<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1794-9165</journal-id>
<journal-title><![CDATA[Ingeniería y Ciencia]]></journal-title>
<abbrev-journal-title><![CDATA[ing.cienc.]]></abbrev-journal-title>
<issn>1794-9165</issn>
<publisher>
<publisher-name><![CDATA[Escuela de Ciencias y Humanidades y Escuela de Ingeniería de la Universidad EAFIT]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1794-91652019000100103</article-id>
<article-id pub-id-type="doi">10.17230/ingciencia.15.29.4</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Enhanced RC5 Algorithm Using Parallel Computing for Communication Networks]]></article-title>
<article-title xml:lang="es"><![CDATA[Algoritmo RC5 mejorado usando computación paralela para redes de comunicaciones]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cevallos Salas]]></surname>
<given-names><![CDATA[David Fabián]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Tecnológica Equinoccial  ]]></institution>
<addr-line><![CDATA[Quito ]]></addr-line>
<country>Ecuador</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2019</year>
</pub-date>
<volume>15</volume>
<numero>29</numero>
<fpage>103</fpage>
<lpage>125</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1794-91652019000100103&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1794-91652019000100103&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1794-91652019000100103&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length. Indeed, increasing the number of bits that conforms the key used by a symmetric cryptography algorithm will increase its security level with a cost on its performance. Expanding a key in symmetric cryptography is not an easy task due to algorithms are designed to work with keys of a fixed maximum length. This paper presents an alternative design of the RC5 cryptography algorithm with an enhanced security level achieved through a key expansion mechanism with Parallel Computing processing. Although the design was created for the RC5 algorithm the main idea might be applied to other block cipher algorithms applying the same criteria. This methodology makes feasible to obtain a robust symmetric key algorithm implemented in software with an acceptable performance in comparison with other techniques such as implementations in hardware, reduction in the amount of data, improvements in the key exchange process, advanced high performance computing, and many others techniques.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Una de las principales desventajas de los algoritmos de clave simétrica en comparación con los asimétricos es su menor nivel de seguridad debido a su longitud de clave más corta. Ciertamente, aumentar el número de bits que conforman la clave utilizada por un algoritmo de criptografía simétrica aumentará su nivel de seguridad con un costo en su rendimiento. Extender una clave en criptografía simétrica no es una tarea fácil ya que los algoritmos están diseñados para trabajar con claves de una longitud máxima fija. Este artículo presenta un diseño alternativo del algoritmo de criptografía RC5 con un nivel de seguridad mejorado que se logra a través de un mecanismo de expansión de clave con procesamiento de Computación Paralela. Aunque el diseño fue creado para el algoritmo RC5 la idea principal podría ser aplicada a otros algoritmos de cifrado en bloque aplicando el mismo criterio. Esta metodología hace factible obtener un algoritmo de clave simétrica robusto implementado sobre software con un rendimiento aceptable en comparación con otras técnicas como implementaciones sobre hardware, reducción en la cantidad de datos, mejoras en el proceso de intercambio de clave, computación avanzada de alto rendimiento, entre otras.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cryptography]]></kwd>
<kwd lng="en"><![CDATA[symmetric key]]></kwd>
<kwd lng="en"><![CDATA[RC5]]></kwd>
<kwd lng="en"><![CDATA[algorithm]]></kwd>
<kwd lng="en"><![CDATA[performance]]></kwd>
<kwd lng="es"><![CDATA[Criptografía]]></kwd>
<kwd lng="es"><![CDATA[clave simétrica]]></kwd>
<kwd lng="es"><![CDATA[RC5]]></kwd>
<kwd lng="es"><![CDATA[algoritmo]]></kwd>
<kwd lng="es"><![CDATA[rendimiento]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>[1]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Alam]]></surname>
<given-names><![CDATA[K. M. R]]></given-names>
</name>
<name>
<surname><![CDATA[Rahman]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Tamura]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets]]></source>
<year></year>
<conf-name><![CDATA[ Proceedings of 2015 International Conference on Networking Systems and Security, NSysS 2015]]></conf-name>
<conf-date>2015</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B2">
<label>[2]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coron]]></surname>
<given-names><![CDATA[J. S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[What is cryptography?]]></article-title>
<source><![CDATA[IEEE Security and Privacy]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B3">
<label>[3]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chandra]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Paira]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Alam]]></surname>
<given-names><![CDATA[S. S]]></given-names>
</name>
<name>
<surname><![CDATA[Sanyal]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[A comparative survey of symmetric and asymmetric key cryptography]]></source>
<year></year>
<conf-name><![CDATA[ 2014 International Conference on Electronics, Communication and Computational Engineering, ICECCE 2014]]></conf-name>
<conf-date>2014</conf-date>
<conf-loc> </conf-loc>
<page-range>83-93</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>[4]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gaithuru]]></surname>
<given-names><![CDATA[J. N]]></given-names>
</name>
<name>
<surname><![CDATA[Bakhtiari]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Salleh]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Muteb]]></surname>
<given-names><![CDATA[A. M]]></given-names>
</name>
</person-group>
<source><![CDATA[A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap]]></source>
<year></year>
<conf-name><![CDATA[ 2015 9th Malaysian Software Engineering Conference, MySEC 2015]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>236-44</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>[5]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mirtalebi]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Babamir]]></surname>
<given-names><![CDATA[S. M]]></given-names>
</name>
</person-group>
<source><![CDATA[A cryptography approach on security layer of web service]]></source>
<year></year>
