Abstract
This paper addresses to structures and properties of the cryptographic information protection algorithm model based on NPNs and constructed on an SP-network. The main task of the research is to increase the cryptostrength of the algorithm. In the paper, the transformation resulting in the improvement of the cryptographic strength of the algorithm is described in detail. The proposed model is based on an SP-network. The reasons for using the SP-network in this model are the conversion properties used in these networks. In the encryption process, transformations based on S-boxes and P-boxes are used. It is known that these transformations can withstand cryptanalysis. In addition, in the proposed model, transformations that satisfy the requirements of the “avalanche effect” are used. As a result of this work, a computer program that implements an encryption algorithm model based on the SP-network has been developed.
1 Introduction
In the Institute of the Information and Computational Technologies, under the authority of R.G. Biyashev there were developed nonconventional algorithms for encryption (including a symmetric block data encryption algorithm), digital signature, and cryptographic key exchange on the basis of non-positional polynomial notations (NPNs) with the benefit of properties of algebraic methods [1,2,3,4]. Besides, the developed methods are examined with respect to their reliability or rather their strength against cryptanalysis.
This paper presents the results of work on modification of the encryption algorithm aimed at improving the cryptostrength of the algorithm. The properties of a model developed on an SP-network basis are studied.
An SP-network (Substitution-Permutation network) is a block cipher variation put forward by Horst Feistel in 1971 [5]. A cipher developed on an SP-network consists of an S-box and a P-box.
An S-box (substitution box) substitutes a block of input bits with another block of output bits. This substitution should be one-to-one to ensure its invertibility. Since an S-box implements a nonlinear conversion, this enables the cipher to withstand the linear cryptanalysis.
A P-box (permutation box) is a permutation of all the bits of a block.
2 Encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
While developing the encryption algorithm, we used an encryption method based on NPNs, transformations of substitution (S), permutation (P), and so-termed LT-conversion. All the four transformations are described below. A software implementation model of the algorithm was developed. A flow diagram of the model is shown in Figure 1.

The scheme of the algorithm based on SP-network
Before encryption, any input data are split into 16-byte ore 128-bit blocks. The last block is completed up to the length of 16 bytes, when required, according to a rule specified in advance (e.g. with zeroes). The encryption begins with the addition of the first block of plaintext bits to the respective key bits. Further transformations are as follows.
2.1 Conversion S
An S-box is used as a nonlinear bijective conversion (substitution table). The S-box is a one-dimensional array consisting of 256 elements. As a rule, S-boxes are included in the transformation function, and they are essential for the encryption algorithm strength. It is important that any changes in the input data of an S-box would change the output data in a random-looking way. The relationship between an input and the respective output should not be linear or easily approximated by linear functions (this very property is used in the linear cryptanalysis) [6,7].
Transformation S substitutes each input byte by another byte through the S-box (Figure 2).

The scheme of conversion S
From the scheme of conversion S it is easily seen that encrypting two identical 16-byte blocks of a plaintext results in two identical blocks of ciphertext. This is a weakness hat can be used by a cryptanalyst. In order to eliminate the weakness, an LT-conversion was developed.
2.2 Conversion LT
Developing an encryption algorithm, presumes that the algorithm must be analyzed with regard to its strength against various types of cryptographic attacks. Among the most common standard methods now in use are attacks on the basis of linear and differential analyses [6]. Essentially, the latter traces the differences between output bits (in the ciphertext) as a function of differences between input bits (in the plaintext) at different rounds of the base transformation. The precondition to ensure that an encryption algorithm is strong against the differential analysis is the “avalanche effect” in the base transformation.
The LT-conversion serves to comply with the requirement of avalanche effect.
The avalanche effect is an important cryptographic property for encryption, where a small change in the input plaintext bits or the key results in a drastic change in the output ciphertext bits. In other words, all output bits depend on each input bit. It is known that such encryption algorithms as AES, RC4, Kuznyechik and others use transformations that meet the requirements of “avalanche effect” to increase their cryptostrength [8, 9, 10, 11].
