[1]
S. Yevseiev, O. Korol, and H. Kots, “Construction of hybrid security systems based on the crypto-code structures and flawed codes”, EEJET, vol. 4, no. 9 (88), pp. 4–21, Aug. 2017.