共 6 条
[1]
Drashti E., 2015, NAT C REC ADV ENG SU
[2]
Karthik S, 2014, INT J SCI ENG RES IJ, V2
[3]
Mandal Akash Kumar, 2012, IJETICS, V1
[4]
Nithya, 2016, INDIAN J SCI TECHNOL, V9
[5]
A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish
[J].
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015,
2016, 78
:617-624
[6]
Toldinas J, 2014, ELEKTRON ELEKTROTECH, V20, P158, DOI [10.5755/j01.eee.20.5.718, 10.5755/j01.eee.20.5.7118]