1 |
N. I. of Standards-(NIST), Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197 (2001)
|
2 |
Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In Proc. Fast Softw. Encryption Cambridge Security. Work. Cambridge, U. K., pp. 191-204 (1994)
|
3 |
Shannon, C. E.: Communication theory of secrecy systems. Bell System Technical Journal, vol. 28 (4), pp. 656-715 (1949)
DOI
|
4 |
Palagushin, V., and Khomonenko, A. D.: Evaluation of cryptographic primitives security based on proximity to the latin square. In Proceeding of the IEEE 18th conference of fruct association, pp. 266-271(2016)
|
5 |
S. Manku, S., and Vasanth, K.: Blowfish encryption algorithm for information security. ARPN Journal of Engineering and Applied Sciences, vol. 10(10), pp. 4717-4719 (2015)
|
6 |
Nie, T., and Zhang, T.: A study of DES and Blowfish encryption algorithm. In Proceedings of 10th IEEE Region Annual International Conference TENCON, pp. 1-4 (2009)
|
7 |
Mushtaq, M. F., Jamel, S. , Mohamad, K. M. , .Khalid, S. A. A., and Deris, M. M.: Key generation technique based on triangular coordinate extraction for hybrid cubes. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. (3-4), pp. 195-200 (2017)
|
8 |
Mel, H. X., and Baker. D. M.: Cryptography decrypted. Addison-Wesley (2001)
|
9 |
William, E. B., Barker, C.: Recommendation for the triple data encryption algorithm (TDEA) block cipher. NIST Special Publication 800-67 (2012)
|
10 |
Silva, N. B. F., Pigatto, D. F., Martins, P. S., and Branco, K. R. L. J. C.: Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general-purpose computer. Journal of Network and Computer Applications, vol. 60, pp. 130-143 (2016)
DOI
|
11 |
Alshahrani, A. M., and Walker, S.: Implement a novel symmetric block cipher algorithm. International Journal on Cryptography and Information Security, vol. 4 (4), pp. 1-11 (2014)
DOI
|
12 |
Smid M. E., and Branstad D. K.: Data Encryption Standard: past and future. In Proceedings of the IEEE, vol. 76 (5), pp. 550-559 (1988)
DOI
|
13 |
Dworkin, M.: Recommendation for block cipher modes of operation, NIST Spec. Publ. 800-38B, (2005)
|
14 |
Burnett, S., and Paine, S. : RSA Security's Official Guide to Cryptography.McGraw-Hill (2001)
|
15 |
Salama, D., Minaam, A., Abdual-kader, H. M, and Hadhoud, M. M.: Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types. International Journal of Network Security, vol. 11(2), pp. 78-87 (2010)
|
16 |
Disina, A. H., Jamel, S., Pindar, Z. A., and Deris M. M.: All-or-nothing key derivation function based on quasigroup string. In proceeding of IEEE International Conference on Information Science and Security (ICISS), pp. 6-10 (2016)
|
17 |
Disina, A. H., Jamel, S. , Aamir, M., Pindar, Z. A., Deris M. M., and Mohamad, K. M.: A key scheduling algorithm based on dynamic quasigroup string transformation and All-Or-Nothing key derivation function. Journal of Telecommunication, Electronic and Computer Engineering, vol. 9 (3-5), pp. 1-6 (2017)
|
18 |
Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M., Foti, J., and Roback, E.: Report on the development of the advanced encryption standard (AES). National Institute of Standards and Technology, pp. 1-116 (2000)
|
19 |
N. I. of S. and T. NIST: Data Encryption Standard (DES). Federal Information Processing Standards Publication (FIPS PUB 46-3), vol. 25(10), pp. 1-22 (1999)
|
20 |
Schneier, B.: Description of a new variable-length key, 64- bit block cipher (Blowfish). In Proceedings of the Fast Software Encryption: Cambridge Security Workshop Cambridge, U. K., pp. 191-204 (1994)
|
21 |
Jamel, S., Deris, M. M., Yanto, I. T. R., and Herawan, T.: The hybrid cubes encryption algorithm (HiSea). Communications in Computer and Information Science, Springer-Verlag Berlin Heidelberg, vol. 154, pp. 191-200 (2011)
