Issues

IssueYearTitleAuthorsDownloads
12009Digital watermarks resistant to collusion attacksChernyak R. I., Solovjev T.M., Struzhkov R.S.293
32010Bout the fact of detecting the noise in finite Markov chain with an unknown transition probability matrixShoytov A.M.293
72014Vectorial boolean functions on distance one from apn functionsShushuev G.I.293
32010Experimental estimation for software implementation speed of some block cipher's transformationsDmukh A. A.292
62013On solving big systems of congruencesZhukov K. D, Rybakov A. S.292
62013A parallel algorithm for computation of growth functions in the finite two-generator groups of period 5Kuznetsova A.S, Safonov K. V., Kuznetsov A. A.292
32010The code injection to the process under an operating system GNU/LinuxSmith I. V.291
62013On algorithmic and topological properties of orbits for piecewise-affine mappingsKurganskyy O. M.291
62013Properties of gene networks with threshold functionsBatueva T.291
12009Approximation of the network traffic by model of alternating processPakhomov I. B., Nissenbaum O. V.290
32010On the reduction of key space for A5/1Kiselyov S. A.290
32010Using Scyther for analysis SKID3 securityTsoy M. I.290
42011Provable secure dynamic group signature schemeMakhovenko E. B., Vasilev P. N., Artamonov A. V.290
42011C-model of a predator - prey growth in the ecological nicheBerezovsky Yu.V, Vorob'ev V.A.290
42011On congruences of pathsKarmanova E. O.290
62013Constructions of ideal secret sharing schemesMedvedev N. V., Titov S. S.290
62013On branching and immediate predecessors of the states in finite dynamic system of all possible orientations of a graphZharkova A. V.290
12009About Tseitin's transformation in logical equationsSemenov A. A.289
12009Analysis of conditions for taking ownership access within the base role DP-model without memoryinformation flowsDevyanin P. N.289
12009Implementation of a method for protecting credentials in the multi-tier applicationsPautov P. A.289
32010The relationship between structure of the key space and hardness of the Mceliece-Sidelnikov public key crypto systemChizhov I. V.289
42011Fault attack on reconfigurable fsm-based cipher of ZakrevskijTrenkaev V.N.289
62013Algorithm for recovering plaintext from ciphertext in Mceliece cryptosystemChizhov I. V., Kaluzhin A.K.289
62013About unreliability bounds for circuit with inverse faults and functional element breakdownsBarsukova O. U., Alekhina M.A289
72014General method for HTTP Messages authentication based on hash functions in Web applicationsKolegov D. N.289
12009Test suites derivation for nondeterministic finite state mashines with respect to the separability relationShabaldina N. V., Akenshina E.A.288
42011Polynomials over primary residue rings with a small unique distanceAbornev A. V., Bylkov D. N.288
42011The improvement of exponent's estimates for primitive graphsFomichev V. M.288
52012On nonlinearity of some boolean functions with maximal algebraic immunityKolomeec N. A.288
62013On probability characteristics of random graphs generated by algorithms for finding hash function collisionsKarpunin G. A.288
72014Conditions for the existence of perfect ciphers with a fixed set of parametersRatseev S. M.288
52012Description of the class of permutations represented as a product of two permutations with fixed number of mobile points. IIPichkur A. B.287
52012Matchings construction procedureMagomedov T. A.287
62013Implementation of the parallel shortest vector enumeration in the block Korkin — Zolotarev methodUsatyuk V. S.287
72014Asymptotic properties of the set of solutions for the distorted systems of equationsVolgin A. V.287
62013About possibility of reduction of sort out in Balash's algorithmAnashkina N. V.286
82015Modification of lyapas for operating systems developmentGrechnev S. Yu., Stefantsov D.A.286
32010On constructing minimal deterministic finite automaton recognizing a prefix-code of given cardinalityDvorkin M. E., Akishev I.R.284
52012Perfect balancedness of k-valued functions and Golic conditionSmyshlyaev S. V.284
72014Influence of difference hamming weight on it's propagation through arithmetic operationsPestunov A. I.284
82015Preliminary evaluation of a minimal number of rounds in lightweight block ciphers for providing their satisfactory statistical propertiesPestunov A. I.284
12009Hybrid approach (SAT +ROBDD) to cryptanalysis of stream encryption systemsIgnatiev A. S., Bespalov D. V., Semenov A. A., Zaikin O.S.283
12009Path delay fault classificationMatrosova A. Yu.283
32010Generation of the alternating group by semiregular involutionsTuzhilm M. E.283
42011Development of comprehensive taught system that protects information resources from phishing attacksMiloshenko A. V., Chernyak R.I, Solovjev T.M, Shumskaya M. V.283
52012On interval edge d-colouringMagomedov A.M.283
72014Nonlinear permutations of a vector space recursively generated over a galois ring of characteristic 4Abornev A. V.283
82015On number of inaccessible states in finite dynamic systems of binary vectors associated with palms orientationsZharkova A. V.283
42011On impossible truncated differentials of XSL ciphersPudovkina M. A.282
52012Cryptographic properties of branching of functions of vector spacesKogos K. G, Fomichev V. M.282
Страница 4 из 16 123456...16
Всего: 763