[1] Bhushan, A. (2012). TORDES A Symmetric key algorithm. LAP Publishers.
[2] Seth, S. and Mishra, R. (2011). Comparative Analysis Of Encryption Algorithms For Data Communication. IJCST, Vol. 2, Issue 2, June 2011, ISSN : 2229-4333(Print).
[3] Stallings, W. (2007). Cryptography and Network Security Principles and Practice. Fourth Edition, Prentice Hall.
[4] Gope, P., Ghosh, D., Chelluri, A. and Chattopadhyay, P. (2009). Multi Operator Delimiter based Data Encryption Standard (MODDES). ICCNT Conference. Chennai, India, June 27 – 29, 2009.
[5] Bhushan, A. and Dulari, P. (2012). Component of Symmetric key Algorithm TORDES with its Functionality. IJCEM International Journal of Computational Engineering & Management, Vol. 15 Issue 5, September 2012 ISSN (Online): 2230-7893
[6] Gope, P., Kaushik, A., Arora, K. and Kumar, N. (2010). X-MODDES (Extended Multi Operator Delimiter Based Data Encryption Standard, Proceedings of the 2nd International Conference on Future Networks (ICFN), China, March, 2010, pp 399-403.
[7] Ayushi, A. (2010). A Symmetric Key Cryptographic Algorithm. International Journal of Computer Application.
[8] Dhanraj, C. Nandini, N. and Tajuddin, M. (2011). An Enhanced Approach for Secret Key Algorithm based on Data Encryption Standard. International Journal of Research and Reviews in Computer Science (IJRRCS), Vol. 2, No. 4, August 2011, ISSN: 2079-2557.
[9] Khanna, N., Nath, N., James, J., Chakrabarti , A., Chakrabort, S., and Nath, A., (2011). New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm. International Conference on Communication Systems and Network Technologies.
[10] Ray, J., Sanyal, J., Das, D., Nath, A. (2012). A new Challenge of hiding any encrypted secret message inside any Text/ASCII file or in MS wordfile: RJDA Algorithm. I. J. Modern Education and Computer Science, 2012, 5, 1-9 Published Online June 2012 in MECS.