<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Enhancing information transmission security with stochastic codes ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bohdan Zhurakovskyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergei Otrokh</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykhailo Poliakov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Poliakov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavlo Skladannyi</string-name>
          <email>p.skladannyi@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., 04053 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>CQPC-2024: Classic</institution>
          ,
          <addr-line>Quantum, and Post-Quantum Cryptography</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute</institution>
          ,”
          <addr-line>37 Peremogy ave., 03056 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>National University “Zaporizhzhia Polytechnic</institution>
          ,”
          <addr-line>64 Zhukovsky str. 69063 Zaporizhzhia</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>62</fpage>
      <lpage>69</lpage>
      <abstract>
        <p>All known algorithms of cryptographic systems, which have the property of interference resistance, are based on codes that detect and correct errors. This work proposes a study of stochastic codes for their potential use in cryptographic system algorithms. For stochastic codes, there is a “copy” decoding algorithm when two or more values of a code block of a stochastic code, including (n, n-1) is a code with the detection of errors that are the same during their transmission, it is possible to carry out joint decoding of the extended code with bug fixes. Furthermore, the number of errors that can be corrected in a single block of the extended code is significantly higher than the total number of errors that can be corrected in each block. To simplify the comparative analysis, we converted the given value Pq to the probability of flipping the binary symbol P0. We estimated this probability for different degrees of error grouping using the Portov model with the coefficient a.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;stochastic code</kwd>
        <kwd>cryptographic protection</kwd>
        <kwd>probabilities of distortion in the channel</kwd>
        <kwd>error-correcting codes</kwd>
        <kwd>error bursts</kwd>
        <kwd>decoding mode 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The introduction of modern information technologies
into the everyday life of society has caused problems in
ensuring information security [1, 2]. One of the solutions
to this problem is the widespread use of cryptography [3,
4]. At the moment, strict technological requirements are
imposed on cryptographic algorithms not only in terms of
stability but also in terms of speed [5].</p>
      <p>The need to maintain the high performance of
automated systems after protection mechanisms are
implemented has led to increased speed requirements. Ease
of hardware implementation is necessary to reduce the
cost of encryption tools, which will contribute to their
mass application and wider possibilities of embedding in
portable equipment. Given the specific way that
information is presented in digital devices, blockciphersare
of particular interest.</p>
      <p>Their problem oriented use in the devices and systems
mentionedabovecanprovide effective protection against
cyberthr eats. Thus, the development of problem-oriented
encryption systems is an important and urgent task of
applied cryptography [6]. Codes that detect and correct
errors are the backbone of all known cryptographic systems
that possess interference resistance properties [7].</p>
      <p>The best-known public-key cryptosystem based on
algebraic coding theory is McEliece’s cryptosystem based
on a class of error-correcting codes called Goppa codes.
The basic idea is to create a Goppa code and disguise it as
a regular linear code. There is a fast algorithm for
decoding Goppa codes, but the general problem of finding
codewords of this weight in a linear binary code is an
NPcomplete task [8].</p>
      <p>Analysis of the crypto resistance of this algorithm
indicates that to ensure reliable protection of information,
the in imum parameter values required are n = 1024 and
k = 524. The protected properties of the algorithm are
contingent on the parameter t, which must be chosen such
that t&gt;50. This value is optimal for channels because the
error probability is only 10-4 [8]. For reliable cryptographic
protection, it is necessary to obtain the decoding
complexity that would meet modern cryptographic
standards (of the order of 250). To ensure there is required
decoding complexity in the analyzed cryptosystem, it’s
necessary to use 750-800 columns in the check matrix of the
Goppa code [9].</p>
      <p>As can be seen from the above analysis, meeting the
necessary limit requirements for system parameters
ensures fairly reliable cryptographic protection of
0000-0003-3990-5205 (B. Zhurakovskyi); 0000-0001-9008-0902
(S. Otrokh); 0000-0002-7772-3122 (М. Poliakov); 0000-0002-9355-7056
(O. Poliakov); 0000-0002-7775-6039 (P. Skladannyi)
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).
information. For instance, the durability of McEliece’s
system is.</p>
      <p>Demonstrated by the fact that despite multiple tempts
to cryptanalysis, none of them have been successful. Despite
their interference resistance, several coding algorithms used
for detecting and correcting errors introduce artificial
information redundancy [10]. This can be a major drawback
of interference-resistant codes. This circuit stance leads to a
significant increase in the ciphered text compared to the
original (in the McEliece system, by a fact or two).
