Reference
1. Hook, D., Beginning Cryptography with Java, Wrox Press, (2005) 2. Kahn, D., The codebrakers McMillan, New York, (1967) 3. Schneier, B., Description of a New VariableLength Key, 64-Bit Block Cipher (Blowfish): Springer-Verlag, andf, Fast Software Encryption, Cambridge Security Workshop Proceedings (1993). 4. Schena, M., Microarray analysis Wiley-Liss, July (2003) 5. Gehani, A., LaBean, T., Reif, J., DNA-Based Cryptography. s.l.: DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Vol. 54, and Lecture Notes in Computer Science, Springer, (2004) 6. Techateerawat, P., A Review on Quantum Cryptography Technology, International Transaction Journal of Engineering, Management & Applied Sciences & Technologies, Vol. 1, pp. 35-41, (2010) 7. Adleman, L. M., Molecular computation of solution to combinatorial problems, Science, 266, 1021-1024, (1994) 8 8. Genetics Home Reference. U.S. National Library of Medicine. [Link] (2011) 9. DNA Alphabet. VSNS BioComputing Division, [Link] de/bcd/Curric/PrwAli/[Link]#SEC TION00071000000000000000, (2011) 10. Schneier, B., Applied cryptography: protocols, algorithms, and source code in C, John Wiley & Sons Inc, (1996)
Chapter 2 9/1/2010 An Overview of Cryptography [Link]/library/[Link] 2/63