1. AbuTaha M, Farajallah M, Tahboub R (2011) A practical one way hash algorithm based on matrix multiplication. Int J Comput Appl 23(2):34–38
2. Acharya B, Panigrahy SK, Patra SK, Panda G (2010) Image encryption using advanced hill cipher algorithm. ACEEE Int J Signal Image Process 1(1):37–41
3. Ahmad J, Khan MA, Ahmed F et al (2017) A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput Appl 30:1–11
4. Barker E, Roginsky A (2011) Transitions: recommendation for transitioning the use of cryptographic algorithms and key lengths. NIST Special Publication 800-131A
5. Chakrabarti P, Bhuyan B, Chowdhuri A, Bhunia CT (2008) A novel approach towards realizing optimum data transfer and automatic variable key (AVK). Int J Comput Sci Netw Secur 8(5)