The Cryptosystems Journal Hypertext Bibliography of Classical Cryptology (Part 1 of 9)


    This bibliography was part of my (Tony Patti's) Master's Thesis (M.S. Computer & Information Sciences) entitled " An Operational, Computerized, Galois Field Cryptosystem with a Computerized, Cross-Referenced, and Annotated Bibliography of Cryptology ", which was completed in July 1981, and sponsored by Dr. Howard L. Morgan, at the Moore School of the University of Pennsylvania.

    Bibliography Sequence Number: 001
    Author1: Gardner, Martin
    Date: 1977
    Title: Mathematical Games: A New Kind of Cipher That Would Take Millions of Years to Break
    Periodical: Scientific American
    Issue & Page numbers: 237, 2 (August):120-124,140
    Keywords: RSA
    Comments: Excellent
    References: 002 025 014

    Bibliography Sequence Number: 002
    Author1: Rivest, Ronald L
    Author2: Shamir, Adi
    Author3: Adleman, Leonard M
    Date: 1977
    Title: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    Publisher: MIT Laboratory for Computer Science Document MIT/LCS/TM-82
    Length: 15 pages
    Keywords: RSA
    Comments: Excellent - The basis for the August 1977 Scientific American article
    References: 004 007 092 009 010 011 012 013 014 016 015

    Bibliography Sequence Number: 003
    Author1: Hellman, Martin E
    Date: 1979
    Title: The Mathematics of Public-Key Cryptography
    Periodical: Scientific American
    Issue & Page numbers: August 1979:146-157,198
    Keywords: RSA
    References: 025 004 005 006

    Bibliography Sequence Number: 004
    Author1: Diffie, Whitfield
    Author2: Hellman, Martin E
    Date: 76
    Title: New Directions in Cryptography
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: Vol. IT-22, No. 6 (Nov):644-654
    Keywords: PKC
    Comments: "This paper examines several new possibilities in cryptography systems
    Comments: which require no prior key channel, unforgeable digital signatures, and
    Comments: the use of complexity theory to study the security of cryptographic
    Comments: systems." (006)
    References: 101 025 027 113 100 007 105 111 106 107 108 112 109 110

    Bibliography Sequence Number: 005
    Author1: Rivest, Ronald L
    Author2: Shamir, Adi
    3:Adleman, Leonard M
    Date: 1978
    Title: A Method for Obtaining Digital Signatures and Public Key Cryptosystems
    Periodical: CACM
    Issue & Page numbers: 21, 2 (Feb):120-126,179
    Keywords: RSA
    Comments: "This paper describes a public key cryptosystem based on exponentiation
    Comments: in modular arithmetic." (006)
    References: 004 112 007 092 101 009 010 111 011 012 013 014 016 015

    Bibliography Sequence Number: 006
    Author1: Diffie, Whitfield
    Author2: Hellman, Martin E
    Date: 79
    Title: Privacy and Authentication: An Introduction to Cryptography
    Periodical: Proceedings of the IEEE
    Issue & Page numbers: 67, 3 (March 1979):397-427
    Keywords: RSA
    Comments: Excellent
    References: 533 534 535 536 537 538 436 428 539 482 540 541 655 542 543 544 049 545 546 088 072 547 205 548 549 550 029 061 159 174 070 142 551 552 553 554 555 223 111 593 419 556 372 396 112 439 442 441 654 375 557 376 558 133 050 645 656 657 559 560 561 562 563 564 373 565 566 567 568 025 182 569 570 571 572 398 516 574 027 575 380 498 576 577 399 578 579 237 487 489 119 662 117 404 377 100 004 101 103 005 154 580 168 287 581 582 107 583 324 374 385 386 108 584 391 585 586 587 588 589 590 591 112 561 027 373 113 286 592 004 101 005 383 382 142 029 205 025 419 079 223 593 072 662 399 409 417 594 595 554 596 408 336 017 583 117 324 391 543 375 372 562 557 376 040 597 598 599 600 533 534 601 602 007 154 162 388 603 604 605 428 100 441 606 654 607 608 188 546 108 107 655

    Bibliography Sequence Number: 007
    Author1: Knuth, Donald E
    Date: 1969
    Title: Seminumerical Algorithms: The Art of Computer Programming, Volume 2
    Publisher: Reading MA: Addison Wesley
    Keywords: Background
    Keywords: GF
    Keywords: RANDOM
    Comments: Esp. Exercise 4.5.2.15
    Comments: esp. pages 363-378

