Author:
Wadhwani Mohit,Thadani Ankita,Medhane S. P.
Reference12 articles.
1. Robling Denning, Dorothy Elizabeth. Cryptography and data security. Addison-Wesley Longman Publishing Co., Inc., 1982.
2. Davies, Donald Watts, and Wyn L. Price. Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer. John Wiley & Sons, Inc., 1989.
3. Rivest, Ronald L. “The RC5 encryption algorithm.” Fast Software Encryption. Springer Berlin Heidelberg, 1994.
4. Wheeler, David J., and Roger M. Needham. “TEA, a tiny encryption algorithm.” Fast Software Encryption. Springer Berlin Heidelberg, 1994.
5. Matthews, Robert. “On the derivation of a “chaotic” encryption algorithm.” Cryptologia 13.1 (1989): 29–42.