[1] D Das, Je Nath, M Mukherjee, N, A Nath and D Das
“An Integrated Symmetric key Cryptography Algorithm
using Generalised modified Vernam Cipher method and
DJSA method: DJMNA symmetric key algorithm”
Published in IEEE World Congress on Information and
Communication Technologies (WICT), 11-14 Dec. 2011
Page(s):1199 – 1204.
[2] A Nadeem., “A performance comparison of data
encryption algorithms," IEEE Information and
Communication Technologies, 2006on Communication
Systems and Network Technologies (CSNT), 3-5 June
2011 Page(s):125 - 130
[3] J Nath, S Das, S Agarwal and A Nath “Advanced
Steganographic Approach for Hiding Encrypted Secret
Message in LSB, LSB+1, LSB+2 and LSB+3 Bits in
Non standard Cover Files” International Journal of
Computer Applications (0975 – 8887) Volume 14–
No.7, February 2011
[4] D Salama, Al Minaam, M. Hatem, A Kader, and M M
Hadhoud “Evaluating the Effects of Symmetric
Cryptography Algorithms on Power Consumption for
Different Data Types” International Journal of Network
Security, Vol.11, No.2, PP.78-87, Sept. 2010
[5] R. Venkateswaran Dr. V. Sundaram “Information
Security: Text Encryption and Decryption with poly
substitution method and combining the features of
Cryptography” International Journal of Computer
Applications (0975 – 8887)Volume 3 – No.7, June 2010
[6] J Sanyal, R Ray, A Nath, D Das, “A new Challenge of
hiding any encrypted secret message inside any
Text/ASCII file or in MS word file: RJDA Algorithm”
Published in IEEE International Conference on
Communication Systems and Network Technologies
(CSNT), 11-13 May 2012 Page(s):889 – 893
[7] J Nath, N Khanna, J James, A Nath , S Chakraborty and
A Chakrabarti” New Symmetric key Cryptographic
algorithm using combined bit manipulation and MSA
encryption algorithm: NJJSAA symmetric key
algorithm” Published in IEEE International Conference
[8] D Chatterjee, J Nath, S Dasgupta, A Nath “A new
Symmetric key Cryptography Algorithm using extended
MSA method: DJSA symmetric key algorithm”
Published in IEEE International Conference on
Communication Systems and Network Technologies
(CSNT), 3-5 June 2011 Page(s): 89 - 94
[9] A Kaushik, M Bamela and A Kumar “Block Encryption
Standard for Transfer of Data” Published in
International Conference on Networking and
Information Technology (ICNIT), 2010 11-12 June
2010 Page(s):381 - 385
[10] Y Wang and M Hu “Timing evaluation of the known
cryptographic algorithms “2009 Published in
International Conference on Computational Intelligence
and Security, 2009. CIS '09. 11-14 Dec. 2009
Page(s):233 - 237
[11] Md. N Islam, Md. M H Mia, M F. I. Chowdhury, M.A.
Matin “Effect of Security Increment to Symmetric Data
Encryption through AES Methodology” Published in
Ninth ACIS International Conference on Software
Engineering, Artificial Intelligence, Networking, and
Parallel/Distributed Computing, 6-8 Aug. 2008 Page(s):
291 - 294
[12] G C. Kessler, 1998, An overview of cryptography,
[online]:http://www.garykessler.net/library/crypto.html
,date accessed: 23/07/06