9 | 2016 | Refinement of lower bounds for the number of additional arcs in a minimal vertex 1-ex-tension of oriented path | Modenova O. V., Abrosimov M. B. | 653 |
2 | 2009 | Cryptographic protocols | Cheremushkin A. V. | 648 |
9 | 2016 | On the number of optimal 1-hamilto-nian graphs with the number of vertices up to 26 and 28 | Suhov S. A., Abrosimov M.B. | 605 |
5 | 2012 | Network security architectures fundamentals laboratory practice in Cisco Packet Tracer | Hasanov B. S., Kolegov D. N. | 566 |
9 | 2016 | On attractors in finite dynamic systems of complete graphs orientations | Zharkova A. V. | 528 |
6 | 2013 | Correctness of state transformation rules in MROSL DP-model | Devyanin P. N. | 426 |
7 | 2014 | Hybrid compression algorithm for discrete-tone graphics processing | Druzhinin D. V. | 416 |
1 | 2009 | Closure of basic role DP-model | Kachanov M. A. | 411 |
7 | 2014 | Model of complication function for generator of pseudorandom sequences over the field GF(2) | Zelinsky P. V., Zakharov V.M., Shalagin S.V. | 406 |
7 | 2014 | Structural decomposition of graphs and its application for solving optimization problems on sparse graphs | Bykova V. V. | 402 |
4 | 2011 | Hypotheses for the number of bent functions | Tokareva N. N. | 401 |
9 | 2016 | About results of designing hierarchical representation of mrosl DP-model | Devyanin P. N. | 398 |
3 | 2010 | Steganography and steganalysis in video files | Modenova O. V. | 396 |
6 | 2013 | An iterative construction of almost perfect nonlinear functions | Frolova A. A. | 396 |
5 | 2012 | One-time ring signature in e-cash | Chikishev G. O. | 390 |
11 | 2018 | On the number of attractors in finite dynamic systems of complete graphs orientations | Zharkova A. V. | 388 |
2 | 2009 | Finite automata in cryptography | Agibalov G. P. | 387 |
4 | 2011 | Algebraic cryptanalysis of one-round S-AES | Voronin R. I. | 380 |
7 | 2014 | On probabilities of r-round differences of a markov xsl block cipher with a reducible linear transformation | Pudovkina M. A. | 379 |
7 | 2014 | Quantitative steganalysis using binary classifier | Almeev A.N., Razinkov E.V. | 378 |
5 | 2012 | Hierarchical role-based access control development | Kolegov D. N. | 375 |
7 | 2014 | SIBCiphers - symmetric iterative block ciphers composed of boolean functions depending on small number of variables | Agibalov G. P. | 375 |
6 | 2013 | Project of hardware implementation of Russian programming language | Lipsky V. B., Agibalov G. P., Pankratova I. A. | 373 |
7 | 2014 | Constructing transitive polynomials over the ring Z
p2 | Kovalevskaya A. O. | 370 |
7 | 2014 | Euler's numbers on sets of permutations and analogues of wilson's theorem | Bondarenko L.N., Sharapova M. L. | 369 |
3 | 2010 | Reconfigurable finite state machines with shared memory | Trenkaev V. N. | 360 |
3 | 2010 | A new combinatorial construction of bent functions | Tokareva N. N. | 358 |
7 | 2014 | A new highly accurate approach to non-distorted bitmap images quantitative steganalysis | Monarev V.A. | 355 |
7 | 2014 | Forming indicators vectors for neural networks training to detect attacks on Web applications | Sorokin S. N. | 355 |
8 | 2015 | On algebraic immunity of vector boolean functions | Pokrasenko D. P. | 352 |
7 | 2014 | About the minimal primitive matrices | Fomichev V., Bar-Gnar R.I. | 350 |
5 | 2012 | The search for bridges in Take-Grant security model | Brechka D. M. | 349 |
5 | 2012 | Attribute based access control models | Chernov D. V. | 349 |
6 | 2013 | Dynamical properties of some discrete automaton mappings defined by random graphs | Evdokimov A. A., Otpushennikov I. V., Kochemazov S. E., Semenov A. A. | 349 |
7 | 2014 | Number of discrete functions on a primary cyclic group with a given nonlinearity degree | Cheremushkin A. V. | 348 |
3 | 2010 | Minimization procedure for HAMILTONIAN CIRCUIT and GRAPH ISOMORPHISM problems | Faizullin R. T. | 347 |
8 | 2015 | Perfect binary codes of infinite length | Malyugin S. A. | 343 |
7 | 2014 | The reliability of circuits in the basis of unreliable and absolutely reliable gates | Alekhina M. A., Lakomkina A. E. | 341 |
7 | 2014 | Computationally secure dbms based on order-preserving encryption | Glotov I, Trenkaev V., Ovsyannikov S. | 340 |
7 | 2014 | Integrity control in mandatory DP-model of DBMS MySQL | Chernov D. V. | 339 |
11 | 2018 | Approaches to formal modelling access control in postgresql within framework of the mrosl DP-model | Devyanin P. N. | 338 |
7 | 2014 | About covert timing channels in os android | Milovanov T. I. | 336 |
5 | 2012 | Estimates of collision resistance complexity for the hash function RIPEMD | Ermolaeva E. Z., Karpunin G. A. | 335 |
6 | 2013 | Functional graph trees for circulants with linear boolean functions at the vertices | Kornienko A. S. | 335 |
7 | 2014 | Implementation of RDBMS MySQL security monitor in DBF/DAM systems | Tkachenko N. O. | 335 |
7 | 2014 | Nonlinearity bounds for vectorial boolean functions of special form | Korsakova E. P. | 333 |
7 | 2014 | Software implementation of operations over large numbers in LYaPAS-T | Gribanov A. S., Sibiryakova V.A. | 333 |
7 | 2014 | Classification of the functions over primary ring of residues considered in connection with the method of coordinate linearization | Zaets M. V. | 332 |
1 | 2009 | Experimental program estimation for the quantity of prime numbers necessary for elimination of polynomial equations with out integer roots | Salikhov N. P., Zachesov Y. L | 331 |
7 | 2014 | Characterization of apn functions by means of subfunctions | Gorodilova A. A. | 331 |