[1]
K. M. Hussein, “Attack Stream Cipher By Using Cipher System Only”, IHJPAS, vol. 21, no. 2, pp. 105–119, Sep. 2017, Accessed: May 01, 2025. [Online]. Available: https://www.jih.uobaghdad.edu.iq/index.php/j/article/view/1393