1. Adams, C., Heys, H., Tavares, S., & Wiener, M. (1999). An analysis of the CAST-256 cipher. Paper presented at the Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No. 99TH8411).
2. Anandakumar, S. (2015). Image Cryptography Using RSA Algorithm in Network Security. International Journal of Computer Science & Engineering Technology, 5(9), 326-330.
3. Askar, S. S., Karawia, A., & Alshamrani, A. M. (2015). Image Encryption Algorithm Based on Chaotic Economic Model. Mathematical Problems in Engineering, 2015, 1-10.
4. Babenko, L., Ishchukova, E., & Maro, E. (2013). GOST encryption algorithm and approaches to its analysis. In Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 34-61): IGI Global.
5. Brown, L., & Pieprzyk, J. (1998). Introducing the new LOKI97 block cipher. Paper presented at the First AES Candidate Conference.