1. S. Sharma, J. Bisht, “Performance Analysis of Data Encryption Algorithms,” IJSROSET, vol. 3, no. 1, pp. 1-5, Feb 2015.
2. Jacobs School of Engineering. (2014,January,10). Computer Science and Engineering. [Online]. Available :https://cseweb.ucsd.edu/~mihir/cse207/w-asym.pdf
3. Cryptocat. (2016,Feb,16). Cryptocat. [Online]. Available: https://crypto.cat/
4. True private Messaging . (2016, March, 20). [Online], Available : http://www.whoishostingthis.com/blog/2015/04/29/im-encryption/
5. Security-in-a-Box . (2016, March, 25). [Online], Available : https://securityinabox.org/en/guide/textsecure/android