1.
Фауре ЭВ, Швыдкий ВВ, Щерба ВА. Method of message authentication code formation based on permutations. Zahist ìnf. [Internet]. 2015 Mar. 9 [cited 2026 Apr. 16];16(4):340. Available from: http://jrnl.nau.edu.ua/index.php/ZI/article/view/334