Security Evaluation Methods and the used parameters for Some Cryptosystem | IEEE Conference Publication | IEEE Xplore