[1]
Azmi, F. and Tommy, T. 2025. Implementation of the Hill Cipher Algorithm with a Random Generator in Key Validation for File Security. Journal of Technology and Computer. 2, 3 (Aug. 2025), 146–156.