{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:21:46Z","timestamp":1730193706134,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/acit54803.2022.9913089","type":"proceedings-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T19:53:28Z","timestamp":1665604408000},"page":"345-350","source":"Crossref","is-referenced-by-count":1,"title":["Polynomial Rabin Cryptosystem Based on the Operation of Addition"],"prefix":"10.1109","author":[{"given":"Igor","family":"Yakymenko","sequence":"first","affiliation":[{"name":"West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine"}]},{"given":"Mykhailo","family":"Kasianchuk","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine"}]},{"given":"Inna","family":"Shylinska","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Foreign Languages and Information Communication Technnologies Department,Ternopil,Ukraine"}]},{"given":"Ruslan","family":"Shevchuk","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine"}]},{"given":"Vasyl","family":"Yatskiv","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine"}]},{"given":"Mikolaj","family":"Karpinski","sequence":"additional","affiliation":[{"name":"Automatics University of Bielsko-Biala,Department of Computer Science,Bielsko-Biala,Poland"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MEMSTECH.2017.7937555"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2004.1381137"},{"journal-title":"Permutation polynomials and their applications in cryptography","year":"2012","author":"singh","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.7494\/csci.2019.20.3.3307"},{"key":"ref31","article-title":"Polynomial based RSA","author":"gafitoiu","year":"2022","journal-title":"DiVA Portal"},{"key":"ref30","first-page":"189","article-title":"ElGamal public-key cryptosystem using reducible polynomials over a finite field","author":"el-kassar","year":"2004","journal-title":"IASSE"},{"key":"ref37","first-page":"95","article-title":"Complexity of computation in finite fields","volume":"17","author":"gashkov","year":"2011","journal-title":"Fundamentalnaya i Prikladnaya Matematika"},{"key":"ref36","article-title":"Construction and analysis of computational algorithms","author":"aho","year":"2013","journal-title":"Books on Demand"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31662-3_15"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095054"},{"key":"ref10","first-page":"1","article-title":"The Rabin cryptosystem and analysis in measure of chinese reminder theorem","volume":"3","author":"arpit","year":"2013","journal-title":"Int J Sci Res Pub"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3844\/jmssp.2014.304.308"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT49673.2020.9208923"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CADSM.2017.7916120"},{"key":"ref14","first-page":"31","article-title":"Method of realization of cryptographic RSA transformations on the basis of application of modular number system","volume":"17","author":"krasnobayev","year":"2011","journal-title":"Biomedical soft computing and human sciences"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340720"},{"key":"ref16","first-page":"241","article-title":"Matrix algorithms of processing of the information flow in computer systems based on theoretical and numerical Krestenson&#x2019;s basis","author":"yakymenko","year":"2010","journal-title":"2010 International Conference on Modern Problems of Radio Engineering Telecommunications and Computer Science (TCSET)"},{"key":"ref17","first-page":"232","article-title":"The Method of Factorizing Multi-Digit Numbers Based on the Operation of Adding Odd Numbers","author":"kasianchuk","year":"2018","journal-title":"2020 10th International Conference on Advanced Computer Information Technologies (ACIT)"},{"journal-title":"Algorithms","year":"2006","author":"dasgupta","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACITT.2019.8779899"},{"key":"ref28","article-title":"Rabin public-key cryptosystem in rings of polynomials over fininte fields","author":"el-kassar","year":"2004","journal-title":"International Conference on Computer Science Software Engineering Information Technology e-Business and Applications (CSITeA)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAS.2016.7832500"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2019.8924395"},{"key":"ref3","first-page":"469","article-title":"A Survey on Cryptography Techniques","volume":"6","author":"adki","year":"2016","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-015-9192-5"},{"key":"ref29","first-page":"405","article-title":"El-Gamal public key cryptosystem in the domain of Gaussian integers","volume":"7","author":"mirza","year":"2001","journal-title":"Int J Appl Math"},{"key":"ref5","first-page":"237","article-title":"Computational Speeds Analysis of RSA and ElGamal Algorithms","volume":"i","author":"okeyinka","year":"2015","journal-title":"Proceedings of the World Congress on Engineering and Computer Science (WCECS 2015)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.56"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2012.2210916"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963826"},{"key":"ref9","first-page":"229","article-title":"Network security and cryptography techniques","volume":"9","author":"valarmathy","year":"2017","journal-title":"Networking and Communication Engineering"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-020-00231-w"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1109\/TC.2002.1017695","article-title":"Bit-parallel finite field multiplier and squarer using polynomial basis","volume":"51","author":"wu","year":"2002","journal-title":"IEEE Trans Comp"},{"key":"ref22","first-page":"477","article-title":"A lecture on the complexity of factoring polynomials over global fields","volume":"5","author":"ayad","year":"2010","journal-title":"International Mathematical Forum"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jco.2019.03.004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2017.11.010"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-60539-0_27"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgebra.2015.04.006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/computation9020009"}],"event":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2022,9,26]]},"location":"Ruzomberok, Slovakia","end":{"date-parts":[[2022,9,28]]}},"container-title":["2022 12th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9912736\/9912739\/09913089.pdf?arnumber=9913089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:30:50Z","timestamp":1667525450000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9913089\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/acit54803.2022.9913089","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}