1. Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures byYogesh Kumar, Rajiv Munjal, and Harsh ,(IJAFRC) Volume 1, Issue 6, June 2014. ISSN 2348 - 4853
2. Comparative analysis of performance efficiency and security measures of some encryption algorithms by AL. Jeeva, Dr. V. Palanisamy, K. Kanagaram compares symmetric and asymmetric cryptography algorithms ISSN: 2248-9622
3. New Comparative Study Between DES, 3DES and AES within Nine Factors Hamdan.O. Alanazi, B.B. Zaidan, . A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. Al-Nabhani JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617
4. Comparative Study of Symmetric and Asymmetric Cryptography Techniques by Ritu Tripathi, Sanjay Agrawal compares Symmetric and Asymmetric Cryptography Techniques using throughput, key length, tunability, speed, encryption ratio and security attacks. IJCSMS International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011 ISSN (Online): 2231-5268
5. Evaluation of Blowfish Algorithm based on Avalanche Effect by Manisha Mahindrakar gives a new performance measuring metric avalanche effect. International Journal of Innovations in Engineering and Technology (IJIET) 2014