Issues

IssueYearTitleAuthorsDownloads
82015On degree structure of graphsFomichev V. M.233
82015Implementation of covert timing channels based on http cache headers in cloud file storage servicesKolegov D. N., Broslavsky O. V., Oleksov N. E.233
82015Primitiveness conditions for systems of two graphsAvezova Y. E., Fomichev V. M.233
92016A method for building a cryptographic generator of sequences with specified index of unrepeatabilityRomanko D.A., Fomichev V. M.232
32010Attacks on full block cipher GOST 28147-89 with 2 or 4 related keysKhoruzhenko G. I., Pudovkina M. A231
82015⊗W, ch-markovian transformationsPogorelov B.A., Pudovkma M. A.229
32010State estimation for stochastic object on the base of modeling trend in time seriesKolesnikova S. I., Belous A. A.227
42011"Boolean Functions" is a system for the work with boolean functionsPavlov A. V., Kolomeec N. A.227
52012Analysis of algorithms of executable files in a computer emulator with a changeable specificationBurlakov A. S.227
102017Cryptautomata: definition, cryptanalysis, exampleAgibalov G. P.227
32010On steganographic system selection ruleLatypov R. Kh., Razinkov E. V.226
52012On a counterexample to a minimal vertex -extension of starlike treesAbrosimov M. B, Komarov D. D.226
62013Asymptotic solution of the recurrence relations in the analysis of splitting algorithms for satBykova V. V.225
82015Non-invasive integrity control method for cookie in web applicationsKolegov D. N., Broslavsky O. V., Oleksov N. E.224
102017S-boxes algorithmic realization based on modified additive generatorsLolich D.M., Fomichev V.M., Yuzbashev A. V.224
102017Machine learning based anomaly detection method for SQLMurzina A. I.223
12009Risk management on quality indicators.Zolotarev V. V.222
32010Estimating complexity of directed enumeration in non-uniformly distributed key spacesTeploukhova O. A., Pankratov I.V.222
92016On the classification of distance-transitive orbital graphs of overgroups of the jevons groupPudovkina M. A., Pogorelov B.A.222
32010On weak key-scheduling algorithms relatively the related-key attackPudovkina M. A.221
92016On the hamming distance between two bent functionsKolomeec N. A.221
92016On the set of derivatives of a boolean bent functionTokareva N.N.221
82015Lower bounds for unreliability of circuits in the rosser - tourkett basisKargin S. P., Alekhina M. A.220
92016On the accuracy of matrix-graph approach to investigation of transformation mixing propertiesKyazhin S.N., Lebedev P. V.220
62013Development and implementation of mandatory access control mechanisms in DBMS MySQLKolegov D.N, Chernov D. V., Tkachenko N.O.219
12009Generalized invertibility of dynamical systems for encryption problemsKozlovskii V.A., Kovalev A.M., Cherbak V.F.218
32010Formal proof of the semantic equivalence between the core of the AOP language AspectTalk and the OOP language smalltalkKryukova A. E., Stephantsov D. A.217
102017On explicit constructions for solving the problem "A secret sharing"Sadkov P. O., Titov S. S., Kirienko K. A., Taskin R. I., Geut K. L.217
12009Approach to recognition of technical system state on the base of entropy conception and formalism of multisetsBukreev V. G., Kolesnikova S. I.216
72014On a comparison of underdetermined alphabetsSholomov L.A.216
102017The Reed - Muller code square and equivalence classes of McEliece - Sidelnikov cryptosystem private keysVysotskaya V. V.216
32010Constructing the classes of boolean functions with guaranteed cryptographic properties on the base of coordinate functions of the finite field power mappingsRomanov V.N., Ivanov A. V.214
92016About transitive property of mappings associated with a finite state machines from the groups asPKarandashov M. V.213
122019On indices of states in finite dynamic systems of complete graphs orientationsZharkova A. V.213
12009On 2 -transitivity of generalized Feistel ciphersPudovkina M. A.212
12009Path delay and multiple stuck-at fault test design for circuits derived from irredundant systems with factorized synthesis methodMorozova A. V., Andreeva V. V., Melnikov A. V., Matrosova A. Yu.212
92016Confidentiality preserving scheme for the algorithm raid-pirKosolapov Y. V., Kascheev M. R.211
102017The inversion of cryptographic hash functions using unbalanced approximations of round functionsGribanova I. A.211
92016Generalized narayana polynomials and their q-analoguesBondarenko L. N., Sharapova M. L.210
32010Application of unreliable tests for self-diagnostics of modular computing systems with multiple faultsDimitriev Yu. K, Zadorozhny A. F.209
92016On differential equivalence of quadratic apn functionsGorodilova A. A.208
92016On the group generated by the round functions of the block cipher kuznechikPudovkina M. A., Vlasova V. V.208
12009Analysis of perturbed quantization stegosystemsLatypov R. Kh., Razinkov E. V.207
92016Mixing properties of 2-cascade generatorsFomichev V. M., Kyazhin S.N.207
92016Undeniable onion routing protocol with message creation time verificationAnisenya N. I.207
102017Lower bounds of dimension of linear codes for CDMAOdinokikh N. S.207
112018Vectorial 2-to-1 functions as subfunctions of apn permutationsIdrisova V.A.207
82015Solving linear inequalities systems with local search algorithmsAnashkina N. V., Shurupov A.N.206
92016To cryptanalysis of 2-cascade finite automata cryptographic generatorsPankratova I. A., Agibalov G. P.206
32010Elasticity of algorithmsBykova V. V.205
Страница 9 из 16 1...678910111213...16
Всего: 763