<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Enhancing information transmission security with stochastic codes ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Bohdan</forename><surname>Zhurakovskyi</surname></persName>
							<email>zhurakovskybiyu@tk.kpi.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky Kyiv Polytechnic Institute</orgName>
								<address>
									<addrLine>&quot; 37 Peremogy ave</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sergei</forename><surname>Otrokh</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky Kyiv Polytechnic Institute</orgName>
								<address>
									<addrLine>&quot; 37 Peremogy ave</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mykhailo</forename><surname>Poliakov</surname></persName>
							<email>polyakov@zntu.edu.ua</email>
							<affiliation key="aff1">
								<orgName type="institution">National University &quot;Zaporizhzhia Polytechnic</orgName>
								<address>
									<addrLine>&quot; 64 Zhukovsky str</addrLine>
									<postCode>69063</postCode>
									<settlement>Zaporizhzhia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksii</forename><surname>Poliakov</surname></persName>
							<email>poliakov.job@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">National University &quot;Zaporizhzhia Polytechnic</orgName>
								<address>
									<addrLine>&quot; 64 Zhukovsky str</addrLine>
									<postCode>69063</postCode>
									<settlement>Zaporizhzhia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Pavlo</forename><surname>Skladannyi</surname></persName>
							<email>p.skladannyi@kubg.edu.ua</email>
							<affiliation key="aff2">
								<orgName type="institution">Borys Grinchenko Kyiv Metropolitan University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudriavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Enhancing information transmission security with stochastic codes ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">D82495BBC3C282E92B91F2504B12E6C7</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:06+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>All known algorithms of cryptographic systems, which have the property of interference resistance, are based on codes that detect and correct errors. This work proposes a study of stochastic codes for their potential use in cryptographic system algorithms. For stochastic codes, there is a "copy" decoding algorithm when two or more values of a code block of a stochastic code, including (n, n-1) is a code with the detection of errors that are the same during their transmission, it is possible to carry out joint decoding of the extended code with bug fixes. Furthermore, the number of errors that can be corrected in a single block of the extended code is significantly higher than the total number of errors that can be corrected in each block. To simplify the comparative analysis, we converted the given value Pq to the probability of flipping the binary symbol P0. We estimated this probability for different degrees of error grouping using the Portov model with the coefficient a.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Keywords</head><p>stochastic code, cryptographic protection, probabilities of distortion in the channel, error-correcting codes, error bursts, decoding mode 1</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The introduction of modern information technologies into the everyday life of society has caused problems in ensuring information security <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>. One of the solutions to this problem is the widespread use of cryptography <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>. At the moment, strict technological requirements are imposed on cryptographic algorithms not only in terms of stability but also in terms of speed <ref type="bibr" target="#b4">[5]</ref>.</p><p>The need to maintain the high performance of automated systems after protection mechanisms are implemented has led to increased speed requirements. Ease of hardware implementation is necessary to reduce the cost of encryption tools, which will contribute to their mass application and wider possibilities of embedding in portable equipment. Given the specific way that information is presented in digital devices, blockciphersare of particular interest.</p><p>Their problem oriented use in the devices and systems mentionedabovecanprovide effective protection against cyberthr eats. Thus, the development of problem-oriented encryption systems is an important and urgent task of applied cryptography <ref type="bibr" target="#b5">[6]</ref>. Codes that detect and correct errors are the backbone of all known cryptographic systems that possess interference resistance properties <ref type="bibr" target="#b6">[7]</ref>.</p><p>The best-known public-key cryptosystem based on algebraic coding theory is McEliece's cryptosystem based on a class of error-correcting codes called Goppa codes. The basic idea is to create a Goppa code and disguise it as a regular linear code. There is a fast algorithm for decoding Goppa codes, but the general problem of finding codewords of this weight in a linear binary code is an NPcomplete task <ref type="bibr" target="#b7">[8]</ref>.</p><p>Analysis of the crypto resistance of this algorithm indicates that to ensure reliable protection of information, the in imum parameter values required are n = 1024 and k = 524. The protected properties of the algorithm are contingent on the parameter t, which must be chosen such that t&gt;50. This value is optimal for channels because the error probability is only 10 -4 <ref type="bibr" target="#b7">[8]</ref>. For reliable cryptographic protection, it is necessary to obtain the decoding complexity that would meet modern cryptographic standards (of the order of 250). To ensure there is required decoding complexity in the analyzed cryptosystem, it's necessary to use 750-800 columns in the check matrix of the Goppa code <ref type="bibr" target="#b8">[9]</ref>.