<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Non-Binary Constant Weight Coding Technique</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>V. N. Karazin Kharkiv National University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svobody sq.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine kuznetsov@karazin.ua</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>nastyak</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@gmail.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>kuznetsova.tatiana</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@gmail.com</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Central Ukrainian National Technical University</institution>
          ,
          <addr-line>avenue University, 8, Kropivnitskiy, 25006</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper presents research results of mixed base number systems using a binomial representation of numbers and nonlinear coding techniques by constant weight codes, which are based on a binomial count. Also we propose a technique of non-binary constant weight coding based on a generalized binomial-positional representation, which allows to generalize the known approach to the non-binary case and practically implement computational algorithms for generating non-binary sequences of constant weight. The proposed technique of non-binary constant weight coding can be useful for improving post-quantum code-based cryptographic algorithms.</p>
      </abstract>
      <kwd-group>
        <kwd>constant weight coding</kwd>
        <kwd>mixed base number systems</kwd>
        <kwd>binomial count</kwd>
        <kwd>code-based cryptographic algorithms</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The computational efficiency of arithmetic operations directly depends on the
technique of representing numbers on which operations are performed, i.e. on the applied
number system [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1–4</xref>
        ]. The most common is the positional number system in which
the same numerical sign (digit) in the number record has different meanings,
depending on the position where it is located [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. Among these systems is the modern
decimal number system, the occurrence of which is associated with a finger count, the
binary number system used in modern computers, etc.
      </p>
      <p>
        A mixed base number system is a generalization of the positional system, its base
is an increasing number sequence and each represented number is expressed through a
linear combination of base elements [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6">3–6</xref>
        ]. Mixed base number systems include the
Fibonacci number system, factorial, binomial and other systems [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6–8</xref>
        ].
      </p>
      <p>
        It should be noted that many applications are based on the binomial number
system, including the so-called binomial codes that belong to the class of nonlinear
binary redundancy codes used to increase the noise immunity of binary asymmetric data
transmission channels [
        <xref ref-type="bibr" rid="ref3 ref6 ref7 ref8">3, 6–8</xref>
        ]. The main property of binomial codes, an equal
Hamming weight (the number of nonzero elements) of all codewords, is used to effectively
detect asymmetric distortions of transmitted sequences. In this case, a change of
Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
      </p>
      <p>Hamming weight of the sequence is an adequate criterion for detecting errors in
asymmetric binary data channels.</p>
      <p>
        Another, equally demanded application of constant weight codes consists in
constructing provably robust cryptosystems [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">9–12</xref>
        ], the security of which is justified by
the reducability of the private key calculation task to the solution of the theoretical
complexity problem of syndrome decoding [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ]. So, for example, in [
        <xref ref-type="bibr" rid="ref15 ref16 ref17">15–17</xref>
        ],
provable secure encryption systems are considered. In works [
        <xref ref-type="bibr" rid="ref18 ref19 ref20">18–20</xref>
        ], code-based
electronic signature schemes are considered, their parameters and basic properties are
investigated. In articles [
        <xref ref-type="bibr" rid="ref21 ref22">21, 22</xref>
        ], pseudorandom number generators based on codes
are studied, as well as promising stream encryption schemes [
        <xref ref-type="bibr" rid="ref23 ref24 ref25 ref26">23–26</xref>
        ]. Papers [
        <xref ref-type="bibr" rid="ref27 ref28 ref29">27–29</xref>
        ]
are devoted to the study of zero-knowledge proof schemes. The design of fast and
secure code-based hash functions is investigated in [
        <xref ref-type="bibr" rid="ref25 ref30 ref31 ref32">25, 30–32</xref>
        ].
      </p>
      <p>
        Thus, code-based cryptography has many important applications. These crypto
primitives are post-quantum security algorithms, i.e. they will be strong even under
the conditions of possible quantum cryptanalysis [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">9–12</xref>
        ].
