[1]
Yesina, M., Gorbenko, Y. and Kulibaba, V. 2018. Essence and conditions of implementation of the attack based on related keys relatively electronic signatures IBS-1 and IBS-2 DSTU ISO/IEC 14888-3. Computer Science and Cybersecurity. 3 (Dec. 2018), 18-27.