The Cryptosystems Journal Hypertext Bibliography of Classical Cryptology (Part 2 of 9)



    This bibliography was part of my (Tony Patti's) Master's Thesis (M.S. Computer & Information Sciences) entitled " An Operational, Computerized, Galois Field Cryptosystem with a Computerized, Cross-Referenced, and Annotated Bibliography of Cryptology ", which was completed in July 1981, and sponsored by Dr. Howard L. Morgan, at the Moore School of the University of Pennsylvania.



    Bibliography Sequence Number: 100
    Author1: Diffie, Whitfield
    Author2: Hellman, Martin E
    Date: 1976
    Title: Multiuser Cryptographic Techniques
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 45:109-112
    Keywords: RSA
    Keywords: PKC
    Comments: U.P. Moore Library: 510.78/J667
    Comments: "This paper describes two approaches to supplying secure first contact
    Comments: between users of a computer network, without sending keys along outside
    Comments: channels, and some related problems." (006)
    References: 538 004 107 117 108

    Bibliography Sequence Number: 101
    Author1: Merkle, Ralph C
    Date: 1978
    Title: Secure Communication over insecure channels
    Periodical: CACM
    Issue & Page numbers: 21 (Apr): 294-299
    Keywords: PKC
    Comments: "This paper introduced the concept of public key distribution independently
    Comments: of Diffie and Hellman" (006)
    References: 004 117 025 383 005 027 575

    Bibliography Sequence Number: 102
    Author1: Sperry Rand Corporation
    Date: 1969
    Title: Direct Access Storage Device Concepts
    Publisher: Sperry Rand Corporation
    Length: pages A-2 and A-3
    Keywords: primes
    Comments: These two pages are a list of the first 10,000 prime numbers (1 to 104,723)
    Comments: Document UE-604

    Bibliography Sequence Number: 103
    Author1: Rabin, Michael O
    Date: 1979
    Title: Digitalized signatures and public-key functions as intractable as factorization
    Periodical: MIT/LCS/TR-212
    Keywords: RSA
    Comments: "A variation of the RSA scheme with E=2 is shown to have cryptanalytic
    Comments: difficulty equivalent to factoring." (006)
    References: 658 004 013 659 660 005 014

    Bibliography Sequence Number: 104
    Author1: Postikov, M M
    Date: 1961
    Title: Fundamentals of Galois' Theory
    Publisher: Delhi, India: Hindustan Publishing Corporation
    Keywords: GF
    Comments: Moore School Library Number 512.86/P845.EH

    Bibliography Sequence Number: 105
    Author1: Knuth, Donald E
    Date: 1973
    Title: Sorting and Searching: The Art of Computer Programming, Volume 3
    Publisher: Reading MA: Addison Wesley
    Keywords: background

    Bibliography Sequence Number: 106
    Author1: Wilkes, M. V
    Date: 1975
    Title: Time-Sharing Computing Systems, Third Edition
    Publisher: NY: Elsevier
    Comments: orig. publ. 1968
    References: 004

    Bibliography Sequence Number: 107
    Author1: Evans Jr., A
    Author2: Kantrowitz, W
    Author3: Weiss, E
    Date: 1974
    Title: A User Authentication System Not Requiring Secrecy in the Computer
    Periodical: CACM
    Issue & Page numbers: 17 (Aug): 437-442
    Keywords: system design and implementation
    Comments: "This paper describes a oneway function obtained by using a transformamtion
    Comments: similar to the IBM Lucifer system and using the argument as both input and key." (006)

    Bibliography Sequence Number: 108
    Author1: Purdy, George B
    Date: 1974
    Title: A high-security log-in procedure
    Periodical: CACM
    Issue & Page numbers: (Aug): 442-445
    Keywords: system design and implementation
    Comments: "This paper studies the use of a polynomial of very high degree over
    Comments: a finite field as a one-way function. This function has subsequently
    Comments: been used to protect the passwords on the BBN TENEX system." (006)

    Bibliography Sequence Number: 109
    Author1: Aho, A V
    Author2: Hopcroft, J E
    Author3: Ullman, J D
    Date: 1974
    Title: The Design and Analysis of Computer Algorithms
    Publisher: Reading, MA: Addison-Wesley
    Keywords: background