    Bibliography Sequence Number: 008
    Author1: National Security Agency
    Date: 19??
    Title: Careers for Engineers, Mathematicians, Computer Scientists at the National Security Agency
    Publisher: n.p
    Keywords: NSA
    Keywords: GF
    Comments: especially page 5

    Bibliography Sequence Number: 009
    Author1: Miller, Gary L
    Date: 1975
    Title: Riemann's Hypothesis and Tests for Primality
    Periodical: Proceedings of the Seventh Annual ACM Symposium on the Theory of Computing
    Issue & Page numbers: 234-239
    Comments: held in Albuquerque, New Mexico
    Comments: not yet cross-referenced
    Comments: An extended version of this paper is available as Research Report
    Comments: CS-75-27 from the Department of Computer Science, University of Waterloo,
    Comments: Ontario, Canada (Oct. 1975)
    References: 110 025

    Bibliography Sequence Number: 010
    Author1: Niven, Ivan M
    Author2: Zuckerman, Herbert S
    Date: 60
    Title: An Introduction to the Theory of Numbers
    Publisher: NY: John Wiley & Sons
    Comments: U.P. Math-Physics Library 512.81/N6491/1960
    Comments: It appears that there is also a 1972 edition.

    Bibliography Sequence Number: 011
    Author1: Pollard, J M
    Date: 1974
    Title: Theorems on factorization and primality testing
    Periodical: Proc. Camb. Phil. Soc
    Issue & Page numbers: 521-528
    Keywords: RSA

    Bibliography Sequence Number: 012
    Author1: Potter, R J
    Date: 1977
    Title: Electronic Mail
    Periodical: Science
    Issue & Page numbers: 195, 4283 (18 March 1977):1160-1164
    Keywords: RSA

    Bibliography Sequence Number: 013
    Author1: Rabin, Michael O
    Date: 1976
    Title: Probabilistic Algorithms
    Periodical: in Algorithms and Complexity: Recent Results and New Directions; J.F. Traub (ed.), New YorKeywords:
    Academic Press
    Issue & Page numbers: 21-40
    Keywords: RSA
    Comments: edited by J F Traub

    Bibliography Sequence Number: 014
    Author1: Solovay, R
    Author2: Strassen, V
    Date: 77
    Title: A Fast Monte-Carlo Test for Primality
    Periodical: SIAM Journal on Computing
    Issue & Page numbers: March 1977:84-85
    Keywords: RSA
    Comments: not yet cross-referenced
    References: 025 010 646

    Bibliography Sequence Number: 015
    Author1: National Bureau of Standards
    Date: 1975
    Title: Federal Information Processing Data Encryption: Proposed Standard
    Periodical: Federal Register
    Issue & Page numbers: 40, 149 (1 Aug 1975):32395-32414
    Keywords: RSA
    Keywords: DES
    Comments: not yet cross-referenced

    Bibliography Sequence Number: 016
    Author1: National Bureau of Standards
    Date: 1975
    Title: Encryption Algorithm for Computer Data Protection: Requests for Comments
    Periodical: Federal Register
    Issue & Page numbers: 40, 52 (17 Mar):12067-12250
    Keywords: RSA
    Keywords: DES
    Comments: pages 12134-12139 are "Request for Comments"?
    Comments: Richard W. Roberts the author?

    Bibliography Sequence Number: 017
    Author1: Hill, Lester S
    Date: 1929
    Title: Cryptography in an Algebraic Alphabet
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 36:306-312
    Keywords: GF

    Bibliography Sequence Number: 018
    Author1: Costas, John P
    Date: 1979
    Title: Cryptography in the Field, Part
    Author1: An Overview
    Periodical: BYTE
    Issue & Page numbers: March 1979:56-64
    References: 197

    Bibliography Sequence Number: 019
    Author1: Meushaw, Robert V
    Date: 1979
    Title: The Standard Data Encryption Algorithm, Part 1
    Periodical: BYTE
    Issue & Page numbers: March 1979:66-74
    Keywords: DES
    References: 198 050

