[1]
Lisitzky, K. and Kuznetsova, K. 2019. On the weakness S of the transformation of the cipher Strumok from the chain of controllable S-blocks. Computer Science and Cybersecurity. 4 (Jan. 2019), 13-21.