{"id":"https://openalex.org/W4409770969","doi":"https://doi.org/10.3390/cryptography9020026","title":"Affine Cipher Encryption Technique Using Residue Number System","display_name":"Affine Cipher Encryption Technique Using Residue Number System","publication_year":2025,"publication_date":"2025-04-24","ids":{"openalex":"https://openalex.org/W4409770969","doi":"https://doi.org/10.3390/cryptography9020026"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9020026","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9020026","pdf_url":"https://www.mdpi.com/2410-387X/9/2/26/pdf?version=1745486889","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/9/2/26/pdf?version=1745486889","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016123191","display_name":"Mykhailo Kasianchuk","orcid":"https://orcid.org/0000-0002-4469-8055"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Mykhailo Kasianchuk","raw_affiliation_strings":["Department of Cyber Security, West Ukrainian National University, 46009 Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, West Ukrainian National University, 46009 Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045605427","display_name":"Ruslan Shevchuk","orcid":"https://orcid.org/0000-0001-5381-9528"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]},{"id":"https://openalex.org/I62088572","display_name":"University of Bielsko-Bia\u0142a","ror":"https://ror.org/01ew38b77","country_code":"PL","type":"education","lineage":["https://openalex.org/I62088572"]}],"countries":["PL","UA"],"is_corresponding":true,"raw_author_name":"Ruslan Shevchuk","raw_affiliation_strings":["Department of Computer Science and Automatics, University of Bielsko-Biala, 43-309 Bielsko-Biala, Poland","Department of Computer Science, West Ukrainian National University, 46009 Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Automatics, University of Bielsko-Biala, 43-309 Bielsko-Biala, Poland","institution_ids":["https://openalex.org/I62088572"]},{"raw_affiliation_string":"Department of Computer Science, West Ukrainian National University, 46009 Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041881045","display_name":"Bogdan Adamyk","orcid":"https://orcid.org/0000-0001-5136-3854"},"institutions":[{"id":"https://openalex.org/I169199633","display_name":"Aston University","ror":"https://ror.org/05j0ve876","country_code":"GB","type":"education","lineage":["https://openalex.org/I169199633"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bogdan Adamyk","raw_affiliation_strings":["Aston Business School, Aston University, Birmingham B4 7ET, UK"],"affiliations":[{"raw_affiliation_string":"Aston Business School, Aston University, Birmingham B4 7ET, UK","institution_ids":["https://openalex.org/I169199633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049891554","display_name":"Vladlena Benson","orcid":"https://orcid.org/0000-0001-5940-0525"},"institutions":[{"id":"https://openalex.org/I169199633","display_name":"Aston University","ror":"https://ror.org/05j0ve876","country_code":"GB","type":"education","lineage":["https://openalex.org/I169199633"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Vladlena Benson","raw_affiliation_strings":["Aston Business School, Aston University, Birmingham B4 7ET, UK"],"affiliations":[{"raw_affiliation_string":"Aston Business School, Aston University, Birmingham B4 7ET, UK","institution_ids":["https://openalex.org/I169199633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059063658","display_name":"Inna Shylinska","orcid":"https://orcid.org/0000-0002-0700-793X"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Inna Shylinska","raw_affiliation_strings":["Department of Foreign Languages, Information and Communication Technologies, West Ukrainian National University, 46009 Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Foreign Languages, Information and Communication Technologies, West Ukrainian National University, 46009 Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5117295907","display_name":"Mykhailo Holembiovskyi","orcid":null},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Mykhailo Holembiovskyi","raw_affiliation_strings":["Department of Cyber Security, West Ukrainian National University, 46009 Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, West Ukrainian National University, 46009 Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5045605427"],"corresponding_institution_ids":["https://openalex.org/I160977438","https://openalex.org/I62088572"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03779563,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"2","first_page":"26","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5486893057823181},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.49732139706611633},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.4450682997703552},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3276328146457672},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26971596479415894}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5486893057823181},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49732139