暂无分享,去创建一个
[1] Richard Bean,et al. Eavesdropping on the Biafra-Lisbon link – breaking historical ciphers from the Biafran war , 2020, Cryptologia.
[2] Eugen Antal,et al. Cryptanalysis of the Columnar Transposition Using Meta-Heuristics , 2019 .
[3] Mark Stamp,et al. SIGABA: Cryptanalysis of the Full Keyspace , 2007, Cryptologia.
[4] Richard Pekelney,et al. The ECM Mark II: Design, History, and Cryptology , 1999, Cryptologia.
[5] W. B. Cavnar,et al. N-gram-based text categorization , 1994 .
[6] 林俊彦. 用Visual Studio实践敏捷测试(一) , 2010 .
[7] Peter Rossmanith,et al. Simulated Annealing , 2008, Taschenbuch der Algorithmen.
[8] Manuel Laguna,et al. Tabu Search , 1997 .
[9] Arno Wacker,et al. Cryptanalysis of columnar transposition cipher with long keys , 2016, Cryptologia.
[10] George Lasry,et al. A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics , 2018 .