The Cryptosystems Journal Hypertext Bibliography of Classical Cryptology


    This bibliography was part of my (Tony Patti's) Master's Thesis (M.S. Computer & Information Sciences) entitled " An Operational, Computerized, Galois Field Cryptosystem with a Computerized, Cross-Referenced, and Annotated Bibliography of Cryptology ", which was completed in July 1981, and sponsored by Dr. Howard L. Morgan, at the Moore School of the University of Pennsylvania.

    The complete Bibliography comprises approximately 300,000 bytes and almost 9,000 lines which were typed entirely by hand.

    Bibliography Sequence Number: 001
    Author1: Gardner, Martin
    Date: 1977
    Title: Mathematical Games: A New Kind of Cipher That Would Take Millions of Years to Break
    Periodical: Scientific American
    Issue & Page numbers: 237, 2 (August):120-124,140
    Keywords: RSA
    Comments: Excellent
    References: 002 025 014

    Bibliography Sequence Number: 002
    Author1: Rivest, Ronald L
    Author2: Shamir, Adi
    Author3: Adleman, Leonard M
    Date: 1977
    Title: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    Publisher: MIT Laboratory for Computer Science Document MIT/LCS/TM-82
    Length: 15 pages
    Keywords: RSA
    Comments: Excellent - The basis for the August 1977 Scientific American article
    References: 004 007 092 009 010 011 012 013 014 016 015

    Bibliography Sequence Number: 003
    Author1: Hellman, Martin E
    Date: 1979
    Title: The Mathematics of Public-Key Cryptography
    Periodical: Scientific American
    Issue & Page numbers: August 1979:146-157,198
    Keywords: RSA
    References: 025 004 005 006

    Bibliography Sequence Number: 004
    Author1: Diffie, Whitfield
    Author2: Hellman, Martin E
    Date: 76
    Title: New Directions in Cryptography
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: Vol. IT-22, No. 6 (Nov):644-654
    Keywords: PKC
    Comments: "This paper examines several new possibilities in cryptography systems
    Comments: which require no prior key channel, unforgeable digital signatures, and
    Comments: the use of complexity theory to study the security of cryptographic
    Comments: systems." (006)
    References: 101 025 027 113 100 007 105 111 106 107 108 112 109 110

    Bibliography Sequence Number: 005
    Author1: Rivest, Ronald L
    Author2: Shamir, Adi
    3:Adleman, Leonard M
    Date: 1978
    Title: A Method for Obtaining Digital Signatures and Public Key Cryptosystems
    Periodical: CACM
    Issue & Page numbers: 21, 2 (Feb):120-126,179
    Keywords: RSA
    Comments: "This paper describes a public key cryptosystem based on exponentiation
    Comments: in modular arithmetic." (006)
    References: 004 112 007 092 101 009 010 111 011 012 013 014 016 015

    Bibliography Sequence Number: 006
    Author1: Diffie, Whitfield
    Author2: Hellman, Martin E
    Date: 79
    Title: Privacy and Authentication: An Introduction to Cryptography
    Periodical: Proceedings of the IEEE
    Issue & Page numbers: 67, 3 (March 1979):397-427
    Keywords: RSA
    Comments: Excellent
    References: 533 534 535 536 537 538 436 428 539 482 540 541 655 542 543 544 049 545 546 088 072 547 205 548 549 550 029 061 159 174 070 142 551 552 553 554 555 223 111 593 419 556 372 396 112 439 442 441 654 375 557 376 558 133 050 645 656 657 559 560 561 562 563 564 373 565 566 567 568 025 182 569 570 571 572 398 516 574 027 575 380 498 576 577 399 578 579 237 487 489 119 662 117 404 377 100 004 101 103 005 154 580 168 287 581 582 107 583 324 374 385 386 108 584 391 585 586 587 588 589 590 591 112 561 027 373 113 286 592 004 101 005 383 382 142 029 205 025 419 079 223 593 072 662 399 409 417 594 595 554 596 408 336 017 583 117 324 391 543 375 372 562 557 376 040 597 598 599 600 533 534 601 602 007 154 162 388 603 604 605 428 100 441 606 654 607 608 188 546 108 107 655

    Bibliography Sequence Number: 007
    Author1: Knuth, Donald E
    Date: 1969
    Title: Seminumerical Algorithms: The Art of Computer Programming, Volume 2
    Publisher: Reading MA: Addison Wesley
    Keywords: Background
    Keywords: GF
    Keywords: RANDOM
    Comments: Esp. Exercise 4.5.2.15
    Comments: esp. pages 363-378

    Bibliography Sequence Number: 008
    Author1: National Security Agency
    Date: 19??
    Title: Careers for Engineers, Mathematicians, Computer Scientists at the National Security Agency
    Publisher: n.p
    Keywords: NSA
    Keywords: GF
    Comments: especially page 5

    Bibliography Sequence Number: 009
    Author1: Miller, Gary L
    Date: 1975
    Title: Riemann's Hypothesis and Tests for Primality
    Periodical: Proceedings of the Seventh Annual ACM Symposium on the Theory of Computing
    Issue & Page numbers: 234-239
    Comments: held in Albuquerque, New Mexico
    Comments: not yet cross-referenced
    Comments: An extended version of this paper is available as Research Report
    Comments: CS-75-27 from the Department of Computer Science, University of Waterloo,
    Comments: Ontario, Canada (Oct. 1975)
    References: 110 025

    Bibliography Sequence Number: 010
    Author1: Niven, Ivan M
    Author2: Zuckerman, Herbert S
    Date: 60
    Title: An Introduction to the Theory of Numbers
    Publisher: NY: John Wiley & Sons
    Comments: U.P. Math-Physics Library 512.81/N6491/1960
    Comments: It appears that there is also a 1972 edition.

    Bibliography Sequence Number: 011
    Author1: Pollard, J M
    Date: 1974
    Title: Theorems on factorization and primality testing
    Periodical: Proc. Camb. Phil. Soc
    Issue & Page numbers: 521-528
    Keywords: RSA

    Bibliography Sequence Number: 012
    Author1: Potter, R J
    Date: 1977
    Title: Electronic Mail
    Periodical: Science
    Issue & Page numbers: 195, 4283 (18 March 1977):1160-1164
    Keywords: RSA

    Bibliography Sequence Number: 013
    Author1: Rabin, Michael O
    Date: 1976
    Title: Probabilistic Algorithms
    Periodical: in Algorithms and Complexity: Recent Results and New Directions; J.F. Traub (ed.), New YorKeywords:
    Academic Press
    Issue & Page numbers: 21-40
    Keywords: RSA
    Comments: edited by J F Traub

    Bibliography Sequence Number: 014
    Author1: Solovay, R
    Author2: Strassen, V
    Date: 77
    Title: A Fast Monte-Carlo Test for Primality
    Periodical: SIAM Journal on Computing
    Issue & Page numbers: March 1977:84-85
    Keywords: RSA
    Comments: not yet cross-referenced
    References: 025 010 646

    Bibliography Sequence Number: 015
    Author1: National Bureau of Standards
    Date: 1975
    Title: Federal Information Processing Data Encryption: Proposed Standard
    Periodical: Federal Register
    Issue & Page numbers: 40, 149 (1 Aug 1975):32395-32414
    Keywords: RSA
    Keywords: DES
    Comments: not yet cross-referenced

    Bibliography Sequence Number: 016
    Author1: National Bureau of Standards
    Date: 1975
    Title: Encryption Algorithm for Computer Data Protection: Requests for Comments
    Periodical: Federal Register
    Issue & Page numbers: 40, 52 (17 Mar):12067-12250
    Keywords: RSA
    Keywords: DES
    Comments: pages 12134-12139 are "Request for Comments"?
    Comments: Richard W. Roberts the author?

    Bibliography Sequence Number: 017
    Author1: Hill, Lester S
    Date: 1929
    Title: Cryptography in an Algebraic Alphabet
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 36:306-312
    Keywords: GF

    Bibliography Sequence Number: 018
    Author1: Costas, John P
    Date: 1979
    Title: Cryptography in the Field, Part
    Author1: An Overview
    Periodical: BYTE
    Issue & Page numbers: March 1979:56-64
    References: 197

    Bibliography Sequence Number: 019
    Author1: Meushaw, Robert V
    Date: 1979
    Title: The Standard Data Encryption Algorithm, Part 1
    Periodical: BYTE
    Issue & Page numbers: March 1979:66-74
    Keywords: DES
    References: 198 050

    Bibliography Sequence Number: 020
    Author1: Witt, Evans
    Date: 1978
    Title: Computers Spawn a New Brand of Crime
    Periodical: The Sunday Plain Dealer
    Issue & Page numbers: 5 Feb 1978:Four-5
    Keywords: RSA
    Keywords: NSA
    Keywords: DES
    Comments: Excellent

    Bibliography Sequence Number: 021
    Author1: Rivest, Ronald L
    Date: 1980
    Title: A Description of a Single-Chip Implementation of the RSA Cipher
    Periodical: Lambda
    Issue & Page numbers: I, 3 (fourth quarter):14-18
    Keywords: RSA
    Comments: very interesting description of hardware chip for RSA algorithm
    References: 367 226 244 256 004 006 001 368 056 369 005 021

    Bibliography Sequence Number: 022
    Author1: Shamir, Ali
    Date: 1977
    Title: Factoring Numbers in O(Log n) Arithmetic Steps
    Publisher: MIT/LCS/TM-91
    Length: 13
    Keywords: PRIMES
    References: 002 011 649 650 007 257

    Bibliography Sequence Number: 023
    Author1: National Bureau of Standards
    Date: 1977
    Title: Validating the Correctness of Hardware Implementation of the NBS Data Encryption Standard, NBS Special
    Publication 500-20
    Publisher: NBS
    Keywords: DES

    Bibliography Sequence Number: 024
    Author1: Katzan, H
    Date: 1977
    Title: The Standard Data Encryption Algorithm
    Publisher: NY: Petrocelli Books
    Keywords: DES

    Bibliography Sequence Number: 025
    Author1: Kahn, David
    Date: 1967
    Title: The Codebreakers: The Story of Secret Writing
    Publisher: NY: Macmillan
    Length: 1164 pages
    Keywords: GF
    Keywords: NSA
    Keywords: Historical
    Comments: Bought 29Jan79.
    Comments: Ninth Printing 1979
    Comments: "This is the most complete history of cryptology available, containing
    Comments: within its thousand pages material sufficient to reward several careful
    Comments: readings. As a technical reference, it leaves much to be desired,
    Comments: because it is concerned more with the influence of cryptology than with
    Comments: its technical development, though much of the latter comes through.
    Comments: despite its nontechnical orientation, a lot can be learned from a
    Comments: careful study of the many details assembled. In addition, Kahn conveys
    Comments: a valuable feel for the subject, through the experience of past
    Comments: cryptologists." (006)
    Comments: Especially interesting:
    Comments: pp. 99-105 on cryptanalytic letter frequency analysis
    Comments: pp. 189-213 on telegraphy and cryptography (chapter 6)
    Comments: pp. 298-299 on radio and cryptanalysis
    Comments: pp. 374-386 on William Friedman and his writings. especially his
    Comments: Kappa Test, Kullbach's Phi and Chi Tests, and
    Comments: Kasiski's Determination.
    Comments: pp. 398-401 on One-Time Systems
    Comments: pp. 404-410 on Hill's Algebraic Multigraphic Substitutions
    Comments: pp. 410-415 on rotor principles
    Comments: pp. 522-523 on invisible inks
    Comments: pp. 672-736 on NSA
    References: 029

    Bibliography Sequence Number: 026
    Author1: Vernam, G S
    Date: 1926
    Title: Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications
    Periodical: Journal of the American Institute of Electrical Engineers
    Issue & Page numbers: 45:109-115
    Keywords: RANDOM
    References: 059

    Bibliography Sequence Number: 027
    Author1: Shannon, Claude E
    Date: 1949
    Title: Communication Theory of Secrecy Systems
    Periodical: Bell System Technical Journal
    Issue & Page numbers: 28 (October):656-715
    Keywords: Information Theory
    Keywords: Classic
    Comments: Classic and Excellent
    Comments: "The material in this paper appeared originally in a confidential
    Comments: report 'A Mathematical Theory of Cryptography' dated Sept. 1, 1945,
    Comments: which has since been declassified" (page 656)
    Comments: "This is a classic paper in which Shannon develops the information
    Comments: theoretic foundation for classical cryptanalysis, characterizes the
    Comments: systems which are unbreakable for information theoretic reasons, and
    Comments: outlines the construction of product ciphers." (006)
    References: 389 029 078 632 633 026 017 043 464 634

    Bibliography Sequence Number: 028
    Author1: Gait, J
    Date: 1977
    Title: A New Nonlinear Pseudorandom Number Generator
    Periodical: IEEE Transactions on Software Engineering
    Issue & Page numbers: Vol SE-3, No. 5 (Sep 1977):359-363
    Keywords: RSA
    Keywords: RANDOM
    References: 027 007 050 114 016 116 117 118 119 120

    Bibliography Sequence Number: 029
    Author1: Gaines, Helen Fouche
    Date: 1956
    Title: Cryptanalysis: A Study of Ciphers and their Solutions
    Publisher: NY: Dover
    Keywords: Classical
    Comments: U.P. Moore Library EE/510.4/G127
    Comments: Formerly Published under the title: "Elementary Cryptanalysis"
    Comments: "This is the most readily available work on cryptanalysis, and gives
    Comments: extensive coverage of classical systems." (006)

    Bibliography Sequence Number: 030
    Author1: Gersho, Allen
    Date: 1978
    Title: In this Issue
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):1
    Comments: introduction to this interesting issue

    Bibliography Sequence Number: 031
    Author1: Gersho, Allen
    Date: 1978
    Title: Communications Privacy
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):2

    Bibliography Sequence Number: 032
    Author1: Hellman, Martin E
    Date: 1978
    Title: ComSoc Spotlight
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):3-4

    Bibliography Sequence Number: 033
    Author1: Davis, Ruth M
    Date: 1978
    Title: The Data Encryption Standard in Perspective
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):5-9
    Keywords: DES

    Bibliography Sequence Number: 034
    Author1: Morris, Robert
    Date: 1978
    Title: The Data Encryption Standard -- Retrospective and Prospects
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):11-14
    Keywords: DES
    References: 424 133 112 040 376 425 426 391 015 270 427

    Bibliography Sequence Number: 035
    Author1: Campbell, Carl M
    Date: 1978
    Title: Design and Specification of Cryptographic Capabilities
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):15-19
    Keywords: DES
    References: 428

    Bibliography Sequence Number: 036
    Author1: Adleman, Leonard M
    Author2: Rivest, Ronald L
    Date: 78
    Title: The Use of Public Key Cryptography in Communication System Design
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):20-23
    Keywords: RSA
    References: 429 004 372 378 383 005 430

    Bibliography Sequence Number: 037
    Author1: Hellman, Martin E
    Date: 1978
    Title: An Overview of Public Key Cryptography
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):24-31
    Keywords: RSA
    References: 112 428 431 004 101 005 383 382 007 432 111 433

    Bibliography Sequence Number: 038
    Author1: Branstad, Dennis K
    Date: 1978
    Title: Security of Computer Communication
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):33-40
    Keywords: DES
    References: 436 428 372 437 438 050 004 112 439 440 441 442 645 444 002 445

    Bibliography Sequence Number: 039
    Author1: Orceyre, Michael J
    Author2: Heller, Ralph M
    Date: 78
    Title: An Approach to Secure Voice Communication Based on the Data Encryption Standard
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):41-50
    Keywords: DES
    References: 050 038 431 380

    Bibliography Sequence Number: 040
    Author1: U.S. Senate Select Committee on Intelligence
    Date: 1978
    Title: Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):53-55
    Keywords: DES
    Comments: Also reprinted in Cryptologia Author2: 387-389

    Bibliography Sequence Number: 041
    Author1: Hill, Sandy
    Date: 1978
    Title: Gentle Diversions
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6 (Nov):56-58
    References: 025 142 434 088 435

    Bibliography Sequence Number: 042
    Author1: Dickson, Leonard E
    Date: 1958
    Title: Linear Groups with an Exposition of the Galois Field Theory
    Publisher: NY: Dover
    Keywords: GF
    Comments: U. or Pa. Math Library Number 512.86/D564.2/1958

    Bibliography Sequence Number: 043
    Author1: Hill, Lester S
    Date: 1931
    Title: Concerning Certain Linear Transformation Apparatus of Cryptography
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 38:135-154
    Keywords: GF

    Bibliography Sequence Number: 044
    Author1: IBM
    Date: 19??
    Title: "A Cryptographic Management Scheme for Implementing the Data Encryption Standard"
    Periodical: IBM Systems Journal
    Issue & Page numbers: Vol. 17 No. 2
    Keywords: DES
    Comments: Entire issue is $1.75
    Comments: Article reprint is $.50 as order # G321-5066
    Comments: from IBM Systems Journal Reprints
    Comments: Armonk, NY 10504

    Bibliography Sequence Number: 045
    Author1: Schechter, Bruce
    Date: 1981
    Title: A Prime Discovery
    Periodical: Discover
    Issue & Page numbers: 2, 1 (Jan):30-31
    Keywords: primes
    Comments: describes Len Adleman's new primality algorithm (see Ref. 367)
    References: 367

    Bibliography Sequence Number: 046
    Author1: Denning, Peter J
    Date: 1979
    Title: Editor's Overview -- Special Section of Data Encryption
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 4 (Dec):283
    References: 050 001

    Bibliography Sequence Number: 047
    Author1: Bright, Herbert S
    Author2: Enison, Richard L
    Date: 79
    Title: Quasi-Random Number Sequences from a Long-Period TLP Generator with Remarks on Application to
    Cryptography
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 4 (Dec):357-370
    Keywords: random
    References: 396 145 322 585 323 505 506 507 508 509 510 511 512 028 513 514 515 516 517 518 007 519 520 521 522 114 523 524 525 050 027 417 526 527 528 529 530 026 531 532 422 423

    Bibliography Sequence Number: 048
    Author1: Shamir, Ali
    Date: 1979
    Title: How to Share a Secret
    Periodical: CACM
    Issue & Page numbers: 22, 11 (Nov):612-613
    References: 109 370 007 005

    Bibliography Sequence Number: 049
    Author1: Needham, Roger M
    Author2: Schroeder, Michael D
    Date: 78
    Title: Using Encryption for Authentication in Large Networks of Computers
    Periodical: CACM
    Issue & Page numbers: 21, 12 (Dec):993-998
    Keywords: RSA
    Keywords: Applications
    Comments: AbstracTitle: "Use of encryption to achieve authenticated communication in
    Comments: computer networks is discussed. Example protocols are presented for the
    Comments: establishment of authenticated connections, for the management of authenticated
    Comments: mail, and for signature verification and document integrity guarantee.
    Comments: Both conventional and public-key encryption algorithms are considered as
    Comments: the basis for protocols.
    References: 436 428 100 583 482 661 050 662 005

    Bibliography Sequence Number: 050
    Author1: National Bureau of Standards
    Date: 1977
    Title: Data Encryption Standard, FIPS Publication No. 46
    Publisher: NBS
    Keywords: DES
    Keywords: RANDOM
    Comments: NTIS for $4

    Bibliography Sequence Number: 051
    Author1: Denning, Dorothy E
    Date: 1979
    Title: Secure Personal Computing in an Insecure Network
    Periodical: CACM
    Issue & Page numbers: 22, 8 (Aug):476-482
    Keywords: RSA
    References: 004 663 481 664 485 486 056 101 383 665 050 049 492 005 666 497 057

    Bibliography Sequence Number: 052
    Author1: Morris, Robert
    Author2: Thompson, Ken
    Date: 79
    Title: Password Security: A Case History
    Periodical: CACM
    Issue & Page numbers: 22, 11 (Nov):595-597
    Comments: Abstract: "This paper describes the history of the design of the
    Comments: password security scheme on a remotely accessed time-sharing system.
    Comments: The present design was the result of countering observed attempts to
    Comments: penetrate the system. The result is a compromise between extreme
    Comments: security and ease of use."
    References: 667 016 106

    Bibliography Sequence Number: 053
    Author1: Peleg, Shmuel
    Author2: Rosenfeld, Azriel
    Date: 79
    Title: Breaking Substitution Ciphers Using a Relaxation Algorithm
    Periodical: CACM
    Issue & Page numbers: 22, 11 (Nov):598-605
    References: 029 142

    Bibliography Sequence Number: 054
    Author1: Gries, David
    Author2: Misra, Jayadev
    Date: 78
    Title: A Linear Sieve Algorithm for Finding Prime Numbers
    Periodical: Communication of the ACM
    Issue & Page numbers: 21, 12 (Dec 1978):999-1003
    Keywords: primes
    References: 007 258 637 009

    Bibliography Sequence Number: 055
    Author1: Denning, Dorothy E
    Author2: Denning, Peter J
    Date: 79
    Title: Data Security
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 3 (Sep):227-249
    Keywords: security
    References: 057 004 001 188 485 056 025 049 492 608 051 439 670 380 052 050 487 666 107 106 112 188 481 383 005 494 413 664

