1. Mirsaid, A., Gulom, T.: The encryption algorithm AES-RFWKIDEA32-1 based on network RFWKIDEA32-1. International Journal of Electronics and Information Engineering, 4(1), 1–11 (2016)
2. Mirsaid, A., Gulom, T.: The encryption algorithm AES-RFWKPES32-4. International Journal of Electronics and Information Engineering. 5(1), 20–29 (2016)
3. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory, IT-22, 644–654 (1976)
4. Zhu, H., Zhang, Y., Zhang Y., Li, H.: A novel and provable authenticated key agreement protocol with privacy protection based on chaotic maps towards mobile network. International Journal of Network Security, 18(1), 116–123 (2016)
5. Zhu, H., Zhang, Y.: An improved two-party password-authenticated key agreement protocol with privacy y. protection based on chaotic maps. International Journal of Network Security, 19(4), 487–497 (2017)