</p><p>As can be seen from the above analysis, meeting the necessary limit requirements for system parameters ensures fairly reliable cryptographic protection of 0000-0003-3990-5205 (B. Zhurakovskyi); 0000-0001-9008-0902 (S. Otrokh); 0000-0002-7772-3122 (М. Poliakov); 0000-0002-9355-7056 (O. Poliakov); 0000-0002-7775-6039 (P. Skladannyi) information. For instance, the durability of McEliece's system is.</p><p>Demonstrated by the fact that despite multiple tempts to cryptanalysis, none of them have been successful. Despite their interference resistance, several coding algorithms used for detecting and correcting errors introduce artificial information redundancy <ref type="bibr" target="#b9">[10]</ref>. This can be a major drawback of interference-resistant codes. This circuit stance leads to a significant increase in the ciphered text compared to the original (in the McEliece system, by a fact or two). Furthermore, the public key in the MacEliece and Niederreiter systems is quite large by modern standards, at 219 bits <ref type="bibr" target="#b10">[11]</ref>.</p><p>Jam-resistant crypto-algorithms shave high requirements for hardware <ref type="bibr" target="#b11">[12]</ref>, speed <ref type="bibr" target="#b12">[13]</ref>, memory, and security. These requirements depend on the properties of the applied code algorithms that use artificial redundancy.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Statement of research problem 2.1. Self-resistant coding in transmission channels</head><p>The main works of С. Shannon <ref type="bibr" target="#b13">[14]</ref>, in which the tasks of interference-resistant information transmission with any predetermined accuracy of information transmission are formulated, proposes to use the principle of randomness of the used signals as a solution to these tasks. For interference-resistant information transmission, it is proposed to use random (n, k)-codes, formed by randomly selecting from 2n possible binary combinations of length n 2k combinations, each of which is identified with one of the information combinations of length k. Using this model of signals for transmission over a communication channel, С. Shannon proved a theorem about the possibility of transmitting information over a communication channel with a probability of error that depends on the parameters n and k, and which can be made arbitrarily small by choosing the appropriate values for these parameters. The proof of this theorem was of fundamental importance for the creation of the theory of interference-resistant coding, although it did not give constructive suggestions about the implementation of such a possibility <ref type="bibr" target="#b14">[15]</ref>. In practice, a relatively small group of algebraic interference-resistant codes is used: Bowes-Choudhury-Hockingham (BCH) codes, Reed-Solomon (RS) codes, and convolutional codes. The most widely used cyclic codes with error detection, are a partial case of BCH codes and are used in standard X.25/2 protocols (LAP-B, LAP-M). RS codes with error correction in radio communication channels are being used. Convolutional codes are widely used in satellite communication channels, which are characterized by the independent nature of errors. Codes with error correction are not widely used due to the complexity of implementing error correction, and the high dependence of the probability of a decoding error on the law of error distribution.</p><p>In the works on information theory and interferenceresistant coding, written in the 70s, codes with error correction were considered. First, codes based on С. Shannon's random codes, then algebraic codes. This is explained by the achievement of higher characteristics when transmitting information with error-correcting codes, compared to the currently widely used error-detecting codes. The transition from correction codes to error detection codes can be explained by several main reasons:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Firstly, the greater computational complexity of implementing an error-correcting codec.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Secondly, the need to match the type and parameters of the error-correcting code with the conditions of information transmission, that is the intensity and distribution law of errors in the used communication channel.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Thirdly, the use of, as a rule, high-quality channels, a high degree of development of the necessary technical solutions for the implementation of the cyclic code in the developed microcircuits for connection with communication channels produced by several companies and the standardization of channel-level protocols, which include the implementation of the cyclic code <ref type="bibr" target="#b13">[14]</ref>.</p><p>Therefore, to consider the alternative of using codes with error correction, it is worth looking for significant reasons for such a transition. Let's formulate the properties of error-proof code with error correction that allow us to talk about such an alternative, and then consider a possible option for building and using such a code. So, such code should have the properties:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>The code has error detection and error correction modes, providing in both modes a guaranteed (predetermined) probability of decoding with an error in an arbitrary communication channel and a reliable rejection of decoding when the error cannot be corrected.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>The code has such a correcting ability and allows you to choose such parameters n and k that the information transmission algorithm that uses them is characterized by no worse probabilistictemporal characteristics in comparison with the use of alternative codes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>The code provides, in the error correction mode, the selection of a part of the correctly received symbols with a specified accuracy, even if the error multiplicity exceeds the code's correction ability.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>The code allows you to decode several copies (identical in terms of the information content of the code blocks) of the block with an efficiency that exceeds the efficiency of decoding the source code with the detection or correction of errors. This property can be used to work in parallel channels when multiple transmissions of a message on a single channel or in a channel with feedback when processing copies after receiving a repeated block.