      </p>
      <p>
        Constant weight codes are used as one of the elements of code-based
cryptosystems. In particular, in encryption systems, sequences with constant weights are used
as a session key [
        <xref ref-type="bibr" rid="ref16 ref33 ref34">16, 33, 34</xref>
        ]. To generate a digital signature using the decoding
algorithm, it is necessary to find a sequence with constant weight [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref35">18–20, 35</xref>
        ]. When
generating pseudo-random numbers, constant weight codes are used in the feedback
circuit of the generator [
        <xref ref-type="bibr" rid="ref21 ref22 ref23">21–23</xref>
        ]. The input data for a code-based hash function is first
converted to a constant weight sequence and then processed by a compression
function [
        <xref ref-type="bibr" rid="ref30 ref32">30, 32</xref>
        ].
      </p>
      <p>It should be noted that all listed applications only use binary constant weight codes.</p>
      <p>
        The discrete mathematics literature also describes only binary algorithms [
        <xref ref-type="bibr" rid="ref1 ref2 ref4">1, 2, 4</xref>
        ]. We
offer non-binary constant weight coding technique. This will greatly expand the area
of possible use of code-based cryptosystems. In particular, the practical
implementation of non-binary (for example, over finite field GF (2m ) ) codes can work faster and
more efficiently, while providing a high level of strength of code-based
cryptosystems. This determines the relevance of this article, a purpose of which is to develop a
technique of non-binary constant weight coding based on a generalized
binomialpositional representation.
2
      </p>
      <p>
        Positional and Mixed Base Number Systems. Binary
technique and Algorithm of Constant Weight Coding
The positional number system is based on a positional numbering, i.e. on a local value
of digits, and is determined by a certain number b  1 (a base of the number system)
such that the b units in each category are combined into one unit of the next highest
rank. The number system is also called b -positional system [
        <xref ref-type="bibr" rid="ref1 ref13 ref2">1, 2, 13</xref>
        ].
      </p>
      <p>A number x in a b -ary positional number system is represented as a linear
combination of powers of number b
where ai are integers called numbers and they satisfy an inequality:
i is a discharge sequence number, starting from zero, n is a number of bits (length)
of the position code.</p>
      <p>Each degree bi in such record is called a rank, the certain rank and the
corresponding numbers is determined by the value of the indicator i . Usually, for a nonzero
number x , the leading digit an1 in the b -ary representation is also required to be
nonzero.</p>
      <p>If there are no discrepancies (for example, when all the numbers are presented in
the form of unique written characters), the number is recorded as a sequence of its b
ary digits, listed in ascending order of rank from left to right:</p>
      <p>A mixed base number system is a generalization of the b -ary system and also often
refers to positional number systems. The basis of the mixed base system is an
increasing numbers sequence
and each number is represented as a linear combination:</p>
      <p>n1
x   aibi ,</p>
      <p>i0
0  ai  b ,
where some code restrictions are imposed on the coefficients ai .</p>
      <p>Numeral x in a mixed base number system is an enumeration of its numbers in
decreasing order of the index i , starting with the first nonzero. If for some bi  bi , then
the mixed base number system coincides with the b - ary positional number system.</p>
      <p>The binomial number system is based on the representation of numbers through an
increasing sequence of binomial coefficients
b0   u1  , b1   u2  ,...,bn1   un  ,
 1   2   n 
 ui1  
bi  
 i 1
where w is number of non-zero elements of binomial code.</p>
      <p>A number x in the binomial system is represented as a linear combination:
n1 n1  ui1  ,
x   aibi   ai  i 1</p>
      <p>i0 i0
where coefficients ai 0,1 .</p>
      <p>In the case when there are no discrepancies in the calculation of binomial
coeffi</p>
      <p> ui1  , i.e. when a rule is established for the formation of a numbers set
cients , bi  </p>
      <p> i 1
0  u1  u2  ...  un , the number x is written in increasing order of ranks ai from left
to right:
 n is a length of the constant weight code, i.e. the number of elements (bits) of code</p>
      <p>sequences (code words);
 С  С0 ,C1,...,CM 1 is a set of code words for the constant weight code, where
j : wCj   const  w , where
wC j0</p>
      <p>C j1
... C jn1   #C j0</p>
      <p>C j1</p>
      <p>... C jn1  Cji 0 ,
#C j0</p>
      <p>C j1
... C jn1  Cji 0</p>
      <p>is a number C ji , i  0,1,..., n 1 , where C ji  0 .</p>
      <p>The power of the constant weight code (the number of elements in the set С ) is
determined by the number of binary vectors of length n and weight w :
j  0,1,..., M 1
we have equal</p>
      <p>weight Hamming:
С  М </p>
      <p>
        The well-known binomial (binary constant weight) coding technique [
        <xref ref-type="bibr" rid="ref13 ref6 ref7">6, 7, 13</xref>
        ] is
based on the presentation of information data in the form of a numerical equivalent
(denoted by a number A ) with further decomposition into a linear combination of
binomial coefficients. Such system of code restrictions on the length of sequences of
constant weight n , codeword weights w and code cardinality М are satisfied:
j : wC j   const  w;

 0  A  M ;
 0  w  n.
