<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Devices for Modularizing Numbers into a Square in Applications based on Public-Key Cryptography</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sakhybay Tynymbayev</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergiy Gnatyuk</string-name>
          <email>s.gnatyuk@nau.edu.ua</email>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Margulan Ibraimov</string-name>
          <email>Margulan.Ibraimov@kaznu.kz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Timur Namazbayev</string-name>
          <email>t.namazbayev@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Assel Mukasheva</string-name>
          <email>mukasheva.a.82@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Al-Farabi Kazakh National University</institution>
          ,
          <addr-line>71 Al-Farabi ave., Almaty, 050040</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>International University of Information Technology</institution>
          ,
          <addr-line>34/1 Manas str., Almaty, 050000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Kazakh-British Technical University</institution>
          ,
          <addr-line>59 Tole Bi str., Almaty, 050000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Maksyma Zaliznyaka str.</institution>
          ,
          <addr-line>Kyiv, 03142</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Liubomyra Huzara ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>32 microdistrict, Aktau, 130000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <fpage>513</fpage>
      <lpage>519</lpage>
      <abstract>
        <p>Public-key cryptography solves the problem of key distribution, which is inherent in symmetric cryptography. However, there are problems associated with the high resource consumption of such crypto algorithms, which necessitates new methods to increase speed. The work is dedicated to the development of devices that perform modular squarebuilding, which is one of the basic operations in the implementation of public-key cryptosystems. The resolution of the implementation approach is being analyzed. The method is considered where the multiplication of a number by bits thereof is carried out starting from its senior digits. Two variants are proposed for the implementation of the central unit of the Partial Residue Shaper (PRF). The workability of the developed devices has been tested on the FPGA Artix-7 using the Verilog hardware description language.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Public key cryptography</kwd>
        <kwd>hardware implementation of cryptosystems</kwd>
        <kwd>device</kwd>
        <kwd>modular square construction</kwd>
        <kwd>partial residue shaper</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Cryptographic security is one of the most
reliable ways to address data security
problems in computer systems and networks.</p>
      <p>Cryptographic protection ensures the
conversion of open text into micro text by
encrypting source text using cryptographic
algorithms [1, 2].</p>
      <p>
        In modern cryptosystems, asymmetric
encryption [3] is widely used. This is because
public-key cryptosystems have potentially
high security as compared to symmetric (one
key) cryptosystems with a private key: there is
no need to transfer and authenticate secret
keys. A disadvantage of public-key
cryptosystems is their low speed, as encryption and
decryption procedures use much more
complex and cumbersome mathematical
calculations over large numbers [
        <xref ref-type="bibr" rid="ref6">4–7</xref>
        ].
      </p>
      <p>
        Encryption can be done with software,
hardware, and hardware [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ].
      </p>
      <p>
        Hardware encryption has several
significant advantages over software
encryption [
        <xref ref-type="bibr" rid="ref8">9</xref>
        ]:
• Hardware encryption tools are faster
(hardware implementation of any
algorithm, including cryptographic
algorithm, provides faster action than
software implementation).
• Encryption equipment is easier to
physically protect from external
intrusion than software.
• Hardware implementation of
crypto
      </p>
      <p>systems guarantees its integrity.
• Encryption and storage of keys is carried
out in the cipher board itself and not in
the computer’s RAM.
• It is possible to create systems based on
hardware ciphers to protect information
from unauthorized access and to delimit
access to a computer.
• The use of paraphrase tires in the
microprocessor architecture eliminates
the threat of removing key information
on electromagnetic radiation oscillations
in the chains “Earth—Power”
microcircuits, etc., arising during
cryptographic transformations.</p>
      <p>Define the basic operations over the
numbers used in asymmetric cryptographic
encryption algorithms. The construction of
integers A to the power X modulo P (Ах mod P)
is carried out by carrying out operations such
as modular multiplication, and modular
squaring. One approach to increasing the
performance of public-key cryptosystems is to
speed up the execution of these operations.</p>
      <p>This work deals with the development of a
modular square device. Various approaches to
its development are analyzed.
2. Literature Review and Problem</p>
      <p>
        Statement
In the first approach, a device for placing a
number A in a square is separately
synthesized, forming a 2N-bit number. Then,
with the individual device, the 2N-bit number
is given modulo. In the works [
        <xref ref-type="bibr" rid="ref10 ref9">10, 11</xref>
        ] the
methods of synthesis of a small-bit square and
a multiplier are disclosed. They are then
extended to produce the required 2N-bit
devices.
      </p>
      <p>
        With this approach, the complexity of
synthesized devices increases dramatically as
the number A decreases. The works [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14 ref15">12–16</xref>
        ]
consider various variants of the synthesis of
devices for squaring a number on different
digital nodes and blocks, whereas the number
A increases the complexity of the device also
increases sharply.
