[[1] ANTAL, E.: Modern Cryptanalysis of Classical Ciphers. PhD. Thesis, STU in Bratislave, 2017. (In Slovak)]Search in Google Scholar
[[2] ANTAL, E.—ELIÁŠ, M.: Evolutionary Computation in cryptanalysis of classical ciphers, Tatra Mt. Math. Publ. 70 (2017), 179–197.10.1515/tmmp-2017-0026]Search in Google Scholar
[[3] ANTAL, E.—GROŠEK, O.—HORAK, P.: On a mnemonic construction of permutations, J. Math Cryptology. 11 (2017), no. 1, 45–53.10.1515/jmc-2016-0058]Search in Google Scholar
[[4] BANKS, M. J.: A Search-Based Tool for the Automated Cryptanalysis of Classical Ciphers. The University of York, Department of Computer Science, May, 2008.]Search in Google Scholar
[[5] CLARK, A. J.: Optimisation Heuristics for Cryptology. PhD. Thesis, Queensland University of Technology, 1998.]Search in Google Scholar
[[6] GIDDY, J. P.—SAFAVI-NAINI, R.: Automated cryptanalysis of transposition ciphers, The Comput. Journal 37 (1994) no. 5, 429–436.10.1093/comjnl/37.5.429]Search in Google Scholar
[[7] FORSYTH, W. S.—SAFAVI-NAINI, R.: Automated cryptanalysis of substitution ciphers, Cryptologia, 17 (1993), n. 4, 407–418.10.1080/0161-119391868033]Open DOISearch in Google Scholar
[[8] JAKOBSEN, T.: A fast method for the cryptanalysis of substitution ciphers, Cryptologia, 19 (1995), n. 3, pp. 265–274.10.1080/0161-119591883944]Search in Google Scholar
[[9] KULLBACK, S.: (Statistical Methods in Cryptanalysis). Aegean Park Press, Laguna Hills, California, 1976.]Search in Google Scholar
[[10] KVASNIČKA, V.—POSPÍCHAL, J.—TIŇO, P.: Evolučné algoritmy.Vydavateľstvo STU, Bratislava, 2000.]Search in Google Scholar
[[11] LASRY, G.: A Methodology of Cryptanalysis of Classical Ciphers with Search meta-heuristics. PhD. Thesis, Kassel University, 2017.]Search in Google Scholar
[[12] MATTHEWS, R. A. J.: The Use of Genetic Algorithms in Cryptanalysis, Cryptologia, 17 (1993), n. 2, 187–201.10.1080/0161-119391867863]Open DOISearch in Google Scholar
[[13] ÓLAFSSON, S.: Metaheuristics. In: Handbooks in Operations Research and Management Science Vol. 13, 2006, pp. 633–654.10.1016/S0927-0507(06)13021-2]Search in Google Scholar
[[14] GANESAN, R.—SHERMAN, A.: Statistical Techniques for Language Recognition: An Introduction and Guide for Cryptanalysts. 1993, [cit: 2016-01-30]; http://web.cecs.pdx.edu/~bart/decrypter/gs93.pdf.]Search in Google Scholar
[[15] REEVES, C. R.: Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques, Chapter: Fitness Landscapes. Boston, MA: Springer, New York, 2005, pp. 587–610.]Search in Google Scholar
[[16] RUSSELL, M. D.—CLARK, J. A.—STEPNEY, S.: Making the most of two heuristics: breaking transposition ciphers with ants, In: CEC 03, Vol. 4, 2003, pp. 2653–2658.]Search in Google Scholar
[[17] SPILLMAN, R.—JANSSEN, M.—NELSON, B.: Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers. Cryptologia, 17 (1993), no. 1, 31–44.10.1080/0161-119391867746]Search in Google Scholar
[[18] VOBBILISETTY, R.—TROIA, F. D.—LOW, R. M.—VISAGGIO, A. C.—STAMP, M.: Classic cryptanalysis using hidden Markov models, Cryptologia 41 (2017), no. 1, 1–28; http://dx.doi.org/10.1080/01611194.2015.112666010.1080/01611194.2015.1126660]Open DOISearch in Google Scholar
[[19] American National Corpus Project, http://www.anc.org/data/oanc/download/]Search in Google Scholar
[[20] STU BA klaster - IBM iDataPlex, https://www.hpc.stuba.sk]Search in Google Scholar