{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:39:06Z","timestamp":1743133146806,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030632694"},{"type":"electronic","value":"9783030632700"}],"license":[{"start":{"date-parts":[[2020,12,23]],"date-time":"2020-12-23T00:00:00Z","timestamp":1608681600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,23]],"date-time":"2020-12-23T00:00:00Z","timestamp":1608681600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-63270-0_43","type":"book-chapter","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T08:03:09Z","timestamp":1608624189000},"page":"628-639","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Theoretical Bases for Reducing the Time Complexity of the Rabin Cryptosystem"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4469-8055","authenticated-orcid":false,"given":"Mykhailo","family":"Kasianchuk","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3446-1596","authenticated-orcid":false,"given":"Ihor","family":"Yakymenko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8846-332X","authenticated-orcid":false,"given":"Mikolaj","family":"Karpinski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5381-9528","authenticated-orcid":false,"given":"Ruslan","family":"Shevchuk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9069-7264","authenticated-orcid":false,"given":"Volodymyr","family":"Karpinskyi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0700-793X","authenticated-orcid":false,"given":"Inna","family":"Shylinska","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,23]]},"reference":[{"issue":"9","key":"43_CR1","first-page":"229","volume":"9","author":"N Valarmathy","year":"2017","unstructured":"Valarmathy, N., Vishnupriya, P.: Network security and cryptography techniques. Netw. Commun. Eng. 9(9), 229\u2013231 (2017)","journal-title":"Netw. Commun. Eng."},{"key":"43_CR2","unstructured":"Okeyinka, A.: Computational speeds analysis of RSA and ElGamal algorithms. In: Proceedings of the World Congress on Engineering and Computer Science (WCECS), pp. 237\u2013242, San Francisco, USA (2015)"},{"issue":"6","key":"43_CR3","first-page":"469","volume":"6","author":"V Adki","year":"2016","unstructured":"Adki, V., Hatkar, S.: A survey on cryptography techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(6), 469\u2013475 (2016)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"43_CR4","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th Prentice Hall Press Upper Saddle River, New York (2010)"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Andrijchuk, V.A., Kuritnyk,, I.P., Kasyanchuk, M.M., Karpinski, M.P.: Modern algorithms and methods of the person biometric identification. In: Proceedings of the Third IEEE Workshop Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp. 403\u2013406, Sofia, Bulgaria (2005)","DOI":"10.1109\/IDAACS.2005.283012"},{"key":"43_CR6","unstructured":"Menezes, A., van Oorschot P., Vanstone S.: Handbook of Applied Cryptography. CRC Press (2003)"},{"issue":"8","key":"43_CR7","first-page":"55","volume":"5","author":"AJ Amalraj","year":"2016","unstructured":"Amalraj, A.J., Raybin Jose, J.J.: A survey paper on cryptography techniques. Int. J. Comput. Sci. Mob. Comput. 5(8), 55\u201359 (2016)","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Yakymenko, I.Z., Kasianchuk, M.M., Ivasiev, S.V., Melnyk, A.M., Nykolaichuk, Y.M.: Realization of RSA cryptographic algorithm based on vector-module method of modular exponention. In: Proceedings of the XIV\u2013th International Conference Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), pp. 550\u2013554, Lviv\u2013Slavske, Ukraine (2018)","DOI":"10.1109\/TCSET.2018.8336262"},{"key":"43_CR9","volume-title":"Cryptanalytic Attacks on RSA","author":"Y Song","year":"2008","unstructured":"Song, Y.: Cryptanalytic Attacks on RSA. Springer Science and Business Media Inc, Boston (2008)"},{"key":"43_CR10","unstructured":"Yakymenko, I., Kasyanchuk, M., Nykolaychuk, Y.: Matrix algorithms of processing of the information flow in computer systems based on theoretical and numerical krestenson\u2019s basis. In: Proceedings of the X\u2013th International Conference Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), p. 241, Lviv\u2013Slavske, Ukraine (2010)"},{"key":"43_CR11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139165464","volume-title":"Computational Introduction to Number Theory and Algebra","author":"VA Shoup","year":"2005","unstructured":"Shoup, V.A.: Computational Introduction to Number Theory and Algebra. Cambridge University Press, New York (2005)"},{"issue":"6","key":"43_CR12","first-page":"1","volume":"3","author":"K Arpit","year":"2013","unstructured":"Arpit, K., Mathur, A.: The Rabin cryptosystem and analysis in measure of chinese reminder theorem. Int. J. Sci. Res. Publ. 3(6), 1\u20134 (2013)","journal-title":"Int. J. Sci. Res. Publ."