      </p>
      <p>
        In the works [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20 ref21">17–22</xref>
        ] various variants of
synthesis of autonomous devices of numbers
modulo are considered.
      </p>
      <p>In the second approach, the elementary
operations of squaring and modular
multiplication are combined in one step. The
squared number A in each step is multiplied by
the polynomial members A =  0 +
 121 … . +  −22 −1 +   −12 −1 from the lower
or higher bits with the result of multiplication
modulo P.</p>
      <p>This article discusses a second approach—
the development of a device for modular
squaring of numbers, where multiplication is
carried out from the higher bits of the factor.
3. Development of the Devices
3.1. Devices for Modularizing into a</p>
      <p>Square
Fig. 1 shows a functional modular squaring
circuit where multiplication A begins with a
higher bit—  −1.</p>
      <p>The device comprises RgA1 and RgA2
registers for receiving and storing the number
A. RgA2 has a left-to-left shift circuit, RgP
serves for storing the module P, RgR for storing
the current residue values and the result of the
operation. There are also Add1 binary and
Partial Residue Shaper (PRF), Synchronization
Block (BSIN), which contains a subtracting
counter (Count), delay lines DL.1, DL.2, DL.3.</p>
      <p>BSIN inputs are provided with Clock pulse
signals, the binary N-1 shift number code.</p>
      <p>Clock signals are emitted at BSIN outputs and
are directed to the input of the moving RgA2.</p>
      <p>Count = 0 BSIN generates the “End of
operation” signal.</p>
      <p>
        Fig. 2 shows the functional circuit of the PRF
partial residue shaper (1-variant), which
consists of two binary Add3 and Add2 and a
block of AND8-AND10 circuits, and a block of
OR1 circuits. Left-shifting ̅Р is applied to the
right inputs of Add3, and ̅Р is shifted to the
right inputs of Add2. The input of the lower bits
of adders is given a level of +1. On the left
inputs of Add1 the sum   = 2  −1 +  ∗   is
given from the outputs of the Add1 adder. In
PRF, the operation   =     . is executed
[
        <xref ref-type="bibr" rid="ref22 ref23 ref24">23–25</xref>
        ].
In addition, Add2 executes   +  ̅ + 1 and
Add1 executes   + 2 ̅ + 1. Furthermore, if
  &gt; 2 , then the transfer signal  3 = 1   − 2
difference from the Add3 output is transmitted
to the output of the AND8 block as a result.
      </p>
      <p>Furthermore, Add3 takes the value Sign3 = 0,
which blocks the transfer to the output AND9
of the difference   − Р from the outputs of
Add2.
With   &gt; 2 the signal on the symbol output of the value   to the outputs AND8 and OR3. In
of the Add2 Sign2 = 0, which blocks the this case, R =   .
transfer to the output of AND10 of the value   . Let’s consider an example. А = 4310 =</p>
      <p>With   ˂2 , Sign3 = 1 and  2 = 1 allow the { 5  4 3 2 1 0
difference   −  from Add2 output to be 1 0 1 0 1 12
transmitted to AND9 outputs. Furthermore,  = 5410: 2 = 10810
the Sign2 = 0 signal blocks the transmission of Calculation order  = 432 54 is shown
the   value to the outputs of AND10. For   &lt; in Table 1.
2Р и   &lt;  , the Sign2 = 1 signal   is
transmitted to the PRF output via the AND10
block of circuits.</p>
      <p>Since the hardware cost of an N-bit binary
adder is about 3 times that of an N-bit
comparison circuit, it is advisable to construct
a partial residue collector by replacing one
binary adder with two comparison schemes.</p>
      <p>For this reason, Fig. 3 shows the second variant
of the PRF partial residue shaper functional
scheme, which is based on one binary adder
and two comparison schemes COMP-1 and
COMP-2.</p>
      <p>In this scheme, the value   = 2  −1 +   ∗
 is given by the left inputs of the COMP-1
scheme, where it is compared to the value of
2P, and in the COMP-2 scheme the value of   is
compared to the value of P. If it is   ≥ 2Р, then
at the output of 2 COMP-1 the “1” signal is
generated, which allows the 2̅Р value to pass to
the right inputs of the Add2 adder. Since the
value of   is given to the left inputs,   =   +
2 ̅ + 1 is executed.</p>
      <p>If 2 &gt;   ≥  conditions are met, then a
signal “1” is formed at the output of the AND9
circuit, which allows passing the value Р̅.   =
  +  ̅ + 1 to the right inputs of Add2.</p>
      <p>When   &lt; Р a single signal is generated at Fig. 3. Functional circuit of the partial residue
output 1 of COMP-2, which allows the passage shaper (2—variant)
Checking:  = 432 = 1849 54 =
1849 − 1836 = 1310</p>
      <p>In Fig. 4 a functional circuit of the device of
modular number-squaring based on two Add1,
Add2, and two PRF residue shapers (2—
  =   
= 43
= 86
= 107
= 106
 0 =  0
 1 =  1
54 = 4310
5 = 3210
 2 =  2
 3 =  3
 4 =  4
= 5310
= 5210
= 147 − 2 = 147 − 108 = 3910
 5 =  5</p>
      <p>
        = 121 − 2 = 121 − 108 = 1310
variant) is shown, where on each clock number
A is multiplied by two higher bits of the RgA2
register, which reduces by half the number of
shifts of RgA2 [
        <xref ref-type="bibr" rid="ref24">25</xref>
        ].
