[1]
D. Hyka and A. Benusi, “Some Cryptographic Weakness and the Ways to Avoid Them in ICT Services of Developing Countries.”, EJSD, vol. 3, no. 2, p. 73, Jun. 2014.