<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Development of Algorithms for Increasing the Information Secrecy of the Satellite Communication System Based on the Use of Authentication Technology</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nikita Chistousov</string-name>
          <email>chistousov.nik@yandex.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Igor Kalmykov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aleksandr Olenev</string-name>
          <email>olenevalexandr@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Natalya Kalmykova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>North-Caucasus Federal University</institution>
          ,
          <addr-line>Pushkina, 1, Stavropol, 355009</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Stavropol State Pedagogical Institute</institution>
          ,
          <addr-line>Lenina St., 417 "A" , Stavropol, 355028</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>59</fpage>
      <lpage>64</lpage>
      <abstract>
        <p>One of the most promising applications of low-earth orbit satellite systems is remote monitoring and control systems for unattended objects located in the Far North. Therewith, there is a tendency to increase the groupings of such satellites. Therefore, ensuring the information secrecy of the low-earth orbit satellite becomes an important task. To prevent the intruder satellite from imposing a previously captured and delayed control command, it is proposed to use the "friend-foe" system for satellites, which uses a zero-knowledge authentication algorithm. It is necessary to increase the speed of the satellite authentication process to reduce the probability of a response signal being picked up. To do this, it is proposed to use modular codes (MC), which can simultaneously perform the operations of addition, subtraction, and multiplication. As a result, the probability of picking up the signal of the responder located onboard the satellite is reduced. In addition, the MC can correct multi-bit errors within a single remainder in the presence of two redundant bases. Therefore, the development of an algorithm for correcting errors arising in the process of satellite authentication caused by failures, and interference in the communication channel is an urgent task. The work aims to increase the information secrecy of the low-earth orbit satellite by using the developed authentication algorithm, which has a minimum time for determining the satellite status, as well as an algorithm for correcting errors that occur during the operation of the satellite identification system and data transmission, implemented using a single algebraic system - parallel modular codes.</p>
      </abstract>
      <kwd-group>
        <kwd>1 satellite authentication algorithm</kwd>
        <kwd>modular code</kwd>
        <kwd>error detection</kwd>
        <kwd>and correction algorithm</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In recent years, there has been a tendency to an increase in the number of low-orbit satellite
constellations, which are used in remote monitoring, control, and management systems for unattended
objects of environmentally hazardous technologies used in the production and transportation of
hydrocarbons in the Far North. Herewith, an increase in the number of countries involved in the
development of the Arctic's natural resources contributes to the intensification of destructive impacts
on the low-earth orbit satellite (LEOS) to disrupt their work. One of the promising areas to counteract
these actions is to ensure the information secrecy of the LEOS [1-3].</p>
      <p>To increase the information secrecy of the LEOS, it is proposed to use a satellite authentication
system that will not allow the intruder satellite to impose on the receiver an intercepted and delayed
signal that can disable the control object and cause an environmental disaster. To reduce the probability
of picking up a response signal by an intruder satellite, it is proposed to use modular codes (MC), which
will increase the speed of satellite identification. Therewith, the MC can also correct errors that occur
in the calculation process due to failures [4, 5]. The article presents the developed algorithm for
detecting and correcting MC errors that occur during the satellite authentication process and are caused
by both failures, and interference in the communication channel, the use of which will ensure the
information secrecy of the LEOS even during destructive impacts of natural and artificial nature on the
identification system.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Materials and methods 2.1.</title>
    </sec>
    <sec id="sec-3">
      <title>Modular codes</title>
      <p>Modular codes are arithmetic non-positional codes [4, 5]. In these codes, the integer X is uniquely
given by a tuple of the remainder</p>
      <p>Х  ( х1 , х2 ,..., хk ) ,
where хi  Х mod mi , mi –bases of the modular code; ( mi , m j )  1 ; i  1,...,k .</p>
      <p>Since the bases of MC are pairwise prime numbers mi, where i  1,...,k , their product sets the size
of the working range</p>
      <p>k
M k   mi  X .</p>
      <p>i1
Since modular codes perform summation, diminution, and multiplication operations in parallel
Х  С  (( х1  с1 ) mod m1 ,( х2  с2 ) mod m2 ,...,( хk  сk ) mod mk ) ,
Х  С  (( х1  с1 ) mod m1 ,( х2  с2 ) mod m2 ,...,( хk  сk ) mod mk ) ,
Х  С  (( х1  с1 ) mod m1 , ( х2  с2 ) mod m2 ,..., ( хk  сk ) mod mk ) ,
then it is advisable to use them to increase the speed of calculations. Since authentication algorithms
use such operations, they can be implemented in the MC. Therefore, modular codes have found wide
application in real-time systems.</p>
      <p>In works [6-9] it is offered to use modular code for construction of special processors of digital
signal processing. Modular codes allow to increase the efficiency of digital filters [10-13]. Work [14]
presents the protocol "Electronic Cash" with inspection correction rules of the electronic e-cash number
for e-Commerce systems, which uses SOC. This allows to increase the authentication speed of the
applicant. In [15] it is shown that the codes of a polynomial residue number system, aimed at reducing
the effects of failures in the AES cipher. Error correction of digital signal processing devices using
nonpositional modular codes is shown in [16-19]. The use of redundant modular codes for improving the
fault tolerance of special processors for digital signal processing is shown in [20]. A method of
increasing the reliability of telemetric well information transmitted by the wireless communication
channel is shown in [21]. Consider the use of modular codes in authentication protocols. Let's use the
protocol given in the [22].
