[1]
R. Sharma, R. Sharma, and H. Singh, “Classical Encryption Techniques”, IJCT, vol. 3, no. 1, pp. 84–90, Aug. 2012.