    Bibliography Sequence Number: 056
    Author1: Lempel, Abraham
    Date: 1979
    Title: Cryptology in Transition
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 4 (Dec):285-303
    Keywords: RSA
    References: 109 371 372 004 112 006 372 373 001 374 375 113 025 110 007 376 377 378 379 380 381 382 101 383 009 133 050 384 385 386 111 013 387 005 162 388 389 027 390 154 142 391 014 040 392

    Bibliography Sequence Number: 057
    Author1: Simmons, Gustavus J
    Date: 1979
    Title: Symmetric and Asymmetric Encryption
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 4 (Dec):305-330
    References: 393 036 394 336 395 396 145 397 090 004 112 107 117 029 028 001 374 398 399 400 037 401 003 402 017 043 188 403 404 025 110 061 056 405 406 407 408 101 383 119 133 049 409 111 108 103 005 410 411 412 413 389 027 414 154 415 416 417 418 419 026 106 420 421 422 423

    Bibliography Sequence Number: 058
    Author1: Popek, Gerald J
    Author2: Kline, Charles S
    Date: 79
    Title: Encryption and Secure Computer Networks
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 11, 4 (Dec):331-356
    References: 109 473 436 428 474 475 476 100 004 112 006 477 107 478 479 117 324 480 481 482 483 484 433 486 056 487 380 488 101 489 050 655 049 490 491 492 493 494 495 002 005 496 497 498 057 499

    Bibliography Sequence Number: 059
    Author1: Hitt, Parker
    Date: 1916
    Title: Manual for the Solution of Military Ciphers
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #1 $9.76
    Comments: 1977 reprint of 1916 publication: Fort Leavenworth

    Bibliography Sequence Number: 060
    Author1: Friedman, William F
    Date: 1924
    Title: Elements of Cryptanalysis
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #3 $12.80
    Comments: 1976 reprint of 1924 War Department Training Pamphlet No. 3

    Bibliography Sequence Number: 061
    Author1: Kullback, Solomon
    Date: 1938
    Title: Statistical Methods in Cryptanalysis
    Publisher: Laguna Hills, CA: Aegean Park Press
    Keywords: Classical
    Comments: Aegean #4 $14.56
    Comments: 1976 reprint of 1938 Technical Paper of the Signal Intelligence Service
    Comments: NSA reprint 1967
    Comments: "This reprint of a 1938 paper is an extensive exposition of the use
    Comments: of correlation in cryptanalysis." (006)

    Bibliography Sequence Number: 062
    Author1: Friedman, William F
    Date: 19??
    Title: Cryptography and Cryptanalysis
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #5 $12.96
    References: 199

    Bibliography Sequence Number: 063
    Author1: Friedman, William F
    Date: 1935
    Title: Elememtary Military Cryptography
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #7 $9.76
    Comments: 1976 Reprint of 1935 Special Text No. 165 in Army Extension Courses

    Bibliography Sequence Number: 064
    Author1: Friedman, William F
    Date: 1944
    Title: Advanced Military Cryptography
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #8 $11.84
    Comments: 1976 reprint of TM 11-485, Washington: War Department

    Bibliography Sequence Number: 065
    Author1: Flicke, Wilhelm F
    Date: 1954
    Title: War Secrets in the Ether, Volume 1
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #9
    Comments: trans. Ray W. Pettengill
    Comments: 1977 reprint of 1954 NSA publication. In addition to Aegean, available
    Comments: from National Archives as No. SRH-002 for $.20 * 312 pages (both volumes?)
    References: 200

    Bibliography Sequence Number: 066
    Author1: Friedman, William F
    Date: 19??
    Title: Solving German Codes in World War I
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #11 $13.28

    Bibliography Sequence Number: 067
    Author1: British War Office
    Date: 19??
    Title: Manual of Cryptography
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #28 $11.68

    Bibliography Sequence Number: 068
    Author1: Friedman, William F
    Date: 19??
    Title: History of the Use of Codes
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #12 $9.12

    Bibliography Sequence Number: 069
    Author1: Friedman, William F
    Author2: Mendelsohn, Charles J
    Date: 1938
    Title: The Zimmerman Telegram of January 16, 1917 and its Cryptographic Background
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: 1977 reprint
    Comments: Aegean #13 $6.56
    Comments: 1976 reprint of 1938 Office of the Chief Signal Officer publication

    Bibliography Sequence Number: 070
    Author1: Sacco, General Luigi
    Date: 1936
    Title: Manual of Cryptography
    Publisher: Laguna Hills, CA: Aegean Park Press
    Keywords: Classical
    Comments: Aegean #14 $15.36
    Comments: Aegean is 1977 reprint of translated original Italian of 1936
    Comments: "Manuale di crittografia, 2e edition riveduta e aumenta, Rome, Italy
    Comments: 1936. (Translations, French-Manuel de Cryptographie, from 3rd Italian
    Comments: edition by J. Bres, reviewed by the author with a preface by R. Leger,
    Comments: Paris, France: Payot, 1951; English-Manual of Cryptography, Laguna
    Comments: Hills, CA: Aegean Park Press, 1977.)
    Comments: This work is noted for being particularly readable. It is similar
    Comments: in scope to Eyraud [547] or Friedman [205], but slightly earlier in date." (006)

    Bibliography Sequence Number: 071
    Author1: unknown
    Date: 19??
    Title: Origin and Development of the Army Security Agency 1917-1947
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #16 $7.04

    Bibliography Sequence Number: 072
    Author1: Barker, Wayne G
    Date: 1977
    Title: Cryptanalysis of the Hagelin Cryptograph
    Publisher: Laguna Hills, CA: Aegean Park Press
    Keywords: Classical
    Comments: Aegean #17 $16.48

    Bibliography Sequence Number: 073
    Author1: Glyden
    Date: 19??
    Title: The Contribution of the Cryptographic Bureaus in the World War
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #18 $11.20

    Bibliography Sequence Number: 074
    Author1: unknown
    Date: 19??
    Title: History of Codes and Ciphers in the United States Prior to World War I
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #20 $13.44

    Bibliography Sequence Number: 075
    Author1: unknown
    Date: 19??
    Title: History of Codes and Ciphers in the United States During World War I
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #21 $15.68

    Bibliography Sequence Number: 076
    Author1: unknown
    Date: 19??
    Title: History of Codes and Ciphers in the United States During the Period Between the World Wars, Part I 1919-1929
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #22 $15.68

    Bibliography Sequence Number: 077
    Author1: Barker, Wayne G
    Date: 1975
    Title: Cryptanalysis of the Simple Substitution Cipher with Word Divisions - Using Non-Pattern Word Lists
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #2 $9.76

    Bibliography Sequence Number: 078
    Author1: Givierge, General Marcel
    Date: 19??
    Title: Course in Cryptography
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #19 $15.36

    Bibliography Sequence Number: 079
    Author1: Friedman, William F
    Date: 19??
    Title: The Riverbank Publications, Volume 1
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #23 $13.44
    References: 202 203

    Bibliography Sequence Number: 080
    Author1: Barker, Wayne G
    Date: 19??
    Title: Cryptanalysis of an Enciphered Code Problem -- Where an "Additive" Method of Encipherment has been Used
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #26 $18.24

    Bibliography Sequence Number: 081
    Author1: D'Imperio, M. E
    Date: 19??
    Title: The Voynich Manuscript -- An Elegant Enigma
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #27 $13.44

    Bibliography Sequence Number: 082
    Author1: McCalla, Thomas R
    Date: 1968
    Title: Introduction to Numerical Methods and FORTRAN Programming
    Publisher: NY: John Wiley
    Keywords: GF
    Comments: Moore School Library Number QA/297/M25
    Comments: especially chapter 5 - Matrix Methods and Systems of Linear Algebraic Equations

    Bibliography Sequence Number: 083
    Author1: Winkel, Brian J
    Date: 1977
    Title: Why Cryptologia
    Periodical: Cryptologia
    Issue & Page numbers: 1-3
    References: 025 675

    Bibliography Sequence Number: 084
    Author1: Mellen, Greg E
    Author2: Greenwood, Lloyd
    Date: 77
    Title: The Cryptology of Multiplex Systems, Part I
    Periodical: Cryptologia
    Issue & Page numbers: 4-16
    References: 025 079 676 747 029 285 064 061

    Bibliography Sequence Number: 085
    Author1: Harris, Barbara
    Date: 1977
    Title: A Different Kind of Column
    Periodical: Cryptologia
    Issue & Page numbers: 17-19

    Bibliography Sequence Number: 086
    Author1: Reeds, James A
    Date: 1977
    Title: "Cracking" a Random Number Generator
    Periodical: Cryptologia
    Issue & Page numbers: 20-26
    References: 007

    Bibliography Sequence Number: 087
    Author1: Kahn, David
    Date: 1977
    Title: The Biggest Bibliography
    Periodical: Cryptologia
    Issue & Page numbers: 27-42
    References: 088

    Bibliography Sequence Number: 088
    Author1: Shulman, David
    Date: 1976
    Title: An Annotated Bibliography of Cryptography
    Publisher: NY: Garland Publishing Co
    Length: xvi+372
    Keywords: Biography
    Comments: Garland Reference Library of the Humanities, Volume 37 for $35.00
    Comments: "This bibliography has almost no overlap with the present one. It
    Comments: offers the most extensive coverage of the classical literature available." (006)

    Bibliography Sequence Number: 089
    Author1: Shulman, David
    Date: 1977
    Title: A Reply to Kahn's Review
    Periodical: Cryptologia
    Issue & Page numbers: 43-45
    Comments: not xrefed

    Bibliography Sequence Number: 090
    Author1: Deavours, Cipher A
    Date: 1977
    Title: Unicity Points in Cryptanalysis
    Periodical: Cryptologia
    Issue & Page numbers: 46-68
    References: 027 113 025 419 677

    Bibliography Sequence Number: 091
    Author1: Kruh, Louis
    Date: 1977
    Title: Cipher EquipmenTitle: Cipher Disks
    Periodical: Cryptologia
    Issue & Page numbers: 69-75
    References: 679 066 062 025 121 680 681 682 683 008 684 685 686 687 688

    Bibliography Sequence Number: 092
    Author1: Levine, Jack
    Author2: Brawley, Joel V
    Date: 77
    Title: Some Cryptographic Applications of Permutation Polynomials
    Periodical: Cryptologia
    Issue & Page numbers: 76-92
    Keywords: GF
    Keywords: RSA
    References: 337 334 613 614 615 616 617 618 619 620 621 622 042 623 624 625 626 627 594 628 629 630

    Bibliography Sequence Number: 093
    Author1: Winkel, Brian
    Date: 1977
    Title: Poe Challenge Cipher Finally Broken
    Periodical: Cryptologia
    Issue & Page numbers: 93-96
    References: 062 025 823 142 824

    Bibliography Sequence Number: 094
    Author1: Hiatt, Blanchard
    Date: 1977
    Title: Age of Decipherment
    Periodical: Cryptologia
    Issue & Page numbers: 101-105

    Bibliography Sequence Number: 095
    Author1: Hiatt, Blanchard
    Date: 1977
    Title: "Count Forward Three Score and Ten..."
    Periodical: Cryptologia
    Issue & Page numbers: 106-115

    Bibliography Sequence Number: 096
    Author1: Schatz, Bruce R
    Date: 1977
    Title: Automated Analysis of Cryptograms
    Periodical: Cryptologia
    Issue & Page numbers: 116-142
    References: 077 825 504 552 117 324 063 689 029 690 580 826 827 241 828 059 025 027 829 142 443 419 556

    Bibliography Sequence Number: 097
    Author1: Kruh, Louis
    Date: 1977
    Title: Cipher EquipmenTitle: Converter M-325(T)
    Periodical: Cryptologia
    Issue & Page numbers: 143-149
    References: 691 692 693 751

    Bibliography Sequence Number: 098
    Author1: Mellen, Greg E
    Author2: Greenwood, Lloyd
    Date: 77
    Title: The Cryptology of Multiplex Systems, Part II
    Periodical: Cryptologia
    Issue & Page numbers: 150-165
    References: 142 025

    Bibliography Sequence Number: 099
    Author1: Kahn, David
    Date: 1977
    Title: "Get out your Secret Decoders, Boys and Girls ...."
    Periodical: Cryptologia
    Issue & Page numbers: 166
    References: 121

    Bibliography Sequence Number: 100
    Author1: Diffie, Whitfield
    Author2: Hellman, Martin E
    Date: 1976
    Title: Multiuser Cryptographic Techniques
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 45:109-112
    Keywords: RSA
    Keywords: PKC
    Comments: U.P. Moore Library: 510.78/J667
    Comments: "This paper describes two approaches to supplying secure first contact
    Comments: between users of a computer network, without sending keys along outside
    Comments: channels, and some related problems." (006)
    References: 538 004 107 117 108

    Bibliography Sequence Number: 101
    Author1: Merkle, Ralph C
    Date: 1978
    Title: Secure Communication over insecure channels
    Periodical: CACM
    Issue & Page numbers: 21 (Apr): 294-299
    Keywords: PKC
    Comments: "This paper introduced the concept of public key distribution independently
    Comments: of Diffie and Hellman" (006)
    References: 004 117 025 383 005 027 575

    Bibliography Sequence Number: 102
    Author1: Sperry Rand Corporation
    Date: 1969
    Title: Direct Access Storage Device Concepts
    Publisher: Sperry Rand Corporation
    Length: pages A-2 and A-3
    Keywords: primes
    Comments: These two pages are a list of the first 10,000 prime numbers (1 to 104,723)
    Comments: Document UE-604

    Bibliography Sequence Number: 103
    Author1: Rabin, Michael O
    Date: 1979
    Title: Digitalized signatures and public-key functions as intractable as factorization
    Periodical: MIT/LCS/TR-212
    Keywords: RSA
    Comments: "A variation of the RSA scheme with E=2 is shown to have cryptanalytic
    Comments: difficulty equivalent to factoring." (006)
    References: 658 004 013 659 660 005 014

    Bibliography Sequence Number: 104
    Author1: Postikov, M M
    Date: 1961
    Title: Fundamentals of Galois' Theory
    Publisher: Delhi, India: Hindustan Publishing Corporation
    Keywords: GF
    Comments: Moore School Library Number 512.86/P845.EH

    Bibliography Sequence Number: 105
    Author1: Knuth, Donald E
    Date: 1973
    Title: Sorting and Searching: The Art of Computer Programming, Volume 3
    Publisher: Reading MA: Addison Wesley
    Keywords: background

    Bibliography Sequence Number: 106
    Author1: Wilkes, M. V
    Date: 1975
    Title: Time-Sharing Computing Systems, Third Edition
    Publisher: NY: Elsevier
    Comments: orig. publ. 1968
    References: 004

    Bibliography Sequence Number: 107
    Author1: Evans Jr., A
    Author2: Kantrowitz, W
    Author3: Weiss, E
    Date: 1974
    Title: A User Authentication System Not Requiring Secrecy in the Computer
    Periodical: CACM
    Issue & Page numbers: 17 (Aug): 437-442
    Keywords: system design and implementation
    Comments: "This paper describes a oneway function obtained by using a transformamtion
    Comments: similar to the IBM Lucifer system and using the argument as both input and key." (006)

    Bibliography Sequence Number: 108
    Author1: Purdy, George B
    Date: 1974
    Title: A high-security log-in procedure
    Periodical: CACM
    Issue & Page numbers: (Aug): 442-445
    Keywords: system design and implementation
    Comments: "This paper studies the use of a polynomial of very high degree over
    Comments: a finite field as a one-way function. This function has subsequently
    Comments: been used to protect the passwords on the BBN TENEX system." (006)

    Bibliography Sequence Number: 109
    Author1: Aho, A V
    Author2: Hopcroft, J E
    Author3: Ullman, J D
    Date: 1974
    Title: The Design and Analysis of Computer Algorithms
    Publisher: Reading, MA: Addison-Wesley
    Keywords: background

    Bibliography Sequence Number: 110
    Author1: Karp, R M
    Date: 1972
    Title: Reducibility among Combinatorial Problems
    Periodical: in Complexity of Computer Computations; R.E. Miller et al Ed.;NY: Plenum
    Issue & Page numbers: 85-104
    Keywords: RSA

    Bibliography Sequence Number: 111
    Author1: Pohlig, Stephen C
    Author2: Hellman, Martin E
    Date: 78
    Title: An improved algorithm for computing logarithms in GF(p) and its cryptographic significance
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-24, 1 (Jan):106-110
    Keywords: Cryptanalysis
    Keywords: GF
    Comments: Abstract - A cryptographic system is described which is secure if and
    Comments: only if computing logarithms ober GF(p) is infeasible. Previously published
    Comments: algorithms for computing this function require O(Publisher: *.5) complexity in
    Comments: both time and space. An improved algorithm is derived which requires
    Comments: O(log**2 p) complexity if p-1 has only small prime factors. Such
    Comments: values of p must be avoided in the cryptosystem. Constructive uses for
    Comments: the new algorithm are also described.
    Comments: "A discussion of a cryptographic system with a high degree of
    Comments: mathematical structure and simplicity." (006)

    Bibliography Sequence Number: 112
    Author1: Diffie, Whitfield
    Author2: Hellman, Martin E
    Date: 77
    Title: Exhaustive Cryptanalysis of the NBS data encryption standard
    Periodical: Computer
    Issue & Page numbers: 10 (June): 74-84
    Keywords: DES
    Comments: "This paper gives a detailed cost estimate for the construction of
    Comments: a highly parallel special purpose computer to break the DES in one day." (006)
    References: 016 015 562 004 643 644 645 375 133 399 027 113 572

    Bibliography Sequence Number: 113
    Author1: Hellman, Martin E
    Date: 1977
    Title: An extension of the Shannon theory approach to Cryptography
    Periodical: IEEE Transactions on Information Theory, Sep. 1975
    Issue & Page numbers: IT-23, 3 (May):289-294
    Comments: Abstract - Shannons information-theoretic approach to cryptography is
    Comments: reviewed and extended. It is shown that Shannons random cipher model
    Comments: is conservative in that a randomly chosen cipher is essentially the worst
    Comments: possible. This is in contrast with error-correcting codes where a randomly
    Comments: chosen code is essentially the best possible. The concepts of mathching
    Comments: a cipher to a language and of the trade-off between local and global
    Comments: uncertainty are also developed.

    Bibliography Sequence Number: 114
    Author1: MacLaren, M. D
    Author2: Marsaglia, G
    Date: 65
    Title: Uniform random number generators
    Periodical: Journal of the ACM
    Issue & Page numbers: 12: 83-89
    Keywords: background
    Keywords: RANDOM

    Bibliography Sequence Number: 115
    Author1: Yao, Andrew
    Date: 1977
    Title: Probabilistic ComputationBibliography Sequence Number: Toward a Unified Measure of Complexity
    Periodical: 18th Annual Symposium on Foundations of Computer Science
    Issue & Page numbers: 222-227
    Keywords: Complexity

    Bibliography Sequence Number: 116
    Author1: Blinchikoff, H
    Author2: Zverov, Z
    Date: 76
    Title: Filtering in the Time and Frequency Domains
    Publisher: NY: Wiley
    Keywords: Misc.?