Furthermore, the public key in the MacEliece and
Niederreiter systems is quite large by modern standards, at
219 bits [11].</p>
      <p>Jam-resistant crypto-algorithms shave high
requirements for hardware [12], speed [13], memory, and
security. These requirements depend on the properties of
the applied code algorithms that use artificial redundancy.
2. Statement of research problem
2.1. Self-resistant coding in transmission
channels
The main works of С. Shannon [14], in which the tasks of
interference-resistant information transmission with any
predetermined accuracy of information transmission are
formulated, proposes to use the principle of randomness of
the used signals as a solution to these tasks. For
interference-resistant information transmission, it is
proposed to use random (n, k)-codes, formed by randomly
selecting from 2n possible binary combinations of length n
2k combinations, each of which is identified with one of the
information combinations of length k. Using this model of
signals for transmission over a communication channel, С.
Shannon proved a theorem about the possibility of
transmitting information over a communication channel
with a probability of error that depends on the parameters
n and k, and which can be made arbitrarily small by
choosing the appropriate values for these parameters. The
proof of this theorem was of fundamental importance for
the creation of the theory of interference-resistant coding,
although it did not give constructive suggestions about the
implementation of such a possibility [15].</p>
      <p>In practice, a relatively small group of algebraic
interference-resistant codes is used:
Bowes-ChoudhuryHockingham (BCH) codes, Reed-Solomon (RS) codes, and
convolutional codes. The most widely used cyclic codes
with error detection, are a partial case of BCH codes and are
used in standard X.25/2 protocols (LAP-B, LAP-M). RS codes
with error correction in radio communication channels are
being used. Convolutional codes are widely used in satellite
communication channels, which are characterized by the
independent nature of errors. Codes with error correction
are not widely used due to the complexity of implementing
error correction, and the high dependence of the probability
of a decoding error on the law of error distribution.</p>
      <p>In the works on information theory and
interferenceresistant coding, written in the 70s, codes with error
correction were considered. First, codes based on
С. Shannon’s random codes, then algebraic codes. This is
explained by the achievement of higher characteristics
when transmitting information with error-correcting codes,









compared to the currently widely used error-detecting
codes. The transition from correction codes to error
detection codes can be explained by several main reasons:
Firstly, the greater computational complexity of
implementing an error-correcting codec.</p>
      <p>Secondly, the need to match the type and
parameters of the error-correcting code with the
conditions of information transmission, that is the
intensity and distribution law of errors in the used
communication channel.</p>
      <p>Thirdly, the use of, as a rule, high-quality
channels, a high degree of development of the
necessary technical solutions for the
implementation of the cyclic code in the developed
microcircuits for connection with communication
channels produced by several companies and the
standardization of channel-level protocols, which
include the implementation of the cyclic code [14].</p>
      <p>Therefore, to consider the alternative of using codes
with error correction, it is worth looking for significant
reasons for such a transition. Let’s formulate the properties
of error-proof code with error correction that allow us to
talk about such an alternative, and then consider a possible
option for building and using such a code. So, such code
should have the properties:</p>
      <p>The code has error detection and error correction
modes, providing in both modes a guaranteed
(predetermined) probability of decoding with an
error in an arbitrary communication channel and
a reliable rejection of decoding when the error
cannot be corrected.</p>
      <p>The code has such a correcting ability and allows
you to choose such parameters n and k that the
information transmission algorithm that uses
them is characterized by no worse
probabilistictemporal characteristics in comparison with the
use of alternative codes.</p>
      <p>The code provides, in the error correction mode,
the selection of a part of the correctly received
symbols with a specified accuracy, even if the
error multiplicity exceeds the code’s correction
ability.</p>
      <p>The code allows you to decode several copies
(identical in terms of the information content of
the code blocks) of the block with an efficiency
that exceeds the efficiency of decoding the source
code with the detection or correction of errors.
