1. Carlisle Adams . 2011. Salt . In Encyclopedia of Cryptography and Security, Henk C. A . van Tilborgand Sushil Jajodia (Eds.). Springer US , Boston, MA , 1075–1075. https://doi.org/10.1007/978-1-4419-5906-5_94 10.1007/978-1-4419-5906-5_94 Carlisle Adams. 2011. Salt. In Encyclopedia of Cryptography and Security, Henk C. A. van Tilborgand Sushil Jajodia (Eds.). Springer US, Boston, MA, 1075–1075. https://doi.org/10.1007/978-1-4419-5906-5_94
2. A Dual Layer Secure Data Encryption and Hiding Scheme for Color Images Using the Three-Dimensional Chaotic Map and Lah Transformation
3. Covert and Deniable Communications
4. Anonymous. 2016. resume - shawn morse.JS. https://github.com/geeksonsecurity/js-malicious-dataset/blob/master/js-droppers/Resume_-_Shawn_Morse.js Anonymous. 2016. resume - shawn morse.JS. https://github.com/geeksonsecurity/js-malicious-dataset/blob/master/js-droppers/Resume_-_Shawn_Morse.js
5. Jean-Philippe Aumasson Samuel Neves Zooko Wilcox-O’Hearn and Christian Winnerlein. 2012. BLAKE2 - Fast secure hashing. https://www.blake2.net/ Jean-Philippe Aumasson Samuel Neves Zooko Wilcox-O’Hearn and Christian Winnerlein. 2012. BLAKE2 - Fast secure hashing. https://www.blake2.net/