References
- Ruziq, F., Sihombing, P., & Author, C. (2020). Combination Analysis of Data Encryption Standard (DES) Algorithm and LUC Algorithm on File Security. International Journal of Research and Review, 7(2).
- Erna,K,N. and Analisis,K,M. (2008) Algoritma Vigenere Cipher Dengan Mode Operasi Cipher Block Chaining (CBC).
- Naik, P. G., & Naik, G. R. (2014). Asymmetric key encryption using genetic algorithm. International Journal of Latest Trends in Engineering and Technology (IJLTET), 3(3), 118-128.
- Hoobi, M. M., Sulaiman, S. S., & AbdulMunem, I. A. (2020, November). Enhanced Multistage RSA Encryption Model. In IOP Conference Series: Materials Science and Engineering (Vol. 928, No. 3, p. 032068). IOP Publishing. https://doi.org/10.1088/1757-899X/928/3/032068
- Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16, 1-11.
- Shorman, A., & Qatawneh, M. (2018). Performance improvement of double data encryption standard algorithm using parallel computation. International Journal of Computer Applications, 179, 25.
- Bhateja, A. K., Bhateja, A., Chaudhury, S., & Saxena, P. K. (2015). Cryptanalysis of Vigenere cipher using Cuckoo Search. Applied Soft Computing, 26, 315-324
- Jamaludin, J., & Romindo, R. (2020). Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security. IJISTECH (International Journal of Information System and Technology), 4(1), 471-481.
- Agu, E. O., Ogar Michael, O., & Okwori Anthony, O. (2019). Formation of an improved RC6 (IRC6) cryptographic algorithm. International Journal of Advanced Research in Computer Science, 10(4).
- Harba, E. S. I. (2017). Secure data encryption through a combination of AES, RSA and HMAC. Engineering, Technology & Applied Science Research, 7(4), 1781-1785.
- Paje, R. E. J., Sison, A. M., & Medina, R. P. (2019, January). Multidimensional key RC6 algorithm. In Proceedings of the 3rd International Conference on Cryptography, Security and Privacy (pp. 33-38).
- Gunasundari, T., & Elangovan, K. (2014). A comparative survey on symmetric key encryption algorithms. International Journal of Computer Science and Mobile Applications, 2(2), 78-.
- A. Sallam, E. EL-Rabaie, O. S. Faragallah. (2012) "HEVC selective encryption using RC6 block cipher technique".
- Rahmadani, R., Putri, T. T. A., Sriadhi, S., Sari, R. D., & Hutahaean, H. D. (2020, April). Data security system using hybrid cryptosystem RC4A-RSA algorithm. In IOP Conference Series: Materials Science and Engineering (Vol. 830, No. 3, p. 032008). IOP Publishing. https://doi.org/10.1088/1757-899X/830/3/032008
- Amoroso, E. ( 2006 ) Cyber Security. New Jersey: Silicon Press).
- Oxford University Press. (2014) Oxford Online Dictionary. Oxford: Oxford University Press. October http://www.oxforddictionaries.com/definition/english/Cybersecurity).
- William Stallings "Network Security Essentials (Applications and Standards)", Pearson Education, 2004.
- Paar C and Pelzl J 2010 Understanding Cryptography Springer Verlag Berlin Heidelberg
- N. Smart, (1999) Cryptography: An Introduction, 3rd Ed
- Agu, E. O., Ogar Michael, O., & Okwori Anthony, O. (2019). Formation of an improved RC6 (IRC6) cryptographic algorithm. International Journal of Advanced Research in Computer Science, 10(4).