1. Kakkar, A., Singh, M.L., Bansal, P.K.: Mathematical analysis and simulation of multiple keys and S-Boxes in a multinode network for secure transmission. Int. J. Comput. Math. 89(16), 123–214 (2012)
2. Anupriya, E., Agnihotri, A., Soni, S., Babelay, S.: Encryption using XOR based extended key for information security – a novel approach. Int. J. Comput. Sci. Eng. 3(1), 146–154 (2011)
3. Pratha, A.K., Kumari, R.C., Kumar, L.P.: Scheme of encryption for block ciphers and multi code generation based on secret key. Int. J. Network Secur. Appl. (IJNSA) 3(6), 141–148 (2011)
4. Schiestl, C.: Pseudozufallszahlen. Der Kryptographie Klagenfurt Press, Klagenfurt (1999)
5. Chatterjee, D., Nath, J., Dasgupta, S., Nath, A.: A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm. In: International Conference on Communication Systems and Network Technologies. IEEE (2011)