13 | 2020 | An algorithm for computing the Stickelberger elements for imaginary multiquadratic fields | Kirshanova E. A., Novoselov S. A., Olefirenko D. O., Malygina E. S. | 110 |
12 | 2019 | Mixing properties for some classes of permutations on f£ | Karpova L.A., Pankratova I. A. | 109 |
13 | 2020 | Efficient S-repetition method for constructing an IND-CCA2 secure McEliece modification in the standard model | Turchenko O. Y., Kosolapov Y. V. | 109 |
12 | 2019 | About the cubic part of the algebraic normal form of arbitrary bent functions | Kuzmina T. A. | 108 |
12 | 2019 | On the recognition problem for algebraic threshold functions | Melnikov S. L., Jenevsky S. V., Shurupov A.N. | 108 |
13 | 2020 | A Compact translator of algorithms into boolean formulas for use in cryptanalysis | Kalgin K.V., Sofronova D.A. | 107 |
12 | 2019 | A method for constructing permutations, involutions and orthomorphisms with strong cryptographic properties | De la Cruz Jimenez R. A. | 105 |
12 | 2019 | Nonlinearity characteristics estimations for function compositions over vector spaces by the matrix-graph approach | Sapegina M. D. | 100 |
13 | 2020 | On metrical properties of the set of self-dual bent functions | Kutsenko A. V. | 99 |
13 | 2020 | Construction of distinguishers for iterative block ciphers on the base of neural networks | Perov A. A., Pestunov A. I. | 99 |
13 | 2020 | Post-quantum signature proposal for standardisation | Novoselov S. A., Kirshanova E. A., Malygina E. S., Kolesnikov N. S. | 97 |
13 | 2020 | Method for hiding private data in the block-chain tender system | Kondyrev D. O. | 96 |
13 | 2020 | On a secondary construction of quadratic APN functions | Idrisova V. A., Kalgin K. V. | 95 |
13 | 2020 | Construction of cryptographic boolean functions using SAT-solvers | Kalgin K. V., Doronin A. E. | 94 |
13 | 2020 | Application of sat oracles for generation of additional linear constraints in cryptanalysis of some lightweight ciphers | Semenov A. A., Antonov K. V. | 93 |
13 | 2020 | Computation of rewriting systems in finite groups | Kuznetsov A. A. | 93 |
13 | 2020 | About the hidden compact way to store data | Roman'kov V. A. | 89 |
13 | 2020 | Validation-free offchain transactions with unlinkable double spend detection | Klimenko K. A., Kyazhin S. N. | 89 |
13 | 2020 | An algorithm for solving the extended parsing problem | Safonov K. V., Kishkan V. V. | 89 |
13 | 2020 | Elaboration of selfish-mine strategy | Cheremushkin A. V. | 87 |
13 | 2020 | One approach to constructing a multiply transitive class of block transformations | Cherednik I. V. | 86 |
15 | 2022 | Methods for deductive verification of c code using AstraVer Toolset | Kokorin Artem O., Devyanin Petr N., Tievskiy Stanislav D. | 85 |
13 | 2020 | Refractive bijections in Steiner triples | Ignatova A., Geut K., Titov S., Vedunova M. | 84 |
13 | 2020 | Characteristics of the data integrity check algorithm based on additive generators and s-boxes | Nabiev T.R., Koreneva A.M., Fomichev V.M. | 84 |
13 | 2020 | Analysis of block cipher modes of operation for rfid devices | Tsaregorodtsev K. D. | 84 |
13 | 2020 | On generic complexity of the problem to represent natural numbers by sum of two squares | Rybalov A.N. | 84 |
13 | 2020 | On differentials for the modification of the cipher Simon based on the Lai - Messi scheme | Tokareva N.N., Belousova A. A. | 84 |
13 | 2020 | Experimental estimates of the computational complexity of one class of cryp-toalgorithms based on the generalization of feistel networks | Koreneva A.M., Bobrovskiy D.A., Fomichev V.M. | 83 |
13 | 2020 | Neural network obfuscation for computations over encrypted data | Eliseev V. L. | 83 |
13 | 2020 | Using inverse backdoors sets to construct guess-and-determine attacks on hash-functions md4 | Gribanova I. A., Semenov A. A. | 83 |
13 | 2020 | On the continuation to bent functions and upper bounds on their number | Agievich S. V. | 80 |
13 | 2020 | On the number of unsuitable Boolean functions in constructions of filter and combining models of stream ciphers | Panferov M. A., Bonich T. A., Tokareva N. N. | 79 |
13 | 2020 | On homogeneous matroids corresponding to block-schemes | Medvedev N. V., Titov S. S. | 78 |
13 | 2020 | New estimates for dimension of Reed - Muller subcodes with maximum Hadamard square | Vysotskaya V. V. | 78 |
13 | 2020 | On the optimality of graph implementations with prescribed connectivities | Abrosimov M. B., Terebin B.A. | 78 |
13 | 2020 | Cryptographic properties of some vectorial boolean functions compositions | Lipatova E. S. | 77 |
13 | 2020 | Cryptographic properties of orthomorphic permutations | Maksimluk J. P. | 76 |
13 | 2020 | Constructions of non-endomorphic perfect ciphers | Titov S. S., Medvedeva N. V. | 75 |
13 | 2020 | On the decomposition of a vectorial boolean function into a composition of two functions | Pintus G. M. | 74 |
13 | 2020 | Connections between quaternary and component boolean bent functions | Shaporenko A. S. | 74 |
13 | 2020 | Geometric condition of formal grammars solvability | Kolbasina I.V., Egorushkin O.I., Safonov K. V. | 72 |
13 | 2020 | Coding information by walsh matrices | Bespalov M. S., Malkova K. M. | 71 |
14 | 2021 | To the task of description minimal by inclusion perfect ciphers | Titov S. S., Medvedeva N. V. | 57 |
15 | 2022 | Comparison of methods for modeling access control in os and dbms in Event-B for the purpose of their verification with Rodin and ProB tools | Leonova Maria A., Devyanin Petr N. | 44 |
14 | 2021 | S-blocks with maximum component algebraic immunity on a small number of variables | Zyubina D.A., Tokareva N.N. | 35 |
14 | 2021 | On privacy in decentralized systems with tokens | Babueva A. A., Kyazhin S. N., Akhmetzyanova L. R., Popov V. A. | 31 |
14 | 2021 | Schemes for constructing minimal vertex 1-extensions of complete bicolored graphs | Abrosimov M. B., Razumovsky P. V. | 31 |
14 | 2021 | On derivatives of boolean bent functions | Shaporenko A.S. | 30 |
14 | 2021 | Development and analysis of oracle for the hibrid attack on a cryptographic system NTRU using a quantum search algorithm | Bakharev A. O. | 30 |
14 | 2021 | Experimental study of the characteristics of one method of integrity checking of large volume data storage | Bobrovskiy D. A., Nabiev T. R., Zadorozhny D. I., Fomichev V. M., Koreneva A. M. | 30 |