Return to Article Details Mathematical modeling of intellectual and cryptographic protection of authentication keys Download Download PDF