6 | 2013 | Properties of statistics var on group of permutations | Bondarenko L. N. | 263 |
6 | 2013 | An economical representation of underdeter-mined data and superimposed codes | Sholomov L. A. | 263 |
8 | 2015 | Research of the group of bijective differen-tiable modulo p functions | Ivachev A. S. | 263 |
4 | 2011 | About the role dp-model for access and information flows control in operating systems of Linux family | Devyanin P. N. | 262 |
6 | 2013 | Classes of polynomial and variative coordinate polynomial functions over galois ring | Zaets M. V. | 262 |
6 | 2013 | Simple proof for the strong regularity of the cayley graph of bent function | Tokareva N. N. | 262 |
7 | 2014 | Building edge extensions of star-like trees | Komarov D. D. | 262 |
8 | 2015 | Hall's polynomials over burnside groups of exponent three | Safonov K. V., Kuznetsov A. A. | 262 |
9 | 2016 | Cryptanalysis of the mceliece pkc based on (k - 1)-reed - muller subcodes | Chizhov I. V., Borodin M. A. | 262 |
1 | 2009 | Information protection for law students | Tovstein M. Ya. | 261 |
5 | 2012 | On the solution of quadratic equations in binary fields | Titov S.S., Glusko K.L. | 261 |
4 | 2011 | On perfect 2-colorings of the Q-ary hypercube | Potapov V. N. | 260 |
4 | 2011 | On parallel computations in implementation of the meat-in-the-middle attack | Fomichev V. M. | 260 |
5 | 2012 | Absence of dynamism at method NFS | Zachesov Y.L., Gnshm A.M. | 260 |
7 | 2014 | Estimates for exponents of mixing graphs relating to some modifications of additive generators | Dorokhova A.M. | 260 |
7 | 2014 | On cycles in functional graphs of circulant type gene networks with threshold functions | Bykov I. S. | 260 |
7 | 2014 | Simultaneous search for several binary patterns in a stream with finite-state automaton | Pankratov I. V. | 260 |
8 | 2015 | Properties of the group generated by translation groups of the vector space and the residue ring | Pudovkina M. A., Pogorelov B.A. | 260 |
8 | 2015 | Enumeration of boolean functions with a fixed number of affine products | Cheremushkin A. V. | 260 |
9 | 2016 | Lightweight implementation of abac mechanism on database firewall | Tkachenko N. O., Kolegov D. N. | 260 |
3 | 2010 | On representation of contextfree languages by diagonals of linear laguages | Safonov K. V., Kalugin-Balashov D.A. | 259 |
5 | 2012 | Methods for designing FPT-algorithms on graphs of limited treewidth | Bykova V. V. | 259 |
8 | 2015 | On some metrical properties of linear sub-spaces in boolean cube | Oblaukhov A. K. | 259 |
8 | 2015 | The inverse of differentiable permutations over groups | Karpov A. V. | 259 |
1 | 2009 | Translation of discrete finite automata descriptions from Microsoft Visio format to source code in C language | Shalyto A. A., Dedinsky I. R, Stolyarov L. V. | 258 |
5 | 2012 | Differential equations for hash functions from MDx-family | Loshkaryov S. D. | 258 |
6 | 2013 | An improved estimate for the convergence rate in the multidimensional central limit theorem | Volgin A. V. | 258 |
1 | 2009 | Logical-combinatorial multicriteria selection of diagnostic tests optimal subset | Yankovskya A.E., Petelin A. E. | 257 |
3 | 2010 | About one family of exact 2-extensions of tournaments | Dolgov A. A. | 257 |
3 | 2010 | An approach to fuzz testing data generation for applied and system software | Makarov A. N. | 256 |
8 | 2015 | On local exponents of the mixing graphs for the functions realized by A5/1 type algorithms | Kyazhin S.N., Fomichev V. M. | 256 |
8 | 2015 | Calculation of upper bounds for graph vertex integrity based on the minimal separators | Bykova V. V., Kirillov Y. I. | 256 |
3 | 2010 | On minimal vertex 1-extensions of special form superslim trees | Komarov D.D., Abrosimov M.B. | 255 |
3 | 2010 | Resource usage analysis in software | Gorelov V. V. | 255 |
3 | 2010 | On a new complete invariant for acyclic graphs | Prolubnikov A. V. | 255 |
5 | 2012 | On a combinatorial optimization problem | Safonov K. V., Kuznetsova A. S. | 255 |
5 | 2012 | Graph congruences: some combinatorial properties | Karmanova E. O. | 255 |
6 | 2013 | The second coordinate sequence of a linear recurrence of maximum period over ring Z
8 | Bylkov D. N. | 255 |
6 | 2013 | On the ordered set of connected parts of a polygonal graph | Salii V. N. | 255 |
8 | 2015 | Number estimation for additional arcs in a minimal 1-vertex extension of tournament | Modenova O. V., Abrosimov M. B. | 255 |
3 | 2010 | Complexity estimation for a differential attack on a block cipher with given parameters | Pestunov A.I. | 254 |
8 | 2015 | Macmahon's statistics properties on sets of words | Bondarenko L. N., Sharapova M.L. | 254 |
8 | 2015 | On properties of the set of values of an arbitrary vector boolean function | Shushuev G.I. | 254 |
3 | 2010 | Fingerprints resistant to collusion attacks | Chernyak R. I., Solovjev T.M. | 253 |
4 | 2011 | Algebras of languages associated with labelled graphs | Pryanichnikova E. A. | 253 |
8 | 2015 | Construction of an error function for solving the text ranking identification problem | Kozhushko O. A. | 253 |
1 | 2009 | Transitions identification experiments with information-lossless automata | Trenkaev V. N. | 252 |
8 | 2015 | On the complexity of discrete logarithm problem in a finite cyclic group with the efficient inversion | Nikolaev M. V. | 252 |
1 | 2009 | APN-functions | Tuzhilin M. E. | 251 |
5 | 2012 | On almost balanced boolean functions | Potapov V. N. | 251 |