Symmetric cryptoalgorithms in the residue number system

MM Kasianchuk, IZ Yakymenko… - Cybernetics and Systems …, 2021 - Springer
This paper presents theoretical backgrounds of the symmetric encryption based on the
residue number system. The peculiarities of this approach are that in the case of restoring a …

Encryption Using Residue Number System: Research Trends and Future Challenges

R Shevchuk, I Yakymenko… - 2024 14th International …, 2024 - ieeexplore.ieee.org
This paper presents a comprehensive knowledge mapping and in-depth analysis of the
application of residue number system in encryption technique research to understand better …

Realization of RSA cryptographic algorithm based on vector-module method of modular exponention

IZ Yakymenko, MM Kasianchuk… - … on Advanced Trends …, 2018 - ieeexplore.ieee.org
The improvement of the implementation of the RSA cryptographic algorithm for
encrypting/decoding information flows based on the use of the vector-modular method of …

Residue number system asymmetric cryptoalgorithms

YM Nykolaychuk, IZ Yakymenko, NY Vozna… - … and Systems Analysis, 2022 - Springer
Theoretical foundations of asymmetric encryption based on the residue number system and
its modified perfect form are developed. The moduli of the residue number system are …

Algorithmic support for rabin cryptosystem implementation based on addition

S Ivasiev, M Kasyanchuk, I Yakymenko… - 2020 10th …, 2020 - ieeexplore.ieee.org
This paper deals with algorithmic support for Rabin cryptosystem implementation based on
addition without performing computationally expensive arithmetic operations. Due to this …

Finding the inverse of a polynomial modulo in the ring z [x] based on the method of undetermined coefficients

R Shevchuk, I Yakymenko, M Karpinski… - Computer …, 2024 - journals.agh.edu.pl
This paper presents the theoretical foundations of finding the inverse of a polynomial
modulo in the ring Z [x] based on the method of undetermined coefficients. The use of the …

Polynomial Rabin cryptosystem based on the operation of addition

I Yakymenko, M Kasianchuk, I Shylinska… - 2022 12th …, 2022 - ieeexplore.ieee.org
The analysis of the existing asymmetric encryption/decryption algorithms is carried out, their
advantages and disadvantages are determined on the basis of this analysis in the paper …

[PDF][PDF] Теоретичні основи виконання модулярних операцій множення та експоненціювання в теоретико–числовому базисі Крестенсона–Радемахера

ЯМ Николайчук, ММ Касянчук… - Інформатика та …, 2011 - immm.op.edu.ua
Дана стаття ілюструє теоретичні основи виконання операцій модулярного множення та
експоненціювання при застосуванні теоретико-числових базисів Радемахера та …

АСИМЕТРИЧНІ АЛГОРИТМИ ШИФРУВАННЯ У СИСТЕМІ ЗАЛИШКОВИХ КЛАСІВ.

ЯМ Николайчук, І ЯКИМЕНКО… - … & Systems Analysis …, 2022 - search.ebscohost.com
Розроблено теоретичні основи асиметричного шифрування на базі системи залишкоr
вих класів та¿¿ модифіковано¿ досконало¿ форми. При цьому модулі системи …

Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication

I Yakymenko, M Kasianchuk… - 2020 IEEE 15th …, 2020 - ieeexplore.ieee.org
This paper presents the implementation of the ELGamal cryptoalgorithm for information
flows encryption/decryption, which is based on the application of the vector-modular method …