{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T16:59:28Z","timestamp":1763139568101,"version":"3.45.0"},"reference-count":8,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Axioms"],"abstract":"<jats:p>A novel original procedure of encryption\/decryption based on the polyadic algebraic structures and on signal processing methods is proposed. First, we use signals with integer amplitudes to send information. Then, we use polyadic techniques to transfer the plaintext into series of special integers. The receiver restores the plaintext using special rules and systems of equations.<\/jats:p>","DOI":"10.3390\/axioms14110835","type":"journal-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T16:46:22Z","timestamp":1763138782000},"page":"835","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Polyadic Encryption"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1184-6952","authenticated-orcid":false,"given":"Steven","family":"Duplij","sequence":"first","affiliation":[{"name":"Yantai Research Institute, Harbin Engineering University, Yantai 265615, China"},{"name":"Center for Information Technology (CIT), Universit\u00e4t M\u00fcnster, R\u00f6ntgenstrasse 7-13, D-48149 M\u00fcnster, Germany"}]},{"given":"Qiang","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Harbin Engineering University, Harbin 150001, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,13]]},"reference":[{"key":"ref_1","unstructured":"Oppenheim, A.V. (1978). Applications of Digital Signal Processing, Prentice-Hall."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Wang, B. (2008). Digital Signal Processing Techniques and Applications in Radar Image Processing, Wiley.","DOI":"10.1002\/9780470377765"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Berber, S. (2021). Discrete Communication Systems, Oxford University Press.","DOI":"10.1093\/oso\/9780198860792.001.0001"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1109\/TIFS.2016.2647223","article-title":"Number theoretic transforms for secure signal processing","volume":"12","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Duplij, S. (2022). Polyadic Algebraic Structures, IOP Publishing.","DOI":"10.1088\/978-0-7503-2648-3ch9"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/BF02483082","article-title":"On the general theory of (m, n) rings","volume":"11","author":"Leeson","year":"1980","journal-title":"Algebra Universalis"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1049\/el.2018.0056","article-title":"Quantised inverter amplifier","volume":"54","author":"Musayev","year":"2018","journal-title":"Electron. Lett."},{"key":"ref_8","first-page":"1527","article-title":"Quantum signal processing: A new frontier in information processing","volume":"Volume 10","author":"Karthik","year":"2023","journal-title":"Proceedings of the 10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)"}],"container-title":["Axioms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2075-1680\/14\/11\/835\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T16:52:19Z","timestamp":1763139139000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2075-1680\/14\/11\/835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,13]]},"references-count":8,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["axioms14110835"],"URL":"https:\/\/doi.org\/10.3390\/axioms14110835","relation":{},"ISSN":["2075-1680"],"issn-type":[{"value":"2075-1680","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,13]]}}}