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Code encoding and decoding procedures contain only modulo two operations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>The coding method should have properties of the randomness of signals at the encoder output, which provide a joint solution to the problems of ensuring interference resistance in C. Shannon's formulation.</p><p>The implementation of such a statement of the task will allow:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>To expand the spectrum of used communication channels according to the permissible level of channel quality due to the use of channels of reduced quality.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Ensuring the guaranteed probability of the level specified by the consumer (10-9, 10-18, 10-27) in case of any type of distortion in the communication channel.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>To remove the problem of accuracy (probability) of information when creating global hyperinformational spaces under the condition of information transmission via almost any communication channels.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>To ensure a return to C. Shannon's classic statement in solving the problems of interference resistance but within the framework of a single information transformation algorithm.</p><p>Interference-resistant coding is effective among the known methods of increasing the reliability of message reception, but its use in a complex interference environment caused by the active influence of radioelectronic warfare means is limited because in such conditions it can lead to an increase in the number of errors at the decoding stage (the effect of error multiplication) <ref type="bibr" target="#b15">[16]</ref>. In this case, it is advisable to use the majority coding principle, which allows you to avoid the effect of multiplying errors.</p><p>The majority principle consists of the fact that an odd number of times the same message is sent to the channel, and on the receiving side, code combinations of the same name (or binary digits of the same name) are compared with each other. At reception, the code combination (or bit) that has been received the most number of times is chosen <ref type="bibr" target="#b16">[17]</ref>.</p><p>The disadvantage of majority coding is the redundancy of information, which increases in proportion to the number of repetitions of the same message (bit), therefore, when using it, it is necessary to take into account the time limits on the transmission of messages.</p><p>It is worth noting that for telemetry systems, monitoring of remote objects, control systems of unmanned aerial vehicles, and other special purpose systems, in addition to increasing the reliability of information reception, an especially important task is to ensure the information confidentiality of message transmission. One of the approaches that allows solving such tasks is the use of Combined Random Coding (CRC) <ref type="bibr" target="#b17">[18]</ref>.</p><p>The method of combined random coding, which is proposed in <ref type="bibr" target="#b18">[19]</ref>, involves the use of a combination of interference-resistant coding and a pseudo-random change of the ensemble of code combinationsstochastic coding of information. At the same time, high reliability of message transmission is ensured due to tamper-resistant coding, and information secrecy and protection against unauthorized access-due to coding, which refers to non-cryptographic methods of information protection. With CRC, the informationtheoretic level of information protection is provided, which is determined by the level of uncertainty of the choice of an ensemble of code combinations corresponding to the transmitted message, for an attacker who carries out radio interception <ref type="bibr" target="#b19">[20]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Construction and properties of errorcorrecting stochastic codes</head><p>In the 1980s, work was started on the creation of a new design of codes that fit into the structure of existing data transmission networks, to increase the technical and economic effect when transmitting information through communication channels of different quality <ref type="bibr" target="#b20">[21]</ref>. The work resulted in the creation of designs and algorithms for coding and decoding q stochastic codes with error correction. These codes are based on the formation of binary codes for communication channels of varying quality <ref type="bibr" target="#b21">[22]</ref>.</p><p>The following estimates are valid for these codes, confirmed by theoretical studies and test statistics of practically implemented complexes <ref type="bibr" target="#b22">[23]</ref>: a) the code provides a predetermined probability (guaranteed probability of a decoding error) both when detecting and when correcting errors, related to the selected length of the q-symbol and the allowed number of corrected errors and relative to the maximum possible number of corrected errors t associated with the code distance of the original binary code d,</p><formula xml:id="formula_0">𝑡 = 𝑑 − 2<label>(1)</label></formula><p>This property can be used in duplex and simplex communication channels.</p><p>b) in a system with feedback <ref type="bibr" target="#b14">[15]</ref>, which employs a duplex data transmission channel, the error correcting code provides the following benefits (see the tables below):</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>An increase in the relative (effective) speed of information transmission, in comparison with the use of error-detecting codes, in the entire range of possible channel quality (that is, always) <ref type="bibr" target="#b23">[24]</ref>.  A higher probability of successful decoding of the code block in case of error correction, about the error detection mode; at the same time, the data transmission channel acquires the properties of a real-time channel ("tempo" channel) <ref type="bibr" target="#b24">[25]</ref>, where information is transmitted with a much smaller number of repetitions, which maximally satisfies the requirements for combining data transmission and speech in one channel (digital speech transmission is critical to repetitions) <ref type="bibr" target="#b25">[26]</ref>.