Return to Article Details
Theoretical justification and practical implementation of entropy extractors based on national cryptographic algorithms
Download
Download PDF