[1]
M. Yesina, Y. Gorbenko, and V. Kulibaba, “Essence and conditions of implementation of the attack based on related keys relatively electronic signatures IBS-1 and IBS-2 DSTU ISO/IEC 14888-3”, CS&CS E-journal, no. 3, pp. 18-27, Dec. 2018.