      </p>
      <p>
The number A is presented as binary sequence CA  CA0
CA1</p>
      <p>... CAn1  of
n1  n  i 1
constant weight and A  CAni1bi , where bi   w  l  , l is a nonzero element</p>
      <p>i0
number in CA , l  0,1,..., w .</p>
      <p>i1
Nonzero element is a CAni1 , for which bi   CAnm1bm .</p>
      <p>m0</p>
      <p>Obviously, the sum on the right side of the expression is equal to the sum of only
bm those for which the corresponding elements of the vector CA are not equal to zero (
CAnm1  0 ).</p>
      <p>It should be noted that the considered technique does not imply the formation of
non-binary sequences with constant weight (vectors CA with Cji 0,1,..., q 1 ,
q  2 ) and thus does not allow the implementation of non-binary constant weight
coding.</p>
      <p>The article proposes a new technique of non-binary constant weight coding based
on a generalized binomial-positional representation, which allows us to generalize the
above approach to the non-binary case and practically implement computational
algorithms for generating non-binary sequences of constant weight.
3</p>
      <p>Proposed Technique of Non-Binary Constant Weight Coding
To generalize the considered approach of generating sequences of constant weight to
the non-binary case, a new form of a generalized binomial-positional representation
of numbers is proposed. The proposed number system belongs to the class of mixed
base systems and is based on the representation of numbers through an increasing
sequence of binomial coefficients, each of which is encoded by positional numbering,
i.e. the representation of digits with binomial coefficients is based on the local value
of the digits.</p>
      <p>Consider the number x in the proposed generalized binomial-positional number</p>
      <p>n1
system: x   aibi .</p>
      <p>i0
Let’s introduce the following notation and equalities:</p>
      <p> ui1  
ai 0,1,..., q 1 , bi  
 i 1</p>
      <p>,</p>
      <p>,
where w is a number of nonzero elements of the generalized binomial-positional code.</p>
      <p>Then the number x is represented through an increasing sequence of binomial
coefficients b0 ,b1,...,bn1 , and corresponding sequence a0 , a1,..., an1 .</p>
      <p>Let's consider nonzero elements ai  1, i  0,1,..., n 1, sequences a0 , a1,..., an1
and renumber them, i.e. we denote them as elements of the sequence a0 , a1,..., aw1 ,
l  0,1,..., w 1 and l : al 1,..., q 1 .</p>
      <p>A sequence a0 , a1,..., aw1 and all its elements al (nonzero elements of a sequence
a0 , a1,..., an1 numbered according to the increasing digits order) are formed using a
positional number system on the base q 1 , i.e. q 1 units in each rank are combined
into one unit of the next highest rank. A set of nonzero elements sets al ,
l  0,1,..., w 1 defines the number xP that is represented in the positional system as
follows:</p>
      <p>w1
xP  al 1 hl ,</p>
      <p>l0
where h  q 1 is a base of used positional system, 1  al  q .</p>
      <p>The increasing sequence of binomial coefficients b0 ,b1,...,bn1 sets a number xB ,
n1
which is represented in the binomial number system as xB   aBibi , where
coeffii0
cients aBi 0,1 .</p>
      <p>The number x in the proposed generalized binomial-positional number system
satisfies the following equality:</p>
      <p>x  xB  q-1w  xP ,
which sets a main code restriction on the elements of the generalized
binomialpositional code.</p>
      <p>Thus, the number x in the proposed system of generalized binomial-positional
counting is represented as a linear combination:
x  n1 aibi  xB  q-1w  xP </p>
      <p>i0
 q-1w n1 aBibi  w1 al 1 q 1l .</p>
      <p>i0 l0</p>
      <p>The proposed generalization of the binomial-positional way of representing
numbers consists in the complex use of the positional number system and the binomial
counting system: the first term on the right side of the equality, through the increasing
sequence of binomial coefficients, determines the placement of nonzero elements of
the generalized binomial-positional code, the second term defines the values of