</p><p>c) the encoder output signal has the character of "white noise," because not one randomly selected (n, k) code is used, but an ensemble of codes, where a code change occurs at each successive code block <ref type="bibr" target="#b26">[27]</ref>.</p><p>d) in the presence of two or more values in the receiver that are a priori the same before coding on the transmitting side of the code blocks (first transmission and repetition on request in the feedback system or multiple transmission of the block in single-channel and multi-channel simplex systems-"copies" of blocks) there are algorithms for decoding copies that make it possible to significantly increase the reliability of message delivery in conditions of intense interference in communication channels <ref type="bibr" target="#b26">[27]</ref>.</p><p>As a result, it is claimed that the considered construction of codes has a scope that coincides with the scope of the application of information systems and telecommunications technology in general.</p><p>Below are the main properties of error-correcting stochastic codes with a guaranteed probability of a decoding error <ref type="bibr" target="#b27">[28]</ref>.</p><p>The code base is selected q = 2 32 , which means, the binary length of the q-symbol is 32 bits, and the number of such symbols in the block is n and k.</p><p>The probability of an error <ref type="bibr" target="#b28">[29]</ref> in decoding stochastic q-codes does not depend on the type and nature distortions and is mainly related to the value of q as in the error detection mode (n, n-1)-code (with one redundant symbol), and in error correction mode <ref type="bibr" target="#b29">[30]</ref>. With the selected base q, the probability of an error after decoding does not exceed any type of twists</p><formula xml:id="formula_1">𝑃 &lt; 𝑞 = 2 &lt; 10<label>(2)</label></formula><p>The number of corrected errors t is related to the code distance d of the original binary code by the ratio t = d-2 and approximately corresponds to the number of corrected errors of the Reed-Solomon code with the same parameters n and k <ref type="bibr" target="#b30">[31]</ref>.</p><p>Note that these codes correct errors in a probabilistic sense. Specifically, errors are always corrected in multiples of 1 (when the 1 q-symbol is twisted), while errors in multiples of 2 or more are corrected with a controlled probability that depends on the code. It is important to note that decoding errors or failures are still possible, but in practical implementation, these probabilities can be reduced to desired values. The decoding and encoding of the stochastic codes use only binary operations with q-symbols <ref type="bibr" target="#b31">[32,</ref><ref type="bibr" target="#b32">33]</ref>. Since the number of decoding operations does not depend on q, as q increases, the number of operations per 1 bit of transmitted information decreases <ref type="bibr" target="#b33">[34]</ref>. The number of decoding operations with error correction per block of q-code can be of the order of magnitude of bn binary operations with length operands 𝐿 = − log 𝑞, (𝐿 = 32), <ref type="bibr" target="#b2">(3)</ref> where the coefficient b = 5-10. In the calculation of 1 bit of transmitted information, the number of operations decreases by L times and has a value of less than 1 op/bit <ref type="bibr" target="#b34">[35]</ref>. In the error detection mode for (n, n-1) q-code, the number of encoding and decoding operations is minimal and is n binary operations with operands of length L <ref type="bibr" target="#b35">[36]</ref>.</p><p>That is, for the code <ref type="bibr" target="#b15">(16,</ref><ref type="bibr" target="#b14">15)</ref> at q=232, the number of binary encoding (decoding) operations is 16 per block of length 16×32 = 512 bits.</p><p>The probability of successful decoding of the code block (Pr(1)) from the first transmission and the effective speed <ref type="bibr" target="#b36">[37]</ref> can be calculated using the following formula:</p><formula xml:id="formula_2">𝑅 = 𝑘 * 𝑁 𝑛 * 𝑁<label>(4)</label></formula><p>where Nr and Nt are the number of received and transmitted blocks, respectively.</p><p>For stochastic codes, there is a "copy" decoding algorithm, when for two or more values of a code block of a stochastic code, including (n, n-1)-a code with the error detection that is the same during their transmission, it is possible to carry out joint decoding of the extended code with error correction <ref type="bibr" target="#b34">[35,</ref><ref type="bibr" target="#b35">36]</ref>. At the same time, the number of errors corrected in the block of the extended code significantly exceeds the number of errors corrected in total in each block <ref type="bibr" target="#b37">[38,</ref><ref type="bibr" target="#b38">39]</ref>, for example, if the source code corrects t = 2 errors, then when the source block is repeated 2 times in an extended block, at least 6 twisted q-symbols are corrected, with three repetitions-at least 10 symbols, etc. At the same time, the guarantee of the reliability of the decoded information is preserved <ref type="bibr" target="#b39">[40]</ref>.</p><p>The copy decoding mode is most promising in simplex radio channels, particularly those with low-quality communication channels and intense radio interference. It is also effective in duplex channels that employ joint decoding of previously decoded and repeated blocks <ref type="bibr" target="#b40">[41]</ref>. The temporal (or pace) characteristics of the code depend on two factors: the effective transmission speed Ref and the probability of the block being successfully delivered in the first (or subsequent) transmission <ref type="bibr" target="#b41">[42]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Comparative characteristics of stochastic codes with error correction, and obtained results of hardware and software tests</head><p>We conducted bench tests of stochastic codes using a software simulator of communication channel errors. The results of the set tests are presented in Tables <ref type="table" target="#tab_1">1, 2</ref>, and 3.