    Bibliography Sequence Number: 020
    Author1: Witt, Evans
    Date: 1978
    Title: Computers Spawn a New Brand of Crime
    Periodical: The Sunday Plain Dealer
    Issue & Page numbers: 5 Feb 1978:Four-5
    Keywords: RSA
    Keywords: NSA
    Keywords: DES
    Comments: Excellent

    Bibliography Sequence Number: 021
    Author1: Rivest, Ronald L
    Date: 1980
    Title: A Description of a Single-Chip Implementation of the RSA Cipher
    Periodical: Lambda
    Issue & Page numbers: I, 3 (fourth quarter):14-18
    Keywords: RSA
    Comments: very interesting description of hardware chip for RSA algorithm
    References: 367 226 244 256 004 006 001 368 056 369 005 021

    Bibliography Sequence Number: 022
    Author1: Shamir, Ali
    Date: 1977
    Title: Factoring Numbers in O(Log n) Arithmetic Steps
    Publisher: MIT/LCS/TM-91
    Length: 13
    Keywords: PRIMES
    References: 002 011 649 650 007 257

    Bibliography Sequence Number: 023
    Author1: National Bureau of Standards
    Date: 1977
    Title: Validating the Correctness of Hardware Implementation of the NBS Data Encryption Standard, NBS Special
    Publication 500-20
    Publisher: NBS
    Keywords: DES

    Bibliography Sequence Number: 024
    Author1: Katzan, H
    Date: 1977
    Title: The Standard Data Encryption Algorithm
    Publisher: NY: Petrocelli Books
    Keywords: DES

    Bibliography Sequence Number: 025
    Author1: Kahn, David
    Date: 1967
    Title: The Codebreakers: The Story of Secret Writing
    Publisher: NY: Macmillan
    Length: 1164 pages
    Keywords: GF
    Keywords: NSA
    Keywords: Historical
    Comments: Bought 29Jan79.
    Comments: Ninth Printing 1979
    Comments: "This is the most complete history of cryptology available, containing
    Comments: within its thousand pages material sufficient to reward several careful
    Comments: readings. As a technical reference, it leaves much to be desired,
    Comments: because it is concerned more with the influence of cryptology than with
    Comments: its technical development, though much of the latter comes through.
    Comments: despite its nontechnical orientation, a lot can be learned from a
    Comments: careful study of the many details assembled. In addition, Kahn conveys
    Comments: a valuable feel for the subject, through the experience of past
    Comments: cryptologists." (006)
    Comments: Especially interesting:
    Comments: pp. 99-105 on cryptanalytic letter frequency analysis
    Comments: pp. 189-213 on telegraphy and cryptography (chapter 6)
    Comments: pp. 298-299 on radio and cryptanalysis
    Comments: pp. 374-386 on William Friedman and his writings. especially his
    Comments: Kappa Test, Kullbach's Phi and Chi Tests, and
    Comments: Kasiski's Determination.
    Comments: pp. 398-401 on One-Time Systems
    Comments: pp. 404-410 on Hill's Algebraic Multigraphic Substitutions
    Comments: pp. 410-415 on rotor principles
    Comments: pp. 522-523 on invisible inks
    Comments: pp. 672-736 on NSA
    References: 029

    Bibliography Sequence Number: 026
    Author1: Vernam, G S
    Date: 1926
    Title: Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications
    Periodical: Journal of the American Institute of Electrical Engineers
    Issue & Page numbers: 45:109-115
    Keywords: RANDOM
    References: 059

    Bibliography Sequence Number: 027
    Author1: Shannon, Claude E
    Date: 1949
    Title: Communication Theory of Secrecy Systems
    Periodical: Bell System Technical Journal
    Issue & Page numbers: 28 (October):656-715
    Keywords: Information Theory
    Keywords: Classic
    Comments: Classic and Excellent
    Comments: "The material in this paper appeared originally in a confidential
    Comments: report 'A Mathematical Theory of Cryptography' dated Sept. 1, 1945,
    Comments: which has since been declassified" (page 656)
    Comments: "This is a classic paper in which Shannon develops the information
    Comments: theoretic foundation for classical cryptanalysis, characterizes the
    Comments: systems which are unbreakable for information theoretic reasons, and
    Comments: outlines the construction of product ciphers." (006)
    References: 389 029 078 632 633 026 017 043 464 634

