<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Using the Sum of Real Type Functions to Encrypt Messages </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Viktor Avramenko</string-name>
          <email>vv.avramenko@cs.sumdu.edu.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykyta Bondarenko</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>   This paper presents a symmetric key cryptosystem using the sum of real type functions which allows to increase the cryptographic strength. Both transmitter and receiver choose Key Functions with the same argument, the interval for setting the argument, and the step for changing it. The symbol of the transmitted message is encrypted in an array where each element is the sum of Key Functions with random amplitudes. This sum includes those Key Functions for which the corresponding bit is one. Decryption uses disproportion functions. The system is suitable for encrypting both discrete and continuous messages.</p>
      </abstract>
      <kwd-group>
        <kwd> 1  Cryptosystems</kwd>
        <kwd>disproportion functions</kwd>
        <kwd>function of real variable</kwd>
        <kwd>key functions</kwd>
        <kwd>encryption</kwd>
        <kwd>decryption</kwd>
        <kwd>text messages</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction </title>
      <p>Widely used cryptosystems are based on the
set of integers. They implement symmetric and
asymmetric encryption algorithms. In symmetric
systems, the same key is used for both encryption
and decryption. The most famous symmetric
systems are AES [1] and GOST 28147-89 [2, 3].
To hack such a system, an enumeration of
possible keys is required. The brute-force
complexity is O(2k), where k is the key length in
bits. For symmetric systems, if the
communication channel is open, there is a
problem of secure key transmission. This problem
does not exist for asymmetric open key systems.
In these systems, the most widely used algorithms
are RSA and El-Gamal [4, 5]. The RSA algorithm
is based on the computational complexity of the
integer factorization problem. El-Gamal's
algorithm is based on the difficulty of computing
the discrete logarithm, especially over a group of
points of an elliptic curve [6]. For breaking
asymmetric cryptosystems, there are
cryptanalysis methods which are faster than full
search. This circumstance makes it necessary to
use longer keys compared to keys in symmetric
systems, but it’s not promising due to the
intensive development of the quantum computers
[7], which will significantly affect the
cryptographic strength of existing cryptosystems
[8]. The ordinal brute force has complexity O(2k),
meanwhile Grover's quantum algorithm [9]
reduces it to O(2k/2) [9].</p>
      <p>
        Implementing quantum algorithms will also
reduce the robustness of asymmetric systems. The
RSA system uses the super polynomial
computational complexity of the factorization of
natural numbers. At the same time, there is a
quantum algorithm whose complexity is
polynomial O(n3) [10]. It means the cryptographic
strength of asymmetric systems can be reduced as
a result of the implementation of Shor's quantum
algorithm for computing the discrete logarithm. In
[11], Shor's algorithm is given for the group of
points of an elliptic curve over the field GF(p)
with complexity O(n3). Implementing quantum
algorithms will also reduce the robustness of
asymmetric systems. A method for increasing the
crypto resistance of the system under these
conditions is proposed in [
        <xref ref-type="bibr" rid="ref1">12</xref>
        ]. Along with the
search for ways to hack cryptosystems, methods
for detecting signals of means of secretly
obtaining information are also being developed
[
        <xref ref-type="bibr" rid="ref2">13</xref>
        ].
      </p>
      <p>
        The above analysis shows that one should look
for other ways to create cryptosystems. In
particular, to complicate the selection of keys
using the simple enumeration method, one should
switch from using integers to real ones. It is
known [
        <xref ref-type="bibr" rid="ref3">14</xref>
        ] the set of real numbers has a higher
cardinality compared to the set of natural
numbers, so one can expect the cryptographic
strength of a cryptosystem based on real numbers
will be higher. The possibilities of creating
cryptosystems using one or more functions of a
real variable as keys are considered in [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7">15-18</xref>
        ].