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>The results of bench tests of stochastic codes obtained using a software simulator of communication channel errors</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Code Channel quality</head><p>Рq Р0 α = 0 α = 0,3 α = 0,5 During the tests, different values of the probability of twisting in the q-symbol channel (Pq) were used. The values were chosen randomly and ranged from once every two symbols (1/2) to once every four symbols (1/4), and soon. To simplify the comparative analysis, we estimated the probability of twisting the binary symbol (P0) for different degrees of error grouping based on the given value of Pq. We used the Purtov model with the coefficient "a" to estimate this probability. Specifically, we considered three different values of "a": 0 for independent errors, 0.3 for weak grouping in the leading channel, and 0.5 for strong grouping in the radio channel.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Conclusion</head><p>Our results demonstrate that codes with natural redundancy can be used in diverse information systems with strict security requirements, especially in noisy communication channels. Additionally, these codes are beneficial for hardware systems where minimizing size, cost, and energy consumption is important.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :Figure2:Figure 3 :Figure 4 :Figure 5 :</head><label>1345</label><figDesc>Figure 1: Channel for different degrees of error grouping with coefficient α</figDesc><graphic coords="5,71.76,218.88,178.32,159.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Dependence of the effective speed (Ref) on the probability of distortion in the q symbol channel (Pq)</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">Channel quality</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Code</cell><cell>Рq</cell><cell>1/2</cell><cell>1/4</cell><cell>1/8</cell><cell>1/16</cell><cell>1/32</cell><cell>1/64</cell><cell>1/128</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">Effective speed Ref</cell><cell></cell><cell></cell><cell></cell></row><row><cell>(4,3)</cell><cell></cell><cell>0.0319</cell><cell>0.1711</cell><cell>0.3339</cell><cell>0.4647</cell><cell>0.5009</cell><cell>0.526</cell><cell>0.0319</cell></row><row><cell></cell><cell></cell><cell>0.3740</cell><cell>0.0573</cell><cell>0.2524</cell><cell>0.4825</cell><cell>0.5817</cell><cell>0.588</cell><cell>0.6852</cell></row><row><cell>(16,15)</cell><cell></cell><cell>0.0048</cell><cell>0.0076</cell><cell>0.1336</cell><cell>0.3206</cell><cell>0.5073</cell><cell>0.646</cell><cell>0.7012</cell></row><row><cell>(32,31)</cell><cell></cell><cell>0.0057</cell><cell>0.0082</cell><cell>0.0096</cell><cell>0.1772</cell><cell>0.3026</cell><cell>0.446</cell><cell>0.7351</cell></row><row><cell>(8,4) (t = 2)</cell><cell></cell><cell>0.0635</cell><cell>0.2681</cell><cell>0.3815</cell><cell>0.3982</cell><cell>0.4062</cell><cell>0.406</cell><cell>0.4062</cell></row><row><cell>(8,2) (t = 2)</cell><cell></cell><cell>0.1051</cell><cell>0.1533</cell><cell>0.1559</cell><cell>0.1562</cell><cell>0.1562</cell><cell>0.156</cell><cell>0.1562</cell></row><row><cell>(16,11) (t = 2)</cell><cell></cell><cell>0.1024</cell><cell>0.1157</cell><cell>0.4383</cell><cell>0.5627</cell><cell>0.6215</cell><cell>0.641</cell><cell>0.6406</cell></row><row><cell>(15,11) (t = 2)</cell><cell></cell><cell>0.1085</cell><cell>0.1139</cell><cell>0.2597</cell><cell>0.5483</cell><cell>0.6345</cell><cell>0.680</cell><cell>0.6802</cell></row><row><cell>(16,7) (t = 4)</cell><cell></cell><cell>0.0925</cell><cell>0.3539</cell><cell>0.3869</cell><cell>0.3906</cell><cell>0.3906</cell><cell>0.391</cell><cell>0.3906</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3</head><label>3</label><figDesc>Dependence of the probability of reception of the block Рr (1) value of the probability of distortion in the channel of the q symbol Pq</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell cols="2">Channel quality</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Code</cell><cell>Рq</cell><cell>1/4</cell><cell>1/8</cell><cell>1/16</cell><cell>1/32</cell><cell>1/64</cell><cell>1/128</cell></row><row><cell></cell><cell cols="5">The probability of receiving a block Pr(1)</cell><cell></cell><cell></cell></row><row><cell>(4,3)</cell><cell>0.0175</cell><cell>0.3684</cell><cell>0.6315</cell><cell cols="3">0.8070 0.8594 0.9298</cell><cell>0.962</cell></row><row><cell>(8,7)</cell><cell>0.0785</cell><cell>0.2634</cell><cell>0.3428</cell><cell>0.600</cell><cell cols="2">0.7142 0.8380</cell><cell>0.963</cell></row><row><cell>(16,15)</cell><cell>0.0874</cell><cell>0.1739</cell><cell></cell><cell cols="3">0.3777 0.5333 0.7333</cell><cell>0.899</cell></row><row><cell>(32,31)</cell><cell>0.0038</cell><cell>0.0074</cell><cell></cell><cell cols="3">0.1772 0.3026 0.6874</cell><cell>0.735</cell></row><row><cell>(8,4) (t = 2)</cell><cell>0.2970</cell><cell>0.695</cell><cell>0.9350</cell><cell>0.948</cell><cell cols="2">0.9735 0.9805</cell><cell>0.997</cell></row><row><cell>(8,2) (t = 2)</cell><cell>0.6816</cell><cell>0.9825</cell><cell>0.9961</cell><cell cols="3">0.9981 0.9984 0.9989</cell><cell>0.999</cell></row><row><cell>(16,11) (t = 2)</cell><cell>0.1818</cell><cell>0.2308</cell><cell>0.6615</cell><cell cols="3">0.7692 0.9538 0.9673</cell><cell>0.972</cell></row><row><cell>(15,11) (t = 2)</cell><cell>0.1598</cell><cell>0.2763</cell><cell>0.4769</cell><cell cols="3">0.8153 0.9076 0.9153</cell><cell>0.951</cell></row><row><cell>(16,7) (t = 4)</cell><cell>0.2190</cell><cell>0.8571</cell><cell>0.9810</cell><cell cols="3">0.9905 0.9917 0.9946</cell><cell>0.998</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center</title>
		<author>
			<persName><forename type="first">V</forename><surname>Grechaninov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Emerging Technology Trends on the Smart Industry and the Internet of Things</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">3149</biblScope>