706611633},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.4450682997703552},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3276328146457672},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26971596479415894}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography9020026","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9020026","pdf_url":"https://www.mdpi.com/2410-387X/9/2/26/pdf?version=1745486889","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:publications.aston.ac.uk:47521","is_oa":true,"landing_page_url":"https://publications.aston.ac.uk/view/author/340c24307a7699bc5bbf4454803ea164.html>,","pdf_url":"https://publications.aston.ac.uk/id/eprint/47521/1/Affine_Cipher_Encryption_Technique_Using_Residue_Number_System.pdf","source":{"id":"https://openalex.org/S4306400483","display_name":"Aston Publications Explorer (Aston University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169199633","host_organization_name":"Aston University","host_organization_lineage":["https://openalex.org/I169199633"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:doaj.org/article:595caec5b6ae407c947a55c9e0ad593a","is_oa":true,"landing_page_url":"https://doaj.org/article/595caec5b6ae407c947a55c9e0ad593a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 2, p 26 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9020026","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9020026","pdf_url":"https://www.mdpi.com/2410-387X/9/2/26/pdf?version=1745486889","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4409770969.pdf","grobid_xml":"https://content.openalex.org/works/W4409770969.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W338418063","https://openalex.org/W1491152510","https://openalex.org/W1515595447","https://openalex.org/W2039932636","https://openalex.org/W2040020290","https://openalex.org/W2089389571","https://openalex.org/W2309115528","https://openalex.org/W2322662350","https://openalex.org/W2469142762","https://openalex.org/W2657095061","https://openalex.org/W2792358858","https://openalex.org/W2898625669","https://openalex.org/W2912250127","https://openalex.org/W2945388312","https://openalex.org/W2951235477","https://openalex.org/W2993499654","https://openalex.org/W2995687140","https://openalex.org/W2997258927","https://openalex.org/W3036009073","https://openalex.org/W3040864792","https://openalex.org/W3046956211","https://openalex.org/W3089153976","https://openalex.org/W3150073287","https://openalex.org/W3163377985","https://openalex.org/W3174074270","https://openalex.org/W3175869841","https://openalex.org/W4206137787","https://openalex.org/W4232274958","https://openalex.org/W4235583970","https://openalex.org/W4256259790","https://openalex.org/W4280650169","https://openalex.org/W4311220356","https://openalex.org/W4313326188","https://openalex.org/W4386385950","https://openalex.org/W4388288416","https://openalex.org/W4390586680","https://openalex.org/W4393364173","https://openalex.org/W6698426001","https://openalex.org/W6762539062","https://openalex.org/W6779678960","https://openalex.org/W6783741511","https://openalex.org/W6795476496","https://openalex.org/W6797040185","https://openalex.org/W6828397298","https://openalex.org/W6838573498","https://openalex.org/W6948907204"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4391375266","https://openalex.org/W1979597421","https://openalex.org/W2007980826","https://openalex.org/W2061531152","https://openalex.org/W3002753104","https://openalex.org/W2077600819","https://openalex.org/W2142036596","https://openalex.org/W2072657027"],"abstract_inverted_index":{"This":[0,16],"paper":[1],"presents":[2],"a":[3,65,79],"new":[4],"encryption":[5,70],"technique,":[6],"which":[7,29,134],"combines":[8],"affine":[9,27,69,87],"ciphers":[10,88,94],"and":[11,24,54,64,78,92,112,124],"the":[12,22,35,38,43,55,72,101,105,125,130,136,141,145],"residue":[13,39,73,131],"number":[14,40,74,121,126,132],"system.":[15],"makes":[17],"it":[18],"possible":[19],"to":[20,32],"eliminate":[21],"shortcomings":[23],"vulnerabilities":[25],"of":[26,37,45,58,68,86,100,115,122,127,129,144],"ciphers,":[28],"are":[30,95,107,148],"sensitive":[31],"cryptanalysis,":[33],"using":[34,71],"advantages":[36],"system,":[41,133],"i.e.,":[42],"parallelization":[44],"calculation":[46],"processes,":[47],"performing":[48],"operations":[49],"on":[50],"low":[51],"bit":[52],"numbers,":[53],"linear":[56,93],"combination":[57],"encrypted":[59],"residues.":[60],"A":[61],"mathematical":[62],"apparatus":[63],"graphic":[66],"scheme":[67],"system":[75],"is":[76,82,110,118],"developed,":[77],"corresponding":[80],"example":[81,114],"given.":[83,119],"Special":[84],"cases":[85],"such":[89],"as":[90,140],"shift":[91],"considered.":[96],"The":[97,120],"cryptographic":[98,138],"strength":[99,139],"proposed":[102],"cryptosystem":[103],"when":[104],"moduli":[106,128],"prime":[108],"numbers":[109],"estimated,":[111],"an":[113],"its":[116],"estimation":[117],"bits":[123],"ensure":[135],"same":[137],"longest":[142],"key":[143],"AES":[146],"algorithm,":[147],"determined.":[149]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