This property can be used to work in parallel
channels when multiple transmissions of a
message on a single channel or in a channel with
feedback when processing copies after receiving a
repeated block.</p>
      <p>Code encoding and decoding procedures contain
only modulo two operations.</p>
      <p>The coding method should have properties of the
randomness of signals at the encoder output,
which provide a joint solution to the problems of
ensuring interference resistance in C. Shannon’s
formulation.</p>
      <p>The implementation of such a statement of the task will
allow:



</p>
      <p>To expand the spectrum of used communication
channels according to the permissible level of
channel quality due to the use of channels of
reduced quality.</p>
      <p>
        Ensuring the guaranteed probability of the level
specified by the consumer (
        <xref ref-type="bibr" rid="ref17 ref17 ref25 ref25 ref38 ref38 ref45 ref45 ref51 ref51 ref59 ref59 ref63 ref63 ref67 ref67 ref71 ref71 ref76 ref76 ref78 ref78">10- 9, 10-18, 10-27</xref>
        ) in
case of any type of distortion in the
communication channel.
      </p>
      <p>To remove the problem of accuracy (probability)
of information when creating global
hyperinformational spaces under the condition of
information transmission via almost any
communication channels.</p>
      <p>To ensure a return to C. Shannon’s classic
statement in solving the problems of interference
resistance but within the framework of a single
information transformation algorithm.</p>
      <p>Interference-resistant coding is effective among the
known methods of increasing the reliability of message
reception, but its use in a complex interference
environment caused by the active influence of
radioelectronic warfare means is limited because in such
conditions it can lead to an increase in the number of
errors at the decoding stage (the effect of error
multiplication) [16]. In this case, it is advisable to use the
majority coding principle, which allows you to avoid the
effect of multiplying errors.</p>
      <p>The majority principle consists of the fact that an odd
number of times the same message is sent to the channel,
and on the receiving side, code combinations of the same
name (or binary digits of the same name) are compared
with each other. At reception, the code combination (or
bit) that has been received the most number of times is
chosen [17].</p>
      <p>The disadvantage of majority coding is the
redundancy of information, which increases in
proportion to the number of repetitions of the same
message (bit), therefore, when using it, it is necessary to
take into account the time limits on the transmission of
messages.</p>
      <p>It is worth noting that for telemetry systems,
monitoring of remote objects, control systems of
unmanned aerial vehicles, and other special purpose
systems, in addition to increasing the reliability of
information reception, an especially important task is to
ensure the information confidentiality of message
transmission. One of the approaches that allows solving
such tasks is the use of Combined Random Coding (CRC)
[18].</p>
      <p>The method of combined random coding, which is
proposed in [19], involves the use of a combination of
interference-resistant coding and a pseudo-random
change of the ensemble of code combinations—
stochastic coding of information. At the same time, high
reliability of message transmission is ensured due to
tamper-resistant coding, and information secrecy and
protection against unauthorized access—due to coding,
which refers to non-cryptographic methods of
information protection. With CRC, the
informationtheoretic level of information protection is provided,
which is determined by the level of uncertainty of the
choice of an ensemble of code combinations
corresponding to the transmitted message, for an
attacker who carries out radio interception [20].
2.2. Construction and properties of
errorcorrecting stochastic codes
In the 1980s, work was started on the creation of a new
design of codes that fit into the structure of existing data
transmission networks, to increase the technical and
economic effect when transmitting information through
communication channels of different quality [21]. The
work resulted in the creation of designs and algorithms for
coding and decoding q stochastic codes with error
correction. These codes are based on the formation of binary
codes for communication channels of varying quality [22].</p>
      <p>The following estimates are valid for these codes,
confirmed by theoretical studies and test statistics of
practically implemented complexes [23]:</p>
      <p>
        a) the code provides a predetermined probability
(guaranteed probability of a decoding error) both when
detecting and when correcting errors, related to the
selected length of the q-symbol and the allowed number
of corrected errors and relative to the maximum possible
number of corrected errors t associated with the code
distance of the original binary code d,
 =  − 2
(
        <xref ref-type="bibr" rid="ref5">1</xref>
        )
      </p>
      <p>This property can be used in duplex and simplex
communication channels.</p>
      <p>b) in a system with feedback [15], which employs a
duplex data transmission channel, the error correcting code
provides the following benefits (see the tables below):

</p>
      <p>An increase in the relative (effective) speed of
information transmission, in comparison with
the use of error-detecting codes, in the entire
range of possible channel quality (that is,
always) [24].</p>
      <p>A higher probability of successful decoding of
the code block in case of error correction, about
the error detection mode; at the same time, the
data transmission channel acquires the
properties of a real-time channel (“tempo”
channel) [25], where information is transmitted
with a much smaller number of repetitions,
which maximally satisfies the requirements for
combining data transmission and speech in one
channel (digital speech transmission is critical
to repetitions) [26].</p>
      <p>c) the encoder output signal has the character of
“white noise,” because not one randomly selected (n, k)
code is used, but an ensemble of codes, where a code
That is, for the code (16, 15) at q=232, the number of
change occurs at each successive code block [27].
