1. R. Tripathi, S. Agrawal, Comparative study of symmetric and asymmetric cryptography techniques. Int. J. Adv. Found. Res. Comput. 1(6), 68–76 (2014)
2. V.R. Pancholi, B.P. Patel, Cryptography: comparative studies of different symmetric algorithms. Int. J. Technol. Sci. VI(I), 4–7 (2015)
3. D.S. Gordon et al., Complete fairness in secure two-party computation, in Proceedings of the Fourtieth Annual ACM Symposium on Theory of Computing—STOC 08 (2008), p. 413
4. G.B. Agnew et al., An implementation for a fast public-key cryptosystem. J. Cryptol. 3(2), 63–79 (1991)
5. J. Warjri, KED—a symmetric key algorithm for secured information exchange using modulo 69. Int. J. Comput. Netw. Inf. Secur. 10(August), 37–43 (2013)