[1]
A. M. A. Afat, “Data Security and Cryptography Substitution Techniques Algorithms implementation”, IJEIT, vol. 6, no. 1, Jun. 2024.