1. Piyush Rajan Satapathy, “Performance Measurment of AES Crypto Algorithm in Microcode Environment of IXP2400 Platform,” University of California, Riverside Projects, spring 2005.
2. Mozaffari-Kermani, Mehran Reyhani-Masoleh, Arash, “Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard,” IEEE Transactions on Computers, Vol. 59, No. 5, May, 2010.
3. Bhavesh Joshi and Anil Khandelwal,” Rivest Cipher based Data Encryption and Clustering in Wireless Communication”, International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-2, Issue-2, January-2015, pp. 17–24.
4. Farhadian, A. Aref, M.R,” Efficient Method for simplifying and approximating the S-Boxes Based on Power Functions,” Information Security IET, Vol.3 No. 3, Sept, 2009.
5. Sirwan Geramiparvar and Nasser Modiri, “Security as a Serious Challenge for E-Banking: a Review of Emmental Malware”, International Journal of Advanced Computer Research (IJACR), Volume-5, Issue-18, March-2015, pp. 62–67.