<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Using Hash Functions to Protect Critical Messages from Changes in Risky Computing Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Andrzej</forename><surname>Smolarz</surname></persName>
							<email>a.smolarz@pollub.pl</email>
							<affiliation key="aff0">
								<orgName type="institution">Lublin University of Technology</orgName>
								<address>
									<addrLine>Nadbystrzycka 38D</addrLine>
									<postCode>20 -618</postCode>
									<settlement>Lublin</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nadiia</forename><surname>Pasieka</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Vasyl Stefanyk Precarpathian National University</orgName>
								<address>
									<addrLine>Ivano-Frankivsk</addrLine>
									<postCode>76000</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrzej</forename><surname>Kotyra</surname></persName>
							<email>a.kotyra@pollub.pl</email>
							<affiliation key="aff0">
								<orgName type="institution">Lublin University of Technology</orgName>
								<address>
									<addrLine>Nadbystrzycka 38D</addrLine>
									<postCode>20 -618</postCode>
									<settlement>Lublin</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vasyl</forename><surname>Sheketa</surname></persName>
							<email>vasylsheketa@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution">National Tech. University of Oil &amp; Gas</orgName>
								<address>
									<addrLine>Ivano-Frankivsk</addrLine>
									<postCode>76068</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mykola</forename><surname>Pasieka</surname></persName>
							<email>pasyekanm@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution">National Tech. University of Oil &amp; Gas</orgName>
								<address>
									<addrLine>Ivano-Frankivsk</addrLine>
									<postCode>76068</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Svitlana</forename><surname>Chupakhina</surname></persName>
							<email>cvitlana2706@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Vasyl Stefanyk Precarpathian National University</orgName>
								<address>
									<addrLine>Ivano-Frankivsk</addrLine>
									<postCode>76000</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Petro</forename><surname>Krul</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Vasyl Stefanyk Precarpathian National University</orgName>
								<address>
									<addrLine>Ivano-Frankivsk</addrLine>
									<postCode>76000</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mykola</forename><surname>Suprun</surname></persName>
							<email>suprun62@ukr.net</email>
							<affiliation key="aff3">
								<orgName type="institution">National Pedagogical Dragomanov University</orgName>
								<address>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Using Hash Functions to Protect Critical Messages from Changes in Risky Computing Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">CD1B9ED7915874C0F2FC8A13F9A3E814</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T16:26+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Hash functions, security risk, cryptography, critical data, secure hash algorithm (M.Suprun) ORCID: 0000-0002-6473-9627 (A.Smolarz)</term>
					<term>000-0002-4824-2370 (N.Pasieka)</term>
					<term>0000-0002-9442-6090 (A.Kotyra)</term>
					<term>0000−0002−1318−4895 (V.Sheketa)</term>
					<term>0000−0002−3058−6650 (M.Pasieka)</term>
					<term>0000-0003-1274-0826 (S.Chupakhina)</term>
					<term>0000−0002−5274−3215 (P.Krul)</term>
					<term>0000-0002-4198-9527 (M.Suprun)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Nowadays, information security has become an integral part of risky digital operations in cyberspace.</p><p>To solve such problems associated with risky operations, the use of hash functions occupies one of the key places among information security technologies in modern cryptography. After all, these cryptoresistant functions process critical data of limited length while creating a small, fixed-size digital code called a hash or digest. The classic use of risk-dependent crypto functions is to check the integrity of the processed data, as well as authentication schemes for user messages. However, as the volume of riskdependent processed critical data grows, the criterion of hash function throughput comes to the fore. Thus, SHA (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although SHA-3 belongs to the same series of standards, it is internally different from the MD5-like structure of SHA-1 and SHA-2. The Secure Hash Algorithm is considered one of the first generally accepted hashing standards and, according to the currently published literature, is considered the fastest implementation of the SHA-512 (SHA-3 variant) cryptographic algorithm, providing acceptable bandwidth for protecting risk-dependent critical data.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The use of cryptographic hash functions to protect risk dependent critical data, are related to the usual hash functions, which have additional properties, at the same time usual hash functions do not necessarily have them. These functions convert the final input of an information data stream to protect risk-dependent critical information into a small output of a fixed size, sometimes called a summation. A good hash function has foreground image resistance, second foreground image resistance, and strong collision resistance. Resistance to the forward image means that it is computationally impossible to find any input that yields a digest equal to the predefined output. Second-image robustness means that it should be computationally infeasible to find any second input that has the same output as any given input. Anti-collision means that it is computationally infeasible to find two different input hashes with the same output.