Author:
Jain Ashish,Sharma Prakash C.,Gupta Nirmal K.,Vishwakarma Santosh K.
Reference50 articles.
1. Goldreich O (2010) P, NP, and NP-completeness: the basics of computational complexity. Cambridge University Press, pp 1–183
2. Du KL, Swamy MNS (2016) Search and optimization by metaheuristics: techniques and algorithms inspired by nature, Birkhäuser, pp 1–434
3. Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC press, pp 1–780
4. Stinson DR (2005) Cryptography: theory and practice. CRC press, pp 1–593
5. Castro JCH, Viñuela PI (2005) Evolutionary computation in computer security and cryptography. N Gener Comput 23(3):193–199