[1]
“Embedding Algorithms for Generating and Verifying Eds in A Cryptographic Information Security Tool”, zr, vol. 17, pp. 51–55, Apr. 2023, Accessed: Jul. 14, 2025. [Online]. Available: https://zetarepo.com/index.php/zr/article/view/2273