1. Provably Secure Public Key Cryptosystem Based on Chebyshev Polynomials;Yan S.;Journal of Communications,2015
2. Cryptanalysis of Kim Jiye et al.'s Two-Factor Mutual Authentication with Key Agreement in WSNs;Li J.;Journal of Communications,2016
3. High‐Throughput Area‐Efficient Processor for Cryptography
4. Optimized Key Agreement Protocol Based on Chaotic Key;Zhen P.;Journal of Communications,2014
5. A. Habeeb "Introduction to Secure Hash Algorithms " 23 April 2018. [Online]. Available: https://www.researchgate.net/publication/325581582_Introd uction_to_Secure_Hash_Algorithms. A. Habeeb "Introduction to Secure Hash Algorithms " 23 April 2018. [Online]. Available: https://www.researchgate.net/publication/325581582_Introd uction_to_Secure_Hash_Algorithms.