References
- Cohen, F (1990). A short history of cryptography. Retrieved May 4, 2009, from http://www New World Encyclopedia (2007).
- D. Kahn. The Codebreakers: The Story of Secret Writing, Macmillan, New York (1967).
- Homer, Iliad 6.213, transl. Ian Johnston (in English), Malaspina University-College, Nanaimo, BC, Canada (2000).
- Charles Anthon, The first six books of Homer’s Iliad with English notes, critical & explanatory, a metrical index, & Homeric glossary, Harper & Brothers, New York, p. 396 (1875).
- C H Bennett, Theory of entanglement and entanglement-assisted communication, Bulletin of the American Physical Society56, APS, 201.
- Pankaj Dadheech, Dinesh Goyal, Sumit Srivastava & C. M. Choudhary, (2018), “An Efficient Approach for Big Data Processing Using Spatial Boolean Queries”, Journal of Statistics and Management Systems (JSMS), 21:4, 583-591. doi: 10.1080/09720510.2018.1471258
- C.H. Bennet, F. Bessette, G. Brassard, L. Salvail and J. Smolin, “Experimental quantum cryptography”, Journal of cryptology, Vol. 5, pp. 3-28, 1992.
- M. Gardner, Mathematical Games, A New Kind of Cipher That Would Take Millions of Years to Break, Sci. Am. 237, pp. 120-124 (1977). doi: 10.1038/scientificamerican0877-120
- Poonia, Ramesh C., and Manish Kalra. “Bridging approaches to reduce the gap between classical and quantum computing.” Journal of Information and Optimization Sciences 37.2 (2016): 279-283. doi: 10.1080/02522667.2015.1131024
- Poonia, R. C., & Singh, V. (2012). Performance evaluation of radio propagation model for vehicular ad hoc networks using vanetmobisim and ns-2. International Journal of Distributed and Parallel Systems (IJDPS), 3(4), 145-155. doi: 10.5121/ijdps.2012.3415
- Kalra, M., & Poonia, R. C. (2017). Design a new protocol for quantum key distribution. Journal of Information and Optimization Sciences, 38(6), 1047-1054 doi: 10.1080/02522667.2017.1374723