</p><p>Hash functions can be divided into two categories: keyed and hunkered. Hash functions with a key are used in message authentication schemes. Such functions accept not only the hashed data, but also a second parameter, called a key. The hashing algorithm uses the actual data and the provided key to create the hash.</p><p>A function without a key is usually used to check the integrity of the data. The raw data is passed through the function and a summary of the results is stored. Later, a copy of the data is hashed and the two hashes are compared. If they are the same, the original data and the copy are the same for all intents and purposes. However, if they are different, the integrity of the copy cannot be trusted because the data could have been altered due to transmission errors or, even worse, by an external source for malicious purposes. A more detailed description and analysis of the hash function can be found in <ref type="bibr" target="#b0">[1]</ref>.</p><p>Thus hash functions require more and more computational resources. And because of the iterative nature of such functions, implementations of these algorithms cannot use computational techniques such as parallel processing to significantly improve performance. General-purpose processors are poorly suited to efficiently perform the basic operations required for a given hashing algorithm. Hence, hardware implementations of such algorithms are being developed to improve performance.</p><p>As new hash functions emerge, there must also be a way to compare them for authenticity. In such comparisons it is crucial to distinguish between software and hardware implementations of hash functions. Software implementations running on general-purpose processors are used for many authentication protocols as well as for independent computing applications. Hardware implementations created using dedicated circuits are typically used for devices that are impractical or impossible to implement with software, such as embedded systems or high-speed network devices. Runtime and memory usage are two critical metrics to consider when comparing software implementations of hash functions. Thus, the lower the runtime and memory usage, the more advantageous the hash function is. In hardware, runtime and total area are two important metrics to consider. For this type of implementation, runtime can usually be reduced by increasing the total area. This area can be calculated based on the physical size occupied by the final implementation and the number of logic gates used to build it. A hardware implementation can be used to achieve faster execution times than software can provide. Hardware devices such as FPGAs can provide the highly optimized operations needed for hashing algorithms. Therefore, such implementations are usually orders of magnitude better than software implementations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Model analysis of cryptographic algorithms for hash functions compression of critical messages</head><p>There is no paper discussing the hardware implementation of the Phash algorithm, but many papers discussing the hardware implementation of SHA-512 have been published and Whirlpool algorithm. The proposed cryptographic models are generally used for the process of obtaining the maximum throughput of critical message compression by hashing functions. These implementations are usually aimed at high throughput or efficient resource utilization <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b6">7]</ref>.</p><p>Often, it is impossible to know a priori which design choice for a given component will be the best choice to achieve a particular design goal. Whenever possible, several descriptions and implementations of specific components are provided. After implementing and executing an algorithm using different components, it is possible to comment on the quality of a given implementation, as it is related to achieving high throughput or low total area. This publication contains information about currently available and existing hardware implementations of SHA-512. Including descriptions and analysis of each implementation <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6]</ref>. These publications describe the message expansion and compression steps in some detail. Most of the implementations reviewed acknowledge the existence of a key fill phase, but do not include details. Similarly, the hash update phase is partially mentioned, but its implementation is not always correctly described. One of the reasons, in our opinion, for omitting the details of the fill phase and the hash update phase is the hypothesis that the practical implementation of these phases will not have a significant negative impact on the overall performance characteristic of the hash function algorithm.</p><p>Simple Hash Function Implementation Some of the first released hardware implementations of SHA-512 are described in scientific publications <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b16">17]</ref>. In <ref type="bibr" target="#b18">[19]</ref>, the implementation of SHR(x) and ROTR(x) operations, used in the extension and compression phase of the algorithm message processing, is discussed in detail. Thus, a block of ROM (Read Only Memory) is used to store the constant variable Kt required for the message compression phase. Several 64-bit adders and simple combinatorial circuits are used to calculate these values, which are necessary for the algorithm. Using the 64-bit adder with five inputs which is involved to calculate the time value T1, and the 64-bit adder with two inputs which is involved to calculate the total time value T2. On this basis the functions Ch(x, y, z) and Maj(x, y, z) are realized by simple combinational circuits.