{"leader":"00785naa#a2200193#i#450#","fields":[{"001":"EN\\\\bibl\\27761"},{"005":"20241110002602.7"},{"011":{"ind1":"#","ind2":"#","subfields":[{"a":"2219-0767"}]}},{"100":{"ind1":"#","ind2":"#","subfields":[{"a":"20190301b2019####ek#y0engy0150####ca"}]}},{"102":{"ind1":"#","ind2":"#","subfields":[{"a":"RU"}]}},{"200":{"ind1":"1","ind2":"#","subfields":[{"a":"SIMULINK MODEL OF ENCRYPTION STABILITY ESTIMATION BY THE ANALYSIS METHOD OF CRYPTOGRAPHIC ALGORITHMS FROM THE VIRTUALIZATION POSITION OF 8-BIT IDENTIFIERS"},{"e":"Journal article"}]}},{"210":{"ind1":"1","ind2":"#","subfields":[{"a":"Voronezh"},{"c":"FSBE Institution of Higher Education Voronezh State University of Forestry and Technologies named after G.F. Morozov"},{"d":"2019"}]}},{"215":{"ind1":"#","ind2":"#","subfields":[{"a":"7 \u00d1\u0081."}]}},{"608":{"ind1":"#","ind2":"#","subfields":[{"a":"Journal article"},{"2":"local"}]}},{"675":{"ind1":"#","ind2":"#","subfields":[{"a":"\u00d0\u009f\u00d1\u0080\u00d0\u00b8\u00d0\u00ba\u00d0\u00bb\u00d0\u00b0\u00d0\u00b4\u00d0\u00bd\u00d1\u008b\u00d0\u00b5 \u00d0\u00bd\u00d0\u00b0\u00d1\u0083\u00d0\u00ba\u00d0\u00b8. \u00d0\u009e\u00d0\u00b1\u00d1\u0089\u00d0\u00b8\u00d0\u00b5 \u00d0\u00b2\u00d0\u00be\u00d0\u00bf\u00d1\u0080\u00d0\u00be\u00d1\u0081\u00d1\u008b. 60"},{"z":""}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Lavlinskiy"},{"g":"V. Viktorovich"}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Zmeev"},{"g":"A. "}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Bereznev"},{"g":"A. S."}]}},{"856":{"ind1":"4","ind2":"#","subfields":[{"a":"zh-szf.ru"},{"u":""}]}}]}