      </p>
      <p>
        So, in [
        <xref ref-type="bibr" rid="ref4">15</xref>
        ], characters from the ASCII code
table are encrypted by the sum of 10 functions of
a real variable, which are keys. Each key-function
is preceded by a coefficient, which, depending on
the character being encrypted, is equal to zero or
one. The amplitudes of these functions are random
for each new symbol. The resulting sum of the
values of the functions is transmitted over the
communication channel. On the receiving side,
fragments of key functions are recognized, which
are represented in the received encrypted signal.
This allows you to decrypt the symbol transmitted
at the current time using the disproportion
functions [
        <xref ref-type="bibr" rid="ref10 ref11 ref8 ref9">19-22</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5 ref6">16, 17</xref>
        ], a variant is proposed when
symbols for transferring binary codes are encoded
with the help of three key functions of a real
variable. "1", "0", "space", "new line" are
encoded. Any other character is recognized as a
new line. For unauthorized access to the
intercepted message, you need to select the type
and parameters of the key functions.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">15-17</xref>
        ], the disproportion functions over the
first-order derivative were used. In this case, it is
necessary to apply numerical methods for
calculating the current values of the first
derivatives. The need for these calculations led to
the fact that the ciphertext significantly exceeded
the length of the encrypted message.
      </p>
      <p>
        A completely different encryption principle
was proposed in [
        <xref ref-type="bibr" rid="ref7">18</xref>
        ]. One function of the real
variable is used as the key. The disproportion
function of the numerical representation of the
encrypted process is calculated with respect to the
key function. The obtained values of the
disproportion function are an encrypted message
and are transmitted over the communication
channel. To avoid calculating the derivatives, the
integral disproportions of the first order is used
[
        <xref ref-type="bibr" rid="ref12">23</xref>
        ].
      </p>
      <p>
        The cryptosystems [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7">15-18</xref>
        ] in the process of
computer modeling have shown high
cryptographic strength when trying to guess the
parameters of keys functions, even if their form is
known. To further complicate the work of
cryptanalysts, the task is to develop a
cryptosystem that could combine the advantages
of the systems considered in [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">15-17</xref>
        ] and the
system [
        <xref ref-type="bibr" rid="ref7">18</xref>
        ]. So, it’s necessary to develop the
algorithms for encryption and decryption of
analog and discrete messages, using several
functions of a real variable as keys without the
necessity to calculate derivatives.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Mathematical  formulation  of  the  problem </title>
      <p>The message that is encrypted is a sequence of
T numeric character codes from the ASCII table
(or numeric values of the pixel brightness
components in the case of a graphic image
transmission). Each of them is encrypted using
one-dimensional arrays of length N values. These
arrays are obtained using one and the same step h
of changing the argument of m Key Functions of
the real variable. In this case, the value y(j, i) of
the matrix y(T, N) has the form:
,
,
(1) 
where:
j is the number of the character in the transmitted
message;
fq(i) = fq(ih), (i = 1, 2, … N &gt; m), (q = 1, 2, … m)
- an array of values of the q-th Key Function;
kqj - coefficients that are generated during
encryption of the j-th element and can be either
equal to zero or represent random numbers which
are unknown to the recipient.</p>
      <p>
        Key Functions can be either continuous or
discrete. These functions should be the same for
the transmitting and receiving sides and have the
same numbering. Also, the step h of changing the
argument of the Key Functions should be the
same. An encrypted message in the form of a
matrix y(T,N) is transmitted over an open
communication channel. The task is to decrypt the
message using the matrix received at the receiving
end. To solve it, the integral disproportion of the
first order is used [
        <xref ref-type="bibr" rid="ref12">23</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Disproportion functions </title>
      <p>
        One of the first publications in which
disproportion functions were proposed was [
        <xref ref-type="bibr" rid="ref8">19</xref>
        ].
