[1]
Beletsky А., Beletsky, O. and Stecenko Д. 2010. MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY. Journal of Information Technologies in Education (ITE). 7 (Nov. 2010), 156–165. DOI:https://doi.org/10.14308/ite000192.