},{"issue":"3","key":"43_CR13","doi-asserted-by":"publisher","first-page":"304","DOI":"10.3844\/jmssp.2014.304.308","volume":"10","author":"RH Hayder","year":"2014","unstructured":"Hayder, R.H.: H-Rabim cryptosystem. J. Math. Stat. 10(3), 304\u2013308 (2014)","journal-title":"J. Math. Stat."},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Karpi\u0144ski, M., Ivasiev, S., Yakymenko, I., Kasianchuk, M., Gancarczyk, T.: Advanced method of factorization of multi-bit numbers based on Fermat\u2019s theorem in the system of residual classes. In: Proceedings of 16th International Conference on Control, Automation and Systems (ICCAS), pp. 1484\u20131486, Gyeongju, Korea (2016)","DOI":"10.1109\/ICCAS.2016.7832500"},{"issue":"6","key":"43_CR15","first-page":"1","volume":"3","author":"A Srivastava","year":"2013","unstructured":"Srivastava, A., Mathur, A.: The Rabin cryptosystem and analysis in measure of chinese reminder theorem. Int. J. Sci. Res. Publ. 3(6), 1\u20134 (2013)","journal-title":"Int. J. Sci. Res. Publ."},{"key":"43_CR16","unstructured":"Dasgupta, S., Papadimitriou C., Vazirani U.: Algorithms. McGraw-Hill Science, Engineering (2006)"},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Karpinski, M., Rajba, S., Zawislak, S., Warwas, K., Kasianchuk, M., Ivasiev, S., Yakymenko, I.: A method for decimal number recovery from its residues based on the addition of the product modules. In: Proceedings of the 10th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp. 13\u201317, Metz, France (2019)","DOI":"10.1109\/IDAACS.2019.8924395"},{"issue":"1","key":"43_CR18","first-page":"62","volume":"9","author":"M Deryabin","year":"2018","unstructured":"Deryabin, M., Chervyakov, N., Tchernykh, A., Babenko, M., Shabalina, M.: High performance parallel computing in residue number system. Int. J. Comb. Optim. Prob. Inform. 9(1), 62\u201367 (2018)","journal-title":"Int. J. Comb. Optim. Prob. Inform."},{"key":"43_CR19","doi-asserted-by":"publisher","DOI":"10.1142\/p523","volume-title":"Residue Number System: Theory and Implementation","author":"A Omondi","year":"2007","unstructured":"Omondi, A., Premkumar, B.: Residue Number System: Theory and Implementation. Imperial College Press, United Kingdom (2007)"},{"key":"43_CR20","doi-asserted-by":"crossref","unstructured":"Ananda Mohan, P.V.: Residue Number Systems: Theory and Applications. Birkh\u00e4user (2016)","DOI":"10.1007\/978-3-319-41385-3"},{"issue":"1","key":"43_CR21","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10559-016-9809-2","volume":"52","author":"VA Krasnobayev","year":"2016","unstructured":"Krasnobayev, V.A., Yanko, A.S., Koshman, S.A.: Method for arithmetic comparison of data represented in a residue number system. Cybern. Syst. Anal. 52(1), 145\u2013150 (2016)","journal-title":"Cybern. Syst. Anal."},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Krulikovskyi, B., Volynskyy, O., Davletova, A., Kimak, V.: Theoretical foundations synthesis of components and accelerators for Haar\u2019s, Rademacher\u2019s and Krestenson\u2019s basis multi-digit processors. In: Proceedings of the 13th International Conference Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), pp. 129\u2013133, Svaliava Ukraine (2015)","DOI":"10.1109\/CADSM.2015.7230816"},{"key":"43_CR23","doi-asserted-by":"crossref","unstructured":"Yatskiv, V., Tsavolyk, T., Yatskiv, N.: The correcting codes formation method based on the residue number system. In: Proceedings of the 14th International Conference Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), pp. 237\u2013240, Lviv - Polyana, Ukraine (2017)","DOI":"10.1109\/CADSM.2017.7916124"},{"issue":"136","key":"43_CR24","first-page":"51","volume":"5","author":"VA Krasnobayev","year":"2015","unstructured":"Krasnobayev, V.A., Yanko, A.S., Koshman, S.A.: The method of error correction in the system of residual classes. Nauka i Studia 5(136), 51\u201362 (2015)","journal-title":"Nauka i Studia"},{"key":"43_CR25","doi-asserted-by":"crossref","unstructured":"Kasianchuk, M., Yakymenko, I., Pazdriy, I., Melnyk, A., Ivasiev, S.: Rabin\u2019s modified method of encryption using various forms of system of residual classes. In: Proceedings of the XIV International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), pp. 