Before conversion LT, the bytes of a block are placed in a 4x4 two-dimensional array, as is shown in Figure 3.

The location of the bytes in LT conversions
At the first step, the bytes of the first row in the array are added to each other modulo 256. The new byte obtained in such a way is stored in the place of the leftmost byte, while the rest bytes are rotated right shift of one position.
The procedure is performed four times for the row. As a result, we will get four new bytes in the first row. We then repeat the operation for each row in the array.

The scheme of conversion LT
At the next step, the operation above is implemented for the columns of the array. The obtained new bytes are placed here from up to down. After the LT-conversion, the bytes in the array will receive new values.
2.3 Conversion P
For this transformation, the bytes in a block are considered as bits, which are permutated with a specially designed P-box (a permutation table).

The scheme of conversion P
As a result of the bit permutation, the bytes receive new values. After the conversion, the obtained bit sequences are sent to the encryption module. The module encrypts the block of bytes on the basis of NPNs.
Examples that meet the requirements of the avalanche effect are shown below.
2.4 Description of a nonpositional encryption scheme
As distinct from a classical residue number system, irreducible polynomials over GF(2) serve as bases in an NPN.
First of all, an NPN is formed for an N-bit block of electronic message [12, 13]. For this purpose, we choose its working bases, i.e. irreducible polynomials
over GF(2) of degrees m1, m2, …, mS respectively [2]. Polynomials (1) subject to their arrangement constitute a certain base system. All bases (1) are to be different including the case when they have the same degree. The working range of the NPN is specified by polynomial (modulus)
Examples of the avalanche effect
Conversion | aaaaaaaaaaaaaaaa | aaaaaaaaaaaaaaab |
---|---|---|
LT | d1 25 4f e4 25 09 7b b4 4f 7b 91 9c e4 b4 9c 10 | e1 2d 53 e8 2d 0d 7d b6 53 7d 92 9d e8 b6 9d 11 |
S+LT | 8b d6 db 3c 55 af a7 ef 2b c8 9a 4c 32 57 dd a8 | 6b 46 93 f4 c5 67 83 cb e3 a4 88 3a ea 33 cb 96 |
S+P+LT | c6 b0 14 2b 22 65 9c 66 b2 8e 48 81 40 f8 d3 e9 | 9a 20 cc 87 8c 9d f8 14 4e de 70 95 0e e0 07 83 |
of degree
where F(x) ≡ αi(x)(modpi(x)), i = 1, S.
In expression (2) remainders α1(x), α2(x), …, αS(x) are chosen so that the first l1 bits of a message associate to binary coefficients of remainder α1(x), the next l2 bits associate to binary coefficients of remainder α2(x), etc., and the last lS bits associate to binary coefficients of αS(x).
To encrypt a message, it is used a secret key of N bits, which is also interpreted as a sequence of remainders resulting from dividing some other polynomial G(x) by the same working bases of the system:
where G(x) ≡ βi(x)(mod pi(x)), i = 1, S.
Hence, some function H(F(x), G(x)) is considered as a cryptogram:
where H(x) ≡ ωi(x)(mod pi(x)), i = 1, S.
In NPNs, a cryptogram is the result of multiplying polynomial F(x) by G(x). The members of residue sequence ω1(x), ω2(x), …, ωS(x) are the least remainders on dividing products αi(x) βi(x) by respective bases pi(x):
The binary form of cryptogram H(x) is as follows. The binary coefficients of residue ω1(x) associate to first consecutive l1 bits of H(x). The binary coefficients of residue ω2(x) associate to further consecutive l2 bits of H(x), etc. The binary coefficients of the last residue ωS(x) associate the last consecutive lS binary bits of the cryptogram.
