[1]
“The Encryption Algorithms GOST28147a89aIDEA8a4 and GOST28147a89aRFWKIDEA8a4”, GJCST, vol. 16, no. C5, pp. 29–36, Oct. 2016, Accessed: Feb. 04, 2026. [Online]. Available: https://testing.computerresearch.org/index.php/computer/article/view/1461