[1]
L. Mathew, “A Survey on Different Cryptographic Techniques”, Int. J. Comp. Sci. Eng., vol. 5, no. 2, pp. 27–30, Nov. 2025.