1 | 2009 | Digital watermarks resistant to collusion attacks | Solovjev T.M., Struzhkov R.S., Chernyak R. I. | 292 |
3 | 2010 | Bout the fact of detecting the noise in finite Markov chain with an unknown transition probability matrix | Shoytov A.M. | 292 |
7 | 2014 | Vectorial boolean functions on distance one from apn functions | Shushuev G.I. | 292 |
3 | 2010 | Experimental estimation for software implementation speed of some block cipher's transformations | Dmukh A. A. | 291 |
6 | 2013 | On algorithmic and topological properties of orbits for piecewise-affine mappings | Kurganskyy O. M. | 291 |
6 | 2013 | On solving big systems of congruences | Zhukov K. D, Rybakov A. S. | 291 |
6 | 2013 | A parallel algorithm for computation of growth functions in the finite two-generator groups of period 5 | Kuznetsova A.S, Safonov K. V., Kuznetsov A. A. | 291 |
6 | 2013 | Properties of gene networks with threshold functions | Batueva T. | 290 |
1 | 2009 | Approximation of the network traffic by model of alternating process | Pakhomov I. B., Nissenbaum O. V. | 289 |
3 | 2010 | On the reduction of key space for A5/1 | Kiselyov S. A. | 289 |
3 | 2010 | The code injection to the process under an operating system GNU/Linux | Smith I. V. | 289 |
3 | 2010 | Using Scyther for analysis SKID3 security | Tsoy M. I. | 289 |
4 | 2011 | Provable secure dynamic group signature scheme | Artamonov A. V., Makhovenko E. B., Vasilev P. N. | 289 |
4 | 2011 | C-model of a predator - prey growth in the ecological niche | Berezovsky Yu.V, Vorob'ev V.A. | 289 |
4 | 2011 | On congruences of paths | Karmanova E. O. | 289 |
6 | 2013 | Constructions of ideal secret sharing schemes | Medvedev N. V., Titov S. S. | 289 |
6 | 2013 | On branching and immediate predecessors of the states in finite dynamic system of all possible orientations of a graph | Zharkova A. V. | 289 |
7 | 2014 | General method for HTTP Messages authentication based on hash functions in Web applications | Kolegov D. N. | 289 |
1 | 2009 | About Tseitin's transformation in logical equations | Semenov A. A. | 288 |
1 | 2009 | Analysis of conditions for taking ownership access within the base role DP-model without memoryinformation flows | Devyanin P. N. | 288 |
1 | 2009 | Implementation of a method for protecting credentials in the multi-tier applications | Pautov P. A. | 288 |
3 | 2010 | The relationship between structure of the key space and hardness of the Mceliece-Sidelnikov public key crypto system | Chizhov I. V. | 288 |
4 | 2011 | Fault attack on reconfigurable fsm-based cipher of Zakrevskij | Trenkaev V.N. | 288 |
6 | 2013 | Algorithm for recovering plaintext from ciphertext in Mceliece cryptosystem | Chizhov I. V., Kaluzhin A.K. | 288 |
6 | 2013 | On probability characteristics of random graphs generated by algorithms for finding hash function collisions | Karpunin G. A. | 288 |
6 | 2013 | About unreliability bounds for circuit with inverse faults and functional element breakdowns | Barsukova O. U., Alekhina M.A | 288 |
1 | 2009 | Test suites derivation for nondeterministic finite state mashines with respect to the separability relation | Shabaldina N. V., Akenshina E.A. | 287 |
4 | 2011 | Polynomials over primary residue rings with a small unique distance | Abornev A. V., Bylkov D. N. | 287 |
4 | 2011 | The improvement of exponent's estimates for primitive graphs | Fomichev V. M. | 287 |
5 | 2012 | On nonlinearity of some boolean functions with maximal algebraic immunity | Kolomeec N. A. | 287 |
7 | 2014 | Conditions for the existence of perfect ciphers with a fixed set of parameters | Ratseev S. M. | 287 |
5 | 2012 | Description of the class of permutations represented as a product of two permutations with fixed number of mobile points. II | Pichkur A. B. | 286 |
5 | 2012 | Matchings construction procedure | Magomedov T. A. | 286 |
6 | 2013 | Implementation of the parallel shortest vector enumeration in the block Korkin — Zolotarev method | Usatyuk V. S. | 286 |
7 | 2014 | Asymptotic properties of the set of solutions for the distorted systems of equations | Volgin A. V. | 286 |
6 | 2013 | About possibility of reduction of sort out in Balash's algorithm | Anashkina N. V. | 285 |
8 | 2015 | Modification of lyapas for operating systems development | Grechnev S. Yu., Stefantsov D.A. | 285 |
3 | 2010 | On constructing minimal deterministic finite automaton recognizing a prefix-code of given cardinality | Dvorkin M. E., Akishev I.R. | 283 |
5 | 2012 | Perfect balancedness of k-valued functions and Golic condition | Smyshlyaev S. V. | 283 |
5 | 2012 | On interval edge d-colouring | Magomedov A.M. | 283 |
7 | 2014 | Influence of difference hamming weight on it's propagation through arithmetic operations | Pestunov A. I. | 283 |
8 | 2015 | Preliminary evaluation of a minimal number of rounds in lightweight block ciphers for providing their satisfactory statistical properties | Pestunov A. I. | 283 |
1 | 2009 | Hybrid approach (SAT +ROBDD) to cryptanalysis of stream encryption systems | Bespalov D. V., Semenov A. A., Zaikin O.S., Ignatiev A. S. | 282 |
1 | 2009 | Path delay fault classification | Matrosova A. Yu. | 282 |
3 | 2010 | Generation of the alternating group by semiregular involutions | Tuzhilm M. E. | 282 |
4 | 2011 | Development of comprehensive taught system that protects information resources from phishing attacks | Shumskaya M. V., Miloshenko A. V., Chernyak R.I, Solovjev T.M | 282 |
7 | 2014 | Nonlinear permutations of a vector space recursively generated over a galois ring of characteristic 4 | Abornev A. V. | 282 |
8 | 2015 | On number of inaccessible states in finite dynamic systems of binary vectors associated with palms orientations | Zharkova A. V. | 282 |
4 | 2011 | On impossible truncated differentials of XSL ciphers | Pudovkina M. A. | 281 |
5 | 2012 | Cryptographic properties of branching of functions of vector spaces | Kogos K. G, Fomichev V. M. | 281 |