8 | 2015 | On intersection of derivatives images for apn functions | Gorodilova A. A. | 251 |
8 | 2015 | ⊗W, ch-markovian and imprimitive properties of block ciphers | Pudovkina M. A., Pogorelov B. A. | 251 |
8 | 2015 | Application of algorithms solving sat problem to cryptanalysis of hash functions of MD family | Bogachkova I. A., Otpuschennikov I. V., Kochemazov S.E., Semenov A. A., Zaikin O.S. | 251 |
4 | 2011 | On attractors of dynamical systems associated with cycles | Vlasova A. V. | 250 |
5 | 2012 | A method for seed recovering in the linear generator over the finite field complicated by mask adding | Volgin A. V., Ivanov A. V. | 250 |
8 | 2015 | On self dual bent functions | Kutsenko A. V. | 250 |
9 | 2016 | Necessary condition for maximum component algebraic immunity of a vectorial boolean function | Pokrasenko D. P. | 250 |
8 | 2015 | Mixing digraphs of transformations based on shift registers with two feedbacks | Dorokhova A.M. | 249 |
8 | 2015 | Non-invasive method of mandatory access control implementaion on dbms layer in web applications | Tkachenko N. O., Kolegov D. N. | 249 |
9 | 2016 | On special class of vectorial boolean functions and the problem of apn permutations existence | Vitkup V.A. | 249 |
9 | 2016 | Estimations of cryptographic resistance of ciphers in the trivium family to sat-based cryptanalysis | Semenov A. A., Otpuschennikov I. V., Zaikin O.S. | 249 |
9 | 2016 | Analogues of the shannon theorem for non-minimal endomorphic perfect ciphers | Medvedeva N. V., Titov S. S. | 249 |
12 | 2019 | about modeling of mic and mac in postgresql within framework of the mrosl dp-model | Devyanin P. N. | 249 |
1 | 2009 | Algorithms for generation of rooted tree on the base of total partition procedure | Kruchinin V. V. | 248 |
8 | 2015 | Unreliability of circuits in case of constant failures on inputs and outputs of gates | Alekhina M. A. | 248 |
8 | 2015 | A lower bound for unreliability of circuits in the webb basis | Alekhina M. A., Barsukova O. U. | 248 |
7 | 2014 | About primitiveness of self-decimated generator's mixing matrices | Avezova Y.E., Fomichev V. M. | 247 |
8 | 2015 | Low power race-free state assignment of an asynchronous automaton | Pottosin Yu. V. | 247 |
3 | 2010 | Differential at tack on 6-round whirlpoollike block ciphers | Pudovkina M. A. | 246 |
8 | 2015 | Ciphertexts-only attack on a linear fully ho-momorphic cryptosystem | Trepacheva A. V. | 246 |
2 | 2009 | Combinatorics-algebraic models in cryptography | Skobelev V. G. | 245 |
5 | 2012 | Based on SELinux mandatory access control in database management system MySQL | Tkachenko N. O. | 245 |
7 | 2014 | Development of automated means for proving programs properties | Stefantsov D. A., Zhukovskaya A. O. | 245 |
8 | 2015 | Non-endomorphic perfect ciphers with two elements in plaintext alphabet | Titov S. S., Medvedeva N. V. | 243 |
8 | 2015 | On generic complexity of the quadratic resi-duosity problem | Rybalov A.N. | 243 |
5 | 2012 | Results of realization conditions analysis for information flows by memory in ROSL DP-model | Devyanin P. N. | 242 |
1 | 2009 | The degree of proximity of the boolean function reduced representation to the class of monomial functions according to basis selection | Ivanov A. V. | 241 |
6 | 2013 | On polyquadratic extension of binary | Geut Kr.L., Titov S. S. | 241 |
8 | 2015 | A secure distributed protocol in a competitive environment of a CTF contests kind | Anisenya N. I. | 240 |
9 | 2016 | HMAC obfuscation method for implementation in untrusted systems | Broslavsky O.V., Kolegov D. N., Oleksov N. E. | 240 |
9 | 2016 | LYAPAS-T into fasm translator for windows and LINUX | Knyazeva M.S., Knyazev V.N. | 240 |
3 | 2010 | The properties of external control sequences | Fomichev V. M. | 239 |
1 | 2009 | Multivalued logic in the enterprise information management system | Kucherov M. M, Kytmanov A. A. | 238 |
1 | 2009 | Towards the definition of the software subsystems integration measure | Stephantsov D.A. | 238 |
3 | 2010 | Adaptive algorithm for anomalous network traffic indication based on alternating process | Prisyazhnuk A. S., Nissenbaum O. V | 238 |
6 | 2013 | The failure of Mceliece PKC based on Reed — Muller codes | Borodin M.A., Chizhov I. V. | 238 |
8 | 2015 | Watermarking ciphers | Agibalov G. P. | 238 |
8 | 2015 | Security violation necessary conditions for time information flows in MROSL DP-model | Devyanin P. N. | 238 |
3 | 2010 | Some properties of the discrete Fourier transform in the field of complex numbers and in the fields of finite characteristics | Grishin A. M. | 237 |
4 | 2011 | On mobile agent self-location using topological properties of environment | Sapunov S. V., Grunsky I. S. | 237 |
5 | 2012 | On distributions of weight spectra for random linear binary codes | Kruglov V. I., Zubkov A.M. | 237 |
6 | 2013 | Algebraic immunity upper bound for some Dillon's bent functions | Filyuzin S. Y. | 237 |
8 | 2015 | On length, height and reliability of circuits realizing selection function | Rybakov A. V. | 237 |
3 | 2010 | Classes of graphs reconstructed with linear time complexity. | Tatarinov E. A. | 236 |
5 | 2012 | Exact computation of distributions by means of Markov chains | Filina M. V., Zubkov A. M. | 236 |
8 | 2015 | On the diversity of balls in a graph of a given diameter | Fedoryaeva T. I. | 236 |
1 | 2009 | Reduction of multicriteria selection of optimal subset tests in intelligent systems | Yankovskya A. E. | 234 |
2 | 2009 | Bent functions and their generalizations | Tokareva N. N. | 234 |
8 | 2015 | The sperner property for trees | Salii V. N. | 234 |
9 | 2016 | An algorithm for recognizing the completeness of a set of words and dynamics of prohibitions | Evdokimov A. A. | 234 |