nonzero elements of the sequence in positional code.</p>
      <p>The proposed technique of representing numbers is based on the technique of
nonbinary constant weight coding. For the abstract definition of a non-binary constant
weight code, we introduce the following formal notation:
 n is a code length;

С  С0 ,C1 ,...,CM 1 is a set of code words,</p>
      <p>... Cjn1  C, Cji 0,1,..., q 1,
j  0,1,..., M 1, i  0,1,..., n 1, j : wCj   const  w .</p>
      <p>The cardinality of a non-binary constant weight code defined in this way is
determined by the number of length n and weight w vectors with elements from the set
0,1,..., q 1 :
С  М  q 1w</p>
      <p>.</p>
      <p>The proposed technique is based on the presentation of information data in the
form of a numerical equivalent A with further decomposition into a linear
combination of binomial coefficients, each of which is encoded by positional numbering so
that a system of code restrictions on the length of n sequences of constant weight, the
weight w of code words and code cardinality М is satisfied:</p>
      <p>AB   A </p>
      <p> q-1w  , AP   A mod q-1w  ,
where  y is the integer part of number y .</p>
      <p>
        The uniqueness of the representation of number A in the form of numbers AB and
AP is justified by the Chinese remainder theorem [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>The number AB lies within 0  AB  M w and can be represented in a binomial</p>
      <p>q 1
number system with code restrictions:</p>
      <p>The number AP lies within 0  AP  q 1w and, accordingly, can be represented
in the positional number system on the basis of h  q 1 .</p>
      <p>1. Representation of numbers in a binomial number system:
j : wc j   const  w;

 0  AB  w!nn! w!;
 0  w  n.</p>
      <p>n1  n  i 1
AB   aBibi , bi   w  l  .</p>
      <p>i0
w1
AP  al 1 hl , h  q 1 .</p>
      <p>l0
2. Representation of a number AP in a positional number system:
Generating of sequence CA  CA0</p>
      <p>CA1</p>
      <p>... CAn1  C :</p>
      <p>CAi  al aBi , i  0,1,..., n 1, l  0,1,..., w 1 ,
i.e.,
A
aB0 aB1 aB2  and a0  and generated non-binary vectors CA  CA0
of constant weight are shown in table 1.
forms a non-binary constant weight code C  C0 ,C1,...,C8 .</p>
      <p>
        Thus, the proposed number system based on the generalized binomial-positional
representation of numbers allows complex use of both the local value of the digits of
the code sequence and the values of binomial coefficients specified by the placement
of nonzero elements of the sequence. Application of the developed number system
allows us to build effective techniques and algorithms of non-binary constant weight
coding for their use in various practical applications. For example, the proposed
technique can be useful for improving post-quantum code-based cryptographic algorithms
(ciphers, electronic digital signatures, key encapsulation schemes, pseudorandom
number generators, etc.) [
        <xref ref-type="bibr" rid="ref19 ref21 ref23 ref31 ref32 ref36">19, 21, 23, 31, 32, 36</xref>
        ]. The use of constant weight codes is
also one of the basic transformations for the functioning of code-based cryptosystems.
      </p>
      <p>
        In particular, constant weight codes are used in the McEliece [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] and Niederreiter
[
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] public key encryption schemes, as well as in electronic signature schemes and
code-based pseudorandom numbers generators. It is worth noting that at the moment,
code-based cryptography is considered one of the most optimal ways of developing
post-quantum cryptography. A good example of the use of constant weight codes in
cryptosystems is a Niederreiter encryption process, which consists of several basic
steps. First, user generates key and system parameters. Next, an information sequence
e that needs to be encrypted is converted using constant-weight codes into a
sequence of fixed length n and constant weight t . Then vector syndrome s  e  HxT
must be calculated.