2.2.</p>
    </sec>
    <sec id="sec-4">
      <title>Development of an authentication algorithm in MC</title>
      <p>
        In this algorithm, the following parameters are used:
 m1, …, mk –bases of the modular code;
 the satellite secret key X  ( X1 , ..., X k )  M k ;
 the session key Y( j )  ( Y1 ( j ), ..., Yk ( j ))  M k ;
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
where pi  ( mi ) is the Euler function of the number mi; X , Y( j ),L( j ) – random numbers;
X i  X

mi Y( j )  Yi ( j ) mod mi ; L( j )  Li ( j ) mod mi .
3. The responder calculates the noisy status of the satellite
 and the parameter L( j )  ( L1( j ), ..., Lk ( j ))  Mk used to verify the repeated use of the
session key, where X  Xi mod mi ; Y( j )  Yi ( j )mod mi ; L( j )  Li ( j )mod m ;
i
i =1,2,..., k; j is the number of the communication session.
      </p>
      <p>
        The preliminary stage of the satellite authentication algorithm:
1. The responder calculates the true status of the satellite
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
(
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
Wk  b Xk bYk ( j )bLk ( j )  ;
mk
where b is the generating multiplicative group to modulo mi.
      </p>
      <p>2. The responder chooses random numbers
and makes a noise of the secret parameters of the algorithm

X i*  X i  X i pi ,</p>
      <p>k
X , Y( j ), L( j )  M k   mi ,</p>
      <p>
        i1
Wk*  b X*k bYk*( j )bL*k ( j )  ;
mk
The authentication algorithm consists of the following steps.
1. The requester passes the responder a random number g = (g1, g2 ,…, gk).
2. The responder, having received number g, calculates the answers

vi (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )  X i*  gi X i pi ,
      </p>
      <p>
        
vi (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )  Yi* ( j )  gi Yi ( j ) pi ,
      </p>
      <p>
        
vi (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )  L*i ( j )  gi Li ( j ) .
      </p>
      <p>pi
The responder transmits the following data to the requester</p>
      <p>
        (W1 , ...,Wk ), (W1* , ...,Wk* ), ( v1 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), ..., vk (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )), ( v1 (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., vk (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )), ( v1 (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), ..., vk (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )).
3. The requester checks the received responses
Z2  W2g2 bv2(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )bv2(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )bv2(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )  ,
      </p>
      <p>m2 .</p>
      <p>
        Zk  Wkgk bvk (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )bvk (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )bvk (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )  .
      </p>
      <p>mk
Applicant A has the "own" status if the equality is met  Z1  W1* ,..., Zk  Wk* .</p>
      <p>The originality of this solution is based on a new idea – the use of MC, which effectively provides
parallelization of calculations at the level of arithmetic operations when authenticating the satellite. The
novelty of the obtained result is that an authentication algorithm has been developed for the first time,
implemented in MCs, the use of which makes it possible to increase the information secrecy of the
LEOS by reducing the probability of selecting a response signal "Own", caused by a reduction in the
time spent on satellite identification due to parallelization of the calculation at the level of arithmetic
operations.</p>
      <p>When implementing the hardware design of the system, the Vivado HLS 2019.2 development tool
was used. The clock frequency of the FPGA was 250 MHz. Comparative analysis showed that it takes
3.1 ms to complete one round of the authentication stage using Shnor protocol and 1.2 ms for the
developed protocol when using a 32-bit base.
