1.
Embedding Algorithms for Generating and Verifying Eds in A Cryptographic Information Security Tool. zr. 2023;17:51-55. Accessed July 14, 2025. https://zetarepo.com/index.php/zr/article/view/2273