    Bibliography Sequence Number: 110
    Author1: Karp, R M
    Date: 1972
    Title: Reducibility among Combinatorial Problems
    Periodical: in Complexity of Computer Computations; R.E. Miller et al Ed.;NY: Plenum
    Issue & Page numbers: 85-104
    Keywords: RSA

    Bibliography Sequence Number: 111
    Author1: Pohlig, Stephen C
    Author2: Hellman, Martin E
    Date: 78
    Title: An improved algorithm for computing logarithms in GF(p) and its cryptographic significance
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-24, 1 (Jan):106-110
    Keywords: Cryptanalysis
    Keywords: GF
    Comments: Abstract - A cryptographic system is described which is secure if and
    Comments: only if computing logarithms ober GF(p) is infeasible. Previously published
    Comments: algorithms for computing this function require O(Publisher: *.5) complexity in
    Comments: both time and space. An improved algorithm is derived which requires
    Comments: O(log**2 p) complexity if p-1 has only small prime factors. Such
    Comments: values of p must be avoided in the cryptosystem. Constructive uses for
    Comments: the new algorithm are also described.
    Comments: "A discussion of a cryptographic system with a high degree of
    Comments: mathematical structure and simplicity." (006)

    Bibliography Sequence Number: 112
    Author1: Diffie, Whitfield
    Author2: Hellman, Martin E
    Date: 77
    Title: Exhaustive Cryptanalysis of the NBS data encryption standard
    Periodical: Computer
    Issue & Page numbers: 10 (June): 74-84
    Keywords: DES
    Comments: "This paper gives a detailed cost estimate for the construction of
    Comments: a highly parallel special purpose computer to break the DES in one day." (006)
    References: 016 015 562 004 643 644 645 375 133 399 027 113 572

    Bibliography Sequence Number: 113
    Author1: Hellman, Martin E
    Date: 1977
    Title: An extension of the Shannon theory approach to Cryptography
    Periodical: IEEE Transactions on Information Theory, Sep. 1975
    Issue & Page numbers: IT-23, 3 (May):289-294
    Comments: Abstract - Shannons information-theoretic approach to cryptography is
    Comments: reviewed and extended. It is shown that Shannons random cipher model
    Comments: is conservative in that a randomly chosen cipher is essentially the worst
    Comments: possible. This is in contrast with error-correcting codes where a randomly
    Comments: chosen code is essentially the best possible. The concepts of mathching
    Comments: a cipher to a language and of the trade-off between local and global
    Comments: uncertainty are also developed.

    Bibliography Sequence Number: 114
    Author1: MacLaren, M. D
    Author2: Marsaglia, G
    Date: 65
    Title: Uniform random number generators
    Periodical: Journal of the ACM
    Issue & Page numbers: 12: 83-89
    Keywords: background
    Keywords: RANDOM

    Bibliography Sequence Number: 115
    Author1: Yao, Andrew
    Date: 1977
    Title: Probabilistic ComputationBibliography Sequence Number: Toward a Unified Measure of Complexity
    Periodical: 18th Annual Symposium on Foundations of Computer Science
    Issue & Page numbers: 222-227
    Keywords: Complexity

    Bibliography Sequence Number: 116
    Author1: Blinchikoff, H
    Author2: Zverov, Z
    Date: 76
    Title: Filtering in the Time and Frequency Domains
    Publisher: NY: Wiley
    Keywords: Misc.?

    Bibliography Sequence Number: 117
    Author1: Feistel, Horst
    Date: 1973
    Title: Cryptography and Computer Privacy
    Periodical: Scientific American
    Issue & Page numbers: 228:15-23
    Keywords: Popular
    Comments: "This article gives the most readable account of the operation of
    Comments: the IBM Lucifer cipher." (006)

    Bibliography Sequence Number: 118
    Author1: Meyer, Carl H
    Date: 1974
    Title: Enciphering Data for Secure Transmission
    Periodical: Computer Design
    Issue & Page numbers: ApriIssue & Page numbers: 129-134

    Bibliography Sequence Number: 119
    Author1: Meyer, Carl H
    Author2: Tuchman, Walter L
    Date: 72
    Title: Pseudo-random codes can be cracked
    Periodical: Electronic Design
    Issue & Page numbers: 20, 23 (9 Nov):74-76