</p><p>A more detailed description of the SHA-512 implementation is given in <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b13">14]</ref>. The construction of the disclosure phase of the message hash function is shown in Figure <ref type="figure">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Model design of message expansion stage iteration</head><p>So the advantage of the considered implementation is the reuse of memory registers. A simple implementation requires would require eighty 64-bit registers to store all the necessary critical data generated during the message expansion phase, but because of resource sharing only 16 such registers and a multiplexer are needed. From the considered scheme we see that each of the sixteen registers has a width of 64 bits, and the multiplexer is used to determine the time of loading the first block of critical data in the register of the computing system. Thus the data output Wi from the leftmost register of the circuit algorithm is used as input to the compression stage of the generated message. As soon as the first block of critical data is loaded into all registers, the multiplexer immediately returns the result of the specified calculation of the hash function in the leftmost register. The considered design of the hash function algorithm at the message compression stage in <ref type="bibr" target="#b0">[1]</ref> is shown in Figure <ref type="figure">2</ref>. Based on this scheme, the eight 64-bit registers represent the intermediate values of the message hash, which will be used in the update phase after the 80 iterative cycle of the compression phase <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b17">18]</ref>. For a more simplified understanding of the proposed algorithm, the details of the implementation of the computational operations SHR(x) and ROTR(x) are omitted. On this basis, we used two two-port Block RAMs to store the Kt constants used in this iterative stage. Block RAMs are on-chip memory components which can be instantiated and addressed like regular memory modules. The details of the adders used in this implementation are also omitted in this publication.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2: Model design of message compression stage iteration</head><p>A more detailed implementation of the message expansion step diagram is shown in Figure <ref type="figure">3</ref>. To reduce the total number of additions to be performed on the critical path, it is crucial to use the algorithm to compute the total Kt + Wt in the previous loop <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17,</ref><ref type="bibr" target="#b20">21]</ref>. The Rkw register ensures that the quantity is available during the correct iteration. The output of this register is used in the intermediate step of message compression. The combination of CSA and CPA is used to minimize the mathematical calculations and thus the delay that occurs when adding multiple 64-bit numbers to the processing. If you only use cascade CPA, in this case the delay will be even longer. Since the LUT Shift A and LUT Shift B blocks in this algorithm scheme are shift registers. They are designed using the "shift register mode" CLB slices available in the Virtex FPGA. Thus they are designed to significantly reduce the overall footprint while not affecting performance.</p><p>The design model of the message compression stage structure is shown in Figure <ref type="figure">3</ref>. In this case, the multiplexer automatically determines whether the current Kt+0 -Kt+7 values should be used additionally. For these calculations, the multiplexer selects a value of zero for addition at all stages, except for the last stage of compression of the desired message <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b21">22,</ref><ref type="bibr" target="#b23">24,</ref><ref type="bibr" target="#b25">26]</ref>. The last iteration of the model will additionally use the calculated current Kt+0 -Kt+7 value. Thus, the basic operation of these multiplexers serves as a key step to update the hash of the message.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 3: Model design of message expansion stage iteration</head><p>Based on this, the critical path in the compression phase of the proposed message must be further transformed into seven complements. P Cs, CSA and CPA, which we use to optimize the mathematical delay of this calculation. In this way, the parallel operations counter significantly reduces the number of operations added by the model from five to three. Similarly, we use CSA and CPA to replace the cascading CPA in order to significantly minimize the computational delay. To do this, we need to significantly reduce the total area of the adder. Based on this, in addition to using the traditional 64-bit adders for calculations, 16 and 32-bit adders for the necessary additions are also involved</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A more advanced implementation model</head><p>Figure <ref type="figure">3</ref> shows only a part of the SHA-512 algorithm implementation model. In this case, the phase of calculating the required message is doubled. The peculiarity for the realization of this algorithm step is that six inputs are involved, from b to d and from f to h, which are fed directly to the output, and only two inputs, a and e figure <ref type="figure">4</ref>, require additional mathematical calculations, which directly delay the work of the proposed algorithm. Thus deployment allows us to parallelize the process of mathematical calculations by performing two iterations simultaneously. For the same reason, the algorithm of the necessary message expansion stage is also subject to the process of modification to obtain the next two values of Wt almost simultaneously.