Issues

IssueYearTitleAuthorsDownloads
92016Refinement of lower bounds for the number of additional arcs in a minimal vertex 1-ex-tension of oriented pathAbrosimov M. B., Modenova O. V.676
22009Cryptographic protocolsCheremushkin A. V.658
92016On the number of optimal 1-hamilto-nian graphs with the number of vertices up to 26 and 28Abrosimov M.B., Suhov S. A.625
52012Network security architectures fundamentals laboratory practice in Cisco Packet TracerKolegov D. N., Hasanov B. S.574
92016On attractors in finite dynamic systems of complete graphs orientationsZharkova A. V.545
62013Correctness of state transformation rules in MROSL DP-modelDevyanin P. N.433
72014Hybrid compression algorithm for discrete-tone graphics processingDruzhinin D. V.423
12009Closure of basic role DP-modelKachanov M. A.417
72014Model of complication function for generator of pseudorandom sequences over the field GF(2)Zakharov V.M., Shalagin S.V., Zelinsky P. V.413
42011Hypotheses for the number of bent functionsTokareva N. N.408
72014Structural decomposition of graphs and its application for solving optimization problems on sparse graphsBykova V. V.408
92016About results of designing hierarchical representation of mrosl DP-modelDevyanin P. N.408
112018On the number of attractors in finite dynamic systems of complete graphs orientationsZharkova A. V.406
32010Steganography and steganalysis in video filesModenova O. V.404
62013An iterative construction of almost perfect nonlinear functionsFrolova A. A.402
52012One-time ring signature in e-cashChikishev G. O.397
22009Finite automata in cryptographyAgibalov G. P.395
72014On probabilities of r-round differences of a markov xsl block cipher with a reducible linear transformationPudovkina M. A.387
42011Algebraic cryptanalysis of one-round S-AESVoronin R. I.386
72014Quantitative steganalysis using binary classifierRazinkov E.V., Almeev A.N.385
72014SIBCiphers - symmetric iterative block ciphers composed of boolean functions depending on small number of variablesAgibalov G. P.383
52012Hierarchical role-based access control developmentKolegov D. N.382
62013Project of hardware implementation of Russian programming languagePankratova I. A., Lipsky V. B., Agibalov G. P.381
72014Euler's numbers on sets of permutations and analogues of wilson's theoremSharapova M. L., Bondarenko L.N.380
72014Constructing transitive polynomials over the ring Z p2Kovalevskaya A. O.378
32010Reconfigurable finite state machines with shared memoryTrenkaev V. N.367
32010A new combinatorial construction of bent functionsTokareva N. N.365
72014A new highly accurate approach to non-distorted bitmap images quantitative steganalysisMonarev V.A.363
72014Forming indicators vectors for neural networks training to detect attacks on Web applicationsSorokin S. N.363
82015On algebraic immunity of vector boolean functionsPokrasenko D. P.361
72014About the minimal primitive matricesBar-Gnar R.I., Fomichev V.358
72014Number of discrete functions on a primary cyclic group with a given nonlinearity degreeCheremushkin A. V.358
62013Dynamical properties of some discrete automaton mappings defined by random graphsKochemazov S. E., Semenov A. A., Evdokimov A. A., Otpushennikov I. V.357
52012The search for bridges in Take-Grant security modelBrechka D. M.355
52012Attribute based access control modelsChernov D. V.355
112018Approaches to formal modelling access control in postgresql within framework of the mrosl DP-modelDevyanin P. N.355
32010Minimization procedure for HAMILTONIAN CIRCUIT and GRAPH ISOMORPHISM problemsFaizullin R. T.353
82015Perfect binary codes of infinite lengthMalyugin S. A.351
72014Integrity control in mandatory DP-model of DBMS MySQLChernov D. V.349
72014The reliability of circuits in the basis of unreliable and absolutely reliable gatesLakomkina A. E., Alekhina M. A.348
72014Computationally secure dbms based on order-preserving encryptionOvsyannikov S., Glotov I, Trenkaev V.347
72014Implementation of RDBMS MySQL security monitor in DBF/DAM systemsTkachenko N. O.345
72014About covert timing channels in os androidMilovanov T. I.344
52012Estimates of collision resistance complexity for the hash function RIPEMDKarpunin G. A., Ermolaeva E. Z.342
62013Functional graph trees for circulants with linear boolean functions at the verticesKornienko A. S.342
72014Software implementation of operations over large numbers in LYaPAS-TSibiryakova V.A., Gribanov A. S.341
72014Classification of the functions over primary ring of residues considered in connection with the method of coordinate linearizationZaets M. V.340
72014Characterization of apn functions by means of subfunctionsGorodilova A. A.339
72014Nonlinearity bounds for vectorial boolean functions of special formKorsakova E. P.339
12009Experimental program estimation for the quantity of prime numbers necessary for elimination of polynomial equations with out integer rootsZachesov Y. L, Salikhov N. P.338
Страница 1 из 16 123456...16
Всего: 763