			<biblScope unit="page" from="107" to="117" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Security Rating Metrics for Distributed Wireless Systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Buriachok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Skladannyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">8th International Conference on &quot;Mathematics. Information Technologies. Education</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2386</biblScope>
			<biblScope unit="page" from="222" to="233" />
		</imprint>
	</monogr>
	<note>Modern Machine Learning Technologies and Data Science</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bessalov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Abramov</surname></persName>
		</author>
		<idno type="DOI">10.3390/cryptography8030038</idno>
	</analytic>
	<monogr>
		<title level="j">Cryptography</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="1" to="17" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Properties of Isogeny Graph of Non-Cyclic Edwards Curves</title>
		<author>
			<persName><forename type="first">S</forename><surname>Abramov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bessalov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication Systems</title>
		<imprint>
			<biblScope unit="volume">3550</biblScope>
			<biblScope unit="page" from="234" to="239" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Fraud and Data Availability Proofs: Detecting Invalid Blocks in Light Clients</title>
		<author>
			<persName><forename type="first">M</forename><surname>Al-Bassam</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-662-64331-0_15</idno>
	</analytic>
	<monogr>
		<title level="m">Financial Cryptography and Data Security: 25th International Conference</title>
				<meeting><address><addrLine>FC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="volume">12675</biblScope>
			<biblScope unit="page" from="279" to="298" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Stability Verification of Self-Organized Wireless Networks with Block Encryption</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Skladannyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hulak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">5th International Workshop on Computer Modeling and Intelligent Systems</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">3137</biblScope>
			<biblScope unit="page" from="227" to="237" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Implementation of Parallel and Serial Concatenated Convolutional Codes</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Wu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
		<respStmt>
			<orgName>the Faculty of the Virginia Polytechnic Institute and State University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Dissertation Submitted to</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Remote Object Confidential Control Technology based on Elliptic Cryptography</title>
		<author>
			<persName><forename type="first">V</forename><surname>Poltorak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Cybersecurity Providing in Information and Telecommunication Systems II, CPITS-II</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">3550</biblScope>
			<biblScope unit="page" from="121" to="130" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Variable-to-Fixed Length Codes are Better than Fixed-to-Variable Length Codes for Markov Sources</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ziv</surname></persName>
		</author>
		<idno type="DOI">10.1109/18.53746</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Theory</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="861" to="863" />
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Theory and Practice of Error Control Codes</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E</forename><surname>Blahut</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1984">1984</date>
			<publisher>Addison-Wesley</publisher>
			<pubPlace>Reading, MA</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Near Optimum Error Correcting Coding and Decoding: Turbo-Codes</title>
		<author>
			<persName><forename type="first">C</forename><surname>Berrou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Glavieux</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. On Comm</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="1261" to="1271" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Formation of Shift Index Vectors of Ring Codes for Information Transmission Security</title>
		<author>
			<persName><forename type="first">S</forename><surname>Toliupa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">21th International Scientific and Practical Conference &quot;Information Technologies and Security</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">3241</biblScope>
			<biblScope unit="page" from="248" to="257" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Robust Verification of Stochastic Simulation Codes</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">A</forename><surname>Radtke</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jcp.2021.110855</idno>
	</analytic>
	<monogr>
		<title level="j">J. Comput. Phys</title>
		<imprint>
			<biblScope unit="volume">451</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Communication Theory of Secrecy Systems</title>
		<author>
			<persName><forename type="first">C</forename><surname>Shannon</surname></persName>
		</author>
		<idno type="DOI">10.1002/J.1538-7305.1949.TB00928.X</idno>
	</analytic>
	<monogr>
		<title level="j">Bell Syst. Tech. J</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="656" to="715" />
			<date type="published" when="1949">1949</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Performance Analysis of Concatenated Coding for OFDM Under Selective Fading Conditions</title>
		<author>
			<persName><forename type="first">B</forename><surname>Zhurakovskiy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">10th International Scientific Conference &quot;Information Technology and Implementation</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">3624</biblScope>
			<biblScope unit="page" from="403" to="413" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Secured Remote Update Protocol in IoT Data Exchange System</title>
