References
- Ritu Tripathi1, Sanjay Agrawal2 "Comparative Study of Symmetric and Asymmetric Cryptography Techniques" International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 1, Issue 6, June 2014. ISSN 2348 - 4853
- H. Fathima, K.S.R. Matriculation & K.S.R. Kalvi nagar, "Comparative Study of Symmetric Key Algorithms-Des, AES and Blowfish", International Research Journal Volume 17 Issue 2 Version 1.0 Year 2017
- Sangeeta & Er. Arpneek Kaur," A Review on Symmetric Key Cryptography Algorithms", Volume 8, No. 4, May 2017 (Special Issue)
- Rabie A. Mahmoud, A. Baith Mohamed, Magdy Saeb, "Enhancing KASUMI Security by Affixing A Metamorphic Function and the Ensuing Hardware Implementation", International Journal of Computer Science and Communication Security (IJCSCS), Vol. 6, January 2016
- Monika Agrawal, Pradeep Mishra, "Comparative Survey on Symmetric Key Encryption Techniques", International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012
- Krishna Kumar Pandey, Vikas Rangari & Sitesh KumarSinha, "An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security," International Journal of Computer Applications (0975 - 8887) Volume 74- No. 20, July 2013
- DiffiHellman,https://www.sciencedirect.com/topics/computer-science/diffie-hellman
- Gurpreet Singh, Supriya, "A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security", International Journal of Computer Applications, Volume 67- No.19, April 2013
- Elaine Barker, Allen Roginsky, "Transitioning the Use of Cryptographic Algorithms and Key Lengths", NIST Special Publication 800-131A Revision 2, March 2019
- D.Prasad ,G.P.Arya, C.Chaudhary, V.Kumar, "ENCIPHER A Text Encryption and Decryption Technique Using Substitution-Transposition and Basic Arithmetic and Logic Operation", International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014
- T Perrin, M Marlinspike, "The Double Ratchet Algorithm", revision 2016, available at https://signal.org/docs/specifications/doubleratchet/doubleratchet.pdf.
- B.Zhao, X.Dong, W.Meier, K.Jia, G.Wang, "Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule", JOURNAL OF LATEX CLASS FILES, VOL. XXX, NO. XXX, JUNE 2019
- T Anand, M Shanmugam, B Santhoshini, "Rainbow table attack on 3rd generation GSM Telephony secure algorithm - A5/3", International Journal of Recent Technology and Engineering (IJRTE), Volume-7, Issue-5S4, February 2019
- Raja Muthalagu, Subeen Jain, "Modifying LFSR of ZUC to Reduce Time for Key-Stream Generation", Journal of Cyber Security, Vol. 5 4, 257-268, Publication 4 August 2017