<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Method for Adaptive Allocation of Cryptographic Resources in Distributed Databases⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhii Zhebka</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriia Zhebka</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hennadii Hulak</string-name>
          <email>h.hulak@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roman Kyrychok</string-name>
          <email>r.kyrychok@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artem Platonenko</string-name>
          <email>a.platonenko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Information and Communication Technologies</institution>
          ,
          <addr-line>7 Solomenskaya str., Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>620</fpage>
      <lpage>628</lpage>
      <abstract>
        <p>This paper presents the development of an adaptive method for optimizing the allocation of cryptographic resources in distributed databases. The method is based on dynamic system load analysis and adaptive redistribution of encryption keys depending on the threat level and current system state. The proposed approach utilizes clustering analysis and blockchain technologies to ensure a high level of security and efficient cryptographic resource management. Implementing this method minimizes data access time, enhances system resilience against man-in-the-middle (MITM) attacks, and optimizes node load distribution. Simulation results indicate a 15% reduction in access time and an improvement in system security.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;distributed databases</kwd>
        <kwd>cryptographic keys</kwd>
        <kwd>adaptive allocation</kwd>
        <kwd>optimization method</kwd>
        <kwd>information security</kwd>
        <kwd>blockchain</kwd>
        <kwd>MITM attack</kwd>
        <kwd>clustering analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In modern distributed databases, cryptographic methods are a key factor in ensuring information
security. As data volumes grow and distributed systems expand, the challenge of optimal
cryptographic resource management, particularly encryption key distribution, becomes
increasingly important. Traditional key distribution methods often fail to account for dynamic
system load changes, leading to excessive computational overhead or reduced security levels.</p>
      <p>One of the critical threats to distributed databases is MITM attacks, which can compromise
transmitted data if the system lacks adaptive cryptographic resource distribution mechanisms.
Therefore, it is essential to develop methods that enable dynamic key management based on
changing load conditions and security levels.</p>
      <p>The problem of optimizing cryptographic resource allocation in distributed databases has
gained particular relevance due to the increasing volume of information and the need for enhanced
security. A major issue is the uneven distribution of load among system nodes, which can cause
data access delays and increase the risk of MITM attacks. Moreover, existing methods often rely on
static key distribution, making it difficult to respond effectively to dynamic system changes.</p>
      <p>[1] examines cryptographic methods in distributed systems using identity-based encryption
(IBE) algorithms. While effective for confidentiality, it lacks adaptability to varying threat levels.</p>
      <p>[2] presents symmetric encryption with adaptive key management, focusing on automatic key
updates when a threat threshold is exceeded. However, it does not address load balancing between
nodes.
[3] proposes adaptive cryptographic protocols for key redistribution in distributed systems.
Although resistant to MITM attacks, it does not incorporate dynamic load analysis for
optimization.</p>
      <p>[4] suggests optimizing key distribution in blockchain-based systems by analyzing node load,
reducing access delays but not addressing adaptive redistribution under heightened threats.</p>
      <p>[5] discusses cryptographic key management in cloud platforms, proposing adaptive
redistribution approaches but without sufficient exploration of decentralized management and
functional resilience.</p>
      <p>The literature review highlights that most existing approaches focus on centralized systems or
static key distribution. Adaptive cryptographic resource management methods, considering both
threat levels and dynamic load changes, remain underexplored. This justifies the need for a method
that combines adaptive key distribution with an optimization-based load-balancing approach.</p>
      <p>Existing cryptographic resource management methods in distributed databases have several
