[1] Anaand, A., Raj, A., Koli, R., Bibu, V.: Proposed symmetric key cryptography algorithm for data security. In: International Conference on Innovation and Challenges in Cyber Security, pp. 159–162(2016) [2] Sazena, Neeetesh, Chadhari, Narendhra S.: Easy SMS: a protocol for end to end secure transmision of SMS. IEEE Trans. Info Forensics Secur. 9(7), 1157–1168(2014) [3] Wael, A., Hassene, S.: A new SMS encryption algorithm based on hyperchaotic system. In: 2nd International Conference on Advanced Technology (2016). https://doi.org/10.1109/ATSIP.2016.7523059 [4] Faahrianto, F., Maasruroh, S.U., Ando, N.Z.: Encrypted SMS application on Android with combination of caesar cipher and Vigenere algorithm. In: 2014 International Conference on IEEE Cyber and IT Service Management (CITSM), pp. 31–33(2014) [5] Ahamed, B.B., Murugan, K.: International Conference on Intelligent Computing & Optimization, pp. 559–568. Springer, Cham (2019) [6] Mandal, S.K., Deepti, A.R.: A cryptosystem based on Vigenere cipher by using multilevel encryption scheme. Int. J. Comput. Sci. Inf. Technol. 7, 2096–2099(2016) [7] Bonfate, G., Halow, M.: Asymmetric Mach–Zehnder germano-silicate channel waveguide interferometers for quantum cryptography systems. Electron. Lett. 37(13), 846–847(2001) [8] Vasant, P., Zelinka, I., Weber, G.-W.: Intelligent computing and optimization. In: Proceedings of the 2nd International Conference on Intelligent Computing and Optimization 2019. Springer (2019). https://doi.org/10.1007/978-3-030-33585-4 [9] Ganesan, T., Vasant, P., Sanghvi, P., Thomas, J., Litvinchev, I.: Random matrix generators for optimizing a fuzzy biofuel supply chain system. J. Adv. Eng. Comput. 4(1), 33–50(2020) [10] Plos, Thomaas, Huter, Michaael: Security-enabled near-field communication tag with flexible architecture supporting asymmetric cryptography. IEEE Trans. Very Large Scale Integr. Syst. 21(11), 1965–1974(2013) [11] Reddy, A.G., Das, A.K., Yoon, E.-J., Yoo, K.-Y.: A secure anonymous authentication protocol for mobile services on elliptic curve cryptography. IEEE Access 4, 4394–4407(2016) [12] Braveglieri, Luca, Korren, Israel, Maistri, Polo: An operation-centered approach to fault detection in symmetric cryptography ciphers. IEEE Trans. Comput. 56(5), 635–649(2007) [13] Kauor, A., Shingh, S.: A hybrid technique of cryptography and watermarking for data encryption and decryption. In: Parallel, Distributed and Grid Computing (PDGC), Fourth International Conference, pp. 351–356(2016) [14] Ahamad, S,. Alaam, K.M.R., Raahman, H., Taamura, S.: A comparision between symmetric and asymmetric key Encryption algorithm based decryption mix nets. In: International Conference on Networking, Systems and Security (NSysS), pp. 1–5(2015) [15] Mushtaaque, M.A., Dhimaan, H.: Implementation of new encryption algorithm with random key selection and minimum space complexity. In: International Conference On Advances in Computer Engineering and Application (ICACEA), pp. 507–511(2015) [16] Chaandra, S., Paaira, S., Alaam, S.S., Saanyal, G.: A comparative survey of symmetric and Asymmetric key cryptography. In: International Conference on Electrical, Communication and Computer, pp. 83–93(2014) [17] Omran, S.S., Al-Khalid, A.S., Al-Saady, D.M.: A cryptanalytic attack on Vigenre cipher using genetic algorithm. In: 2011 IEEE Conference on Open Systems (ICOS), pp. 59–64(2011) [18] Lu, T., Yao, P., Zhao, L., Li, Y., Xie, F., Xia, Y.: An analysis of attacks against anonymous communication networks. In: 7th International Conference on Security Technology (SecTech), pp. 38–40(2014) [19] Delgoshaa, F., Feki, F.: Public-key cryptography using paraunitary matrices. IEEE Trans. Signal Process. 54(9), 3489–3504(2016) [20] Gerhaana, Y.A., Insaanudin, E., Syaarifudin, U., Zulmie, M.R.: Design of digital image application using Vigenere cipher algorithm. In: International Conference on IEEE Cyber and IT Service Management, pp. 1–5(2016) [21] Raavikant, D.: Performance evaluation of loss packet percentage for asymmetric key cryptography in VANET. In: IEEE Conference, vol. 7(2019). https://doi.org/10.1109/PDGC.2018.8745798 [22] Naacira, G.Z., Abdelaaziz, A.: The θ-Vigenere cipher extended to numerical data. In: Proceedings International Conference on IEEE Information and Communication Technologies: from Theory to Applications, pp. 413–414(2004) [23] O’Malia, S., Elbert, A.J.: Enhancing the performance of symmetric-key cryptography via instruction set extensions. IEEE Trans. Very Large Scale Integr. Syst. 8(11), 1505–1518(2009) [24] Imraan, M., Rasheed, M., Jaafri, A.R., Najaam-ul-Islam, M.: ACryp-proc: flexible asymmetric crypto processor for point multiplication. IEEE Access 6, 22778–22793(2018) |