    Bibliography Sequence Number: 120
    Author1: Lehmer, D H
    Date: 1951
    Title: article name?
    Periodical: Proc. 2nd Symp. Large Scale Digital Computing Mach
    Issue & Page numbers: 141-146
    Comments: Harvard Univ.: Cambridge, MA

    Bibliography Sequence Number: 121
    Author1: Lesser, Robert
    Date: 1975
    Title: A Celebration of Comic Art and Memorabilia
    Publisher: NY: Hawthorn Books
    Length: 292 pages

    Bibliography Sequence Number: 122
    AuthorAuthor1: Deavours, Cipher A
    Date: 1977
    Title: Analysis of the Hebern Cryptograph using Isomorphs
    Periodical: Cryptologia
    Issue & Page numbers: 1: 167-185
    References: 695 696 025

    Bibliography Sequence Number: 123
    Author1: Reeds, James A
    Date: 1977
    Title: Rotor Algebra
    Periodical: Cryptologia
    Issue & Page numbers: 1: 186-194
    References: 122 159 174 070

    Bibliography Sequence Number: 124
    Author1: Penney, Walter
    Date: 1977
    Title: Grille Reconstruction
    Periodical: Cryptologia
    Issue & Page numbers: 1: 195-200
    References: 151

    Bibliography Sequence Number: 125
    Author1: Kahn, David
    Date: 1977
    Title: The Significance of COdebreaking and Intelligence in Allied Strategy and Tactics
    Periodical: Cryptologia
    Issue & Page numbers: 1: 209-222
    References: 698 025

    Bibliography Sequence Number: 126
    Author1: Deavours, Cipher A
    Date: 1977
    Title: The Kappa Test
    Periodical: Cryptologia
    Issue & Page numbers: 1: 223-231
    References: 025 061

    Bibliography Sequence Number: 127
    Author1: Winkel, Brian J
    Date: 1977
    Title: Word Ways, A Journal Worth Going Your Way
    Periodical: Cryptologia
    Issue & Page numbers: 1: 232-233

    Bibliography Sequence Number: 128
    Author1: Reeds, James A
    Date: 1977
    Title: Entropy Calculations and Particular Methods of Cryptanalysis
    Periodical: Cryptologia
    Issue & Page numbers: 1: 235-254
    Bibliography Sequence Number: 128
    References: 205 113 025 699 027 700

    Bibliography Sequence Number: 129
    Author1: Kruh, Louis
    Date: 1977
    Title: Cipher EquipmenTitle: Hagelin Pocket Cryptographer, Type CD-57
    Periodical: Cryptologia
    Issue & Page numbers: 1: 255-260
    References: 701

    Bibliography Sequence Number: 130
    Author1: Leighton, Albert C
    Date: 1977
    Title: "The Earliest Use of a Dot Cipher"
    Periodical: Cryptologia
    Issue & Page numbers: 1: 261-274
    References: 025

    Bibliography Sequence Number: 131
    Author1: Royal Canadian Mint
    Date: 1977
    Title: DPEPE DPJO: A Canadian Coin Piece With a Message
    Periodical: Cryptologia
    Issue & Page numbers: 1: 275-277

    Bibliography Sequence Number: 132
    Author1: Deavours, Cipher A
    Date: 1977
    Title: Kullback's "Statistical Methods of Cryptanalysis" - Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 1: 278-280
    References: 061

    Bibliography Sequence Number: 133
    Author1: Morris, Robert
    Author2: Sloane, Neil J. A
    Author3: Wyner, Aaron D
    Date: 1977
    Title: Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard
    Periodical: Cryptologia
    Issue & Page numbers: 1: 281-291
    Keywords: DES
    References: 702 427 428 396 703 551 270 112 107 583 117 704 324 705 580 553 025 557 558 489 119 016 108 027 391 708 543 419 106 562

    Bibliography Sequence Number: 134
    Author1: National Bureau of Standards
    Date: 1977
    Title: Proposed Federal Information Processing Data Encryption Standard
    Periodical: Cryptologia
    Issue & Page numbers: 1: 292-306
    Keywords: DES
    References: 016

    Bibliography Sequence Number: 135
    Author1: Winkel, Brian J
    Date: 1977
    Title: Epilogue
    Periodical: Cryptologia
    Issue & Page numbers: 1: 309
    References: 093