limitations, primarily due to their static approach to key distribution. These methods do not
account for variable system load parameters and data access patterns, leading to increased
encrypted data access times and security vulnerabilities against MITM attacks. The lack of adaptive
key redistribution mechanisms can also cause excessive load on specific system nodes, reducing
overall efficiency [6].</p>
      <p>Therefore, it is necessary to develop a method that ensures dynamic and optimized encryption
key allocation according to the current system load, minimizes access delays, and enhances
security without significantly increasing computational complexity.</p>
      <p>The objective of this paper is to develop and justify an adaptive method for optimizing the
allocation of cryptographic resources in distributed databases [7]. The proposed approach is based
on dynamic system load analysis and seeks to balance security and performance. The main focus is
on reducing data access times and improving system resilience to MITM attacks.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Key findings</title>
      <p>The developed method for optimizing cryptographic resource allocation in distributed databases is
based on adaptive encryption key management, considering system load variations and threat
levels. The core idea is to use real-time dynamic request analysis and risk modeling to modify key
distribution schemes accordingly. The approach accounts for user activity, data processing volume,
and potential system vulnerabilities, allowing the selection of optimal encryption algorithms and
key storage methods to balance security and performance [8].</p>
      <p>The scientific novelty of the method lies in its adaptive key distribution approach, which
leverages machine learning techniques and heuristic optimization algorithms. Specifically, neural
network models are employed to predict system load changes and select cryptographic
mechanisms accordingly [9]. This approach enables automatic adjustments in key length,
encryption algorithms, and distribution methods, minimizing data compromise risks.</p>
      <p>Key elements of the method include:

</p>
      <p>Clustering analysis to identify user groups with similar request patterns.</p>
      <p>Distributed key management using blockchain mechanisms.</p>
      <p>The implementation of the method not only enhances security without significantly increasing
computational complexity but also reduces access time to encrypted data. This is especially
important for large distributed systems, where high performance is critical. The optimization
mechanism helps avoid overloading cryptographic processing servers by distributing the load
according to the predicted user activity [10–14].</p>
      <p>It is also worth noting the increased resilience of the system to man-in-the-middle attacks. The
dynamic key distribution and their updating at random intervals make such attacks significantly
more difficult to execute. Moreover, by integrating multi-factor authentication and biometric
access verification mechanisms, the risks of unauthorized key acquisition are greatly reduced [15–
18]. As a result of implementing the proposed method, the overall security of distributed databases
is enhanced, the risks of information compromise are minimized, and the use of cryptographic
resources is optimized, ensuring stable system operation even during large-scale cyberattacks [19,
20].</p>
      <p>The main scientific novelty of this method lies in the dynamic optimization of cryptographic
resource distribution, based on adaptive real-time system load analysis. Traditional approaches
either distribute keys statically or change them according to a predefined schedule, making them
less flexible and potentially vulnerable to attacks [21, 22].</p>
      <p>The proposed method uses a combination of machine learning and blockchain technologies for
distributing and updating cryptographic keys, allowing for:
1. Predicting load changes in the distributed database and adapting the encryption strategy.</p>
      <p>The use of cluster analysis helps identify typical user request patterns and respond to
anomalies.
2. Automatically changing keys according to risk levels. If the system detects suspicious
activity, it can dynamically increase the frequency of key updates or switch to more secure
encryption algorithms.
3. Reducing system load through a smart balance between cryptographic protection and query
processing speed. The adaptive approach ensures resources are not overloaded during peak
loads.
4. Distributing cryptographic keys via decentralized trust servers instead of a centralized key
store significantly complicates their compromise and reduces the likelihood of
man-in-themiddle attacks.
