Author:
Jain Ashish,Gupta Nirmal K.,Vishwakarma Santosh K.,Sharma Prakash C.
Reference44 articles.
1. Goldreich, O.: In: P, NP, and NP-Completeness: The Basics of Computational Complexity. pp. 1–183. Cambridge University Press (2010)
2. Du, K.L., Swamy, M.N.S.: Search and optimization by metaheuristics: techniques and algorithms inspired by nature. Birkhäuser, pp. 1–434 (2016)
3. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: In: Handbook of Applied Cryptography, pp. 1–780. CRC Press (1996)
4. Stinson, D.R.: In: Cryptography: Theory and Practice, pp. 1–593. CRC Press (2005)
5. Castro, J.C.H., Viñuela, P.I.: Evolutionary computation in computer security and cryptography. N. Gener. Comput. 23(3), 193–199 (2005)