    Bibliography Sequence Number: 136
    Author1: Deavours, Cipher A
    Date: 1977
    Title: The Ithaca Connection: Computer Cryptography in the Making
    Periodical: Cryptologia
    Issue & Page numbers: 1: 312-317
    References: 001 004 709 110

    Bibliography Sequence Number: 137
    Author1: Winkel, Brian J
    Date: 1977
    Title: Poe Challenge Cipher Solutions
    Periodical: Cryptologia
    Issue & Page numbers: 1: 318-325

    Bibliography Sequence Number: 138
    Author1: Eckler, A. Ross
    Date: 1977
    Title: A Rapid Yes-No Computer-Aided Communicator
    Periodical: Cryptologia
    Issue & Page numbers: 1: 326-333
    References: 710 711 464

    Bibliography Sequence Number: 139
    Author1: Kruh, Louis
    Date: 1977
    Title: Cipher Equipment: MA4210 Alphanumeric Pocket Cipher
    Periodical: Cryptologia
    Issue & Page numbers: 1: 334-336

    Bibliography Sequence Number: 140
    Author1: Kahn, David
    Date: 1977
    Title: Ecclesiastical Cryptography: A Review
    Periodical: Cryptologia
    Issue & Page numbers: 1: 337

    Bibliography Sequence Number: 141
    Author1: Brawley, Joel V
    Author2: Levine, Jack
    Date: 77
    Title: Equivalences of Vigenere Systems
    Periodical: Cryptologia
    Issue & Page numbers: 1: 338-361
    References: 712 713 714 029 025 142

    Bibliography Sequence Number: 142
    Author1: Sinkov, Abraham
    Date: 1968
    Title: Elementary Cryptanalysis, A Mathematical Approach
    Publisher: NY: Random House
    Keywords: Classical
    Comments: This volume is now part of the New Mathematical Library, published by
    Comments: the Mathematical Association of America (1966): Washington DC
    Comments: "This is the best elementary cryptanalysis book available." (006)

    Bibliography Sequence Number: 143
    Author1: Marsh, D. C. B
    Date: 1977
    Title: Cryptography at the Colorado School of Mines
    Periodical: Cryptologia
    Issue & Page numbers: 1: 362-363
    References: 029 025 675 142

    Bibliography Sequence Number: 144
    Author1: Straight, David W
    Date: 1977
    Title: Cryptanalysis and Data Security Course at the University of Tennessee
    Periodical: Cryptologia
    Issue & Page numbers: 1: 363-365
    References: 029 715 025 142

    Bibliography Sequence Number: 145
    Author1: Bright, Herbert S
    Date: 1977
    Title: Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext
    Periodical: Cryptologia
    Issue & Page numbers: 1: 366-370
    Keywords: RANDOM
    Comments: text of COMPLAN TN-913-14, 25SEP77 version
    References: 396 716 582 323 419 274

    Bibliography Sequence Number: 146
    Author1: Kahn, David
    Date: 1977
    Title: Reports from the Reich
    Periodical: Cryptologia
    Issue & Page numbers: 1: 371

    Bibliography Sequence Number: 147
    Author1: Kruh, Louis
    Date: 1977
    Title: The Churchyard Ciphers
    Periodical: Cryptologia
    Issue & Page numbers: 1: 372-375
    References: 079 025

    Bibliography Sequence Number: 148
    Author1: Highland, Harold J
    Date: 1977
    Title: CENSOREDate: A Simulation Excercise
    Periodical: Cryptologia
    Issue & Page numbers: 1: 376-377

    Bibliography Sequence Number: 149
    Author1: Kahn, David
    Date: 1977
    Title: German Military Eavesdroppers
    Periodical: Cryptologia
    Issue & Page numbers: 1: 378-380

    Bibliography Sequence Number: 150
    Author1: Deavours, Cipher A
    Author2: Reeds, James A
    Date: 77
    Title: The Enigma: Part I, Historical Perspectives
    Periodical: Cryptologia
    Issue & Page numbers: 1: 381-391
    References: 717 718 719 720 721 722 723 724 122 097 725 070 726 698 025

    Bibliography Sequence Number: 151
    Author1: Winkel, Brian J
    Date: 1977
    Title: Solution
    Periodical: Cryptologia
    Issue & Page numbers: 1: 391
    References: 124

