[1] J. Mason, “Introduction to Cryptography: Simple Guide for Beginners,” TheBestVPN.com, 26-Feb-2018. [Online]. Available: https://thebestvpn.com/cryptography/.
[2] K. Lee, S.-Y. Lee, C. Seo, and K. Yim, “TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network,” IEEE Access, vol. 6, pp. 12838–12847, 2018.
[3] A. R. Chowdhury, J. Mahmud, A. R. M. Kamal, and M. A. Hamid, “MAES: Modified Advanced Encryption Standard for Resource Constraint Environments,” 2018 IEEE Sensors Applications Symposium (SAS), 2018.
[4] T. F. G. Quilala, A. M. Sison, and R. P. Medina, “Modified Blowfish Scheme,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 12, no. 1, p. 38, 2018.
[5] H. K. Sahu, V. Jadhav, S. Sonavane, and R. Sharma, “Cryptanalytic Attacks on IDEA Block Cipher,” Defence Science Journal, vol. 66, no. 6, p. 582, 2016.
[6] M. A. Islam, M. A. Islam, N. Islam, and B. Shabnam, “A Modified and Secured RSA Public Key Cryptosystem Based on ‘n’ Prime Numbers,” Journal of Computer and Communications, vol. 06, no. 03, pp. 78–90, 2018.
[7] W. Dissanayake, “An Improvement of the Basic El-Gamal Public Key Cryptosystem,” International Journal of Computer Applications Technology and Research, vol. 07, no. 02, pp. 045–052, 2018.
[8] A. K. Azad and M. Y. Mollah, “EAES: Extended Advanced Encryption Standard with Extended Security,” Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 3, pp. 51–56, 2018.
[9] S. Oukili and S. Bri, “High Throughput Parallel Implementation of Blowfish Scheme,” Applied Mathematics & Information Sciences, vol. 10, no. 6, pp. 2087–2092, 2016.
[10] T. F. G. Quilala, A. M. Sison, and R. P. Medina, “Modified Blowfish Scheme,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 12, no. 1, p. 38, 2018.
[11] R. Rahim, M. Mesran, and A. P. U. Siahaan, “Data Security with International Data Encryption Scheme,” 2017.
[12] M. E. Pamukov, V. Poulkov, A. Mihovska, N. R. Prasad, and R. Prasad, “Lightweight Robust Cryptographic Combiner for Mobile Devices: Crypto Roulette,” 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2014.
[13] Tutorialspoint.com, “Advanced Encryption Standard,” www.tutorialspoint.com. [Online]. Available: https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm.
[14] I am a cybersecurity researcher with a background in cryptography and malware reverse engineering. and BSc, MSc 2014 @ MIT (AI, Deep Learning). Former Competitive Programmer., “Encryption with Blowfish,” The One-Time Pad | Commonlounge.
[Online]. Available: https://www.commonlounge.com/discussion/d95616beecc148daaa23f35178691c35.
[15] Study.com. [Online]. Available: https://study.com/academy/lesson/blowfish-encryption-strength-example.html. [Accessed: 21-Dec-2018].
[16] H. K. Sahu, V. Jadhav, S. Sonavane, and R. Sharma, “Cryptanalytic Attacks on IDEA Block Cipher,” Defence Science Journal, vol. 66, no. 6, p. 582, 2016.
[17] K. K. Chennam, L. Muddana, and R. K. Aluvalu, “Performance Analysis of Various Encryption Schemes for Usage in Multistage Encryption for Securing Data in Cloud,” 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2017.
[18] K. Shahbazi, M. Eshghi, and R. F. Mirzaee, “Design and Implementation of an ASIP-Based Cryptography Processor for AES, IDEA, and MD5,” Engineering Science and Technology, an International Journal, vol. 20, no. 4, pp. 1308–1317, 2017.
[19] Swathi S. V., II Lahari P. M., III Bindu A. Thomas,”Encryption Schemes: A Survey”, International Journal of Advanced Research in Computer Science & Technology (IJARCST 2016),Vol. 4, Issue 2 (Apr. -Jun. 2016).
[20] B. F. Vajargah and R. Asghari, “A Novel Pseudo-Random Number Generator for Cryptographic Applications,” Indian Journal of Science and Technology, vol. 9, no. 6, Apr. 2016.
[21] M. Enriquez, D. W. Garcia, and E. Arboleda, “Enhanced Hybrid Scheme of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems,” Indian Journal of Science and Technology, vol. 10, no. 27, pp. 1–14, Jan. 2017.
[22] M. Y. Rhee, Internet Security: Cryptographic Principles, Schemes and Protocols. Chichester: Wiley, 2005.
[23] F. H. Hsiao, “Chaotic Synchronization Cryptosystems Combined with RSA Encryption Scheme,” Fuzzy Sets and Systems, vol. 342, pp. 109–137, 2018.