1. Saini N, Mandal S (2015) Review paper on cryptography. Int J Res (IJR) 2(5):45–49. e-ISSN: 2348-6848, p- ISSN: 2348-795X. Survey: Block cipher Methods.
https://www.researchgate.net/publication/309478984_Survey_Block_cipher_Methods
. Accessed 5 Sept 2018
2. Stinson DR (2005) Cryptography: theory and practice, 3rd edn. Chapman and Hall/CRC (Discrete Mathematics and Its Applications)
3. Kinga R, Aline A, Christian E (2012) Generation and testing or random numbers for cryptographic application. Proc Rom Acad 13(4):368–377
4. Stallings W (2012) Cryptography and network security principles and practice, 5th edn. Prentice Hall, pp 330–337. ISBN 10: 0-13-609704-9
5. ISO/IEC 29192‐3:2012 (2012). International standard for lightweight cryptographic methods, ISO/IEC.
http://www.iso.org/iso/home/store/catalogue\_tc/catalogue\_detail.htm?csnumber=56426
. Accessed 1 July 2015