International Journal of Soft Computing
Year:
2021
Volume:
16
Issue:
4
Page No.
64 - 67
References
Agrawal, H. and P.R. Badadapure, 2016. A survey paper on elliptic curve cryptography. Int. Res. J. Eng. Technol. (IRJET.), Vol. 3, No. 4.
Forouzan, B., 2007. Cryptography and Network Security. McGraw-Hill, New Delhi, India,.
Gupta, N., 2012. Implementation of optimized des encryption algorithm upto 4 round on spartan 3. Int. J. Comput. Technol. Electron. Eng. (IJCTEE.), 2: 82-86.
Direct Link | Kaushik, A., 2013. Extended Diffie-Hellman algorithm for key exchange and management. Int. J. Adv. Eng. Sci., 3: 67-70.
NehaKhatri-Valmik, M. and V.K. Kshirsagar, 1994. Blowfish algorithm. IOSR. J. Comput. Eng., 16: 80-83.
Singh, G., 2013. A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int. J. Comput. Appl., 67: 33-38.
Direct Link | Soumya, K. and G.S. Kishore, 2013. Design and Implementation of Rijndael encryption algorithm based on FPGA. Int. J. Comput. Sci. Mob. Comput., 2: 120-127.