Issues

IssueYearTitleAuthorsDownloads
72014An algorithm for generating a pair of special primesRybakov A. S., Zhukov K.D.331
82015Implementation of a neural WTA-network on the memristor crossbarTarkov M. S.330
12009Wireless lan security analysis in TomskTsoy M. I.329
12009Protocol verification toolsCheremushkin A. V.328
12009Representation of an arbitrary number with weight sum of essential subtreesLihina S. A., Butorina N.B.328
72014Algorithm for constructing the system of representatives of maximal length cycles of polynomial substitution over the galois ringErmilov D. M.328
62013Digit-injective transformations of a module over a Galois ringAbornev A. V.327
72014Every cubic Boolean function in 8 variables is the sum of not more than 4 bent functionsTokareva N. N.327
72014The sperner property for polygonal graphsSalii V. N.327
62013FPGA implementation of fapkc symmetric equivalentKovalev D. S.325
72014Estimation for an output symbol multiplicity in invertible automataKaterinskiy D. A.325
72014Cryptanalysis of a diffie - hellman's scheme analogue using conjugation and exponentiation on matrix platformRoman'kov V.A.324
72014Content protection with bitstream watermarking at decryption stageAnjin V.A.324
82015Addition modulo 2 in block ciphersKarondeev A.M.324
32010Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key informationChaikin T.A., Zolotukhin V. U322
52012On indices in dynamic system of binary vectors associated with cycles orientationsZharkova A. V.322
72014Algorithm for constructing T-irreducible extension of polygonal digraphsGavrikov A. V.321
72014ZAkrevskij's cipher FPGA implementation based on the formula-defined reconfigurable FSMKovalev D. S., Trenkaev V.N.321
62013Equivalence of primitive setsFomichev V. M.320
12009The explicit form of information characteristic for partially defined dataSholomov L. A.319
62013Cryptographic extension of Russian programming languagePankratova I. A., Lipsky V. B., Agibalov G.P.319
72014Hall's polynomials for finite two-generator groups of exponent sevenSafonov K. V., Kuznetsov A. A.319
62013An affine property of boolean functions on subspaces and their shiftsKolomeec N. A.317
72014On estimations for exponents of digraphs using frobenius's numbersFomichev V. M.317
12009Algorithms for the graph isomorphism problem based on graph deregularisationProlubnikov A. V., Shirokov I. V.316
52012About distributed database management system based on MariaDB serverTrenkaev V. N., Ovsyannikov S. V., Glotov I. N.316
72014Using digital certificates for authorization by proxy in os LinuxRyzhkov V. I.316
82015Public-key cryptosystem based on fully homomorphic encryptionChechulina D.K., Egorova V. V.316
12009Some properties of graph edge clique coveringsRoldugm P. V., Badeha I. A315
32010he search of tg-paths and islands for Take-Grant security modelBrechka D.M.315
72014Research of differentiable modulo p functionsIvachev A. S.313
52012The implementation of the parallel orthogonalization algorithms in the shortest integer lattices basis problemUsatyuk V.S.312
102017Implementation of a non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-modelDevyanin P. N.312
72014Probabilistic characteristics of weight spectra of random linear subcodes over GF(p)Zubkov A.M., Kruglov V.I.311
72014Compound poisson approximation for the distribution of the number of monotone tuples in random sequenceMinakov A. A.310
32010Symmetric cipher on the base of non-commutative algebra of polynomialsShirokov I. V.309
42011Constructing of one-way functions based on undecidability of the endomorphism problem in groupsRomankov V.A., Erofeev S. Y309
42011The development feutures of network access control DP-modelKolegov D. N.309
72014Heuristics for design of reliable telecommunication networkShangin R. E.309
42011About phrase-structure grammar propertyKalugin-Balashov D. A., Safonov K. V.308
52012Linear complexity of generalized cyclotomic sequences with period 2pEdemskiy V.A., Antonova O. V.308
52012Delphi object files analysis using specification of machine commands semanticsMikhailov A. A.308
12009Path delay fault test design for circuits obtained by covering ROBDDS with clbsMatrosova A. Yu., Nikolaeva E.A.307
52012About the numbers of the injective and of the super-increasing vectors and some particularities of the strong modular multiplicationMurin D. M.307
52012On combinatorial properties of the group generated by XL-layersPudovkina M. A., Pogorelov B. A.307
12009Mathematical and software tools for programs obfuscationRadchenko E. D., Pozdeev A. G, Romashkin E. V., Krivopalov V. N.306
52012FPGA implementation of FAPKC-4Kovalev D. S.306
72014The equivalent problem of testing fermat primesTitov S. S., Geut Kr. L306
72014Security conditions for information flows by memory within the mrosl DP-modelDevyanin P. N.306
72014Method to provide safety for customer of application's storeTolyupa E. A.306
Страница 2 из 16 123456...16
Всего: 763