    Bibliography Sequence Number: 117
    Author1: Feistel, Horst
    Date: 1973
    Title: Cryptography and Computer Privacy
    Periodical: Scientific American
    Issue & Page numbers: 228:15-23
    Keywords: Popular
    Comments: "This article gives the most readable account of the operation of
    Comments: the IBM Lucifer cipher." (006)

    Bibliography Sequence Number: 118
    Author1: Meyer, Carl H
    Date: 1974
    Title: Enciphering Data for Secure Transmission
    Periodical: Computer Design
    Issue & Page numbers: ApriIssue & Page numbers: 129-134

    Bibliography Sequence Number: 119
    Author1: Meyer, Carl H
    Author2: Tuchman, Walter L
    Date: 72
    Title: Pseudo-random codes can be cracked
    Periodical: Electronic Design
    Issue & Page numbers: 20, 23 (9 Nov):74-76

    Bibliography Sequence Number: 120
    Author1: Lehmer, D H
    Date: 1951
    Title: article name?
    Periodical: Proc. 2nd Symp. Large Scale Digital Computing Mach
    Issue & Page numbers: 141-146
    Comments: Harvard Univ.: Cambridge, MA

    Bibliography Sequence Number: 121
    Author1: Lesser, Robert
    Date: 1975
    Title: A Celebration of Comic Art and Memorabilia
    Publisher: NY: Hawthorn Books
    Length: 292 pages

    Bibliography Sequence Number: 122
    AuthorAuthor1: Deavours, Cipher A
    Date: 1977
    Title: Analysis of the Hebern Cryptograph using Isomorphs
    Periodical: Cryptologia
    Issue & Page numbers: 1: 167-185
    References: 695 696 025

    Bibliography Sequence Number: 123
    Author1: Reeds, James A
    Date: 1977
    Title: Rotor Algebra
    Periodical: Cryptologia
    Issue & Page numbers: 1: 186-194
    References: 122 159 174 070

    Bibliography Sequence Number: 124
    Author1: Penney, Walter
    Date: 1977
    Title: Grille Reconstruction
    Periodical: Cryptologia
    Issue & Page numbers: 1: 195-200
    References: 151

    Bibliography Sequence Number: 125
    Author1: Kahn, David
    Date: 1977
    Title: The Significance of COdebreaking and Intelligence in Allied Strategy and Tactics
    Periodical: Cryptologia
    Issue & Page numbers: 1: 209-222
    References: 698 025

    Bibliography Sequence Number: 126
    Author1: Deavours, Cipher A
    Date: 1977
    Title: The Kappa Test
    Periodical: Cryptologia
    Issue & Page numbers: 1: 223-231
    References: 025 061

    Bibliography Sequence Number: 127
    Author1: Winkel, Brian J
    Date: 1977
    Title: Word Ways, A Journal Worth Going Your Way
    Periodical: Cryptologia
    Issue & Page numbers: 1: 232-233

    Bibliography Sequence Number: 128
    Author1: Reeds, James A
    Date: 1977
    Title: Entropy Calculations and Particular Methods of Cryptanalysis
    Periodical: Cryptologia
    Issue & Page numbers: 1: 235-254
    References: 205 113 025 699 027 700

    Bibliography Sequence Number: 129
    Author1: Kruh, Louis
    Date: 1977
    Title: Cipher EquipmenTitle: Hagelin Pocket Cryptographer, Type CD-57
    Periodical: Cryptologia
    Issue & Page numbers: 1: 255-260
    References: 701

    Bibliography Sequence Number: 130
    Author1: Leighton, Albert C
    Date: 1977
    Title: "The Earliest Use of a Dot Cipher"
    Periodical: Cryptologia
    Issue & Page numbers: 1: 261-274
    References: 025

    Bibliography Sequence Number: 131
    Author1: Royal Canadian Mint
    Date: 1977
    Title: DPEPE DPJO: A Canadian Coin Piece With a Message
    Periodical: Cryptologia
    Issue & Page numbers: 1: 275-277

    Bibliography Sequence Number: 132
    Author1: Deavours, Cipher A
    Date: 1977
    Title: Kullback's "Statistical Methods of Cryptanalysis" - Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 1: 278-280
    References: 061

    Bibliography Sequence Number: 133
    Author1: Morris, Robert
    Author2: Sloane, Neil J. A
    Author3: Wyner, Aaron D
    Date: 1977
    Title: Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard
    Periodical: Cryptologia
    Issue & Page numbers: 1: 281-291
    Keywords: DES
    References: 702 427 428 396 703 551 270 112 107 583 117 704 324 705 580 553 025 557 558 489 119 016 108 027 391 708 543 419 106 562

    Bibliography Sequence Number: 134
    Author1: National Bureau of Standards
    Date: 1977
    Title: Proposed Federal Information Processing Data Encryption Standard
    Periodical: Cryptologia
    Issue & Page numbers: 1: 292-306
    Keywords: DES
    References: 016

    Bibliography Sequence Number: 135
    Author1: Winkel, Brian J
    Date: 1977
    Title: Epilogue
    Periodical: Cryptologia
    Issue & Page numbers: 1: 309
    References: 093

    Bibliography Sequence Number: 136
    Author1: Deavours, Cipher A
    Date: 1977
    Title: The Ithaca Connection: Computer Cryptography in the Making
    Periodical: Cryptologia
    Issue & Page numbers: 1: 312-317
    References: 001 004 709 110

    Bibliography Sequence Number: 137
    Author1: Winkel, Brian J
    Date: 1977
    Title: Poe Challenge Cipher Solutions
    Periodical: Cryptologia
    Issue & Page numbers: 1: 318-325

    Bibliography Sequence Number: 138
    Author1: Eckler, A. Ross
    Date: 1977
    Title: A Rapid Yes-No Computer-Aided Communicator
    Periodical: Cryptologia
    Issue & Page numbers: 1: 326-333
    References: 710 711 464

    Bibliography Sequence Number: 139
    Author1: Kruh, Louis
    Date: 1977
    Title: Cipher Equipment: MA4210 Alphanumeric Pocket Cipher
    Periodical: Cryptologia
    Issue & Page numbers: 1: 334-336

    Bibliography Sequence Number: 140
    Author1: Kahn, David
    Date: 1977
    Title: Ecclesiastical Cryptography: A Review
    Periodical: Cryptologia
    Issue & Page numbers: 1: 337

    Bibliography Sequence Number: 141
    Author1: Brawley, Joel V
    Author2: Levine, Jack
    Date: 77
    Title: Equivalences of Vigenere Systems
    Periodical: Cryptologia
    Issue & Page numbers: 1: 338-361
    References: 712 713 714 029 025 142

    Bibliography Sequence Number: 142
    Author1: Sinkov, Abraham
    Date: 1968
    Title: Elementary Cryptanalysis, A Mathematical Approach
    Publisher: NY: Random House
    Keywords: Classical
    Comments: This volume is now part of the New Mathematical Library, published by
    Comments: the Mathematical Association of America (1966): Washington DC
    Comments: "This is the best elementary cryptanalysis book available." (006)

    Bibliography Sequence Number: 143
    Author1: Marsh, D. C. B
    Date: 1977
    Title: Cryptography at the Colorado School of Mines
    Periodical: Cryptologia
    Issue & Page numbers: 1: 362-363
    References: 029 025 675 142

    Bibliography Sequence Number: 144
    Author1: Straight, David W
    Date: 1977
    Title: Cryptanalysis and Data Security Course at the University of Tennessee
    Periodical: Cryptologia
    Issue & Page numbers: 1: 363-365
    References: 029 715 025 142

    Bibliography Sequence Number: 145
    Author1: Bright, Herbert S
    Date: 1977
    Title: Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext
    Periodical: Cryptologia
    Issue & Page numbers: 1: 366-370
    Keywords: RANDOM
    Comments: text of COMPLAN TN-913-14, 25SEP77 version
    References: 396 716 582 323 419 274

    Bibliography Sequence Number: 146
    Author1: Kahn, David
    Date: 1977
    Title: Reports from the Reich
    Periodical: Cryptologia
    Issue & Page numbers: 1: 371

    Bibliography Sequence Number: 147
    Author1: Kruh, Louis
    Date: 1977
    Title: The Churchyard Ciphers
    Periodical: Cryptologia
    Issue & Page numbers: 1: 372-375
    References: 079 025

    Bibliography Sequence Number: 148
    Author1: Highland, Harold J
    Date: 1977
    Title: CENSOREDate: A Simulation Excercise
    Periodical: Cryptologia
    Issue & Page numbers: 1: 376-377

    Bibliography Sequence Number: 149
    Author1: Kahn, David
    Date: 1977
    Title: German Military Eavesdroppers
    Periodical: Cryptologia
    Issue & Page numbers: 1: 378-380

    Bibliography Sequence Number: 150
    Author1: Deavours, Cipher A
    Author2: Reeds, James A
    Date: 77
    Title: The Enigma: Part I, Historical Perspectives
    Periodical: Cryptologia
    Issue & Page numbers: 1: 381-391
    References: 717 718 719 720 721 722 723 724 122 097 725 070 726 698 025

    Bibliography Sequence Number: 151
    Author1: Winkel, Brian J
    Date: 1977
    Title: Solution
    Periodical: Cryptologia
    Issue & Page numbers: 1: 391
    References: 124

    Bibliography Sequence Number: 152
    Author1: Fagone, Peter P
    Date: 1977
    Title: A Message in Cipher Written by General Cornwallis during the Revolutionary War
    Periodical: Cryptologia
    Issue & Page numbers: 1: 392-395
    References: 025

    Bibliography Sequence Number: 153
    Author1: Winkel, Brian J
    Date: 1977
    Title: There and There: A Department
    Periodical: Cryptologia
    Issue & Page numbers: 1: 396-405
    Keywords: DES
    Keywords: RSA
    Keywords: NSA
    References: 727 728 729 730 563 564

    Bibliography Sequence Number: 154
    Author1: Simmons, Gustavus J
    Author2: Norris, Michael J
    Date: 77
    Title: Preliminary Comments on the M.I.T. Public-Key Cryptosystem
    Periodical: Cryptologia
    Issue & Page numbers: 1: 406-414
    Keywords: RSA
    References: 004 002 001 635 636

    Bibliography Sequence Number: 155
    Author1: Barker, Wayne G
    Date: 1978
    Title: Solving a Hagelin, Type CD-57, Cipher
    Periodical: Cryptologia
    Issue & Page numbers: 2: 1-8
    References: 072 129

    Bibliography Sequence Number: 156
    Author1: Wilson, David
    Date: 1978
    Title: Cryptanalysis Course Down Under
    Periodical: Cryptologia
    Issue & Page numbers: 2: 9-11

    Bibliography Sequence Number: 157
    Author1: Kahn, David
    Date: 1978
    Title: The Forschungsamt: Nazi Germany's Most Secret Communications Intelligence Agency
    Periodical: Cryptologia
    Issue & Page numbers: 2: 12-19
    References: 158 065

    Bibliography Sequence Number: 158
    Author1: Kahn, David
    Date: 1978
    Title: Hitler's SpieBibliography Sequence Number: German Military Intelligence in World War II
    Publisher: NY: MacMillan
    Length: 671 pages
    Comments: $16.95

    Bibliography Sequence Number: 159
    Author1: Rohrbach, Hans
    Date: 1978
    Title: Mathematical and Mechanical Methods in Cryptography - Part I
    Periodical: Cryptologia
    Issue & Page numbers: 2: 20-37
    Comments: "Mathematische und maschinelle Methoden biem chiffrieren und dechiffrieren,
    Comments: Fiat Review of German Science, 1939-1946 Applied Mathematics, Part I,
    Comments: Article IX, Office of Military Government for Germany, Field Information
    Comments: Agencies Technical, Wiesbaden, Germany, pp. 233-257, 1948. (Translated
    Comments: by B. Hardie in two parts...
    Comments: This paper describes some of the systems attacked by the German
    Comments: cryptanalysts and discusses their sucesses and failures." (006)

    Bibliography Sequence Number: 160
    Author1: Kruh, Louis
    Date: 1978
    Title: The Inventions of William F. Friedman
    Periodical: Cryptologia
    Issue & Page numbers: 2: 38-61
    Keywords: Classic
    Comments: "This paper describes some of the systems attacked by the German
    Comments: cryptanalysts and discusses their successes and failures." (006)
    References: 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 161 097 150 753 754 755 756

    Bibliography Sequence Number: 161
    Author1: Clark, Ronald
    Date: 1977
    Title: The Man Who Broke Purple
    Publisher: NY: Little, Brown & Co

    Bibliography Sequence Number: 162
    Author1: Rivest, Ronald L
    Date: 1978
    Title: Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem
    Periodical: Cryptologia
    Issue & Page numbers: 2: 62-65
    References: 002 005 154

    Bibliography Sequence Number: 163
    Author1: Deavours, Cipher A
    Date: 1978
    Title: A Book Review: "Cryptanalysis of the Hagelin Cryptograph" by Wayne G. Barker
    Periodical: Cryptologia
    Issue & Page numbers: 2: 66-67
    References: 072

    Bibliography Sequence Number: 164
    Author1: Knight, H. Gary
    Date: 1978
    Title: Cryptanalyst's Corner
    Periodical: Cryptologia
    Issue & Page numbers: 2: 68-74
    References: 060 029 043 059 061 165 166 167 168 169 086 070 142

    Bibliography Sequence Number: 165
    Author1: Levine, Jack
    Date: 1958
    Title: Variable Matrix Substitution in Algebraic Cryptography
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 65:170-179
    Keywords: GF

    Bibliography Sequence Number: 166
    Author1: Levine, Jack
    Date: 1961
    Title: Some Applications of High-Speed Computers to the Case of N=2 of ALgebraic Cryptography
    Periodical: Mathematics of Computation
    Issue & Page numbers: 15:254-260
    Keywords: GF

    Bibliography Sequence Number: 167
    Author1: Levine, Jack
    Date: 1961
    Title: Some Elementary Crytanalysis of Algebraic Cryptography
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 68:411-418
    Keywords: GF

    Bibliography Sequence Number: 168
    Author1: Mellen, Greg E
    Date: 1973
    Title: Cryptology, Computers, and Common Sense
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 42: 569-579
    Keywords: Survey
    Comments: "A rather pessimistic survey of the application of cryptography." (006)

    Bibliography Sequence Number: 169
    Author1: Peck, Lyman C
    Date: 1961
    Title: Secret Codes, Remainder Arithmetic and Matrices
    Periodical: Reston, VA: National Council of Teachers of Math

    Bibliography Sequence Number: 170
    Author1: Lynch, Frederick D
    Date: 19??
    Title: Pattern-Word List (Volume 1)
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: $14.60

    Bibliography Sequence Number: 171
    Author1: Weber, Ralph E
    Date: 1978
    Title: James Lovell and Secret Ciphers During the American Revolution
    Periodical: Cryptologia
    Issue & Page numbers: 2: 75-88
    References: 172

    Bibliography Sequence Number: 172
    Author1: Weber, Ralph E
    Date: 1978
    Title: United States Diplomatic Codes and Ciphers, 1775-1938
    Publisher: Chicago: New University Press
    Length: approx 600
    Comments: $49.95

    Bibliography Sequence Number: 173
    Author1: Winkel, Brian J
    Date: 1978
    Title: There and There
    Periodical: Cryptologia
    Issue & Page numbers: 2: 89-94
    References: 757 758 759 760

    Bibliography Sequence Number: 174
    Author1: Rohrbach, Hans
    Date: 1978
    Title: Mathematical and Mechanical Methods in Cryptology - Part II
    Periodical: Cryptologia
    Issue & Page numbers: 2: 101-121
    References: 159

    Bibliography Sequence Number: 175
    Author1: Kahn, David
    Date: 1978
    Title: Friedman's Life: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 2: 122-123
    References: 161

    Bibliography Sequence Number: 176
    Author1: Knight, H. Gary
    Date: 1978
    Title: Cryptanalyst's Corner
    Periodical: Cryptologia
    Issue & Page numbers: 2: 124-128
    References: 122 126 025 123 419

    Bibliography Sequence Number: 177
    Author1: Kruh, Louis
    Date: 1978
    Title: Who Wrote "The American Black Chamber"?
    Periodical: Cryptologia
    Issue & Page numbers: 2: 130-133
    References: 025 611 761 178 179 180 181 182

    Bibliography Sequence Number: 178
    Author1: Yardley, Herbert O
    Date: 1931
    Title: Secret Inks
    Periodical: Saturday Evening Post
    Issue & Page numbers: 4 April 1931: pages ??

    Bibliography Sequence Number: 179
    Author1: Yardley, Herbert O
    Date: 1931
    Title: Codes
    Periodical: Saturday Evening Post
    Issue & Page numbers: 18 April 1931: pages ??

    Bibliography Sequence Number: 180
    Author1: Yardley, Herbert O
    Date: 1931
    Title: Ciphers
    Periodical: Saturday Evening Post
    Issue & Page numbers: 9 May 1931: pages ??

    Bibliography Sequence Number: 181
    Author1: Yardley, Herbert O
    Date: 1931
    Title: Cryptograms and Their Solutions
    Periodical: Saturday Evening Post
    Issue & Page numbers: 21 Nov 1931: pages ??

    Bibliography Sequence Number: 182
    Author1: Yardley, Herbert O
    Date: 1931
    Title: The American Black Chamber
    Publisher: Indianapolis: Bobbs-Merrill Co
    Keywords: Historical
    Comments: "This volume gives an excellent feeling for the flavor of cryptanalysis." (006)

    Bibliography Sequence Number: 183
    Author1: Deavours, Cipher A
    Date: 1978
    Title: Cryptology at Kean College
    Periodical: Cryptologia
    Issue & Page numbers: 2: 134-138

    Bibliography Sequence Number: 184
    Author1: Kahn, David
    Date: 1978
    Title: Nuggets from the ArchiveBibliography Sequence Number: Yardley Tries Again
    Periodical: Cryptologia
    Issue & Page numbers: 2: 139-143
    References: 182

    Bibliography Sequence Number: 185
    Author1: Barker, Wayne G
    Date: 1978
    Title: The Unsolved d'Agapeyeff cipher
    Periodical: Cryptologia
    Issue & Page numbers: 2: 144-147
    References: 093 137 186

    Bibliography Sequence Number: 186
    Author1: D'Agapeyeff, Alexander
    Date: 1939
    Title: Codes and Ciphers
    Publisher: London: Oxford University Press

    Bibliography Sequence Number: 187
    Author1: Straight, David
    Date: 1978
    Title: An Outline of Computer Security: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 2: 148-150
    References: 188 270 029 025 142

    Bibliography Sequence Number: 188
    Author1: Hoffman, Lance J
    Date: 1977
    Title: Modern Methods for Computer Security and Privacy
    Publisher: Englewood Cliffs, NJ: Prentice-Hall
    Comments: $17.95

    Bibliography Sequence Number: 189
    Author1: Kahn, David
    Date: 1978
    Title: Pictures Galore: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 2: 151
    References: 762 025 698

    Bibliography Sequence Number: 190
    Author1: Rubin, Frank
    Date: 1978
    Title: Computer Methods for Decrypting Multiplex Ciphers
    Periodical: Cryptologia
    Issue & Page numbers: 2: 152-160
    References: 084

    Bibliography Sequence Number: 191
    Author1: Winkel, Brian J
    Date: 1978
    Title: Casanova and the Beaufort Cipher
    Periodical: Cryptologia
    Issue & Page numbers: 2: 161-163

    Bibliography Sequence Number: 192
    Author1: Kruh, Louis
    Date: 1978
    Title: Cryptology as a Career
    Periodical: Cryptologia
    Issue & Page numbers: 2: 164-166

    Bibliography Sequence Number: 193
    Author1: Anonymous
    Date: 1978
    Title: Encryption Challenge
    Periodical: Cryptologia
    Issue & Page numbers: 2: 168-171
    References: 086

    Bibliography Sequence Number: 194
    Author1: Kruh, Louis
    Date: 1978
    Title: Cipher EquipmenTitle: DH-26 Handheld Encryption Machine
    Periodical: Cryptologia
    Issue & Page numbers: 2: 172-177
    References: 763 001 764

    Bibliography Sequence Number: 195
    Author1: Winkel, Brian J
    Date: 1978
    Title: A Tribute to Alf Monge
    Periodical: Cryptologia
    Issue & Page numbers: 2: 178-185

    Bibliography Sequence Number: 196
    Author1: Winkel, Brian J
    Date: 1978
    Title: There and There
    Periodical: Cryptologia
    Issue & Page numbers: 2: 186-194
    Keywords: RSA
    References: 698 758 759 765 062 154 162 378

    Bibliography Sequence Number: 197
    Author1: Costas, John P
    Date: 1979
    Title: Cryptography in the Field, Part 2: Using the Pocket Calculator
    Periodical: BYTE
    Issue & Page numbers: April 1979:144-165
    References: 018 025 026 027 004 007 005 028 001 029

    Bibliography Sequence Number: 198
    Author1: Meushaw, Robert V
    Date: 1979
    Title: The Standard Data Encryption Algorithm, Part 2
    Periodical: BYTE
    Issue & Page numbers: April 1979:110-126
    Keywords: DES
    References: 019 050 023 024

    Bibliography Sequence Number: 199
    Author1: Friedman, William F., editor
    Date: 19??
    Title: Cryptography and Cryptanalysis, Volume 2
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #6 $12.96
    References: 062

    Bibliography Sequence Number: 200
    Author1: Flicke, Wilhelm F
    Date: 1977
    Title: War Secrets in the Ether, Volume 2
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #10 $14.72
    References: 065

    Bibliography Sequence Number: 201
    Author1: Lynch, Frederick D
    Date: 19??
    Title: Pattern-Word List
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #15 $11.68

    Bibliography Sequence Number: 202
    Author1: Friedman, William F
    Date: 19??
    Title: The Riverbank Publications, Volume 2
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #24 $13.44
    References: 079 203

    Bibliography Sequence Number: 203
    Author1: Friedman, William F
    Date: 19??
    Title: The Riverbank Publications, Volume 3
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #25 $13.44
    References: 079 202

    Bibliography Sequence Number: 204
    Author1: Deavours, Cipher A
    Date: 19??
    Title: Principles of Modern Cryptanalysis, Part I
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #20 $22.40

    Bibliography Sequence Number: 205
    Author1: Friedman, William F
    Date: 1944
    Title: Military Cryptanalysis, Volume I - Monoalphabetic Substitution Systems
    Publisher: Laguna Hills, CA: Aegean Park Press
    Keywords: Classic
    Keywords: BACONIAN (pages 60 and 99)
    Comments: Aegean #30 $15.84
    Comments: reprint; Originally published Washington, DComments: U.S. Gov. Printing Office
    Comments: "This is the most detailed course in cryptography which has slipped
    Comments: into public hands, and one of the most readable. Although out of
    Comments: print, it is available in several major libraries." (006)
    References: 612

    Bibliography Sequence Number: 206
    Author1: National Defense Research Committee
    Date: 19??
    Title: Speech and Facsimile Scrambling and Decoding, A Basic Text on Speech Scrambling
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #31 $18.24

    Bibliography Sequence Number: 207
    Author1: Winkel, Brian J., editor
    Date: 1977
    Title: Cryptologia, Volume 1 (1977)
    Publisher: Laguna Hills, CA: Aegean Park Press
    Length: 421
    Comments: Aegean #N1 $25.60

