[1]
N. Abid, “Evolution of Cryptographic Techniques: Overview of the Existing Approaches and Trends of the Development”, BULLET, vol. 1, no. 03, pp. 523–538, Jul. 2022.