Figs. 5 and 6 present the time diagrams of the
above-considered devices for modular square
construction with one-bit and two-bit analysis
of the RgA2 multiplier per clock.
      </p>
    </sec>
    <sec id="sec-2">
      <title>4. Conclusions</title>
      <p>The experimental research showed the correct
functioning of the developed devices for
modularizing numbers into a square. A
singlestage synthesis of the modular squaring device
is more efficient than a two-stage synthesis,
which makes it possible to handle the required
number of operand bits without complicating
the structure and composition of the operating
blocks.</p>
      <p>Future research study is related to the
practical implementation of the proposed
devices in real cryptosystems to provide
security and privacy at high speed.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>Recommendations on the Importance of Critical Energy Infrastructure (CEI) Stakeholder Engagement, Coordination and Understanding of Responsibilities in Order to Improve Security, NATO Energy Security Centre of Excellence (</article-title>
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>Cybersecurity in the Energy Sector</article-title>
          , European Commission, Energy Security,
          <article-title>Online Access Mode</article-title>
          . URL: https://ec.europa.eu/energy/topics/en ergy-security/
          <article-title>critical-infrastructureand-cybersecurity_en?redir=1</article-title>
          <string-name>
            <given-names>S.</given-names>
            <surname>Mohammed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Taha</surname>
          </string-name>
          ,
          <article-title>Performance Evaluation of RSA, ElGamal, and Paillier Partial Homomorphic Encryption Algorithms</article-title>
          , International Conference on Computer Science and Software
          <string-name>
            <surname>Engineering</surname>
          </string-name>
          (
          <year>2022</year>
          )
          <fpage>89</fpage>
          -
          <lpage>94</lpage>
          . doi:
          <volume>10</volume>
          .1109/CSASE51777.
          <year>2022</year>
          .
          <volume>9759825</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <article-title>CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>36</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          3187, no.
          <issue>1</issue>
          (
          <year>2022</year>
          )
          <fpage>302</fpage>
          -
          <lpage>309</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Modeling</surname>
            <given-names>CSIKE</given-names>
          </string-name>
          <article-title>Algorithm on Non-Cyclic Edwards Curves</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Multifunctional</surname>
            <given-names>CRS</given-names>
          </string-name>
          <article-title>Encryption Scheme on Isogenies of NonSupersingular Edwards Curves</article-title>
          , in: Workshop on Classic, Quantum, and
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          , vol.
          <volume>3504</volume>
          (
          <year>2023</year>
          )
          <fpage>12</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          ,
          <article-title>Stability Verification of Self-Organized Wireless Networks with Block Encryption</article-title>
          ,
          <source>in: 5th International Workshop on Computer Modeling and Intelligent Systems</source>
          , vol.
          <volume>3137</volume>
          (
          <year>2022</year>
          )
          <fpage>227</fpage>
          -
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Zhmurko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Falat</surname>
          </string-name>
          ,
          <article-title>Efficiency Increasing Method for Quantum Secure Direct Communication Protocols</article-title>
          ,
          <source>IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          .
          <volume>1</volume>
          (
          <year>2015</year>
          )
          <fpage>468</fpage>
          -
          <lpage>472</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Mittal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Sidney</surname>
          </string-name>
          ,
          <article-title>Secure Data Communication Using Padding Key Encryption Cryptography Algorithm</article-title>
          ,
          <source>IEEE International Conference on Integrated Circuits and Communication Systems</source>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICICA CS57338.
          <year>2023</year>
          .
          <volume>10099570</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Method of Searching Birationally Equivalent Edwards Curves Over Binary Fields, Adv. Intel. Syst. Comput</source>
          .
