[1]
S. Srivastav, V. Gupta, and K. Gola, “Secure and Authenticated Cryptographic Techniques: ‘A Review’”, Int. J. Comp. Sci. Eng., vol. 6, no. 5, pp. 861–870, Nov. 2025.