    Bibliography Sequence Number: 028
    Author1: Gait, J
    Date: 1977
    Title: A New Nonlinear Pseudorandom Number Generator
    Periodical: IEEE Transactions on Software Engineering
    Issue & Page numbers: Vol SE-3, No. 5 (Sep 1977):359-363
    Keywords: RSA
    Keywords: RANDOM
    References: 027 007 050 114 016 116 117 118 119 120

    Bibliography Sequence Number: 029
    Author1: Gaines, Helen Fouche
    Date: 1956
    Title: Cryptanalysis: A Study of Ciphers and their Solutions
    Publisher: NY: Dover
    Keywords: Classical
    Comments: U.P. Moore Library EE/510.4/G127
    Comments: Formerly Published under the title: "Elementary Cryptanalysis"
    Comments: "This is the most readily available work on cryptanalysis, and gives
    Comments: extensive coverage of classical systems." (006)

    Bibliography Sequence Number: 030
    Author1: Gersho, Allen
    Date: 1978
    Title: In this Issue
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):1
    Comments: introduction to this interesting issue

    Bibliography Sequence Number: 031
    Author1: Gersho, Allen
    Date: 1978
    Title: Communications Privacy
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):2

    Bibliography Sequence Number: 032
    Author1: Hellman, Martin E
    Date: 1978
    Title: ComSoc Spotlight
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):3-4

    Bibliography Sequence Number: 033
    Author1: Davis, Ruth M
    Date: 1978
    Title: The Data Encryption Standard in Perspective
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):5-9
    Keywords: DES

    Bibliography Sequence Number: 034
    Author1: Morris, Robert
    Date: 1978
    Title: The Data Encryption Standard -- Retrospective and Prospects
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):11-14
    Keywords: DES
    References: 424 133 112 040 376 425 426 391 015 270 427

    Bibliography Sequence Number: 035
    Author1: Campbell, Carl M
    Date: 1978
    Title: Design and Specification of Cryptographic Capabilities
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):15-19
    Keywords: DES
    References: 428

    Bibliography Sequence Number: 036
    Author1: Adleman, Leonard M
    Author2: Rivest, Ronald L
    Date: 78
    Title: The Use of Public Key Cryptography in Communication System Design
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):20-23
    Keywords: RSA
    References: 429 004 372 378 383 005 430

    Bibliography Sequence Number: 037
    Author1: Hellman, Martin E
    Date: 1978
    Title: An Overview of Public Key Cryptography
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):24-31
    Keywords: RSA
    References: 112 428 431 004 101 005 383 382 007 432 111 433

    Bibliography Sequence Number: 038
    Author1: Branstad, Dennis K
    Date: 1978
    Title: Security of Computer Communication
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):33-40
    Keywords: DES
    References: 436 428 372 437 438 050 004 112 439 440 441 442 645 444 002 445

    Bibliography Sequence Number: 039
    Author1: Orceyre, Michael J
    Author2: Heller, Ralph M
    Date: 78
    Title: An Approach to Secure Voice Communication Based on the Data Encryption Standard
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):41-50
    Keywords: DES
    References: 050 038 431 380

    Bibliography Sequence Number: 040
    Author1: U.S. Senate Select Committee on Intelligence
    Date: 1978
    Title: Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):53-55
    Keywords: DES
    Comments: Also reprinted in Cryptologia Author2: 387-389

    Bibliography Sequence Number: 041
    Author1: Hill, Sandy
    Date: 1978
    Title: Gentle Diversions
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):56-58
    References: 025 142 434 088 435

    Bibliography Sequence Number: 042
    Author1: Dickson, Leonard E
    Date: 1958
    Title: Linear Groups with an Exposition of the Galois Field Theory
    Publisher: NY: Dover
    Keywords: GF
    Comments: U. or Pa. Math Library Number 512.86/D564.2/1958

    Bibliography Sequence Number: 043
    Author1: Hill, Lester S
    Date: 1931
    Title: Concerning Certain Linear Transformation Apparatus of Cryptography
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 38:135-154
    Keywords: GF

    Bibliography Sequence Number: 044
    Author1: IBM
    Date: 19??
    Title: "A Cryptographic Management Scheme for Implementing the Data Encryption Standard"
    Periodical: IBM Systems Journal
    Issue & Page numbers: Vol. 17 No. 2
    Keywords: DES
    Comments: Entire issue is $1.75
    Comments: Article reprint is $.50 as order # G321-5066
    Comments: from IBM Systems Journal Reprints
    Comments: Armonk, NY 10504