</p><p>The design model of the necessary message compression process in two iterations is presented in figure <ref type="figure">4</ref>, and the thickened line shows the critical path of mathematical calculations, which create delays in message compression <ref type="bibr" target="#b22">[23]</ref>. On this basis we can notice that when message compression step is extended then working frequency of the algorithm is reduced approximately by half, thus negating the purpose of expansion. On this basis, it should be noted that in order to significantly increase the operating frequency of compression of the necessary message, it is necessary to perform part of the operations in parallel. The study proposes a quasi-conveyor implementation of the SHA-512 mathematical encryption algorithm. For this purpose, a pipeline approach is used in the phase of compression of the necessary message, and since it forms the key delay on the execution of the algorithm <ref type="bibr" target="#b24">[25]</ref>. Then the disclosure phase of the main necessary message has been optimized, so as to significantly reduce the delay of a single mathematical calculation step. Thus, in order to significantly reduce the delay in the pre-math phase, it is necessary to use delay balancing technology <ref type="bibr" target="#b26">[27]</ref>. Based on this, CSA and CLA must be used to make the necessary critical additions <ref type="bibr" target="#b27">[28]</ref>. Analyzing the presented model design scheme figure <ref type="figure">3</ref> we can notice that the section τ is influenced by variables Kt and Wt the section τt-1 is indirectly influenced by variables Kt-1 and Wt-1 through τ.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 4: Design two iterations of message compression stage iteration</head><p>Based on the operation of the cryptographic algorithm at the stage of reading the last pair of values Kt and Wt it is necessary to carry out three consecutive clock cycles for the final completion of the critical message compression stage. Thus, at the first stage of the cryptographic algorithm for critical message compression registers are used to transmit new values. Which is used in the second step of generating the final values from E to H. And the third step of the execution of the cryptographic algorithm performs the generation of values from A to D. Also note that in the third step of the algorithm the variables from E to H must not be synchronized in any way.</p><p>Thus, for effective delay balancing is used to significantly reduce the critical path of mathematical calculations still in the critical message expansion phase, but this method is not quite suitable for its use in combination with the unpacking process, so a modified algorithm was developed to implement the message expansion phase. Based on this effective deployment of this cryptographic model architecture, the values of the variables Wt and Wt+1 are required to execute the algorithm in one clock cycle. This usually uses sixteen sixty-four bit registers, and in a modifying algorithm, up to eight registers, but this doubles the width to one hundred and twentyeight bits. And the first sixty-four-bit word of the new register is used to calculate the variable value Wt, and the second sixty-four-bit word is used to calculate the value Wt+1. The combinatorial logic of the message expander was copied to calculate the variable values Wt and Wt+1 in one loop of the algorithm. To do this, the multiplexer selection of one hundred and twentyeight bits instead of sixty-four bits was changed. In this case the outputs of the variable values Wt and Wt+1 are fixed, to ensure that they do not affect the critical delay path of the mathematical calculations.</p><p>Thus, after the completion of the cryptographic algorithm at the 80th iteration of the critical message compression stage, the created hash code must be updated. In the classical version, this requires eight 64-bit adders, but we consider a hash modification scheme which uses only two adders. Assuming that, most hash variables are only moved to create a new output sequence, and hence, there was definitely an interdependency between the hash variables. Thus, using this interdependence, only two adders are needed to complete the critical message compression cryptographic algorithm to generate six partial results of hash modification iterations, and the other two value variables are calculated differently.</p><p>Using these interdependencies, the partial results of the hash modification iterations can also be determined. Based on the above, only two adders can also be used to perform the necessary number of calculations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Practical implementation of the proposed hash function compression algorithm for critical message compression in risk dependent computer systems</head><p>In order to analyze how a cryptographic algorithm of hash function compression of critical messages in risk dependent computer systems will behave, a program model was developed, on which the testing of Figure <ref type="figure" target="#fig_0">5</ref>-8 was carried out.   In this paper, the informational and technological impact of risk protection requirements in relation to critical data for regulation on the software development process has been evaluated. In doing so, the main changes in the hashing of information flows to which this process is defined and how to be prepared for them are described. It is prepared for the division of the critical risk-dependent personal data of the users into ordinary and special categories. The way and the reasons for their collection, processing and disclosure are explained. In addition, it is necessary to ensure the security of these data, to prevent their leakage outside the organization where they are stored. This can cause damage to the data subject and lead to fines of considerable magnitude.