		<author>
			<persName><forename type="first">B</forename><surname>Zhurakovskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Cybersecurity Providing in Information and Telecommunication Systems</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="67" to="76" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Robust Control Channel of Unmanned Aerial Vehicle</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pliushch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Zhurakovskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Klymash</surname></persName>
		</author>
		<idno type="DOI">10.1109/aict61584.2023.10452677</idno>
	</analytic>
	<monogr>
		<title level="m">5th IEEE International Conference on Advanced Information and Communication Technologies</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="37" to="40" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Protection System for Analysis of External Link Placing</title>
		<author>
			<persName><forename type="first">I</forename><surname>Liminovych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Cybersecurity Providing in Information and Telecommunication Systems</title>
				<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">3654</biblScope>
			<biblScope unit="page" from="179" to="188" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Assessment Technique and Selection of Interconnecting Line of Information Networks</title>
		<author>
			<persName><forename type="first">B</forename><surname>Zhurakovskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Tsopa</surname></persName>
		</author>
		<idno type="DOI">10.1109/aiact.2019.8847726</idno>
	</analytic>
	<monogr>
		<title level="m">3rd International Conference on Advanced Information and Communications Technologies (AICT)</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Features of Processing Signals from Stationary Radiation Sources in Multi-Position Radio Monitoring Systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Druzhynin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication Systems</title>
		<imprint>
			<biblScope unit="volume">2746</biblScope>
			<biblScope unit="page" from="46" to="65" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Clockless Stochastic Decoding of Low-Density Parity-Check Codes</title>
		<author>
			<persName><forename type="first">N</forename><surname>Onizawa</surname></persName>
		</author>
		<idno type="DOI">10.1109/SiPS.2012.53</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE Workshop on Signal Processing Systems</title>
				<meeting><address><addrLine>Quebec City, QC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Low Energy High Speed Reed-Solomon Decoder Using Two Parallel Modified Evaluator Inversion less Berlekamp-Massey</title>
		<author>
			<persName><forename type="first">A</forename><surname>Hazem</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Signals, Systems and Computers</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Lowering Error Floors in Stochastic Decoding of LDPC Codes Based on Wire-Delay Dependent Asynchronous Updating</title>
		<author>
			<persName><forename type="first">N</forename><surname>Onizawa</surname></persName>
		</author>
		<idno type="DOI">10.1109/ismvl.2013.35</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 43 rd International Symposium on Multiple-Valued Logic</title>
				<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="254" to="259" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Coding for Information Systems Security and Viability</title>
		<author>
			<persName><forename type="first">B</forename><surname>Zhurakovskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Technologies and Security</title>
		<imprint>
			<biblScope unit="volume">2859</biblScope>
			<biblScope unit="page" from="71" to="84" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">FPGA Implementation of a Clockless Stochastic LDPC Decoder</title>
		<author>
			<persName><forename type="first">C</forename><surname>Ceroici</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">C</forename><surname>Gaudet</surname></persName>
		</author>
		<idno type="DOI">10.1109/SiPS.2014.6986088</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Workshop on Signal Processing Systems</title>
		<imprint>
			<biblScope unit="page" from="1" to="5" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">The Turbo Principle: Tutorial Introduction and State of the Art</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hagenauer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of The Int. Symp. on Turbo Codes and Related Topics</title>
				<meeting>of The Int. Symp. on Turbo Codes and Related Topics</meeting>
		<imprint>
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Decoder Malfunction in BCH Decoders, Information Theory</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">V</forename><surname>Sarwate</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">D</forename><surname>Morrison</surname></persName>
		</author>
		<idno type="DOI">10.1109/18.53752</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Theory</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="884" to="889" />
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Improving the Tolerance of Stochastic LDPC Decoders to Overclocking-Induced Timing Errors: A Tutorial and a Design Example</title>
		<author>
			<persName><forename type="first">X</forename><surname>Zuo</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2016.2550179</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="1607" to="1629" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Performance of Rate Compatible Punctured Turbo-codes for Mobile Radio Applications</title>
		<author>
			<persName><forename type="first">P</forename><surname>Jung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Plechinger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronics Lettes</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">25</biblScope>
			<biblScope unit="page" from="2102" to="2103" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Comparative Analysis of Modern Formats of Lossy Audio Compression</title>
