1 | 2009 | Analysis of network safety with Markov 's chains | Kirko I.N., Kuhnir V.P. | 306 |
7 | 2014 | On some open questions about apn functions | Vitkup V.A. | 306 |
7 | 2014 | Security conditions for information flows by memory within the mrosl DP-model | Devyanin P. N. | 306 |
7 | 2014 | Unreliability of circuits in the basis by Rosser - Turkett | Alekhina M.A., Barsukova O. U. | 306 |
1 | 2009 | Argument of knowledge of a Goppa codeword and of a bounded error | Fedyukovych V. E. | 305 |
3 | 2010 | Teaching the protected computer nets design at the Cisco platform | Kolegov D. N. | 305 |
3 | 2010 | Cryptanalysis with graphical processing units (GPU ) | Semenov A. A., Bulavintsev V. G, Bespalov D. V. | 305 |
6 | 2013 | Modification of compiled applications for the android platform by means of aspect-oriented programming | Stefantsov D. A., Potapkin A.I, Zaytsev G. Yu | 305 |
6 | 2013 | On local primitiveness of graphs and nonnega-tive matrices | Kyazhin S. N. | 305 |
4 | 2011 | The security model for cross-platform web services of municipal procurement support | Isaev S. V., Kononov D.D | 303 |
4 | 2011 | Minimal extensions for cycles with vertices of two types | Bondarenko P.P., Abrosimov M.B. | 303 |
7 | 2014 | Some properties of q-ary bent functions | Shishkin V. A. | 303 |
7 | 2014 | Boolean functions generated by the most significant bits of linear recurrent sequences | Bylkov D.N. | 303 |
7 | 2014 | The universal vulnerability exploitation platform for CTF | Sviridov P. Y., Ivachev A. S., Zaytsev G. Y. | 303 |
7 | 2014 | About basises with unreliability coefficient 5 | Vasin A. V. | 303 |
7 | 2014 | Formalization of combinatorial numbers in terms of entire solutions of systems of linear diophan-tine equations | Gotsulenko V. V. | 303 |
1 | 2009 | The method for secure video streaming over distributed networks | Shcherba E. V. | 302 |
6 | 2013 | Development of a DDoS-attack detection system using queuing theory | Volkov D.A., Shcherba E. V. | 302 |
6 | 2013 | Pipelining of combinational circuits | Kardash S.N., Pottosin Yu.V. | 302 |
1 | 2009 | Correct evaluation of alternatives weight coefficients in the method of analytical hierarchies | Kolesnikova S. I. | 301 |
3 | 2010 | Logical inference on the base of optimal subset of mixed diagnostic tests for intelligent systems | Yankovskaya A.E., Gedike A. I. | 301 |
5 | 2012 | Cryptographic properties of block ciphers based on shift registers | Fomichev V. M., Koreneva A.M. | 301 |
6 | 2013 | Parallelization of the decoding algorithm in video compression standard H.265/HEVC | Chernyak R. I. | 301 |
7 | 2014 | Sufficient conditions for local primitiveness of nonprimitive digraphs | Kyazhin S. N. | 301 |
1 | 2009 | Discrete logarithm problem in subgroups of prime order | Pankratova I. A. | 300 |
5 | 2012 | Estimates for the number of boolean functions having affine or quadratic approximations with a given accuracy | Serov A. A., Zubkov A.M. | 300 |
5 | 2012 | Problems of almost threshold secret sharing schemes | Medvedev N. V., Titov S. S. | 300 |
5 | 2012 | A parallel algorithm for searching the minimum weight spanning tree on prefractal graph | Sennikova L. I., Kochkarov A. A. | 300 |
7 | 2014 | The recognition of recurrent sequences generated by conservative functions | Sergeeva O. E. | 300 |
8 | 2015 | Implementation of DNS rebinding | Milovanov T. I. | 300 |
7 | 2014 | Reachability problem for continuous piece-wise-affine mappings of a circle having degree 2 | Kurganskyy O. M. | 299 |
7 | 2014 | Covert timing channel over HTTP cache-control headers | Broslavsky O.V., Kolegov D.N., Oleksov N. E. | 299 |
1 | 2009 | Solving parallel equations over w-regular languages | Bushkov V. G, Yevtushenko N. V. | 297 |
2 | 2009 | Review lection of security models of computer system | Devyanin P. N. | 297 |
3 | 2010 | High-speed pseudorandom sequence generators based on cellular automata | Sukhinin B.M. | 297 |
5 | 2012 | Statistical independence of the boolean function superposition. II | Pankratova I. A., Kolcheva O.L. | 296 |
6 | 2013 | On non-minimal perfect ciphers | Titov S. S., Medvedeva N. V. | 296 |
6 | 2013 | Algorithm for searching prohibitions of boolean functions | Ryabokon D. V. | 296 |
7 | 2014 | An upper bound for the number of bent functions at the distance 2
from an arbitrary bent function in 2k variables | Kolomeec N. A. | 296 |
7 | 2014 | On attractors in finite dynamic systems of binary vectors associated with palms orientations | Zharkova A. V. | 296 |
9 | 2016 | On the full diversity of balls for graphs | Evdokimov A. A., Fedoryaeva T.I., Kutcenogaya E.P. | 296 |
1 | 2009 | Approaches to security of computer systems with functionally or parametrically associated entities | Kolegov D.N. | 295 |
4 | 2011 | FPGA implementation of finite automata public key cryptosystem | Trenkaev V.N., Kovalev D.S. | 295 |
5 | 2012 | Decomposition and approximation of underdetermined data | Sholomov L. A. | 295 |
3 | 2010 | On the frame of an automaton | Salii V. N. | 294 |
4 | 2011 | Application of SAT-approach for solving combinatorial problems | Otpuschennikov I.V., Semenov A. A., Kochemazov S.E. | 294 |
4 | 2011 | On the uniqueness of exact vertex extensions | Dolgov A. A., Abrosimov M.B. | 294 |
5 | 2012 | Latin squares and their applications in cryptography | Tuzhilin M.E. | 294 |
5 | 2012 | Mathematical model of random generator based on ternary logic | Stolov E. L. | 294 |
1 | 2009 | Software implementation of closure algorithms for the basic DP-model of computer systems with discretionary access control | Smith I. V. | 293 |