Issues

IssueYearTitleAuthorsDownloads
142021Central limit theorem for u-statistics of tuples of vertex labels on a complete graphMikhailov V. G., Mezhennaya N. M.29
142021Development and analysis of oracle for the hibrid attack on a cryptographic system NTRU using a quantum search algorithmBakharev A. O.29
142021Cryptanalytic invertibility of two-argument functionsPankratova I. A., Berdnikova N. Yu.29
142021An improvement of cryptographic schemes based on the conjugacy search problemRoman'kov V. A.29
142021About methods of developing consistent description of the mrosl dp-model for os and dbms for its verification with Rodin and ProB TOOLSDevyanin P.N., Leonova M.A.29
142021Control flow flattening deobfuscation using symbolic executionLebedev V. V.29
142021On the way of constructing differentially 25-uniform permutations over F22mFomin D.B.28
142021Algebraic cryptanalysis of round-reduced lightweight ciphers simon and SpeckMaro E. A., Atutova N. D., Filippov S. D., Zyubina D. A., Kutsenko A. V.28
142021Application of x86 extensions for code protectionKoryakin I. A., Lebedev R. K.28
142021On the largest order of substitutions of a given degreeFomichev V. M.27
142021XS-circuits: hiding round oraclesAgievich S. V.27
142021On the padding algorithm of large-sized blocks in integrity control systemsFomichev V. M., Nabiev T. R., Bobrovskiy D. A.27
142021WireGuard protocol with gost cipher suitesKhalniyazova Y.R., Kolegov D. N.27
142021Zk-snark-based data privacy methodKondyrev D. O.27
142021On a solution of polynomial grammars and the general algebraic equationEgorushkin O. I., Kolbasina I. V., Safonov K. V.27
142021On a heuristic approach to constructing bijective vector boolean functions with given cryptographic propertiesFomin D.B., Kovrizhnykh M. A.27
142021DPLL-like satisfiability problem solver over the system of anf equationsTkachev A.V., Kalgin K. V.27
152022XS-cir-cuits' properties related to the guaranteed number of activationsParfenov Denis R., Kutsenko Alexandr V., Atutova Natalia D., Bakharev Alexandr O., Belov Alexandr R.27
142021On some properties of self-dual generalized bent functionsKutsenko A. V.26
142021Improved estimates for the number of (n, m, k)-resilient and correlation-immune boolean mappingsPankov K. N.26
142021A conditions for uniqueness reresentation of p-Logic function into disjunctive product of functionsCheremushkin A. V.26
142021Threshold diffie - hellman protocolKhalniyazova Y.R., Kolegov D.N.26
142021On ARX-like ciphers based on different codings of 2-groups with a cyclic subgroup of index 2Pudovkina M. A., Pogorelov B. A.26
142021Generating additional constraints in algebraic cryptanalysis using sat oraclesGribanova I. A., Antonov K. V., Semenov A. A.26
142021Extended grammar-based fuzzing algorithm for javascript enginesNedyak M. S.26
142021On generic complexity of the isomorphism problem for finite semigroupsRybalov A. N.26
142021Some subgroups of the burnside groupKuznetsova A. S., Kuznetsov A. A.26
152022Invariant subspaces of functions affine equivalent to the finite field inversionKolomeec Nikolay A., Bykov Denis A.26
142021Hybrid approach to the search for boolean functions with high algebraic immunity based on heuristicsAtutova N. D.25
142021On properties of additive differential probabilities of XORAhtyamov D. A., Titova K. M., Mouha N., Zhantulikov B. F., Panferov M. A., Tokareva N. N., Sutormin I. A., Bonich T. A., Ishchukova E. A., Kolomeec N. A.25
142021Extension and analysis of information hiding method deep steganographyNikolaev A. A.25
142021Adaptation of the rosenblatt - parzen method for the experimental evaluation of the computing system reliabilityNikulin V. S.25
142021Bases over the field GF(2) generated by the schur - hadamard operationTitov S.S., Geut K.L.25
142021On decomposability of schur - hadamard product of the tensor products sum of reed - muller codesKosolapov Yu. V., Lelyuk E. A.25
142021Regular vertex 1-extension for 2-di-mension meshesAbrosimov M. B., Lobov A.A.25
142021Towards the security of McEliece's cryptosystem based on Hermitian subfield subcodesEl Khalfaoui S., Nagy G. P.25
152022The finite dynamic system of all possible orientations of a given graph with all accessible states and with inaccesible statesZharkova Anastasia V.25
142021Post-quantum lattice-based E-voting for multiple candidatesNabokov D.A.24
142021Choosing parameters for one IND-CCA2 secure McEliece modification in the standard modelTurchenko O. Y., Kosolapov Y. V.24
142021On attractors in one discrete binary dynamic system with bipartite dependency graphZharkova A.V., Panteleev R.I.24
152022Development and comparison of quantum oracle models for the hybrid attack on post-quantum lattice-based cryptosystemsBakharev Alexandr O.22
152022Backdoors in combinatorial problems and their probabilistic generalizationsSemenov Alexandr A.22
152022A series of formulas for bhat-tacharya parameters in the theory of polar codesLeontiev Vladimir M., Kolesnikov Sergey G.22
152022Asymptotic normality of number of multiple coincidences of chains in complete q-ary trees and forests with randomly marked verticesKruglov Vasiliy I., Mikhailov Vladimir A.21
152022On a set of impossible differences of feistel ciphers with a non-bijective transform of a round functionZakharov Dmitry A., Pudovkina Marina A.21
152022Calculation of the differential probabilities for the sum of k numbers modulo 2n.Mokrousov Anton S.21
152022The difference relations and impossible differentials construction for the KB-256 algorithmKurochkin Alexey V., Fomichev Vladimir M., Chukno Andrey B.20
152022Application of heuristic methods to search for boolean functions with good cryptographic characteristicsAtutova Natalia D.19
152022Lower bound for the number of bent functions at the minimum distance from Majorana - McFarland bent functionsBykov Denis A.18
152022Correlation-immune functions with optimal algebraic immunityKhilchuk Irina S., Tokareva Natalia N., Zyubina Daria A.18
Страница 15 из 16 1...111213141516
Всего: 763