      </p>
      <p>This vector is a ciphertext, i.e. an encrypted message that can be decrypted only by
the user who has a secret key. Decryption consists in removing the action of masking
matrices, after which the sequence is decoded using a fast algebraic technique. The
found error vector is a sequence of constant weight e . To restore the information
sequence, the conversion is used, the inverse of what was used. As you can see, each
possible information sequence should be uniquely associated with the corresponding
constant weight sequence, i.e. to build a code-based cryptosystem, it is necessary to
implement an algebraic rule of this correspondence, implemented through an constant
weight account system.</p>
      <p>Thus, it is necessary to realize a one-to-one correspondence between all possible
information sequences and various constant weight vectors. In the other words, for an
arbitrary countable set (in advance of a given power), it is required to implement a
new recording technique (number system) in the form of a set of constant weight
vectors. At the moment, resistance versions of the constructions of code-based
cryptosystems are based on the use of binary Goppa codes. In this simplest case, it is
possible to use the well-known binomial count to convert information sequences into
constant weight binary vectors. In the general case, code-based cryptosystems can be
built for arbitrary base. And for this general case, we offer a generalized
binomialpositional number system and a new technique of non-binary constant weight coding
(binomial-positional counting). This will not only increase the strength of code-based
cryptosystems, but also provide additional useful properties, such as the control of
non-binary errors during transmission.</p>
      <p>In addition, this study can be useful in other practical applications, for example, to
improve channel coding techniques, to prevent interference in telecommunication
networks, etc.
4</p>
    </sec>
    <sec id="sec-2">
      <title>Conclusions</title>
      <p>As a result of the research, a new number system based on the generalized
binomialpositional representation of numbers is proposed. It is that the complex use of the
binomial counting system (through the increasing binomial coefficients sequence
defines a position of nonzero element) and the positional number system (the values
of nonzero elements are specified through the local value of numbers).</p>
      <p>For the first time, a technique of non-binary constant weight coding based on a
generalized binomial-positional representation of numbers is proposed, which allows
us to generalize the well-known approach to the non-binary case and practically
implement computational algorithms for generating non-binary sequences of constant
weight.</p>
      <p>The proposed non-binary constant weight coding technique is a generalization of
the well-known binary case. In fact, a well-known binary code is used to represent a
number in the binomial number system. Nonzero elements of the resulting binomial
sequence are additionally encoded with a positional code. Thus, the complexity of the
implementation of the proposed technique is defined as the total complexity of the
known techniques of binomial and positional coding.</p>
      <p>The developed technique can be used in various practical applications, for
example, in code-based cryptosystems: ciphers, electronic digital signatures, key
encapsulation schemes, pseudorandom number generators, etc. These cryptosystems are
expected to be safe even in the conditions of the possible application of quantum
cryptographic analysis techniques, i.e. focused on the post-quantum period.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Anderson</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          :
          <article-title>Discrete Mathematics With Combinatorics</article-title>
          . Prentice Hall, Upper Saddle River,
          <string-name>
            <surname>N.J</surname>
          </string-name>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Knuth</surname>
            ,
            <given-names>D.E.</given-names>
          </string-name>
          :
          <article-title>The art of computer programming</article-title>
          , volume
          <volume>2</volume>
          (3rd ed.)
          <article-title>: seminumerical algorithms</article-title>
          . Addison-Wesley Longman Publishing Co., Inc.,
          <source>USA</source>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Borisenko</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalashnikov</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Protasova</surname>
            ,
            <given-names>T.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalashnykova</surname>
            ,
            <given-names>N.I.:</given-names>
          </string-name>
          <article-title>A New Approach to the Classification of Positional Numeral Systems</article-title>
          . In: IDT/IIMSS/STET (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Wolfram</given-names>
            <surname>Demonstrations</surname>
          </string-name>
          <article-title>Project brings ideas to life with over 11k interactive #WolframNotebooks for education</article-title>
          , research, recreation &amp; more. #WolframDemo #WolfLang, http://demonstrations.wolfram.com/NumberSystemsUsingAComplexBase/
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Stakhov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Numeral Systems with Irrational Bases for Mission-Critical Applications</article-title>
          .
