[1]
V. Rudnytskyi, N. Lada, and S. Kozlovska, “Technology of two operand operations construction of information cryptographic transformation by modeling results”, A.I.S., vol. 2, no. 4, pp. 26–30, Dec. 2018.