Issues

IssueYearTitleAuthorsDownloads
42011On impossible truncated differentials of XSL ciphersPudovkina M. A.285
52012Cryptographic properties of branching of functions of vector spacesFomichev V. M., Kogos K. G285
52012Deterministic labelling of graph vertices by walking agentSapunov S. V., Grunsky I. S.285
12009Graph recognition by moving agentTatarinov E. A., Grunsky I. S.284
42011Coding of finite integer lattice by means of mappings with a bounded distortion.Evdokimov A. A.284
42011On skeleton automataSalii V. N.284
52012Robots in Space multiagent problem: information and cryptographic aspectsShilov N. V., Bernstein A. Yu.284
62013About invertibility finite automata with finite delayKaterinskiy D.A.284
62013Block ciphers based on two feedback shift registersKoreneva A.M.284
62013The blackbox service for hosting capture the flag computer security competitionsAnisenya N.I, Torgaeva T. A., Stefantsov D. A.284
62013On the upper bound for the number of additional edges in minimal vertex extensions of colored circlesBondarenko P. P.284
82015Properties of p-ary bent functions that are at minimal distance from each otherPotapov V. N.284
42011On the choice of slid pairs for the correlation cryptanalysis of KeeLoqLebedeva O. N.283
52012Properties of X, S-layersPudovkina M. A.283
52012Mitigation methods for illegal information timing flows on the socket program interfaceDolgikh A. N.283
62013Optimization of Pollard's (p—1)-algorithmKlimina A. S.283
32010About relationship between parameters of certain graphsBadeha I. A, Roldugm P. V.282
52012Similar images search for digital waterm ARK detectionBorisenko B.B.282
52012Graph reconstruction by automata teamTatarinov E. A.282
62013On relations between the basic notions of differential cryptanalysisPestunov A. I.282
12009The technology and the instrumental environment for creation of protected information processing systemsStephantsov D. A .281
42011Reliability analysis of graphical CAPTCHA-systems by the example of KCAPTCHAAbrosimov M.B., Matorin A. A.280
42011Design and implementation of the orm library in С + +Tkachenko N. O, Shmakova R. V., Stephantsov D.A., Chernov D. V.280
42011On minimal edge 1-extensions of two special form treesKomarov D. D., Abrosimov M. B280
52012On the number of minimal vertex and edge 1-extensions of cyclesKuznetsov N. A., Abrosimov M.B.280
62013On T-irreducible extensions of starlike treesOsipov D. U.280
102017Self-programmable cellular automata for cryptographyEfremova A. A., Gamova A.N.280
82015OPERATIONAL SEMANTICS FOR LYaPASStefantsov D. A., Zhukovskaja A. O.279
42011FPT-algorithms and their classification on the base of elasticityBykova V. V.278
52012Using volunteer computation to solve cryptographic problemsZaikin O.S., Semenov A. A., Posypkin M. A.278
82015The development of an operating system in LYaPASTomskih P. A., Stefantsov D.A.278
12009О четверичных и двоичных бент-функциях , Tokareva Natalia, , Sole Patrick277
12009Computational complexity of graph extensionsAbrosimov M. B.277
52012Truncated differential characteristics with minimum number of active bytes for simplified WhirlpoolKamaeva A. A.277
52012On minimal extensions of special type black-white pathsBondarenko P. P.277
62013Statistical independence of general superposition of boolean functionsMironenko O. L.277
12009Properties of bent functions with minimal distancePavlov A. V., Kolomeec N.A., Levin A. A.276
32010Authentication in multi-tier system using commutative encryptionPautov P. A.276
42011Analysis of the GOST 28147-89 modes of operation that provide confidentialityKukalo I. A.276
52012Optimal linear approximations for Feistel networks. Estimation for the resistance of the cipher SMS4 to linear cryptanalysisShushuev G. I.276
52012About convergence of a hybrid SAT+ROBDD-derivationIgnatiev A. S., Semenov A. A.276
62013On the representation of s-boxes in block ciphersVitkup V.A.276
62013On the effective representation of disjunctive normal forms by diagrams of a special kindSemenov A. A.276
102017Towards ABAC Engine frameworkBroslavsky O. V., Kolegov D. N., Oleksov N. E.276
42011An algorithm of computing D-gap numbers and D-weierstrass points.Alekseenko E.S.275
42011Classification of anf graphs for quadratic bent functions in 6 variablesKorsakova E. P.275
42011Restrictions on girths in compact graphsMelent'ev V.A.275
52012Boolean function absolute nonlinearity calculation on GPUMedvedev A. V.275
72014Experimental comparison of simulated annealing and balas algorithms for solving linear inequalitiesShurupov A. N., Anashkina N. V.275
82015NSUCRYPTO - a student's olympiad in cryptography: an idea, realization and resultsTokareva N. N.275
Страница 5 из 16 123456...16
Всего: 763