[2] https://mrajacse.wordpress.com/wp-content/uploads/2012/01/applied-cryptography-2nd-ed-b-schneier.pdf
[3] Abood, O. G., & Guirguis, S. K. (2018). A survey on cryptography algorithms. International Journal of Scientific and Research Publications, 8(7), 495-516.
[4] Hossain, M. A., Hossain, M. B., Uddin, M. S., & Imtiaz, S. M. (2016). Performance analysis of different cryptography algorithms. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3).
[5] Anwar, M. N. B., Hasan, M., Hasan, M. M., Loren, J. Z., & Hossain, S. T. (2019). Comparative study of cryptography algorithms and its’ applications. International Journal of Computer Networks and Communications Security, 7(5), 96-103.
[6] Walia, A. G. N. K. (2014). Cryptography Algorithms: A Review. International Journal of Engineering Development and Research, 146.