    Bibliography Sequence Number: 045
    Author1: Schechter, Bruce
    Date: 1981
    Title: A Prime Discovery
    Periodical: Discover
    Issue & Page numbers: 2, 1 (Jan):30-31
    Keywords: primes
    Comments: describes Len Adleman's new primality algorithm (see Ref. 367)
    References: 367

    Bibliography Sequence Number: 046
    Author1: Denning, Peter J
    Date: 1979
    Title: Editor's Overview -- Special Section of Data Encryption
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 4 (Dec):283
    References: 050 001

    Bibliography Sequence Number: 047
    Author1: Bright, Herbert S
    Author2: Enison, Richard L
    Date: 79
    Title: Quasi-Random Number Sequences from a Long-Period TLP Generator with Remarks on Application to
    Cryptography
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 4 (Dec):357-370
    Keywords: random
    References: 396 145 322 585 323 505 506 507 508 509 510 511 512 028 513 514 515 516 517 518 007 519 520 521 522 114 523 524 525 050 027 417 526 527 528 529 530 026 531 532 422 423

    Bibliography Sequence Number: 048
    Author1: Shamir, Ali
    Date: 1979
    Title: How to Share a Secret
    Periodical: CACM
    Issue & Page numbers: 22, 11 (Nov):612-613
    References: 109 370 007 005

    Bibliography Sequence Number: 049
    Author1: Needham, Roger M
    Author2: Schroeder, Michael D
    Date: 78
    Title: Using Encryption for Authentication in Large Networks of Computers
    Periodical: CACM
    Issue & Page numbers: 21, 12 (Dec):993-998
    Keywords: RSA
    Keywords: Applications
    Comments: AbstracTitle: "Use of encryption to achieve authenticated communication in
    Comments: computer networks is discussed. Example protocols are presented for the
    Comments: establishment of authenticated connections, for the management of authenticated
    Comments: mail, and for signature verification and document integrity guarantee.
    Comments: Both conventional and public-key encryption algorithms are considered as
    Comments: the basis for protocols.
    References: 436 428 100 583 482 661 050 662 005

    Bibliography Sequence Number: 050
    Author1: National Bureau of Standards
    Date: 1977
    Title: Data Encryption Standard, FIPS Publication No. 46
    Publisher: NBS
    Keywords: DES
    Keywords: RANDOM
    Comments: NTIS for $4

    Bibliography Sequence Number: 051
    Author1: Denning, Dorothy E
    Date: 1979
    Title: Secure Personal Computing in an Insecure Network
    Periodical: CACM
    Issue & Page numbers: 22, 8 (Aug):476-482
    Keywords: RSA
    References: 004 663 481 664 485 486 056 101 383 665 050 049 492 005 666 497 057

    Bibliography Sequence Number: 052
    Author1: Morris, Robert
    Author2: Thompson, Ken
    Date: 79
    Title: Password Security: A Case History
    Periodical: CACM
    Issue & Page numbers: 22, 11 (Nov):595-597
    Comments: Abstract: "This paper describes the history of the design of the
    Comments: password security scheme on a remotely accessed time-sharing system.
    Comments: The present design was the result of countering observed attempts to
    Comments: penetrate the system. The result is a compromise between extreme
    Comments: security and ease of use."
    References: 667 016 106

    Bibliography Sequence Number: 053
    Author1: Peleg, Shmuel
    Author2: Rosenfeld, Azriel
    Date: 79
    Title: Breaking Substitution Ciphers Using a Relaxation Algorithm
    Periodical: CACM
    Issue & Page numbers: 22, 11 (Nov):598-605
    References: 029 142

    Bibliography Sequence Number: 054
    Author1: Gries, David
    Author2: Misra, Jayadev
    Date: 78
    Title: A Linear Sieve Algorithm for Finding Prime Numbers
    Periodical: Communication of the ACM
    Issue & Page numbers: 21, 12 (Dec 1978):999-1003
    Keywords: primes
    References: 007 258 637 009

    Bibliography Sequence Number: 055
    Author1: Denning, Dorothy E
    Author2: Denning, Peter J
    Date: 79
    Title: Data Security
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 3 (Sep):227-249
    Keywords: security
    References: 057 004 001 188 485 056 025 049 492 608 051 439 670 380 052 050 487 666 107 106 112 188 481 383 005 494 413 664

