(1)
BeletskyA.; BeletskyA.; StecenkoD. MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY. ITE 2010, 156-165.