1. Shannon, C.E.: A mathematical theory of communication, Part I, Part II. Bell Syst. Tech. J. 27, 623–656 (1948)
2. Shannon, C.E.: Communication theory of secrecy systems. Bell Lab. Tech. J. 28(4), 656–715 (1949)
3. Bhunia, C. T.: Application of AVK and selective encryption in improving performance of quantum cryptography and networks. United Nations Educational Scientific and Cultural Organization and International Atomic Energy Agency, retrieved, 10(12), p. 20010 (2006)
4. Bhunia, C.T., Mondal, G., Samaddar, S.: Theory and application of time variant key in RSA and that with selective encryption in AES. In: Proceedings of EAIT, pp. 219–221. Elsevier Publications, Calcutta CSI (2006)
5. Kumar, A., Chatterjee, K.: An efficient stream cipher using genetic algorithm. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), IEEE, pp. 2322–2326 (2016)