2.3.</p>
    </sec>
    <sec id="sec-5">
      <title>Error correction algorithm in modular codes</title>
      <p>xi  1, ..., mi 1 is the error depth, two control bases are introduced [4, 5]</p>
      <p>To
correct a
batch
of errors
within</p>
      <p>
a single remainder xi*  xi  xi m</p>
      <p>i
pk1 pk2  pk pk1 .</p>
      <p>The result is the full range of the code</p>
      <p>k2
M k2   mi .</p>
      <p>
        i1
Redundant MC does not contain an error during execution
k
X  ( x1 ,..., xk , xk1 , xk2 )  M k   mi . (
        <xref ref-type="bibr" rid="ref14">14</xref>
        )
i1
      </p>
      <p>Therefore, the MC use the positional characteristic (PC) interval number, which shows the location
of the code relative to Mk</p>
      <p> X 
S    ,</p>
      <p> M k 
where   is the integer part when dividing.</p>
      <p>If the positional characteristic:
 S = 0 – there is no error;
 S &gt; 0 – there is an error.</p>
      <p>Let us use the Chinese remainder theorem to translate from modular code to positional code,
X  x1B1  x2B2  ...  xk2Bk2 mod M k2 </p>
      <p>k2
  xi Bi mod M k2 ,</p>
      <p>i1
where Bi – orthogonal basis of the redundant MC.</p>
      <p>
        The orthogonal bases are calculated according to [4]
where
(
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
(
        <xref ref-type="bibr" rid="ref13">13</xref>
        )
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
(
        <xref ref-type="bibr" rid="ref15">15</xref>
        )
(
        <xref ref-type="bibr" rid="ref16">16</xref>
        )
Bi  M k12 mi Mmk2 . (
        <xref ref-type="bibr" rid="ref17">17</xref>
        )
i
      </p>
      <p>
        Let us substitute expression (
        <xref ref-type="bibr" rid="ref15">15</xref>
        ) into expression (
        <xref ref-type="bibr" rid="ref14">14</xref>
        ). The result is the algorithm for calculating this
positional characteristic in the MC without translating it into a positional code
  k2  k
      </p>
      <p>1  mod mk1 ,
Sk1   i1 xi Кi   j1 j B*j M k   

  k2  k 1  mod mk2 ,
Sk2    xi Кi   j B*j M k   
  i1  j1  
where Bi  Ki M k  B* ; Bi* is the orthogonal basis of the redundant MC.</p>
      <p>i
The originality of the developed algorithm is based on a new idea – to use redundant MC to correct
errors caused not only by failures of the satellite identification system but also by interference in the
channel. In addition, the MC can correct multi-bit errors within a single remainder in the presence of
two redundant bases. This allowed assuming that the redundant MC are close to the Reed-Solomon
codes in their correcting abilities. This means that the use of redundant MC will allow abandoning the
cascade codes, in which the external code is designed to detect and correct errors caused by failures,
and the internal code – to search for and correct errors caused by interference in the communication
channel. The novelty of the obtained result lies in the fact that for the first time an algorithm was
developed for correcting errors by redundant MC arising in the process of satellite authentication caused
by both failures, and interference in the communication channel, which will ensure information secrecy
of the LEOS even during the destructive effects on the system. To evaluate the effectiveness of the
algorithm for constructing a modular turbo code, a software package was created that allows simulating
a communication channel with impulse noise. The analysis of the research results shows that the
application of the developed algorithm for constructing a modular turbo code makes it possible to
increase the noise immunity of the identification system. So, with the signal-to-noise ratio Eb/N0 = 13
dB, the probability of a system error using the developed algorithm is P  3 105 , while for the
classical МС - P  8,6 105 .</p>
    </sec>
    <sec id="sec-6">
      <title>3. Acknowledgements</title>
      <p>This work was supported by the Russian Foundation for Basic Research, project No. 20-37-90009</p>
    </sec>
    <sec id="sec-7">
      <title>4. References</title>
      <p>
        (
        <xref ref-type="bibr" rid="ref18">18</xref>
        )
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Jonathan</surname>
            <given-names>C.</given-names>
          </string-name>
          <article-title>McDowel, The Low Earth Orbit Satellite Population and Impacts of the SpaceX Starlink Constellation</article-title>
          .