          <source>World Scientific Publishing Co Pte Ltd</source>
          , New Jersey (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Borisenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalashnykova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalashnikov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gutenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Binomial Numeral Systems: Description and Applications to Numeration Problems(&lt;Special Issue&gt;Variational Inequality and Combinatorial Problems)</article-title>
          .
          <source>International Journal of Biomedical Soft Computing and Human Sciences: the official journal of the Biomedical Fuzzy Systems Association</source>
          .
          <volume>17</volume>
          ,
          <fpage>11</fpage>
          -
          <lpage>17</lpage>
          (
          <year>2012</year>
          ). https://doi.org/10.24466/ijbschs.17.2_
          <fpage>11</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Borisenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalashnikov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalashnykova</surname>
          </string-name>
          , N.:
          <source>BINOMIAL CALCULUS: ADVANTAGES AND PROSPECTS</source>
          .
          <volume>8</volume>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Borysenko</surname>
            ,
            <given-names>O.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalashnikov</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalashnykova</surname>
            ,
            <given-names>N.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matsenko</surname>
            ,
            <given-names>S.M.:</given-names>
          </string-name>
          <article-title>The Fibonacci Numeral System for Computer Vision</article-title>
          . In: Favorskaya,
          <string-name>
            <given-names>M.N.</given-names>
            and
            <surname>Jain</surname>
          </string-name>
          , L.C. (eds.)
          <source>Computer Vision in Control Systems-3: Aerial and Satellite Image Processing</source>
          . pp.
          <fpage>321</fpage>
          -
          <lpage>343</lpage>
          . Springer International Publishing,
          <string-name>
            <surname>Cham</surname>
          </string-name>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Overbeck</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sendrier</surname>
          </string-name>
          , N.:
          <article-title>Code-based cryptography</article-title>
          . In: Bernstein,
          <string-name>
            <given-names>D.J.</given-names>
            ,
            <surname>Buchmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            , and
            <surname>Dahmen</surname>
          </string-name>
          , E. (eds.)
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
          </string-name>
          . pp.
          <fpage>95</fpage>
          -
          <lpage>145</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Bernstein</surname>
            ,
            <given-names>D.J.</given-names>
          </string-name>
          :
          <article-title>Introduction to post-quantum cryptography</article-title>
          . In: Bernstein,
          <string-name>
            <given-names>D.J.</given-names>
            ,
            <surname>Buchmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            , and
            <surname>Dahmen</surname>
          </string-name>
          , E. (eds.)
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
          </string-name>
          . pp.
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Ding</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tillich</surname>
          </string-name>
          , J.-P. eds:
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
          </string-name>
          : 11th International Conference, PQCrypto
          <year>2020</year>
          , Paris, France,
          <source>April 15-17</source>
          ,
          <year>2020</year>
          , Proceedings. Springer International Publishing,
          <string-name>
            <surname>Cham</surname>
          </string-name>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Ding</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Steinwandt</surname>
          </string-name>
          , R. eds:
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
          </string-name>
          : 10th International Conference, PQCrypto
          <year>2019</year>
          , Chongqing, China, May 8-
          <issue>10</issue>
          ,
          <source>2019 Revised Selected Papers</source>
          . Springer International Publishing,
          <string-name>
            <surname>Cham</surname>
          </string-name>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <article-title>The Theory of Error-Correcting Codes</article-title>
          .
          <source>Elsevier</source>
          (
          <year>1977</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Blahut</surname>
            ,
            <given-names>R.E.</given-names>
          </string-name>
          :
          <article-title>Theory and Practice of Error Control Codes</article-title>
          . Addison-Wesley, Reading, MA (
          <year>1983</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Sendrier</surname>
          </string-name>
          , N.:
          <article-title>Niederreiter Encryption Scheme</article-title>
          . In: van Tilborg,
          <string-name>
            <surname>H.C.</surname>
          </string-name>
          <article-title>A. and</article-title>
          <string-name>
            <surname>Jajodia</surname>
          </string-name>
          , S. (eds.)
          <source>Encyclopedia of Cryptography and Security</source>
          . pp.
