Issues

IssueYearTitleAuthorsDownloads
122019Mixing properties for some classes of permutations on f£Pankratova I. A., Karpova L.A.111
132020An algorithm for computing the Stickelberger elements for imaginary multiquadratic fieldsOlefirenko D. O., Malygina E. S., Kirshanova E. A., Novoselov S. A.111
122019About the cubic part of the algebraic normal form of arbitrary bent functionsKuzmina T. A.110
132020Efficient S-repetition method for constructing an IND-CCA2 secure McEliece modification in the standard modelTurchenko O. Y., Kosolapov Y. V.110
122019On the recognition problem for algebraic threshold functionsJenevsky S. V., Shurupov A.N., Melnikov S. L.109
132020A Compact translator of algorithms into boolean formulas for use in cryptanalysisKalgin K.V., Sofronova D.A.108
122019A method for constructing permutations, involutions and orthomorphisms with strong cryptographic propertiesDe la Cruz Jimenez R. A.106
122019Nonlinearity characteristics estimations for function compositions over vector spaces by the matrix-graph approachSapegina M. D.103
132020On metrical properties of the set of self-dual bent functionsKutsenko A. V.100
132020Construction of distinguishers for iterative block ciphers on the base of neural networksPestunov A. I., Perov A. A.100
132020Post-quantum signature proposal for standardisationKolesnikov N. S., Novoselov S. A., Kirshanova E. A., Malygina E. S.98
132020Method for hiding private data in the block-chain tender systemKondyrev D. O.97
132020On a secondary construction of quadratic APN functionsIdrisova V. A., Kalgin K. V.96
132020Construction of cryptographic boolean functions using SAT-solversKalgin K. V., Doronin A. E.95
132020Application of sat oracles for generation of additional linear constraints in cryptanalysis of some lightweight ciphersSemenov A. A., Antonov K. V.94
132020Computation of rewriting systems in finite groupsKuznetsov A. A.94
132020About the hidden compact way to store dataRoman'kov V. A.90
132020Validation-free offchain transactions with unlinkable double spend detectionKyazhin S. N., Klimenko K. A.90
132020An algorithm for solving the extended parsing problemSafonov K. V., Kishkan V. V.90
132020Elaboration of selfish-mine strategyCheremushkin A. V.88
132020One approach to constructing a multiply transitive class of block transformationsCherednik I. V.87
132020Characteristics of the data integrity check algorithm based on additive generators and s-boxesFomichev V.M., Nabiev T.R., Koreneva A.M.86
152022Methods for deductive verification of c code using AstraVer ToolsetTievskiy Stanislav D., Kokorin Artem O., Devyanin Petr N.86
132020Refractive bijections in Steiner triplesTitov S., Vedunova M., Ignatova A., Geut K.85
132020Analysis of block cipher modes of operation for rfid devicesTsaregorodtsev K. D.85
132020On generic complexity of the problem to represent natural numbers by sum of two squaresRybalov A.N.85
132020Experimental estimates of the computational complexity of one class of cryp-toalgorithms based on the generalization of feistel networksFomichev V.M., Koreneva A.M., Bobrovskiy D.A.84
132020Neural network obfuscation for computations over encrypted dataEliseev V. L.84
132020On differentials for the modification of the cipher Simon based on the Lai - Messi schemeBelousova A. A., Tokareva N.N.84
132020Using inverse backdoors sets to construct guess-and-determine attacks on hash-functions md4Semenov A. A., Gribanova I. A.84
132020On the continuation to bent functions and upper bounds on their numberAgievich S. V.81
132020On the number of unsuitable Boolean functions in constructions of filter and combining models of stream ciphersTokareva N. N., Panferov M. A., Bonich T. A.80
132020On homogeneous matroids corresponding to block-schemesTitov S. S., Medvedev N. V.79
132020New estimates for dimension of Reed - Muller subcodes with maximum Hadamard squareVysotskaya V. V.79
132020On the optimality of graph implementations with prescribed connectivitiesAbrosimov M. B., Terebin B.A.79
132020Cryptographic properties of some vectorial boolean functions compositionsLipatova E. S.78
132020Cryptographic properties of orthomorphic permutationsMaksimluk J. P.77
132020Constructions of non-endomorphic perfect ciphersMedvedeva N. V., Titov S. S.77
132020On the decomposition of a vectorial boolean function into a composition of two functionsPintus G. M.75
132020Connections between quaternary and component boolean bent functionsShaporenko A. S.75
132020Geometric condition of formal grammars solvabilityEgorushkin O.I., Safonov K. V., Kolbasina I.V.73
132020Coding information by walsh matricesBespalov M. S., Malkova K. M.72
142021To the task of description minimal by inclusion perfect ciphersMedvedeva N. V., Titov S. S.58
152022Comparison of methods for modeling access control in os and dbms in Event-B for the purpose of their verification with Rodin and ProB toolsDevyanin Petr N., Leonova Maria A.45
142021S-blocks with maximum component algebraic immunity on a small number of variablesZyubina D.A., Tokareva N.N.36
142021On privacy in decentralized systems with tokensKyazhin S. N., Akhmetzyanova L. R., Popov V. A., Babueva A. A.32
142021Schemes for constructing minimal vertex 1-extensions of complete bicolored graphsAbrosimov M. B., Razumovsky P. V.32
142021On derivatives of boolean bent functionsShaporenko A.S.31
142021Development and analysis of oracle for the hibrid attack on a cryptographic system NTRU using a quantum search algorithmBakharev A. O.31
142021Cryptanalytic invertibility of two-argument functionsBerdnikova N. Yu., Pankratova I. A.31
Страница 14 из 16 1...111213141516
Всего: 763