1. Adleman L (1979) A subexponential algorithm for discrete logarithm problem with applications to cryptography. In: Proceedings of the 20th FOCS, pp. 55-60.
2. Anthony M (2003) Boolean functions and artificial neural networks. Technical report, CDAM, The London School of Economics and Political Science. CDAM Research Report LSE-CDAM-2003-01.
3. Bäck T (1996) Evolutionary Algorithms in Theory and Practice : Evolution Strategies, Evolutionary Programming, Genetic Algorithms. Oxford University Press.
4. Bagnall T, McKeown G. P, Rayward-Smith V. J (1997) The cryptanalysis of a three rotor machine using a genetic algorithm. In: Bäck T (ed) Proceedings of the 7th International Conference on Genetic Algorithms (ICGA97), San Francisco, CA, Morgan Kaufmann.
5. Barbieri A, Cagnoni S, Colavolpe G (2004) A genetic approach for generating good linear block error-correcting codes. Lecture Notes in Computer Science 3103:1301-1302.