Author:
Uniyal Nitin,Dobhal Girish,Kothiyal Alok Darshan
Reference13 articles.
1. N. Kumar, P. Chaudhary, Performance evaluation of encryption/decryption mechanisms to enhance data security. Indian J. Sci. Technol. 9(20) (2016)
2. W. Diffie, M. Hellman, New Directions in cryptography. IEEE Trans. Inf. Theor. IT-22(6) (1976)
3. A. Subandi, R. Meiyanti, C. Sandy, R. Sembiring, Three-pass protocol implementation in Vigenere cipher classic cryptography algorithm with Keystream generator modification. Adv. Sci. Technol. Eng. Syst. J. 2(5), 1–5 (2017)
4. A. Disina, Z. Pindar, S. Jamel, Enhanced Caesar cipher to exclude repetition and withstand frequency cryptanalysis. J. Netw. Inf. Secur. 2, 7–13 (2015)
5. D. Elminaam, H. Kader, M. Hadhoud, Evaluating the performance of symmetric encryption algorithms. Int. J. Comput. Theor. Eng. 10(3), 343–351 (2009)