    Bibliography Sequence Number: 208
    Author1: Winkel, Brian J., editor
    Date: 1978
    Title: Cryptologia, Volume 2 (1978)
    Publisher: Laguna Hills, CA: Aegean Park Press
    Length: 399
    Comments: Aegean #N2 $25.60

    Bibliography Sequence Number: 209
    Author1: Barker, Wayne G
    Date: 19??
    Title: Cryptograms, 110 Cryptograms without Solutions
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #N3 $3.96

    Bibliography Sequence Number: 210
    Author1: Randolph, Borris
    Date: 19??
    Title: Cryptofun
    Publisher: Laguna Hills, CA: Aegean Park Press
    Comments: Aegean #N4 #3.96

    Bibliography Sequence Number: 211
    Author1: Chives, J. Rives
    Date: 1978
    Title: My Recollections of G.2 A.6
    Periodical: Cryptologia
    Issue & Page numbers: 2: 201-214
    References: 059

    Bibliography Sequence Number: 212
    Author1: Rubin, Frank
    Date: 1978
    Title: Computer Methods for Decrypting Random Stream Ciphers
    Periodical: Cryptologia
    Issue & Page numbers: 2: 215-231

    Bibliography Sequence Number: 213
    Author1: Arnold, Philip M
    Date: 1978
    Title: A Forgotten Book on CIphers
    Periodical: Cryptologia
    Issue & Page numbers: 2: 232-235
    Keywords: ancient

    Bibliography Sequence Number: 214
    Author1: Foster, Caxton C
    Date: 1978
    Title: Cryptanalysis and Computers
    Periodical: Cryptologia
    Issue & Page numbers: 2: 236-237
    References: 142 029

    Bibliography Sequence Number: 215
    Author1: Knight, H. Gary
    Date: 1978
    Title: Cryptanalysts' Corner
    Periodical: Cryptologia
    Issue & Page numbers: 2: 238-241
    References: 060 059 070 061

    Bibliography Sequence Number: 216
    Author1: Kruh, Louis
    Date: 1978
    Title: A Catalog of Historical Interest
    Periodical: Cryptologia
    Issue & Page numbers: 2: 242-253

    Bibliography Sequence Number: 217
    Author1: Winkel, Brian J
    Date: 1978
    Title: Astle Cipher Solved
    Periodical: Cryptologia
    Issue & Page numbers: 2: 254-256

    Bibliography Sequence Number: 218
    Author1: Kahn, David
    Date: 1978
    Title: A Famous Variation: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 2: 257

    Bibliography Sequence Number: 219
    Author1: Kahn, David
    Date: 1978
    Title: Reveling in Deception: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 2: 258-259
    References: 220

    Bibliography Sequence Number: 220
    Author1: Montagu, Ewen
    Date: 1978
    Title: Beyond Top Secret Ultra
    Publisher: NY: Coward, McCann & Geoghegan
    Length: 192
    References: 219

    Bibliography Sequence Number: 221
    Author1: Heitzenrater, Richard
    Date: 1978
    Title: Decoding Wesley's Diaries
    Periodical: Cryptologia
    Issue & Page numbers: 2: 260-264

    Bibliography Sequence Number: 222
    Author1: Kahn, David
    Date: 1978
    Title: Short Notices - Reviews
    Periodical: Cryptologia
    Issue & Page numbers: 2: 265-266

    Bibliography Sequence Number: 223
    Author1: Morris, Robert
    Date: 1978
    Title: The Hagelin Cipher Machine (M-209): Reconstruction of the Internal Settings
    Periodical: Cryptologia
    Issue & Page numbers: 2: 267-289
    Keywords: cryptanalysis
    Comments: "Cryptanalysis of the M-209 with known plaintext." (006)
    References: 025

    Bibliography Sequence Number: 224
    Author1: Kahn, David
    Date: 1978
    Title: Capsule Reviews for Crypto Buffs
    Periodical: Cryptologia
    Issue & Page numbers: 2: 290-292

    Bibliography Sequence Number: 225
    Author1: Winkel, Brian J
    Date: 1978
    Title: There and There
    Periodical: Cryptologia
    Issue & Page numbers: 2: 293-298
    References: 028 101

    Bibliography Sequence Number: 226
    Author1: Blakley, Bob
    Author2: Blakley, G. R
    Date: 78
    Title: Security of Number Theoretic Public Key Cryptosystems against Random Attack, Part I
    Periodical: Cryptologia
    Issue & Page numbers: 2: 305-321
    References: 244 256 638 004 257 258 002 162 154

    Bibliography Sequence Number: 227
    Author1: Kruh, Louis
    Date: 1978
    Title: What the Nazis were doing
    Periodical: Cryptologia
    Issue & Page numbers: 2: 322-323
    References: 158

    Bibliography Sequence Number: 228
    Author1: Oakley, Howard T
    Date: 1978
    Title: The Riverbank Publications on Cryptology
    Periodical: Cryptologia
    Issue & Page numbers: 2: 324-330
    References: 079 202 203

    Bibliography Sequence Number: 229
    Author1: Kahn, David
    Date: 1978
    Title: Extraordinary Codebreaker, Outstanding Family: A Review
    Periodical: Cryptologia
    Issue & Page numbers: 2: 331-333

    Bibliography Sequence Number: 230
    Author1: Kruh, Louis
    Date: 1978
    Title: A 19th-Century Challenge Cipher
    Periodical: Cryptologia
    Issue & Page numbers: 2: 334

    Bibliography Sequence Number: 231
    Author1: Knight, H. Gary
    Date: 1978
    Title: Cryptanalysts' Corner
    Periodical: Cryptologia
    Issue & Page numbers: 2: 335-337
    References: 164 079 060 059 070

    Bibliography Sequence Number: 232
    Author1: Kruh, Louis
    Date: 1978
    Title: A Catalog of Historical Interest, Part II
    Periodical: Cryptologia
    Issue & Page numbers: 2: 338-349

    Bibliography Sequence Number: 233
    Author1: Callas, Nicholas P
    Date: 1978
    Title: An Application of Computers in Cryptography
    Periodical: Cryptologia
    Issue & Page numbers: 2: 350-364
    Comments: FORTRAN program

    Bibliography Sequence Number: 234
    Author1: Kahn, David
    Date: 1978
    Title: One of the WorsTitle: A Review
    Periodical: Cryptologia
    Issue & Page numbers: 2: 365

    Bibliography Sequence Number: 235
    Author1: Kruh, Louis
    Date: 1978
    Title: Rent A Code
    Periodical: Cryptologia
    Issue & Page numbers: 2: 366-367
    Keywords: 1

    Bibliography Sequence Number: 236
    Author1: Winkel, Brian J
    Date: 1978
    Title: "Action Line" Challenge
    Periodical: Cryptologia
    Issue & Page numbers: 2: 368-370

    Bibliography Sequence Number: 237
    Author1: Kinnucan, Paul
    Date: 1978
    Title: Data Encryption Gurus: Tuchman and Meyer
    Periodical: Cryptologia
    Issue & Page numbers: 2: 371-381
    Keywords: DES
    Comments: Reprinted from Mini-Micro Systems, II, 9 (Oct 78)
    Comments: "History of the DES from the IBM point of view." (006)

    Bibliography Sequence Number: 238
    Author1: Winkel, Brian J
    Date: 1978
    Title: There and There
    Periodical: Cryptologia
    Issue & Page numbers: 2: 382-393
    References: 577 767 237 392 040 769 770 439 380 487

    Bibliography Sequence Number: 239
    Author1: Kahn, David
    Date: 1979
    Title: The Ultra Conference
    Periodical: Cryptologia
    Issue & Page numbers: 3: 1-8
    Keywords: hist

    Bibliography Sequence Number: 240
    Author1: Hammer, Carl
    Date: 1979
    Title: How dir TJB encode B2?
    Periodical: Cryptologia
    Issue & Page numbers: 3: 9-15
    References: 029 241 025 142

    Bibliography Sequence Number: 241
    Author1: Hammer, Carl
    Date: 1971
    Title: Signature Simulation and Certain Cryptographic Codes
    Periodical: CACM
    Issue & Page numbers: 14 (Jan):3-14

    Bibliography Sequence Number: 242
    Author1: Rohrbach, Hans
    Date: 1979
    Title: Report on the Decipherment of the American Strip Cipher O-2 by the German Foreign Office
    Periodical: Cryptologia
    Issue & Page numbers: 3: 16-26
    Keywords: hist

    Bibliography Sequence Number: 243
    Author1: Makar, Boshra H
    Date: 1979
    Title: Cryptology at St. Peter's College
    Periodical: Cryptologia
    Issue & Page numbers: 3: 27-28
    References: 025 029 070 117 001 088

    Bibliography Sequence Number: 244
    Author1: Blakley, Bob
    Author2: Blakley, G. R
    Date: 79
    Title: Security of Number Theoretic Public Key Cryptosystems against Random Attack, Part II
    Periodical: Cryptologia
    Issue & Page numbers: 3: 29-42
    Keywords: RSA
    References: 256 226 638 004 257 258 005 162 154

    Bibliography Sequence Number: 245
    Author1: Ford, James R
    Date: 1979
    Title: The HP-67/96 Cryptograph
    Periodical: Cryptologia
    Issue & Page numbers: 3: 43-50
    Keywords: calculator
    References: 027 002 017 029 771 154

    Bibliography Sequence Number: 246
    Author1: Kruh, Louis
    Date: 1979
    Title: A Xerograph of a Classic
    Periodical: Cryptologia
    Issue & Page numbers: 3: 50
    Keywords: ancient
    References: 247

    Bibliography Sequence Number: 247
    Author1: Trithemius, Johannes
    Date: ????
    Title: Polygraphie, Et Universelle escriture Cabalistique de M. I. Tritheme Abbe
    Publisher: Ann Arbor: University Microfilms Inc
    Length: 600 pages
    Comments: Facsimile copy from University Microfilms Inc., Ann Arbor, MI 41806 for $76.60

    Bibliography Sequence Number: 248
    Author1: Sulzberger Jr., A. O
    Date: 1979
    Title: Papers Disclose Allie's Edge in Knowing German Codes
    Periodical: Cryptologia
    Issue & Page numbers: 3: 51-52
    Keywords: hist
    Comments: Reprinted by permission of the New York Times
    Comments: 2-FEB-79 p. A13.

    Bibliography Sequence Number: 249
    Author1: Shulman, David
    Date: 1979
    Title: A Sherlockian Cryptogram
    Periodical: Cryptologia
    Issue & Page numbers: 3: 54-56
    Comments: Cryptologia Volume 3 Page 121 has solution

    Bibliography Sequence Number: 250
    Author1: Winkel, Brian J
    Date: 1979
    Title: There and There
    Periodical: Cryptologia
    Issue & Page numbers: 3: 57-62
    References: 030 795 794 049

    Bibliography Sequence Number: 251
    Author1: Good, I. J
    Date: 1979
    Title: Early Work on Computers at Bletchley
    Periodical: Cryptologia
    Issue & Page numbers: 3: 65-77
    Keywords: hist
    References: 722 724 850 851 025 239 852 726 698

    Bibliography Sequence Number: 252
    Author1: Kruh, Louis
    Date: 1979
    Title: Devices and Machines: The Hagelin Cryptographer, Type C-52
    Periodical: Cryptologia
    Issue & Page numbers: 3: 78-82
    Keywords: hist

    Bibliography Sequence Number: 253
    Author1: Reeds, James A
    Date: 1979
    Title: Solution of Challenge Cipher
    Periodical: Cryptologia
    Issue & Page numbers: 3: 83-95
    References: 193 086 853 854

    Bibliography Sequence Number: 254
    Author1: Kahn, David
    Date: 1979
    Title: American Codes: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 3: 96-99
    Keywords: ancient
    References: 172

    Bibliography Sequence Number: 255
    Author1: Shulman, David
    Date: 1979
    Title: The Macbeth Test Message
    Periodical: Cryptologia
    Issue & Page numbers: 3: 100-104
    References: 088

    Bibliography Sequence Number: 256
    Author1: Blakley, Bob
    Author2: Blakley, G. R
    Date: 79
    Title: Security of Number Theoretic Public Key Cryptosystems Against Random Attack, Part III
    Periodical: Cryptologia
    Issue & Page numbers: 3: 105-118
    Keywords: RSA
    References: 244 226 638 004 257 258 005 162 154 639 640 009 641 013 530 642

    Bibliography Sequence Number: 257
    Author1: Hardy, G. H
    Author2: Wright, E. M
    Date: 65
    Title: An Introduction to the Theory of Numbers
    Publisher: London: Oxford University Press
    Keywords: number theory
    Comments: 4th edition

    Bibliography Sequence Number: 258
    Author1: LeVeque, W. J
    Date: 1958
    Title: Topics in Number Theory, Volume 1
    Publisher: Reading,MA: Addison-Wesley
    Keywords: number theory
    Comments: 1st edition

    Bibliography Sequence Number: 259
    Author1: Kahn, David
    Date: 1979
    Title: A German Consular Cipher
    Periodical: Cryptologia
    Issue & Page numbers: 3: 119
    Keywords: hist

    Bibliography Sequence Number: 260
    Author1: Wilson, David
    Date: 1979
    Title: Littlewood's Cipher, Part 1: A Challenge
    Periodical: Cryptologia
    Issue & Page numbers: 3: 120-121

    Bibliography Sequence Number: 261
    Author1: Hardie, Bradford
    Date: 1979
    Title: Book Review: Ultra Goes to War
    Periodical: Cryptologia
    Issue & Page numbers: 3: 122-126
    Keywords: hist
    References: 852

    Bibliography Sequence Number: 262
    Author1: Inman, Bobby R
    Date: 1979
    Title: The NSA Perspective on Telecommunications Protection in the Nongovernmental Sector
    Periodical: Cryptologia
    Issue & Page numbers: 3: 129-135
    Keywords: NSA
    Comments: really interesting
    Comments: on-line as NSAPOS.TXT
    Comments: Reprinted from SIGNAL, The Official Journal of the Armed Forces Communications
    Comments: and Electronics Association; March 1979

    Bibliography Sequence Number: 263
    Author1: Mellen, Greg
    Date: 1979
    Title: J. F. Byrne and the Chaocipher Work in Progress
    Periodical: Cryptologia
    Issue & Page numbers: 3: 136-154
    References: 025 029 059 122 072

    Bibliography Sequence Number: 264
    Author1: Rubin, Frank
    Date: 1979
    Title: Solving a Cipher Based on Multiple Random Number Streams
    Periodical: Cryptologia
    Issue & Page numbers: 3: 155-157
    References: 193

    Bibliography Sequence Number: 265
    Author1: Kahn, David
    Date: 1979
    Title: The Futility of it All
    Periodical: Cryptologia
    Issue & Page numbers: 3: 158-165

    Bibliography Sequence Number: 266
    Author1: Kruh, Louis
    Date: 1979
    Title: The Deadly Double Advertisements: Pearl Harbor Warning or Coincidence
    Periodical: Cryptologia
    Issue & Page numbers: 3: 166-171
    Keywords: hist

    Bibliography Sequence Number: 267
    Author1: Wilson, David
    Date: 1979
    Title: Littlewood's Cipher, Part 2: A Method of Solution
    Periodical: Cryptologia
    Issue & Page numbers: 3: 172-176
    References: 029

    Bibliography Sequence Number: 268
    Author1: Levine, Jack
    Author2: Willet, Michael
    Date: 79
    Title: The Two-Message Problem in Cipher Text Autokey, Part 1
    Periodical: Cryptologia
    Issue & Page numbers: 3: 177-186
    References: 017 043 282 283 070

    Bibliography Sequence Number: 269
    Author1: Yuval, Gideon
    Date: 1979
    Title: How to Swindle Rabin
    Periodical: Cryptologia
    Issue & Page numbers: 3: 187-189
    References: 659 050 270 112

    Bibliography Sequence Number: 270
    Author1: Diffie, Whitfield
    Author2: Hellman, Martin E
    Date: 76
    Title: A Critique of the Proposed DES
    Periodical: CACM
    Issue & Page numbers: 19: 164-165
    Keywords: DES
    References: 015 016 117 324 647

    Bibliography Sequence Number: 271
    Author1: Kahn, David
    Date: 1979
    Title: Classic ReviveDate: A Review
    Periodical: Cryptologia
    Issue & Page numbers: 3: 190-191
    References: 061 063 060 069

    Bibliography Sequence Number: 272
    Author1: Sams, Eric
    Date: 1979
    Title: Musical Cryptography
    Periodical: Cryptologia
    Issue & Page numbers: 3: 193-201
    References: 025

    Bibliography Sequence Number: 273
    Author1: Rubin, Frank
    Date: 1979
    Title: Cryptographic Aspects of Data Compression Codes
    Periodical: Cryptologia
    Issue & Page numbers: 3: 202-205
    References: 274 275

    Bibliography Sequence Number: 274
    Author1: Huffman, D. A
    Date: 1952
    Title: A Method for the Construction of Minimum Redundancy Codes
    Periodical: Proc. IRE
    Issue & Page numbers: 40 (Sep):1098

    Bibliography Sequence Number: 275
    Author1: Rubin, Frank
    Date: 1979
    Title: Experiments in Text File Compression
    Periodical: Cryptologia
    Issue & Page numbers: CACM 19 (Nov): 616-623

    Bibliography Sequence Number: 276
    Author1: Kruh, Louis
    Date: 1979
    Title: CP-III: One Time Cypher Pad Manual Encryption Device
    Periodical: Cryptologia
    Issue & Page numbers: 3: 206-209
    Keywords: hist
    Keywords: device
    References: 025

    Bibliography Sequence Number: 277
    Author1: Kahn, David
    Date: 1979
    Title: The Geheimschreiber
    Periodical: Cryptologia
    Issue & Page numbers: 3: 210-214
    Keywords: hist
    Keywords: device
    Comments: includes interesting WW II prisoner Interrogation Report
    References: 025

    Bibliography Sequence Number: 278
    Author1: Arnold, Philip M
    Date: 1979
    Title: Ciphers for the Educated Man
    Periodical: Cryptologia
    Issue & Page numbers: 3: 215-216

    Bibliography Sequence Number: 279
    Author1: Kruh, Louis
    Date: 1979
    Title: Short Notices
    Periodical: Cryptologia
    Issue & Page numbers: 3: 217-219
    References: 280

    Bibliography Sequence Number: 280
    Author1: Blackstock, Paul W
    Author2: Schaf, Frank L eds
    Date: 78
    Title: Intelligence, Espionage, Counterespionage, and Covert Operations: A Guide to Information Sources
    Publisher: Detroit: Gale Research Co
    Length: 255 pages
    Comments: $18

    Bibliography Sequence Number: 281
    Author1: Levine, Jack
    Author2: Willet, Michael
    Date: 79
    Title: The Two-Message Problem in Cipher Text Autokey, Part 2
    Periodical: Cryptologia
    Issue & Page numbers: 3: 220-231
    References: 017 043 282 283 070 268

    Bibliography Sequence Number: 282
    Author1: Levine, Jack
    Author2: Brawley, Joel V
    Date: 66
    Title: Involutory Commutants with some Applications to Algebraic Cryptography, Part I
    Periodical: J. Reine Agnew. Math
    Issue & Page numbers: 224:20-43

    Bibliography Sequence Number: 283
    Author1: Levine, Jack
    Author2: Brawley, Joel V
    Date: 67
    Title: Involutory Commutants with some Applications to Algebraic Cryptography, Part II
    Periodical: J. Reine Agnew. Math
    Issue & Page numbers: 227:1-24

    Bibliography Sequence Number: 284
    Author1: Fischer, Elliot
    Date: 1979
    Title: Language Redundancy and Cryptanalysis
    Periodical: Cryptologia
    Issue & Page numbers: 3: 233-235
    References: 090 285 286 061 029 287

    Bibliography Sequence Number: 285
    Author1: Shannon, Claude E
    Author2: Weaver, Warren
    Date: 49
    Title: The Mathematical Theory of Communication
    Publisher: Urbana: University of Illinois Press

    Bibliography Sequence Number: 286
    Author1: Shannon, Claude E
    Date: 1951
    Title: Prediction and Entropy of Printed English
    Periodical: Bell System Technical Journal
    Issue & Page numbers: January: 50-64

    Bibliography Sequence Number: 287
    Author1: Turn, Rein
    Date: 1973
    Title: Privacy Transformations for Databank Systems
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 42: 589-601
    Comments: "Survey of the fundamentals of cryptography with a view to data bank
    Comments: applications." (006)

    Bibliography Sequence Number: 288
    Author1: Kruh, Louis
    Date: 1979
    Title: The Day the Friedmans had a Typo in their Photo
    Periodical: Cryptologia
    Issue & Page numbers: 3: 236-241
    Keywords: BACON
    Comments: excellent
    References: 611 161 610 289

    Bibliography Sequence Number: 289
    Author1: Rhodes, John K
    Date: 1925
    Title: He Solves the Secrets of Cipher Writing
    Periodical: The American Magazine
    Issue & Page numbers: Jan:36-39,60,62
    Keywords: BACON

    Bibliography Sequence Number: 290
    Author1: Knight, H. Gary
    Date: 1979
    Title: Cryptanalysts' Corner
    Periodical: Cryptologia
    Issue & Page numbers: 3: 242
    Comments: Hint is in Cryptologia 4:29

