1.
Beletsky А, Beletsky O, Stecenko Д. MATRIX ALGORITHMS OF ENCRYPTIC PROTECTION OF INFORMATION AND EXCHANGE OF ENCRYPTION KEY. ITE [Internet]. 2010 Nov. 29 [cited 2024 Nov. 21];(7):156-65. Available from: https://ite.kspu.edu/index.php/ite/article/view/527