“…Performance analysis of encryption algorithms for security [1], A Comparative and Analytical Study on Symmetric [2], Dessign of new security algorithm [3], Comparative Analysis of NPN Algorithm & DES [4], Proposed Symmetric Key Cryptography Algorithm [5], Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms [6], Performance Evaluation of Cryptographic Algorithms: DES and AES [7], DES and AES Performance Evaluation [8], Differential fault analysis against AES-192 and AES-256 with minimal faults [9] ,Implementing the IDEA Cryptographic Algorithm in Virtex-E and Virtex-II FPGAs [10], User Defined Encryption Procedure for IDEA Algorithm [11], Performance evaluation for CAST and RC5 encryption algorithms [12], Selection of parameter 'r' in RC5 algorithm on the basis of prime number [13] , Design and implementation of algorithm for des cryptanalysis [14], A-RSA: Augmented RSA [15], High speed implementation of RSA algorithm with modified keys exchange [16].…”