    Bibliography Sequence Number: 291
    Author1: Arnold, Philip M
    Date: 1979
    Title: A German Code Book
    Periodical: Cryptologia
    Issue & Page numbers: 3: 243-245
    Comments: See Cryptologia 4:54-55 for picture of the code book

    Bibliography Sequence Number: 292
    Author1: Hardie, Bradford
    Date: 1979
    Title: A Theory of Cryptography
    Periodical: Cryptologia
    Issue & Page numbers: 3: 246-247
    References: 029 159 174 025

    Bibliography Sequence Number: 293
    Author1: Winkel, Brian J
    Date: 1979
    Title: There and There
    Periodical: Cryptologia
    Issue & Page numbers: 3: 248-251
    References: 855 006

    Bibliography Sequence Number: 294
    Author1: Fagone, Peter P
    Date: 1980
    Title: The Solution of a Cromwellian Era Spy Message (Circa 1648)
    Periodical: Cryptologia
    Issue & Page numbers: 4:1-4
    Keywords: ancient

    Bibliography Sequence Number: 295
    Author1: Kruh, Louis
    Date: 1980
    Title: Cipher Devices: The CRYPTOMATIC HC-520
    Periodical: Cryptologia
    Issue & Page numbers: 4:5-14
    Keywords: device

    Bibliography Sequence Number: 296
    Author1: Golomb, Solomon W
    Date: 1980
    Title: Cryptographic Reflections on the Genetic Code
    Periodical: Cryptologia
    Issue & Page numbers: 4:15-19

    Bibliography Sequence Number: 297
    Author1: Richter, Michael
    Date: 1980
    Title: A Note on Public-Key Cryptosystems
    Periodical: Cryptologia
    Issue & Page numbers: 4:20-22
    Keywords: NSA
    References: 004 002 005

    Bibliography Sequence Number: 298
    Author1: Kruh, Louis
    Date: 1980
    Title: Memories of Friedman
    Periodical: Cryptologia
    Issue & Page numbers: 4:23-26

    Bibliography Sequence Number: 299
    Author1: Knight, H. Gary
    Date: 1980
    Title: Cryptanalysts' Corner
    Periodical: Cryptologia
    Issue & Page numbers: 4:27-29
    References: 164 060 029 059 070 142 300

    Bibliography Sequence Number: 300
    Author1: Bryan, W. G
    Date: 1967
    Title: Practical Cryptanalysis, Volume V: Periodic Ciphers
    Publisher: The American Cryptogram Association

    Bibliography Sequence Number: 301
    Author1: Rivest, Ronald L
    Date: 1980
    Title: "Forwards and Backwards" Encryption
    Periodical: Cryptologia
    Issue & Page numbers: 4:30-33
    References: 028 025 007 118 119 302 086 253

    Bibliography Sequence Number: 302
    Author1: Pless, Vera
    Date: 1977
    Title: Cracking a Random Number Generator
    Periodical: IEEE Trans. on Computers
    Issue & Page numbers: 26:1133-1136
    Keywords: RANDOM

    Bibliography Sequence Number: 303
    Author1: Kruh, Louis
    Date: 1980
    Title: The Ciphering System for a 19th Century Challenge CIpher
    Periodical: Cryptologia
    Issue & Page numbers: 4:34-35

    Bibliography Sequence Number: 304
    Author1: Kahn, David
    Date: 1980
    Title: Problems of the Unbreakable Cipher
    Periodical: Cryptologia
    Issue & Page numbers: 4:36-40

    Bibliography Sequence Number: 305
    Author1: Shulman, David
    Date: 1980
    Title: Another Solution to the Sherlockian Cryptogram
    Periodical: Cryptologia
    Issue & Page numbers: 4:41

    Bibliography Sequence Number: 306
    Author1: Kahn, David
    Date: 1980
    Title: The Market for Encryption
    Periodical: Cryptologia
    Issue & Page numbers: 4:42-44
    Keywords: DEVICES

    Bibliography Sequence Number: 307
    Author1: Kruh, Louis
    Date: 1980
    Title: Reminiscences of a Master Cryptologist
    Periodical: Cryptologia
    Issue & Page numbers: 4:45-50
    Comments: interview with Frank B. Rowlett

    Bibliography Sequence Number: 308
    Author1: Eckler, A. Ross
    Date: 1980
    Title: Some Comments on the Use of the HP 67/97 as a Cryptograph
    Periodical: Cryptologia
    Issue & Page numbers: 4:51-53
    Keywords: calculator
    References: 245 856 771 007 139 194 857 086

    Bibliography Sequence Number: 309
    Author1: Winkel, Brian J
    Date: 1980
    Title: There and There
    Periodical: Cryptologia
    Issue & Page numbers: 4:54-61
    References: 291 858 859 860 861 862 834 671 368

    Bibliography Sequence Number: 310
    Author1: Kahn, David
    Date: 1980
    Title: Interviews with Cryptologists
    Periodical: Cryptologia
    Issue & Page numbers: 4:65-70
    References: 157 158 159 174

    Bibliography Sequence Number: 311
    Author1: Levine, Jack
    Author2: Hartwig, Robert E
    Date: 80
    Title: Applications of the Drazin Inverse to the Hill Cryptographic System, Part I
    Periodical: Cryptologia
    Issue & Page numbers: 4:71-85
    Keywords: GF
    References: 017 043 167 166

    Bibliography Sequence Number: 312
    Author1: Shulman, David
    Date: 1980
    Title: A Curious Cryptic Composition
    Periodical: Cryptologia
    Issue & Page numbers: 4:86-88

    Bibliography Sequence Number: 313
    Author1: Outerbridge, Richard
    Date: 1980
    Title: Some Cryptographic and Computing Applications of the Toshiba LC-836MN Memo Note 30 Pocket Calculator
    Periodical: Cryptologia
    Issue & Page numbers: 4:89-94
    Keywords: calculator

    Bibliography Sequence Number: 314
    Author1: Arnold, Philip M
    Date: 1980
    Title: An Apology for Jacopo Silvestri
    Periodical: Cryptologia
    Issue & Page numbers: 4:96-103
    References: 025

    Bibliography Sequence Number: 315
    Author1: Raven, Francis A
    Date: 1980
    Title: Memories of the PacifiComments: Book Reviews
    Periodical: Cryptologia
    Issue & Page numbers: 4:104-108
    Keywords: hist
    References: 865

    Bibliography Sequence Number: 316
    Author1: Wall, Rajendra S
    Date: 1980
    Title: Decryption of Simple Substitution Cyphers with Word Divisions using a Content Addressable Memory
    Periodical: Cryptologia
    Issue & Page numbers: 4:109-115
    References: 029 007 142

    Bibliography Sequence Number: 317
    Author1: Gillogly, James J
    Date: 1980
    Title: The Beale Cipher: A Dissenting Opinion
    Periodical: Cryptologia
    Issue & Page numbers: 4:116-119
    References: 025

    Bibliography Sequence Number: 318
    Author1: Kahn, David
    Date: 1980
    Title: Nuggets from the Archives
    Periodical: Cryptologia
    Issue & Page numbers: 4:120-121
    Keywords: hist

    Bibliography Sequence Number: 319
    Author1: Winkel, Brian J
    Date: 1980
    Title: Solution to Cryptanalysts' Corner Scotch Homophonic
    Periodical: Cryptologia
    Issue & Page numbers: 4:122

    Bibliography Sequence Number: 320
    Author1: Winkel, Brian J
    Date: 1980
    Title: There and There
    Periodical: Cryptologia
    Issue & Page numbers: 4:123-126

    Bibliography Sequence Number: 321
    Author1: Deavours, Cipher A
    Date: 1980
    Title: The Black Chamber: A Column How the British Broke Enigma
    Periodical: Cryptologia
    Issue & Page numbers: 4:129-132
    Keywords: hist

    Bibliography Sequence Number: 322
    Author1: Bright, Herbert S
    Date: 1980
    Title: High-Speed Indirect Cryption
    Periodical: Cryptologia
    Issue & Page numbers: 4:133-139
    Keywords: RANDOM
    Comments: text of COMPLAN TN-913-35, 5OCT79 version
    References: 027 323 028 047 324

    Bibliography Sequence Number: 323
    Author1: Chaitin, G. J
    Date: 1974
    Title: Information-Theoretic Limitations of Formal Systems
    Periodical: Journal ACM
    Issue & Page numbers: 21,3 (July): 403-424
    Keywords: RANDOM

    Bibliography Sequence Number: 324
    Author1: Feistel, Horst
    Author2: Notz, W. A
    Author3: Smith, J. L
    Date: 1975
    Title: Some Cryptographic Techniques for Machine-to-Machine Data Communication
    Periodical: Proceedings of the IEEE
    Issue & Page numbers: 63,1
    Author1: 1545-1554
    Comments: "These two papers [Refs 324 and 583] describe various ways of building
    Comments: block cipher systems and shows their application to a variety of
    Comments: privacy and authentication problems in computer systems and networks." (006)

    Bibliography Sequence Number: 325
    Author1: Pady, Donald S
    Author2: Kline, Laura S
    Date: 80
    Title: Finger Counting and the Identification of James VI's Secret Agents
    Periodical: Cryptologia
    Issue & Page numbers: 4:140-149
    Keywords: ancient

    Bibliography Sequence Number: 326
    Author1: Levine, Jack
    Author2: Hartwig, Robert E
    Date: 80
    Title: Applications of the Drazin Inverse to the Hill Cryptographic System, Part II
    Periodical: Cryptologia
    Issue & Page numbers: 4:150-168

    Bibliography Sequence Number: 327
    Author1: Barker, Wayne G
    Date: 1980
    Title: Opportunities for the Amateur Cryptanalyst can be Anywhere
    Periodical: Cryptologia
    Issue & Page numbers: 4:169-172

    Bibliography Sequence Number: 328
    Author1: Kruh, Louis
    Date: 1980
    Title: The Work of a DiplomaTitle: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 4:172

    Bibliography Sequence Number: 329
    Author1: Kahn, David
    Date: 1980
    Title: Spy CipherBibliography Sequence Number: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 4:173-176

    Bibliography Sequence Number: 330
    Author1: Knight, H. Gary
    Date: 1980
    Title: Cryptanalysts' Corner
    Periodical: Cryptologia
    Issue & Page numbers: 4:177-180
    References: 025 331 070 060 059 029

    Bibliography Sequence Number: 331
    Author1: Bowers, William M
    Date: 1959
    Title: Practical Cryptanalysis Volume I. Digraphic Substitution
    Publisher: Ventura, CA: The American Cryptogram Association
    Keywords: 1-24

    Bibliography Sequence Number: 332
    Author1: Kruh, Louis
    Date: 1980
    Title: Cipher DeviceBibliography Sequence Number: TRS-80 Data Privacy System
    Periodical: Cryptologia
    Issue & Page numbers: 4:181-183
    Keywords: device
    Comments: have the company's literature for this product
    Comments: in my files under "commercially available..."

    Bibliography Sequence Number: 333
    Author1: Cooper, R. H
    Date: 1980
    Title: Linear Transformations in Galois Fields and Their Application to Cryptography
    Periodical: Cryptologia
    Issue & Page numbers: 4:184-188
    Keywords: GF
    Comments: EXCELLECT - The starting point for my GF research
    References: 334 042 335 007 336 337 142 017 043

    Bibliography Sequence Number: 334
    Author1: Albert, A. A
    Date: 1956
    Title: Fundamental Concepts of Higher Algebra
    Publisher: Chicago: University of Chicago Press
    Keywords: number theory
    Keywords: GF

    Bibliography Sequence Number: 335
    Author1: Cooper, R. H
    Date: 1977
    Title: An Application of Galois Field Theory to Cryptography
    Periodical: Proceedings of the Learned Societies Canadian Information Processing Society
    Keywords: GF
    Comments: number theory
    Comments: Computer Science Association:

    Bibliography Sequence Number: 336
    Author1: Berlekamp, Elwyn R
    Date: 1968
    Title: Algebraic Coding Theory
    Publisher: NY: McGraw-Hill
    Keywords: GF

    Bibliography Sequence Number: 337
    Author1: Alanen, J. D
    Author2: Knuth, Donald E
    Date: 64
    Title: Tables of Finite Fields
    Periodical: Sankhya Calcutta
    Issue & Page numbers: 26: 305-328
    Keywords: GF

    Bibliography Sequence Number: 338
    Author1: Ewing, Sir Alfred
    Date: 1980
    Title: Some Special War Work, Part I
    Periodical: Cryptologia
    Issue & Page numbers: 4:193-203
    Keywords: hist

    Bibliography Sequence Number: 339
    Author1: Kochanski, Martin J
    Date: 1980
    Title: Remarks on Lu and Lee's Proposals for a Public-Key Cryptosystem
    Periodical: Cryptologia
    Issue & Page numbers: 4:204-207
    Keywords: RSA
    References: 340 005

    Bibliography Sequence Number: 340
    Author1: Lu, S. C
    Author2: Lee, L. N
    Date: 80
    Title: A Simple and Effective Public-Key Cryptosystem
    Periodical: Cryptologia
    Issue & Page numbers: Comsat Technical Review 9:15-24 1979
    Keywords: RSA

    Bibliography Sequence Number: 341
    Author1: Knight, H. Gary
    Date: 1980
    Title: Cryptanalyst's Corner
    Periodical: Cryptologia
    Issue & Page numbers: 4:208-212

    Bibliography Sequence Number: 342
    Author1: Nelson, Jim
    Date: 1980
    Title: The Development of Commercial Cryptosystem Standards
    Periodical: Cryptologia
    Issue & Page numbers: 4:213-224
    Keywords: DES
    Comments: not xrefed

    Bibliography Sequence Number: 343
    Author1: Kruh, Louis
    Date: 1980
    Title: Cipher Equipment: TST 1221
    Periodical: Cryptologia
    Issue & Page numbers: 4:225-229
    Keywords: device

    Bibliography Sequence Number: 344
    Author1: Makar, Boshra H
    Date: 1980
    Title: Transfinite Cryptography
    Periodical: Cryptologia
    Issue & Page numbers: 4:230-237
    Comments: not xrefed

    Bibliography Sequence Number: 345
    Author1: Kruh, Louis
    Date: 1980
    Title: Pearl Harbor Revisited: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 4:237

    Bibliography Sequence Number: 346
    Author1: Kahn, David
    Date: 1980
    Title: A Professional's Challenge
    Periodical: Cryptologia
    Issue & Page numbers: 4:238-239
    References: 347

    Bibliography Sequence Number: 347
    Author1: Schuetz, Arthur
    Date: 1980
    Title: Secret Service Unmasked
    Periodical: Cryptologia
    Issue & Page numbers: London: Hutchinson 1950

    Bibliography Sequence Number: 348
    Author1: Deavours, Cipher A
    Date: 1980
    Title: La Methode Des Batons
    Periodical: Cryptologia
    Issue & Page numbers: 4:240-247
    Keywords: hist
    References: 025 174 161

    Bibliography Sequence Number: 349
    Author1: Kruh, Louis
    Date: 1980
    Title: A Remarkable View of Ancient America: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 4:248-249
    Keywords: ancient

    Bibliography Sequence Number: 350
    Author1: Mellen, Greg
    Date: 1981
    Title: Graphic Solution of a Linear Transformation Cipher
    Periodical: Cryptologia
    Issue & Page numbers: 5:1-19
    Keywords: GF
    References: 017 142 165 167 166 631

    Bibliography Sequence Number: 351
    Author1: Kahn, David
    Date: 1981
    Title: The Public's Secrets
    Periodical: Cryptologia
    Issue & Page numbers: 5:20-26
    Keywords: NSA

    Bibliography Sequence Number: 352
    Author1: Rivest, Ronald L
    Date: 1981
    Title: Statistical Analysis of the Hagelin Cryptograph
    Periodical: Cryptologia
    Issue & Page numbers: 5:27-32
    Keywords: hist
    References: 072

    Bibliography Sequence Number: 353
    Author1: Ewing, Sir Alfred
    Date: 1981
    Title: Some Special War Work, Part II
    Periodical: Cryptologia
    Issue & Page numbers: 5:33-39
    Keywords: hist

    Bibliography Sequence Number: 354
    Author1: Mellen, Greg
    Date: 1981
    Title: Cryptanalyst's Corner
    Periodical: Cryptologia
    Issue & Page numbers: 5:40-42

    Bibliography Sequence Number: 355
    Author1: Deavours, Cipher A
    Date: 1981
    Title: Shutting off the Spigot in 1981
    Periodical: Cryptologia
    Issue & Page numbers: 5:43-45
    Keywords: NSA

    Bibliography Sequence Number: 356
    Author1: Kruh, Louis
    Date: 1981
    Title: Cipher Equipment: Collins CR-200/220 Data Security Unit
    Periodical: Cryptologia
    Issue & Page numbers: 5:46-50
    Keywords: DES
    Keywords: device

    Bibliography Sequence Number: 357
    Author1: Rubin, Frank
    Date: 1981
    Title: Decrypting a Stream Cipher Based on J-K Flip-Flops
    Periodical: Cryptologia
    Issue & Page numbers: 5:51-57
    References: 119

    Bibliography Sequence Number: 358
    Author1: Kruh, Louis
    Date: 1981
    Title: From the Ultra Conference: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 5:58

    Bibliography Sequence Number: 359
    Author1: Fischer, Elliott
    Date: 1981
    Title: A Theoretical Measure of Cryptographic Performance
    Periodical: Cryptologia
    Issue & Page numbers: 5:59-62
    References: 086 007 027

    Bibliography Sequence Number: 360
    Author1: Kahn, David
    Date: 1981
    Title: German Spy Cryptograms
    Periodical: Cryptologia
    Issue & Page numbers: 5:65-66
    Keywords: hist

    Bibliography Sequence Number: 361
    Author1: Hartwig, Robert E
    Author2: Levine, Jack
    Date: 81
    Title: Applications of the Drazin Inverse to the Hill Cryptographic System, Part III
    Periodical: Cryptologia
    Issue & Page numbers: 5:67-77
    References: 017 043

    Bibliography Sequence Number: 362
    Author1: Kallis Jr., Stephen A
    Date: 1981
    Title: The Code-O-Graph Cipher Disks
    Periodical: Cryptologia
    Issue & Page numbers: 5:78-83
    Keywords: hist
    Keywords: devices
    References: 025

    Bibliography Sequence Number: 363
    Author1: Sturges, Gerald
    Date: 1981
    Title: The House Report on Public Cryptography
    Periodical: Cryptologia
    Issue & Page numbers: 5:84-93
    Keywords: NSA

    Bibliography Sequence Number: 364
    Author1: Costas, John P
    Date: 1981
    Title: The Hand-Held Calculator as a Cryptographic Machine
    Periodical: Cryptologia
    Issue & Page numbers: 5:94-117
    Keywords: calculator
    References: 018 197 007

    Bibliography Sequence Number: 365
    Author1: Lembart, Lee
    Date: 1981
    Title: The Public Cryptography Study Group: U.S. and Mathematicians in Code Dispute at Odds on Publishing Research
    Periodical: Cryptologia
    Issue & Page numbers: 5:118-122
    Keywords: NSA

    Bibliography Sequence Number: 366
    Author1: Mellen, Greg
    Date: 1981
    Title: Cryptanalysts' Corner
    Periodical: Cryptologia
    Issue & Page numbers: 5:123

    Bibliography Sequence Number: 367
    Author1: Adleman, Leonard M
    Date: 1980
    Title: On Distinguishing Prime Numbers from Composite Numbers
    Periodical: Proc. 21st FOCS Conference
    Issue & Page numbers: October 1980
    Keywords: primes
    Comments: copy was mailed to me by Ron Rivest

    Bibliography Sequence Number: 368
    Author1: Kahn, David
    Date: 1979
    Title: Cryptology Goes Public
    Periodical: Foreign Affairs
    Issue & Page numbers: Fall 1979

    Bibliography Sequence Number: 369
    Author1: Pollard, J. M
    Date: 1975
    Title: A Monte Carlo Method for Factorization
    Periodical: BIT
    Issue & Page numbers: 15:
    Keywords: primes

    Bibliography Sequence Number: 370
    Author1: Blakley, G. R
    Date: 79
    Title: Safeguarding Cryptographic Keys
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 48:313-317

    Bibliography Sequence Number: 371
    Author1: Berlekamp, Elwyn R
    Author2: McElice, Robert J
    Author3: Van Tilborg, Henk C. A
    Date: 1978
    Title: On the Inherent Intractability of Certain Coding Problems
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-24, 3 (May):384-386
    Comments: Abstract - The fact that the general decoding problem for linear codes
    Comments: and the general problem of finding the weights of a linear code are both
    Comments: NP-complete is shown. This strongly suggests, but does not rigorously
    Comments: imply, that no algorithm for either of these problems which runs in
    Comments: polynomial time exists.

