[1]
W. Haryono, “Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish”, Data Science: J. of Computing and Appl. Informatics, vol. 4, no. 2, pp. 100-110, Jul. 2020.