When decrypting cryptogram H(x) with a known key G(x), for each βi(x) it is calculated, as follows from (5), a reciprocal (inverse) polynomial
The result is polynomial
inverse to polynomial G(x). The original message then could be calculated according to (5) and (6) through remainders of the following congruence:
3 The encryption algorithm analysis
Computer-based experiments to test statistical properties of the algorithm ciphertext have been conducted. The developed software package implementing a quality assessment system based on graphical and assessment tests was used to test the output ciphertexts. The results of the statistical analysis of the ciphertexts are detailed in [14].
The results for each test are represented in the form of histogram per key and per the number of files under study are shown in Figure 6.

Test results
To evaluate if the developed algorithm is secure, mathematical models of cryptanalysis involving algebraic, linear and differential methods have been designed.
The cryptanalysis is as follows. A system of nonlinear equations is obtained from a function transforming plaintext into ciphertext with a key. Next, a possibility of transition of the nonlinear system to a linear one is considered. The cryptanalysis of the algorithm under investigation was conducted for the cases with known: 1) ciphertext; 2) plaintext and the related ciphertext; 3) plaintext file format; and 4) ASCII-encoded plaintext [5, 6]. When performing the cryptanalysis, it is believed that an encryption scheme has been known in advance. The cryptanalyst needs to derive:
Plaintext and a key from a ciphertext;
Secret key from a plaintext-ciphertext pair.
To conduct algebraic and linear analyses of a nonpositional encryption algorithm, a set of equations is built subject to regularities of ring multiplication.
The results of the linear and differential analyses were compared against each other with respect to uniformity. Table 2 shows the results for the linear and differential cryptanalyses of S-boxes for certain known and developed algorithms.
The interval of results of the linear and differential cryptanalyses
Name | Minimum | Maximum | Arithmetical mean minimum | Arithmetical mean maximum | Chi-square | Degree of freedom | |
---|---|---|---|---|---|---|---|
DES | Linear | 12 | 48 | 15,5 | 46,25 | 480 | 944 |
Differential | 0 | 16 | 0 | 16 | 20514 | 1007 | |
GOST 28147-89 | Linear | 2 | 14 | 2,75 | 13,75 | 120 | 224 |
Differential | 0 | 8 | 0 | 6,25 | 480 | 239 | |
GOST R 34.13-2015 | Linear | 100 | 156 | - | - | 32640 | 65024 |
Differential | 0 | 8 | - | - | 111297 | 65279 | |
AES-128 | Linear | 111 | 145 | - | - | 32639 | 65024 |
Differential | 0 | 5 | - | - | 67125 | 65279 | |
Encryption algorithm constructed on an SP-network | Linear | 92 | 164 | - | - | 32640 | 65024 |
Differential | 0 | 12 | - | - | 130776 | 65279 |
The study results (Table 2) suggest as follows. To ensure the strength of S-box against the linear cryptanalysis, the elements of the table obtained during the linear cryptanalysis should take the values close to half the quantity of all possible combinations of input vectors in the binary notation. To ensure the strength of an S-box against the differential analysis, the elements of the table (difference matrix) obtained during the differential analysis should take the values close to 1.
The results of the encryption algorithm analysis are detailed in [14].
4 Conclusions
A software application to implement the encryption algorithm model has been developed, and the application is currently under testing. To study the statistical security of the proposed algorithm model, it has been developed a software package embedding statistical and assessment tests.
The work on improving and updating the software applications for the encryption algorithm based on nonpositional polynomial notations will continue. A computational model to keep and transfer key information for the algorithm is the next step of our studies.
It is further planned to use a round mode on the algorithm model, and develop a round key generation scheme.
Acknowledgement
Ongoing studies are funded by the Ministry of Education and Science of the Republic of Kazakhstan.
