12 | 2019 | Mixing properties for some classes of permutations on f£ | Pankratova I. A., Karpova L.A. | 111 |
13 | 2020 | An algorithm for computing the Stickelberger elements for imaginary multiquadratic fields | Olefirenko D. O., Malygina E. S., Kirshanova E. A., Novoselov S. A. | 111 |
12 | 2019 | About the cubic part of the algebraic normal form of arbitrary bent functions | Kuzmina T. A. | 110 |
13 | 2020 | Efficient S-repetition method for constructing an IND-CCA2 secure McEliece modification in the standard model | Turchenko O. Y., Kosolapov Y. V. | 110 |
12 | 2019 | On the recognition problem for algebraic threshold functions | Jenevsky S. V., Shurupov A.N., Melnikov S. L. | 109 |
13 | 2020 | A Compact translator of algorithms into boolean formulas for use in cryptanalysis | Kalgin K.V., Sofronova D.A. | 108 |
12 | 2019 | A method for constructing permutations, involutions and orthomorphisms with strong cryptographic properties | De la Cruz Jimenez R. A. | 106 |
12 | 2019 | Nonlinearity characteristics estimations for function compositions over vector spaces by the matrix-graph approach | Sapegina M. D. | 103 |
13 | 2020 | On metrical properties of the set of self-dual bent functions | Kutsenko A. V. | 100 |
13 | 2020 | Construction of distinguishers for iterative block ciphers on the base of neural networks | Pestunov A. I., Perov A. A. | 100 |
13 | 2020 | Post-quantum signature proposal for standardisation | Kolesnikov N. S., Novoselov S. A., Kirshanova E. A., Malygina E. S. | 98 |
13 | 2020 | Method for hiding private data in the block-chain tender system | Kondyrev D. O. | 97 |
13 | 2020 | On a secondary construction of quadratic APN functions | Idrisova V. A., Kalgin K. V. | 96 |
13 | 2020 | Construction of cryptographic boolean functions using SAT-solvers | Kalgin K. V., Doronin A. E. | 95 |
13 | 2020 | Application of sat oracles for generation of additional linear constraints in cryptanalysis of some lightweight ciphers | Semenov A. A., Antonov K. V. | 94 |
13 | 2020 | Computation of rewriting systems in finite groups | Kuznetsov A. A. | 94 |
13 | 2020 | About the hidden compact way to store data | Roman'kov V. A. | 90 |
13 | 2020 | Validation-free offchain transactions with unlinkable double spend detection | Kyazhin S. N., Klimenko K. A. | 90 |
13 | 2020 | An algorithm for solving the extended parsing problem | Safonov K. V., Kishkan V. V. | 90 |
13 | 2020 | Elaboration of selfish-mine strategy | Cheremushkin A. V. | 88 |
13 | 2020 | One approach to constructing a multiply transitive class of block transformations | Cherednik I. V. | 87 |
13 | 2020 | Characteristics of the data integrity check algorithm based on additive generators and s-boxes | Fomichev V.M., Nabiev T.R., Koreneva A.M. | 86 |
15 | 2022 | Methods for deductive verification of c code using AstraVer Toolset | Tievskiy Stanislav D., Kokorin Artem O., Devyanin Petr N. | 86 |
13 | 2020 | Refractive bijections in Steiner triples | Titov S., Vedunova M., Ignatova A., Geut K. | 85 |
13 | 2020 | Analysis of block cipher modes of operation for rfid devices | Tsaregorodtsev K. D. | 85 |
13 | 2020 | On generic complexity of the problem to represent natural numbers by sum of two squares | Rybalov A.N. | 85 |
13 | 2020 | Experimental estimates of the computational complexity of one class of cryp-toalgorithms based on the generalization of feistel networks | Fomichev V.M., Koreneva A.M., Bobrovskiy D.A. | 84 |
13 | 2020 | Neural network obfuscation for computations over encrypted data | Eliseev V. L. | 84 |
13 | 2020 | On differentials for the modification of the cipher Simon based on the Lai - Messi scheme | Belousova A. A., Tokareva N.N. | 84 |
13 | 2020 | Using inverse backdoors sets to construct guess-and-determine attacks on hash-functions md4 | Semenov A. A., Gribanova I. A. | 84 |
13 | 2020 | On the continuation to bent functions and upper bounds on their number | Agievich S. V. | 81 |
13 | 2020 | On the number of unsuitable Boolean functions in constructions of filter and combining models of stream ciphers | Tokareva N. N., Panferov M. A., Bonich T. A. | 80 |
13 | 2020 | On homogeneous matroids corresponding to block-schemes | Titov S. S., Medvedev N. V. | 79 |
13 | 2020 | New estimates for dimension of Reed - Muller subcodes with maximum Hadamard square | Vysotskaya V. V. | 79 |
13 | 2020 | On the optimality of graph implementations with prescribed connectivities | Abrosimov M. B., Terebin B.A. | 79 |
13 | 2020 | Cryptographic properties of some vectorial boolean functions compositions | Lipatova E. S. | 78 |
13 | 2020 | Cryptographic properties of orthomorphic permutations | Maksimluk J. P. | 77 |
13 | 2020 | Constructions of non-endomorphic perfect ciphers | Medvedeva N. V., Titov S. S. | 77 |
13 | 2020 | On the decomposition of a vectorial boolean function into a composition of two functions | Pintus G. M. | 75 |
13 | 2020 | Connections between quaternary and component boolean bent functions | Shaporenko A. S. | 75 |
13 | 2020 | Geometric condition of formal grammars solvability | Egorushkin O.I., Safonov K. V., Kolbasina I.V. | 73 |
13 | 2020 | Coding information by walsh matrices | Bespalov M. S., Malkova K. M. | 72 |
14 | 2021 | To the task of description minimal by inclusion perfect ciphers | Medvedeva N. V., Titov S. S. | 58 |
15 | 2022 | Comparison of methods for modeling access control in os and dbms in Event-B for the purpose of their verification with Rodin and ProB tools | Devyanin Petr N., Leonova Maria A. | 45 |
14 | 2021 | S-blocks with maximum component algebraic immunity on a small number of variables | Zyubina D.A., Tokareva N.N. | 36 |
14 | 2021 | On privacy in decentralized systems with tokens | Kyazhin S. N., Akhmetzyanova L. R., Popov V. A., Babueva A. A. | 32 |
14 | 2021 | Schemes for constructing minimal vertex 1-extensions of complete bicolored graphs | Abrosimov M. B., Razumovsky P. V. | 32 |
14 | 2021 | On derivatives of boolean bent functions | Shaporenko A.S. | 31 |
14 | 2021 | Development and analysis of oracle for the hibrid attack on a cryptographic system NTRU using a quantum search algorithm | Bakharev A. O. | 31 |
14 | 2021 | Cryptanalytic invertibility of two-argument functions | Berdnikova N. Yu., Pankratova I. A. | 31 |