1. Luo Q. (ed.) Advancing Computing, Communication, Control and Management. Springer Berlin, Heidelberg, 2010.
2. State Standard 28147-89. Information Processing Systems. Cryptographic Protection. Cryptographic Conversion Algorithm (76907). (Accessed 25 June 2022) Available online: https://dnaop.com/html/76907_3.html.
3. Mao V. Modern Cryptography: Theory and Practice. M. Sudul (Ed.): Prentice Hall: New Jersey, USA, 2003.
4. Stallings V. Cryptography and Protection of Networks: Principles and Practice, 7th Ed.; Pearson, NY, 2016.
5. Ferguson N., Schneier B. Practical Cryptography. Publishing House "Williams", 1 st Ed.; Wiley, 2003.