binary encoding (decoding) operations is 16 per block of
d) in the presence of two or more values in the
length 16×32 = 512 bits.
receiver that are a priori the same before coding on the
transmitting side of the code blocks (first transmission
and repetition on request in the feedback system or
multiple transmission of the block in single-channel and
multi-channel simplex systems—“copies” of blocks)
there are algorithms for decoding copies that make it
possible to significantly increase the reliability of
message delivery in conditions of intense interference in
communication channels [27].</p>
      <p>As a result, it is claimed that the considered
construction of codes has a scope that coincides with the
scope of the application of information systems and
telecommunications technology in general.</p>
      <p>Below are the main properties of error-correcting
stochastic codes with a guaranteed probability of a
decoding error [28].</p>
      <p>The code base is selected q = 232, which means, the
binary length of the q-symbol is 32 bits, and the number
of such symbols in the block is n and k.</p>
      <p>The probability of an error [29] in decoding stochastic
q-codes does not depend on the type and nature of
distortions and is mainly related to the value of q as in the
error detection mode (n, n-1)—code (with one redundant
symbol), and in error correction mode [30]. With the
selected base q, the probability of an error after decoding
does not exceed any type of twists

&lt; 
= 2
[32, 33]. Since the number of decoding operations does
not depend on q, as q increases, the number of operations
per 1 bit of transmitted information decreases [34]. The
number of decoding operations with error correction per
block of q-code can be of the order of magnitude of bn
binary operations with length operands
 = − log  , ( = 32),
(3)
where the coefficient b = 5–10. In the calculation of 1
bit of transmitted information, the number of operations
decreases by L times and has a value of less than 1 op/bit
[35]. In the error detection mode for (n, n–1) q-code, the
number of encoding and decoding operations is minimal
and is n binary operations with operands of length L [36].</p>
      <p>
        The probability of successful decoding of the code block
(Pr(
        <xref ref-type="bibr" rid="ref5">1</xref>
        )) from the first transmission and the effective speed
[37] can be calculated using the following formula:
(4)

=
 ∗ 
 ∗ 
where Nr and Nt are the number of received and
transmitted blocks, respectively.
      </p>
      <p>For stochastic codes, there is a “copy” decoding
algorithm, when for two or more values of a code block of
a stochastic code, including (n, n–1)—a code with the
error
detection
that is
the
same
during
their
transmission, it is possible to carry out joint decoding of
the extended code with error correction [35, 36]. At the
same time, the number of errors corrected in the block of
the extended code significantly exceeds the number of
errors corrected in total in each block [38, 39], for
example, if the source code corrects t = 2 errors, then
when the source block is repeated 2 times in an extended
block, at least 6 twisted q-symbols are corrected, with
three repetitions—at least 10 symbols, etc. At the same
time, the guarantee of the reliability of the decoded
information is preserved [40].</p>
      <p>The copy decoding mode is most promising in simplex
radio
channels,
particularly
those
with
low-quality
communication channels and intense radio interference. It
is also effective in duplex channels that employ joint
decoding of previously decoded and repeated blocks [41].
The temporal (or pace) characteristics of the code depend
on two factors: the effective transmission speed Ref and the
probability of the block being successfully delivered in the
first (or subsequent) transmission [42].
2.3. Comparative characteristics of
stochastic codes with error
correction, and obtained results
of hardware and software tests
We conducted bench tests of stochastic codes using a
software simulator of communication channel errors. The
results of the set tests are presented in Tables 1, 2, and 3.
