Issues

IssueYearTitleAuthorsDownloads
12009APN-functionsTuzhilin M. E.251
52012On almost balanced boolean functionsPotapov V. N.251
82015On intersection of derivatives images for apn functionsGorodilova A. A.251
82015On self dual bent functionsKutsenko A. V.251
82015⊗W, ch-markovian and imprimitive properties of block ciphersPogorelov B. A., Pudovkina M. A.251
42011On attractors of dynamical systems associated with cyclesVlasova A. V.250
52012A method for seed recovering in the linear generator over the finite field complicated by mask addingIvanov A. V., Volgin A. V.250
82015Mixing digraphs of transformations based on shift registers with two feedbacksDorokhova A.M.250
82015Non-invasive method of mandatory access control implementaion on dbms layer in web applicationsKolegov D. N., Tkachenko N. O.250
92016Analogues of the shannon theorem for non-minimal endomorphic perfect ciphersTitov S. S., Medvedeva N. V.250
122019about modeling of mic and mac in postgresql within framework of the mrosl dp-modelDevyanin P. N.250
82015Unreliability of circuits in case of constant failures on inputs and outputs of gatesAlekhina M. A.249
82015A lower bound for unreliability of circuits in the webb basisAlekhina M. A., Barsukova O. U.249
92016On special class of vectorial boolean functions and the problem of apn permutations existenceVitkup V.A.249
92016Estimations of cryptographic resistance of ciphers in the trivium family to sat-based cryptanalysisOtpuschennikov I. V., Zaikin O.S., Semenov A. A.249
12009Algorithms for generation of rooted tree on the base of total partition procedureKruchinin V. V.248
72014About primitiveness of self-decimated generator's mixing matricesFomichev V. M., Avezova Y.E.247
82015Low power race-free state assignment of an asynchronous automatonPottosin Yu. V.247
22009Combinatorics-algebraic models in cryptographySkobelev V. G.246
32010Differential at tack on 6-round whirlpoollike block ciphersPudovkina M. A.246
72014Development of automated means for proving programs propertiesStefantsov D. A., Zhukovskaya A. O.246
82015Ciphertexts-only attack on a linear fully ho-momorphic cryptosystemTrepacheva A. V.246
52012Based on SELinux mandatory access control in database management system MySQLTkachenko N. O.245
82015Non-endomorphic perfect ciphers with two elements in plaintext alphabetMedvedeva N. V., Titov S. S.244
82015On generic complexity of the quadratic resi-duosity problemRybalov A.N.244
52012Results of realization conditions analysis for information flows by memory in ROSL DP-modelDevyanin P. N.243
12009The degree of proximity of the boolean function reduced representation to the class of monomial functions according to basis selectionIvanov A. V.242
62013On polyquadratic extension of binaryTitov S. S., Geut Kr.L.242
82015A secure distributed protocol in a competitive environment of a CTF contests kindAnisenya N. I.241
92016HMAC obfuscation method for implementation in untrusted systemsKolegov D. N., Oleksov N. E., Broslavsky O.V.241
92016LYAPAS-T into fasm translator for windows and LINUXKnyazev V.N., Knyazeva M.S.241
32010The properties of external control sequencesFomichev V. M.239
32010Adaptive algorithm for anomalous network traffic indication based on alternating processPrisyazhnuk A. S., Nissenbaum O. V239
62013The failure of Mceliece PKC based on Reed — Muller codesChizhov I. V., Borodin M.A.239
82015Watermarking ciphersAgibalov G. P.239
82015Security violation necessary conditions for time information flows in MROSL DP-modelDevyanin P. N.239
12009Multivalued logic in the enterprise information management systemKytmanov A. A., Kucherov M. M238
12009Towards the definition of the software subsystems integration measureStephantsov D.A.238
42011On mobile agent self-location using topological properties of environmentGrunsky I. S., Sapunov S. V.238
52012On distributions of weight spectra for random linear binary codesZubkov A.M., Kruglov V. I.238
62013Algebraic immunity upper bound for some Dillon's bent functionsFilyuzin S. Y.238
32010Some properties of the discrete Fourier transform in the field of complex numbers and in the fields of finite characteristicsGrishin A. M.237
52012Exact computation of distributions by means of Markov chainsFilina M. V., Zubkov A. M.237
82015On length, height and reliability of circuits realizing selection functionRybakov A. V.237
82015On the diversity of balls in a graph of a given diameterFedoryaeva T. I.237
32010Classes of graphs reconstructed with linear time complexity.Tatarinov E. A.236
82015The sperner property for treesSalii V. N.235
92016An algorithm for recognizing the completeness of a set of words and dynamics of prohibitionsEvdokimov A. A.235
12009Reduction of multicriteria selection of optimal subset tests in intelligent systemsYankovskya A. E.234
22009Bent functions and their generalizationsTokareva N. N.234
Страница 8 из 16 1...56789101112...16
Всего: 763