          <source>The Astrophysical Journal Letters. Volume 892. Number 2</source>
          . (
          <year>2020</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>George</given-names>
            <surname>Sebestyen</surname>
          </string-name>
          ,
          <source>Steve Fujikawa Low Earth Orbit Satellite Design</source>
          . Springer, New York, NY,
          <year>2018</year>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Bo</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <article-title>Guangliang Ren, Huining Zhang Multisatellite Cooperative Random Access Scheme in Low Earth Orbit Satellite Networks</article-title>
          .
          <article-title>IEEE systems journal</article-title>
          . volume
          <volume>13</volume>
          , no.
          <issue>3</issue>
          ,
          <string-name>
            <surname>September</surname>
          </string-name>
          (
          <year>2019</year>
          ):
          <fpage>2617</fpage>
          -
          <lpage>2629</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Omondi</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Premkumar</surname>
            <given-names>B</given-names>
          </string-name>
          .
          <source>Residue Number Systems: Theory and Implementation</source>
          . Imperial College Press.
          <source>UK</source>
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Ananda</given-names>
            <surname>Mohan Residue Number</surname>
          </string-name>
          <article-title>Systems</article-title>
          .
          <source>Theory and Applications</source>
          . Springer International Publishing Switzerland.
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Katkov</surname>
            <given-names>K. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalmykov</surname>
            <given-names>I.A.</given-names>
          </string-name>
          <article-title>Application of parallel technologies in navigation management under the conditions of artificial ionospheric disturbances</article-title>
          .
          <source>World Applied Sciences Journal</source>
          .
          <volume>26</volume>
          (
          <issue>1</issue>
          ). (
          <year>2013</year>
          ):
          <fpage>108</fpage>
          -
          <lpage>113</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Katkov</surname>
            <given-names>K.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naymenko</surname>
            <given-names>D.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makarova</surname>
            <given-names>A.V.</given-names>
          </string-name>
          <article-title>Parallel modular technologies in digital signal processing</article-title>
          .
          <source>Life Science Journal</source>
          .
          <volume>11</volume>
          (
          <issue>11s</issue>
          ).
          <article-title>(</article-title>
          <year>2014</year>
          ):
          <fpage>435</fpage>
          -
          <lpage>438</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Veligosha</surname>
            <given-names>A. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaplun</surname>
            <given-names>D. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klionskiy</surname>
            <given-names>D. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gulvanskiy</surname>
            <given-names>V. V.</given-names>
          </string-name>
          <article-title>Parallel-pipeline implementation of digital signal processing techniques based on modular codes</article-title>
          .
          <source>Proceedings of the 19th International Conference on Soft Computing and Measurements. SCM</source>
          <year>2016</year>
          .
          <volume>7519731</volume>
          . (
          <year>2016</year>
          ):
          <fpage>213</fpage>
          -
          <lpage>214</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Katkov</surname>
            <given-names>K. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Timoshenko</surname>
            <given-names>L. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dunin</surname>
            <given-names>A. V.</given-names>
          </string-name>
          <article-title>Application of Modular Technologies in the LargeScale Analysis of Signals</article-title>
          .
          <source>Journal of Theoretical and Applied Information Technology</source>
          .
          <volume>80</volume>
          (
          <issue>3</issue>
          ). (
          <year>2016</year>
          ):
          <fpage>391</fpage>
          -
          <lpage>400</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Kaplun</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voznesensky</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veligosha</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalmykov</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <article-title>Kandarpa Kumar Sarma Technique to adjust adaptive digital filter coefficients in Residue Number System based filters</article-title>
          .
          <source>IEEE Access</source>
          .
          <volume>9</volume>
          .
          <fpage>9446075</fpage>
          . (
          <year>2021</year>
          ):
          <fpage>82402</fpage>
          -
          <lpage>82416</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Chervyakov</surname>
            <given-names>N. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veligosha</surname>
            <given-names>A. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ivanov</surname>
            <given-names>P. E.</given-names>
          </string-name>
          <article-title>Digital filters in a system of residual classes // Izvestiya Vysshikh Uchebnykh Zavedenij</article-title>
          . Radioelektronika.
          <volume>38</volume>
          (
          <issue>8</issue>
          ). (
          <year>1995</year>
          ):
          <fpage>11</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Veligoshа</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaplun</surname>
            <given-names>D.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bogaevskiy D</surname>
          </string-name>
          .V.
          <article-title>Adjustment of adaptive digital filter coefficients in modular codes // Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering</article-title>
          .
          <source>ElConRus</source>
          <year>2018</year>
          .
