[1]
Э. В. Фауре, В. В. Швыдкий, and В. А. Щерба, “Method of message authentication code formation based on permutations”, Zahist ìnf., vol. 16, no. 4, p. 340, Mar. 2015.