Issues

IssueYearTitleAuthorsDownloads
132020An algorithm for computing the Stickelberger elements for imaginary multiquadratic fieldsKirshanova E. A., Novoselov S. A., Olefirenko D. O., Malygina E. S.110
122019Mixing properties for some classes of permutations on f£Karpova L.A., Pankratova I. A.109
132020Efficient S-repetition method for constructing an IND-CCA2 secure McEliece modification in the standard modelTurchenko O. Y., Kosolapov Y. V.109
122019About the cubic part of the algebraic normal form of arbitrary bent functionsKuzmina T. A.108
122019On the recognition problem for algebraic threshold functionsMelnikov S. L., Jenevsky S. V., Shurupov A.N.108
132020A Compact translator of algorithms into boolean formulas for use in cryptanalysisKalgin K.V., Sofronova D.A.107
122019A method for constructing permutations, involutions and orthomorphisms with strong cryptographic propertiesDe la Cruz Jimenez R. A.105
122019Nonlinearity characteristics estimations for function compositions over vector spaces by the matrix-graph approachSapegina M. D.100
132020On metrical properties of the set of self-dual bent functionsKutsenko A. V.99
132020Construction of distinguishers for iterative block ciphers on the base of neural networksPerov A. A., Pestunov A. I.99
132020Post-quantum signature proposal for standardisationNovoselov S. A., Kirshanova E. A., Malygina E. S., Kolesnikov N. S.97
132020Method for hiding private data in the block-chain tender systemKondyrev D. O.96
132020On a secondary construction of quadratic APN functionsIdrisova V. A., Kalgin K. V.95
132020Construction of cryptographic boolean functions using SAT-solversKalgin K. V., Doronin A. E.94
132020Application of sat oracles for generation of additional linear constraints in cryptanalysis of some lightweight ciphersSemenov A. A., Antonov K. V.93
132020Computation of rewriting systems in finite groupsKuznetsov A. A.93
132020About the hidden compact way to store dataRoman'kov V. A.89
132020Validation-free offchain transactions with unlinkable double spend detectionKlimenko K. A., Kyazhin S. N.89
132020An algorithm for solving the extended parsing problemSafonov K. V., Kishkan V. V.89
132020Elaboration of selfish-mine strategyCheremushkin A. V.87
132020One approach to constructing a multiply transitive class of block transformationsCherednik I. V.86
152022Methods for deductive verification of c code using AstraVer ToolsetKokorin Artem O., Devyanin Petr N., Tievskiy Stanislav D.85
132020Refractive bijections in Steiner triplesIgnatova A., Geut K., Titov S., Vedunova M.84
132020Characteristics of the data integrity check algorithm based on additive generators and s-boxesNabiev T.R., Koreneva A.M., Fomichev V.M.84
132020Analysis of block cipher modes of operation for rfid devicesTsaregorodtsev K. D.84
132020On generic complexity of the problem to represent natural numbers by sum of two squaresRybalov A.N.84
132020On differentials for the modification of the cipher Simon based on the Lai - Messi schemeTokareva N.N., Belousova A. A.84
132020Experimental estimates of the computational complexity of one class of cryp-toalgorithms based on the generalization of feistel networksKoreneva A.M., Bobrovskiy D.A., Fomichev V.M.83
132020Neural network obfuscation for computations over encrypted dataEliseev V. L.83
132020Using inverse backdoors sets to construct guess-and-determine attacks on hash-functions md4Gribanova I. A., Semenov A. A.83
132020On the continuation to bent functions and upper bounds on their numberAgievich S. V.80
132020On the number of unsuitable Boolean functions in constructions of filter and combining models of stream ciphersPanferov M. A., Bonich T. A., Tokareva N. N.79
132020On homogeneous matroids corresponding to block-schemesMedvedev N. V., Titov S. S.78
132020New estimates for dimension of Reed - Muller subcodes with maximum Hadamard squareVysotskaya V. V.78
132020On the optimality of graph implementations with prescribed connectivitiesAbrosimov M. B., Terebin B.A.78
132020Cryptographic properties of some vectorial boolean functions compositionsLipatova E. S.77
132020Cryptographic properties of orthomorphic permutationsMaksimluk J. P.76
132020Constructions of non-endomorphic perfect ciphersTitov S. S., Medvedeva N. V.75
132020On the decomposition of a vectorial boolean function into a composition of two functionsPintus G. M.74
132020Connections between quaternary and component boolean bent functionsShaporenko A. S.74
132020Geometric condition of formal grammars solvabilityKolbasina I.V., Egorushkin O.I., Safonov K. V.72
132020Coding information by walsh matricesBespalov M. S., Malkova K. M.71
142021To the task of description minimal by inclusion perfect ciphersTitov S. S., Medvedeva N. V.57
152022Comparison of methods for modeling access control in os and dbms in Event-B for the purpose of their verification with Rodin and ProB toolsLeonova Maria A., Devyanin Petr N.44
142021S-blocks with maximum component algebraic immunity on a small number of variablesZyubina D.A., Tokareva N.N.35
142021On privacy in decentralized systems with tokensBabueva A. A., Kyazhin S. N., Akhmetzyanova L. R., Popov V. A.31
142021Schemes for constructing minimal vertex 1-extensions of complete bicolored graphsAbrosimov M. B., Razumovsky P. V.31
142021On derivatives of boolean bent functionsShaporenko A.S.30
142021Development and analysis of oracle for the hibrid attack on a cryptographic system NTRU using a quantum search algorithmBakharev A. O.30
142021Experimental study of the characteristics of one method of integrity checking of large volume data storageBobrovskiy D. A., Nabiev T. R., Zadorozhny D. I., Fomichev V. M., Koreneva A. M.30
Страница 14 из 16 1...111213141516
Всего: 763