[1]
“Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish”, Data Science: J. of Computing and Appl. Informatics, vol. 4, no. 2, pp. 100–110, Jul. 2020, doi: 10.32734/jocai.v4.i2-4004.