{"id":"https://openalex.org/W3116767696","doi":"https://doi.org/10.1109/idaacs-sws50031.2020.9297067","title":"Two-Operand Operations of Strict Stable Cryptographic Coding with Different Operands\u2019 Bits","display_name":"Two-Operand Operations of Strict Stable Cryptographic Coding with Different Operands\u2019 Bits","publication_year":2020,"publication_date":"2020-09-17","ids":{"openalex":"https://openalex.org/W3116767696","doi":"https://doi.org/10.1109/idaacs-sws50031.2020.9297067","mag":"3116767696"},"language":"en","primary_location":{"id":"doi:10.1109/idaacs-sws50031.2020.9297067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs-sws50031.2020.9297067","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087081421","display_name":"Daniel Jancarczyk","orcid":"https://orcid.org/0000-0003-4370-7965"},"institutions":[{"id":"https://openalex.org/I62088572","display_name":"University of Bielsko-Bia\u0142a","ror":"https://ror.org/01ew38b77","country_code":"PL","type":"education","lineage":["https://openalex.org/I62088572"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Daniel Jancarczyk","raw_affiliation_strings":["University of Bielsko-Biala, Willowa St, 2, Bielsko-Biala, Poland"],"affiliations":[{"raw_affiliation_string":"University of Bielsko-Biala, Willowa St, 2, Bielsko-Biala, Poland","institution_ids":["https://openalex.org/I62088572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079638158","display_name":"Volodymyr Rudnytskyi","orcid":"https://orcid.org/0000-0003-3473-7433"},"institutions":[{"id":"https://openalex.org/I4210108895","display_name":"Cherkasy State Technological University","ror":"https://ror.org/01m54ds80","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210108895"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Volodymyr Rudnytskyi","raw_affiliation_strings":["Cherkasy State Technological University, 460 Shevchenka Blvd, Cherkassy, Ukraine"],"affiliations":[{"raw_affiliation_string":"Cherkasy State Technological University, 460 Shevchenka Blvd, Cherkassy, Ukraine","institution_ids":["https://openalex.org/I4210108895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033145633","display_name":"Roksolana Breus","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108895","display_name":"Cherkasy State Technological University","ror":"https://ror.org/01m54ds80","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210108895"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Roksolana Breus","raw_affiliation_strings":["Cherkasy State Technological University, 460 Shevchenka Blvd, Cherkassy, Ukraine"],"affiliations":[{"raw_affiliation_string":"Cherkasy State Technological University, 460 Shevchenka Blvd, Cherkassy, Ukraine","institution_ids":["https://openalex.org/I4210108895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030633754","display_name":"Mykhailo Pustovit","orcid":"https://orcid.org/0000-0001-5313-1459"},"institutions":[{"id":"https://openalex.org/I4210129703","display_name":"Cherkasy Institute of Fire Safety named after Chornobyl Heroes of National University of Civil Defence of Ukraine","ror":"https://ror.org/039wqxn34","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210129703"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Mykhailo Pustovit","raw_affiliation_strings":["Cherkasy Institute of Fire Safety named after Chornobyl Heroes of National University of Civil Defence of Ukraine, 8, Onoprienko Str, Cherkassy, Ukraine"],"affiliations":[{"raw_affiliation_string":"Cherkasy Institute of Fire Safety named after Chornobyl Heroes of National University of Civil Defence of Ukraine, 8, Onoprienko Str, Cherkassy, Ukraine","institution_ids":["https://openalex.org/I4210129703"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075857411","display_name":"Olga Veselska","orcid":"https://orcid.org/0000-0002-4914-2187"},"institutions":[{"id":"https://openalex.org/I62088572","display_name":"University of Bielsko-Bia\u0142a","ror":"https://ror.org/01ew38b77","country_code":"PL","type":"education","lineage":["https://openalex.org/I62088572"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Olga Veselska","raw_affiliation_strings":["University of Bielsko-Biala, Willowa St, 2, Bielsko-Biala, Poland"],"affiliations":[{"raw_affiliation_string":"University of Bielsko-Biala, Willowa St, 2, Bielsko-Biala, Poland","institution_ids":["https://openalex.org/I62088572"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027718064","display_name":"\u0420\u0443\u0441\u043b\u0430\u043d\u0430 \u0417\u044e\u0431\u0438\u043d\u0430","orcid":"https://orcid.org/0000-0002-8654-6981"},"institutions":[{"id":"https://openalex.org/I62088572","display_name":"University of Bielsko-Bia\u0142a","ror":"https://ror.org/01ew38b77","country_code":"PL","type":"education","lineage":["https://openalex.org/I62088572"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Ruslana Ziubina","raw_affiliation_strings":["University of Bielsko-Biala, Willowa St, 2, Bielsko-Biala, Poland"],"affiliations":[{"raw_affiliation_string":"University