1. Yesina M., Gorbenko Y., Kulibaba V. Essence and conditions of implementation of the attack based on related keys relatively electronic signatures IBS-1 and IBS-2 DSTU ISO/IEC 14888-3 // Computer Science and Cybersecurity. 2018. № 3. C. 18-27.