1. Equivalent key attack against a public-key cryptosystem based on subset sum problem;Liu;IET Inf. Secur.,2018
2. Ttp based high-efficient multi-key exchange protocol;Tsai;IEEE Access,2016
3. Verma. V and P. Maitri, “A Secure file storage in cloud computing using hybrid cryptography algorithm”, IEEE Procee., IEEE Inter. Confe. Wireless Comm., Sig. Proces. Netwo., 2016 WiSPNET, 2016.
4. M. Ahmad, P. Sachdeva and P. Singla, “A chaotic neural network based cryptographic pseudo-random sequence design”, IEEE 4th Inte. Confe. Advan. Compu. Comm. Techno. (ACCT), pp 301–306, 2014.
5. Cryptography using neural networks;Godhavari;INDICON, Annual IEEE,2005