[1]
“ENCRYPTION AND DATA PROTECTION TECHNOLOGIES AND EVALUATION OF THE EFFECTIVENESS OF ALGORITHMS”, journal, vol. 42, no. 3, pp. 29–34, Apr. 2025, Accessed: Apr. 28, 2025. [Online]. Available: https://scientific-jl.com/luch/article/view/8684