1. Sharma, S.J., The Art of Cryptography: From Ancient Number System to Strange Number System. International Journal of Application or Innovation in Engineering and management (IJAIEM), ISSN, pp.23194847.
2. Wasnik, T.P., Patil, V.S., Patinge, S.A., Dave, S.R. and Sayasikamal, G.J., 2013. Cryptography as an instrument to network security||. International Journal of Application or Innovation in Engineering Management (IJAIEM), 2(3), pp.72-80.
3. Al-Vahed, A. and Sahhavi, H., 2011. An overview of modern cryptography. World Applied Programming, 1(1), pp.55-61.
4. Ritu Tripathi, and Sanjay Agrawal., (2014). Comparative Study of Symmetric and Asymmetric Cryptography Techniques International Journal of Advance Foundation and Research in Computer (IJAFRC), 1(6), pp. 68-76.
5. Alam, M.I. and Khan, M.R., 2013. Performance and efficiency analysis of different block cipher algorithms of symmetric key cryptography. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10), pp.713-720.