In particular, the disproportion with respect to the
n-th-order derivative of the function y(x) with
respect to x is described by the expression:
1
⋅
,
      </p>
      <p>!</p>
      <p>Here the @ symbol is chosen to denote the
operation of calculating disproportion. The
symbol "d" stands for "derivative". The order is
indicated in parentheses. The left part (2) reads "et
d n y with respect to x". The order n ≥ 1 is an
integer. If for any value of x, the function y(x) has
the form y = kxn, then disproportion (2) is equal to
zero regardless of the value of the coefficient k.</p>
      <p>For the case when n = 1,
,</p>
      <p>For defining the functions parametrically,
when, x = φ(t), y = ψ(t), where t is a parameter,
disproportion (3) is described by the expression
(4) 
⋯
,
,</p>
      <p>
        For ψ(t) = kφ(t) disproportion (4) is equal to
zero in the entire area of existence x = φ(t),
regardless of the value of k. In [
        <xref ref-type="bibr" rid="ref8">19</xref>
        ], the case was
considered when
      </p>
      <p>where f1(x), f2(x), … fm(x) are known
functions; k1, k2, … km are coefficients whose
values are unknown.</p>
      <p>
        It is shown that the disproportion functions
allow calculating the values of the unknown
coefficients in (5) from the data obtained for the
current value of the argument. This opportunity is
used to create cryptosystems [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">15-17</xref>
        ].
      </p>
      <p>
        In practice, often the first derivative of the
function does not exist or is equal to zero on some
interval. This excludes the possibility of using
disproportions over the first-order derivative
(24). In this case, it is advisable to use the integral
disproportion of the first order [
        <xref ref-type="bibr" rid="ref12">23</xref>
        ]. This
disproportion of the function y(x) with respect to
f(x) has the form:
,
(6) 
(2)
(3) 
(5) 
      </p>
      <p>In this case, y(x) and f(x) are represented by
one-dimensional arrays. If the approximate values
of the integrals in (6) are calculated using the
trapezoid formula, then for the one and the same
step h for y(x) and f(x), disproportion (6) takes the
following form (7):
,</p>
      <p>(7) 
and 
decrypting </p>
      <p>The transmitting and receiving sides must have
the same system of m Key Functions of the real
variable, their numbering, the interval of changing
the argument and step h of its change. The number
of elements N of the one-dimensional array
corresponding to the encrypted character must
also be set. These can be both characters from the
ASCII table, and components of pixel brightness
when transmitting color graphic images. Each of
them is represented by an integer. The required
number of Key Functions depends on the
maximum value of this number. For example, to
encrypt characters from the ASCII table, m = 8
Key Functions are required. They can be either
continuous or discrete. If the Key Functions are
continuous, it is necessary to calculate N elements
of one-dimensional arrays of their values,
changing the argument from the initial xmin to the
final xmax value with a step h. When encrypting
characters from the ASCII table or the pixel
brightness, their numerical representations differ
by one. In these cases, the step h of changing the
argument must be equal to one.</p>
      <p>An m-bit binary code corresponds to each
encrypted character. Each bit in this code is
associated with a specific number of the Key
Function. If the bit is zero, the value of the
corresponding Key Function is also zero. If the bit
is equal to one, then a random value of the
amplitude of the corresponding Key Function is
played. The character to be encrypted is
represented by the sum (1).
4.1.</p>
    </sec>
    <sec id="sec-4">
      <title>Encrypting messages </title>
      <p>1. The following is a character encryption
algorithm:</p>
      <p>2. Calculate arrays of N &gt; m values of Key
Functions: fq(x), q = 1, 2… m.</p>
      <p>3. Enter the encrypted j-th character and
calculate its cipher in the form of values of the
where h - is the preset time interval. In the discrete
representation of signals, this is a time
quantization step.
, 1
F
j, i
, 1
,
0 ,
,
k
,
,
,</p>
      <p>Taking into account that the disproportion of
F21(j, i) with respect to F21(j, i) is equal to zero, we
get:</p>
      <p>Third level: The disproportion of F0121(j, i)
with respect to F3121(j,i) is calculated in the
following way</p>
      <p>It is equal to zero because, as can be seen from
(14), there is a proportional relationship between
F0121(j, i) and F3121(j, i). This fact allows
calculating from (14) k3j and k2j, k1j for the j-th
message symbol.
