Issues

IssueYearTitleAuthorsDownloads
92016Refinement of lower bounds for the number of additional arcs in a minimal vertex 1-ex-tension of oriented pathModenova O. V., Abrosimov M. B.653
22009Cryptographic protocolsCheremushkin A. V.648
92016On the number of optimal 1-hamilto-nian graphs with the number of vertices up to 26 and 28Suhov S. A., Abrosimov M.B.605
52012Network security architectures fundamentals laboratory practice in Cisco Packet TracerHasanov B. S., Kolegov D. N.566
92016On attractors in finite dynamic systems of complete graphs orientationsZharkova A. V.528
62013Correctness of state transformation rules in MROSL DP-modelDevyanin P. N.426
72014Hybrid compression algorithm for discrete-tone graphics processingDruzhinin D. V.416
12009Closure of basic role DP-modelKachanov M. A.411
72014Model of complication function for generator of pseudorandom sequences over the field GF(2)Zelinsky P. V., Zakharov V.M., Shalagin S.V.406
72014Structural decomposition of graphs and its application for solving optimization problems on sparse graphsBykova V. V.402
42011Hypotheses for the number of bent functionsTokareva N. N.401
92016About results of designing hierarchical representation of mrosl DP-modelDevyanin P. N.398
32010Steganography and steganalysis in video filesModenova O. V.396
62013An iterative construction of almost perfect nonlinear functionsFrolova A. A.396
52012One-time ring signature in e-cashChikishev G. O.390
112018On the number of attractors in finite dynamic systems of complete graphs orientationsZharkova A. V.388
22009Finite automata in cryptographyAgibalov G. P.387
42011Algebraic cryptanalysis of one-round S-AESVoronin R. I.380
72014On probabilities of r-round differences of a markov xsl block cipher with a reducible linear transformationPudovkina M. A.379
72014Quantitative steganalysis using binary classifierAlmeev A.N., Razinkov E.V.378
52012Hierarchical role-based access control developmentKolegov D. N.375
72014SIBCiphers - symmetric iterative block ciphers composed of boolean functions depending on small number of variablesAgibalov G. P.375
62013Project of hardware implementation of Russian programming languageLipsky V. B., Agibalov G. P., Pankratova I. A.373
72014Constructing transitive polynomials over the ring Z p2Kovalevskaya A. O.370
72014Euler's numbers on sets of permutations and analogues of wilson's theoremBondarenko L.N., Sharapova M. L.369
32010Reconfigurable finite state machines with shared memoryTrenkaev V. N.360
32010A new combinatorial construction of bent functionsTokareva N. N.358
72014A new highly accurate approach to non-distorted bitmap images quantitative steganalysisMonarev V.A.355
72014Forming indicators vectors for neural networks training to detect attacks on Web applicationsSorokin S. N.355
82015On algebraic immunity of vector boolean functionsPokrasenko D. P.352
72014About the minimal primitive matricesFomichev V., Bar-Gnar R.I.350
52012The search for bridges in Take-Grant security modelBrechka D. M.349
52012Attribute based access control modelsChernov D. V.349
62013Dynamical properties of some discrete automaton mappings defined by random graphsEvdokimov A. A., Otpushennikov I. V., Kochemazov S. E., Semenov A. A.349
72014Number of discrete functions on a primary cyclic group with a given nonlinearity degreeCheremushkin A. V.348
32010Minimization procedure for HAMILTONIAN CIRCUIT and GRAPH ISOMORPHISM problemsFaizullin R. T.347
82015Perfect binary codes of infinite lengthMalyugin S. A.343
72014The reliability of circuits in the basis of unreliable and absolutely reliable gatesAlekhina M. A., Lakomkina A. E.341
72014Computationally secure dbms based on order-preserving encryptionGlotov I, Trenkaev V., Ovsyannikov S.340
72014Integrity control in mandatory DP-model of DBMS MySQLChernov D. V.339
112018Approaches to formal modelling access control in postgresql within framework of the mrosl DP-modelDevyanin P. N.338
72014About covert timing channels in os androidMilovanov T. I.336
52012Estimates of collision resistance complexity for the hash function RIPEMDErmolaeva E. Z., Karpunin G. A.335
62013Functional graph trees for circulants with linear boolean functions at the verticesKornienko A. S.335
72014Implementation of RDBMS MySQL security monitor in DBF/DAM systemsTkachenko N. O.335
72014Nonlinearity bounds for vectorial boolean functions of special formKorsakova E. P.333
72014Software implementation of operations over large numbers in LYaPAS-TGribanov A. S., Sibiryakova V.A.333
72014Classification of the functions over primary ring of residues considered in connection with the method of coordinate linearizationZaets M. V.332
12009Experimental program estimation for the quantity of prime numbers necessary for elimination of polynomial equations with out integer rootsSalikhov N. P., Zachesov Y. L331
72014Characterization of apn functions by means of subfunctionsGorodilova A. A.331
Страница 1 из 16 123456...16
Всего: 763