(1)
Швець, В. А.; Шестакова, В. В. Using the Fingerprint to the Elliptic Curve Cryptosystems. Bezpeka ìnf. 2012, 17, 64-67.