During the tests, different values of the probability of
twisting in the q-symbol channel (Pq) were used. The values
were chosen randomly and ranged from once every two
symbols (1/2) to once every four symbols (1/4), and soon. To
simplify the comparative analysis, we estimated the
probability of twisting the binary symbol (P0) for different
degrees of error grouping based on the given value of Pq. We
used the Purtov model with the coefficient “a” to estimate
this probability. Specifically, we considered three different
values of “a”: 0 for independent errors, 0.3 for weak
grouping in the leading channel, and 0.5 for strong grouping
in the radio channel.</p>
    </sec>
    <sec id="sec-2">
      <title>3. Conclusion</title>
      <p>Our results demonstrate that codes with natural
redundancy can be used in diverse information systems
with strict security requirements, especially in noisy
communication channels. Additionally, these codes are
beneficial for hardware systems where minimizing size,
cost, and energy consumption is important.
[1] V. Grechaninov, et al., Formation of Dependability
and Cyber Protection Model in Information
Systems of Situational Center, in: Emerging</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>Internet of Things</source>
          , vol.
          <volume>3149</volume>
          (
          <year>2022</year>
          )
          <fpage>107</fpage>
          -
          <lpage>117</lpage>
          . [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          , Security
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>in: 8th International Conference on “Mathematics.</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          . [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Abramov</surname>
          </string-name>
          , Efficient
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Edwards</given-names>
            <surname>Curves</surname>
          </string-name>
          ,
          <source>Cryptography</source>
          <volume>8</volume>
          (
          <issue>3</issue>
          ), iss.
          <volume>38</volume>
          (
          <year>2024</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          1-
          <fpage>17</fpage>
          . doi:
          <volume>10</volume>
          .3390/cryptography8030038. [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Abramov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          , Properties of
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>Telecommunication Systems</source>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>234</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          239. [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Al-Bassam</surname>
          </string-name>
          , et al.,
          <source>Fraud and Data Availability</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>Financial</given-names>
            <surname>Cryptography</surname>
          </string-name>
          and Data Security:
          <fpage>25th</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>International</surname>
            <given-names>Conference</given-names>
          </string-name>
          ,
          <string-name>
            <surname>FC</surname>
          </string-name>
          <year>2021</year>
          ,
          <article-title>LNCS 12675</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          (
          <year>2021</year>
          )
          <fpage>279</fpage>
          -
          <lpage>298</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -64331-
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <volume>0</volume>
          _
          <fpage>15</fpage>
          . [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          , Stability
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>with Block</surname>
            <given-names>Encryption</given-names>
          </string-name>
          , in: 5th International
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          , vol.
          <volume>3137</volume>
          (
          <year>2022</year>
          )
          <fpage>227</fpage>
          -
          <lpage>237</lpage>
          . [7]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wu</surname>
          </string-name>
          , Implementation of Parallel and Serial
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>Polytechnic</given-names>
            <surname>Institute</surname>
          </string-name>
          and State University (
          <year>2000</year>
          ). [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Poltorak</surname>
          </string-name>
          , et al.,
          <source>Remote Object Confidential</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>CPITS-II</surname>
          </string-name>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>121</fpage>
          -
          <lpage>130</lpage>
          . [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ziv</surname>
          </string-name>
          ,
          <string-name>
            <surname>Variable-</surname>
          </string-name>
          to-Fixed Length Codes are Better
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>Theory</source>
          <volume>36</volume>
          (
          <issue>4</issue>
          ) (
          <year>1990</year>
          )
          <fpage>861</fpage>
          -
          <lpage>863</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          10.1109/18.53746. [10]
          <string-name>
            <given-names>R. E.</given-names>
            <surname>Blahut</surname>
          </string-name>
          ,
          <source>Theory and Practice of Error Control</source>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Codes</surname>
          </string-name>
          ,
          <string-name>
            <surname>Addison-Wesley</surname>
          </string-name>
          , Reading, MA. (
          <year>1984</year>
          ). [11]
          <string-name>
            <given-names>C.</given-names>
            <surname>Berrou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Glavieux</surname>
          </string-name>
          , Near Optimum Error
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>IEEE Trans. On Comm</source>
          .
