1.
Embedding Algorithms for Generating and Verifying Eds in A Cryptographic Information Security Tool. zr [Internet]. 2023 Apr. 17 [cited 2025 Jul. 14];17:51-5. Available from: https://zetarepo.com/index.php/zr/article/view/2273