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion</head><p>Conducting a critical analysis of the use of cryptographic hash functions to protect risk-dependent critical data, as well as to quickly compress critical messages in risk-dependent computer systems, we can argue that the use of mathematical algorithms has significant promise for information security technologies in modern cryptography. After all, these crypto-resilient functions for protecting risk-dependent data process critical information of limited length while creating a small digital code of fixed size. Along with classic applications of these crypto-resilient hash functions, such as verifying the integrity of the data being processed, and authentication schemes for critical user messages. Research has shown that with a significant increase in the amount of critical information being processed to protect risk-dependent critical data, the hash function's throughput criterion comes to the fore. Therefore, information security research today to protect risk dependent critical data has become an integral part of risky digital operations in cyberspace, and solving such problems with hash functions occupies one of the key places in modern cryptography. Thus, the modification of hash algorithms for protection of risk-dependent critical data, in order to increase the throughput is extremely relevant.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: File with initial data</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 6 :Figure 7 :</head><label>67</label><figDesc>Figure 6: Data file after SHA-512 hash function</figDesc><graphic coords="8,105.45,80.80,393.10,51.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 8 :</head><label>8</label><figDesc>Figure 8: Model program hash function compression of critical messages</figDesc><graphic coords="8,101.55,242.55,436.15,416.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="4,88.15,136.20,420.51,135.81" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Efficient single-chip implementation of SHA-384 and SHA-512</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mcloone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mccanny</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Field-Programmable Technology (FPT). Proceedings (Cat. No.02EX603)</title>
				<imprint>
			<date type="published" when="2002">2002. 2002</date>
			<biblScope unit="page" from="311" to="314" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">SHA-512 based Wireless Authentication Scheme for Smart Battery Management Systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Khas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Cicek</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICRERA47325.2019.8996531</idno>
	</analytic>
	<monogr>
		<title level="m">8th International Conference on Renewable Energy Research and Applications (ICRERA)</title>
				<meeting><address><addrLine>Brasov, Romania</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="968" to="972" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function</title>
		<author>
			<persName><surname>Hłobaż</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICCCN49398.2020.9209663</idno>
	</analytic>
	<monogr>
		<title level="m">29th International Conference on Computer Communications and Networks (ICCCN)</title>
				<meeting><address><addrLine>Honolulu, HI, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rathor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rathor</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2018.2889224</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="4598" to="4610" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A selective crosssubstitution technique for encrypting color images using chaos, DNA Rules and SHA-512</title>
		<author>
			<persName><forename type="first">U</forename><surname>Rehman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Ali Shahid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Iqbal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Abbas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Firdous</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2019.2951749</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="162786" to="162802" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Optimized Password Recovery for SHA-512 on GPUs</title>
		<author>
			<persName><surname>Ge</surname></persName>
		</author>
		<idno type="DOI">10.1109/CSE-EUC.2017.226</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)</title>
				<meeting><address><addrLine>Guangzhou</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="226" to="229" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">An efficient fault detection scheme for the secure hash algorithm SHA-512</title>
		<author>
			<persName><forename type="first">F</forename><surname>Kahri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mestiri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Bouallegue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Machhout</surname></persName>
		</author>
		<idno type="DOI">10.1109/GECS.2017.8066141</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Green Energy Conversion Systems (GECS)</title>
				<meeting><address><addrLine>Hammamet</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">An Experimental Evaluation of SHA-512 for Different Modes of Operation</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">N</forename><surname>Bhonge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Ambat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">R</forename><surname>Chandavarkar</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICCCNT49239.2020.9225559</idno>
	</analytic>
	<monogr>
