[1]
marwa S. Mohammed and A. N. Hashim, “ and its most extensively used encryption techniques”., AJEST, vol. 2, no. 2, pp. 140–151, May 2023.