Rabin's modified method of encryption using various forms of system of residual classes

M Kasianchuk, I Yakymenko, I Pazdriy… - … the experience of …, 2017 - ieeexplore.ieee.org
The development of three modular Rabin's encryption algorithm with using ordinary integer
and modified perfect forms of the system of residual classes is presented in this paper. This …

Effective algorithms for finding the remainder of multi-digit numbers

S Ivasiev, M Kasianchuk, I Yakymenko… - 2019 9th …, 2019 - ieeexplore.ieee.org
In this paper, the theoretical foundations of the developed methods for finding the remains of
multi-digit numbers and the Mersenne number in a binary number system are given, the use …

Symmetric cryptoalgorithms in the residue number system

MM Kasianchuk, IZ Yakymenko… - Cybernetics and Systems …, 2021 - Springer
This paper presents theoretical backgrounds of the symmetric encryption based on the
residue number system. The peculiarities of this approach are that in the case of restoring a …

Research of time characteristics of search methods of inverse element by the module

T Rajba, A Klos-Witkowska, S Ivasiev… - 2017 9th IEEE …, 2017 - ieeexplore.ieee.org
The method for finding inverse element by the module is based on the stepwise addition of
residue is developed in this paper. This method allows avoiding performing the complex …

A method for decimal number recovery from its residues based on the addition of the product modules

M Karpinski, S Rajba, S Zawislak… - 2019 10th IEEE …, 2019 - ieeexplore.ieee.org
A Method for Decimal Number Recovery from its Residues Based on the Addition of the Product
Modules Page 1 The 10th IEEE International Conference on Intelligent Data Acquisition and …

Encryption Using Residue Number System: Research Trends and Future Challenges

R Shevchuk, I Yakymenko… - 2024 14th International …, 2024 - ieeexplore.ieee.org
This paper presents a comprehensive knowledge mapping and in-depth analysis of the
application of residue number system in encryption technique research to understand better …

Realization of RSA cryptographic algorithm based on vector-module method of modular exponention

IZ Yakymenko, MM Kasianchuk… - … on Advanced Trends …, 2018 - ieeexplore.ieee.org
The improvement of the implementation of the RSA cryptographic algorithm for
encrypting/decoding information flows based on the use of the vector-modular method of …

Residue number system asymmetric cryptoalgorithms

YM Nykolaychuk, IZ Yakymenko, NY Vozna… - … and Systems Analysis, 2022 - Springer
Theoretical foundations of asymmetric encryption based on the residue number system and
its modified perfect form are developed. The moduli of the residue number system are …

Finding the inverse of a polynomial modulo in the ring z [x] based on the method of undetermined coefficients

R Shevchuk, I Yakymenko, M Karpinski… - Computer …, 2024 - journals.agh.edu.pl
This paper presents the theoretical foundations of finding the inverse of a polynomial
modulo in the ring Z [x] based on the method of undetermined coefficients. The use of the …

Multichannel system for structuring and transmission entropy-manipulated cipher signals

A Voronych, N Vozna, O Zastavnyy… - … on Advanced Trends …, 2018 - ieeexplore.ieee.org
The urgency of the problem of the theory development and improvement of software and
hardware of structuring and wireless transmission of entropy-manipulated signals in …