1.
Alekseychuk A, Ignatenko S. Algorithms for evaluation of the SNOW 2.0-like stream ciphers security over residue rings against correlation attacks. RT [Internet]. 2018May15 [cited 2026Feb.20];2(193):28-34. Available from: http://rt.nure.ua/article/view/175686