Adeshina, A.M. (2020). Evaluation of elliptic curve El-Gamal and RSA public-key cryptosystems for digital signature, Information Science, Systems and Technology4(1): 36–49.
Devidas, S., Rao Y.V., S. and Rekha, N.R. (2021). A decentralized group signature scheme for privacy protection in a blockchain, International Journal of Applied Mathematics and Computer Science31(2): 353–364, DOI: 10.34768/amcs-2021-0024.
Iavich, M., Gnatyuk, S., Jintcharadze, E., Polishchuk, Y. and Odarchenko, R. (2018). Hybrid encryption model of AES and ElGamal cryptosystems for flight control systems, IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control, Kiev, Ukraine, pp. 127–131, DOI:10.1109/MSNMC.2018.8576289.10.1109/MSNMC.2018.8576289
Jain, A. and Kapoor, V. (2015). Secure communication using RSA algorithm for network environment, International Journal of Computer Applications118(7): 6–9.10.5120/20755-3153
Kale, M.A. and Dhamdhere, S. (2018). Survey paper on different type of hashing algorithm, International Journal of Advanced Scientific Research and Engineering Trends3(2): 14–16.
Kumar, A., Jain, V. and Yadav, A. (2020). A new approach for security in cloud data storage for IoT applications using hybrid cryptography technique, International Conference on Power Electronics and IoT Applications in Renewable Energy and its Control, PARC 2020, Mathura, India, pp. 514–517, DOI: 10.1109/PARC49193.2020.236666.10.1109/PARC49193.2020.236666
Lallie, H.S., Shepherd, L.A., Nurse, J.R.C., Erola, A., Epiphaniou, G., Maple, C. and Bellekens, X. (2020). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic, arXiv 2006.11929.
Lu, S., Ali, H. and Farooq, O. (2017). Proposed approach of digital signature technology for building a web security system based on SHA-2, MRC6 and ECDSA, 2017 2nd International Conference on Information Technology and Industrial Automation (ICITIA 2017), Guangzuhou, China, pp. 254–261.
Mukti, G.W.W. and Setiawan, H. (2020). Designing and building secure electronic medical record application by applying AES-256 and RSA digital signature, IOP Conference Series: Materials Science and Engineering852(1): 12148.10.1088/1757-899X/852/1/012148
Papaioannou, M., Karageorgou, M., Mantas, G., Sucasas, V. Essop, I. Rodriguez, J. and Lymberopoulos, D. (2020). A survey on security threats and countermeasures in Internet of medical things, Transactions on Emerging Telecommunications Technologies2020: 1–15, Paper ID: e4049.10.1002/ett.4049
Patil, P. and Bansode, R. (2020). Performance evaluation of hybrid cryptography algorithm for secure sharing of text & images, International Research Journal of Engineering and Technology7(9): 3773–3778.
Pittalia, P.P. (2019). A comparative study of hash algorithms in cryptography, International Journal of Computer Science and Mobile Computing8(6): 147–152.
Rani, N.S., Juliet, A.N. and Devi, K.R. (2019). An image encryption and decryption and comparison with text—AES algorithm, International Journal of Scientific and Technology Research8(7): 668–673.
Sasi, B.S., Dixon, D. and Wilson, J. (2014). A general comparison of symmetric and asymmetric cryptosystems for WSNs and an overview of location based encryption technique for improving security, IOSR Journal of Engineering4(3): 01–04.10.9790/3021-04330104
Sharma, S. and Kapoor, V. (2017). A novel approach for improving security by digital signature and image steganography, International Journal of Computer Applications171(8): 7–11.10.5120/ijca2017915145
Shetty, V.S., Anusha, R., Dileep, K. and Hegde, P. (2020). A survey on performance analysis of block cipher algorithms, 2020 International Conference on Inventive Computation Technologies, Coimbatore, India, DOI:10.1109/ICICT48043.2020.9112491.10.1109/ICICT48043.2020.9112491
Sklavos, N. and Koufopavlou, O. (2003). On the hardware implementations of the SHA-2(256, 384, 512) hash algorithms, 2003 International Symposium on Circuits and Systems, Bangkok, Thailand, pp. 153–156.
Vanitha, M. and Mangayarkarasi, R.(2016). Comparative study of different cryptographic algorithms, International Journal of Pharmacy and Technology8(4): 26433–26438.
Zhan, W. and Ye, X. (2020). Research on dynamic identity authentication mechanism based on digital signature, Journal of Physics: Conference Series1693(1): 12009.10.1088/1742-6596/1693/1/012009
Zhou, Y., Tang, G., Yang, J., Yu, P. and Peng, C. (2021). Logic Design and Simulation of a 128-bit AES encryption accelerator based on rapid single flux quantum circuits, IEEE Transactions on Applied Superconductivity31(6):1302911, DOI: 10.1109/TASC.2021.3075604.10.1109/TASC.2021.3075604