Skip to main content
. 2018 Sep 19;20(9):716. doi: 10.3390/e20090716

Figure 4.

Figure 4

The architecture of the proposed encryption algorithm.