[1]
Smirnova М. et al. 2015. Examples of implementation of asymmetric encryption algorithms. Bulletin of the Karaganda University. Mathematics Series. 80, 4 (Dec. 2015), 108–114.