(1)
Azmi, F.; Tommy, T. Implementation of the Hill Cipher Algorithm With a Random Generator in Key Validation for File Security. JOTECHCOM 2025, 2 (3), 146-156.