[1]
Rudnytskyi, V., Lada, N. and Kozlovska, S. 2018. Technology of two operand operations construction of information cryptographic transformation by modeling results. Advanced Information Systems. 2, 4 (Dec. 2018), 26–30. DOI:https://doi.org/10.20998/2522-9052.2018.4.04.