@article{agarwal12,
	author = "Ankita Agarwal",
	title = "Secret Key Encryption Algorithm Using Genetic Algorithm",
	journal = "International Journal of Advanced Research in Computer Science and Software Engineering",
	year = "2012",
	pages = "216--218",
	volume = "2",
	number = "4",
	month = "abr."
}

@article{shannon49,
	author = "Claude Elwood Shannon",
	title = "Communication Theory of Secrecy Systems",
	journal = "Bell System Technical Journal",
	year = "1946",
	pages = "656--715",
	month = "set."
}

@article{garg09,
	author = "Poonam Garg",
	title = "A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algorithm",
	journal = "International Journal of Network Security & Its Applications",
	year = "2009",
	pages = "34--42",
	volume = "1",
	number = "1",
	month = "abr."
}

@article{srikanth10,
	author = "V. Srikanth and Udit Asati and Viswajit Natarajan and T.Pavan Kumar and Teja Mullapudi and N.Ch.S.N.Iyengar",
	title = "Bit-Level Encryption of Images using Genetic Algorithm",
	journal = "International Journal of Computing Science and Communication Technologies",
	year = "2010",
	pages = "546--550",
	volume = "3",
	number = "1",
	month = "jul."
}

@article{goyat12,
	author = "Sonia Goyat",
	title = "Cryptography Using Genetic Algorithms (GAs)",
	journal = "IOSR Journal of Computer Engineering (IOSRJCE)",
	year = "2012",
	pages = "6--8",
	volume = "1",
	number = "5",
	month = "jun."
}

@article{husainy06,
	author = "Mohammed A. F. Al-Husainy",
	title = "Image Encryption Using Genetic Algorithm",
	journal = "Information Technology Journal",
	year = "2012",
	pages = "516--519",
	volume = "5",
	number = "3"
}

@article{lozano05,
	author = "Manuel Lozano and Francisco Herrera and José Cano",
	title = "Replacement Strategies to Maintain Useful Diversity in Steady-State Genetic Algorithms",
	journal = "Soft Computing: Methodologies and Applications",
	year = "2005",
	pages = "85--96",
	volume = "32"
}

@book{terada08,
    author     = "Routo Terada",
    title      = "Segurança de dados: criptografia em redes de computador",
    publisher  = "Editora Blucher",
    address    = "São Paulo",
    edition    = "2",
    year       = "2008"
}

@book{eiben03,
     author    = "Agoston E. Eiben and J.E. Smith",
     title     = "Introduction to Evolutionary Computing",
     publisher = "Springer",
     year      = "2003",
     edition   = "1",
     series    = "Natural Computing Series",
     pages     = "293"
}

@book{mitchell99,
     author    = "Mitchell Melanie",
     title     = "An Introduction to Genetic Algorithms",
     publisher = "MIT Press",
     year      = "1999",
     edition   = "3",
     address   = "Cambridge",
     pages     = "162"
}

@book{randy04,
     author    = "Randy L. Haupt and Sue Ellen Haupt",
     title     = "Practical Genetic Algorithms",
     publisher = "John Wiley \& Sons, Inc.",
     year      = "2004",
     edition   = "2",
     address   = "New Jersey",
     pages     = "253"
}

@book{john92,
     author    = "John H. Holland",
     title     = "Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence",
     publisher = "MIT Press",
     year      = "1992",
     address   = "Cambridge, MA, USA",
     pages     = "228"
}

@conference{almarimi08,
	author    = "Abdelsalam Almarimi and Anil Kumar and Ibrahim Almerhag and Nasreddin Elzoghbi",
	title     = "A New Approach for Data Encryption Using Genetic Algorithms",
	booktitle = "The International Arab Conference on Information Technology",
	year      = "2008",
	address   = "Sudão",
	publisher = "ACIT International",
	pages     = "5"
}

