14 | 2021 | Central limit theorem for u-statistics of tuples of vertex labels on a complete graph | Mikhailov V. G., Mezhennaya N. M. | 29 |
14 | 2021 | Development and analysis of oracle for the hibrid attack on a cryptographic system NTRU using a quantum search algorithm | Bakharev A. O. | 29 |
14 | 2021 | Cryptanalytic invertibility of two-argument functions | Pankratova I. A., Berdnikova N. Yu. | 29 |
14 | 2021 | An improvement of cryptographic schemes based on the conjugacy search problem | Roman'kov V. A. | 29 |
14 | 2021 | About methods of developing consistent description of the mrosl dp-model for os and dbms for its verification with Rodin and ProB TOOLS | Devyanin P.N., Leonova M.A. | 29 |
14 | 2021 | Control flow flattening deobfuscation using symbolic execution | Lebedev V. V. | 29 |
14 | 2021 | On the way of constructing differentially 25-uniform permutations over F22m | Fomin D.B. | 28 |
14 | 2021 | Algebraic cryptanalysis of round-reduced lightweight ciphers simon and Speck | Maro E. A., Atutova N. D., Filippov S. D., Zyubina D. A., Kutsenko A. V. | 28 |
14 | 2021 | Application of x86 extensions for code protection | Koryakin I. A., Lebedev R. K. | 28 |
14 | 2021 | On the largest order of substitutions of a given degree | Fomichev V. M. | 27 |
14 | 2021 | XS-circuits: hiding round oracles | Agievich S. V. | 27 |
14 | 2021 | On the padding algorithm of large-sized blocks in integrity control systems | Fomichev V. M., Nabiev T. R., Bobrovskiy D. A. | 27 |
14 | 2021 | WireGuard protocol with gost cipher suites | Khalniyazova Y.R., Kolegov D. N. | 27 |
14 | 2021 | Zk-snark-based data privacy method | Kondyrev D. O. | 27 |
14 | 2021 | On a solution of polynomial grammars and the general algebraic equation | Egorushkin O. I., Kolbasina I. V., Safonov K. V. | 27 |
14 | 2021 | On a heuristic approach to constructing bijective vector boolean functions with given cryptographic properties | Fomin D.B., Kovrizhnykh M. A. | 27 |
14 | 2021 | DPLL-like satisfiability problem solver over the system of anf equations | Tkachev A.V., Kalgin K. V. | 27 |
15 | 2022 | XS-cir-cuits' properties related to the guaranteed number of activations | Parfenov Denis R., Kutsenko Alexandr V., Atutova Natalia D., Bakharev Alexandr O., Belov Alexandr R. | 27 |
14 | 2021 | On some properties of self-dual generalized bent functions | Kutsenko A. V. | 26 |
14 | 2021 | Improved estimates for the number of (n, m, k)-resilient and correlation-immune boolean mappings | Pankov K. N. | 26 |
14 | 2021 | A conditions for uniqueness reresentation of p-Logic function into disjunctive product of functions | Cheremushkin A. V. | 26 |
14 | 2021 | Threshold diffie - hellman protocol | Khalniyazova Y.R., Kolegov D.N. | 26 |
14 | 2021 | On ARX-like ciphers based on different codings of 2-groups with a cyclic subgroup of index 2 | Pudovkina M. A., Pogorelov B. A. | 26 |
14 | 2021 | Generating additional constraints in algebraic cryptanalysis using sat oracles | Gribanova I. A., Antonov K. V., Semenov A. A. | 26 |
14 | 2021 | Extended grammar-based fuzzing algorithm for javascript engines | Nedyak M. S. | 26 |
14 | 2021 | On generic complexity of the isomorphism problem for finite semigroups | Rybalov A. N. | 26 |
14 | 2021 | Some subgroups of the burnside group | Kuznetsova A. S., Kuznetsov A. A. | 26 |
15 | 2022 | Invariant subspaces of functions affine equivalent to the finite field inversion | Kolomeec Nikolay A., Bykov Denis A. | 26 |
14 | 2021 | Hybrid approach to the search for boolean functions with high algebraic immunity based on heuristics | Atutova N. D. | 25 |
14 | 2021 | On properties of additive differential probabilities of XOR | Ahtyamov D. A., Titova K. M., Mouha N., Zhantulikov B. F., Panferov M. A., Tokareva N. N., Sutormin I. A., Bonich T. A., Ishchukova E. A., Kolomeec N. A. | 25 |
14 | 2021 | Extension and analysis of information hiding method deep steganography | Nikolaev A. A. | 25 |
14 | 2021 | Adaptation of the rosenblatt - parzen method for the experimental evaluation of the computing system reliability | Nikulin V. S. | 25 |
14 | 2021 | Bases over the field GF(2) generated by the schur - hadamard operation | Titov S.S., Geut K.L. | 25 |
14 | 2021 | On decomposability of schur - hadamard product of the tensor products sum of reed - muller codes | Kosolapov Yu. V., Lelyuk E. A. | 25 |
14 | 2021 | Regular vertex 1-extension for 2-di-mension meshes | Abrosimov M. B., Lobov A.A. | 25 |
14 | 2021 | Towards the security of McEliece's cryptosystem based on Hermitian subfield subcodes | El Khalfaoui S., Nagy G. P. | 25 |
15 | 2022 | The finite dynamic system of all possible orientations of a given graph with all accessible states and with inaccesible states | Zharkova Anastasia V. | 25 |
14 | 2021 | Post-quantum lattice-based E-voting for multiple candidates | Nabokov D.A. | 24 |
14 | 2021 | Choosing parameters for one IND-CCA2 secure McEliece modification in the standard model | Turchenko O. Y., Kosolapov Y. V. | 24 |
14 | 2021 | On attractors in one discrete binary dynamic system with bipartite dependency graph | Zharkova A.V., Panteleev R.I. | 24 |
15 | 2022 | Development and comparison of quantum oracle models for the hybrid attack on post-quantum lattice-based cryptosystems | Bakharev Alexandr O. | 22 |
15 | 2022 | Backdoors in combinatorial problems and their probabilistic generalizations | Semenov Alexandr A. | 22 |
15 | 2022 | A series of formulas for bhat-tacharya parameters in the theory of polar codes | Leontiev Vladimir M., Kolesnikov Sergey G. | 22 |
15 | 2022 | Asymptotic normality of number of multiple coincidences of chains in complete q-ary trees and forests with randomly marked vertices | Kruglov Vasiliy I., Mikhailov Vladimir A. | 21 |
15 | 2022 | On a set of impossible differences of feistel ciphers with a non-bijective transform of a round function | Zakharov Dmitry A., Pudovkina Marina A. | 21 |
15 | 2022 | Calculation of the differential probabilities for the sum of k numbers modulo 2n. | Mokrousov Anton S. | 21 |
15 | 2022 | The difference relations and impossible differentials construction for the KB-256 algorithm | Kurochkin Alexey V., Fomichev Vladimir M., Chukno Andrey B. | 20 |
15 | 2022 | Application of heuristic methods to search for boolean functions with good cryptographic characteristics | Atutova Natalia D. | 19 |
15 | 2022 | Lower bound for the number of bent functions at the minimum distance from Majorana - McFarland bent functions | Bykov Denis A. | 18 |
15 | 2022 | Correlation-immune functions with optimal algebraic immunity | Khilchuk Irina S., Tokareva Natalia N., Zyubina Daria A. | 18 |