of Bielsko-Biala, Willowa St, 2, Bielsko-Biala, Poland","institution_ids":["https://openalex.org/I62088572"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5087081421"],"corresponding_institution_ids":["https://openalex.org/I62088572"],"apc_list":null,"apc_paid":null,"fwci":0.4625,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.6828863,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12734","display_name":"Information Systems and Technology Applications","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13935","display_name":"Mathematical Control Systems and Analysis","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/operand","display_name":"Operand","score":0.9538595676422119},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7170201539993286},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6708692312240601},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5730546116828918},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5090038776397705},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4527370035648346},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.45183736085891724},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.37453463673591614},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.33104223012924194},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3090691566467285},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24208033084869385},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.0704461932182312}],"concepts":[{"id":"https://openalex.org/C55526617","wikidata":"https://www.wikidata.org/wiki/Q719375","display_name":"Operand","level":2,"score":0.9538595676422119},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7170201539993286},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6708692312240601},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5730546116828918},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5090038776397705},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4527370035648346},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.45183736085891724},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.37453463673591614},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.33104223012924194},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3090691566467285},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24208033084869385},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.0704461932182312},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idaacs-sws50031.2020.9297067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs-sws50031.2020.9297067","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W138127373","https://openalex.org/W1490371707","https://openalex.org/W1511014813","https://openalex.org/W1537680584","https://openalex.org/W1552757548","https://openalex.org/W2021640844","https://openalex.org/W2904348163","https://openalex.org/W2978205327","https://openalex.org/W2992528302","https://openalex.org/W2998236912","https://openalex.org/W3033799056"],"related_works":["https://openalex.org/W3034338022","https://openalex.org/W1585142320","https://openalex.org/W1575556365","https://openalex.org/W2008685380","https://openalex.org/W1554274402","https://openalex.org/W1553564935","https://openalex.org/W2532895642","https://openalex.org/W2998236912","https://openalex.org/W3039717730","https://openalex.org/W2122015801"],"abstract_inverted_index":{"In":[0],"the":[1,6,9,22,31,35,40,46,52,56,65,69,82,86,112,116,120,126,138,146],"paper":[2],"it":[3],"was":[4,143],"researched":[5],"operations":[7,37,93],"of":[8,24,34,39,54,71,77,88,94,106,119,128,133,140],"information's":[10,41,134],"strict":[11,72,95],"stable":[12,73,96],"cryptographic":[13,42,107,141],"coding":[14],"based":[15,44],"on":[16,45,51],"their":[17],"models'":[18],"synthesis":[19,59],"when":[20],"changing":[21],"amount":[23,118,132],"two":[25],"operands'":[26],"bits.":[27],"It":[28],"is":[29,60],"presented":[30],"simplification":[32,79],"technology":[33,80],"two-operand":[36],"construction":[38],"transformation":[43,108,127],"logical":[47],"functions":[48],"minimization":[49],"realization":[50],"basis":[53],"which":[55,110,136],"operations'":[57],"models":[58,87],"carried":[61],"out,":[62],"while":[63],"fulfilling":[64],"requirements":[66],"for":[67,85,99],"providing":[68],"property":[70],"coding.":[74],"The":[75,103],"application":[76],"this":[78],"gives":[81],"building":[83],"possibility":[84,105],"advanced":[89],"direct":[90],"and":[91],"inverse":[92],"coding,":[97],"suitable":[98],"further":[100],"practical":[101],"implementation.":[102],"implementation":[104],"operations,":[109],"provide":[111],"ability":[113],"to":[114,124],"change":[115],"bits'":[117],"pseudorandom":[121],"sequence":[122],"used":[123],"perform":[125],"a":[129],"given":[130],"fixed":[131],"bits,":[135],"provides":[137],"complexity":[139],"analysis":[142],"confirmed":[144],"by":[145],"study's":[147],"results.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