5. Recording key changes in the blockchain, ensuring their transparency, and authenticity,
and enabling retrospective analysis for suspicious actions.</p>
      <p>Thus, the main uniqueness of the method lies in the combination of adaptive load analysis,
decentralized key management, and machine learning to create an optimal, attack-resistant, and
high-performance cryptographic system for distributed databases.</p>
      <sec id="sec-2-1">
        <title>Method for Adaptive Distribution of Cryptographic Resources in Distributed</title>
      </sec>
      <sec id="sec-2-2">
        <title>Databases</title>
        <p>The input data for the proposed method of optimizing the distribution of cryptographic
resources in distributed databases includes the number of nodes in the system N, the load level on
each node Li (ranging from 0 to 1, where 1 represents maximum load), the threat level for each
node Si (ranging from 0 to 1, where 1 indicates a critical threat), the total number of available
cryptographic keys Kmax, and a threshold threat value θ, exceeding which triggers an emergency
key update for the node to enhance the system’s information security.</p>
        <p>The algorithm consists of the following steps:</p>
      </sec>
      <sec id="sec-2-3">
        <title>1. Normalization of Input Data</title>
        <p>The values of load Li and threat level Si are transformed into the range [0,1] to ensure the
correct operation of the algorithm. If the system reads absolute values, normalization is applied:</p>
        <p>Normalization allows for the standardization of input data for further processing and ensures
their comparability when calculating weight coefficients.</p>
        <sec id="sec-2-3-1">
          <title>Lnorm </title>
          <p>i</p>
        </sec>
        <sec id="sec-2-3-2">
          <title>S norm </title>
          <p>i</p>
          <p>Li
max(L)</p>
          <p>
            Si
max(S )
(
            <xref ref-type="bibr" rid="ref1">1</xref>
            )
(
            <xref ref-type="bibr" rid="ref2">2</xref>
            )
Wi   Lniorm   Sinorm
          </p>
          <p>Ki  KmaNjx1WWji
where α = 0.7, β = 0.3 are weight coefficients that determine the influence of load and threat.</p>
          <p>This approach allows for consideration of both the current load on the nodes and potential risks
arising from a high threat level.</p>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>3. Threat Level Check for Each Node</title>
        <p>For each node, we check whether the threat level Si exceeds the threshold value θ. If Si&gt;θ
(critical threat), an emergency key update is performed. Keys are distributed evenly among all
nodes to avoid risk concentration:</p>
        <p>
          K i= K total / N , (
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
where Ktotal is the total number of cryptographic keys that need to be distributed among the nodes
of the distributed database. This value is fixed and determined based on the system’s overall data
protection requirements and the number of active nodes in the system.
        </p>
        <p>At the same time, a notification is sent to the administrator about the increased threat level.</p>
        <p>If Si≤θ (normal operating mode), the keys are distributed proportionally to the weight
coefficients Wi. Each node receives keys according to the formula:</p>
      </sec>
      <sec id="sec-2-5">
        <title>2. Calculation of the Weight Coefficient for Each Node</title>
        <p>
          The importance of each node for key distribution is determined, taking into account the load
and threat level. The weight coefficient is defined as:
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
        </p>
        <p>This approach minimizes risks in critical threat situations and ensures an optimal distribution of
keys under normal operating conditions.</p>
      </sec>
      <sec id="sec-2-6">
        <title>4. Determining the Final Key Distribution</title>
        <p>The values of Ki are rounded to the nearest whole number to obtain the number of keys for each
node. Additionally, a check is performed to ensure that the total number of distributed keys equals
Ktotal.</p>
      </sec>
      <sec id="sec-2-7">
        <title>5. Recording Updated Keys in the System</title>
        <p>At this stage, the cryptographic key table in the distributed database is updated, after which the
system sends the updated keys to the corresponding nodes. If some nodes still face a high threat
level, a re-evaluation is triggered to provide an additional layer of security.</p>
        <p>Since an uneven distribution of cryptographic resources may lead to server overload, it is
proposed to minimize the variation in load across the nodes. The optimization model for
minimizing load variation is defined as:</p>
        <p>N
V (t)   (Li (t)  Lavg (t))2 , Lavg (t) 
i1
1 N</p>
        <p> (Li (t)
N i1
where Lavg(t) is the average system load, and N is the number of servers in the system.</p>
        <p>To balance the load, an adaptive redistribution of cryptographic keys is performed. Servers with
a load coefficient exceeding the permissible value Ki&gt;α are identified as nodes that require a
reduction in cryptographic load, while nodes with Kj can take on additional computations.
The process of key redistribution is described by the key migration equation between nodes:
where γ is the adaptation coefficient, which defines the speed of key redistribution.</p>
        <p>The key redistribution between nodes is determined by the migration equation:</p>
        <p>
          M ij   (Li  Lj ), i, j  N , Li  Lj
(
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
        </p>
      </sec>
      <sec id="sec-2-8">
        <title>Efficiency Evaluation</title>
        <p>The efficiency of the proposed method is assessed based on the average access time to
encrypted data.