          <volume>754</volume>
          (
          <year>2019</year>
          )
          <fpage>309</fpage>
          -
          <lpage>319</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Aitkhotayeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tynymbayev</surname>
          </string-name>
          , Aspects of Modular Hardware in Asymmetric Cryptography,
          <source>Gazette of the National Academy of Sciences</source>
          <volume>5</volume>
          (
          <year>2014</year>
          )
          <fpage>88</fpage>
          -
          <lpage>93</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sethi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Panda</surname>
          </string-name>
          ,
          <article-title>An Improved Squaring Circuits for Binary Nowbens</article-title>
          ,
          <source>Int. J. Adv. Comput. Sci. Appl</source>
          .
          <volume>3</volume>
          (
          <issue>2</issue>
          ) (
          <year>2012</year>
          )
          <fpage>111</fpage>
          -
          <lpage>116</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <source>Hardware Implementation of 16*16 Multiplayer and Square Using Vedie Mathematics, International Conference on Signal Image and Video Processing</source>
          (
          <year>2012</year>
          )
          <fpage>309</fpage>
          -
          <lpage>314</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kvardakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Khromov</surname>
          </string-name>
          ,
          <source>Probing Devices in the Square Copyright Certificate USSR</source>
          <volume>1417007</volume>
          ,
          <issue>13</issue>
          (
          <year>1992</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
            <surname>Organs</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Cornienko</surname>
          </string-name>
          , L. Akulova, Copyright Certificate
          <volume>699521</volume>
          ,
          <issue>48</issue>
          (
          <year>1992</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Drozd</surname>
          </string-name>
          , et al.,
          <source>Square Probing Device, Copyright Certificate Soviet Union</source>
          <volume>1451686</volume>
          ,
          <issue>1</issue>
          (
          <year>1990</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
            <surname>Laqin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Shabadash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shapito</surname>
          </string-name>
          , Squaring Device,
          <source>Copyright Certificate USSR</source>
          <volume>656056</volume>
          ,
          <issue>11</issue>
          (
          <year>1990</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>R.</given-names>
            <surname>Román</surname>
          </string-name>
          , et al.,
          <article-title>A Quantum-Resistant Face Template Protection Scheme using Kyber and Saber Public Key Encryption Algorithms</article-title>
          , International Conference of the Biometrics Special Interest Group (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/BIOSIG55365.
          <year>2022</year>
          .
          <volume>9897052</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ohromenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sorcerer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sorcerer</surname>
          </string-name>
          ,
          <article-title>Method of Bringing Integers After the Module, Patent on Corinth model</article-title>
          ,
          <source>UA</source>
          <volume>118066</volume>
          ,
          <issue>14</issue>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Tynymbayev</surname>
          </string-name>
          , et al.,
          <article-title>Schematic Solutions of the Establishment of Numbers Modulo for Public Key Measurement</article-title>
          , AUES Gazettem, (
          <year>2018</year>
          )
          <fpage>33</fpage>
          -
          <lpage>41</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Tynymbayev</surname>
          </string-name>
          ,
          <article-title>Hig Speed Devices for Modular Reduction with Hardware Costs</article-title>
          , Cogent Eng.
          <volume>6</volume>
          (
          <issue>1</issue>
          ) (
          <year>2019</year>
          )
          <article-title>1697555</article-title>
          . doi:
          <volume>10</volume>
          .1080/23311916.
          <year>2019</year>
          .
          <volume>1697555</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.</given-names>
            <surname>Tynymbayev</surname>
          </string-name>
          , et al.,
          <source>Devices for Bringing Numbers Modulo, Patent KZ 133812</source>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <article-title>Method of Algorithm Building for Modular Reducing by Irreducible Polynomial</article-title>
          , 16th International Conference on Control,
          <source>Automation and Systems</source>
          (
          <year>2016</year>
          )
          <fpage>1476</fpage>
          -
          <lpage>1479</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>O.</given-names>
            <surname>Oksiiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Chaikovska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fesenko</surname>
          </string-name>
          ,
          <article-title>Security Technique for Authentication Process in the Cloud Environment</article-title>
          , IEEE International Scientific-Practical Conference: Problems of Infocommunications Science and
          <string-name>
            <surname>Technology</surname>
          </string-name>
          (
          <year>2019</year>
          )
          <fpage>379</fpage>
          -
          <lpage>382</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Srivastava</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tiwari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Srivastava</surname>
          </string-name>
          ,
          <source>Review on Quantum Safe Algorithms Based on Symmetric Key and Asymmetric Key Encryption methods, 2nd International Conference on Advance Computing and Innovative</source>
          Technologies in Engineering (
          <year>2022</year>
          )
          <fpage>905</fpage>
          -
          <lpage>908</lpage>
          , doi: 10.1109/ICACITE53722.
          <year>2022</year>
          .
          <volume>9823437</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>