Author:
Jain Ashish,Sharma Prakash C.,Vishwakarma Santosh K.,Gupta Nirmal K.,Gandhi Vaibhav C.
Reference51 articles.
1. Goldreich, O.: P, NP, and NP-Completeness: the basics of computational complexity. Cambridge University Press, pp. 1–183 (2010)
2. Du, K.L., Swamy, M.N.S.: Search and optimization by metaheuristics: techniques and algorithms inspired by nature, birkhäuser, pp. 1–434 (2016)
3. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography, CRC press, pp. 1–780
4. Stinson D.R.: Cryptography: theory and practice, CRC press, pp. 1–593 (2005)
5. Castro, J.C.H., Viñuela, P.I.: Evolutionary computation in computer security and cryptography. New Gener. Comput. 23(3), 193–199 (2005)