where Tproc is the processing time of the request on the server, and Tcomm is the delay associated
with the transmission of cryptographic keys. Minimizing Tcomm through adaptive key distribution
helps improve the overall system performance. The method involves dynamic updating of keys Ki
depending on the load parameters. If:</p>
        <p>Lj  Lj   (Li  Lavg ), Li  Li   (Li  Lavg )
where</p>
        <p>, α—coefficient of distribution.</p>
        <p>Encryption keys are updated if the node is overloaded or its performance is significantly lower
than the average:</p>
        <p>Ki  K j , if Ci    Cavg
where Cavg is the average node performance, β is the threshold for key update.</p>
      </sec>
      <sec id="sec-2-9">
        <title>Performance Evaluation</title>
        <p>Unlike traditional methods, the proposed approach involves the dynamic distribution of
cryptographic resources in distributed databases using an adaptive key distribution method based
on the current system load. The methods selected for comparison (AES-GCM, RSA-2048, ECDSA)
are the most commonly used in cryptographic data protection and employ different encryption
approaches:



</p>
        <p>AES-GCM—a representative of symmetric encryption that ensures fast data processing.
RSA-2048—one of the classical asymmetric algorithms used for key exchange and digital
signatures.</p>
        <p>ECDSA—a digital signature algorithm based on elliptic curve cryptography that provides
high security with a shorter key length.</p>
        <p>The proposed method uses an adaptive approach to key distribution, which reduces latency
and increases security without placing unnecessary load on the system.
128/192/256 bit</p>
        <p>2048 bit</p>
        <p>AES-GCM</p>
        <p>RSA-2048</p>
        <p>The proposed method</p>
      </sec>
      <sec id="sec-2-10">
        <title>The proposed method provides lower latency for accessing encrypted data compared to</title>
        <p>asymmetric algorithms (RSA, ECDSA) and slightly exceeds AES-GCM in speed, compensating for
this with adaptive security.
The graph demonstrates that the proposed method offers a higher level of security, efficiency,
adaptability, and key update frequency.
The proposed method for optimizing the distribution of cryptographic resources in distributed
databases improves the efficiency of encryption key management by reducing the load on nodes
and ensuring an even distribution of data processing requests. The use of an adaptive approach,
based on dynamic system load analysis, helps avoid bottlenecks in encryption and decryption
processes, which is crucial for scalable decentralized platforms such as blockchain networks and
distributed data storage systems. The proposed solution strikes a balance between security and data
access speed, significantly reducing the risks of man-in-the-middle attacks and enhancing the
system’s resilience to potential threats.</p>
        <p>The results show that the use of an adaptive key redistribution mechanism can significantly
reduce cryptographic operation latency while lowering computational costs without compromising
security. The practical application of the method is possible in blockchain systems, distributed
databases, secure cloud storage, and financial and corporate systems, where data processing speed
and protection against unauthorized access are critical.</p>
        <p>Future research prospects are related to improving dynamic system state monitoring
mechanisms, including the development of machine learning algorithms to predict node load and
automatically adjust the key distribution strategy. Additionally, further experimental studies are
necessary to determine the optimal parameters for adaptive redistribution based on the
architecture of the distributed system, particularly analyzing the impact of various consensus
models on the performance of cryptographic operations. An important direction is also the study of
integrating the proposed method with modern cryptographic algorithms, such as post-quantum
cryptography, which will enhance resilience to potential future threats.</p>
        <p>Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.
[9] Y. Kostiuk, et al., Integrated protection strategies and adaptive resource distribution for secure
video streaming over a Bluetooth network, in: Cybersecurity Providing in Information and
Telecommunication Systems II, vol. 3826 (2024) 129–138.
[10] A. V. Halchenko, Instrumental means of cryptographic systems based on deniable encryption,</p>
        <p>
          Ph.D. Dissertation, Zaporizhzhia National University, 2021.
[11] A. Gharout, M. Merabti, D. Llewellyn-Jones, Adaptive group key management protocol for
wireless dynamic groups, J. UCS 18(
          <xref ref-type="bibr" rid="ref6">6</xref>
          ) (2012) 874–898.
[12] F. Pierazzi, M. Colajanni, Performance and cost evaluation of an adaptive encryption
architecture for cloud databases, IEEE Trans. Cloud Comput. 2(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) (2014) 153–166.
