8 | 2015 | On degree structure of graphs | Fomichev V. M. | 233 |
8 | 2015 | Implementation of covert timing channels based on http cache headers in cloud file storage services | Kolegov D. N., Broslavsky O. V., Oleksov N. E. | 233 |
8 | 2015 | Primitiveness conditions for systems of two graphs | Avezova Y. E., Fomichev V. M. | 233 |
9 | 2016 | A method for building a cryptographic generator of sequences with specified index of unrepeatability | Romanko D.A., Fomichev V. M. | 232 |
3 | 2010 | Attacks on full block cipher GOST 28147-89 with 2 or 4 related keys | Khoruzhenko G. I., Pudovkina M. A | 231 |
8 | 2015 | ⊗W, ch-markovian transformations | Pogorelov B.A., Pudovkma M. A. | 229 |
3 | 2010 | State estimation for stochastic object on the base of modeling trend in time series | Kolesnikova S. I., Belous A. A. | 227 |
4 | 2011 | "Boolean Functions" is a system for the work with boolean functions | Pavlov A. V., Kolomeec N. A. | 227 |
5 | 2012 | Analysis of algorithms of executable files in a computer emulator with a changeable specification | Burlakov A. S. | 227 |
10 | 2017 | Cryptautomata: definition, cryptanalysis, example | Agibalov G. P. | 227 |
3 | 2010 | On steganographic system selection rule | Latypov R. Kh., Razinkov E. V. | 226 |
5 | 2012 | On a counterexample to a minimal vertex -extension of starlike trees | Abrosimov M. B, Komarov D. D. | 226 |
6 | 2013 | Asymptotic solution of the recurrence relations in the analysis of splitting algorithms for sat | Bykova V. V. | 225 |
8 | 2015 | Non-invasive integrity control method for cookie in web applications | Kolegov D. N., Broslavsky O. V., Oleksov N. E. | 224 |
10 | 2017 | S-boxes algorithmic realization based on modified additive generators | Lolich D.M., Fomichev V.M., Yuzbashev A. V. | 224 |
10 | 2017 | Machine learning based anomaly detection method for SQL | Murzina A. I. | 223 |
1 | 2009 | Risk management on quality indicators. | Zolotarev V. V. | 222 |
3 | 2010 | Estimating complexity of directed enumeration in non-uniformly distributed key spaces | Teploukhova O. A., Pankratov I.V. | 222 |
9 | 2016 | On the classification of distance-transitive orbital graphs of overgroups of the jevons group | Pudovkina M. A., Pogorelov B.A. | 222 |
3 | 2010 | On weak key-scheduling algorithms relatively the related-key attack | Pudovkina M. A. | 221 |
9 | 2016 | On the hamming distance between two bent functions | Kolomeec N. A. | 221 |
9 | 2016 | On the set of derivatives of a boolean bent function | Tokareva N.N. | 221 |
8 | 2015 | Lower bounds for unreliability of circuits in the rosser - tourkett basis | Kargin S. P., Alekhina M. A. | 220 |
9 | 2016 | On the accuracy of matrix-graph approach to investigation of transformation mixing properties | Kyazhin S.N., Lebedev P. V. | 220 |
6 | 2013 | Development and implementation of mandatory access control mechanisms in DBMS MySQL | Kolegov D.N, Chernov D. V., Tkachenko N.O. | 219 |
1 | 2009 | Generalized invertibility of dynamical systems for encryption problems | Kozlovskii V.A., Kovalev A.M., Cherbak V.F. | 218 |
3 | 2010 | Formal proof of the semantic equivalence between the core of the AOP language AspectTalk and the OOP language smalltalk | Kryukova A. E., Stephantsov D. A. | 217 |
10 | 2017 | On explicit constructions for solving the problem "A secret sharing" | Sadkov P. O., Titov S. S., Kirienko K. A., Taskin R. I., Geut K. L. | 217 |
1 | 2009 | Approach to recognition of technical system state on the base of entropy conception and formalism of multisets | Bukreev V. G., Kolesnikova S. I. | 216 |
7 | 2014 | On a comparison of underdetermined alphabets | Sholomov L.A. | 216 |
10 | 2017 | The Reed - Muller code square and equivalence classes of McEliece - Sidelnikov cryptosystem private keys | Vysotskaya V. V. | 216 |
3 | 2010 | Constructing the classes of boolean functions with guaranteed cryptographic properties on the base of coordinate functions of the finite field power mappings | Romanov V.N., Ivanov A. V. | 214 |
9 | 2016 | About transitive property of mappings associated with a finite state machines from the groups asP | Karandashov M. V. | 213 |
12 | 2019 | On indices of states in finite dynamic systems of complete graphs orientations | Zharkova A. V. | 213 |
1 | 2009 | On 2 -transitivity of generalized Feistel ciphers | Pudovkina M. A. | 212 |
1 | 2009 | Path delay and multiple stuck-at fault test design for circuits derived from irredundant systems with factorized synthesis method | Morozova A. V., Andreeva V. V., Melnikov A. V., Matrosova A. Yu. | 212 |
9 | 2016 | Confidentiality preserving scheme for the algorithm raid-pir | Kosolapov Y. V., Kascheev M. R. | 211 |
10 | 2017 | The inversion of cryptographic hash functions using unbalanced approximations of round functions | Gribanova I. A. | 211 |
9 | 2016 | Generalized narayana polynomials and their q-analogues | Bondarenko L. N., Sharapova M. L. | 210 |
3 | 2010 | Application of unreliable tests for self-diagnostics of modular computing systems with multiple faults | Dimitriev Yu. K, Zadorozhny A. F. | 209 |
9 | 2016 | On differential equivalence of quadratic apn functions | Gorodilova A. A. | 208 |
9 | 2016 | On the group generated by the round functions of the block cipher kuznechik | Pudovkina M. A., Vlasova V. V. | 208 |
1 | 2009 | Analysis of perturbed quantization stegosystems | Latypov R. Kh., Razinkov E. V. | 207 |
9 | 2016 | Mixing properties of 2-cascade generators | Fomichev V. M., Kyazhin S.N. | 207 |
9 | 2016 | Undeniable onion routing protocol with message creation time verification | Anisenya N. I. | 207 |
10 | 2017 | Lower bounds of dimension of linear codes for CDMA | Odinokikh N. S. | 207 |
11 | 2018 | Vectorial 2-to-1 functions as subfunctions of apn permutations | Idrisova V.A. | 207 |
8 | 2015 | Solving linear inequalities systems with local search algorithms | Anashkina N. V., Shurupov A.N. | 206 |
9 | 2016 | To cryptanalysis of 2-cascade finite automata cryptographic generators | Pankratova I. A., Agibalov G. P. | 206 |
3 | 2010 | Elasticity of algorithms | Bykova V. V. | 205 |