    Bibliography Sequence Number: 372
    Author1: Branstad, Dennis K
    Author2: Gait, J
    Author3: Katzke, S
    Date: 1976
    Title: Report of the Workshop on Cryptography in Support of Computer Security
    Periodical: NBS Report IR 77-1291
    Issue & Page numbers: 21-22
    Keywords: DES
    Comments: Sept 1976

    Bibliography Sequence Number: 373
    Author1: Friedman, William F
    Date: 1967
    Title: Cryptology
    Periodical: Encyclopedia Britannica
    Issue & Page numbers: 6: 844-851
    Keywords: encyclopedia

    Bibliography Sequence Number: 374
    Author1: Geffe, Philip R
    Date: 1973
    Title: How to Protect Data With Ciphers that are Really Hard to Break
    Periodical: Electronics
    Issue & Page numbers: 46, 1 (4 Jan 73): 99-101
    Keywords: system design and implementation
    Comments: "A scheme for constructing a keystream by using a linear random
    Comments: generator to select bits alternately from the streams produced by
    Comments: two other linear random number generators." (006)

    Bibliography Sequence Number: 375
    Author1: Hellman, Martin E
    Author2: Merkle, Ralph
    Author3: Schroeppel, R et al
    Date: 1976
    Title: Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard
    Publisher: Stanford U. Ctr. for Systems Research Report SEL 76-042
    Length: 9 Sep 76
    Comments: 4:Washington, L
    Comments: 5:Diffie, Whitfield
    Comments: 6:Pohlig, S
    Comments: 7:Schweitzer, P
    Comments: avail. from NTIS

    Bibliography Sequence Number: 376
    Author1: Kolata, Gina Bari
    Date: 1977
    Title: Computer Encryption and the National Security Agency Connection
    Periodical: Science
    Issue & Page numbers: 197 (29 Jul 77): 438-440
    Keywords: NSA
    Keywords: DES

    Bibliography Sequence Number: 377
    Author1: Kolata, Gina Bari
    Date: 1977
    Title: Cryptology on the Brink of a Revolution?
    Periodical: Science
    Issue & Page numbers: 197 (19 Aug 77): 747-748
    Keywords: popular
    Keywords: RSA
    References: 874

    Bibliography Sequence Number: 378
    Author1: Kolata, Gina Bari
    Date: 1978
    Title: Cryptology: A Secret Meeting at IDA?
    Periodical: Science
    Issue & Page numbers: 200 (14 Apr 78): 184
    Keywords: RSA
    References: 377

    Bibliography Sequence Number: 379
    Author1: Lempel, A
    Date: 1978
    Title: Cryptology in Transition: A Survey
    Periodical: Sperry Rand Research Center Report SCRC-RP-78-43
    Issue & Page numbers: ??????
    Comments: Sudbury
    Comments: Mass. Sept 1978

    Bibliography Sequence Number: 380
    Author1: Matyas, S. M
    Author2: Meyer, Carl H
    Date: 78
    Title: Generation, Distribution, and Installation of Cryptographic Keys
    Periodical: IBM System Journal
    Issue & Page numbers: 17, 2, 126-137
    Keywords: Key Distribution

    Bibliography Sequence Number: 381
    Author1: McElliece, R. J
    Date: 1977
    Title: Encyclopedia of Mathematics and its Applications, Volume Author3: Theory of Information and Coding
    Publisher: Reading, MA: Addison-Wesley

    Bibliography Sequence Number: 382
    Author1: McElliece, R. J
    Date: 1978
    Title: A Public-Key Cryptosystem based on Algebraic Coding Theory
    Periodical: Jet Propulsion Lab DSN Progress Report 42-44, Jan and Feb 1978

    Bibliography Sequence Number: 383
    Author1: Merkle, Ralph C
    Author2: Hellman, Martin E
    Date: 78
    Title: Hiding Information and Signatures in Trapdoor Knapsacks
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-24 (Sep):525-530
    Comments: Abstract - The knapsack problem is an NP-complete combinatorial problem
    Comments: that is strongly believed to be computationally difficult to solve in
    Comments: general. Specific instances of this problem that appear very difficult
    Comments: to solve unless one possesses "trapdoor information" used in the design
    Comments: of the problem are demonstrated. Because only the designer can easily
    Comments: solve problems, others can send him information hidden in the solution
    Comments: to the problems without fear that an eavesdropper will be able to extract
    Comments: the information. This approach differs from usual cryptographic
    Comments: systems in that a secret key is not needed. Conversely, only the
    Comments: designer can generate signatures for messages, but anyone can easily
    Comments: check their authenticity.

    Bibliography Sequence Number: 384
    Author1: Patterson, N. J
    Date: 1975
    Title: The Algebraic Decoding of Goppa Codes
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-21, 2 (March):203-207

    Bibliography Sequence Number: 385
    Author1: Perlman, M
    Date: 1976
    Title: Generation of Key in Cryptographic System for Secure Communications
    Publisher: NASA Technical Brief 75-10278
    Keywords: system design and implementation
    Comments: "Discussion of some nonlinear shift registers with know periods." (006)

    Bibliography Sequence Number: 386
    Author1: Pless, Vera S
    Date: 1977
    Title: Encryption Schemes for Computer Confidentiality
    Periodical: IEEE Transactions on Computers
    Issue & Page numbers: C-26, 11 (Nov): 1133-1136
    Keywords: system design and implementation
    Comments: "An interesting discussion of the use of J-K flip flop networks to
    Comments: produce maximal period keying sequences." (006)

    Bibliography Sequence Number: 387
    Author1: Rabin, Michael O
    Date: 1977
    Title: Complexity of Computations
    Periodical: CACM
    Issue & Page numbers: 20, 9 (Sep 1977): 625-633

    Bibliography Sequence Number: 388
    Author1: Shamir, Ali
    Date: 1978
    Title: A Fast Signature Scheme
    Publisher: Cambridge, MA: MIT
    Length: MIT/LCS/TM-107

    Bibliography Sequence Number: 389
    Author1: Shannon, Claude E
    Date: 1948
    Title: The Mathematical Theory of Communication
    Periodical: Bell System Technical Journal
    Issue & Page numbers: 27 (July and October 1948): 379-423, 623-656

    Bibliography Sequence Number: 390
    Author1: Shapley, Deborah
    Author2: Kolata, Gina Bari
    Date: 77
    Title: Cryptology: Scientists Puzzle over Threat to Open Research, Publication
    Periodical: Science
    Issue & Page numbers: 197 (30 Sep 77): 1345-1349
    Keywords: NSA
    References: 376 377 848

    Bibliography Sequence Number: 391
    Author1: Smith, J. Lynn
    Date: 1971
    Title: The Design of Lucifer, a Cryptographic Device for Data Communications
    Publisher: IBM Report RC 3326
    Length: White Plains, NY: IBM
    Keywords: system design and implementation
    Comments: "This working paper gives a detailed discussion of the functioning,
    Comments: hardware design, and costs of the IBM Lucifer system." (006)

    Bibliography Sequence Number: 392
    Author1: Sugarman, Robert
    Date: 1978
    Title: Freedom to Research and Publish on Cryptology Remains Unresolved
    Periodical: IEEE Spectrum
    Issue & Page numbers: 2, 5 (May 1878): News Supplement
    Comments: could not locate. what is page number?

    Bibliography Sequence Number: 393
    Author1: ACME Code Company
    Date: 1923
    Title: ACME Commodity and Phrase Code
    Publisher: San Francisco, CA: ACME Code Co

    Bibliography Sequence Number: 394
    Author1: Albert, A. A
    Date: 1941
    Title: Some Mathematical Aspects of Cryptography
    Periodical: presented at the AMS 382nd Meeting
    Issue & Page numbers: Manhattan, Kansas 21 Nov 1941

    Bibliography Sequence Number: 395
    Author1: Branstad, Dennis K
    Date: 1979
    Title: Hellman's Data Does Not Support His Conclusion
    Periodical: IEEE Spectrum
    Issue & Page numbers: 16, 7 (July 1979): 41

    Bibliography Sequence Number: 396
    Author1: Bright, Herbert S
    Author2: Enison, Richard L
    Date: 76
    Title: Cryptography Using Modular Software Elements
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 45: 113-123
    Keywords: DES
    Keywords: RANDOM
    Comments: "This paper describes the implementation and testing of the DES on several computers." (006)

    Bibliography Sequence Number: 397
    Author1: Davida, George I
    Date: 1979
    Title: Hellman's Scheme Breaks DES in its Basic Form
    Periodical: IEEE Spectrum
    Issue & Page numbers: 16, 7 (July): 39

    Bibliography Sequence Number: 398
    Author1: Gilbert, E. N
    Author2: MacWilliams, F. J
    Author3: Sloane, N. J. A
    Date: 1974
    Title: Codes Which Detect Deception
    Periodical: Bell System Technical Journal
    Issue & Page numbers: 53, 3 (March): 405-423
    Keywords: information theory
    Comments: "This paper considers an interesting authentication problem which
    Comments: arises in monitoring a nuclear test ban treaty. The problem is
    Comments: closely related to digital signatures, which were not yet known." (006)

    Bibliography Sequence Number: 399
    Author1: Golomb, Solomon W
    Date: 1967
    Title: Shift Register Sequences
    Publisher: San Francisco, CA: Holden-Day
    Comments: "Shift registers are one of the best studied approaches to the
    Comments: generation of pseudorandom sequences. This volume discusses the
    Comments: randomness characteristics of sequences from both linear and
    Comments: nonlinear shift registers." (006)

    Bibliography Sequence Number: 400
    Author1: Hart, G. L
    Date: 1964
    Title: The Beale Papers
    Publisher: Roanoke, VA: Roanoke Public Library

    Bibliography Sequence Number: 401
    Author1: Hellman, Martin E
    Date: 1979
    Title: DES will be totally insecure within ten years
    Periodical: IEEE Spectrum
    Issue & Page numbers: 16, 7 (July 1979): 32-39

    Bibliography Sequence Number: 402
    Author1: Herlestam, T
    Date: 1978
    Title: Critical Remarks on Some Public-Key Cryptosystems
    Periodical: BIT
    Issue & Page numbers: 18 (1978) 493-496

    Bibliography Sequence Number: 403
    Author1: Horowitz, E
    Author2: Sahni, S
    Date: 74
    Title: Computing Partitions with Applications to the Knapsack Problem
    Periodical: Journal of the ACM
    Issue & Page numbers: 21, 2 (April 1974): 277-292

    Bibliography Sequence Number: 404
    Author1: Kahn, David
    Date: 1966
    Title: Modern Cryptology
    Periodical: Scientific American
    Issue & Page numbers: 215 (July): 38-46
    Keywords: popular
    Comments: "This paper presents a superficial discussion of cryptology in roughly
    Comments: the World War II period. Rotor and Hagelin machines are mentioned,
    Comments: along with a discussion of one time pads, but neither mathematical
    Comments: techniques in cryptanalysis nor the use of computers are covered." (006)

    Bibliography Sequence Number: 405
    Author1: Lipton, S. M
    Author2: Matyas, S. M
    Date: 78
    Title: Making the Digital Signatures Legal - and Safeguarded
    Periodical: Data Commun
    Issue & Page numbers: 7, 2 (Feb): 41-52

    Bibliography Sequence Number: 406
    Author1: MacWilliams, F. J
    Author2: Sloane, N. J. A
    Date: 77
    Title: The Theory of Error-Correcting Codes, Volumers I and II
    Publisher: NY: North-Holland

    Bibliography Sequence Number: 407
    Author1: Martin, J
    Date: 1973
    Title: Security, Accuracy, and Privacy in Computing Systems
    Publisher: Englewood Cliffs, NJ: Prentice-Hall

    Bibliography Sequence Number: 408
    Author1: Massey, J. L
    Date: 1969
    Title: Feedback Shift-Register Synthesis and BCH Decoding
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-15, 1 (Jan):122-127

    Bibliography Sequence Number: 409
    Author1: Peterson, W. W
    Author2: Weldon, E. J
    Date: 72
    Title: Error Correcting Codes, 2nd Edition
    Publisher: Cambridge, MA: MIT Press

    Bibliography Sequence Number: 410
    Author1: Roberts, R. W
    Date: 1975
    Title: Encryption Algorithm for Computer Data Encryption
    Periodical: Federal Register
    Issue & Page numbers: 40, 52 (17 Mar 75): 12134-12139
    Comments: National Bureau of Standards (NBS)???

    Bibliography Sequence Number: 411
    Author1: Schroeppel, R
    Author2: Shamir, Ali
    Date: ??
    Title: A TBibliography Sequence Number: *2 = O(n**2) time/space tradeoff for Certain NP-Complete Problems
    Publisher: to appear as MIT Lab. Comp. Sci. Rep

    Bibliography Sequence Number: 412
    Author1: Shamir, Ali
    Author2: Zippel, R. E
    Date: 78
    Title: On the Security of the Merkle-Hellman Cryptographic Scheme
    Publisher: MIT/LCS/TM-119
    References: 383 110 004 258

    Bibliography Sequence Number: 413
    Author1: Shamir, Ali
    Author2: Rivest, Ronald L
    Author3: Adleman, Leonard M
    Date: 1979
    Title: Mental Poker
    Publisher: Cambridge, MA: MIT Lab Comp. Sci, Tech. Rep. MIT/LCS/TM-125
    Comments: Reprinted in The Mathematical Gardner (ed. D. Klarner)
    Comments: Boston:Prindle, Weber, Schmidt (1981):37-43

    Bibliography Sequence Number: 414
    Author1: Shapley, Deborah
    Date: 1978
    Title: The New Unbreakable Codes - Will They Put NSA Out of Business?
    Periodical: The Washington Post
    Issue & Page numbers: 9 Jul 78: Outlook, Section B1

    Bibliography Sequence Number: 415
    Author1: Simmons, Gustavus J
    Date: 1977
    Title: Cryptology: The Mathematics of Secure Communication
    Periodical: Math. Intell
    Issue & Page numbers: 1, 4 (Oct): 406-414

    Bibliography Sequence Number: 416
    Author1: Sugarman, Robert
    Date: 1979
    Title: On Foiling Computer Crime
    Periodical: IEEE Spectrum
    Issue & Page numbers: 16, 7 (July): 31-32

    Bibliography Sequence Number: 417
    Author1: Tausworthe, R. C
    Date: 1965
    Title: Random Numbers Generated by Linear Recurrence Modulo Two
    Periodical: Mathematics of Computation
    Issue & Page numbers: 19: 201-209

    Bibliography Sequence Number: 418
    Author1: Tuchman, Walter L
    Date: 1979
    Title: Hellman Presents No Shortcut Solutions to the DES
    Periodical: IEEE Spectrum
    Issue & Page numbers: 16, 7 (July): 40-41

    Bibliography Sequence Number: 419
    Author1: Tuckerman, Bryant
    Date: 1970
    Title: A Study of the Vigenere-Vernam Single and Multiple Loop Enciphering Systems
    Publisher: Yorktown Heights, NY: IBM T. J. Watson Research Center, Report RC-2879 (#13538)
    Keywords: cryptanalysis
    Comments: "Tuckerman develops cryptanalytic techniques for solving these ciphers
    Comments: from either rather small amounts of matched plaintext and ciphertext
    Comments: or larger amounts of pure ciphertext." (006)

    Bibliography Sequence Number: 420
    Author1: Williams, H. C
    Author2: Schmid, B
    Date: 79
    Title: Some Remarks Concerning the MIT Public-Key Cryptosystem
    Publisher: U. of Manitoba Dep. of Comp. Sci., Rep. 91
    Comments: 22 May 79

    Bibliography Sequence Number: 421
    Author1: Williams, H. C
    Date: 1979
    Title: A Modification of the RSA Public-Key Encryption Procedure
    Publisher: U. of Manitoba Dep. of Comp. Sci., Rep 92

    Bibliography Sequence Number: 422
    Author1: Zierler, N
    Author2: Brillhart, J
    Date: 68
    Title: On Primitive Trinomials (mod 2), Part I
    Periodical: Inform. Control
    Issue & Page numbers: 13: 541-554
    Keywords: RANDOM

    Bibliography Sequence Number: 423
    Author1: Zierler, N
    Author2: Brillhart, J
    Date: 69
    Title: On Primitive Trinomials (mod 2), Part II
    Periodical: Inform. Control
    Issue & Page numbers: 14: 566-569
    Keywords: RANDOM

    Bibliography Sequence Number: 424
    Author1: unknown
    Date: 1971
    Title: Data Privacy
    Periodical: IBM Res. Rep
    Issue & Page numbers: 7, 4

    Bibliography Sequence Number: 425
    Author1: Morris, Robert
    Date: 1977
    Title: Computer Security and the Bell System
    Periodical: ??????
    Issue & Page numbers: 197 (19 Aug 77): 716

    Bibliography Sequence Number: 426
    Author1: unknown
    Date: 1978
    Title: ??????
    Periodical: Computerworld
    Issue & Page numbers: (19 Jun 78): 15

    Bibliography Sequence Number: 427
    Author1: Branstad, Dennis K
    Date: 1975
    Title: Draft Guidelines for Implementing and Using the NBS Data Encryption Standard (proposed)
    Publisher: Washington, DComments: National Bureau of Standards
    Keywords: DES
    Comments: 10 Nov 75

    Bibliography Sequence Number: 428
    Author1: Branstad, Dennis K
    Date: 1975
    Title: Encryption Protection in Computer Data Communication Systems
    Periodical: Proc. 4th Data Communications Symposium
    Issue & Page numbers: 8.1-8.7
    Keywords: Applications
    Comments: avail from ACM or IEEE?

    Bibliography Sequence Number: 429
    Author1: Heinrich, F
    Date: 19??
    Title: The Network Security Center: A System Network Approach to Computer Network Security
    Publisher: Washington, DComments: National Bureau of Standards, Special Pub. 500-21-Vol. 2

    Bibliography Sequence Number: 430
    Author1: Sanders, C. W. et al
    Date: 1977
    Title: Selected Examples of Possible Approaches to Electronic Communication Interception Operations
    Publisher: MITRE Tech. Rep. MTR-7461, Jan 77

    Bibliography Sequence Number: 431
    Author1: IBM
    Date: 1978
    Title: (Special Issue on Cryptology)
    Periodical: IBM Systems Journal
    Issue & Page numbers: 17, 2

    Bibliography Sequence Number: 432
    Author1: Berlekamp, Elwyn R
    Date: 1973
    Title: Goppa Codes
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-19,5 (Sep):589-592

    Bibliography Sequence Number: 433
    Author1: Kohnfelder, L. M
    Date: 1978
    Title: Towards a Practical Public-Key Cryptosystem
    Publisher: Cambridge, MA: MIT Lab. for Computer Science June 1978

    Bibliography Sequence Number: 434
    Author1: Ball, W. W. R
    Author2: Coxeter, H. S. M
    Date: 74
    Title: Mathematical Recreations and Essays
    Publisher: Toronto: Univ. Toronto Press, 12th Edition

    Bibliography Sequence Number: 435
    Author1: Bennet Jr., W. R
    Date: 1976
    Title: Scientific and Engineering Problem Solving With the Computer
    Publisher: Englewood Cliffs, NJ: Prentice-Hall
    Comments: Chapter 4

    Bibliography Sequence Number: 436
    Author1: Branstad, Dennis K
    Date: 1973
    Title: Security Aspects of Computer Networks
    Periodical: Proc. AIAA Computer Network Syst. Conf.
    Issue & Page numbers: Paper 73-427
    Keywords: Applications

    Bibliography Sequence Number: 437
    Author1: Branstad, Dennis K
    Date: 1978
    Title: Computer Security and the Data Encryption Standard
    Publisher: National Bureau of Standards Special Publ. 500-27

    Bibliography Sequence Number: 438
    Author1: Carpenter, R
    Author2: Sokol, J
    Author3: Rosenthal, R
    Date: 1978
    Title: A Microprocessor-Based Local Network Node
    Periodical: COMPCON Proc., IEEE Computer Society
    Issue & Page numbers: Sept. 1978

    Bibliography Sequence Number: 439
    Author1: Ehrsam, S
    Author2: Matyas, S
    Author3: Meyer, Carl H
    Date: 1978
    Title: A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard
    Periodical: IBM Systems Journal
    Issue & Page numbers: 17, Author2: 106-125
    Keywords: DES
    Comments: 4:Tuchman, W

    Bibliography Sequence Number: 440
    Author1: Everton, J
    Date: 1978
    Title: A Hierarchical Basis for Encryption Key Management in a Computer Communications Network
    Periodical: Trends and ApplicationBibliography Sequence Number: 1978 Proceedings of the IEEE Computer Society
    Issue & Page numbers: May 1978

    Bibliography Sequence Number: 441
    Author1: General Services Administration
    Date: 1977
    Title: Federal Standard 1026 (proposed): TelecommunicationBibliography Sequence Number: Compatibility
    requirements for use of the DES
    Publisher: GSA
    Keywords: DES
    Comments: 13 Oct 1977

    Bibliography Sequence Number: 442
    Author1: Gait, J
    Date: 1977
    Title: Validating the Correctness of Hardware Implementations of the NBS DES. Special Publ. 500-20
    Publisher: National Bureau of Standards
    Keywords: DES

    Bibliography Sequence Number: 443
    Author1: Stewart, G. W
    Date: 73
    Title: Introduction to Matrix Computation
    Publisher: NY: Academic Press

    Bibliography Sequence Number: 444
    Author1: Meyer, Carl H
    Author2: Matyas, S
    Date: 78
    Title: Cryptography: A New Dimension in Computer Data Security
    Publisher: KETRON, Inc

