Issues

IssueYearTitleAuthorsDownloads
72014An algorithm for generating a pair of special primesRybakov A. S., Zhukov K.D.336
82015Implementation of a neural WTA-network on the memristor crossbarTarkov M. S.335
12009Wireless lan security analysis in TomskTsoy M. I.334
72014Algorithm for constructing the system of representatives of maximal length cycles of polynomial substitution over the galois ringErmilov D. M.333
12009Representation of an arbitrary number with weight sum of essential subtreesLihina S. A., Butorina N.B.332
62013Digit-injective transformations of a module over a Galois ringAbornev A. V.332
72014Every cubic Boolean function in 8 variables is the sum of not more than 4 bent functionsTokareva N. N.332
12009Protocol verification toolsCheremushkin A. V.331
72014The sperner property for polygonal graphsSalii V. N.331
62013FPGA implementation of fapkc symmetric equivalentKovalev D. S.330
72014Estimation for an output symbol multiplicity in invertible automataKaterinskiy D. A.330
72014Cryptanalysis of a diffie - hellman's scheme analogue using conjugation and exponentiation on matrix platformRoman'kov V.A.329
72014Content protection with bitstream watermarking at decryption stageAnjin V.A.329
82015Addition modulo 2 in block ciphersKarondeev A.M.329
32010Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key informationZolotukhin V. U, Chaikin T.A.328
52012On indices in dynamic system of binary vectors associated with cycles orientationsZharkova A. V.327
72014Algorithm for constructing T-irreducible extension of polygonal digraphsGavrikov A. V.326
72014ZAkrevskij's cipher FPGA implementation based on the formula-defined reconfigurable FSMTrenkaev V.N., Kovalev D. S.326
62013Equivalence of primitive setsFomichev V. M.325
62013Cryptographic extension of Russian programming languageAgibalov G.P., Pankratova I. A., Lipsky V. B.325
102017Implementation of a non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-modelDevyanin P. N.325
12009The explicit form of information characteristic for partially defined dataSholomov L. A.322
62013An affine property of boolean functions on subspaces and their shiftsKolomeec N. A.322
72014Hall's polynomials for finite two-generator groups of exponent sevenKuznetsov A. A., Safonov K. V.322
12009Algorithms for the graph isomorphism problem based on graph deregularisationShirokov I. V., Prolubnikov A. V.321
32010he search of tg-paths and islands for Take-Grant security modelBrechka D.M.321
72014On estimations for exponents of digraphs using frobenius's numbersFomichev V. M.321
82015Public-key cryptosystem based on fully homomorphic encryptionChechulina D.K., Egorova V. V.321
12009Some properties of graph edge clique coveringsBadeha I. A, Roldugm P. V.320
52012About distributed database management system based on MariaDB serverGlotov I. N., Trenkaev V. N., Ovsyannikov S. V.320
72014Using digital certificates for authorization by proxy in os LinuxRyzhkov V. I.320
72014Research of differentiable modulo p functionsIvachev A. S.318
52012The implementation of the parallel orthogonalization algorithms in the shortest integer lattices basis problemUsatyuk V.S.317
72014Probabilistic characteristics of weight spectra of random linear subcodes over GF(p)Kruglov V.I., Zubkov A.M.317
72014Compound poisson approximation for the distribution of the number of monotone tuples in random sequenceMinakov A. A.315
32010Symmetric cipher on the base of non-commutative algebra of polynomialsShirokov I. V.314
42011Constructing of one-way functions based on undecidability of the endomorphism problem in groupsErofeev S. Y, Romankov V.A.314
42011The development feutures of network access control DP-modelKolegov D. N.314
72014Heuristics for design of reliable telecommunication networkShangin R. E.314
42011About phrase-structure grammar propertyKalugin-Balashov D. A., Safonov K. V.313
52012Linear complexity of generalized cyclotomic sequences with period 2pEdemskiy V.A., Antonova O. V.313
52012On combinatorial properties of the group generated by XL-layersPudovkina M. A., Pogorelov B. A.313
52012Delphi object files analysis using specification of machine commands semanticsMikhailov A. A.313
12009Path delay fault test design for circuits obtained by covering ROBDDS with clbsNikolaeva E.A., Matrosova A. Yu.312
52012About the numbers of the injective and of the super-increasing vectors and some particularities of the strong modular multiplicationMurin D. M.312
52012FPGA implementation of FAPKC-4Kovalev D. S.312
12009Mathematical and software tools for programs obfuscationRomashkin E. V., Krivopalov V. N., Pozdeev A. G, Radchenko E. D.311
52012Decomposition of a boolean function into sum of bent functionsTokareva N. N.311
72014The equivalent problem of testing fermat primesTitov S. S., Geut Kr. L311
12009Analysis of network safety with Markov 's chainsKirko I.N., Kuhnir V.P.310
Страница 2 из 16 123456...16
Всего: 763