[1]
В. А. Швець and В. В. Шестакова, “Using the fingerprint to the elliptic curve cryptosystems”, Bezpeka ìnf., vol. 17, no. 1, pp. 64–67, Jun. 2012.