共 27 条
[1]
Bokhari M.U., Shallal Q.M., A review on symmetric key encryption techniques in cryptography, Int J Comput Appl, 147, 10, pp. 43-48, (2016)
[2]
Abdullah A.M., Advanced encryption standard (AES) algorithm to encrypt and decrypt data, Cryptogr Netw Secur, 16, pp. 1-11, (2017)
[3]
Han S.-J., Oh H.-S., Park J., The improved data encryption standard (DES) algorithm, Proceedings of ISSSTA’95 International Symposium on Spread Spectrum Techniques and Applications, 3, pp. 1310-1314, (1996)
[4]
Knudsen L.R., Et al., On the design and security of RC2, International Workshop on Fast Software Encryption, (1998)
[5]
Noura M., Et al., S-DES: An efficient and secure DES variant, IEEE Middle East and North Africa Communications Conference (MENACOMM), pp. 1-6, (2018)
[6]
Milanov E., The RSA Algorithm, pp. 1-11, (2009)
[7]
Imam R., Anwer F., Nadeem M., An effective and enhanced RSA based public key encryption scheme (XRSA), Int J Inf Technol, 14, 5, pp. 2645-2656, (2022)
[8]
Merkle R.C., A certified digital signature, Conference on the Theory and Application of Cryptology, (1990)
[9]
Yassein M.B., Et al., Comprehensive study of symmetric key and asymmetric key encryption algorithms, International Conference on Engineering and Technology (ICET), pp. 1-7, (2017)
[10]
Hellman M.E., An overview of public key cryptography, IEEE Commun Mag, 40, 5, pp. 42-49, (2002)