Issues

IssueYearTitleAuthorsDownloads
32010On the frame of an automatonSalii V. N.296
32010Bout the fact of detecting the noise in finite Markov chain with an unknown transition probability matrixShoytov A.M.295
62013Properties of gene networks with threshold functionsBatueva T.295
62013On solving big systems of congruencesRybakov A. S., Zhukov K. D295
62013A parallel algorithm for computation of growth functions in the finite two-generator groups of period 5Kuznetsova A.S, Safonov K. V., Kuznetsov A. A.295
72014Vectorial boolean functions on distance one from apn functionsShushuev G.I.295
32010The code injection to the process under an operating system GNU/LinuxSmith I. V.294
32010Experimental estimation for software implementation speed of some block cipher's transformationsDmukh A. A.294
62013Constructions of ideal secret sharing schemesTitov S. S., Medvedev N. V.294
62013About unreliability bounds for circuit with inverse faults and functional element breakdownsBarsukova O. U., Alekhina M.A294
62013On branching and immediate predecessors of the states in finite dynamic system of all possible orientations of a graphZharkova A. V.294
12009Approximation of the network traffic by model of alternating processPakhomov I. B., Nissenbaum O. V.293
32010On the reduction of key space for A5/1Kiselyov S. A.293
32010Using Scyther for analysis SKID3 securityTsoy M. I.293
42011Provable secure dynamic group signature schemeArtamonov A. V., Makhovenko E. B., Vasilev P. N.293
42011C-model of a predator - prey growth in the ecological nicheVorob'ev V.A., Berezovsky Yu.V293
42011On congruences of pathsKarmanova E. O.293
62013On algorithmic and topological properties of orbits for piecewise-affine mappingsKurganskyy O. M.293
72014General method for HTTP Messages authentication based on hash functions in Web applicationsKolegov D. N.293
12009Analysis of conditions for taking ownership access within the base role DP-model without memoryinformation flowsDevyanin P. N.292
12009Implementation of a method for protecting credentials in the multi-tier applicationsPautov P. A.292
32010The relationship between structure of the key space and hardness of the Mceliece-Sidelnikov public key crypto systemChizhov I. V.292
42011Fault attack on reconfigurable fsm-based cipher of ZakrevskijTrenkaev V.N.292
62013Algorithm for recovering plaintext from ciphertext in Mceliece cryptosystemChizhov I. V., Kaluzhin A.K.292
12009About Tseitin's transformation in logical equationsSemenov A. A.291
12009Test suites derivation for nondeterministic finite state mashines with respect to the separability relationShabaldina N. V., Akenshina E.A.291
42011Polynomials over primary residue rings with a small unique distanceBylkov D. N., Abornev A. V.291
42011The improvement of exponent's estimates for primitive graphsFomichev V. M.291
52012On nonlinearity of some boolean functions with maximal algebraic immunityKolomeec N. A.291
72014Conditions for the existence of perfect ciphers with a fixed set of parametersRatseev S. M.291
52012Description of the class of permutations represented as a product of two permutations with fixed number of mobile points. IIPichkur A. B.290
52012Matchings construction procedureMagomedov T. A.290
62013On probability characteristics of random graphs generated by algorithms for finding hash function collisionsKarpunin G. A.290
62013Implementation of the parallel shortest vector enumeration in the block Korkin — Zolotarev methodUsatyuk V. S.290
72014Asymptotic properties of the set of solutions for the distorted systems of equationsVolgin A. V.290
82015On the invertibility of vector boolean functionsPankratova I. A.290
62013About possibility of reduction of sort out in Balash's algorithmAnashkina N. V.289
82015Modification of lyapas for operating systems developmentGrechnev S. Yu., Stefantsov D.A.289
72014Influence of difference hamming weight on it's propagation through arithmetic operationsPestunov A. I.288
32010On constructing minimal deterministic finite automaton recognizing a prefix-code of given cardinalityDvorkin M. E., Akishev I.R.287
52012Perfect balancedness of k-valued functions and Golic conditionSmyshlyaev S. V.287
82015Preliminary evaluation of a minimal number of rounds in lightweight block ciphers for providing their satisfactory statistical propertiesPestunov A. I.287
82015On number of inaccessible states in finite dynamic systems of binary vectors associated with palms orientationsZharkova A. V.287
12009Path delay fault classificationMatrosova A. Yu.286
32010Generation of the alternating group by semiregular involutionsTuzhilm M. E.286
42011Development of comprehensive taught system that protects information resources from phishing attacksShumskaya M. V., Miloshenko A. V., Chernyak R.I, Solovjev T.M286
52012On interval edge d-colouringMagomedov A.M.286
72014Nonlinear permutations of a vector space recursively generated over a galois ring of characteristic 4Abornev A. V.286
12009Hybrid approach (SAT +ROBDD) to cryptanalysis of stream encryption systemsIgnatiev A. S., Bespalov D. V., Semenov A. A., Zaikin O.S.285
42011On approximation of permutations by imprimitive groupsPogorelov B.A., Pudovkina M. A.285
Страница 4 из 16 123456...16
Всего: 763