7 | 2014 | An algorithm for generating a pair of special primes | Rybakov A. S., Zhukov K.D. | 331 |
8 | 2015 | Implementation of a neural WTA-network on the memristor crossbar | Tarkov M. S. | 330 |
1 | 2009 | Wireless lan security analysis in Tomsk | Tsoy M. I. | 329 |
1 | 2009 | Protocol verification tools | Cheremushkin A. V. | 328 |
1 | 2009 | Representation of an arbitrary number with weight sum of essential subtrees | Lihina S. A., Butorina N.B. | 328 |
7 | 2014 | Algorithm for constructing the system of representatives of maximal length cycles of polynomial substitution over the galois ring | Ermilov D. M. | 328 |
6 | 2013 | Digit-injective transformations of a module over a Galois ring | Abornev A. V. | 327 |
7 | 2014 | Every cubic Boolean function in 8 variables is the sum of not more than 4 bent functions | Tokareva N. N. | 327 |
7 | 2014 | The sperner property for polygonal graphs | Salii V. N. | 327 |
6 | 2013 | FPGA implementation of fapkc symmetric equivalent | Kovalev D. S. | 325 |
7 | 2014 | Estimation for an output symbol multiplicity in invertible automata | Katerinskiy D. A. | 325 |
7 | 2014 | Cryptanalysis of a diffie - hellman's scheme analogue using conjugation and exponentiation on matrix platform | Roman'kov V.A. | 324 |
7 | 2014 | Content protection with bitstream watermarking at decryption stage | Anjin V.A. | 324 |
8 | 2015 | Addition modulo 2 in block ciphers | Karondeev A.M. | 324 |
3 | 2010 | Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key information | Chaikin T.A., Zolotukhin V. U | 322 |
5 | 2012 | On indices in dynamic system of binary vectors associated with cycles orientations | Zharkova A. V. | 322 |
7 | 2014 | Algorithm for constructing T-irreducible extension of polygonal digraphs | Gavrikov A. V. | 321 |
7 | 2014 | ZAkrevskij's cipher FPGA implementation based on the formula-defined reconfigurable FSM | Kovalev D. S., Trenkaev V.N. | 321 |
6 | 2013 | Equivalence of primitive sets | Fomichev V. M. | 320 |
1 | 2009 | The explicit form of information characteristic for partially defined data | Sholomov L. A. | 319 |
6 | 2013 | Cryptographic extension of Russian programming language | Pankratova I. A., Lipsky V. B., Agibalov G.P. | 319 |
7 | 2014 | Hall's polynomials for finite two-generator groups of exponent seven | Safonov K. V., Kuznetsov A. A. | 319 |
6 | 2013 | An affine property of boolean functions on subspaces and their shifts | Kolomeec N. A. | 317 |
7 | 2014 | On estimations for exponents of digraphs using frobenius's numbers | Fomichev V. M. | 317 |
1 | 2009 | Algorithms for the graph isomorphism problem based on graph deregularisation | Prolubnikov A. V., Shirokov I. V. | 316 |
5 | 2012 | About distributed database management system based on MariaDB server | Trenkaev V. N., Ovsyannikov S. V., Glotov I. N. | 316 |
7 | 2014 | Using digital certificates for authorization by proxy in os Linux | Ryzhkov V. I. | 316 |
8 | 2015 | Public-key cryptosystem based on fully homomorphic encryption | Chechulina D.K., Egorova V. V. | 316 |
1 | 2009 | Some properties of graph edge clique coverings | Roldugm P. V., Badeha I. A | 315 |
3 | 2010 | he search of tg-paths and islands for Take-Grant security model | Brechka D.M. | 315 |
7 | 2014 | Research of differentiable modulo p
functions | Ivachev A. S. | 313 |
5 | 2012 | The implementation of the parallel orthogonalization algorithms in the shortest integer lattices basis problem | Usatyuk V.S. | 312 |
10 | 2017 | Implementation of a non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-model | Devyanin P. N. | 312 |
7 | 2014 | Probabilistic characteristics of weight spectra of random linear subcodes over GF(p) | Zubkov A.M., Kruglov V.I. | 311 |
7 | 2014 | Compound poisson approximation for the distribution of the number of monotone tuples in random sequence | Minakov A. A. | 310 |
3 | 2010 | Symmetric cipher on the base of non-commutative algebra of polynomials | Shirokov I. V. | 309 |
4 | 2011 | Constructing of one-way functions based on undecidability of the endomorphism problem in groups | Romankov V.A., Erofeev S. Y | 309 |
4 | 2011 | The development feutures of network access control DP-model | Kolegov D. N. | 309 |
7 | 2014 | Heuristics for design of reliable telecommunication network | Shangin R. E. | 309 |
4 | 2011 | About phrase-structure grammar property | Kalugin-Balashov D. A., Safonov K. V. | 308 |
5 | 2012 | Linear complexity of generalized cyclotomic sequences with period 2p | Edemskiy V.A., Antonova O. V. | 308 |
5 | 2012 | Delphi object files analysis using specification of machine commands semantics | Mikhailov A. A. | 308 |
1 | 2009 | Path delay fault test design for circuits obtained by covering ROBDDS with clbs | Matrosova A. Yu., Nikolaeva E.A. | 307 |
5 | 2012 | About the numbers of the injective and of the super-increasing vectors and some particularities of the strong modular multiplication | Murin D. M. | 307 |
5 | 2012 | On combinatorial properties of the group generated by XL-layers | Pudovkina M. A., Pogorelov B. A. | 307 |
1 | 2009 | Mathematical and software tools for programs obfuscation | Radchenko E. D., Pozdeev A. G, Romashkin E. V., Krivopalov V. N. | 306 |
5 | 2012 | FPGA implementation of FAPKC-4 | Kovalev D. S. | 306 |
7 | 2014 | The equivalent problem of testing fermat primes | Titov S. S., Geut Kr. L | 306 |
7 | 2014 | Security conditions for information flows by memory within the mrosl DP-model | Devyanin P. N. | 306 |
7 | 2014 | Method to provide safety for customer of application's store | Tolyupa E. A. | 306 |