1.
Lesmana A, Harwahyu R, Suryanto Y. Implementing the Chaotic Permutation Multicircular Cryptography Technique using Asymmetric Key. Ultimatics : Jurnal Teknik Informatika [Internet]. 30Dec.2022 [cited 27Nov.2024];14(2):83-0. Available from: https://ejournals.umn.ac.id/index.php/TI/article/view/2837