Issues

IssueYearTitleAuthorsDownloads
12009Digital watermarks resistant to collusion attacksSolovjev T.M., Struzhkov R.S., Chernyak R. I.292
32010Bout the fact of detecting the noise in finite Markov chain with an unknown transition probability matrixShoytov A.M.292
72014Vectorial boolean functions on distance one from apn functionsShushuev G.I.292
32010Experimental estimation for software implementation speed of some block cipher's transformationsDmukh A. A.291
62013On algorithmic and topological properties of orbits for piecewise-affine mappingsKurganskyy O. M.291
62013On solving big systems of congruencesZhukov K. D, Rybakov A. S.291
62013A parallel algorithm for computation of growth functions in the finite two-generator groups of period 5Kuznetsova A.S, Safonov K. V., Kuznetsov A. A.291
62013Properties of gene networks with threshold functionsBatueva T.290
12009Approximation of the network traffic by model of alternating processPakhomov I. B., Nissenbaum O. V.289
32010On the reduction of key space for A5/1Kiselyov S. A.289
32010The code injection to the process under an operating system GNU/LinuxSmith I. V.289
32010Using Scyther for analysis SKID3 securityTsoy M. I.289
42011Provable secure dynamic group signature schemeArtamonov A. V., Makhovenko E. B., Vasilev P. N.289
42011C-model of a predator - prey growth in the ecological nicheBerezovsky Yu.V, Vorob'ev V.A.289
42011On congruences of pathsKarmanova E. O.289
62013Constructions of ideal secret sharing schemesMedvedev N. V., Titov S. S.289
62013On branching and immediate predecessors of the states in finite dynamic system of all possible orientations of a graphZharkova A. V.289
72014General method for HTTP Messages authentication based on hash functions in Web applicationsKolegov D. N.289
12009About Tseitin's transformation in logical equationsSemenov A. A.288
12009Analysis of conditions for taking ownership access within the base role DP-model without memoryinformation flowsDevyanin P. N.288
12009Implementation of a method for protecting credentials in the multi-tier applicationsPautov P. A.288
32010The relationship between structure of the key space and hardness of the Mceliece-Sidelnikov public key crypto systemChizhov I. V.288
42011Fault attack on reconfigurable fsm-based cipher of ZakrevskijTrenkaev V.N.288
62013Algorithm for recovering plaintext from ciphertext in Mceliece cryptosystemChizhov I. V., Kaluzhin A.K.288
62013On probability characteristics of random graphs generated by algorithms for finding hash function collisionsKarpunin G. A.288
62013About unreliability bounds for circuit with inverse faults and functional element breakdownsBarsukova O. U., Alekhina M.A288
12009Test suites derivation for nondeterministic finite state mashines with respect to the separability relationShabaldina N. V., Akenshina E.A.287
42011Polynomials over primary residue rings with a small unique distanceAbornev A. V., Bylkov D. N.287
42011The improvement of exponent's estimates for primitive graphsFomichev V. M.287
52012On nonlinearity of some boolean functions with maximal algebraic immunityKolomeec N. A.287
72014Conditions for the existence of perfect ciphers with a fixed set of parametersRatseev S. M.287
52012Description of the class of permutations represented as a product of two permutations with fixed number of mobile points. IIPichkur A. B.286
52012Matchings construction procedureMagomedov T. A.286
62013Implementation of the parallel shortest vector enumeration in the block Korkin — Zolotarev methodUsatyuk V. S.286
72014Asymptotic properties of the set of solutions for the distorted systems of equationsVolgin A. V.286
62013About possibility of reduction of sort out in Balash's algorithmAnashkina N. V.285
82015Modification of lyapas for operating systems developmentGrechnev S. Yu., Stefantsov D.A.285
32010On constructing minimal deterministic finite automaton recognizing a prefix-code of given cardinalityDvorkin M. E., Akishev I.R.283
52012Perfect balancedness of k-valued functions and Golic conditionSmyshlyaev S. V.283
52012On interval edge d-colouringMagomedov A.M.283
72014Influence of difference hamming weight on it's propagation through arithmetic operationsPestunov A. I.283
82015Preliminary evaluation of a minimal number of rounds in lightweight block ciphers for providing their satisfactory statistical propertiesPestunov A. I.283
12009Hybrid approach (SAT +ROBDD) to cryptanalysis of stream encryption systemsBespalov D. V., Semenov A. A., Zaikin O.S., Ignatiev A. S.282
12009Path delay fault classificationMatrosova A. Yu.282
32010Generation of the alternating group by semiregular involutionsTuzhilm M. E.282
42011Development of comprehensive taught system that protects information resources from phishing attacksShumskaya M. V., Miloshenko A. V., Chernyak R.I, Solovjev T.M282
72014Nonlinear permutations of a vector space recursively generated over a galois ring of characteristic 4Abornev A. V.282
82015On number of inaccessible states in finite dynamic systems of binary vectors associated with palms orientationsZharkova A. V.282
42011On impossible truncated differentials of XSL ciphersPudovkina M. A.281
52012Cryptographic properties of branching of functions of vector spacesKogos K. G, Fomichev V. M.281
Страница 4 из 16 123456...16
Всего: 763