[1]
R. Sharma, R. Sharma, and H. Singh, “Classical Encryption Techniques”,
IJCT
, vol. 3, no. 1, pp. 84–90, Aug. 2012.