,
,
,
,</p>
      <p>,
,
,
(14)
(15)
(16)
(17)
(18) 
one-dimensional array y(j, i), i = 1, 2... N
according to (1).</p>
      <p>4. Repeat this point for all characters of the
message of length T.</p>
      <p>5. A sequence of T arrays is an encrypted
message transmitted over an open communication
channel.
4.2.</p>
    </sec>
    <sec id="sec-5">
      <title>Decrypting messages </title>
      <p>Pre-compute the arrays fq(i) = fq(ih),
(q = 1, 2, ... m), (i = 1, 2, ... N &gt; m), of Key
Functions and to receive T one-dimensional
arrays y(j , i), j = 1, 2, ... T, i = 1, 2, ... N over the
communication channel. Further, in order to
simplify the description of the decryption process,
an example is given when only three functions are
used in the cryptosystem - the keys: f1(x), f2(x),
f3(x). In this case m = 3. Accordingly, the j-th
character of the message is encrypted as
, , (8) </p>
      <p>1, 2, … 3 ,</p>
      <p>The process consists of m = 3 levels in
accordance with the number of Key Functions.</p>
      <p>First level: It is necessary to calculate the array
of disproportions (7) y(j,i) with respect to any of
the Key Functions , for example, f1(i):</p>
      <p>,
, 1</p>
      <p>,
,
,</p>
      <p>(9) 
,</p>
      <p>(12)
1
where i = 2, 3…N.</p>
      <p>Also calculate the disproportions (7) of the
remaining key functions with respect to f1(i):</p>
      <p>(10)
1
where r = 2, 3.</p>
      <p>Considering that the disproportion of the
function relative to itself is zero, we get:</p>
      <p>, , , , (11)</p>
      <p>Second level: It is necessary to select any
disproportion from right-hand of (11), for
example F21(j, i). It is used to calculate next
disproportions:
, 1
,
,</p>
      <p>Depending on which of these coefficients are
nonzero and which are equal to zero, the j-th
message symbol is decrypted. In practice, it must
be taken into account that there are calculation
errors.</p>
      <p>Therefore, it is necessary to compare the
disproportion (15) calculated at the last level in
modulus not strictly with zero, but with an
approximate number ɛ. For example, it could be
ɛ=10-4. In this case, if | F01213121(j, i) | &lt;= ɛ, then it
should be assumed that it is zero.</p>
      <p>The value of ɛ is determined during testing of
the cryptosystem. Theoretically, this
disproportion is equal to zero for all i = 2, 3, ... N,
but, taking into account the calculation errors, it is
recommended to do calculations using formulas
(16-18) for i, at which the modulus of
disproportion (15) is minimal.
decrypting  characters  from  an  ASCII </p>
      <p>An  example  of  encrypting  and  select the form of eight Key Functions and the
are given in the form of arrays arranged vertically. level in absolute value exceeds the permissible
values of their parameters.
