1. A. Kahate, Cryptography and Network Security (Tata McGraw-Hill Companies, 2008)
2. A. Eskicioglu, L. Litwin, Cryptography. IEEE Potent. 20(1) (2001).
https://doi.org/10.1109/45.913211
3. S. Chandra, S. Paira, S.K. Alam, S. Bhattacharyya, A comparative survey of symmetric and asymmetric key cryptography, in International Conference on Electronics, Communication and Computational Engineering, ICECCE 2014, pp. 83–93.
https://doi.org/10.1109/icecce.2014.7086640
4. W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)
5. P. Sehgal, N. Agarwal, S. Dutta, P.M. Durai Raj Vincent, Modification of Diffie-Hellman algorithm to provide more secure key exchange. Int. J. Eng. Technol. (IJET) 5(3), 2498–2501 (2013)