    Bibliography Sequence Number: 056
    Author1: Lempel, Abraham
    Date: 1979
    Title: Cryptology in Transition
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 4 (Dec):285-303
    Keywords: RSA
    References: 109 371 372 004 112 006 372 373 001 374 375 113 025 110 007 376 377 378 379 380 381 382 101 383 009 133 050 384 385 386 111 013 387 005 162 388 389 027 390 154 142 391 014 040 392

    Bibliography Sequence Number: 057
    Author1: Simmons, Gustavus J
    Date: 1979
    Title: Symmetric and Asymmetric Encryption
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 4 (Dec):305-330
    References: 393 036 394 336 395 396 145 397 090 004 112 107 117 029 028 001 374 398 399 400 037 401 003 402 017 043 188 403 404 025 110 061 056 405 406 407 408 101 383 119 133 049 409 111 108 103 005 410 411 412 413 389 027 414 154 415 416 417 418 419 026 106 420 421 422 423

    Bibliography Sequence Number: 058
    Author1: Popek, Gerald J
    Author2: Kline, Charles S
    Date: 79
    Title: Encryption and Secure Computer Networks
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 4 (Dec):331-356
    References: 109 473 436 428 474 475 476 100 004 112 006 477 107 478 479 117 324 480 481 482 483 484 433 486 056 487 380 488 101 489 050 655 049 490 491 492 493 494 495 002 005 496 497 498 057 499

    Bibliography Sequence Number: 059
    Author1: Hitt, Parker
    Date: 1916
    Title: Manual for the Solution of Military Ciphers
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #1 $9.76
    Comments: 1977 reprint of 1916 publication: Fort Leavenworth

    Bibliography Sequence Number: 060
    Author1: Friedman, William F
    Date: 1924
    Title: Elements of Cryptanalysis
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #3 $12.80
    Comments: 1976 reprint of 1924 War Department Training Pamphlet No. 3

    Bibliography Sequence Number: 061
    Author1: Kullback, Solomon
    Date: 1938
    Title: Statistical Methods in Cryptanalysis
    Publisher: Laguna Hills, CA: Aegean Park Press
    Keywords: Classical
    Comments: Aegean #4 $14.56
    Comments: 1976 reprint of 1938 Technical Paper of the Signal Intelligence Service
    Comments: NSA reprint 1967
    Comments: "This reprint of a 1938 paper is an extensive exposition of the use
    Comments: of correlation in cryptanalysis." (006)

    Bibliography Sequence Number: 062
    Author1: Friedman, William F
    Date: 19??
    Title: Cryptography and Cryptanalysis
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #5 $12.96
    References: 199

    Bibliography Sequence Number: 063
    Author1: Friedman, William F
    Date: 1935
    Title: Elememtary Military Cryptography
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #7 $9.76
    Comments: 1976 Reprint of 1935 Special Text No. 165 in Army Extension Courses

    Bibliography Sequence Number: 064
    Author1: Friedman, William F
    Date: 1944
    Title: Advanced Military Cryptography
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #8 $11.84
    Comments: 1976 reprint of TM 11-485, Washington: War Department

    Bibliography Sequence Number: 065
    Author1: Flicke, Wilhelm F
    Date: 1954
    Title: War Secrets in the Ether, Volume 1
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #9
    Comments: trans. Ray W. Pettengill
    Comments: 1977 reprint of 1954 NSA publication. In addition to Aegean, available
    Comments: from National Archives as No. SRH-002 for $.20 * 312 pages (both volumes?)
    References: 200

    Bibliography Sequence Number: 066
    Author1: Friedman, William F
    Date: 19??
    Title: Solving German Codes in World War I
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #11 $13.28

    Bibliography Sequence Number: 067
    Author1: British War Office
    Date: 19??
    Title: Manual of Cryptography
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #28 $11.68

    Bibliography Sequence Number: 068
    Author1: Friedman, William F
    Date: 19??
    Title: History of the Use of Codes
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #12 $9.12

    Bibliography Sequence Number: 069
    Author1: Friedman, William F
    Author2: Mendelsohn, Charles J
    Date: 1938
    Title: The Zimmerman Telegram of January 16, 1917 and its Cryptographic Background
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: 1977 reprint
    Comments: Aegean #13 $6.56
    Comments: 1976 reprint of 1938 Office of the Chief Signal Officer publication

