You are on page 1of 1

Reference

1. Hook, D., Beginning Cryptography with Java, Wrox Press, (2005) 2. Kahn, D., The codebrakers McMillan, New York, (1967) 3. Schneier, B., Description of a New VariableLength Key, 64-Bit Block Cipher (Blowfish): Springer-Verlag, andf, Fast Software Encryption, Cambridge Security Workshop Proceedings (1993). 4. Schena, M., Microarray analysis Wiley-Liss, July (2003) 5. Gehani, A., LaBean, T., Reif, J., DNA-Based Cryptography. s.l.: DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 54, and Lecture Notes in Computer Science, Springer, (2004) 6. Techateerawat, P., A Review on Quantum Cryptography Technology, International Transaction Journal of Engineering, Management & Applied Sciences & Technologies, Vol. 1, pp. 35-41, (2010) 7. Adleman, L. M., Molecular computation of solution to combinatorial problems, Science, 266, 1021-1024, (1994) 8 8. Genetics Home Reference. U.S. National Library of Medicine. http://ghr.nlm.nih.gov/handbook/basics/dna. (2011) 9. DNA Alphabet. VSNS BioComputing Division, http://www.techfak.unibielefeld. de/bcd/Curric/PrwAli/node7.html#SEC TION00071000000000000000, (2011) 10. Schneier, B., Applied cryptography: protocols, algorithms, and source code in C, John Wiley & Sons Inc, (1996)

Chapter 2 9/1/2010 An Overview of Cryptography www.garykessler.net/library/crypto.html 2/63

You might also like