Issues

IssueYearTitleAuthorsDownloads
82015On intersection of derivatives images for apn functionsGorodilova A. A.251
82015⊗W, ch-markovian and imprimitive properties of block ciphersPudovkina M. A., Pogorelov B. A.251
82015Application of algorithms solving sat problem to cryptanalysis of hash functions of MD familyBogachkova I. A., Otpuschennikov I. V., Kochemazov S.E., Semenov A. A., Zaikin O.S.251
42011On attractors of dynamical systems associated with cyclesVlasova A. V.250
52012A method for seed recovering in the linear generator over the finite field complicated by mask addingVolgin A. V., Ivanov A. V.250
82015On self dual bent functionsKutsenko A. V.250
92016Necessary condition for maximum component algebraic immunity of a vectorial boolean functionPokrasenko D. P.250
82015Mixing digraphs of transformations based on shift registers with two feedbacksDorokhova A.M.249
82015Non-invasive method of mandatory access control implementaion on dbms layer in web applicationsTkachenko N. O., Kolegov D. N.249
92016On special class of vectorial boolean functions and the problem of apn permutations existenceVitkup V.A.249
92016Estimations of cryptographic resistance of ciphers in the trivium family to sat-based cryptanalysisSemenov A. A., Otpuschennikov I. V., Zaikin O.S.249
92016Analogues of the shannon theorem for non-minimal endomorphic perfect ciphersMedvedeva N. V., Titov S. S.249
122019about modeling of mic and mac in postgresql within framework of the mrosl dp-modelDevyanin P. N.249
12009Algorithms for generation of rooted tree on the base of total partition procedureKruchinin V. V.248
82015Unreliability of circuits in case of constant failures on inputs and outputs of gatesAlekhina M. A.248
82015A lower bound for unreliability of circuits in the webb basisAlekhina M. A., Barsukova O. U.248
72014About primitiveness of self-decimated generator's mixing matricesAvezova Y.E., Fomichev V. M.247
82015Low power race-free state assignment of an asynchronous automatonPottosin Yu. V.247
32010Differential at tack on 6-round whirlpoollike block ciphersPudovkina M. A.246
82015Ciphertexts-only attack on a linear fully ho-momorphic cryptosystemTrepacheva A. V.246
22009Combinatorics-algebraic models in cryptographySkobelev V. G.245
52012Based on SELinux mandatory access control in database management system MySQLTkachenko N. O.245
72014Development of automated means for proving programs propertiesStefantsov D. A., Zhukovskaya A. O.245
82015Non-endomorphic perfect ciphers with two elements in plaintext alphabetTitov S. S., Medvedeva N. V.243
82015On generic complexity of the quadratic resi-duosity problemRybalov A.N.243
52012Results of realization conditions analysis for information flows by memory in ROSL DP-modelDevyanin P. N.242
12009The degree of proximity of the boolean function reduced representation to the class of monomial functions according to basis selectionIvanov A. V.241
62013On polyquadratic extension of binaryGeut Kr.L., Titov S. S.241
82015A secure distributed protocol in a competitive environment of a CTF contests kindAnisenya N. I.240
92016HMAC obfuscation method for implementation in untrusted systemsBroslavsky O.V., Kolegov D. N., Oleksov N. E.240
92016LYAPAS-T into fasm translator for windows and LINUXKnyazeva M.S., Knyazev V.N.240
32010The properties of external control sequencesFomichev V. M.239
12009Multivalued logic in the enterprise information management systemKucherov M. M, Kytmanov A. A.238
12009Towards the definition of the software subsystems integration measureStephantsov D.A.238
32010Adaptive algorithm for anomalous network traffic indication based on alternating processPrisyazhnuk A. S., Nissenbaum O. V238
62013The failure of Mceliece PKC based on Reed — Muller codesBorodin M.A., Chizhov I. V.238
82015Watermarking ciphersAgibalov G. P.238
82015Security violation necessary conditions for time information flows in MROSL DP-modelDevyanin P. N.238
32010Some properties of the discrete Fourier transform in the field of complex numbers and in the fields of finite characteristicsGrishin A. M.237
42011On mobile agent self-location using topological properties of environmentSapunov S. V., Grunsky I. S.237
52012On distributions of weight spectra for random linear binary codesKruglov V. I., Zubkov A.M.237
62013Algebraic immunity upper bound for some Dillon's bent functionsFilyuzin S. Y.237
82015On length, height and reliability of circuits realizing selection functionRybakov A. V.237
32010Classes of graphs reconstructed with linear time complexity.Tatarinov E. A.236
52012Exact computation of distributions by means of Markov chainsFilina M. V., Zubkov A. M.236
82015On the diversity of balls in a graph of a given diameterFedoryaeva T. I.236
12009Reduction of multicriteria selection of optimal subset tests in intelligent systemsYankovskya A. E.234
22009Bent functions and their generalizationsTokareva N. N.234
82015The sperner property for treesSalii V. N.234
92016An algorithm for recognizing the completeness of a set of words and dynamics of prohibitionsEvdokimov A. A.234
Страница 8 из 16 1...56789101112...16
Всего: 763