1.
Lesmana A, Harwahyu R, Suryanto Y. Implementing the Chaotic Permutation Multicircular Cryptography Technique using Asymmetric Key. Ultimatics [Internet]. 2022 Dec. 30 [cited 2025 Oct. 6];14(2):83-90. Available from: https://ejournals.umn.ac.id/index.php/TI/article/view/2837