[1] B.Schneier, November 1995., -
[2] A.Nadeem,M. Y.Javed, 2005.ICICT 2005,in Information and Communication Technologies 84 -89
[3] V. M. V. S.Sudha,K.Brindha,L.Agilandeeswari, July 2012."Implementation of Enhanced Data Encryption Standard on MANET with less energy consumption through limited computation,",In Proceeding of International Journal of Engineering Research and Development 2 46 -52
[4] Xin Zhou, Xiaofei Tang, Research and Implementation of RSA Algorithm for Encryption and Decryption, 2011 the 6th International Forum on Strategic Technology.
[5] YANGXiao-guang, September 2004.,Analysis about ECC Algorithm and Program Realization[J] 3 13 -16
[6] B. A.Forouzan,McGraw-Hill, 2008., -
[7] C.Lanxiang,Z.Shuming,-, 2010."The comparisons between public key and symmetric key cryptography in protecting storage systems," in Computer Application and System Modeling (ICCASM, V4 -
[8] Security of AES against brute force attack,id=1279619 (Accessed: 12 October -
[9] “Floating-Point Operation, 2014.,October -
[10] “FrequencyAnalysis, 2014.,(Accessed: 8 October -