Encrypted and decrypted characters “Hello” 
y ‘H’
‘e’
‘l’
‘l’ </p>
      <p>‘o’</p>
    </sec>
    <sec id="sec-6">
      <title>5. Requirements for Key Functions </title>
      <p>1. The Key Functions must be of real type.</p>
      <p>They can’t be constant and must not take
zero values.</p>
      <p>When using the key function, there
should be no situation where division by a number
close to zero occurs, which leads to an
unacceptable calculation error. For this purpose, it
is recommended to test the cryptosystem for the
entire alphabet of characters that will be used in
messages.</p>
      <p>4. Check that the sum of two or more key
functions does not coincide with any other of the
key functions.</p>
      <p>5. It is recommended to include all
parameters in the expression for each key
function. In this case, a change in the value of any
parameter leads to a change in all key functions,
but not one or several of them only.</p>
      <p>6. Before sending an encrypted message,
first check what the decrypted message looks like
in order to avoid errors that may occur as a result
of not taking into account the previous points.</p>
    </sec>
    <sec id="sec-7">
      <title>6. Conclusions </title>
      <p>A cryptosystem with symmetric keys is
proposed. These keys are real variable functions
that satisfy the above constraints. They can be
either continuous or discrete. The number of
functions is equal to the number of binary digits
used to encrypt a character, for example, in an
ASCII table. Each of the functions corresponds to
a certain binary digit. The symbol of the
transmitted message is encrypted with a
onedimensional array. The elements of this array
represent the sum of Key Functions with random
amplitudes. This sum includes those Key
Functions, for which the corresponding binary
digit is equal to one.</p>
      <p>Decryption is performed using disproportion
functions. The possibility of encryption and
decryption of text information is shown. The
given examples show the complexity the guessing
Key Functions and the cryptographic strength of
the proposed cryptosystem. So, for example, a
real-type constant, which equals 400 during
encryption, to break the system by brute-force,
you need to select with an accuracy of 10-4, but
there can be any number of such constants. It is
very difficult to find all the constants of the real
type at the same time with high precision and thus
hack the system, even with well-known formulas
of functions - keys.</p>
      <p>It should also be noted that the codes of the
same adjacent symbols are not repeated, which
can be seen from Table 2. This also increases the
cryptographic strength of the system.</p>
    </sec>
    <sec id="sec-8">
      <title>7. References </title>
      <p>[1] National Institute of Standards and
Technology, Specification for the
ADVANCED ENCRYPTION STANDARD
(AES) (2001). doi: 10.6028/NIST.FIPS.197.
[2] GOST 28147-89. Sistemy obrabotki
informacii. Zashhita kriptograficheskaya.
Algoritm kriptograficheskogo
preobrazovaniya [Information processing
systems. Cryptographic protection.
Cryptographic Transformation Algorithm],
1990.
[3] A. N. Lebedev, Kriptografiya s «otkrytym
klyuchom» i vozmozhnosti ee
prakticheskogo primeneniya [Cryptography
with "public key" and the possibilities of its
practical application], Zashhita informacii.</p>
      <p>Konfident 2 (1992)
[4] R. Rivest, A. Shamir, I. Adleman, A method
for obtaining digital signatures and
publickey cryptosystems, Communications of the
ACM, 1978, 21(2):120-126.
doi:10.1145/359340.359342.
[5] I. D. Gorbenko., Y. I. Gorbenko, Prykladna
kryptolohiya [Applied Cryptology], Fort,
NURE, Kharkiv, 2012, p. 878.
[6] D. R. Hankerson, S. A. Vanstone and A. J.</p>
      <p>Menezes., Guide to elliptic curve
cryptography, Springer, New York, 2003, p.
311.
[7] T. D. Ladd, F. Jelezko, R. Laflamme, Y.</p>
      <p>Nakamura, C. Monroe, J. L. O’Brien,
Quantum Computing, Nature, 464 (2010)
45—53. doi: 10.1038/nature08812.
[8] P. G. Klucharev, Kvantovyj komp'yuter i
kriptograficheskaya stojkost' sovremennyx
sistem shifrovaniya [Quantum computer and
cryptographic strength of modern encryption
systems], Herald of the Bauman Moscow
State Technical University, Series Natural
Sciences 2 (2007).
[9] I.K. Grover, Quantum Mechanics Help in
Searching for a Needle in a Haystack, Phys.
Rev. Lett. 79, 325 (1997): 326-328. doi:
10.1103/PhysRevLett.79.325.
[10] P. Shor, Polynomial-Time Algorithms for
Prime Factorization and Discrete Logarithms
on a Quantum Computer, in: Proceedings of
the 35th Annual Symposium of Foundations
of Computer Science, 1994. doi:
10.1137/S0097539795293172.
[11] J. A. Proos, Shor’s discrete logarithm
quantum algorithm for elliptic curves,
Faculty of Mathematics University of
Waterloo, Waterloo, 2003, p. 35.
