Issues

IssueYearTitleAuthorsDownloads
72014An algorithm for generating a pair of special primesRybakov A. S., Zhukov K.D.332
82015Implementation of a neural WTA-network on the memristor crossbarTarkov M. S.331
12009Wireless lan security analysis in TomskTsoy M. I.330
12009Protocol verification toolsCheremushkin A. V.329
12009Representation of an arbitrary number with weight sum of essential subtreesLihina S. A., Butorina N.B.329
72014Algorithm for constructing the system of representatives of maximal length cycles of polynomial substitution over the galois ringErmilov D. M.329
62013Digit-injective transformations of a module over a Galois ringAbornev A. V.328
72014Every cubic Boolean function in 8 variables is the sum of not more than 4 bent functionsTokareva N. N.328
72014The sperner property for polygonal graphsSalii V. N.328
62013FPGA implementation of fapkc symmetric equivalentKovalev D. S.326
72014Estimation for an output symbol multiplicity in invertible automataKaterinskiy D. A.326
72014Content protection with bitstream watermarking at decryption stageAnjin V.A.325
82015Addition modulo 2 in block ciphersKarondeev A.M.325
32010Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key informationChaikin T.A., Zolotukhin V. U324
72014Cryptanalysis of a diffie - hellman's scheme analogue using conjugation and exponentiation on matrix platformRoman'kov V.A.324
52012On indices in dynamic system of binary vectors associated with cycles orientationsZharkova A. V.323
72014Algorithm for constructing T-irreducible extension of polygonal digraphsGavrikov A. V.322
72014ZAkrevskij's cipher FPGA implementation based on the formula-defined reconfigurable FSMKovalev D. S., Trenkaev V.N.322
62013Equivalence of primitive setsFomichev V. M.321
62013Cryptographic extension of Russian programming languagePankratova I. A., Lipsky V. B., Agibalov G.P.320
72014Hall's polynomials for finite two-generator groups of exponent sevenSafonov K. V., Kuznetsov A. A.320
12009The explicit form of information characteristic for partially defined dataSholomov L. A.319
62013An affine property of boolean functions on subspaces and their shiftsKolomeec N. A.318
12009Algorithms for the graph isomorphism problem based on graph deregularisationProlubnikov A. V., Shirokov I. V.317
52012About distributed database management system based on MariaDB serverTrenkaev V. N., Ovsyannikov S. V., Glotov I. N.317
72014On estimations for exponents of digraphs using frobenius's numbersFomichev V. M.317
82015Public-key cryptosystem based on fully homomorphic encryptionChechulina D.K., Egorova V. V.317
12009Some properties of graph edge clique coveringsRoldugm P. V., Badeha I. A316
32010he search of tg-paths and islands for Take-Grant security modelBrechka D.M.316
72014Using digital certificates for authorization by proxy in os LinuxRyzhkov V. I.316
102017Implementation of a non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-modelDevyanin P. N.315
72014Research of differentiable modulo p functionsIvachev A. S.314
52012The implementation of the parallel orthogonalization algorithms in the shortest integer lattices basis problemUsatyuk V.S.313
72014Probabilistic characteristics of weight spectra of random linear subcodes over GF(p)Zubkov A.M., Kruglov V.I.312
72014Compound poisson approximation for the distribution of the number of monotone tuples in random sequenceMinakov A. A.311
32010Symmetric cipher on the base of non-commutative algebra of polynomialsShirokov I. V.310
42011Constructing of one-way functions based on undecidability of the endomorphism problem in groupsRomankov V.A., Erofeev S. Y310
42011The development feutures of network access control DP-modelKolegov D. N.310
72014Heuristics for design of reliable telecommunication networkShangin R. E.310
42011About phrase-structure grammar propertyKalugin-Balashov D. A., Safonov K. V.309
52012Linear complexity of generalized cyclotomic sequences with period 2pEdemskiy V.A., Antonova O. V.309
52012Delphi object files analysis using specification of machine commands semanticsMikhailov A. A.309
12009Path delay fault test design for circuits obtained by covering ROBDDS with clbsMatrosova A. Yu., Nikolaeva E.A.308
52012About the numbers of the injective and of the super-increasing vectors and some particularities of the strong modular multiplicationMurin D. M.308
52012On combinatorial properties of the group generated by XL-layersPudovkina M. A., Pogorelov B. A.308
12009Mathematical and software tools for programs obfuscationRadchenko E. D., Pozdeev A. G, Romashkin E. V., Krivopalov V. N.307
52012Decomposition of a boolean function into sum of bent functionsTokareva N. N.307
52012FPGA implementation of FAPKC-4Kovalev D. S.307
72014The equivalent problem of testing fermat primesTitov S. S., Geut Kr. L307
72014Method to provide safety for customer of application's storeTolyupa E. A.307
Страница 2 из 16 123456...16
Всего: 763