    Bibliography Sequence Number: 445
    Author1: U.S. Patent Office
    Date: 1978
    Title: Patent No. 4,078,152: Block-Cipher Cryptographic System with Chaining
    Publisher: Submitted by L. Tuckerman Mar-18; assigned to the IBM Corporation

    Bibliography Sequence Number: 446
    Author1: Bush, A. M
    Date: 1978
    Title: Some General Interest Books on Cryptology
    Periodical: IEEE Communications Society Magazine
    Issue & Page numbers: 16, 6: 32
    References: 447 448 449 450 451 452 029 453 454 455 025 456 457 458 459 460 461 462 463 464 142 465 466 467 468 469 470 471 182 472

    Bibliography Sequence Number: 447
    Author1: Blackstock, Paul W
    Date: 1969
    Title: The Secret Road to World War II: Soviet Versus Western Intelligence 1921-1939
    Publisher: NY: Quadrangle Books

    Bibliography Sequence Number: 448
    Author1: Burke, Davis
    Date: 1969
    Title: Get Yamamoto
    Publisher: NY: Random House

    Bibliography Sequence Number: 449
    Author1: Dulles, Allen W
    Date: 1966
    Title: The Secret Surrender
    Publisher: NY: Harper and Row

    Bibliography Sequence Number: 450
    Author1: Farago, Ladislas
    Date: 1967
    Title: The Broken Seal
    Publisher: NY: Random House

    Bibliography Sequence Number: 451
    Author1: Foote, Alexander
    Date: 1979
    Title: Handbook for Spies
    Publisher: NY: Doubleday

    Bibliography Sequence Number: 452
    Author1: Friedman, William F
    Author2: Friedman, Elizabeth S
    Date: 57
    Title: The Shakespearean Cipher Examined
    Publisher: NY: Cambridge University Press

    Bibliography Sequence Number: 453
    Author1: Galland, Joseph S
    Date: 1945
    Title: An Historical and Analytical Bibliography of the Literature of Cryptology
    Publisher: NY: AMS Press

    Bibliography Sequence Number: 454
    Author1: Hoebling, A. A
    Date: 1963
    Title: The Week Before Pearl Harbor
    Publisher: NY: Norton

    Bibliography Sequence Number: 455
    Author1: James, Admiral Sir William
    Date: 1956
    Title: The Code Breakers of Room 40
    Publisher: NY: St. Martin

    Bibliography Sequence Number: 456
    Author1: Kimmel, Husband E
    Date: 1955
    Title: Admiral Kimmel's Story
    Publisher: Chicago: Regnery

    Bibliography Sequence Number: 457
    Author1: Lavine, Abraham L
    Date: 1921
    Title: Circuits of Victory
    Publisher: Garden City, NY: Doubleday and Page

    Bibliography Sequence Number: 458
    Author1: Lord, Walter
    Date: 1967
    Title: Incredible Victory
    Publisher: NY: Harper and Row

    Bibliography Sequence Number: 459
    Author1: Masterman, C
    Date: 1972
    Title: The Double-Cross System in the Was of 1939-1945
    Publisher: New Haven: Yale University Press

    Bibliography Sequence Number: 460
    Author1: McLachlan, Donald
    Date: 1968
    Title: Room 39: A Study in Naval Intelligence
    Publisher: NY: Atheneum

    Bibliography Sequence Number: 461
    Author1: Moore, Dan T
    Author2: Waller, Martha
    Date: ??
    Title: Cloak and Cipher
    Publisher: NY: Bobbs-Merrill

    Bibliography Sequence Number: 462
    Author1: Morgenstern, George
    Date: 1947
    Title: Pearl Harbor: The Story of the Secret War
    Publisher: NY: Devin-Adair

    Bibliography Sequence Number: 463
    Author1: Perrault, Gilles
    Date: 1964
    Title: The Secret of D-Day
    Publisher: Boston: Little, Brown
    Comments: Translated from the French by Len Ortzen

    Bibliography Sequence Number: 464
    Author1: Pratt, Fletcher
    Date: 1939
    Title: Secret and UrgenTitle: The Story of Codes and Ciphers
    Publisher: NY:The Bobbs-Merrill Co.
    Comments: Reprinted 1942 by Blue Ribbon Books, Garden City

    Bibliography Sequence Number: 465
    Author1: Smith, Laurence D
    Date: 1943
    Title: Cryptography
    Publisher: NY: Norton

    Bibliography Sequence Number: 466
    Author1: Strong, Sir Kenneth
    Date: 1972
    Title: Men of Intelligence
    Publisher: NY: St. Martin

    Bibliography Sequence Number: 467
    Author1: Theobald, Robert A
    Date: 1954
    Title: The Final Secret of Peral Harbor
    Publisher: NY: Devin-Adair
    Comments: The author was Rear Admiral, U.S.N., (Ret.)

    Bibliography Sequence Number: 468
    Author1: Trefousse Ed., Hans L
    Date: 1958
    Title: What Happened at Pearl Harbor
    Publisher: NY: Twayne Publishers

    Bibliography Sequence Number: 469
    Author1: Tuchman, Barbara
    Date: 1958
    Title: The Zimmerman Telegram
    Publisher: NY: Viking

    Bibliography Sequence Number: 470
    Author1: Wohlsetter, Roberta
    Date: 1962
    Title: Pearl Harbor: Warning and Decision
    Publisher: StanforDate: Stanford University Press

    Bibliography Sequence Number: 471
    Author1: Wolfe, James R
    Date: 1970
    Title: Secret Writing: The Craft of the Cryptographer
    Publisher: NY: McGraw-Hill

    Bibliography Sequence Number: 472
    Author1: Zacharias, Ellis M
    Date: 1946
    Title: Secret MissionBibliography Sequence Number: The Story of an Intelligence Officer
    Publisher: NY: Putnam

    Bibliography Sequence Number: 473
    Author1: Boggs, D
    Author2: Shoch, J
    Author3: Taft, E
    Date: 1980
    Title: PuPeriodical: An Internetwork Architecture
    Periodical: IEEE Transactions on Computers
    Issue & Page numbers: Feb 1980 (to appear)
    Comments: 4:Metcalfe, R

    Bibliography Sequence Number: 474
    Author1: Carlstedt, J
    Author2: Bisbey, R
    Author3: Popek, G
    Date: 1975
    Title: Pattern Directed Protection Evaluation
    Publisher: Del Rey, CA: Information Sciences Inst., U. of Southern California; Rep. ISI/RR-75-31

    Bibliography Sequence Number: 475
    Author1: Cerf, V
    Author2: Kirstein, P
    Date: 78
    Title: Issues in Packet-Network Interconnection
    Periodical: Proceedings of the IEEE
    Issue & Page numbers: 66, 11 (Nov 1978): 1386-1408

    Bibliography Sequence Number: 476
    Author1: Dennis, J. B
    Author2: Van Horn, E. C
    Date: 66
    Title: Programming Semantics for Multiprogrammed Computations
    Periodical: CACM
    Issue & Page numbers: 9, 3 (March): 143-155

    Bibliography Sequence Number: 477
    Author1: Downs, D
    Author2: Popek, G
    Date: 79
    Title: Data Base System Security and Ingres
    Periodical: Proc. Conf. Very Large Data Bases
    Issue & Page numbers: ???

    Bibliography Sequence Number: 478
    Author1: Fabry, R. S
    Date: 1974
    Title: Capability-Based Addressing
    Periodical: CACM
    Issue & Page numbers: 17, 7: (July): 403-412

    Bibliography Sequence Number: 479
    Author1: Feiertag, Richard J
    Author2: Neumann, Peter G
    Date: 79
    Title: The Foundations of a Provably Secure Operating System (PSOS)
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 48: 329-334

    Bibliography Sequence Number: 480
    Author1: Good, D I
    Date: 1977
    Title: Constructing Verified and Reliable Communications Processing Systems
    Periodical: ACM Soft. Eng. Notes
    Issue & Page numbers: (Oct 1977): 2-5

    Bibliography Sequence Number: 481
    Author1: Hellman, Martin E
    Date: 1978
    Title: Security in Communications Networks
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 47: 1131-1134

    Bibliography Sequence Number: 482
    Author1: Kent, Steve T
    Date: 1976
    Title: Encryption-Based Protection Protocols for Interactive User-Computer Communication
    Publisher: MIT/LCS/TR-162
    Keywords: Applications
    Comments: "This thesis develops protocols for the use of block cipher systems
    Comments: in protecting and authenticating messages sent over networks with
    Comments: asynchronous and full duplex line protocols" (006)
    Comments: This is his M.S. Thesis, EECS Dept.

    Bibliography Sequence Number: 483
    Author1: Kimbleton, S. R
    Author2: Schneider, G. M
    Date: 75
    Title: Computer Communications Networks: Approaches, Objectives and Performance Considerations
    Periodical: Comput. Surv
    Issue & Page numbers: 7, 3 (Sept): 129-173

    Bibliography Sequence Number: 484
    Author1: Kline, Charles S
    Author2: Popek, Gerald J
    Date: 79
    Title: Public Key vs. Conventional Key Encryption
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 48: 831-837

    Bibliography Sequence Number: 485
    Author1: Konheim, Alan G
    Date: 1978
    Title: Cryptographic Methods for Data Protection
    Publisher: Yorktown Heights, NY: IBM T.J. Watson Res. Ctr. Rep. RC 7026 (#30100)

    Bibliography Sequence Number: 486
    Author1: Lampson, Butler W
    Date: 1973
    Title: A Note on the Confinement Problem
    Periodical: CACM
    Issue & Page numbers: 16, 10 (Oct): 613-615

    Bibliography Sequence Number: 487
    Author1: Lennon, R. E
    Date: 1978
    Title: Cryptography Architecture for Information Security
    Periodical: IBM Systems Journal
    Issue & Page numbers: 17, Author2: 138-150

    Bibliography Sequence Number: 488
    Author1: McCauley, E. J
    Author2: Drongowski, P J
    Date: 79
    Title: KSOS - The Design of a Secure Operating System
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 48: 345-353

    Bibliography Sequence Number: 489
    Author1: Meyer, Carl H
    Date: 1973
    Title: Design Considerations for Cryptography
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 42: 603-606

    Bibliography Sequence Number: 490
    Author1: Popek, Gerald J
    Date: 1974
    Title: Protection Structures
    Periodical: IEEE Computer
    Issue & Page numbers: 7, 6 (June): 22-33

    Bibliography Sequence Number: 491
    Author1: Popek, Gerald J
    Date: 1974
    Title: A Principle of Kernel Design
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 43: 977-978

    Bibliography Sequence Number: 492
    Author1: Popek, Gerald J
    Author2: Kline, C. S
    Date: 78
    Title: Design Issues for Secure Computer Networks
    Periodical: in Operating Systems, an Advanced Course; R. Bayer et al Eds.;NY: Speinger-Verlag

    Bibliography Sequence Number: 493
    Author1: Popek, Gerald J
    Author2: Kampe, Mark
    Author3: Kline, Charles S. et al
    Date: 1979
    Title: UCLA Secure Unix
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 48: 355-364
    Comments: 4:Stoughton, Allen
    Comments: 5:Urban, Michael
    Comments: 6:Walton, Evelyn J

    Bibliography Sequence Number: 494
    Author1: Rabin, Michael O
    Date: 1978
    Title: Digitalized Signatures
    Periodical: in Foundations of Secure Computing; R. DeMillo et al Eds.;NY:Academic Press
    Issue & Page numbers: 155-168

    Bibliography Sequence Number: 495
    Author1: Redell, D. D
    Author2: Fabry, R. S
    Date: 74
    Title: Selective Revocation of Capabilities
    Periodical: in Proc. IRIA Conf. Protection in Operating Systems
    Issue & Page numbers: ??

    Bibliography Sequence Number: 496
    Author1: Roberts, L
    Author2: Wessler, B
    Date: 73
    Title: The ARPA Network
    Periodical: in Computer Communication Networks; Englewood Cliffs, NJ: Prentice-hall
    Issue & Page numbers: 485-499

    Bibliography Sequence Number: 497
    Author1: Saltzer, J. H
    Date: 1978
    Title: On Digital Signatures
    Periodical: ACM Operating Syst. Rev
    Issue & Page numbers: 12, 2 (Apr): 12-14

    Bibliography Sequence Number: 498
    Author1: Sendrow, M
    Date: 1978
    Title: Key Management in EFT Environments
    Periodical: in Proc. COMPCON
    Issue & Page numbers: (8 Sep 78): 351-354
    Keywords: key distribution
    Comments: NY: IEEE

    Bibliography Sequence Number: 499
    Author1: Westin, A. F
    Date: 1970
    Title: Privacy and Freedom
    Publisher: NY: Atheneum Press

    Bibliography Sequence Number: 500
    Author1: Kruh, Louis
    Date: 1981
    Title: A Code Problem: A Book Review
    Periodical: Cryptologia
    Issue & Page numbers: 5:124-125
    References: 080

    Bibliography Sequence Number: 501
    Author1: Craig, Jim
    Date: 1981
    Title: A Data Encryption System with Low Overhead: An Effective, Low-Cost Way to Disguise Computer Data
    Periodical: Information Systems News
    Issue & Page numbers: (June 15): 26-27
    Keywords: RANDOM
    Comments: XOR scheme (faster than NBSDES) suggested for database cryption

    Bibliography Sequence Number: 502
    Author1: Marketing Consultants International, Inc
    Date: 1981
    Title: Who, What, and Where in COMMUNICATIONS SECURITY
    Publisher: Hagerstown, MDate: M. C. I., Inc
    Length: 124+xi pages
    Keywords: RANDOM
    Comments: $175

    Bibliography Sequence Number: 503
    Author1: Handelman, George H
    Date: 1981
    Title: Special ReporTitle: Cryptographic Research and the National Security
    Periodical: SIAM News
    Issue & Page numbers: 14, 3 (June): 1,4,5
    Keywords: RANDOM
    Keywords: NSA
    Comments: The author is a member of the Public Cryptography Study Group of the
    Comments: American Council on Education; and gives information concerning it.
    References: 025 383 005 368 040

    Bibliography Sequence Number: 504
    Author1: Carroll, J., et. al. (eds)
    Date: 1971
    Title: The American Heritage Word Frequency Book
    Publisher: Boston: Houghton Mifflin
    Keywords: Freq
    Comments: pages 565-567

    Bibliography Sequence Number: 505
    Author1: COMPLAN
    Date: 1976
    Title: TLP Sequence as Key Stream for Vernam Cryption
    Publisher: Tech. Note TN-913-8d (26-Aug-76)
    Keywords: RANDOM

    Bibliography Sequence Number: 506
    Author1: COMPLAN
    Date: 1977
    Title: Cryptopak (tm) Software Package Technical Description
    Publisher: COMPLAN Inc.
    Length: ??
    Keywords: RANDOM
    Comments: 17-MAR-7 version??
    Comments: references Alfabit (tm) TD; 13-Apr-76 version

    Bibliography Sequence Number: 507
    Author1: COMPLAN
    Date: 1977
    Title: One-Way Keyed and Keyless Ciphers; Nonreproducible Cipher
    Periodical: Tech. Note TN-913-24 (28-Feb-77)
    Keywords: RANDOM

    Bibliography Sequence Number: 508
    Author1: COMPLAN
    Date: 1978
    Title: Some Considerations in the Design and Implementations of the QIK-CRYPT (tm) Algorithm
    Periodical: Tech. Note TN-913-33 (28-Jul-78)
    Keywords: RANDOM

    Bibliography Sequence Number: 509
    Author1: Cooley, J. W
    Author2: Tukey, J. W
    Date: 65
    Title: An Algorithm for the Machine Calculation of Complex Fourier Series
    Periodical: Mathematics of Computation
    Issue & Page numbers: 19: 297-301
    Keywords: RANDOM

    Bibliography Sequence Number: 510
    Author1: Coveyou, R. R
    Date: 1960
    Title: Serial Correlation in the Generation of Pseudo-Random Numbers
    Periodical: Journal of the ACM
    Issue & Page numbers: 7, 1 (Jan): 72-74
    Keywords: RANDOM

    Bibliography Sequence Number: 511
    Author1: Coveyou, R. R
    Author2: MacPherson, R. D
    Date: 67
    Title: Fourier Analysis of Uniform Random Number Generators
    Periodical: Journal of the ACM
    Issue & Page numbers: 14, 1 (Jan): 100-119
    Keywords: RANDOM

    Bibliography Sequence Number: 512
    Author1: Enison, R. L
    Author2: Bright, H. S
    Date: 76
    Title: Preliminary Statistical Testing of a 64-bit Tausworthe-Lewis-Payne Quasirandom Number Generator of
    Mersenne Exponent Degree
    Periodical: Proc. 9th Interface Symp. Computer Science and Statistics
    Issue & Page numbers: 208-211
    Keywords: RANDOM
    Comments: David C. Hoaglin and Roy E. Welsch Editors
    Comments: Prindle, Weber, and Schmidt, Boston

    Bibliography Sequence Number: 513
    Author1: Green, B. F
    Author2: Smith, J. E. K
    Author3: Klem, L
    Date: 1959
    Title: Empirical Tests of an Additive Random Number Generator
    Periodical: Journal of the ACM
    Issue & Page numbers: 6, 4 (Oct): 527-537
    Keywords: RANDOM

    Bibliography Sequence Number: 514
    Author1: Greenberger, M
    Date: 1961
    Title: An A Priori Determination of Serial Correlation in Computer Generated Random Numbers
    Periodical: Mathematics of Computation
    Issue & Page numbers: 15: 383-389
    Keywords: RANDOM

    Bibliography Sequence Number: 515
    Author1: Gruenberger, F
    Author2: Mark, A. M
    Date: 51
    Title: The Date: *2 Test for Random Digits
    Periodical: MTAC
    Issue & Page numbers: 5: 109-110
    Keywords: RANDOM

    Bibliography Sequence Number: 516
    Author1: Ingemarsson, Ingemar
    Date: 1976
    Title: Analysis of Secret Functions with Application to Computer Cryptography
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 45: 125-127
    Keywords: RANDOM
    Keywords: INFORMATION THEORY

    Bibliography Sequence Number: 517
    Author1: Juncosa, M. L
    Date: 1953
    Title: Random Number Generation on the BRL High Speed Computing Machine
    Publisher: BRL Report 855
    Keywords: RANDOM

    Bibliography Sequence Number: 518
    Author1: Knuth, Donald
    Date: 1965
    Title: Construction of a Random Sequence
    Periodical: BIT
    Issue & Page numbers: 5: 246-250
    Keywords: RANDOM

    Bibliography Sequence Number: 519
    Author1: Lehmer, D. H
    Date: 1951
    Title: Mathematical Methods in Large-Scale Computing Units
    Periodical: Ann. Comput. Lab. Harvard U
    Issue & Page numbers: 26: 141-146
    Keywords: RANDOM

    Bibliography Sequence Number: 520
    Author1: Lewis, P. A. W
    Author2: Goodman, A. S
    Author3: Miller, J. M
    Date: 1973
    Title: A Pseudo-Random Number Generator for the System/360
    Periodical: IBM Systems Journal
    Issue & Page numbers: 8: 456-468
    Keywords: RANDOM

    Bibliography Sequence Number: 521
    Author1: Lewis, T. G
    Author2: Payne, W. H
    Date: 73
    Title: Generalized Feedback Shift Register Pseudorandom Number Algorithm
    Periodical: J. ACM
    Issue & Page numbers: 20, 3 (July): 456-468
    Keywords: RANDOM

    Bibliography Sequence Number: 522
    Author1: Lindgren, B. W
    Author2: McElrath, G. W
    Date: 70
    Title: Introduction to Probability and Statistics
    Publisher: 3rd Edition; New YorKeywords: McMillan
    Keywords: RANDOM
    Comments: see page 170

    Bibliography Sequence Number: 523
    Author1: Marsaglia, G
    Date: 1968
    Title: Random Numbers Fall Mainly In the Planes
    Periodical: Proc. Nat. Acad. Sci.
    Issue & Page numbers: 6: 25-28
    Keywords: RANDOM

    Bibliography Sequence Number: 524
    Author1: Martin-Lof, P
    Date: 1966
    Title: The Definition of Random Sequences
    Periodical: Inform. Control
    Issue & Page numbers: 9: 602-619
    Keywords: RANDOM

    Bibliography Sequence Number: 525
    Author1: Moshman, J
    Date: 1954
    Title: The Generation of Pseudo-Random Numbers on a Decimal Calculator
    Periodical: J. ACM
    Issue & Page numbers: 1, 2 (April): 88-91
    Keywords: RANDOM

    Bibliography Sequence Number: 526
    Author1: Thomas, W. I
    Date: 1901
    Title: ???
    Periodical: Am. J. Sociol.
    Issue & Page numbers: 6: 750-763
    Keywords: RANDOM

    Bibliography Sequence Number: 527
    Author1: Tootill, J. P. R
    Author2: Robinson, W. D
    Author3: Adams, A. G
    Date: 1971
    Title: The Runs Up-And-Down Performances of Tausworthe Pseudo-Random Number Generators
    Periodical: J. ACM
    Issue & Page numbers: 18, 3 (July): 381-399
    Keywords: RANDOM

    Bibliography Sequence Number: 528
    Author1: Tootill, J. P. R
    Author2: Robinson, W. D
    Author3: Eagle, D. J
    Date: 1973
    Title: An Asymptotically Random Tausworthe Sequence
    Periodical: J. ACM
    Issue & Page numbers: 20, 3 (July): 469-481
    Keywords: RANDOM