Code Constructions for Multirays Radio
Channels. Second International
ScientificPractical Conference Problems of
Infocommunications. Science and
Technology. IEEE PIC S&amp;T 2015. pp. 269
– 271.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Korolyov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tkachov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Laptiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Opirskyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Soloviova</surname>
          </string-name>
          .
          <article-title>Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period</article-title>
          ,
          <source>International Journal of Advanced Trends in Computer Science and Engineering</source>
          ,
          <year>2020</year>
          , volume
          <volume>9</volume>
          , pp.
          <fpage>8725</fpage>
          -
          <lpage>8729</lpage>
          . doi:
          <volume>10</volume>
          .30534/ijatcse/2020/261952020.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>O.</given-names>
            <surname>Barabash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Laptiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tkachev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Maystrov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Krasikov</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Polovinkin</surname>
          </string-name>
          ,
          <article-title>The Indirect method of obtaining Estimates of the Parameters of Radio Signals of covert means of obtaining Information</article-title>
          ,
          <source>International Journal of Emerging Trends in Engineering Research</source>
          ,
          <year>2020</year>
          , volume
          <volume>8</volume>
          , pp.
          <fpage>4133</fpage>
          -
          <lpage>4139</lpage>
          . doi:
          <volume>10</volume>
          .30534/ijeter/2020/17882020.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Kolmogorov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Fomin</surname>
          </string-name>
          ,
          <article-title>Ehlementy teorii funkcij i funkcional'nogo analiza [Elements of function theory and functional analysis]</article-title>
          ,
          <source>Science</source>
          , Moscow,
          <year>1972</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Avramenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Zabolotny</surname>
          </string-name>
          ,
          <source>A Way of Data Coding</source>
          ,
          <year>2009</year>
          . Patent No.
          <volume>42957</volume>
          ,
          <string-name>
            <surname>Filled</surname>
            <given-names>March</given-names>
          </string-name>
          16th,
          <year>2009</year>
          ,
          <string-name>
            <given-names>Issued</given-names>
            <surname>July</surname>
          </string-name>
          27th,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Kalashnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Avramenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>N. I. Kalashnikova</surname>
          </string-name>
          and
          <string-name>
            <given-names>Kalashnikov</given-names>
            <surname>Jr</surname>
          </string-name>
          . V.V.,
          <string-name>
            <given-names>A Cryptosystem</given-names>
            <surname>Based</surname>
          </string-name>
          <article-title>Upon Sums of Key Functions</article-title>
          ,
          <source>International Journal of Combinatiorial Optimization Problems and Informatics</source>
          ,
          <year>2017</year>
          , volume
          <volume>8</volume>
          , pp.
          <fpage>31</fpage>
          -
          <lpage>38</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>N. I.</given-names>
            <surname>Kalashnikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Avramenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kalashnikov</surname>
          </string-name>
          .
          <article-title>Sums of Key Functions Generating Cryptosystems</article-title>
          ,
          <source>in: ICCS</source>
          <year>2019</year>
          , Chapter
          <volume>23</volume>
          , Lecture Notes in Computer Science, vol.
          <volume>11540</volume>
          , Springer, Cham,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -22750-0_
          <fpage>23</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Avramenko</surname>
          </string-name>
          , V. Demianenko, in: CEUR Workshop Proceedings,
          <year>2020</year>
          ,
          <volume>2608</volume>
          , pp.
          <fpage>661</fpage>
          -
          <lpage>674</lpage>
          . doi:
          <volume>10</volume>
          .15588/
          <fpage>1607</fpage>
          -3274- 2020-2-8.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Avramenko</surname>
          </string-name>
          ,
          <article-title>Characteristic properties of disproportionality functions and their application to solving diagnoses problems</article-title>
          , Transactions of Sumy State University, SSU, Sumy,
          <year>2000</year>
          , №
          <volume>16</volume>
          , pp.