References
[1] I. Ya. Akushskii, D. I. Juditskii, “Machine Arithmetic in Residue Classes,” Moscow: Sov. Radio, 1968 (in Russian)Search in Google Scholar
[2] R. G. Biyashev, “Development and investigation of methods of the overall increase in reliability in data exchange systems of distributed ACSs,” Doctoral Dissertation in Technical Sciences, Moscow, 1985 (in Russian)Search in Google Scholar
[3] R. G. Bijashev, S. E. Nyssanbayeva Algorithm for Creation a Digital Signature with Error Detection and Correction, Cybernetics and Systems Analysis. – 2012, Vol. 48, No 4, 489-49710.1007/s10559-012-9428-5Search in Google Scholar
[4] R. Biyashev, S. Nyssanbayeva, N. Kapalova, The Key Exchange Algorithm on Basis of Modular Arithmetic, Proceedings of International Conference on Electrical, Control and Automation Engineering (ECAE2013), Hong Kong— Lancaster, U.S.A.:DEStech Publications, 2013, pp.16-21Search in Google Scholar
[5] W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd Edition, Transl. from English, M: Williams, 2001, 672 p.Search in Google Scholar
[6] L. K. Babenko, E. A. Ischukova, Modern Block Encryption Algorithms and Methods of their Analysis, Moscow, Helios, ARV, 2006, 376Search in Google Scholar
[7] B. Schneier, Applied Cryptography, 2nd ed.; Transl. from English — Triumf, 2002, 816Search in Google Scholar
[8] National Standard of the Russian Federation GOST R 34.13, http://www.tc26.ru/standard/gost/GOSTR34.13-2015.pdf, 2015, 21 p.Search in Google Scholar
[9] FIPS 46 3, Data Encryption Standard (DES). — USA, NIST, 1977Search in Google Scholar
[10] FIPS PUB 197. Advanced Encryption Standard (AES). – USA, NIST, 2002Search in Google Scholar
[11] Recommendation for Block Cipher Modes of Operation // NIST Special Publication 800-38A. Technology Administration U.S. Department of Commerce. - 2001,10 p.Search in Google Scholar
[12] R. Biyashev, N. Kapalova, S. Nyssanbayeva, A. Haumen, Construction and analysis of models of increasing reliability for modular encryption algorithm // Proceedings of the 10th International Conference on Computer Engineering and Applications (CEA ’16). – Barcelona, Spain, 2016. –pp. 161-165Search in Google Scholar
[13] R. Biyashev, S. Nyssanbayeva, N. Kapalova, A. Haumen, Modified symmetric block encryption-decryption algorithm based on modular arithmetic // Proceedings of the International Conference on Wireless Communications, Network Security and Signal Processing (WCNSSP2016). – Chiang Mai, Thailand,2016. – pp. 263-265.10.2991/amsee-16.2016.69Search in Google Scholar
[14] R.G Biyashev, S.E. Nyssanbayeva, N.A. Kapalova, et al., FRP R&D F.0678, Developmen and study of national encryption algorithm models based on modular arithmetic, State Registration No. 0115RK01304. 175 p.Search in Google Scholar
© 2018 N.Kapalova and A. Haumen
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.