          <volume>44</volume>
          (
          <issue>10</issue>
          ) (
          <year>1996</year>
          )
          <fpage>1261</fpage>
          -
          <lpage>1271</lpage>
          . [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Toliupa</surname>
          </string-name>
          , et al.,
          <source>Formation of Shift Index Vectors</source>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Security</surname>
          </string-name>
          , in: 21th International Scientific and
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <source>and Security”</source>
          , vol.
          <volume>3241</volume>
          (
          <year>2021</year>
          )
          <fpage>248</fpage>
          -
          <lpage>257</lpage>
          . [13]
          <string-name>
            <given-names>G. A.</given-names>
            <surname>Radtke</surname>
          </string-name>
          , et al.,
          <source>Robust Verification of</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>Stochastic</given-names>
            <surname>Simulation Codes</surname>
          </string-name>
          ,
          <source>J. Comput. Phys. 451</source>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1016/j.
          <source>jcp.20 21</source>
          .110855. [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Shannon</surname>
          </string-name>
          ,
          <source>Communication Theory of Secrecy</source>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          , Bell Syst.
          <source>Tech. J</source>
          .
          <volume>28</volume>
          (
          <issue>4</issue>
          ) (
          <year>1949</year>
          )
          <fpage>656</fpage>
          -
          <lpage>715</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <source>doi: 10</source>
          .1002/J.
          <fpage>1538</fpage>
          -
          <lpage>7305</lpage>
          .
          <year>1949</year>
          .TB00928.X. [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskiy</surname>
          </string-name>
          , et al.,
          <source>Performance Analysis of</source>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>Fading</given-names>
            <surname>Conditions</surname>
          </string-name>
          , in: 10th International Scientific
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <surname>Implementation</surname>
          </string-name>
          ,” IT and I, vol.
          <volume>3624</volume>
          (
          <year>2023</year>
          )
          <fpage>403</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          413. [16]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          , et al.,
          <source>Secured Remote Update</source>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <given-names>Telecommunication</given-names>
            <surname>Systems</surname>
          </string-name>
          , in:
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>67</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          76. [17]
          <string-name>
            <given-names>O.</given-names>
            <surname>Pliushch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Klymash</surname>
          </string-name>
          , Robust
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <source>Control Channel of Unmanned Aerial Vehicle</source>
          , 5th
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          (
          <year>2023</year>
          )
          <fpage>37</fpage>
          -
          <lpage>40</lpage>
          . doi:
          <volume>10</volume>
          .1109/aict61584.
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          10452677. [18]
          <string-name>
            <given-names>I.</given-names>
            <surname>Liminovych</surname>
          </string-name>
          , et al.,
          <source>Protection System for</source>
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <source>Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>179</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          188. [19]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Tsopa</surname>
          </string-name>
          , Assessment Technique
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <string-name>
            <given-names>Information</given-names>
            <surname>Networks</surname>
          </string-name>
          , 3rd International
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <string-name>
            <surname>Communications Technologies (AICT</surname>
          </string-name>
          ) (
          <year>2019</year>
          ). doi:
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          10.1109/aiact.
          <year>2019</year>
          .
          <volume>884</volume>
          7726. [20]
          <string-name>
            <given-names>V.</given-names>
            <surname>Druzhynin</surname>
          </string-name>
          , et al.,
          <source>Features of Processing Signals</source>
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          <source>Telecommunication Systems</source>
          , vol.
          <volume>2746</volume>
          (
          <year>2020</year>
          )
          <fpage>46</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          65. [21]
          <string-name>
            <given-names>N.</given-names>
            <surname>Onizawa</surname>
          </string-name>
          , et al.,
          <source>Clockless Stochastic Decoding</source>
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <string-name>
            <surname>City</surname>
            ,
            <given-names>QC</given-names>
          </string-name>
          (
          <year>2012</year>
          ). doi:
          <volume>10</volume>
          .1109/SiPS.
          <year>2012</year>
          .
          <volume>53</volume>
          . [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hazem</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Low Energy High Speed</surname>
          </string-name>
          Reed-
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2010</year>
          ). [23]
          <string-name>
            <given-names>N.</given-names>
            <surname>Onizawa</surname>
          </string-name>
          , et al.,
          <source>Lowering</source>
          Error Floors in
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          <source>IEEE 43rd International Symposium on Multiple-</source>
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          <string-name>
            <given-names>Valued</given-names>
            <surname>Logic</surname>
          </string-name>
          (
          <year>2013</year>
          )
          <fpage>254</fpage>
          -
          <lpage>259</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          10.1109/ismvl.
