Mohammed , marwa Sami, and Asaad N. Hashim. “ and Its Most Extensively Used Encryption Techniques”. Al-Salam Journal for Engineering and Technology 2, no. 2 (May 16, 2023): 140–151. Accessed June 27, 2024. http://journal.alsalam.edu.iq/index.php/ajest/article/view/105.