Return to Article Details Analysis and assessment of various cryptographic techniques based on a variety of features Download Download PDF