          <fpage>842</fpage>
          -
          <lpage>843</lpage>
          . Springer US, Boston, MA (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Sidelnikov</surname>
            ,
            <given-names>V.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shestakov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          :
          <article-title>On insecurity of cryptosystems based on generalized Reed-Solomon codes</article-title>
          .
          <source>Discrete Mathematics and Applications</source>
          .
          <volume>2</volume>
          ,
          <fpage>439</fpage>
          -
          <lpage>444</lpage>
          (
          <year>1992</year>
          ). https://doi.org/10.1515/dma.
          <year>1992</year>
          .
          <volume>2</volume>
          .4.
          <fpage>439</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>NIEDERREITER</surname>
          </string-name>
          , H.:
          <article-title>Knapsack-type cryptosystems and algebraic coding theory</article-title>
          .
          <source>Prob. Contr. Inform. Theory</source>
          .
          <volume>15</volume>
          ,
          <fpage>157</fpage>
          -
          <lpage>166</lpage>
          (
          <year>1986</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Courtois</surname>
            ,
            <given-names>N.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finiasz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sendrier</surname>
          </string-name>
          , N.:
          <article-title>How to Achieve a McEliece-Based Digital Signature Scheme</article-title>
          . In: Boyd,
          <string-name>
            <surname>C</surname>
          </string-name>
          . (ed.) Advances in Cryptology - ASIACRYPT
          <year>2001</year>
          . pp.
          <fpage>157</fpage>
          -
          <lpage>174</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Finiasz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Parallel-CFS</surname>
            . In: Biryukov,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gong</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Stinson</surname>
            ,
            <given-names>D.R</given-names>
          </string-name>
          . (eds.) Selected Areas in Cryptography. pp.
          <fpage>159</fpage>
          -
          <lpage>170</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <article-title>Pushkar'ov,</article-title>
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Mialkovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Smirnov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            ,
            <surname>Kuznetsova</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          :
          <article-title>Code-Based Schemes for Post-Quantum Digital Signatures</article-title>
          .
          <source>In: 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</source>
          . pp.
          <fpage>707</fpage>
          -
          <lpage>712</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Fischer</surname>
            ,
            <given-names>J.-B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stern</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding</article-title>
          . In: Maurer,
          <string-name>
            <surname>U</surname>
          </string-name>
          . (ed.)
          <source>Advances in Cryptology - EUROCRYPT '96</source>
          . pp.
          <fpage>245</fpage>
          -
          <lpage>255</lpage>
          . Springer, Berlin, Heidelberg (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smirnov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cherep</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kanabekova</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chepurko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Testing of Code-Based Pseudorandom Number Generators for Post-Quantum Application</article-title>
          .
          <source>In: 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          . pp.
          <fpage>172</fpage>
          -
          <lpage>177</lpage>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Gaborit</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lauradoux</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sendrier</surname>
          </string-name>
          , N.:
          <article-title>SYND: a Fast Code-Based Stream Cipher with a Security Reduction</article-title>
          .
          <source>In: 2007 IEEE International Symposium on Information Theory</source>
          . pp.
          <fpage>186</fpage>
          -
          <lpage>190</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Meziani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hoffmann</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cayrel</surname>
          </string-name>
          , P.-L.:
          <article-title>Improving the Performance of the SYND Stream Cipher</article-title>
          . In: Mitrokotsa,
          <string-name>
            <given-names>A.</given-names>
            and
            <surname>Vaudenay</surname>
          </string-name>
          , S. (eds.) Progress in Cryptology - AFRICACRYPT
          <year>2012</year>
          . pp.
          <fpage>99</fpage>
          -
          <lpage>116</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Implementation</surname>
          </string-name>
          <article-title>of code-based hash-functions and stream-ciphers -</article-title>
          <string-name>
            <surname>Pierre-Louis</surname>
            <given-names>Cayrel</given-names>
          </string-name>
          , http://www.cayrel.net/?
          <article-title>Implementation-of-code-based-hash</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Meziani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cayrel</surname>
          </string-name>
          , P.-L.,
          <string-name>
            <surname>El Yousfi Alaoui</surname>
            ,
            <given-names>S.M.:</given-names>
          </string-name>
          <article-title>2SC: An Efficient Code-Based Stream Cipher</article-title>
          . In: Kim,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Adeli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Robles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.J.</given-names>
            , and
            <surname>Balitanas</surname>
          </string-name>
          , M. (eds.)
