Methods of information security based cryptographic transformations matrix noiseimmunity | IEEE Conference Publication | IEEE Xplore