[1]
F. Azmi and T. Tommy, “Implementation of the Hill Cipher Algorithm with a Random Generator in Key Validation for File Security”, JOTECHCOM, vol. 2, no. 3, pp. 146–156, Aug. 2025, Accessed: Aug. 11, 2025. [Online]. Available: https://journal.technolabs.co.id/index.php/jotechcom/article/view/62