    Bibliography Sequence Number: 152
    Author1: Fagone, Peter P
    Date: 1977
    Title: A Message in Cipher Written by General Cornwallis during the Revolutionary War
    Periodical: Cryptologia
    Issue & Page numbers: 1: 392-395
    References: 025

    Bibliography Sequence Number: 153
    Author1: Winkel, Brian J
    Date: 1977
    Title: There and There: A Department
    Periodical: Cryptologia
    Issue & Page numbers: 1: 396-405
    Keywords: DES
    Keywords: RSA
    Keywords: NSA
    References: 727 728 729 730 563 564

    Bibliography Sequence Number: 154
    Author1: Simmons, Gustavus J
    Author2: Norris, Michael J
    Date: 77
    Title: Preliminary Comments on the M.I.T. Public-Key Cryptosystem
    Periodical: Cryptologia
    Issue & Page numbers: 1: 406-414
    Keywords: RSA
    References: 004 002 001 635 636

    Bibliography Sequence Number: 155
    Author1: Barker, Wayne G
    Date: 1978
    Title: Solving a Hagelin, Type CD-57, Cipher
    Periodical: Cryptologia
    Issue & Page numbers: 2: 1-8
    References: 072 129

    Bibliography Sequence Number: 156
    Author1: Wilson, David
    Date: 1978
    Title: Cryptanalysis Course Down Under
    Periodical: Cryptologia
    Issue & Page numbers: 2: 9-11

    Bibliography Sequence Number: 157
    Author1: Kahn, David
    Date: 1978
    Title: The Forschungsamt: Nazi Germany's Most Secret Communications Intelligence Agency
    Periodical: Cryptologia
    Issue & Page numbers: 2: 12-19
    References: 158 065

    Bibliography Sequence Number: 158
    Author1: Kahn, David
    Date: 1978
    Title: Hitler's SpieBibliography Sequence Number: German Military Intelligence in World War II
    Publisher: NY: MacMillan
    Length: 671 pages
    Comments: $16.95

    Bibliography Sequence Number: 159
    Author1: Rohrbach, Hans
    Date: 1978
    Title: Mathematical and Mechanical Methods in Cryptography - Part I
    Periodical: Cryptologia
    Issue & Page numbers: 2: 20-37
    Comments: "Mathematische und maschinelle Methoden biem chiffrieren und dechiffrieren,
    Comments: Fiat Review of German Science, 1939-1946 Applied Mathematics, Part I,
    Comments: Article IX, Office of Military Government for Germany, Field Information
    Comments: Agencies Technical, Wiesbaden, Germany, pp. 233-257, 1948. (Translated
    Comments: by B. Hardie in two parts...
    Comments: This paper describes some of the systems attacked by the German
    Comments: cryptanalysts and discusses their sucesses and failures." (006)

    Bibliography Sequence Number: 160
    Author1: Kruh, Louis
    Date: 1978
    Title: The Inventions of William F. Friedman
    Periodical: Cryptologia
    Issue & Page numbers: 2: 38-61
    Keywords: Classic
    Comments: "This paper describes some of the systems attacked by the German
    Comments: cryptanalysts and discusses their successes and failures." (006)
    References: 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 161 097 150 753 754 755 756

    Bibliography Sequence Number: 161
    Author1: Clark, Ronald
    Date: 1977
    Title: The Man Who Broke Purple
    Publisher: NY: Little, Brown & Co

    Bibliography Sequence Number: 162
    Author1: Rivest, Ronald L
    Date: 1978
    Title: Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem
    Periodical: Cryptologia
    Issue & Page numbers: 2: 62-65
    References: 002 005 154

    Bibliography Sequence Number: 163
    Author1: Deavours, Cipher A
    Date: 1978
    Title: A Book Review: "Cryptanalysis of the Hagelin Cryptograph" by Wayne G. Barker
    Periodical: Cryptologia
    Issue & Page numbers: 2: 66-67
    References: 072

    Bibliography Sequence Number: 164
    Author1: Knight, H. Gary
    Date: 1978
    Title: Cryptanalyst's Corner
    Periodical: Cryptologia
    Issue & Page numbers: 2: 68-74
    References: 060 029 043 059 061 165 166 167 168 169 086 070 142