          <source>Information Security and Assurance</source>
          . pp.
          <fpage>111</fpage>
          -
          <lpage>122</lpage>
          . Springer Berlin Heidelberg, Berlin, Heidelberg (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Aguilar</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gaborit</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schrek</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>A new zero-knowledge code based identification scheme with reduced communication</article-title>
          .
          <source>In: 2011 IEEE Information Theory Workshop</source>
          . pp.
          <fpage>648</fpage>
          -
          <lpage>652</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Aguilar</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gaborit</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schrek</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>A new zero-knowledge code based identification scheme with reduced communication</article-title>
          .
          <source>arXiv:1111</source>
          .1644 [cs]. (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Brunetta</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liang</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mitrokotsa</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Code-Based Zero Knowledge PRF Arguments</article-title>
          . In: Lin,
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Papamanthou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            , and
            <surname>Polychronakis</surname>
          </string-name>
          , M. (eds.) Information Security. pp.
          <fpage>171</fpage>
          -
          <lpage>189</lpage>
          . Springer International Publishing,
          <string-name>
            <surname>Cham</surname>
          </string-name>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Finiasz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gaborit</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sendrier</surname>
          </string-name>
          , N.:
          <article-title>Improved Fast Syndrome Based Cryptographic Hash Functions</article-title>
          . Presented at the (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Bernstein</surname>
            ,
            <given-names>D.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lange</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peters</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schwabe</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Really Fast Syndrome-Based Hashing</article-title>
          . In: Nitaj,
          <string-name>
            <given-names>A.</given-names>
            and
            <surname>Pointcheval</surname>
          </string-name>
          , D. (eds.) Progress in Cryptology - AFRICACRYPT
          <year>2011</year>
          . pp.
          <fpage>134</fpage>
          -
          <lpage>152</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Augot</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finiasz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sendrier</surname>
          </string-name>
          , N.:
          <article-title>A Family of Fast Syndrome Based Cryptographic Hash Functions</article-title>
          . In: Dawson,
          <string-name>
            <given-names>E.</given-names>
            and
            <surname>Vaudenay</surname>
          </string-name>
          , S. (eds.) Progress in Cryptology - Mycrypt
          <year>2005</year>
          . pp.
          <fpage>64</fpage>
          -
          <lpage>83</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>McEliece</surname>
            ,
            <given-names>R.J.</given-names>
          </string-name>
          :
          <source>A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress Report</source>
          .
          <volume>44</volume>
          ,
          <fpage>114</fpage>
          -
          <lpage>116</lpage>
          (
          <year>1978</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Svatovskij</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiyan</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pushkar</surname>
          </string-name>
          'ov, A.:
          <article-title>Code-based public-key cryptosystems for the post-quantum period</article-title>
          . In: 2017 4th
          <string-name>
            <given-names>International</given-names>
            <surname>Scientific-Practical Conference</surname>
          </string-name>
          Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S T</surname>
          </string-name>
          <article-title>)</article-title>
          . pp.
          <fpage>125</fpage>
          -
          <lpage>130</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Babenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perevozova</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chepurko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smirnov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>New Approach to the Implementation of Post-Quantum Digital Signature Scheme</article-title>
          .
          <source>In: 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          . pp.
          <fpage>166</fpage>
          -
          <lpage>171</lpage>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Meziani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dagdelen</surname>
          </string-name>
          , Ö.,
          <string-name>
            <surname>Cayrel</surname>
          </string-name>
          , P.-L.,
          <string-name>
            <surname>El Yousfi Alaoui</surname>
            , S.M.:
            <given-names>S-FSB</given-names>
          </string-name>
          :
          <article-title>An Improved Variant of the FSB Hash Family</article-title>
          . In: Kim,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Adeli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Robles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.J.</given-names>
            , and
            <surname>Balitanas</surname>
          </string-name>
          , M. (eds.)
          <source>Information Security and Assurance</source>
          . pp.
          <fpage>132</fpage>
          -
          <lpage>145</lpage>
          . Springer, Berlin, Heidelberg (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>