          <string-name>
            <surname>January</surname>
          </string-name>
          (
          <year>2018</year>
          ):
          <fpage>1167</fpage>
          -
          <lpage>1170</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Yurdanov</surname>
            <given-names>D. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gostev</surname>
            <given-names>D. B.</given-names>
          </string-name>
          <article-title>The implementation of information and communication technologies with the use of modular codes /</article-title>
          / CEUR Workshop Proceedings
          <year>1837</year>
          . (
          <year>2017</year>
          ):
          <fpage>206</fpage>
          -
          <lpage>212</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Lapina</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kononova</surname>
            <given-names>N.</given-names>
          </string-name>
          <article-title>Development of the protocol «Electronic Cash» with inspection correction rules of the electronic e-cash number for e-Commerce systems</article-title>
          // CEUR Workshop Proceedings 2254. (
          <year>2018</year>
          ):
          <fpage>147</fpage>
          -
          <lpage>153</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Stepanova</surname>
            ,
            <given-names>E.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toporkova</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <article-title>V Application of the codes of a polynomial residue number system, aimed at reducing the effects of failures in the AES cipher</article-title>
          .
          <source>Journal of Digital Information Management</source>
          .
          <volume>14</volume>
          (
          <issue>2</issue>
          ). (
          <year>2016</year>
          ):
          <fpage>114</fpage>
          -
          <lpage>123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Kaplun</surname>
            <given-names>D. I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klionskiy</surname>
            <given-names>D. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bogaevskiy</surname>
            <given-names>D. V.</given-names>
          </string-name>
          <article-title>Error correcting of digital signal processing devices using non-positional modular codes</article-title>
          .
          <source>Automatic Control and Computer Sciences</source>
          .
          <volume>51</volume>
          (
          <issue>3</issue>
          ). (
          <year>2017</year>
          ):
          <fpage>167</fpage>
          -
          <lpage>173</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Selivanova</surname>
            <given-names>M. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tyncherov</surname>
            <given-names>K. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ikhsanova</surname>
            <given-names>F. A.</given-names>
          </string-name>
          <article-title>A method of paired zeroing of numbers in a residue system</article-title>
          .
          <source>Journal of Physics. Conference Series</source>
          <volume>1333</volume>
          .
          <fpage>022015</fpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Tyncherov</surname>
            <given-names>K. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ikhsanova</surname>
            <given-names>F. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olenev</surname>
            <given-names>А</given-names>
          </string-name>
          .А.
          <article-title>Proof of the method of paired zeroing of numbers in a residue system</article-title>
          .
          <source>Journal of Physics. Conference Series</source>
          .
          <volume>1333</volume>
          .
          <fpage>022016</fpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Selivanova</surname>
            <given-names>M. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tyncherov</surname>
            <given-names>K. T.</given-names>
          </string-name>
          <article-title>A device for paired zeroing of numbers in a residue system</article-title>
          .
          <source>Journal of Physics. Conference Series</source>
          .
          <volume>1333</volume>
          . (
          <year>2019</year>
          ).
          <fpage>022017</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Stepanova</surname>
            <given-names>E. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makarova</surname>
            <given-names>A. V.</given-names>
          </string-name>
          <article-title>The use of redundant modular codes for improving the fault tolerance of special processors for digital signal processing</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          .
          <year>1837</year>
          . (
          <year>2017</year>
          ):
          <fpage>115</fpage>
          -
          <lpage>122</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Tyncherov</surname>
            <given-names>K.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chervyakov</surname>
            <given-names>N.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Selivanova</surname>
            <given-names>M.V.</given-names>
          </string-name>
          <article-title>Method of increasing the reliability of telemetric well information transmitted by the wireless communication channel</article-title>
          .
          <source>Bulletin of the Tomsk</source>
          Polytechnic University. Geo Assets Engineering.
          <volume>329</volume>
          (
          <issue>3</issue>
          ). (
          <year>2018</year>
          ):
          <fpage>36</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Pashintsev</surname>
            ,
            <given-names>V.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhuk</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rezenkov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>N Application of spoof resistant authentication protocol of spacecraft in low earth orbit systems of satellite communication</article-title>
          .
          <source>International Journal of Mechanical Engineering and Technology</source>
          .
          <volume>9</volume>
          (
          <issue>5</issue>
          ). (
          <year>2018</year>
          ):
          <fpage>958</fpage>
          -
          <lpage>965</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>