[1]
S. Mitin and M. Antusheva, “Method of authenticated crypto-code keys”, ITS, vol. 9, no. 1, pp. 44–52, Jun. 2021.