of some discrete automaton mappings defined by random graphsSemenov A. A., Evdokimov A. A., Otpushennikov I. V., Kochemazov S. E.354
72014About the minimal primitive matricesBar-Gnar R.I., Fomichev V.354
52012The search for bridges in Take-Grant security modelBrechka D. M.353
52012Attribute based access control modelsChernov D. V.353
72014Number of discrete functions on a primary cyclic group with a given nonlinearity degreeCheremushkin A. V.352
32010Minimization procedure for HAMILTONIAN CIRCUIT and GRAPH ISOMORPHISM problemsFaizullin R. T.350
82015Perfect binary codes of infinite lengthMalyugin S. A.347
72014The reliability of circuits in the basis of unreliable and absolutely reliable gatesAlekhina M. A., Lakomkina A. E.345
112018Approaches to formal modelling access control in postgresql within framework of the mrosl DP-modelDevyanin P. N.345
72014Computationally secure dbms based on order-preserving encryptionGlotov I, Trenkaev V., Ovsyannikov S.344
72014Integrity control in mandatory DP-model of DBMS MySQLChernov D. V.343
72014Implementation of RDBMS MySQL security monitor in DBF/DAM systemsTkachenko N. O.341
72014About covert timing channels in os androidMilovanov T. I.340
52012Estimates of collision resistance complexity for the hash function RIPEMDKarpunin G. A., Ermolaeva E. Z.339
62013Functional graph trees for circulants with linear boolean functions at the verticesKornienko A. S.338
72014Software implementation of operations over large numbers in LYaPAS-TSibiryakova V.A., Gribanov A. S.337
12009Experimental program estimation for the quantity of prime numbers necessary for elimination of polynomial equations with out integer rootsZachesov Y. L, Salikhov N. P.336
72014Characterization of apn functions by means of subfunctionsGorodilova A. A.336
72014Classification of the functions over primary ring of residues considered in connection with the method of coordinate linearizationZaets M. V.336
72014Nonlinearity bounds for vectorial boolean functions of special formKorsakova E. P.336
Страница 1 из 16 123456...16
Всего: 763