[1]
Smirnova М., I. Samoilova, and L. Ustinova, “Examples of implementation of asymmetric encryption algorithms”, M, vol. 80, no. 4, pp. 108–114, Dec. 2015.