		<author>
			<persName><forename type="first">B</forename><surname>Zhurakovskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Tsopa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Batrak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cyber Hygiene</title>
		<imprint>
			<biblScope unit="volume">2654</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Parallel Concatenated Codes with Unequal Error Protection</title>
		<author>
			<persName><forename type="first">G</forename><surname>Caire</surname></persName>
		</author>
		<author>
			<persName><surname>Biglieri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Communications</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="565" to="567" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">A Comparison of Optimal and Sub-optimal MAP Decoding Algorithms Operating in the Log Domain</title>
		<author>
			<persName><forename type="first">P</forename><surname>Robertson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Villebrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hoeher</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. IEEE Int. Conf. on Commun</title>
				<meeting>IEEE Int. Conf. on Commun<address><addrLine>Oberpfaffenhofen, Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1995">1995</date>
			<biblScope unit="page" from="1009" to="1013" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Decoder Architecture for Generalised Concatenated Codes</title>
		<author>
			<persName><forename type="first">J</forename><surname>Spinner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Freudenberger</surname></persName>
		</author>
		<idno type="DOI">10.1049/iet-cds.2014.0278</idno>
	</analytic>
	<monogr>
		<title level="j">IET Circuits, Devices and Systems</title>
		<imprint>
			<date type="published" when="2015">2015</date>
			<publisher>Wiley and The Institution of Engineering and Technology</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Simplification of Procedure for Decoding Reed-Solomon Codes Using Various Algorithms: An Introductory Survey</title>
		<author>
			<persName><forename type="first">V</forename><surname>Tilavat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Shukla</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Eng. Dev. Res</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="279" to="283" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Novel Polynomial Basis and its Application to Reed-solomon Erasure Codes</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Chung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Han</surname></persName>
		</author>
		<idno type="DOI">10.1109/FOCS.2014.41</idno>
	</analytic>
	<monogr>
		<title level="m">55th Annual Symposium on Foundations of Computer Science</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="316" to="325" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Method of Forming the Ring Codes</title>
		<author>
			<persName><forename type="first">S</forename><surname>Otrokh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kuzminykh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Hryshchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Technologies and Security</title>
		<imprint>
			<biblScope unit="volume">2318</biblScope>
			<biblScope unit="page" from="188" to="198" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">The Method of Poles: a Coding Method for Constrained Channels</title>
		<author>
			<persName><forename type="first">M.-P</forename><surname>Beal</surname></persName>
		</author>
		<idno type="DOI">10.1109/18.53736</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Information Theory</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="763" to="772" />
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E</forename><surname>Blahut</surname></persName>
		</author>
		<idno type="DOI">10.1017/CBO9780511800467</idno>
		<title level="m">Algebraic Codes for Data Transmission</title>
				<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">A Future Simplification of Procedure for Decoding Nonsystematic Reed Solomon codes Using the Berlekamp-Massey Algorithm</title>
		<author>
			<persName><forename type="first">T.-C</forename><surname>Lin</surname></persName>
		</author>
		<idno type="DOI">10.1109/tcomm.2011.050211.100170</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Communications</title>
		<imprint>
			<biblScope unit="volume">59</biblScope>
			<biblScope unit="issue">6</biblScope>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Mixed Serial/Parallel Hardware Implementa-tion of the Berlekamp-Massey Algorithm for BCH Decoding in Flash Controller Applications</title>
		<author>
			<persName><forename type="first">J</forename><surname>Freudenberger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Spinner</surname></persName>
		</author>
		<idno type="DOI">10.1109/issse.2012.6374329</idno>
	</analytic>
	<monogr>
		<title level="m">Conference: Signals, Systems, and Electronics (ISSSE), International Symposium</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Novel Polynomial Basis and Its Application to Reed-Solomon Erasure Codes</title>
		<author>
			<persName><forename type="first">S.-J</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Chung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Han</surname></persName>
		</author>
		<idno type="DOI">10.1109/FOCS.2014.41</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 55 th Annual Symposium on Foundations of Computer Science. Conference Paper</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">26</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Emulators for Stochastic Simulation Codes</title>
		<author>
			<persName><forename type="first">V</forename><surname>Moutoussamy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nanty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Pauwels</surname></persName>
		</author>
		<idno type="DOI">10.1051/proc/201448005</idno>
	</analytic>
	<monogr>
		<title level="j">ESAIM: Proceedings and Surveys</title>
		<imprint>
			<biblScope unit="volume">48</biblScope>
			<biblScope unit="page" from="116" to="155" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
