[1]
Сукнов, М., Громико, І. and Перчик, Є. 2020. Method of cryptologic data transformations. Computer Science and Cybersecurity. № 2 (Dec. 2020), 33-40. DOI:https://doi.org/10.26565/2519-2310-2020-2-04.