Issues

IssueYearTitleAuthorsDownloads
52012Deterministic labelling of graph vertices by walking agentSapunov S. V., Grunsky I. S.281
62013On the upper bound for the number of additional edges in minimal vertex extensions of colored circlesBondarenko P. P.281
12009Graph recognition by moving agentTatarinov E. A., Grunsky I. S.280
42011Coding of finite integer lattice by means of mappings with a bounded distortion.Evdokimov A. A.280
42011On approximation of permutations by imprimitive groupsPogorelov B.A., Pudovkina M. A.280
42011On skeleton automataSalii V. N.280
52012Properties of X, S-layersPudovkina M. A.280
52012Robots in Space multiagent problem: information and cryptographic aspectsShilov N. V., Bernstein A. Yu.280
62013About invertibility finite automata with finite delayKaterinskiy D.A.280
62013Block ciphers based on two feedback shift registersKoreneva A.M.280
62013The blackbox service for hosting capture the flag computer security competitionsTorgaeva T. A., Stefantsov D. A., Anisenya N.I280
62013Optimization of Pollard's (p—1)-algorithmKlimina A. S.280
82015Properties of p-ary bent functions that are at minimal distance from each otherPotapov V. N.280
12009The technology and the instrumental environment for creation of protected information processing systemsStephantsov D. A .279
32010About relationship between parameters of certain graphsRoldugm P. V., Badeha I. A279
42011On the choice of slid pairs for the correlation cryptanalysis of KeeLoqLebedeva O. N.279
52012Mitigation methods for illegal information timing flows on the socket program interfaceDolgikh A. N.279
52012Graph reconstruction by automata teamTatarinov E. A.278
62013On relations between the basic notions of differential cryptanalysisPestunov A. I.278
82015On the invertibility of vector boolean functionsPankratova I. A.278
42011Reliability analysis of graphical CAPTCHA-systems by the example of KCAPTCHAMatorin A. A., Abrosimov M.B.277
42011On minimal edge 1-extensions of two special form treesKomarov D. D., Abrosimov M. B277
52012Similar images search for digital waterm ARK detectionBorisenko B.B.277
62013On T-irreducible extensions of starlike treesOsipov D. U.277
52012On the number of minimal vertex and edge 1-extensions of cyclesAbrosimov M.B., Kuznetsov N. A.276
102017Self-programmable cellular automata for cryptographyGamova A.N., Efremova A. A.276
42011FPT-algorithms and their classification on the base of elasticityBykova V. V.275
42011Design and implementation of the orm library in С + +Tkachenko N. O, Shmakova R. V., Stephantsov D.A., Chernov D. V.275
52012On minimal extensions of special type black-white pathsBondarenko P. P.275
82015OPERATIONAL SEMANTICS FOR LYaPASZhukovskaja A. O., Stefantsov D. A.275
62013On the effective representation of disjunctive normal forms by diagrams of a special kindSemenov A. A.274
12009Properties of bent functions with minimal distanceLevin A. A., Pavlov A. V., Kolomeec N.A.273
12009О четверичных и двоичных бент-функциях , Sole Patrick, , Tokareva Natalia273
12009Computational complexity of graph extensionsAbrosimov M. B.273
32010Authentication in multi-tier system using commutative encryptionPautov P. A.273
42011Analysis of the GOST 28147-89 modes of operation that provide confidentialityKukalo I. A.273
52012Using volunteer computation to solve cryptographic problemsSemenov A. A., Posypkin M. A., Zaikin O.S.273
62013Statistical independence of general superposition of boolean functionsMironenko O. L.273
82015The development of an operating system in LYaPASStefantsov D.A., Tomskih P. A.273
42011An algorithm of computing D-gap numbers and D-weierstrass points.Alekseenko E.S.272
52012Truncated differential characteristics with minimum number of active bytes for simplified WhirlpoolKamaeva A. A.272
52012Optimal linear approximations for Feistel networks. Estimation for the resistance of the cipher SMS4 to linear cryptanalysisShushuev G. I.272
52012About convergence of a hybrid SAT+ROBDD-derivationIgnatiev A. S., Semenov A. A.272
72014Experimental comparison of simulated annealing and balas algorithms for solving linear inequalitiesShurupov A. N., Anashkina N. V.272
32010Software translating of combinatorial problems to propositional logicSemenov A. A., Otpuschennikov I. V.271
42011Classification of anf graphs for quadratic bent functions in 6 variablesKorsakova E. P.271
42011Restrictions on girths in compact graphsMelent'ev V.A.271
52012Boolean function absolute nonlinearity calculation on GPUMedvedev A. V.271
62013On the representation of s-boxes in block ciphersVitkup V.A.271
82015NSUCRYPTO - a student's olympiad in cryptography: an idea, realization and resultsTokareva N. N.271
Страница 5 из 16 123456...16
Всего: 763