Articles in the same Issue
- Regular Article
- Real-scale comparison between simple and composite raw sewage sampling
- 10.1515/eng-2018-0017
- The risks associated with falling parts of glazed facades in case of fire
- Implementation of high speed machining in thin-walled aircraft integral elements
- Evaluating structural crashworthiness and progressive failure of double hull tanker under accidental grounding: bottom raking case
- Influence of Silica (SiO2) Loading on the Thermal and Swelling Properties of Hydrogenated-Nitrile-Butadiene-Rubber/Silica (HNBR/Silica) Composites
- Statistical Variations and New Correlation Models to Predict the Mechanical Behavior and Ultimate Shear Strength of Gypsum Rock
- Analytic approximate solutions to the chemically reactive solute transfer problem with partial slip in the flow of a viscous fluid over an exponentially stretching sheet with suction/blowing
- Thermo-mechanical behavior simulation coupled with the hydrostatic-pressure-dependent grain-scale fission gas swelling calculation for a monolithic UMo fuel plate under heterogeneous neutron irradiation
- Optimal Auxiliary Functions Method for viscous flow due to a stretching surface with partial slip
- Vibrations Analysis of Rectangular Plates with Clamped Corners
- Evaluating Lean Performance of Indian Small and Medium Sized Enterprises in Automotive Sector
- FPGA–implementation of PID-controller by differential evolution optimization
- Thermal properties and morphology of polypropylene based on exfoliated graphite nanoplatelets/nanomagnesium oxide
- A computer-based renewable resource management system for a construction company
- Hygrothermal Aging of Amine Epoxy: Reversible Static and Fatigue Properties
- The selected roof covering technologies in the aspect of their life cycle costs
- Influence of insulated glass units thickness and weight reduction on their functional properties
- Structural analysis of conditions determining the selection of construction technology for structures in the centres of urban agglomerations
- Selection of the optimal solution of acoustic screens in a graphical interpretation of biplot and radar charts method
- Subsidy Risk Related to Construction Projects: Seeking Causes
- Multidimensional sensitivity study of the fuzzy risk assessment module in the life cycle of building objects
- Planning repetitive construction projects considering technological constraints
- Identification of risk investment using the risk matrix on railway facilities
- Comparison of energy parameters of a centrifugal pump with a multi-piped impeller in cooperation either with an annular channel and a spiral channel
- Influence of the contractor’s payment method on the economic effectiveness of the construction project from the contractor’s point of view
- Special Issue Automation in Finland
- Diagnostics and Identification of Injection Duration of Common Rail Diesel Injectors
- An advanced teaching scheme for integrating problem-based learning in control education
- A survey of telerobotic surface finishing
- Wireless Light-Weight IEC 61850 Based Loss of Mains Protection for Smart Grid
- Smart Adaptive Big Data Analysis with Advanced Deep Learning
- Topical Issue Desktop Grids for High Performance Computing
- A Bitslice Implementation of Anderson’s Attack on A5/1
- Efficient Redundancy Techniques in Cloud and Desktop Grid Systems using MAP/G/c-type Queues
- Templet Web: the use of volunteer computing approach in PaaS-style cloud
- Using virtualization to protect the proprietary material science applications in volunteer computing
- Parallel Processing of Images in Mobile Devices using BOINC
- “XANSONS for COD”: a new small BOINC project in crystallography
- Special Issue on Sustainable Energy, Engineering, Materials and Environment
- An experimental study on premixed CNG/H2/CO2 mixture flames
- Tidal current energy potential of Nalón river estuary assessment using a high precision flow model
- Special Spring Issue 2017
- Context Analysis of Customer Requests using a Hybrid Adaptive Neuro Fuzzy Inference System and Hidden Markov Models in the Natural Language Call Routing Problem
- Special Issue on Non-ferrous metals and minerals
- Study of strength properties of semi-finished products from economically alloyed high-strength aluminium-scandium alloys for application in automobile transport and shipbuilding
- Use of Humic Sorbent from Sapropel for Extraction of Palladium Ions from Chloride Solutions
- Topical Issue on Mathematical Modelling in Applied Sciences, II
- Numerical simulation of two-phase filtration in the near well bore zone
