1 | 2009 | Analysis of network safety with Markov 's chains | Kuhnir V.P., Kirko I.N. | 305 |
3 | 2010 | Teaching the protected computer nets design at the Cisco platform | Kolegov D. N. | 305 |
5 | 2012 | Decomposition of a boolean function into sum of bent functions | Tokareva N. N. | 305 |
7 | 2014 | On some open questions about apn functions | Vitkup V.A. | 305 |
7 | 2014 | Unreliability of circuits in the basis by Rosser - Turkett | Barsukova O. U., Alekhina M.A. | 305 |
1 | 2009 | Argument of knowledge of a Goppa codeword and of a bounded error | Fedyukovych V. E. | 304 |
3 | 2010 | Cryptanalysis with graphical processing units (GPU ) | Bespalov D. V., Semenov A. A., Bulavintsev V. G | 304 |
6 | 2013 | Modification of compiled applications for the android platform by means of aspect-oriented programming | Potapkin A.I, Zaytsev G. Yu, Stefantsov D. A. | 304 |
6 | 2013 | On local primitiveness of graphs and nonnega-tive matrices | Kyazhin S. N. | 304 |
4 | 2011 | The security model for cross-platform web services of municipal procurement support | Kononov D.D, Isaev S. V. | 302 |
7 | 2014 | Some properties of q-ary bent functions | Shishkin V. A. | 302 |
7 | 2014 | Boolean functions generated by the most significant bits of linear recurrent sequences | Bylkov D.N. | 302 |
7 | 2014 | The universal vulnerability exploitation platform for CTF | Ivachev A. S., Zaytsev G. Y., Sviridov P. Y. | 302 |
7 | 2014 | About basises with unreliability coefficient 5 | Vasin A. V. | 302 |
7 | 2014 | Formalization of combinatorial numbers in terms of entire solutions of systems of linear diophan-tine equations | Gotsulenko V. V. | 302 |
1 | 2009 | The method for secure video streaming over distributed networks | Shcherba E. V. | 301 |
4 | 2011 | Minimal extensions for cycles with vertices of two types | Bondarenko P.P., Abrosimov M.B. | 301 |
6 | 2013 | Development of a DDoS-attack detection system using queuing theory | Shcherba E. V., Volkov D.A. | 301 |
6 | 2013 | Pipelining of combinational circuits | Kardash S.N., Pottosin Yu.V. | 301 |
1 | 2009 | Correct evaluation of alternatives weight coefficients in the method of analytical hierarchies | Kolesnikova S. I. | 300 |
3 | 2010 | Logical inference on the base of optimal subset of mixed diagnostic tests for intelligent systems | Gedike A. I., Yankovskaya A.E. | 300 |
5 | 2012 | Estimates for the number of boolean functions having affine or quadratic approximations with a given accuracy | Serov A. A., Zubkov A.M. | 300 |
5 | 2012 | Cryptographic properties of block ciphers based on shift registers | Koreneva A.M., Fomichev V. M. | 300 |
6 | 2013 | Parallelization of the decoding algorithm in video compression standard H.265/HEVC | Chernyak R. I. | 300 |
7 | 2014 | Sufficient conditions for local primitiveness of nonprimitive digraphs | Kyazhin S. N. | 300 |
8 | 2015 | Implementation of DNS rebinding | Milovanov T. I. | 300 |
1 | 2009 | Discrete logarithm problem in subgroups of prime order | Pankratova I. A. | 299 |
5 | 2012 | Problems of almost threshold secret sharing schemes | Titov S. S., Medvedev N. V. | 299 |
5 | 2012 | A parallel algorithm for searching the minimum weight spanning tree on prefractal graph | Kochkarov A. A., Sennikova L. I. | 299 |
7 | 2014 | The recognition of recurrent sequences generated by conservative functions | Sergeeva O. E. | 299 |
7 | 2014 | Reachability problem for continuous piece-wise-affine mappings of a circle having degree 2 | Kurganskyy O. M. | 298 |
7 | 2014 | Covert timing channel over HTTP cache-control headers | Kolegov D.N., Oleksov N. E., Broslavsky O.V. | 298 |
1 | 2009 | Solving parallel equations over w-regular languages | Yevtushenko N. V., Bushkov V. G | 296 |
3 | 2010 | High-speed pseudorandom sequence generators based on cellular automata | Sukhinin B.M. | 296 |
9 | 2016 | On the full diversity of balls for graphs | Kutcenogaya E.P., Evdokimov A. A., Fedoryaeva T.I. | 296 |
5 | 2012 | Statistical independence of the boolean function superposition. II | Pankratova I. A., Kolcheva O.L. | 295 |
6 | 2013 | On non-minimal perfect ciphers | Titov S. S., Medvedeva N. V. | 295 |
6 | 2013 | Algorithm for searching prohibitions of boolean functions | Ryabokon D. V. | 295 |
7 | 2014 | An upper bound for the number of bent functions at the distance 2
from an arbitrary bent function in 2k variables | Kolomeec N. A. | 295 |
7 | 2014 | On attractors in finite dynamic systems of binary vectors associated with palms orientations | Zharkova A. V. | 295 |
1 | 2009 | Approaches to security of computer systems with functionally or parametrically associated entities | Kolegov D.N. | 294 |
2 | 2009 | Review lection of security models of computer system | Devyanin P. N. | 294 |
4 | 2011 | FPGA implementation of finite automata public key cryptosystem | Trenkaev V.N., Kovalev D.S. | 294 |
4 | 2011 | On the uniqueness of exact vertex extensions | Abrosimov M.B., Dolgov A. A. | 294 |
5 | 2012 | Decomposition and approximation of underdetermined data | Sholomov L. A. | 294 |
3 | 2010 | On the frame of an automaton | Salii V. N. | 293 |
4 | 2011 | Application of SAT-approach for solving combinatorial problems | Kochemazov S.E., Otpuschennikov I.V., Semenov A. A. | 293 |
5 | 2012 | Latin squares and their applications in cryptography | Tuzhilin M.E. | 293 |
5 | 2012 | Mathematical model of random generator based on ternary logic | Stolov E. L. | 293 |
1 | 2009 | Software implementation of closure algorithms for the basic DP-model of computer systems with discretionary access control | Smith I. V. | 292 |