[1]
S. Jumaa, D. A. . Ali, and D. M. A. Alshmmri, “Review : Methods of Cryptography”, AJEST, vol. 1, no. 2, pp. 30–34, Jul. 2022.