		<title level="m">11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)</title>
				<meeting><address><addrLine>Kharagpur, India</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Design of Secure Electronic Disposition Applications by Applying Blowfish, SHA-512, and RSA Digital Signature Algorithms to Government Institution</title>
		<author>
			<persName><forename type="first">H</forename><surname>Setiawan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">Rey</forename><surname>Citra</surname></persName>
		</author>
		<idno type="DOI">10.1109/ISRITI.2018.8864280</idno>
	</analytic>
	<monogr>
		<title level="m">International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)</title>
				<meeting><address><addrLine>Yogyakarta, Indonesia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="168" to="173" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">High Quality Video Traffic Ateb-Forecasting and Fuzzy Logic Management</title>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Fedevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kryvinska</surname></persName>
		</author>
		<idno type="DOI">10.1109/FiCloud.2019.00051</idno>
	</analytic>
	<monogr>
		<title level="m">7th International Conference on Future Internet of Things and Cloud (FiCloud)</title>
				<meeting><address><addrLine>Istanbul, Turkey</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="308" to="311" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Developing Fuzzy Traffic Management for Telecommunication Network Services</title>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Klishch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chupakhina</surname></persName>
		</author>
		<idno type="DOI">10.1109/CADSM.2019.8779323</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)</title>
				<meeting><address><addrLine>Polyana, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A Secure Industrial Internet of Things (IIoT) Framework for Resource Management in Smart Manufacturing</title>
		<author>
			<persName><forename type="first">A</forename><surname>Abuhasel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Khan</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2020.3004711</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="117354" to="117364" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">SHA-2 and SHA-3 based sequence randomization algorithm</title>
		<author>
			<persName><forename type="first">A</forename><surname>Nugroho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hangga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">M</forename><surname>Sudana</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICSTC.2016.7877365</idno>
	</analytic>
	<monogr>
		<title level="m">2nd International Conference on Science and Technology-Computer (ICST)</title>
				<meeting><address><addrLine>Yogyakarta</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="150" to="154" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Aadhaar Enabled Secure Private Cloud with Digital Signature as a Service</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kalyankar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Kumar</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICECA.2018.8474603</idno>
	</analytic>
	<monogr>
		<title level="m">Second International Conference on Electronics, Communication and Aerospace Technology</title>
				<meeting><address><addrLine>Coimbatore</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="533" to="538" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Mathematical model of adaptive knowledge testing</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sviridova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kozak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">5th International Conference on Perspective Technologies and Methods in MEMS Design, Zakarpattya</title>
				<imprint>
			<date type="published" when="2009">2009. 2009</date>
			<biblScope unit="page" from="96" to="97" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Scientific research of life cycle perfomance of information technology</title>
		<author>
			<persName><forename type="first">M</forename><surname>Medykovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Turchyn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies</title>
				<meeting>the 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies</meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="425" to="428" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Ateb-Gabor Filtering Simulation for Biometric Protection Systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Marchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Vysochan</surname></persName>
		</author>
		<author>
			<persName><surname>Ya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Voznyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nazarkevych</surname></persName>
		</author>
		<author>
			<persName><surname>Kuza</surname></persName>
		</author>
		<idno type="DOI">10.1109/STC-CSIT.2017.809882</idno>
	</analytic>
	<monogr>
		<title level="j">CPITS</title>
		<imprint>
			<biblScope unit="page" from="14" to="22" />
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Designing network computing systems for intensive processing of information flows of data</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mykhailyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sheketa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kondur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Varvaruk</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-43070-2_18</idno>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes on Data Engineering and Communications Technologies</title>
		<imprint>
			<biblScope unit="volume">48</biblScope>