<conf-name><![CDATA[ Application of Information and Communication Technologies, AICT 2016 - Conference Proceedings]]></conf-name>
<conf-date>2017</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B6">
<label>[6]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vyakaranal]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Kengond]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Performance Analysis of Symmetric Key Cryptographic Algorithms]]></source>
<year></year>
<conf-name><![CDATA[ 2018 International Conference on Communication and Signal Processing (ICCSP)]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>411-5</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>[7]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mandal]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Chandra]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Alam]]></surname>
<given-names><![CDATA[S. S]]></given-names>
</name>
<name>
<surname><![CDATA[Patra]]></surname>
<given-names><![CDATA[S. S]]></given-names>
</name>
</person-group>
<source><![CDATA[A comparative and analytical study on symmetric key cryptography]]></source>
<year></year>
<conf-name><![CDATA[ 2014 International Conference on Electronics, Communication and Computational Engineering, ICECCE 2014]]></conf-name>
<conf-date>2014</conf-date>
<conf-loc> </conf-loc>
<page-range>131-6</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>[8]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peyravian]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Coppersmith]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Structured symmetric-key block cipher]]></article-title>
<source><![CDATA[Computers and Security]]></source>
<year>1999</year>
<volume>18</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>134-47</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>[9]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bajaj]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Thakur]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Enhancement of RC5 for image encryption]]></source>
<year></year>
<volume>2</volume>
<numero>Iciip</numero>
<conf-name><![CDATA[ ICIIP 2011 - Proceedings: 2011 International Conference on Image Information Processing]]></conf-name>
<conf-date>2011</conf-date>
<conf-loc> </conf-loc>
<issue>Iciip</issue>
<page-range>7-11</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>[10]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Changda]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Shiguang]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multilevel security model for ad hoc networks]]></article-title>
<source><![CDATA[Journal of Systems Engineering and Electronics]]></source>
<year>2008</year>
<volume>19</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>391-7</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>[11]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nie]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Performance evaluation for CAST and RC5 encryption algorithms]]></source>
<year></year>
<volume>1</volume>
<conf-name><![CDATA[ 2010 International Conference on Computing, Control and Industrial Engineering, CCIE 2010]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc> </conf-loc>
<page-range>106-9</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>[12]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elkeelany]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Nimmagadda]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Performance Evaluation of Differente Hardware Models of RC5 Algorithm]]></source>
<year></year>
<conf-name><![CDATA[ ICIIP 2011 - Proceedings: 2011 International Conference on Image Information Processing]]></conf-name>
<conf-date>2007</conf-date>
<conf-loc> </conf-loc>
<page-range>142-5</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>[13]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kamil]]></surname>
<given-names><![CDATA[I. A]]></given-names>
</name>
<name>
<surname><![CDATA[Ogundoyin]]></surname>
<given-names><![CDATA[S. O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks]]></article-title>
<source><![CDATA[Journal of Information Security and Applications]]></source>
<year>2019</year>
<volume>44</volume>
<page-range>184-200</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>[14]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silva]]></surname>
<given-names><![CDATA[N. B]]></given-names>
</name>
<name>
<surname><![CDATA[Pigatto]]></surname>
<given-names><![CDATA[D. F]]></given-names>
</name>
<name>
<surname><![CDATA[Martins]]></surname>
<given-names><![CDATA[P. S]]></given-names>
</name>
<name>
<surname><![CDATA[Branco]]></surname>
<given-names><![CDATA[K. R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general purpose computer]]></article-title>
<source><![CDATA[Journal of Network and Computer Applications]]></source>
<year>2016</year>
<volume>60</volume>
<page-range>130-43</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>[15]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[O&#8217;Melia]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Elbirt]]></surname>
<given-names><![CDATA[A. J]]></given-names>
</name>
</person-group>
<source><![CDATA[Instruction set extensions for enhancing the performance of symmetric-key Cryptography]]></source>
<year></year>
<conf-name><![CDATA[ Proceedings - Annual Computer Security Applications Conference, ACSAC]]></conf-name>
<conf-date>2008</conf-date>
<conf-loc> </conf-loc>
<page-range>465-74</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>[16]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mozaffari-Kermani]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Reyhani-Masoleh]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efficient and highperformance parallel hardware architectures for the AES-GCM]]></article-title>
<source><![CDATA[IEEE Transactions on Computers]]></source>
<year>2012</year>
<volume>61</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1165-78</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>[17]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hua]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Jianzhou]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Jing]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA[An efficient and reconfigurable architecture for RC5]]></source>
<year></year>
<volume>2005</volume>
<conf-name><![CDATA[ Canadian Conference on Electrical and Computer Engineering]]></conf-name>
<conf-date>2005</conf-date>
<conf-loc> </conf-loc>
<page-range>1652-5</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>[18]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elbirt]]></surname>
<given-names><![CDATA[A. J]]></given-names>
</name>
<name>
