[1]
K. M. Hussein, “Attack Stream Cipher By Using Cipher System Only”, IHJPAS, vol. 21, no. 2, pp. 105–119, Sep. 2017, Accessed: Mar. 14, 2025. [Online]. Available: https://jih.uobaghdad.edu.iq/index.php/j/article/view/1393