- Calculation of 3D Coordinates of a Point on the Basis of a Stereoscopic System
- The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
- A computational algorithm and the method of determining the temperature field along the length of the rod of variable cross section
- ICEUBI2017 - International Congress on Engineering-A Vision for the Future
- Use of condensed water from air conditioning systems
- Development of a 4 stroke spark ignition opposed piston engine
- Development of a Coreless Permanent Magnet Synchronous Motor for a Battery Electric Shell Eco Marathon Prototype Vehicle
- Removal of Cr, Cu and Zn from liquid effluents using the fine component of granitic residual soils
- A fuzzy reasoning approach to assess innovation risk in ecosystems
- Special Issue SEALCONF 2018
- Brush seal with thermo-regulating bimetal elements
- The CFD simulation of the flow structure in the sewage pump
- The investigation of the cavitation processes in the radial labyrinth pump
- Testing of the gaskets at liquid nitrogen and ambient temperature
- Probabilistic Approach to Determination of Dynamic Characteristics of Automatic Balancing Device
- The design method of rubber-metallic expansion joint
- The Specific Features of High-Velocity Magnetic Fluid Sealing Complexes
- Effect of contact pressure and sliding speed on the friction of polyurethane elastomer (EPUR) during sliding on steel under water wetting conditions
- Special Issue on Advance Material
- Effect of thermo-mechanical parameters on the mechanical properties of Eurofer97 steel for nuclear applications
- Failure prediction of axi-symmetric cup in deep drawing and expansion processes
- Characterization of cement composites based on recycled cellulosic waste paper fibres
- Innovative Soft Magnetic Composite Materials: Evaluation of magnetic and mechanical properties
- Statistical modelling of recrystallization and grain growth phenomena in stainless steels: effect of initial grain size distribution
- Annealing effect on microstructure and mechanical properties of Cu-Al alloy subjected to Cryo-ECAP
- Influence of heat treatment on corrosion resistance of Mg-Al-Zn alloy processed by severe plastic deformation
- The mechanical properties of OFHC copper and CuCrZr alloys after asymmetric rolling at ambient and cryogenic temperatures
Articles in the same Issue
- Regular Article
- Real-scale comparison between simple and composite raw sewage sampling
- 10.1515/eng-2018-0017
- The risks associated with falling parts of glazed facades in case of fire
- Implementation of high speed machining in thin-walled aircraft integral elements
- Evaluating structural crashworthiness and progressive failure of double hull tanker under accidental grounding: bottom raking case
- Influence of Silica (SiO2) Loading on the Thermal and Swelling Properties of Hydrogenated-Nitrile-Butadiene-Rubber/Silica (HNBR/Silica) Composites
- Statistical Variations and New Correlation Models to Predict the Mechanical Behavior and Ultimate Shear Strength of Gypsum Rock
- Analytic approximate solutions to the chemically reactive solute transfer problem with partial slip in the flow of a viscous fluid over an exponentially stretching sheet with suction/blowing
- Thermo-mechanical behavior simulation coupled with the hydrostatic-pressure-dependent grain-scale fission gas swelling calculation for a monolithic UMo fuel plate under heterogeneous neutron irradiation
- Optimal Auxiliary Functions Method for viscous flow due to a stretching surface with partial slip
- Vibrations Analysis of Rectangular Plates with Clamped Corners
- Evaluating Lean Performance of Indian Small and Medium Sized Enterprises in Automotive Sector
- FPGA–implementation of PID-controller by differential evolution optimization
- Thermal properties and morphology of polypropylene based on exfoliated graphite nanoplatelets/nanomagnesium oxide
- A computer-based renewable resource management system for a construction company
- Hygrothermal Aging of Amine Epoxy: Reversible Static and Fatigue Properties
- The selected roof covering technologies in the aspect of their life cycle costs
- Influence of insulated glass units thickness and weight reduction on their functional properties
- Structural analysis of conditions determining the selection of construction technology for structures in the centres of urban agglomerations
- Selection of the optimal solution of acoustic screens in a graphical interpretation of biplot and radar charts method
- Subsidy Risk Related to Construction Projects: Seeking Causes
- Multidimensional sensitivity study of the fuzzy risk assessment module in the life cycle of building objects
