Issues

IssueYearTitleAuthorsDownloads
82015On degree structure of graphsFomichev V. M.234
82015Implementation of covert timing channels based on http cache headers in cloud file storage servicesBroslavsky O. V., Oleksov N. E., Kolegov D. N.234
82015Primitiveness conditions for systems of two graphsAvezova Y. E., Fomichev V. M.234
92016A method for building a cryptographic generator of sequences with specified index of unrepeatabilityFomichev V. M., Romanko D.A.233
32010Attacks on full block cipher GOST 28147-89 with 2 or 4 related keysKhoruzhenko G. I., Pudovkina M. A231
82015⊗W, ch-markovian transformationsPogorelov B.A., Pudovkma M. A.229
32010State estimation for stochastic object on the base of modeling trend in time seriesKolesnikova S. I., Belous A. A.228
52012On a counterexample to a minimal vertex -extension of starlike treesAbrosimov M. B, Komarov D. D.228
102017Cryptautomata: definition, cryptanalysis, exampleAgibalov G. P.228
42011"Boolean Functions" is a system for the work with boolean functionsPavlov A. V., Kolomeec N. A.227
52012Analysis of algorithms of executable files in a computer emulator with a changeable specificationBurlakov A. S.227
32010On steganographic system selection ruleLatypov R. Kh., Razinkov E. V.226
62013Asymptotic solution of the recurrence relations in the analysis of splitting algorithms for satBykova V. V.225
102017S-boxes algorithmic realization based on modified additive generatorsLolich D.M., Fomichev V.M., Yuzbashev A. V.225
102017Machine learning based anomaly detection method for SQLMurzina A. I.225
82015Non-invasive integrity control method for cookie in web applicationsBroslavsky O. V., Oleksov N. E., Kolegov D. N.224
12009Risk management on quality indicators.Zolotarev V. V.222
32010On weak key-scheduling algorithms relatively the related-key attackPudovkina M. A.222
32010Estimating complexity of directed enumeration in non-uniformly distributed key spacesTeploukhova O. A., Pankratov I.V.222
92016On the classification of distance-transitive orbital graphs of overgroups of the jevons groupPogorelov B.A., Pudovkina M. A.222
92016On the set of derivatives of a boolean bent functionTokareva N.N.222
62013Development and implementation of mandatory access control mechanisms in DBMS MySQLTkachenko N.O., Kolegov D.N, Chernov D. V.221
82015Lower bounds for unreliability of circuits in the rosser - tourkett basisAlekhina M. A., Kargin S. P.221
92016On the hamming distance between two bent functionsKolomeec N. A.221
92016On the accuracy of matrix-graph approach to investigation of transformation mixing propertiesKyazhin S.N., Lebedev P. V.220
12009Generalized invertibility of dynamical systems for encryption problemsCherbak V.F., Kozlovskii V.A., Kovalev A.M.219
102017On explicit constructions for solving the problem "A secret sharing"Sadkov P. O., Titov S. S., Kirienko K. A., Taskin R. I., Geut K. L.219
32010Formal proof of the semantic equivalence between the core of the AOP language AspectTalk and the OOP language smalltalkKryukova A. E., Stephantsov D. A.218
102017The Reed - Muller code square and equivalence classes of McEliece - Sidelnikov cryptosystem private keysVysotskaya V. V.218
12009Approach to recognition of technical system state on the base of entropy conception and formalism of multisetsKolesnikova S. I., Bukreev V. G.216
72014On a comparison of underdetermined alphabetsSholomov L.A.216
122019On indices of states in finite dynamic systems of complete graphs orientationsZharkova A. V.215
32010Constructing the classes of boolean functions with guaranteed cryptographic properties on the base of coordinate functions of the finite field power mappingsIvanov A. V., Romanov V.N.214
12009Path delay and multiple stuck-at fault test design for circuits derived from irredundant systems with factorized synthesis methodMatrosova A. Yu., Morozova A. V., Andreeva V. V., Melnikov A. V.213
92016About transitive property of mappings associated with a finite state machines from the groups asPKarandashov M. V.213
12009On 2 -transitivity of generalized Feistel ciphersPudovkina M. A.212
102017The inversion of cryptographic hash functions using unbalanced approximations of round functionsGribanova I. A.212
92016Generalized narayana polynomials and their q-analoguesSharapova M. L., Bondarenko L. N.211
92016Confidentiality preserving scheme for the algorithm raid-pirKosolapov Y. V., Kascheev M. R.211
32010Application of unreliable tests for self-diagnostics of modular computing systems with multiple faultsZadorozhny A. F., Dimitriev Yu. K210
112018Vectorial 2-to-1 functions as subfunctions of apn permutationsIdrisova V.A.210
12009Analysis of perturbed quantization stegosystemsLatypov R. Kh., Razinkov E. V.208
92016On differential equivalence of quadratic apn functionsGorodilova A. A.208
92016On the group generated by the round functions of the block cipher kuznechikVlasova V. V., Pudovkina M. A.208
102017Lower bounds of dimension of linear codes for CDMAOdinokikh N. S.208
92016To cryptanalysis of 2-cascade finite automata cryptographic generatorsAgibalov G. P., Pankratova I. A.207
92016Mixing properties of 2-cascade generatorsKyazhin S.N., Fomichev V. M.207
92016Undeniable onion routing protocol with message creation time verificationAnisenya N. I.207
32010Elasticity of algorithmsBykova V. V.206
82015Solving linear inequalities systems with local search algorithmsAnashkina N. V., Shurupov A.N.206
Страница 9 из 16 1...678910111213...16
Всего: 763