1.
Rudnytskyi V, Lada N, Kozlovska S. Technology of two operand operations construction of information cryptographic transformation by modeling results. A.I.S. [Internet]. 2018Dec.26 [cited 2024May5];2(4):26-30. Available from: http://ais.khpi.edu.ua/article/view/2522-9052.2018.4.04