    Bibliography Sequence Number: 070
    Author1: Sacco, General Luigi
    Date: 1936
    Title: Manual of Cryptography
    Publisher: Laguna Hills, CA: Aegean Park Press
    Keywords: Classical
    Comments: Aegean #14 $15.36
    Comments: Aegean is 1977 reprint of translated original Italian of 1936
    Comments: "Manuale di crittografia, 2e edition riveduta e aumenta, Rome, Italy
    Comments: 1936. (Translations, French-Manuel de Cryptographie, from 3rd Italian
    Comments: edition by J. Bres, reviewed by the author with a preface by R. Leger,
    Comments: Paris, France: Payot, 1951; English-Manual of Cryptography, Laguna
    Comments: Hills, CA: Aegean Park Press, 1977.)
    Comments: This work is noted for being particularly readable. It is similar
    Comments: in scope to Eyraud [547] or Friedman [205], but slightly earlier in date." (006)

    Bibliography Sequence Number: 071
    Author1: unknown
    Date: 19??
    Title: Origin and Development of the Army Security Agency 1917-1947
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #16 $7.04

    Bibliography Sequence Number: 072
    Author1: Barker, Wayne G
    Date: 1977
    Title: Cryptanalysis of the Hagelin Cryptograph
    Publisher: Laguna Hills, CA: Aegean Park Press
    Keywords: Classical
    Comments: Aegean #17 $16.48

    Bibliography Sequence Number: 073
    Author1: Glyden
    Date: 19??
    Title: The Contribution of the Cryptographic Bureaus in the World War
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #18 $11.20

    Bibliography Sequence Number: 074
    Author1: unknown
    Date: 19??
    Title: History of Codes and Ciphers in the United States Prior to World War I
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #20 $13.44

    Bibliography Sequence Number: 075
    Author1: unknown
    Date: 19??
    Title: History of Codes and Ciphers in the United States During World War I
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #21 $15.68

    Bibliography Sequence Number: 076
    Author1: unknown
    Date: 19??
    Title: History of Codes and Ciphers in the United States During the Period Between the World Wars, Part I 1919-1929
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #22 $15.68

    Bibliography Sequence Number: 077
    Author1: Barker, Wayne G
    Date: 1975
    Title: Cryptanalysis of the Simple Substitution Cipher with Word Divisions - Using Non-Pattern Word Lists
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #2 $9.76

    Bibliography Sequence Number: 078
    Author1: Givierge, General Marcel
    Date: 19??
    Title: Course in Cryptography
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #19 $15.36

    Bibliography Sequence Number: 079
    Author1: Friedman, William F
    Date: 19??
    Title: The Riverbank Publications, Volume 1
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #23 $13.44
    References: 202 203

    Bibliography Sequence Number: 080
    Author1: Barker, Wayne G
    Date: 19??
    Title: Cryptanalysis of an Enciphered Code Problem -- Where an "Additive" Method of Encipherment has been Used
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #26 $18.24

    Bibliography Sequence Number: 081
    Author1: D'Imperio, M. E
    Date: 19??
    Title: The Voynich Manuscript -- An Elegant Enigma
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #27 $13.44

    Bibliography Sequence Number: 082
    Author1: McCalla, Thomas R
    Date: 1968
    Title: Introduction to Numerical Methods and FORTRAN Programming
    Publisher: NY: John Wiley
    Keywords: GF
    Comments: Moore School Library Number QA/297/M25
    Comments: especially chapter 5 - Matrix Methods and Systems of Linear Algebraic Equations

    Bibliography Sequence Number: 083
    Author1: Winkel, Brian J
    Date: 1977
    Title: Why Cryptologia
    Periodical: Cryptologia
    Issue & Page numbers: 1-3
    References: 025 675

    Bibliography Sequence Number: 084
    Author1: Mellen, Greg E
    Author2: Greenwood, Lloyd
    Date: 77
    Title: The Cryptology of Multiplex Systems, Part I
    Periodical: Cryptologia
    Issue & Page numbers: 4-16
    References: 025 079 676 747 029 285 064 061

    Bibliography Sequence Number: 085
    Author1: Harris, Barbara
    Date: 1977
    Title: A Different Kind of Column
    Periodical: Cryptologia
    Issue & Page numbers: 17-19