@conference{nalini04,
	author = "N Nalini",
	title = "A New Encryption and Decryption Algorithm Combining the Features of Genetic Algorithm (GA) and Cryptography",
	booktitle = "International Conference on Cognitive Systems (ICCS)",
	year = "2004"
}

@conference{farshchi11,
	author = "Seyyed Mohammad Reza Farshchi and Iman Dehghan Ebrahimi",
	title = "A Novel Encryption Algorithm for Transmitting Secure Data based on Genetic Hyper Chaos Map",
	booktitle = "International Conference on Computer Communication and Management",
	year = "2011",
	volume = "5",
	publisher = "IACSIT Press",
	address = "Singapura"
}

@conference{silva13,
  author = {Bruno da Silva and Humberto Almeida and Cintia Oliveira and Daniele Oliveira},
  title = "Aplicação de Técnicas de Criptografia de Chaves Assimétricas em Documentos Gráficos",
  year = "2013",
  month = "ago.",
  booktitle = "Workshop of Undergraduate Works (WUW) in SIBGRAPI 2013 (XXVI Conference on Graphics, Patterns and Images)",
  editor = "Maria Andreia Rodrigues, David Menotti",
  address = "Arequipa, Peru",
  url = "http://www.ucsp.edu.pe/sibgrapi2013/eproceedings/"
}

@conference{gester03,
  title = "Solving substitution ciphers with genetics algorithm",
  author = "Joe Gester",
  booktitle = "Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science",
  year = "2003"
}

@conference{tragha06,
     author="Tragha, A. and Omary, F. and Mouloudi, A.",
     booktitle="Hybrid Information Technology, 2006. ICHIT '06. International Conference on",
     title="ICIGA: Improved Cryptography Inspired by Genetic Algorithms",
     year="2006",
     volume="1",
     pages="335-341",
     keywords="computational complexity;cryptography;genetic algorithms;ICIGA;cryptography;cryptosystem;genetic algorithms;symmetrical blocks ciphering system;Cryptography;Genetic algorithms;Genetic mutations;Hybrid power systems;Information processing;Information technology;Java;Random processes",
     doi="10.1109/ICHIT.2006.253509"
}

@mastersthesis{delman04,
	author = "Bethany Delman",
	title = "Genetic Algorithms in Cryptography",
	school = "Rochester Institute of Technology",
	year = "2004",
	type = "mestrado",
	address = "Rochester, New York",
	month = "jul."
}

@monography{oliveira11,
	address="Rio de Janeiro",
	author="Gláucio Alves de Oliveira and José Antônio Moreira Xex\'eo",
	pages="21",
	pagename="f.",
	school="Instituto Militar de Engenharia",
	title="A Aplicação de Algoritmos Genéticos no Reconhecimento de Padrões Criptográficos",
	type="Especialização",
	year="2011"
}

@misc{wolf_ecb,
  author = {WhiteTimberwolf},
  title = {{Encryption using the Electronic Code Block (ECB) mode}},
  howpublished = "Disponível em: <\url{http://en.wikipedia.org/wiki/File:ECB_encryption.svg}>",
  year = {2013}, 
  note = "Acesso em: 15 nov. 2013"
}

@misc{wolf_cbc,
  author = {WhiteTimberwolf},
  title = {{Encryption using the Cipher Block Chaining (CBC) mode}},
  howpublished = "Disponível em: <\url{http://en.wikipedia.org/wiki/File:CBC_encryption.svg}>",
  year = {2013}, 
  note = "Acesso em: 15 nov. 2013"
}

@misc{gedit,
  author = {Gedit},
  title = {{gedit}},
  howpublished = "Disponível em: <\url{https://wiki.gnome.org/Apps/Gedit}>",
  year = {2013}, 
  note = "Acesso em: 17 nov. 2013"
}

@misc{audacity,
  author = {Audacity},
  title = {{Audacity}},
  howpublished = "Disponível em: <\url{http://audacity.sourceforge.net/}>",
  year = {2013}, 
  note = "Acesso em: 17 nov. 2013"
}