<surname><![CDATA[Paar]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An instruction-level distributed processor for symmetric-key cryptography]]></article-title>
<source><![CDATA[IEEE Transactions on Parallel and Distributed Systems]]></source>
<year>2005</year>
<volume>16</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>468-80</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>[19]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yifeng]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Yong]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Heyu]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[School]]></surname>
<given-names><![CDATA[L. T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Symmetric Key Exchange Protocol Bsaed on Virtual S-Box]]></article-title>
<source><![CDATA[China Communications]]></source>
<year>2014</year>
<volume>11</volume>
<numero>14</numero>
<issue>14</issue>
<page-range>5522</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>[20]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[R. S]]></given-names>
</name>
<name>
<surname><![CDATA[Pradeep]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Naveen]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Gunasekaran]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Enhanced cost effective symmetric key algorithm for small amount of data]]></source>
<year></year>
<conf-name><![CDATA[ 2010 International Conference on Signal Acquisition and Processing, ICSAP 2010]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc> </conf-loc>
<page-range>354-7</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>[21]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Teerakanok]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Kamolphiwong]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Accelerating asymmetric-key cryptography using Parallel-key Cryptographic Algorithm (PCA)]]></source>
<year></year>
<conf-name><![CDATA[ 2009 6th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology]]></conf-name>
<conf-date>2009</conf-date>
<conf-loc> </conf-loc>
<page-range>812-5</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>[22]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Negre]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Robert]]></surname>
<given-names><![CDATA[J. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New parallel approaches for scalar multiplication in elliptic curve over fields of small characteristic]]></article-title>
<source><![CDATA[IEEE Transactions on Computers]]></source>
<year>2015</year>
<volume>64</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>2875-90</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>[23]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bilski]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Winiecki]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multi-core implementation of the symmetric cryptography algorithms in the measurement system]]></article-title>
<source><![CDATA[Measurement: Journal of the International Measurement Confederation]]></source>
<year>2010</year>
<volume>43</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1049-60</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>[24]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amerimehr]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Dehkordi]]></surname>
<given-names><![CDATA[M. H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Quantum Symmetric Cryptosystem Based on Algebraic Codes]]></article-title>
<source><![CDATA[IEEE Communications Letters]]></source>
<year>2018</year>
<volume>22</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1746-9</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>[25]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aumasson]]></surname>
<given-names><![CDATA[J. P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The impact of quantum computing on cryptography]]></article-title>
<source><![CDATA[Computer Fraud and Security]]></source>
<year>2017</year>
<numero>6</numero>
<issue>6</issue>
<page-range>8-11</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>[26]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kholidy]]></surname>
<given-names><![CDATA[H. A]]></given-names>
</name>
<name>
<surname><![CDATA[Azab]]></surname>
<given-names><![CDATA[A. A]]></given-names>
</name>
<name>
<surname><![CDATA[Deif]]></surname>
<given-names><![CDATA[S. H]]></given-names>
</name>
</person-group>
<source><![CDATA[Enhanced "ULTRA GRIDSEC": Enhancing high performance symmetric key cryptography schema using pure peer to peer computational grid middleware (HIMAN)]]></source>
<year></year>
<volume>1</volume>
<conf-name><![CDATA[ 2008 3rd International Conference on Pervasive Computing and Applications, ICPCA08]]></conf-name>
<conf-date>2008</conf-date>
<conf-loc> </conf-loc>
<page-range>26-31</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>[27]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liang]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Q]]></given-names>
</name>
<name>
<surname><![CDATA[Qi]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<source><![CDATA[An area optimized implementation of cryptographic algorithm RC5]]></source>
<year></year>
<conf-name><![CDATA[ 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing]]></conf-name>
<conf-date>2009</conf-date>
<conf-loc> </conf-loc>
<page-range>4-7</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>[28]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Villanueva]]></surname>
<given-names><![CDATA[E. B]]></given-names>
</name>
<name>
<surname><![CDATA[Medina]]></surname>
<given-names><![CDATA[R. P]]></given-names>
</name>
<name>
<surname><![CDATA[Gerardo]]></surname>
<given-names><![CDATA[B. D]]></given-names>
</name>
</person-group>
<source><![CDATA[An enhanced RC5 (ERC5) algorithm based on simple random number key expansion technique]]></source>
<year></year>
<volume>5</volume>
<conf-name><![CDATA[ ISCAIE 2018 - 2018 IEEE Symposium on Computer Applications and Industrial Electronics]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>134-8</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>[29]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sharafi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Fotouhi-Ghazvini]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Shirali]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Ghassemian]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A low power cryptography solution based on chaos theory in wireless sensor nodes,]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<numero>c</numero>
<issue>c</issue>
<page-range>8737-53</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