|
22 |
Sasi, S. B., Sivanandam, N., and Emeritus, : A survey on cryptography using optimization algorithms in WSNs. Indian Journal of Science and Technology, vol. 8(3), pp. 216-221 (2015)
DOI
|
23 |
Jamel, S.: The hybrid cubes encryption algorithm (HiSea). Ph.D Thesis, Univ. Tun Hussein Onn Malaysia (UTHM), Johor, Malaysia, pp. 1-138 (2012)
|
24 |
Ahmad, S., Alam, K. M. R., Rahman, H., and Tamura, S.: A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. In Proceedings of the IEEE International Conference on Networking Systems and Security (2015)
|
25 |
Kaushik, A., Barnela M., and Kumar, A.: Keyless user defined optimal security encryption. International Journal of Computer and Electrical Engineering, vol. 4 (2), pp. 2-6 (2012)
|
26 |
Goldwasser, S. and Bellare, M. Lecture Notes on Cryptography, Cambridge, Massachusetts (2008)
|
27 |
Stallings, W.: Cryptography and network security: principles and practices. Prentice Hall, (2005)
|
28 |
Nadeem, A. and Javed, M. Y.: A performance comparison of data encryption algorithms. International Conference on Information and Communication Technologies, pp. 84-89, 2005
|
29 |
Patil, P., Narayankar, P., Narayan, D. G., and Meena, S. M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In Procedia Computer Science, vol. 78, pp.617-624 (2016)
DOI
|
30 |
Fujisaki, E. and Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. Journal of Cryptology, vol. 26 (1), pp. 80-101 (2013)
DOI
|
31 |
Daemen, J., Rijmen, V., and Leuven, K. U.: AES Proposal: Rijndael. (NIST), National Institute of Standards, (1999)
|
32 |
Mandal, K., Parakash, C., and Tiwari, A.: Performance evaluation of cryptographic algorithms: DES and AES. In Proceeding of the IEEE Students' Conference on Electrical, Electronics and Computer Science: Innovation for Humanity (SCEECS), (2012)
|
33 |
Escala, A., Herold, G., and Rafols, C.: An algebraic framework for Diffie-Hellman assumptions. Journal of Cryptology (2015)
|
34 |
Jorstad N., and Landgrave.: Cryptographic algorithm metrics. In 20th National Information Systems Security (1997)
|
35 |
Hercigonja, Z., Gimnazija, D., and Varazdin, C.: Comparative analysis of cryptographic algorithms and advanced cryptographic algorithms. International Journal of Digital Technology & Economy, vol. 1(2), pp. 1-8 (2016)
|
36 |
Maqsood, F., Ali, M. M., Ahmed, M., and Shah, M. A.: Cryptography: A comparative analysis for modern techniques. International Journal of Advanced Computer Science and Applications, vol. 8(6), pp. 442-448 (2017)
|
37 |
Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th ed. Prentice Hall Press (2010)
|
38 |
Stallings, W.: The RC4 stream encryption algorithm. In Cryptography and network security, 2005.
|
39 |
Kumar, N., and P. Chaudhary, P.: Performance evaluation of encryption/decryption mechanisms to enhance data security. Indian Journal of Science and Technology, vol. 9(20), pp.1-10 (2016)
|
40 |
Jamel, S. H. and Deris, M. M.: Diffusive primitives in the design of modern cryptographic algorithms. In proceedings of the International Conference on Computer and Communication Engineering (ICCCE08): Global Links for Human Development, pp. 707-710 (2008)
|
41 |
Ebrahim, M., Khan, S., and bin Khalid U.: Symmetric algorithm survey: A comparative analysis. International Journal of Computer Applications, vol. 61(20), pp. 12-19, (2013)
|
42 |
Disina, A. H., Pindar, Z. A., and Jamel, S.: Enhanced Caeser cipher to exclude repetition and withstand frequency cryptanalysis. Journal of Network and Information Security, (2015)
|
43 |
Mushtaq, M. F., Akram, U., Khan, I., Khan, S. N., Shahzad, A., and Ullah, A.: Cloud computing environment and security challenges: A review. International Journal of Advanced Computer Science and Applications, vol. 8(10), pp. 183-195 (2017)
|