Return to Article Details Information Technology and Software for Simulation, Synthesis and Research of Data Crypto Protection Methods Download Download PDF