222\u2013224, Polyana-Svalyava, Ukraine (2017)","DOI":"10.1109\/CADSM.2017.7916120"},{"key":"43_CR26","doi-asserted-by":"crossref","unstructured":"Kasianchuk, M., Yakymenko, I., Pazdriy, I., Zastavnyy, O.: Algorithms of findings of perfect shape modules of remaining classes system. In: Proceedings of the XIII International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), pp. 168\u2013171, Polyana-Svalyava (2015)","DOI":"10.1109\/CADSM.2015.7230866"},{"key":"43_CR27","unstructured":"Kasianchuk, M.N, Nykolaychuk, Y.N., Yakymenko, I.Z.: Theory and methods of constructing of modules system of the perfect modified form of the system of residual classes. J. Autom. Inform. Sci. 48(8), 56\u201363 (2016)"},{"key":"43_CR28","doi-asserted-by":"crossref","unstructured":"Li, Y., Xiao, L., Liang, A., Zheng, Y., Ruan, L.: Fast Parallel Garner Algorithm for Chinese Remainder Theorem IFIP International Conference on Network and Parallel Computing NPC. and Parallel Computin, pp. 164\u2013171 (2012)","DOI":"10.1007\/978-3-642-35606-3_19"},{"key":"43_CR29","doi-asserted-by":"crossref","unstructured":"Ivasiev, S., Yakymenko, I., Kasianchuk, M., Shevchuk, R., Karpinski, M., Gomotiuk, O.: Effective algorithms for finding the remainder of multi-digit numbers. In: Proceedings of the International Conference Advanced Computer Information Technology (ACIT), pp. 175\u2013178, Ceske Budejovice, Czech Republic (2019)","DOI":"10.1109\/ACITT.2019.8779899"},{"key":"43_CR30","unstructured":"Beuchat, J.-L.: Some Modular Adder and Multipliers for Field Programmable Gate Arrays. In: Parallel and Distributed Processing: IEEE Proceedings of International Symposium, vol. 17, pp. 8\u201311 (2010)"},{"issue":"7","key":"43_CR31","first-page":"151","volume":"51","author":"H Wu","year":"2002","unstructured":"Wu, H.: Bit-parallel finite field multiplier and squarer using polynomial basis. IEEE Trans. Comput. 51(7), 151\u2013155 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"43_CR32","doi-asserted-by":"crossref","unstructured":"Hardy, G.H., Wright, E.M., Wiles, A.: An Introduction to the Theory of Numbers. Oxford University Press (2008)","DOI":"10.1093\/oso\/9780199219858.001.0001"},{"key":"43_CR33","unstructured":"Jeffrey, H., Jill, P., Joseph, H.: An Introduction to Mathematical Cryptography. Springer, Berlin, Germany (2008)"},{"issue":"11","key":"43_CR34","first-page":"9","volume":"8","author":"H Zhengbing","year":"2016","unstructured":"Zhengbing, H., Dychka, I., Onai, M., Bartkoviak, A.: The analysis and investigation of multiplicative inverse searching methods in the ring of integers modulo M. Int. J. Intel. Syst. Appl. 8(11), 9\u201318 (2016)","journal-title":"Int. J. Intel. Syst. Appl."},{"key":"43_CR35","doi-asserted-by":"crossref","unstructured":"Rajba, T. Klos-Witkowska, A., Ivasiev, S., Yakymenko, I., Kasianchuk, M.: Research of time characteristics of search methods of inverse element by the module. In.: Proceedings of the 2017 IEEE 9th International Conference Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp. 82\u201385, Bucharest, Romania (2017)","DOI":"10.1109\/IDAACS.2017.8095054"},{"key":"43_CR36","unstructured":"Parthasarathy, S.: Multiplicative inverse in mod(m). Algologic Technical Report, pp. 1\u20133 (2012)"},{"key":"43_CR37","doi-asserted-by":"crossref","unstructured":"Kozaczko, D., Ivasiev, S., Yakymenko, I., Kasianchuk, M.: Vector module exponential in the remaining classes system. In.: Proceedings of the 2015 IEEE 8th International Conference Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp. 161\u2013163, Warsaw, Poland (2015)","DOI":"10.1109\/IDAACS.2015.7340720"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Intelligent Systems and Computing V"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63270-0_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T21:13:40Z","timestamp":1724102020000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63270-0_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,23]]},"ISBN":["9783030632694","9783030632700"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63270-0_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,12,23]]},"assertion":[{"value":"23 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Computer Science and Information Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zbarazh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"V","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csit2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csit.lp.edu.ua","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}