1. Raghunandan KR, Ganesh A, Surendra S, Bhavya K (2020) Key generation using generalized Pell’s equation in public key cryptography based on the prime fake modulus principle to image encryption and its security analysis. Cybern Inf Technol 20(3):86–101
2. Logunleko KB, Adeniji OD, Logunleko AM (2020) A comparative study of symmetric cryptography mechanism on DES AES and EB64 for information security. Int J Sci Res Comput Sci Eng 8(1)
3. Chinnasamy P, Padmavathi S, Swathy R, Rakesh S (2020) Efficient data security using hybrid cryptography on cloud computing. In: Inventive communication and computational technologies: proceedings of ICICCT, pp 537–547
4. Kumar S, Gaur MS, Sharma PS, Munjal D (2021) A novel approach of symmetric key cryptography. In: 2021 2nd international conference on intelligent engineering and management (ICIEM), pp 593–598
5. Verma R, Dhiman J (2022) Implementation of an improved cryptography algorithm. Int J Inf Technol Comput Sci (IJITCS) 14(2):45–53