참고문헌
- Willett M, "Cryptography old and new", Science Direct Computers & Security, pp. 177-186, 1982.
- Lin H S, "Cryptography and Public Policy", Journal of Government Information, pp. 135-148, 1998.
- Alia M.A, Yahya A, "Public-Key Steganography Based on Matching Method", European Journal of Scientific Research, pp. 223-231, 2010.
- Kumar S, Wollinger T, "Fundamentals of Symmetric Cryptography", Embedded Security in Cars, pp. 125-143, 2006.
- Burke J, McDonald J, Austin T, "Architectural support for fast symmetric-key cryptography", Association for Computing Machinery, Volume 34, pp 178-189, 2000. https://doi.org/10.1145/384264.379238
- Mohapatra,P.K, "Public-Key Cryptography", XRDS: Crossroads, The ACM Magazine for students, Vol.7, 2000.
- Palanisamy V, Jeneba Mary A, "Hybrid cryptography by the implementation of RSA and AES", International Journal of Current Research,Vol. 33, Issue, 4, pp.241-244, April, 2011.
- Prakash Kuppuswamy, Saeed Q Y Al-Khalidi, "Implementation of security through simple symmetric key algorithm based on modulo 37", Council for Innovative Research, International Journal of Computers & Technology, www.ijctonline.com,ISSN:2277-3061, Volume 3 No. 2, OCT, 2012.
- Ijaz Ali Shoukat, Kamalrulnizam Abu Bakar, Subariah Ibrahim, "A Generic Hybrid Encryption System (HES)", Research Journal of Applied Sciences, Engineering and Technology 5(9): 2692-2700, ISSN: 2040-7459; e-ISSN: 2040-7467 Maxwell Scientific Organization, 2013. https://doi.org/10.19026/rjaset.5.4793
- Praphul M.N, Nataraj K.R, "FPGA Implementation of Hybrid Cryptosystem", International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319-6378, Volume-1, Issue-8, June 2013.
- Amritpal Singh, Mohit Marwaha, Baljinder Singh, Sandeep Singh , "Comparative Study of DES, 3DES, AES and RSA", Council for Innovative Research International Journal of Computers & Technology, Vol 9, No 3 www.cirworld.com, July 25, 2013.
- Fei Yao, "Hybrid Encryption Scheme for Hospital Financial Data Based on Noekeon Algorithm", Security and Communication Networks, Published 19 October 2021.
- Ali TS, Ali R, "A Novel Medical Image Signcryption Scheme Using TLTS and Henon Chaotic Map", in IEEE Access, vol. 8, pp. 71974-71992, 2020. https://doi.org/10.1109/ACCESS.2020.2987615
- Sujithra M, Padmavathi G, Narayanan S, "Mobile device data security: A cryptographic approach by outsourcing mobile data to cloud", Procedia Computer Science, vol. 47, pp. 480-485, 2015. https://doi.org/10.1016/j.procs.2015.03.232
- Oladeji P. Akomolafe, Matthew O. Abodunrin, "A Hybrid Cryptographic Model for Data Storage in Mobile Cloud Computing", I. J. Computer Network and Information Security, Vol.6, pp. 53-60, 2017. https://doi.org/10.5815/ijcnis.2017.06.06
- Ali Abdulridha Taha, Diaa Salama Abd Elminaam, Khalid M. Hosny Far, "An improved security scheme for mobile cloud computing using Hybrid cryptographic algorithms", East Journal of Electronics and Communications, Volume 18, Number 4, 2018, Pages 521-546, 2018. https://doi.org/10.17654/EC018040521
- Schneier B, "Applied Cryptography", New York: John Wiley & Sons, 1996.
- Herschel, John Frederick William (1820), Book: "Part III. Section I. Examples of the Direct Method of Differences". A Collection of Examples of the Applications of the Calculus of Finite Differences. Cambridge, UK: Printed by J. Smith, sold by J. Deighton & sons. pp. 1-13 [5-6]. Accessed on 26/12/2021.
- Sarbajit Manna, Mohit Prajapati, Ayan Sett, Kallol Banerjee, Saurabh Dutta, "Design and implementation of a two-layered hybrid cryptosystem", International Conference on Security for Information Technology and Communications SECITC, pp 85-96, 2017.
- Maksim Iavich, Sergiy Gnatyuk, Elza Jintcharadze, Yuliia Polishchuk, Roman Odarchenko, "Hybrid Encryption Model of AES and ElGamal Cryptosystems for Flight Control Systems", IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC), 2018.
- Wang Z, Dong H, Chi Y, Zhang J, Yang T, Liu Q, "Research and Implementation of Hybrid Encryption System Based on SM2 and SM4 Algorithm", Proceedings of the 9th International Conference on computer Engineering and Networks, Advances in Intelligent Systems and Computing Vol.1143, Springer July 2020.
- Thillaiarasu N, Chenthur Pandian S, Naveen Balaji G, Benitha Shierly M, Divya A, Divya Prabha G, "Enforcing Confidentiality and Authentication over Public Cloud Using Hybrid Cryptosystems", International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI), pp 1495-1503, 2018.
- Miroslaw Malek, Mohan guruswamy, Howard Owens, Minhir pandya, "A Hybrid Algorithm Technique" Technical Report -89-06, March 1989.