          <fpage>24</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Kalashnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Avramenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>N. I. Kalashnykova</surname>
          </string-name>
          ,
          <article-title>Derivative disproportion functions for pattern recognition</article-title>
          , in: Watada,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Tan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.C.</given-names>
            ,
            <surname>Vasant</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Padmanabhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Jain</surname>
          </string-name>
          , L.C. (eds.) Unconventional Modelling,
          <source>Simulation, and Optimization of Geoscience and Petroleum Engineering</source>
          , pp.
          <fpage>95</fpage>
          -
          <lpage>104</lpage>
          . Springer, Heidelberg,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Kalashnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Avramenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. Y.</given-names>
            <surname>Slipushko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.I.</given-names>
            <surname>Kalashnykova</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.I.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Konoplyanchenko</surname>
          </string-name>
          ,
          <article-title>Identification of quasistationary dynamic objects with the use of derivative disproportion functions</article-title>
          ,
          <source>Procedia Comput. Sci.,</source>
          (
          <year>2017</year>
          ) 108(C):
          <fpage>2100</fpage>
          -
          <lpage>2109</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Avramenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Moskalenko</surname>
          </string-name>
          ,
          <article-title>Operative Recognition of Standard Signals in the Presence of Interference with Unknown Characteristics</article-title>
          , in: Proceedings of the Second International Workshop on Computer Modeling and
          <article-title>Intelligent Systems (CMIS-</article-title>
          <year>2019</year>
          ), Zaporizhzhia,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Karpenko</surname>
          </string-name>
          ,
          <article-title>Integral'nye harakteristiki neproporcional'nosti chislovyh funkcij i ih primenenie v diagnostike [Integral characteristics of the disproportionality of numerical functions and their application in diagnostics], Vestnik Sumskogo gos</article-title>
          . un-ta.
          <volume>16</volume>
          (
          <year>2000</year>
          ):
          <fpage>20</fpage>
          -
          <lpage>25</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Vitalii</surname>
            <given-names>Savchenko</given-names>
          </string-name>
          , Oleksandr Laptiev, Oleksandr Kolos, Rostyslav Lisnevskyi, Viktoriia Ivannikova,
          <string-name>
            <given-names>Ivan</given-names>
            <surname>Ablazov</surname>
          </string-name>
          .
          <source>Hidden Transmitter Localization Accuracy Model Based on Multi-Position Range Measurement</source>
          .
          <source>2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25-27</source>
          . pp.
          <fpage>246</fpage>
          -
          <lpage>251</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Valentin</surname>
            <given-names>Sobchuk</given-names>
          </string-name>
          , Volodymyr Pichkur, Oleg Barabash, Oleksandr Laptiev, Kovalchuk Igor,
          <string-name>
            <given-names>Amina</given-names>
            <surname>Zidan</surname>
          </string-name>
          .
          <article-title>Algorithm of control of functionally stable manufacturing processes of enterprises</article-title>
          .
          <source>2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25-27</source>
          . pp.
          <fpage>206</fpage>
          -
          <lpage>211</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Oleksandr</surname>
            <given-names>Laptiev</given-names>
          </string-name>
          , Oleh Stefurak, Igor Polovinkin, Oleg Barabash, Savchenko Vitalii,
          <string-name>
            <given-names>Olena</given-names>
            <surname>Zelikovska</surname>
          </string-name>
          .
          <article-title>The method of improving the signal detection quality by accounting for interference</article-title>
          .
          <source>2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25-27</source>
          . pp.
          <fpage>172</fpage>
          -
          <lpage>176</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Mashkov</surname>
            <given-names>V.A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Barabash</surname>
            <given-names>O.V.</given-names>
          </string-name>
          <article-title>SelfTesting of Multimodule Systems Based on Optimal Check-Connection Structures</article-title>
          . Engineering Simulation. Amsterdam: OPA,
          <year>1996</year>
          . Vol.
          <volume>13</volume>
          , pp.
          <fpage>479</fpage>
          -
          <lpage>492</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>S.</given-names>
            <surname>Toliupa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lukova-Chuiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Oksiuk</surname>
          </string-name>
          .
          <article-title>Choice of Reasonable Variant of Signal and</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>