1. W. Stallings, Cryptography and Network Security (4th Edition). 2005.
2. R. Dougherty, C. Freiling, and K. Zeger, “Information Flow,” vol. 51, no. 8, pp. 2745–2760, 2005.
3. M. Alia and A. Samsudin, “A New Public-Key Cryptosystem Based on Mandelbrot and Julia Sets,” Asian J. Inf. Technol., vol. 6, no. 11, pp. 850–858, 2007.
4. H. C. A. van Tilborg, “Public Key Cryptography,” pp. 63–66, 2011.
5. Chahat and M. K. Patil, “Image Enhancement Using Histogram Equalization Based on Genetic Algorithm,” vol. 7, no. 8, pp. 1–6, 2013.