1.
Alekseychuk A, Ignatenko S. Algorithms for evaluation of the SNOW 2.0-like stream ciphers security over residue rings against correlation attacks. RT [Internet]. 2018May15 [cited 2024Nov.22];2(193):28-34. Available from: http://rt.nure.ua/article/view/175686