@incollection{, 76C2ED2233F8EF9B14C1791507F26B60 , author={{Pooja LalMundaniya} and {NaveenChoudhary} and {College of Technology And Engineering}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}152915 } @incollection{b0, , title={{On the security of Joint Signature and Hybrid Encryption}} , author={{ MYKhan } and { YPSingh }} , journal={{IEEE}} , year={2005} } @incollection{b1, , title={{New Directions in Cryptography}} , author={{ WDiffie } and { MEHellman }} , journal={{IEEE TRANSACTIONS ON INFORMATION THEORY}} 22 6 , year={1976} } @incollection{b2, , title={{Research of the Database Encryption Technique Based on Hybrid Cryptography}} , author={{ WXing-Hui } and { MXiu-Jun }} , journal={{International Symposium on Computational Intelligence and Design IEEE}} , year={2010} } @incollection{b3, , title={{A Method for Obtaining Digital Signatures and Public-Key Cryptosystems}} , author={{ RLRivest } and { AShamir } and { LAdleman }} , journal={{Communications of the ACM}} 21 2 , year={1978} } @incollection{b4, , title={{Efficient deniable authentication protocol based on generalized ElGamal signature scheme}} , author={{ ZShao }} , journal={{Computer Standards & Interfaces}} 26 , year={2004} } @incollection{b5, , title={{A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES}} , author={{ KRReddy } and { GSRaju }} , journal={{International Journal of Science and Research}} 2 2 , year={2013} , note={IJ SR)} } @incollection{b6, , title={{Study of Various Cryptographic Algorithms}} , author={{ MMalhotra } and { ASingh }} , journal={{International Journal of Scientific Engineering and Research (IJSER)}} 1 3 , year={2013} } @incollection{b7, , title={{Implementation Of Hybrid Cryptography Algorithm}} , author={{ MJain } and { A }} , journal={{International Journal Of Core Engineering & Management(IJCEM)}} 1 3 , year={2014} } @incollection{b8, , title={{Improved Security with Signcryption}} , author={{ SAJain } and { ABAbhale } and { ASJadhav }} , journal={{International Journal of Engineering Research and Applications (IJERA)}} 2 2 , year={2012} } @book{b9, , title={{ElGamal Digital Signature Scheme With a Private Key Pairs}} , author={{ ZJun } and { ZHYing } and { JWDon }} , year={2010} , publisher={IEEE} } @book{b10, , author={{ YZheng }} , title={{Digital Signcryption or How to Achieve Cost (Signature &: Encryption) << Cost (Signature) + Cost (Encryption)}} , publisher={Springer} , year={1996} } @incollection{b11, , title={{Comparison Of Cryptosystems Using A Single-Scale Statistical Measure}} , author={{ DTGonzalez } and { WKinsner }} , booktitle={{26th IEEE Canadian Conference Of Electrical And Computer Engineering (CCECE)}} , year={2013} } @book{b12, , title={{Design of ElGamal PKC for Encryption of Large Messages}} , author={{ PMohit } and { GPBiswas }} 38-3.42 , publisher={IEEE} } @incollection{b13, , title={{Design Of A New Security Protocol Using Hybrid Cryptography Algorithms}} , author={{ SSubasree } and { NKSakthivel }} , journal={{IJRRAS}} 2 2 , year={2010} } @book{b14, , title={{}} , author={{ WilliamStallings } and { Cryptography And NetworkSecurity }} , year={2011} , publisher={Prentice-Hall} , note={Fifth Edition} }