Issues

IssueYearTitleAuthorsDownloads
52012Deterministic labelling of graph vertices by walking agentGrunsky I. S., Sapunov S. V.282
62013On the upper bound for the number of additional edges in minimal vertex extensions of colored circlesBondarenko P. P.282
12009Graph recognition by moving agentTatarinov E. A., Grunsky I. S.281
42011Coding of finite integer lattice by means of mappings with a bounded distortion.Evdokimov A. A.281
42011On approximation of permutations by imprimitive groupsPogorelov B.A., Pudovkina M. A.281
42011On skeleton automataSalii V. N.281
52012Robots in Space multiagent problem: information and cryptographic aspectsBernstein A. Yu., Shilov N. V.281
62013About invertibility finite automata with finite delayKaterinskiy D.A.281
62013Block ciphers based on two feedback shift registersKoreneva A.M.281
62013The blackbox service for hosting capture the flag computer security competitionsStefantsov D. A., Anisenya N.I, Torgaeva T. A.281
62013Optimization of Pollard's (p—1)-algorithmKlimina A. S.281
32010About relationship between parameters of certain graphsRoldugm P. V., Badeha I. A280
42011On the choice of slid pairs for the correlation cryptanalysis of KeeLoqLebedeva O. N.280
52012Properties of X, S-layersPudovkina M. A.280
52012Mitigation methods for illegal information timing flows on the socket program interfaceDolgikh A. N.280
82015Properties of p-ary bent functions that are at minimal distance from each otherPotapov V. N.280
12009The technology and the instrumental environment for creation of protected information processing systemsStephantsov D. A .279
52012Graph reconstruction by automata teamTatarinov E. A.279
62013On relations between the basic notions of differential cryptanalysisPestunov A. I.279
82015On the invertibility of vector boolean functionsPankratova I. A.279
52012Similar images search for digital waterm ARK detectionBorisenko B.B.278
102017Self-programmable cellular automata for cryptographyGamova A.N., Efremova A. A.278
42011Reliability analysis of graphical CAPTCHA-systems by the example of KCAPTCHAMatorin A. A., Abrosimov M.B.277
42011On minimal edge 1-extensions of two special form treesAbrosimov M. B, Komarov D. D.277
62013On T-irreducible extensions of starlike treesOsipov D. U.277
42011Design and implementation of the orm library in С + +Tkachenko N. O, Shmakova R. V., Stephantsov D.A., Chernov D. V.276
52012On the number of minimal vertex and edge 1-extensions of cyclesKuznetsov N. A., Abrosimov M.B.276
82015OPERATIONAL SEMANTICS FOR LYaPASStefantsov D. A., Zhukovskaja A. O.276
42011FPT-algorithms and their classification on the base of elasticityBykova V. V.275
52012On minimal extensions of special type black-white pathsBondarenko P. P.275
12009Properties of bent functions with minimal distanceLevin A. A., Pavlov A. V., Kolomeec N.A.274
12009О четверичных и двоичных бент-функциях , Sole Patrick, , Tokareva Natalia274
12009Computational complexity of graph extensionsAbrosimov M. B.274
52012Using volunteer computation to solve cryptographic problemsPosypkin M. A., Zaikin O.S., Semenov A. A.274
62013Statistical independence of general superposition of boolean functionsMironenko O. L.274
62013On the effective representation of disjunctive normal forms by diagrams of a special kindSemenov A. A.274
82015The development of an operating system in LYaPASTomskih P. A., Stefantsov D.A.274
32010Authentication in multi-tier system using commutative encryptionPautov P. A.273
42011Analysis of the GOST 28147-89 modes of operation that provide confidentialityKukalo I. A.273
52012Truncated differential characteristics with minimum number of active bytes for simplified WhirlpoolKamaeva A. A.273
52012Optimal linear approximations for Feistel networks. Estimation for the resistance of the cipher SMS4 to linear cryptanalysisShushuev G. I.273
52012About convergence of a hybrid SAT+ROBDD-derivationSemenov A. A., Ignatiev A. S.273
72014Experimental comparison of simulated annealing and balas algorithms for solving linear inequalitiesAnashkina N. V., Shurupov A. N.273
42011An algorithm of computing D-gap numbers and D-weierstrass points.Alekseenko E.S.272
42011Classification of anf graphs for quadratic bent functions in 6 variablesKorsakova E. P.272
42011Restrictions on girths in compact graphsMelent'ev V.A.272
52012Boolean function absolute nonlinearity calculation on GPUMedvedev A. V.272
62013On the representation of s-boxes in block ciphersVitkup V.A.272
82015NSUCRYPTO - a student's olympiad in cryptography: an idea, realization and resultsTokareva N. N.272
32010A hardware implementation of the cryptosystem based on the zakrevskij FSMMiloshenko A. V.271
Страница 5 из 16 123456...16
Всего: 763