News
In this paper, the authors provide with an encryption decryption algorithm with secure strength, bringing failure to the intruder effort to break the cipher.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results