1. Al-Shabi MA (2019) A survey on symmetric and asymmetric cryptography algorithms in information security. Int J Sci Res Pub 9(3).
http://dx.doi.org/10.29322/IJSRP.9.03.2019.p.8779
2. Ngwe TT, Phyo SW (2015) Hybrid cryptosystem for data security. Int J Adv Electron Comput Sci 2(6)
3. Schenier on security.
https://www.schneier.com/academic/blowfish/
. Last accessed 31 Oct 2017
4. Vasundhara S (2017) The advantages of elliptic curve cryptography for security. Glob J Pure Appl Math 13(9):4995–5011. ISSN 0973-1768
5. Kamara S, Lauter K (2010) Cryptographic cloud storage. Lect Notes Comput Sci 6054:136–149