[1]
Górniak, D. and Kopniak, P. 2017. Comparing the speed of the selected hash and encryption algorithms. Journal of Computer Sciences Institute. 4, (Sep. 2017), 82–86. DOI:https://doi.org/10.35784/jcsi.598.