- Planning repetitive construction projects considering technological constraints
- Identification of risk investment using the risk matrix on railway facilities
- Comparison of energy parameters of a centrifugal pump with a multi-piped impeller in cooperation either with an annular channel and a spiral channel
- Influence of the contractor’s payment method on the economic effectiveness of the construction project from the contractor’s point of view
- Special Issue Automation in Finland
- Diagnostics and Identification of Injection Duration of Common Rail Diesel Injectors
- An advanced teaching scheme for integrating problem-based learning in control education
- A survey of telerobotic surface finishing
- Wireless Light-Weight IEC 61850 Based Loss of Mains Protection for Smart Grid
- Smart Adaptive Big Data Analysis with Advanced Deep Learning
- Topical Issue Desktop Grids for High Performance Computing
- A Bitslice Implementation of Anderson’s Attack on A5/1
- Efficient Redundancy Techniques in Cloud and Desktop Grid Systems using MAP/G/c-type Queues
- Templet Web: the use of volunteer computing approach in PaaS-style cloud
- Using virtualization to protect the proprietary material science applications in volunteer computing
- Parallel Processing of Images in Mobile Devices using BOINC
- “XANSONS for COD”: a new small BOINC project in crystallography
- Special Issue on Sustainable Energy, Engineering, Materials and Environment
- An experimental study on premixed CNG/H2/CO2 mixture flames
- Tidal current energy potential of Nalón river estuary assessment using a high precision flow model
- Special Spring Issue 2017
- Context Analysis of Customer Requests using a Hybrid Adaptive Neuro Fuzzy Inference System and Hidden Markov Models in the Natural Language Call Routing Problem
- Special Issue on Non-ferrous metals and minerals
- Study of strength properties of semi-finished products from economically alloyed high-strength aluminium-scandium alloys for application in automobile transport and shipbuilding
- Use of Humic Sorbent from Sapropel for Extraction of Palladium Ions from Chloride Solutions
- Topical Issue on Mathematical Modelling in Applied Sciences, II
- Numerical simulation of two-phase filtration in the near well bore zone
- Calculation of 3D Coordinates of a Point on the Basis of a Stereoscopic System
- The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network
- A computational algorithm and the method of determining the temperature field along the length of the rod of variable cross section
- ICEUBI2017 - International Congress on Engineering-A Vision for the Future
- Use of condensed water from air conditioning systems
- Development of a 4 stroke spark ignition opposed piston engine
- Development of a Coreless Permanent Magnet Synchronous Motor for a Battery Electric Shell Eco Marathon Prototype Vehicle
- Removal of Cr, Cu and Zn from liquid effluents using the fine component of granitic residual soils
- A fuzzy reasoning approach to assess innovation risk in ecosystems
- Special Issue SEALCONF 2018
- Brush seal with thermo-regulating bimetal elements
- The CFD simulation of the flow structure in the sewage pump
- The investigation of the cavitation processes in the radial labyrinth pump
- Testing of the gaskets at liquid nitrogen and ambient temperature
- Probabilistic Approach to Determination of Dynamic Characteristics of Automatic Balancing Device
- The design method of rubber-metallic expansion joint
- The Specific Features of High-Velocity Magnetic Fluid Sealing Complexes
- Effect of contact pressure and sliding speed on the friction of polyurethane elastomer (EPUR) during sliding on steel under water wetting conditions
- Special Issue on Advance Material
- Effect of thermo-mechanical parameters on the mechanical properties of Eurofer97 steel for nuclear applications
- Failure prediction of axi-symmetric cup in deep drawing and expansion processes
- Characterization of cement composites based on recycled cellulosic waste paper fibres
- Innovative Soft Magnetic Composite Materials: Evaluation of magnetic and mechanical properties
- Statistical modelling of recrystallization and grain growth phenomena in stainless steels: effect of initial grain size distribution
- Annealing effect on microstructure and mechanical properties of Cu-Al alloy subjected to Cryo-ECAP
- Influence of heat treatment on corrosion resistance of Mg-Al-Zn alloy processed by severe plastic deformation
- The mechanical properties of OFHC copper and CuCrZr alloys after asymmetric rolling at ambient and cryogenic temperatures