          <year>2013</year>
          .
          <volume>35</volume>
          . [24]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          , et al.,
          <source>Coding for Information</source>
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          <source>Technologies and Security</source>
          , vol.
          <volume>2859</volume>
          (
          <year>2021</year>
          )
          <fpage>71</fpage>
          -
          <lpage>84</lpage>
          . [25]
          <string-name>
            <given-names>C.</given-names>
            <surname>Ceroici</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. C.</given-names>
            <surname>Gaudet</surname>
          </string-name>
          , FPGA Implementation of
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          (
          <year>2014</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/SiPS.
          <year>2014</year>
          .
          <volume>6986088</volume>
          . [26]
          <string-name>
            <given-names>J.</given-names>
            <surname>Hagenauer</surname>
          </string-name>
          , The Turbo Principle: Tutorial
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          (
          <year>1997</year>
          ). [27]
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Sarwate</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. D.</given-names>
            <surname>Morrison</surname>
          </string-name>
          , Decoder
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          <volume>36</volume>
          (
          <issue>4</issue>
          ) (
          <year>1990</year>
          )
          <fpage>884</fpage>
          -
          <lpage>889</lpage>
          . doi:
          <volume>10</volume>
          .1109/18.53752. [28]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zuo</surname>
          </string-name>
          , et al.,
          <source>Improving the Tolerance of</source>
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          <string-name>
            <surname>Example</surname>
          </string-name>
          , IEEE Access 4
          <article-title>(</article-title>
          <year>2016</year>
          )
          <fpage>1607</fpage>
          -
          <lpage>1629</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          10.1109/ACCESS.
          <year>2016</year>
          .
          <volume>2550179</volume>
          . [29]
          <string-name>
            <given-names>P.</given-names>
            <surname>Jung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Plechinger</surname>
          </string-name>
          , Performance of Rate
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          <string-name>
            <given-names>Radio</given-names>
            <surname>Applications</surname>
          </string-name>
          ,
          <source>Electronics Lettes</source>
          <volume>33</volume>
          (
          <issue>25</issue>
          )
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          (
          <year>1997</year>
          )
          <fpage>2102</fpage>
          -
          <lpage>2103</lpage>
          . [30]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Tsopa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Batrak</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          <string-name>
            <given-names>Audio</given-names>
            <surname>Compression</surname>
          </string-name>
          , in: Cyber Hygiene, vol.
          <volume>2654</volume>
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          (
          <year>2020</year>
          ). [31]
          <string-name>
            <given-names>G.</given-names>
            <surname>Caire</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E</given-names>
            <surname>Biglieri</surname>
          </string-name>
          , Parallel Concatenated Codes
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          <source>on Communications 46(5)</source>
          (
          <year>1998</year>
          )
          <fpage>565</fpage>
          -
          <lpage>567</lpage>
          . [32]
          <string-name>
            <given-names>P.</given-names>
            <surname>Robertson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Villebrun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hoeher</surname>
          </string-name>
          , A
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          <string-name>
            <surname>Oberpfaffenhofen</surname>
          </string-name>
          ,
          <string-name>
            <surname>Germany</surname>
          </string-name>
          (
          <year>1995</year>
          )
          <fpage>1009</fpage>
          -
          <lpage>1013</lpage>
          . [33]
          <string-name>
            <given-names>J.</given-names>
            <surname>Spinner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Freudenberger</surname>
          </string-name>
          , Decoder Architecture
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          <article-title>Institution of Engineering and Technology (</article-title>
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          <source>doi: 10</source>
          .1049/iet-cds.
          <year>2014</year>
          .
          <volume>0278</volume>
          . [34]
          <string-name>
            <given-names>V.</given-names>
            <surname>Tilavat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shukla</surname>
          </string-name>
          , Simplification of Procedure
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          <string-name>
            <surname>Dev</surname>
          </string-name>
          . Res.