    Bibliography Sequence Number: 165
    Author1: Levine, Jack
    Date: 1958
    Title: Variable Matrix Substitution in Algebraic Cryptography
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 65:170-179
    Keywords: GF

    Bibliography Sequence Number: 166
    Author1: Levine, Jack
    Date: 1961
    Title: Some Applications of High-Speed Computers to the Case of N=2 of ALgebraic Cryptography
    Periodical: Mathematics of Computation
    Issue & Page numbers: 15:254-260
    Keywords: GF

    Bibliography Sequence Number: 167
    Author1: Levine, Jack
    Date: 1961
    Title: Some Elementary Crytanalysis of Algebraic Cryptography
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 68:411-418
    Keywords: GF

    Bibliography Sequence Number: 168
    Author1: Mellen, Greg E
    Date: 1973
    Title: Cryptology, Computers, and Common Sense
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 42: 569-579
    Keywords: Survey
    Comments: "A rather pessimistic survey of the application of cryptography." (006)

    Bibliography Sequence Number: 169
    Author1: Peck, Lyman C
    Date: 1961
    Title: Secret Codes, Remainder Arithmetic and Matrices
    Periodical: Reston, VA: National Council of Teachers of Math

    Bibliography Sequence Number: 170
    Author1: Lynch, Frederick D
    Date: 19??
    Title: Pattern-Word List (Volume 1)
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: $14.60

    Bibliography Sequence Number: 171
    Author1: Weber, Ralph E
    Date: 1978
    Title: James Lovell and Secret Ciphers During the American Revolution
    Periodical: Cryptologia
    Issue & Page numbers: 2: 75-88
    References: 172

    Bibliography Sequence Number: 172
    Author1: Weber, Ralph E
    Date: 1978
    Title: United States Diplomatic Codes and Ciphers, 1775-1938
    Publisher: Chicago: New University Press
    Length: approx 600
    Comments: $49.95

    Bibliography Sequence Number: 173
    Author1: Winkel, Brian J
    Date: 1978
    Title: There and There
    Periodical: Cryptologia
    Issue & Page numbers: 2: 89-94
    References: 757 758 759 760

    Bibliography Sequence Number: 174
    Author1: Rohrbach, Hans
    Date: 1978
    Title: Mathematical and Mechanical Methods in Cryptology - Part II
    Periodical: Cryptologia
    Issue & Page numbers: 2: 101-121
    References: 159

    Bibliography Sequence Number: 175
    Author1: Kahn, David
    Date: 1978
    Title: Friedman's Life: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 2: 122-123
    References: 161

    Bibliography Sequence Number: 176
    Author1: Knight, H. Gary
    Date: 1978
    Title: Cryptanalyst's Corner
    Periodical: Cryptologia
    Issue & Page numbers: 2: 124-128
    References: 122 126 025 123 419

    Bibliography Sequence Number: 177
    Author1: Kruh, Louis
    Date: 1978
    Title: Who Wrote "The American Black Chamber"?
    Periodical: Cryptologia
    Issue & Page numbers: 2: 130-133
    References: 025 611 761 178 179 180 181 182

    Bibliography Sequence Number: 178
    Author1: Yardley, Herbert O
    Date: 1931
    Title: Secret Inks
    Periodical: Saturday Evening Post
    Issue & Page numbers: 4 April 1931: pages ??

    Bibliography Sequence Number: 179
    Author1: Yardley, Herbert O
    Date: 1931
    Title: Codes
    Periodical: Saturday Evening Post
    Issue & Page numbers: 18 April 1931: pages ??

    Bibliography Sequence Number: 180
    Author1: Yardley, Herbert O
    Date: 1931
    Title: Ciphers
    Periodical: Saturday Evening Post
    Issue & Page numbers: 9 May 1931: pages ??

    Bibliography Sequence Number: 181
    Author1: Yardley, Herbert O
    Date: 1931
    Title: Cryptograms and Their Solutions
    Periodical: Saturday Evening Post
    Issue & Page numbers: 21 Nov 1931: pages ??

