Cited By
View all- Schneier B(2015)ReferencesApplied Cryptography, Second Edition10.1002/9781119183471.refs(675-741)Online publication date: 9-Oct-2015
- Rwabutaza AYang MBourbakis N(2012)A Comparative Survey on Cryptology-Based MethodologiesInternational Journal of Information Security and Privacy10.4018/jisp.20120701016:3(1-37)Online publication date: Jul-2012
- Castro JViñuela P(2005)Evolutionary computation in computer security and cryptographyNew Generation Computing10.1007/BF0303765423:3(193-199)Online publication date: 1-Sep-2005