    Bibliography Sequence Number: 086
    Author1: Reeds, James A
    Date: 1977
    Title: "Cracking" a Random Number Generator
    Periodical: Cryptologia
    Issue & Page numbers: 20-26
    References: 007

    Bibliography Sequence Number: 087
    Author1: Kahn, David
    Date: 1977
    Title: The Biggest Bibliography
    Periodical: Cryptologia
    Issue & Page numbers: 27-42
    References: 088

    Bibliography Sequence Number: 088
    Author1: Shulman, David
    Date: 1976
    Title: An Annotated Bibliography of Cryptography
    Publisher: NY: Garland Publishing Co
    Length: xvi+372
    Keywords: Biography
    Comments: Garland Reference Library of the Humanities, Volume 37 for $35.00
    Comments: "This bibliography has almost no overlap with the present one. It
    Comments: offers the most extensive coverage of the classical literature available." (006)

    Bibliography Sequence Number: 089
    Author1: Shulman, David
    Date: 1977
    Title: A Reply to Kahn's Review
    Periodical: Cryptologia
    Issue & Page numbers: 43-45
    Comments: not xrefed

    Bibliography Sequence Number: 090
    Author1: Deavours, Cipher A
    Date: 1977
    Title: Unicity Points in Cryptanalysis
    Periodical: Cryptologia
    Issue & Page numbers: 46-68
    References: 027 113 025 419 677

    Bibliography Sequence Number: 091
    Author1: Kruh, Louis
    Date: 1977
    Title: Cipher EquipmenTitle: Cipher Disks
    Periodical: Cryptologia
    Issue & Page numbers: 69-75
    References: 679 066 062 025 121 680 681 682 683 008 684 685 686 687 688

    Bibliography Sequence Number: 092
    Author1: Levine, Jack
    Author2: Brawley, Joel V
    Date: 77
    Title: Some Cryptographic Applications of Permutation Polynomials
    Periodical: Cryptologia
    Issue & Page numbers: 76-92
    Keywords: GF
    Keywords: RSA
    References: 337 334 613 614 615 616 617 618 619 620 621 622 042 623 624 625 626 627 594 628 629 630

    Bibliography Sequence Number: 093
    Author1: Winkel, Brian
    Date: 1977
    Title: Poe Challenge Cipher Finally Broken
    Periodical: Cryptologia
    Issue & Page numbers: 93-96
    References: 062 025 823 142 824

    Bibliography Sequence Number: 094
    Author1: Hiatt, Blanchard
    Date: 1977
    Title: Age of Decipherment
    Periodical: Cryptologia
    Issue & Page numbers: 101-105

    Bibliography Sequence Number: 095
    Author1: Hiatt, Blanchard
    Date: 1977
    Title: "Count Forward Three Score and Ten..."
    Periodical: Cryptologia
    Issue & Page numbers: 106-115

    Bibliography Sequence Number: 096
    Author1: Schatz, Bruce R
    Date: 1977
    Title: Automated Analysis of Cryptograms
    Periodical: Cryptologia
    Issue & Page numbers: 116-142
    References: 077 825 504 552 117 324 063 689 029 690 580 826 827 241 828 059 025 027 829 142 443 419 556

    Bibliography Sequence Number: 097
    Author1: Kruh, Louis
    Date: 1977
    Title: Cipher EquipmenTitle: Converter M-325(T)
    Periodical: Cryptologia
    Issue & Page numbers: 143-149
    References: 691 692 693 751

    Bibliography Sequence Number: 098
    Author1: Mellen, Greg E
    Author2: Greenwood, Lloyd
    Date: 77
    Title: The Cryptology of Multiplex Systems, Part II
    Periodical: Cryptologia
    Issue & Page numbers: 150-165
    References: 142 025

    Bibliography Sequence Number: 099
    Author1: Kahn, David
    Date: 1977
    Title: "Get out your Secret Decoders, Boys and Girls ...."
    Periodical: Cryptologia
    Issue & Page numbers: 166
    References: 121

    Return to Cryptosystems Journal Home Page
    Next Page ("Bibliography Part 2 of 9")
    Previous Page ("Main Bibliography page")
    Copyright © 1996 Cryptosystems Journal.
    Most recent update on 12-JUN-96.