[1] | Behrouz A Forouzan, “Data Communication and Networking” Tata McGraw- Hill Publishing Company Limited, Special Indian Edition 2006. |
|
[2] | William Stallings, “Network Security Essentials,” Fourth edition. |
|
[3] | William Stallings, “Cryptography and Network security”, Fifth Edition. |
|
[4] | Harsh Bhasin and Nakul Arora, “Key Generation for Cryptography using Genetic Algorithm”. |
|
[5] | Sindhuja K and Pramela Devi S, "A Symmetric Key Encryption Technique Using Genetic Algorithm", Sindhuja K et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, ISSN: 0975-9646 Vol. 5 (1), 2014, pg 414-416. |
|
[6] | Y.V. Srinivasa Murthy, Dr. S. C. Satapathy, P. Srinivasu and A.A.S. Saranya, "Key Generation for Text Encryption in Cellular Networks using Multi-point Crossover Function", International Journal of Computer Applications (0975-8887) Volume 32-No. 9, October 2001. |
|
[7] | Bethany Delman, Genetic Algorithms in Cryptography, MS Thesis 2004. |
|
[8] | A. Tragha, F. Omary, A. Kriouile, “Genetic Algorithms Inspired Cryptography”, A.M.S.E Association for the Advancement of Modeling & Simulation Techniques in Enterprises, Series D: Computer Science and Statistics, November 2007. |
|
[9] | A Kumar, N Rajpal, Application of Genetic Algorithm in the Field of Steganography, in Journal of Information Technology, Vol. 2, No. 1, Jul-Dec. 2004, pg 12-15. |
|
[10] | Oded Goldreich, Foundations of Cryptography, Volume 1: Basic Tools, Cambridge University Press, 2001, ISBN 0-521-79172-3. |
|
[11] | A. J. Bagnall, “The Applications of Genetic Algorithms in Cryptanalysis”, School of Information Systems, University Of East Anglia, 1996. |
|
[12] | N. Koblitz, “A Course in Number Theory and Cryptography”, Springer-Verlag, New York, Inc., 1994. |
|
[13] | Harsh Bhasin, “Test Data Generation Using Artificial Life and Cellular Automata”, ACM SIGsoft Software Engineering Notes, January 2014. |
|
[14] | Harsh Bhasin, Neha Singla, “Cellular Genetic Test data Generation”: ACM Sigsoft Software Engineering Notes, September Edition, 2013. |
|
[15] | Harsh Bhasin et. al., “Cellular Automata based Test Data Generation”, ACM Sigsoft Software Engineering Notes. |
|
[16] | Dr. Albert D. Ritzhaupt, “Autocorrelation Random Number Test”, http://www.Aritzhaupt.com/resource/autocorrelation |
|
[17] | Vangie Beal, “Crytpography”, http://www.webopedia.com/TERM/C/cryptography.html |
|
[18] | Daniel Knight, “Ivory research”, http://www.ivoryresearch.com/writers/daniel-knight-ivory-research-writer/ |
|
[19] | Sania Jawaid and Adeeba Jamal, “Generating the Best Fit Key in Cryptography using Genetic Algorithm”, International Journal of Computer Applications (0975 – 8887)Volume 98 – No.20, July 2014 |
|
[20] | Aarti Soni and Suyash Agrawal, “Using Genetic Algorithm for Symmetric key”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278 – 1323 Volume 1, Issue 10, December 2012, http://ijarcet.org/wp-content/uploads/IJARCET-VOL-1-ISSUE-10-137-140.pdf |
|
[21] | A Abdali Rashed, “Using Modified Genetic Algorithm in Private Key Cryptosystems: Key Generation and Expansion”, https://www.uop.edu.jo/CSIT2006/vol2%20pdf/pg100.pdf |
|
[22] | David M. Meko, “Applied Time Series Analysis”, http://www.ltrr.arizona.edu/~dmeko/notes_3.pdf |
|