[1]
Beletsky А., O. Beletsky, and Stecenko Д., “MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY”, ITE, no. 7, pp. 156–165, Nov. 2010.