			<biblScope unit="page" from="391" to="422" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Biometric identification system with ateb-gabor filtering</title>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lotoshynska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Brytkovskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Dmytruk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Dordiak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Pikh</surname></persName>
		</author>
		<idno type="DOI">10.1109/ELIT.2019.8892282</idno>
	</analytic>
	<monogr>
		<title level="m">Paper presented at the 2019 11th International Scientific and Practical Conference on Electronics and Information Technologies, ELIT 2019 -Proceedings</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="15" to="18" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage</title>
		<author>
			<persName><forename type="first">P</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Saroj</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICACCS48705.2020.9074337</idno>
	</analytic>
	<monogr>
		<title level="m">6th International Conference on Advanced Computing and Communication Systems (ICACCS)</title>
				<meeting><address><addrLine>Coimbatore, India</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="695" to="700" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">System analysis of caching requests on network computing nodes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sheketa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pasieka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chupakhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<idno type="DOI">10.1109/AIACT.2019.8847909</idno>
	</analytic>
	<monogr>
		<title level="m">2019 3rd International Conference on Advanced Information and Communications Technologies, AICT 2019 -Proceedings</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="216" to="222" />
		</imprint>
	</monogr>
	<note>Paper presented at the</note>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Deep Secure Encoding for Face Template Protection</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Pandey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">U</forename><surname>Kota</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Govindaraju</surname></persName>
		</author>
		<idno type="DOI">10.1109/CVPRW.2016.17</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)</title>
				<meeting><address><addrLine>Las Vegas, NV</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="77" to="83" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">An approach towards increasing prediction accuracy for the recovery of missing iot data based on the grnn-sgtm ensemble</title>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Izonin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kryvinska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Zub</surname></persName>
		</author>
		<idno type="DOI">10.3390/s20092625</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">9</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Development of the noniterative supervised learning predictor based on the ito decomposition and sgtm neural-like structure for managing medical insurance costs</title>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Izonin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Vitynskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lotoshynska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pavlyuk</surname></persName>
		</author>
		<idno type="DOI">10.3390/data3040046</idno>
	</analytic>
	<monogr>
		<title level="j">Data</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Neural Networks in Intelligent Analysis Medical Data for Decision Support</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sheketa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pasieka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><surname>Romanyshyn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IDDM</title>
		<imprint>
			<biblScope unit="page" from="252" to="264" />
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">System analysis of caching requests on network computing nodes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sheketa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pasieka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chupakhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<idno type="DOI">10.1109/AIACT.2019.8847909</idno>
	</analytic>
	<monogr>
		<title level="m">3rd International Conference on Advanced Information and Communications Technologies, AICT2019 -Proceedings</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="216" to="222" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">An efficient implementation of SHA processor including three hash algorithms</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Shin</surname></persName>
		</author>
		<idno type="DOI">10.23919/ELINFOCOM.2018.8330578</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Conference on Electronics, Information, and Communication (ICEIC)</title>
				<meeting><address><addrLine>Honolulu, HI</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Photonics applications and web engineering: WILGA 2021</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Romaniuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Smolarz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Wójcik</surname></persName>
		</author>
		<idno type="DOI">10.1117/12.2603845</idno>
		<ptr target="https://doi.org/10.1117/12.2603845" />
	</analytic>
	<monogr>
		<title level="m">Proc. SPIE 12040</title>
				<meeting>SPIE 12040</meeting>
		<imprint>
			<date type="published" when="2021-11-29">2021. 29 November 2021</date>
			<biblScope unit="page">120400Y</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