          <volume>2</volume>
          (
          <issue>1</issue>
          ) (
          <year>2014</year>
          )
          <fpage>279</fpage>
          -
          <lpage>283</lpage>
          . [35]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Chung</surname>
          </string-name>
          , Y. Han, Novel Polynomial Basis
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          <string-name>
            <surname>Codes</surname>
          </string-name>
          , 55th Annual Symposium on Foundations of
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          <string-name>
            <given-names>Computer</given-names>
            <surname>Science</surname>
          </string-name>
          (
          <year>2014</year>
          )
          <fpage>316</fpage>
          -
          <lpage>325</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          10.1109/FOCS.
          <year>2014</year>
          .
          <volume>41</volume>
          . [36]
          <string-name>
            <given-names>S.</given-names>
            <surname>Otrokh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kuzminykh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Hryshchenko</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          <source>Information Technologies and Security</source>
          , Vol.
          <volume>2318</volume>
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          (
          <year>2018</year>
          )
          <fpage>188</fpage>
          -
          <lpage>198</lpage>
          . [37]
          <string-name>
            <surname>M.-P. Beal</surname>
          </string-name>
          ,
          <source>The Method of Poles: a Coding Method</source>
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          <source>Information Theory</source>
          <volume>36</volume>
          (
          <issue>4</issue>
          ) (
          <year>1990</year>
          )
          <fpage>763</fpage>
          -
          <lpage>772</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref67">
        <mixed-citation>
          10.1109/18. 53736. [38]
          <string-name>
            <given-names>R. E.</given-names>
            <surname>Blahut</surname>
          </string-name>
          , Algebraic Codes for Data
        </mixed-citation>
      </ref>
      <ref id="ref68">
        <mixed-citation>
          <string-name>
            <surname>Transmission</surname>
          </string-name>
          (
          <year>2003</year>
          ). doi:
          <volume>10</volume>
          .1017/CBO
        </mixed-citation>
      </ref>
      <ref id="ref69">
        <mixed-citation>
          9780511800467. [39]
          <string-name>
            <surname>T.-C. Lin</surname>
          </string-name>
          , et al.,
          <source>A Future Simplification of</source>
        </mixed-citation>
      </ref>
      <ref id="ref70">
        <mixed-citation>
          <source>Communications</source>
          <volume>59</volume>
          (
          <issue>6</issue>
          ) (
          <year>2011</year>
          ). doi:
        </mixed-citation>
      </ref>
      <ref id="ref71">
        <mixed-citation>
          10.1109/tcomm.
          <year>2011</year>
          .
          <volume>050</volume>
          211.100170. [40]
          <string-name>
            <given-names>J.</given-names>
            <surname>Freudenberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Spinner</surname>
          </string-name>
          , Mixed Serial/Parallel
        </mixed-citation>
      </ref>
      <ref id="ref72">
        <mixed-citation>
          <string-name>
            <surname>Symposium</surname>
          </string-name>
          (
          <year>2012</year>
          ). doi:
          <volume>10</volume>
          .1109/issse.
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref73">
        <mixed-citation>
          6374329. [41]
          <string-name>
            <given-names>S.-J.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Chung</surname>
          </string-name>
          , Y. Han, Novel Polynomial
        </mixed-citation>
      </ref>
      <ref id="ref74">
        <mixed-citation>
          <string-name>
            <surname>Codes</surname>
          </string-name>
          , Computer Science, IEEE 55th Annual
        </mixed-citation>
      </ref>
      <ref id="ref75">
        <mixed-citation>
          <string-name>
            <given-names>Conference</given-names>
            <surname>Paper</surname>
          </string-name>
          (
          <volume>26</volume>
          ) (
          <year>2014</year>
          ). doi:
        </mixed-citation>
      </ref>
      <ref id="ref76">
        <mixed-citation>
          10.1109/FOCS.
          <year>2014</year>
          .
          <volume>41</volume>
          . [42]
          <string-name>
            <given-names>V.</given-names>
            <surname>Moutoussamy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nanty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Pauwels</surname>
          </string-name>
          , Emulators
        </mixed-citation>
      </ref>
      <ref id="ref77">
        <mixed-citation>
          <source>Proceedings and Surveys</source>
          <volume>48</volume>
          (
          <year>2015</year>
          )
          <fpage>116</fpage>
          -
          <lpage>155</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref78">
        <mixed-citation>10.1051/proc/201448005.</mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>