References
[1]. Arroyo, D., Alvarez, G., and Fernandez, V., (2009).
“Basic framework for the cryptanalysis of digital chaosth
based cryptography”. IEEE 6th International Multi-
Conference on Systems, Signals and Devices, Tunisia.
[2]. Arroyo, D., Li, C., Li, S., Alvarez, G., and Halang,
W.
(2009). “Cryptanalysis of an image encryption scheme
based on a new total shuffling algorithm”. Chaos, Solitons
& Fractals, Vol. 41, No. 5, pp. 2613-2616.
[3]. Awad, M. A., (2005). “A comparison between
Agile
and Traditional Software Development Methodologies”.
Honors Program Report for the School of Computer
Science and Software Engineering, University of Western
Australia.
[4]. Bechtsoudis, A., and Sklavos, N., (2010). “Side
channel attacks cryptanalysis against block ciphers
based on FPGA devices”. IEEE Annual Symposium on VLSI.
[5]. Beck, K., (1999). Extreme Programming Explained,
Embrace Change. Addison Wesley.
[6]. Biryukov, A., and Khovratovich, D., (2009).
“Relatedkey
cryptanalysis of the full AES-192 and AES-256”. M.
Matsui (Ed.): ASIACRYPT 2009, LNCS 5912, Springer-Verlag,
1–18.
[7]. Boehm, B., (1998). “A spiral model of software
development and enhancement”. IEEE Computer, pp.
61-72.
[8]. Czarnacka-Chrobot, B., (2010). “The economic
importance of business software systems size
management”. Fifth International Conference on
Computing in the Global Information Technology, pp. 293-
299.
[9]. Devi, V., (2013). “Traditional and agile
methods: An interpretation”. Retrieved from
https://www.scrumalliance
.org/community/articles/2013/january/traditional-andagilemethods-
an-nterpretation(Last access on 29/5/2016).
[10]. Highsmith, J. (2000). Adaptive Software
Development: A Collaborative Approach to Managing
Complex Systems. Addison Wesley.
[11]. Juric, R. (2000). “Extreme programming and
its
development practices”. Proceedings of the 22nd
International Conference, Information Technology
Interfaces, IEEE Publication, pp. 97-104.
[12]. Kahate, A. (2009). Cryptography and Network
Security. 2/E, McGraw-Hill.
[13]. Led, X., Massey, J. L., and Murphy, S., (1991).
“Markov ciphers and differential cryptanalysis”. Advances
in Cryptology - Eurocrypt'91, Lecture Notes in Computer
Science 547, Springer-Verlag.
[14]. Li, C., Zhang, D., and Chen, G. (2008).
“Cryptanalysis of an image encryption scheme based on
the Hill cipher”. Journal of Zhejiang University Science A,
Vol. 9, No. 8, pp. 1118–1123.
[15]. Luthra, J., and Pal, S. K., (2011). “Hybrid
Firefly
Algorithm using Genetic Operators for the Cryptanalysis of
a Monoalphabetic Substitution Cipher”. In Proceeding of
World Congress on information and Communication
Technologies (WICT).
[16]. Manjunath, K., Jagadeesh, J., and Yogeesh, M.,
(2013). “Achieving quality product in a long term software
product development in healthcare application using
Lean and Agile principles”. International Multi-Conference
on Automation, Computing, Communication, Control and
Compressed Sensing (iMac4s), Kottayam, IEEE publication,
pp. 26-34.
[17]. Mao, W., (2004). Modern Cryptography: Theory &
Practice. Upper Saddle River, NJ: Prentice Hall PTR.
[18]. Mokhov, S., (2010). “Cryptolysis: A framework
for
verification of optimization heuristics for the automated
cryptanalysis of classical ciphers and natural language
word segmentation”. IEEE 8th ACIS International
Conference on Software Engineering Research,
Management and Applications.
[19]. Nawrocki, J., Jasinski, M., Walter, B., and
Wojciechowski,
A., (2002). “Exreme programming modified: Embrace
requirements engineering practices”. IEEE Joint
International Conference on Requirement Engineering,
pp. 303-310.
[20]. Nyberg, K, and Knudsen, L., (1995). “Provable
security against differential cryptanalysis”. Journal of
Cryptology, Vol. 8, No. 1.
[21]. Palmer, S., and Felsing, J., (2002). A Practical
Guide
to Feature-driven Development. Upper Saddle River, NJ:
Prentice Hall PTR.
[22]. Pasalic, E., (2009). “Probabilistic versus
deterministic
algebraic cryptanalysis-A performance comparison”.
IEEE Transactions on Information Theory, Vol. 55, No. 11.
[23]. Rising, L., and Janoff, N. (2000). “The scrum
software
development process for small teams”. IEEE Software, pp.
2-8.
[24]. Royce, W., (1970). “Managing the development
of
large software systems”. Proceedings of IEEE WESCON,
Vol. 26, pp. 1-9.
[25]. Soleimany, H., Sharifi, A., Bahrak, B., and Aref,
M.,
(2009). “Cryptanalysis of 7-round AES-128”. The
7th Iranian
Community Conference.
[26]. Stallings, W. (2014). Cryptography and Network
Security: Principles and Practice. 6/E, Pearson Education,
Inc.
[27]. Stapleton, J., (1997). Dynamic Systems Development
Method-The Method in Practice. Addison Wesley.
[28]. Toemer, R. and Arumugam, S. (2007). “Breaking
transposition cipher with genetic algorithm”. Electronics
and Electrical Engineering, Vol. 7, No. 79, pp. 75-78.
[29]. Vimalathithan, R. and Valarmathi, M. L. (2009).
“Cryptanalysis of S-DES using genetic algorithm”.
International Journal of Recent Trends in Engineering, Vol.
2, No. 4, pp. 76-79.
[30]. Wenling, W., and Dengguo, F., (2009). The Design
and Analysis of Block Ciphers. 2/E, Tsinghua University
Press, Beijing.