{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:41:58Z","timestamp":1760074918596,"version":"build-2065373602"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185734","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"461-465","source":"Crossref","is-referenced-by-count":0,"title":["Combined Asymmetric Encryption Algorithm with Error Correction"],"prefix":"10.1109","author":[{"given":"Alina","family":"Davletova","sequence":"first","affiliation":[{"name":"West Ukrainian National University,Deparlament of Cyber Security,Ternopil,Ukraine"}]},{"given":"Vasyl","family":"Yatskiv","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Deparlament of Cyber Security,Ternopil,Ukraine"}]},{"given":"Stepan","family":"Ivasiev","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Deparlament of Cyber Security,Ternopil,Ukraine"}]},{"given":"Taras","family":"Tsavolyk","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Deparlament of Cyber Security,Ternopil,Ukraine"}]},{"given":"Ivan","family":"Albanskiy","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Deparlament of Specialized Computer Systems,Ternopil,Ukraine"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2307\/2007884"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-024-4163-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.70121\/001c.127168"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/technologies12120241"},{"journal-title":"Implementation of Encryption Algorithms in Classical and Quantum Computing: A comparative Analysis","year":"2024","author":"Akshay","key":"ref7"},{"volume-title":"Two RSA-based Cryptosystems","year":"2024","author":"Telveenus","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAET.2022.123996"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICAST55766.2022.10039627"},{"volume-title":"Cryptographic Algorithms and Key Sizes for Personal Identity Verification","year":"2024","author":"Ferraiolo","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT62333.2024.10712491"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s23125379"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/sym17020259"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/cadsm.2017.7916120"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/dt.2016.7557161"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/iccas.2016.7832500"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5755\/j01.eee.21.1.6657"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/idaacs-sws.2014.6954630"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2004.1381137"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2000.860811"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.15587\/1729-4061.2018.149596"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.31891\/1727-6209\/2020\/19\/1-70-77"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s22176444"},{"key":"ref25","first-page":"197","article-title":"An Internet of Drone-based Multi-Version Post-severe Accident Monitoring System: Structures and Reliability","volume-title":"book Dependable IoT for Human and Industry - Modeling Architecting Implementation","author":"Herman","year":"2018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/cpee.2015.7333363"},{"issue":"6","key":"ref27","first-page":"275","article-title":"Spectral analysis of the information signal in the task of identifying the recurrent laryngeal nerve in thyroid surgery","volume":"89","author":"Dyvak","year":"2013","journal-title":"Przeglad Elektrotechniczny"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s24134246"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/en17143537"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92435-5_27"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/acit58437.2023.10275654"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/5584750"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/cadsm.2015.7230813"},{"key":"ref34","first-page":"262","article-title":"Structure identification of interval difference operator for control the production process of drywall","volume-title":"International Conference on the Experience of Designing and Application of CAD Systems in Microelectronics (CADSM)","author":"Ocheretnyuk"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/acitt.2019.8779897"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IMTC.1999.776072"},{"key":"ref37","first-page":"232","article-title":"The method of factorizing multi-digit numbers based on the operation of adding odd numbers","volume-title":"International Conference Advanced Computer Information Technologies, ACIT 2018","author":"Kasianchuk"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14311\/ap.2018.58.0017"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3411632"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/idaacs.2013.6663017"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.15.3.851"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/1521-3951(200007)220:1<781::aid-pssb781>3.0.co;2-d"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.24.1.3880"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/idaacs.2013.6662738"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.23.1.3444"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cbpc.2008.05.018"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/idaacs.2019.8924262"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.5755\/j01.eee.21.1.6657"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.18.1.1277"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185734.pdf?arnumber=11185734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:04:36Z","timestamp":1760072676000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185734\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185734","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}