{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T08:24:17Z","timestamp":1751531057892,"version":"3.28.0"},"reference-count":5,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/stc-csit.2015.7325433","type":"proceedings-article","created":{"date-parts":[[2015,11,12]],"date-time":"2015-11-12T23:05:12Z","timestamp":1447369512000},"page":"67-69","source":"Crossref","is-referenced-by-count":11,"title":["Perfecting of the matrix Affine cryptosystem information security"],"prefix":"10.1109","author":[{"given":"Yurij","family":"Gryciuk","sequence":"first","affiliation":[]},{"given":"Pavlo","family":"Grytsyuk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref3","article-title":"Suchasna kryptohrafiya: Osnovni ponyattya","volume":"144","author":"yemec","year":"2003","journal-title":"Lviv Vyd-vo BaK"},{"key":"ref5","first-page":"53","article-title":"Matrychni afinno-perestanovochni alhorytmy dlya shyfruvannya ta deshyfruvannya zobragen","volume":"3","author":"krasylenko","year":"2012","journal-title":"Systemy obrobky informacij zb nauk prac &#x2013; Kharkiv Vyd-vo KHUPS im Ivana Kogeduba"},{"key":"ref12","first-page":"134","article-title":"Spilnist chyslovykh metodiv afinnykh peretvoren u klasychnykh kryptosystemakh","author":"yuzkiv","year":"2012","journal-title":"Zakhyst informacij i bezpeka informaciyinykh system mater I-oj Mignar nauk -tekhn konf m Lviv 31 travnya &#x2014; 01 chervnya 2012 r &#x2013; Lviv Vyd-vo NU &#x201C;Lvivska politekhnika&#x201D;"},{"key":"ref8","first-page":"173","article-title":"Ocinyuvannya stiyikosti ta chasu zlamuvannya u matrychno-perestanovochnykh alhorytmakh kryptohrafichnykh peretvoren","author":"krasylenko","year":"2012","journal-title":"Nauka i navchalnyyi proces nauk -metod zbirnyk mater nauk -prakt konf VSEI Universytetu &#x201C;Ukrajna &#x2013; Vinnycya"},{"key":"ref1","article-title":"Informaciyina bezpeka","volume":"280","author":"byehun","year":"2008","journal-title":"K Vyd-vo KNEU"}],"event":{"name":"2015 Xth International Scientific and Technical Conference \"Computer Sciences and Information Technologies\" (CSIT)","start":{"date-parts":[[2015,9,14]]},"location":"Lviv, Ukraine","end":{"date-parts":[[2015,9,17]]}},"container-title":["2015 Xth International Scientific and Technical Conference \"Computer Sciences and Information Technologies\" (CSIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7311170\/7325415\/07325433.pdf?arnumber=7325433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:15:41Z","timestamp":1602684941000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7325433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/stc-csit.2015.7325433","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}