[1]
BeletskyA., BeletskyA., and StecenkoD., “MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY”, ITE, no. 7, pp. 156-165, Nov. 2010.