[1]
H. Xu and Q. Sun, “Possible Reinforcements of RSA and Some Other Encryption Methods”, IJCSIT, vol. 8, no. 3, pp. 40–55, Mar. 2026, doi: 10.62051/ijcsit.v8n3.06.