[1]
N. A. A. Mustafa, “Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2”, WJES, vol. 12, no. 2, pp. 60–70, Apr. 2024, doi: 10.31185/ejuow.Vol12.Iss2.502.