1. A review and comparative analysis of various encryption algorithms;R Bhanot;International Journal of Security and Its Applications,2015
2. Identity-based threshold decryption;J Baek;Public Key Cryptography-PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography,2004
3. Incremental cryptography: The case of hashing and signing;M Bellare;Advances in Cryptology-CRYPTO'94: 14th Annual International Cryptology Conference Santa,1994
4. A review of lightweight block ciphers;G Hatzivasilis;Journal of cryptographic Engineering,2018
5. Analysis of key-exchange protocols and their use for building secure channels;R Canetti;Advances in Cryptology-EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck,2001