1. Lisitzky K., Kuznetsova K. On the weakness S of the transformation of the cipher Strumok from the chain of controllable S-blocks // Computer Science and Cybersecurity. 2019. № 4. C. 13-21.