[1]
BeletskyA., BeletskyA. and StecenkoD. 2010. MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY. Journal of Information Technologies in Education (ITE). 7 (Nov. 2010), 156-165. DOI:https://doi.org/10.14308/ite000192.