Author:
Nawaz Yasir,Wang Lei,Ammour Kamel
Publisher
Springer International Publishing
Reference19 articles.
1. Rogaway, P.: Evaluation of Some Blockcipher Modes of Operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan (2011)
2. Dworkin, M.: Recommendation for Block Cipher Modes of Operation. Methods and Techniques. National Institute of Standards and Technology (2001)
3. Dworkin, M.J.: Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices. National Institute of Standards and Technology (2010)
4. Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9, 289–306 (2015)
5. Agrawal, M., Mishra, P.: A comparative survey on symmetric key encryption techniques. Int. J. Comput. Sci. Eng. 4, 877 (2012)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献