1. Shamir A (1984) A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. IEEE Trans Inf Theory 30(5):699–704
2. Forouzan BA (2007) Cryptography and network security. Tata McGraw-Hill, New Delhi
3. Kahate A. Cryptography and network security. McGraw Hill Education (India) Private Limited
4. Stallings W. Cryptography and network security: principles and practice. Pearson
5. Sinha SN, Palit S, Molla MA, Khanra A, Kule M (2011) A cryptanalytic attack on Knapsack cipher using Differential Evolution algorithm. IEEE Recent Adv Intell Comput Syst 2011:317–320