[1]
“Enhancing Information Security and Cryptography Efficiency with the Kushare Transform”, edujournal, vol. 3, no. 2, pp. 94–81, Jul. 2024, doi: 10.37375/foej.v3i2.2827.