1. Cryptography and the optimization heuristics techniques;Saveetha;Int. J. Adv. Res. Comp. Sci. Soft. Eng.,2014
2. Automated cryptanalysis of transposition ciphers;Giddy;Comp. J.,1994
3. Attacks on the transposition ciphers using optimization heuristics;Dimovski,2003
4. Breaking transposition cipher with genetic algorithm;Toemeh;Electronics and Electrical Engineering,2007