| 7 | 2014 | An algorithm for generating a pair of special primes | Rybakov A. S., Zhukov K.D. | 336 |
| 8 | 2015 | Implementation of a neural WTA-network on the memristor crossbar | Tarkov M. S. | 335 |
| 1 | 2009 | Wireless lan security analysis in Tomsk | Tsoy M. I. | 334 |
| 7 | 2014 | Algorithm for constructing the system of representatives of maximal length cycles of polynomial substitution over the galois ring | Ermilov D. M. | 333 |
| 1 | 2009 | Representation of an arbitrary number with weight sum of essential subtrees | Lihina S. A., Butorina N.B. | 332 |
| 6 | 2013 | Digit-injective transformations of a module over a Galois ring | Abornev A. V. | 332 |
| 7 | 2014 | Every cubic Boolean function in 8 variables is the sum of not more than 4 bent functions | Tokareva N. N. | 332 |
| 1 | 2009 | Protocol verification tools | Cheremushkin A. V. | 331 |
| 7 | 2014 | The sperner property for polygonal graphs | Salii V. N. | 331 |
| 6 | 2013 | FPGA implementation of fapkc symmetric equivalent | Kovalev D. S. | 330 |
| 7 | 2014 | Estimation for an output symbol multiplicity in invertible automata | Katerinskiy D. A. | 330 |
| 7 | 2014 | Cryptanalysis of a diffie - hellman's scheme analogue using conjugation and exponentiation on matrix platform | Roman'kov V.A. | 329 |
| 7 | 2014 | Content protection with bitstream watermarking at decryption stage | Anjin V.A. | 329 |
| 8 | 2015 | Addition modulo 2 in block ciphers | Karondeev A.M. | 329 |
| 3 | 2010 | Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key information | Zolotukhin V. U, Chaikin T.A. | 328 |
| 5 | 2012 | On indices in dynamic system of binary vectors associated with cycles orientations | Zharkova A. V. | 327 |
| 7 | 2014 | Algorithm for constructing T-irreducible extension of polygonal digraphs | Gavrikov A. V. | 326 |
| 7 | 2014 | ZAkrevskij's cipher FPGA implementation based on the formula-defined reconfigurable FSM | Trenkaev V.N., Kovalev D. S. | 326 |
| 6 | 2013 | Equivalence of primitive sets | Fomichev V. M. | 325 |
| 6 | 2013 | Cryptographic extension of Russian programming language | Agibalov G.P., Pankratova I. A., Lipsky V. B. | 325 |
| 10 | 2017 | Implementation of a non-degenerate lattice of integrity levels within the hierarchical representation of MROSL DP-model | Devyanin P. N. | 325 |
| 1 | 2009 | The explicit form of information characteristic for partially defined data | Sholomov L. A. | 322 |
| 6 | 2013 | An affine property of boolean functions on subspaces and their shifts | Kolomeec N. A. | 322 |
| 7 | 2014 | Hall's polynomials for finite two-generator groups of exponent seven | Kuznetsov A. A., Safonov K. V. | 322 |
| 1 | 2009 | Algorithms for the graph isomorphism problem based on graph deregularisation | Shirokov I. V., Prolubnikov A. V. | 321 |
| 3 | 2010 | he search of tg-paths and islands for Take-Grant security model | Brechka D.M. | 321 |
| 7 | 2014 | On estimations for exponents of digraphs using frobenius's numbers | Fomichev V. M. | 321 |
| 8 | 2015 | Public-key cryptosystem based on fully homomorphic encryption | Chechulina D.K., Egorova V. V. | 321 |
| 1 | 2009 | Some properties of graph edge clique coverings | Badeha I. A, Roldugm P. V. | 320 |
| 5 | 2012 | About distributed database management system based on MariaDB server | Glotov I. N., Trenkaev V. N., Ovsyannikov S. V. | 320 |
| 7 | 2014 | Using digital certificates for authorization by proxy in os Linux | Ryzhkov V. I. | 320 |
| 7 | 2014 | Research of differentiable modulo p
functions | Ivachev A. S. | 318 |
| 5 | 2012 | The implementation of the parallel orthogonalization algorithms in the shortest integer lattices basis problem | Usatyuk V.S. | 317 |
| 7 | 2014 | Probabilistic characteristics of weight spectra of random linear subcodes over GF(p) | Kruglov V.I., Zubkov A.M. | 317 |
| 7 | 2014 | Compound poisson approximation for the distribution of the number of monotone tuples in random sequence | Minakov A. A. | 315 |
| 3 | 2010 | Symmetric cipher on the base of non-commutative algebra of polynomials | Shirokov I. V. | 314 |
| 4 | 2011 | Constructing of one-way functions based on undecidability of the endomorphism problem in groups | Erofeev S. Y, Romankov V.A. | 314 |
| 4 | 2011 | The development feutures of network access control DP-model | Kolegov D. N. | 314 |
| 7 | 2014 | Heuristics for design of reliable telecommunication network | Shangin R. E. | 314 |
| 4 | 2011 | About phrase-structure grammar property | Kalugin-Balashov D. A., Safonov K. V. | 313 |
| 5 | 2012 | Linear complexity of generalized cyclotomic sequences with period 2p | Edemskiy V.A., Antonova O. V. | 313 |
| 5 | 2012 | On combinatorial properties of the group generated by XL-layers | Pudovkina M. A., Pogorelov B. A. | 313 |
| 5 | 2012 | Delphi object files analysis using specification of machine commands semantics | Mikhailov A. A. | 313 |
| 1 | 2009 | Path delay fault test design for circuits obtained by covering ROBDDS with clbs | Nikolaeva E.A., Matrosova A. Yu. | 312 |
| 5 | 2012 | About the numbers of the injective and of the super-increasing vectors and some particularities of the strong modular multiplication | Murin D. M. | 312 |
| 5 | 2012 | FPGA implementation of FAPKC-4 | Kovalev D. S. | 312 |
| 1 | 2009 | Mathematical and software tools for programs obfuscation | Romashkin E. V., Krivopalov V. N., Pozdeev A. G, Radchenko E. D. | 311 |
| 5 | 2012 | Decomposition of a boolean function into sum of bent functions | Tokareva N. N. | 311 |
| 7 | 2014 | The equivalent problem of testing fermat primes | Titov S. S., Geut Kr. L | 311 |
| 1 | 2009 | Analysis of network safety with Markov 's chains | Kirko I.N., Kuhnir V.P. | 310 |