Return to Article Details Genetic Operators Applied to Symmetric Cryptography Download Download PDF