{"id":"https://openalex.org/W2080091021","doi":"https://doi.org/10.1109/stc-csit.2015.7325433","title":"Perfecting of the matrix Affine cryptosystem information security","display_name":"Perfecting of the matrix Affine cryptosystem information security","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2080091021","doi":"https://doi.org/10.1109/stc-csit.2015.7325433","mag":"2080091021"},"language":"en","primary_location":{"id":"doi:10.1109/stc-csit.2015.7325433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/stc-csit.2015.7325433","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Xth International Scientific and Technical Conference \"Computer Sciences and Information Technologies\" (CSIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047210667","display_name":"Yurij Gryciuk","orcid":null},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Yurij Gryciuk","raw_affiliation_strings":["Lviv Polytechnic National University, Lviv, Ukraine","Lviv Polytechnic National University, S. Bandery str., 12, Lviv, 79013, Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University, Lviv, Ukraine","institution_ids":["https://openalex.org/I98435010"]},{"raw_affiliation_string":"Lviv Polytechnic National University, S. Bandery str., 12, Lviv, 79013, Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109192846","display_name":"Pavlo Grytsyuk","orcid":null},"institutions":[{"id":"https://openalex.org/I20521324","display_name":"Ukrainian National Forestry University","ror":"https://ror.org/00rwcdf75","country_code":"UA","type":"education","lineage":["https://openalex.org/I20521324"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Pavlo Grytsyuk","raw_affiliation_strings":["Ukrainian National Forestry University, Lviv, Ukraine","Ukrainian National Forestry University, Gen. Chuprynka str. 103, Lviv 79057, Ukraine"],"affiliations":[{"raw_affiliation_string":"Ukrainian National Forestry University, Lviv, Ukraine","institution_ids":["https://openalex.org/I20521324"]},{"raw_affiliation_string":"Ukrainian National Forestry University, Gen. Chuprynka str. 103, Lviv 79057, Ukraine","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5047210667"],"corresponding_institution_ids":["https://openalex.org/I98435010"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.08294793,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"67","last_page":"69"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13608","display_name":"Advanced Computational Techniques in Science and Engineering","score":0.9305999875068665,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9085999727249146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7273655533790588},{"id":"https://openalex.org/keywords/affine-transformation","display_name":"Affine transformation","score":0.7148836851119995},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6968962550163269},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6348870992660522},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.6180051565170288},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4927826225757599},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.48784399032592773},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.484089732170105},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.4494282603263855},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.4492461085319519},{"id":"https://openalex.org/keywords/goldwasser\u2013micali-cryptosystem","display_name":"Goldwasser\u2013Micali cryptosystem","score":0.4224918484687805},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3438831567764282},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.3227335810661316},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2657516598701477},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25871866941452026}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7273655533790588},{"id":"https://openalex.org/C92757383","wikidata":"https://www.wikidata.org/wiki/Q382497","display_name":"Affine transformation","level":2,"score":0.7148836851119995},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6968962550163269},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6348870992660522},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.6180051565170288},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4927826225757599},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48784399032592773},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.484089732170105},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.4494282603263855},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.4492461085319519},{"id":"https://openalex.org/C36367407","wikidata":"https://www.wikidata.org/wiki/Q742758","display_name":"Goldwasser\u2013Micali cryptosystem","level":5,"score":0.4224918484687805},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3438831567764282},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.3227335810661316},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2657516598701477},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25871866941452026},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/stc-csit.2015.7325433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/stc-csit.2015.7325433","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 Xth International Scientific and Technical Conference \"Computer Sciences and Information Technologies\" (CSIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2768338573","https://openalex.org/W2081551898","https://openalex.org/W2022545730","https://openalex.org/W1990726601","https://openalex.org/W2793445239","https://openalex.org/W2181986854","https://openalex.org/W2114142559","https://openalex.org/W2625585199","https://openalex.org/W2026063244","https://openalex.org/W2786896676"],"abstract_inverted_index":{"The":[0,11,39],"features":[1],"of":[2,5,8,42,53],"the":[3,14,27,36],"development":[4],"robust":[6],"cryptosystems":[7],"information":[9],"security.":[10],"system":[12],"combines":[13],"matrix":[15,47],"Affine":[16,48],"transformation,":[17],"multi-round":[18,45],"action":[19],"with":[20,50],"different":[21],"keys,":[22],"as":[23,25],"well":[24],"commuting":[26],"algorithm.":[28],"This":[29],"can":[30],"significantly":[31],"increase":[32],"its":[33],"crude":[34],"to":[35],"cryptographic":[37],"attacks.":[38],"algorithm":[40],"encryption/decryption":[41],"data":[43],"using":[44],"permutation":[46],"cryptosystem":[49],"a":[51],"variety":[52],"encryption":[54],"keys":[55],"for":[56],"each":[57],"round":[58],"is":[59],"mathematically":[60],"description.":[61]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