[13] NIST, Recommendation for key management: Part 1 – General, NIST special publication
80057 Part 1 Revision 5, 2020.
[14] S. Kumar, T. Utsab, A. Raychoudhury, Image compression using approximate matching and
run length, Int. J. Adv. Comput. Sci. Appl. 2(
          <xref ref-type="bibr" rid="ref6">6</xref>
          ) (2011).
[15] S. Romanenko, Cryptanalysis and cryptographic protocols, Uzhhorod National University,
2020.
[16] Y. Galchenko, Information security: Cryptographic methods and protocols, National Aviation
        </p>
        <p>
          University, 2010.
[17] A. Astrakhantsev, Models and methods for improving the security and quality of data
transmission in mobile communication systems, Ph.D. Dissertation, National Technical
University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute,” 2021.
[18] F. Pierazzi, M. Colajanni, Performance and cost evaluation of an adaptive encryption
architecture for cloud databases, IEEE Transactions on Cloud Computing, 2(
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) (2014) 153–166.
[19] S. Belattaf, M. Merabti, D. Llewellyn-Jones, Reliable and adaptive distributed public-key
management infrastructure for the Internet of Things, J. Netw. Comput. Appl., 123 (2018) 94–
108.
[20] V. Malinov, et al., Cryptocurrency as a tool for attracting investment and ensuring the
strategic development of the bioenergy potential of processing enterprises in Ukraine, in:
Lecture Notes on Data Engineering and Communications Technologies, vol. 195, 2024, 387–
405. doi:10.1007/978-3-031-54012-7_17
[21] V. Zhebka, et al., Methodology for choosing a consensus algorithm for blockchain technology,
in: Digital Economy Concepts and Technologies, vol. 3665, 2024, 106–113
[22] V. Malinov, et al., Biomining as an effective mechanism for utilizing the bioenergy potential of
processing enterprises in the agricultural sector, in: Cybersecurity Providing in Information
and Telecommunication Systems, vol. 3421, 2023, 223–230.
        </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>D.</surname>
          </string-name>
           Boneh,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Franklin</surname>
          </string-name>
          ,
          <article-title>Identity-based encryption from the Weil pairing</article-title>
          ,
          <source>SIAM J. Comput</source>
          .
          <volume>32</volume>
          (
          <issue>3</issue>
          ) (
          <year>2003</year>
          ). doi:
          <volume>10</volume>
          .1137/s0097539701398521
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>K.</given-names>
             
            <surname>Paterson</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
           
          <article-title>Price, A comparison of adaptive encryption techniques in distributed systems</article-title>
          ,
          <source>IEEE Transactions on Information Forensics and Security</source>
          ,
          <volume>13</volume>
          (
          <issue>2</issue>
          ) (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Bellare</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
           Rogaway,
          <article-title>Adaptive protocols for public-key encryption</article-title>
          , in: Advances in Cryptology, EUROCRYPT,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Kumar,
          <string-name>
            <surname>T.</surname>
          </string-name>
           
          <article-title>Utsab, Adaptive cryptographic access control for blockchain systems</article-title>
          ,
          <source>Int. J. Adv. Comput. Sci. Appl</source>
          . (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Venkatram</surname>
          </string-name>
          ,
          <article-title>A new lossless data compression algorithm exploiting positional redundancy</article-title>
          , arXiv,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2107.13801
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Astapenya</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of ways and methods of increasing the availability of information in distributed information systems</article-title>
          ,
          <source>in: 2021 IEEE 8th Int. Conf. on Problems of Infocommunications, Science and Technology</source>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1109/picst54195.
          <year>2021</year>
          .9772161
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <article-title>Models and methods for determining application performance estimates in distributed structures</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3288</volume>
          ,
          <year>2022</year>
          ,
          <fpage>134</fpage>
          -
          <lpage>141</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Bessalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
           Abramov,
          <article-title>Efficient commutative PQC algorithms on isogenies of Edwards curves</article-title>
          ,
          <source>Cryptography</source>
          <volume>8</volume>
          (
          <issue>3</issue>
          ), iss.
          <volume>38</volume>
          (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .3390/cryptography8030038
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>