1. Adki VM, Hatkar SS (2016) A survey on cryptography techniques. Int J Adv Res Comput Sci Softw Eng 6(6):469–475
2. Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (h)ibe in the standard model. In: Gilbert H (ed) Advances in cryptology (EUROCRYPT’10), vol 6110. Springer, Berlin, pp 553–572
3. Aishwarya S, Dhivya KDR (2015) Online payment fraud prevention using cryptographic algorithm TDES. Int J Comput Sci Mob Comput 4(4):317–323
4. Alanazi HO, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani Y (2010) New comparative study between DES, 3DES and AES within nine factors. J Comput 2(3):152–157
5. Berad G, Jaggi A, Jagadales V (2016) Review on implementation of AES algorithm for device based encryption. Int J Adv Comput Eng Netw 4(2):75–78