1. Rachmawati, D., Budiman, M.A.: New approach toward data hiding by using affine cipher and least significant bit algorithm. In: 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, pp. 1–6 (2017). https://doi.org/10.1109/CAIPT.2017.8320737
2. Babu, S.A.: Modification affine ciphers algorithm for cryptography password. Int. J. Res. Sci. Eng. 3(2) (2017)
3. Chandra, S., Paira, S., Alam, Sk.S., Sanyal, G.: A comparative survey of symmetric and asymmetric cryptography. In: 2014 International Conference on Electronics, Communication and Computational Engineering (ICE CCE)
4. Nath, A., Ghosh, S., Mallick, M.A.: Symmetric key cryptography using Random key generator. In: Proceedings of the 2010 International Conference on Security and Management, SAM 2010, 12–15 July 2010, Las Vegas Nevada, USA
5. Chatterjee, D., Nath, J., Dasgupta, S., Nath, A.: A new symmetric key cryptography algorithm using extended MSA method: DJSA symmetric key algorithm. In: 2011 International Conference on Communication Systems and Network Technologies, Katra, Jammu, pp. 89–94 (2011). https://doi.org/10.1109/CSNT.2011.25