    Bibliography Sequence Number: 182
    Author1: Yardley, Herbert O
    Date: 1931
    Title: The American Black Chamber
    Publisher: Indianapolis: Bobbs-Merrill Co
    Keywords: Historical
    Comments: "This volume gives an excellent feeling for the flavor of cryptanalysis." (006)

    Bibliography Sequence Number: 183
    Author1: Deavours, Cipher A
    Date: 1978
    Title: Cryptology at Kean College
    Periodical: Cryptologia
    Issue & Page numbers: 2: 134-138

    Bibliography Sequence Number: 184
    Author1: Kahn, David
    Date: 1978
    Title: Nuggets from the ArchiveBibliography Sequence Number: Yardley Tries Again
    Periodical: Cryptologia
    Issue & Page numbers: 2: 139-143
    References: 182

    Bibliography Sequence Number: 185
    Author1: Barker, Wayne G
    Date: 1978
    Title: The Unsolved d'Agapeyeff cipher
    Periodical: Cryptologia
    Issue & Page numbers: 2: 144-147
    References: 093 137 186

    Bibliography Sequence Number:
    186
    Author1: D'Agapeyeff, Alexander
    Date: 1939
    Title: Codes and Ciphers
    Publisher: London: Oxford University Press

    Bibliography Sequence Number: 187
    Author1: Straight, David
    Date: 1978
    Title: An Outline of Computer Security: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 2: 148-150
    References: 188 270 029 025 142

    Bibliography Sequence Number: 188
    Author1: Hoffman, Lance J
    Date: 1977
    Title: Modern Methods for Computer Security and Privacy
    Publisher: Englewood Cliffs, NJ: Prentice-Hall
    Comments: $17.95

    Bibliography Sequence Number: 189
    Author1: Kahn, David
    Date: 1978
    Title: Pictures Galore: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 2: 151
    References: 762 025 698

    Bibliography Sequence Number: 190
    Author1: Rubin, Frank
    Date: 1978
    Title: Computer Methods for Decrypting Multiplex Ciphers
    Periodical: Cryptologia
    Issue & Page numbers: 2: 152-160
    References: 084

    Bibliography Sequence Number: 191
    Author1: Winkel, Brian J
    Date: 1978
    Title: Casanova and the Beaufort Cipher
    Periodical: Cryptologia
    Issue & Page numbers: 2: 161-163

    Bibliography Sequence Number: 192
    Author1: Kruh, Louis
    Date: 1978
    Title: Cryptology as a Career
    Periodical: Cryptologia
    Issue & Page numbers: 2: 164-166

    Bibliography Sequence Number: 193
    Author1: Anonymous
    Date: 1978
    Title: Encryption Challenge
    Periodical: Cryptologia
    Issue & Page numbers: 2: 168-171
    References: 086

    Bibliography Sequence Number: 194
    Author1: Kruh, Louis
    Date: 1978
    Title: Cipher EquipmenTitle: DH-26 Handheld Encryption Machine
    Periodical: Cryptologia
    Issue & Page numbers: 2: 172-177
    References: 763 001 764

    Bibliography Sequence Number: 195
    Author1: Winkel, Brian J
    Date: 1978
    Title: A Tribute to Alf Monge
    Periodical: Cryptologia
    Issue & Page numbers: 2: 178-185

    Bibliography Sequence Number: 196
    Author1: Winkel, Brian J
    Date: 1978
    Title: There and There
    Periodical: Cryptologia
    Issue & Page numbers: 2: 186-194
    Keywords: RSA
    References: 698 758 759 765 062 154 162 378

    Bibliography Sequence Number: 197
    Author1: Costas, John P
    Date: 1979
    Title: Cryptography in the Field, Part 2: Using the Pocket Calculator
    Periodical: BYTE
    Issue & Page numbers: April 1979:144-165
    References: 018 025 026 027 004 007 005 028 001 029

    Bibliography Sequence Number: 198
    Author1: Meushaw, Robert V
    Date: 1979
    Title: The Standard Data Encryption Algorithm, Part 2
    Periodical: BYTE
    Issue & Page numbers: April 1979:110-126
    Keywords: DES
    References: 019 050 023 024

    Bibliography Sequence Number: 199
    Author1: Friedman, William F., editor
    Date: 19??
    Title: Cryptography and Cryptanalysis, Volume 2
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #6 $12.96
    References: 062

    Return to Cryptosystems Journal Home Page
    Next Page ("Bibliography Part 3 of 9")
    Previous Page ("Bibliography part 1 of 9")
    Copyright © 1996 Cryptosystems Journal.
    Most recent update on 12-JUN-96.