1. L. Bassham, A. Rukhin, J. Soto, J. Nechvatal, M. Smid, S. Leigh, M. Levenson, M. Vangel, N. Heckert, and D. Banks. 2010. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Special Publication (NIST SP), National Institute of Standards and Technology, (2010), 1--131.
2. On generalizing the power function exponent constructions with genetic programming
3. A Novel Approach to Generate Symmetric Key in Cryptography Using Genetic Algorithm;Chunka C.;Emerging Technologies in Data Mining and Information Security-Advances in Intelligent Systems and Computing,2018
4. J. Daemen and V. Rijmen. 2002. The Design of Rijndael AES - The Advanced Encryption Standard. Springer-Verlag - Information Security and Cryptography.
5. An Evolutionary Many-Objective Optimization Algorithm Using Reference-Point-Based Nondominated Sorting Approach, Part I: Solving Problems With Box Constraints