    Bibliography Sequence Number: 529
    Author1: Tuckerman, B
    Date: 1971
    Title: The 24th Mersenne Prime
    Periodical: Proc. Nat. Acad. Sci USA
    Issue & Page numbers: 68, 10 (Oct): 2319-2320
    Keywords: RANDOM

    Bibliography Sequence Number: 530
    Author1: Editor
    Date: 1979
    Title: Onward and Upward
    Periodical: Scientific American
    Issue & Page numbers: 241, 3 (Sep): 32
    Keywords: primes
    Comments: concerns 26th and 27th Mersenne Prime

    Bibliography Sequence Number: 531
    Author1: Whittlesey, J. R. B
    Date: 1968
    Title: A Comparison of the Correlational Behavior of Random Number Generators for the IBM 360
    Periodical: CACM
    Issue & Page numbers: 11, 9 (Sept): 641-644
    Keywords: RANDOM

    Bibliography Sequence Number: 532
    Author1: Zierler, N
    Date: 1969
    Title: Primitive Trinomials whose degree is a Mersenne Exponent
    Periodical: Inform. Control
    Issue & Page numbers: 15: 67-69
    Keywords: RANDOM

    Bibliography Sequence Number: 533
    Author1: Brunner, E. R
    Date: 1976
    Title: Efficient Speech Scrambling: An Economic Solution to the Secure Voice Communication Problem
    Periodical: Rec. Int. Conf. Communications Equipment and Systems
    Issue & Page numbers: 336-339
    Keywords: Analog Scrambling

    Bibliography Sequence Number: 534
    Author1: Kirchhofer, Kirk H
    Date: 1976
    Title: Secure Voice Communication - Cryptophony
    Periodical: Int. Defense Rev.
    Issue & Page numbers: 9 (May): 761-767
    Keywords: Analog Scrambling

    Bibliography Sequence Number: 535
    Author1: McCalmont, A. M
    Date: 1973
    Title: Communication Security for Voice-Techniques, Systems, and Operations
    Periodical: Telecommun.
    Issue & Page numbers: April: 35-42
    Keywords: Analog Scrambling

    Bibliography Sequence Number: 536
    Author1: McCalmont, A. M
    Date: 1974
    Title: How to Select and Apply Various Voice Scrambling Techniques
    Periodical: Commun. News
    Issue & Page numbers: Jan: 34-37
    Keywords: Analog Scrambling

    Bibliography Sequence Number: 537
    Author1: Wyner, Aaron D
    Date: 1979
    Title: An Analog Scrambling Scheme Which Does Not Expand Bandwidth, Part I
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-25 (May)
    Keywords: Analog Scrambling
    Comments: "A promising new approach to analog scrambling using n-space rotations
    Comments: of vectors of sample points as the keying elements, and discrete prolate
    Comments: spheroidal wave functions to encode the signal in an optimally bandwidth
    Comments: efficient manner." (006)

    Bibliography Sequence Number: 538
    Author1: Baran, Paul
    Date: 1964
    Title: On Distributed Communications: IX. Security, Secrecy, and Tamper-Free Considerations
    Publisher: Santa Monica, CA: The Rand Corporation; RM-3765-PR
    Keywords: Applications
    Comments: Reprinted in Lance J. Hoffman, Ed. 'Security and Privacy in Computer Systems'
    Comments: Los Angeles, CA: Melville Publ. 1973, pp. 99-123
    Comments: "This is a fine discussion of the application of stream cryptography to
    Comments: computer networks. It is part of a series of papers which laid the
    Comments: foundations for packetized computer networks" (006)
    References: 648

    Bibliography Sequence Number: 539
    Author1: Gudes, Ehud
    Author2: Koch, Harvey S
    Author3: Stahl, Fred A
    Date: 1976
    Title: The Application of Cryptography for Data Base Security
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 45: 97-107
    Keywords: Applications

    Bibliography Sequence Number: 540
    Author1: Keys, Richard R
    Author2: Clamons, Eric H
    Date: 74
    Title: Security Architecture Using Encryption
    Publisher: in Approaches to Privacy and Security in Computer Systems
    Keywords: Applications
    Comments: Proceedings of a conference held at the NBS; pages 37-41; March 4-5

    Bibliography Sequence Number: 541
    Author1: Keys, Richard R
    Author2: Clamons, Eric H
    Date: 74
    Title: File Encryption as a Security Tool
    Periodical: Honeywell Comput. J
    Issue & Page numbers: 8, Author2: 90-93
    Keywords: Applications

    Bibliography Sequence Number: 542
    Author1: Schmid, Pierre E
    Date: 1976
    Title: Review of Ciphering Methods to Achieve Communication Security in Data Transmission Networks
    Periodical: Proc. Int. Zurich Seminar on Digital Communications
    Issue & Page numbers: March 11
    Keywords: applications

    Bibliography Sequence Number: 543
    Author1: Smith, J. Lynn
    Author2: Notz, W. A
    Author3: Osseck, P. R
    Date: 1972
    Title: An Experimental Application of Cryptography to a Remotely Accessed Data System
    Periodical: Proc. ACM Nat. Conf.
    Issue & Page numbers: 282-297
    Keywords: applications
    Comments: "A description of the construction of an experimental system using Lucifer
    Comments: to communicate with an IBM 360/67 timesharing system" (006)

    Bibliography Sequence Number: 544
    Author1: Feistel, Horst
    Date: 1958
    Title: A Survey of Problems and Systems in Authenticated Communication and Control
    Publisher: MIT Lincoln Lab
    Keywords: authentication

    Bibliography Sequence Number: 545
    Author1: Widmer, Walter R
    Date: 1976
    Title: Message Authentication, A Special Identification Requirement in One-Way Digital Data Transmission
    Periodical: Proc. Int. Zurich Seminar on Digital Communications
    Keywords: authentication

    Bibliography Sequence Number: 546
    Author1: Scherf, John Arthur
    Date: 1974
    Title: Computer and Data Security: A Comprehensive Annotated Bibliography
    Publisher: MIT Project MAC Tech. Rep. 122
    Keywords: Bibliography
    Comments: "This bibliography is less comprehensive on cryptography than the present
    Comments: present one, but its extensive coverage of other aspects of computer
    Comments: security will be of use to those interested in application of
    Comments: cryptography." (006)

    Bibliography Sequence Number: 547
    Author1: Eyraud, Charles
    Date: 1959
    Title: Precis de Cryptographie Moderne
    Publisher: Paris, France: Editions Raoul Tari, 1st Ed. 1953; 2nd ed. 1959
    Keywords: Classical
    Comments: "This is the most recent public treatise on cryptanalysis, and as such
    Comments: touches on some relatively modern devices such as the Hagelin machine
    Comments: which are omitted in earlier works" (006)

    Bibliography Sequence Number: 548
    Author1: Friedman, William F
    Date: 1944
    Title: Military Cryptanalysis, Volume II - Simpler Varieties of Polyalphabetic Substitution Systems
    Publisher: Washington, DComments: U.S. GPO
    Keywords: Classical
    Comments: several major libraries
    References: 205 549 550

    Bibliography Sequence Number: 549
    Author1: Friedman, William F
    Date: 1944
    Title: Military Cryptanalysis, Volume III - Aperiodic Substitutions
    Publisher: Washington, DComments: U.S. GPO
    Keywords: classical
    References: 205 548 550

    Bibliography Sequence Number: 550
    Author1: Friedman, William F
    Date: 1944
    Title: Military Cryptanalysis, Volume IV - Transposition Systems
    Publisher: Washington, DComments: U.S. GPO
    Keywords: classical
    References: 205 548 549

    Bibliography Sequence Number: 551
    Author1: Coppersmith, Don
    Author2: Grossman, Edna
    Date: 75
    Title: Generators for Certain Alternating Groups with Applications to Cryptography
    Periodical: SIAM Journal of Applied Math
    Issue & Page numbers: 29 (Dec): 624-627
    Keywords: cryptanalysis
    Comments: "This paper examines the family of permutation generated by schemes which
    Comments: are in some ways a generalization and in some other ways a specialization
    Comments: of the method used in the IBM Lucifer family of ciphers." (006)

    Bibliography Sequence Number: 552
    Author1: Edwards, Daniel J
    Date: 1966
    Title: OCAS - On-Line Cryptanalytic Aid System
    Publisher: MIT Project MAC Tech. Rep. 27
    Keywords: cryptanalysis
    Comments: "A primitive system for computer aided cryptanalysis, including a language
    Comments: with integer arithmetic and strings over definable alphabets. Routines
    Comments: to find the period of a polyalphabetic cipher, do frequency counts, and
    Comments: locate repeated sequences are shown, but not built in." (006)

    Bibliography Sequence Number: 553
    Author1: Grossman, Edna
    Date: 1974
    Title: Group Theoretic Remarks on Cryptographic Systems Based on Two Types of Additon
    Publisher: Yorktown Heights, NY: IBM T.J. Watson Research Center RC 4742 (Feb 26)
    Keywords: cryptanalysis
    Comments: "This paper determines the class of transformations generated by a system
    Comments: which alternates addition mod 2 with additon mod Author2: *n." (006)

    Bibliography Sequence Number: 554
    Author1: Key, Edwin L
    Date: 1976
    Title: An Analysis of the Structure and Complexity of Non-Linear Binary Sequence Generators
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-22 (Nov): 732-736
    Keywords: cryptanalysis

    Bibliography Sequence Number: 555
    Author1: Kjeldsen, K
    Date: 1976
    Title: On the Cycle Structure of a Set of Nonlinear Shift Registers with Symmetric Feedback Functions
    Periodical: J. Combinatorial Theory (A)
    Issue & Page numbers: Author2: 154-169
    Keywords: cryptanalaysis

    Bibliography Sequence Number: 556
    Author1: Tuckerman, Bryant
    Date: 1973
    Title: Solution of a Substitution-Fractionation-Transposition Cipher
    Publisher: Yorktown Heights, NY: T.J. Watson Research Center; RC 4537 (Sep 21)
    Keywords: cryptanalysis
    Comments: "Solution of a cipher which is similar to one round of the system
    Comments: shown in Figure 10" (006)

    Bibliography Sequence Number: 557
    Author1: Kahn, David
    Date: 1976
    Title: Tapping Computers
    Periodical: New York Times
    Issue & Page numbers: April Author3: 27 (Op. Ed.)
    Keywords: DES

    Bibliography Sequence Number: 558
    Author1: Lexar Corp
    Date: 1976
    Title: An Evaluation of the NBS Data Encryption Standard
    Publisher: Los Angeles, CA: Lexar Corp.
    Keywords: DES
    Comments: "This report is remarkably similar to Hellman et al [Ref 375]" (006)
    Comments: 11611 San Vicente Blvd

    Bibliography Sequence Number: 559
    Author1: Stephan, E
    Date: 1978
    Title: Communication Standards for using DES
    Periodical: Proc. COMPCON
    Keywords: DES

    Bibliography Sequence Number: 560
    Author1: Sykes, David J
    Date: 1977
    Title: Implementation of the NBS Encryption Standard
    Periodical: presented at the 1977 Honeywell Computer Security and Privacy Symp. Apr 19-20
    Keywords: DES

    Bibliography Sequence Number: 561
    Author1: Tuchman, Walter L
    Date: 1978
    Title: Efficacy of DES in Data Processing
    Periodical: Proc. COMPCON
    Keywords: DES

    Bibliography Sequence Number: 562
    Author1: Yasaki, Edward K
    Date: 1976
    Title: Encryption Algorithm: Key Size is the Thing
    Periodical: Datamation
    Issue & Page numbers: 22, 3 (March): 164, 166
    Keywords: DES
    References: 866 867 868

    Bibliography Sequence Number: 563
    Author1: Callimahos, Lambros D
    Date: 1973
    Title: Cryptography
    Periodical: Colliers Encyclopedia
    Issue & Page numbers: 7: 513-530
    Keywords: ENCYCLOPEDIA

    Bibliography Sequence Number: 564
    Author1: Callimahos, Lambros D
    Date: 1976
    Title: Cryptology
    Periodical: Encyclopedia Britanica, 15th ed., Macropedia
    Issue & Page numbers: 5: 322-333
    Keywords: ENCYCLOPEDIA

    Bibliography Sequence Number: 565
    Author1: Kahn, David
    Date: 1976
    Title: Cryptology
    Periodical: Encyclopedia Americana
    Issue & Page numbers: 8: 276-285
    Keywords: ENCYCLOPEDIA

    Bibliography Sequence Number: 566
    Author1: Kahn, David
    Date: 1963
    Title: Plaintext in the New UnabridgeDate: An Examination of the Definitions on Cryptology in Websters 3rd New Int. Dict.
    Publisher: NY: Crypto Press
    Keywords: Glossary
    Comments: Section 2 of Handbook of Cryptography

    Bibliography Sequence Number: 567
    Author1: Flato, Linda
    Date: 1978
    Title: NSA's Computer Story: Report Lauds Intelligence Agency's Pioneering Role in Computers
    Periodical: Datamation
    Issue & Page numbers: 24, 3 (March): 207,208,212
    Keywords: historical

    Bibliography Sequence Number: 568
    Author1: Jones, Bian
    Date: 1978
    Title: The Secret War
    Publisher: NY: Methuen
    Keywords: historical
    Comments: Chapter 6 contains a good account of British cryptanalysis during World War II

    Bibliography Sequence Number: 569
    Author1: Chu, Wesley W
    Author2: Neat, Charlie
    Date: 76
    Title: A New Computer Cryptography: The Expanded Character Set (ECS) Cipher
    Publisher: Dedham, MA: Artech House
    Keywords: homophonic systems
    Comments: Advances in Computer Communications (Sect. XIII - Computer Communications Security)

    Bibliography Sequence Number: 570
    Author1: Stahl, Fred A
    Date: 1973
    Title: A Homophonic Cipher for Computational Cryptography
    Periodical: Proc. Nat. Computer Conf.
    Issue & Page numbers: 565-568
    Keywords: homophonic systems

    Bibliography Sequence Number: 571
    Author1: Stahl, Fred A
    Date: 1974
    Title: On Computational Security
    Publisher: Ph.D. dissertation, Univ. Illinois, Urbana, Rep. R-637, UILU-ENG 73-2241, Jan.
    Keywords: homophonic systems

    Bibliography Sequence Number: 572
    Author1: Carleial, Aydano B
    Author2: Hellman, Martin E
    Date: 77
    Title: A Note on Wyner's Wiretap Channel
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-23 (May): 387-390
    Keywords: information theory
    Comments: "This paper presents a slight generalization of Wyner's results on
    Comments: wiretap channels and suggests a way to quantify Shannon's concept of
    Comments: cryptographic diffusion" (006)

    Bibliography Sequence Number: 573
    Author1: Creighton, James E., editor
    Date: 1900
    Title: Advancement of Learning and Novum Organum by Francis Bacon
    Publisher: NY: The Colonial Press
    Keywords: Bacon
    Comments: U. of Pa. Library Number 119/B113Aa
    Comments: pages 167-171 are English translation of Latin in Ref 612 (pages 419-427)

    Bibliography Sequence Number: 574
    Author1: Leung-Yan-Cheong, S. K
    Author2: Hellman, Martin E
    Date: 78
    Title: The Gaussian Wire-Tap Channel
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-24 (Sep): 451-456
    Keywords: information theory

    Bibliography Sequence Number: 575
    Author1: Wyner, Aaron D
    Date: 1975
    Title: The Wiretap Channel
    Periodical: Bell Syst. Tech. J
    Issue & Page numbers: 54, 8 (Oct): 1355-1387
    Keywords: information theory
    Comments: "This paper evaluates the rate at which information can be conveyed
    Comments: to a legitimate receiver and kept secret from a wiretapper whose
    Comments: channel is noisier, introducing a new concept to both cryptography
    Comments: and information theory" (006)

    Bibliography Sequence Number: 576
    Author1: Diffie, Whitfield
    Date: 1978
    Title: Data Security for EFT and Automated Business
    Publisher: San Jose, CA: SBS Publishing
    Comments: "Prognosis for the development and business applications of
    Comments: communication security over the next twenty years, followed by
    Comments: technical and business advice for companies interested in making
    Comments: cryptographic products or employing cryptographic security." (006)

    Bibliography Sequence Number: 577
    Author1: Diffie, Whitfield
    Date: 1978
    Title: The Outlook for Computer Security
    Periodical: Mini-Micro Syst
    Issue & Page numbers: 2, 9 (Oct): 42-44
    Comments: Fairly accurate brief summary of reference #576

    Bibliography Sequence Number: 578
    Author1: Halsey, James C
    Date: 1970
    Title: Finite Automata Admitting Inverses with Some Applications to Cryptography
    Publisher: Ph.D. dissertation, Dep. Math., North Carolina State Univ., Raleigh, NC

    Bibliography Sequence Number: 579
    Author1: Kam, John B
    Author2: Davida, George I
    Date: 78
    Title: A Structured Design of Substitution-Permutation Encryption Network
    Publisher: in Foundations of Secure Computation; NY: Academic Press; DeMillo, R. A. et al Editors
    Comments: R. A. DeMillo, D. P. Doblin, A. K. Jones, R. J. Lipton, editors
    Comments: "Design of complete S-P networks (every output depends on every input) given complete S-boxes." (006)

    Bibliography Sequence Number: 580
    Author1: Girdansky, M. B
    Date: 1972
    Title: Cryptology: The Computer and Data Privacy
    Periodical: Computers and Automation
    Issue & Page numbers: 21, 4 (April): 12-19
    Keywords: survey
    Comments: "This article gives an overview of cryptographic work at IBM
    Comments: including a discussion of the weskness of linear feedback shift
    Comments: registers, Tuckerman's attack on the Vigenere-Vernam systems, and Lucifer" (006)

    Bibliography Sequence Number: 581
    Author1: Benedict, G. Gordon
    Date: 1974
    Title: An Enciphering Module for Multics
    Publisher: MIT Project MAC, Tech. Memo. 50
    Keywords: system design and implementation
    Comments: "This masters thesis describes the computer implementation of the IBM
    Comments: Lucifer system as described by Smith" (006)

    Bibliography Sequence Number: 582
    Author1: Carroll, J. M
    Author2: McLelland, P. M
    Date: 70
    Title: Fast 'Infinite-Key' Privacy Transformation for Resource Sharing Systems
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 37:223-230
    Keywords: system design and implementation
    Comments: "This paper describes a stream cipher based on an additive random
    Comments: number generator." (006)

    Bibliography Sequence Number: 583
    Author1: Feistel, Horst
    Date: 1970
    Title: Cryptographic Coding for Data-Bank Privacy
    Publisher: Yorktown Heights, NY: IBM T.J. Watson Research Center; Rep. RC-2827
    Keywords: system design and implementation

    Bibliography Sequence Number: 584
    Author1: Skatrud, R. O
    Date: 1969
    Title: A Consideration of the Application of Cryptographic Techniques to Data Processing
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 35: 111-117
    Keywords: system design and implementation
    Comments: "Describes two systems: a substitution system similar to a double loop
    Comments: Vigenere, and a matrix transposition system." (006)

    Bibliography Sequence Number: 585
    Author1: Smith, J. Lynn
    Date: 1971
    Title: Hardware Implementation of a Cryptographic System
    Periodical: IBM Tech. Disclosure Bull
    Issue & Page numbers: 13: 1004-1008
    Keywords: system design and implementation
    Comments: "This describes the implementation of a system different from [reference #391]" (006)

    Bibliography Sequence Number: 586
    Author1: Squires, J
    Date: 1975
    Title: Russ Monitor of U.S. Phones
    Periodical: Chicago Tribune
    Issue & Page numbers: 25-Jun-75: 123

    Bibliography Sequence Number: 587
    Author1: Davis, Ruth M
    Date: 1978
    Title: Remedies Sought to Defeat Soviet Eavesdropping on Microwave Links
    Periodical: Microwave Syst
    Issue & Page numbers: 8, 6 (June): 17-20

    Bibliography Sequence Number: 588
    Author1: U.S. Senate Select Committee to Study Gov. Op. wrt Intelligence Activities
    Date: 1976
    Title: Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans
    Publisher: Washington, DComments: U.S. GPO
    Comments: Report No. 94-755, Book 3
    Comments: Final Report of the Committee

    Bibliography Sequence Number: 589
    Author1: Flanagan, J. L
    Date: 1972
    Title: Speech Analysis, Synthesis, and Perception, 2nd Edition
    Publisher: Berlin, Germany: Springer-Verlag

    Bibliography Sequence Number: 590
    Author1: Reddy, D. Raj
    Date: 1975
    Title: Speech Recognition
    Publisher: NY: Academic Press

    Bibliography Sequence Number: 591
    Author1: unknown
    Date: 1978
    Title: Special Issue on Packet Communication Networks
    Periodical: Proceedings of the IEEE
    Issue & Page numbers: November

    Bibliography Sequence Number: 592
    Author1: Cover, Thomas M
    Author2: King, Roger C
    Date: 78
    Title: A Convergent Gambling Estimate of the Entropy of English
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-24,4 (Jul):413-421

    Bibliography Sequence Number: 593
    Author1: Reeds, J
    Author2: Ritchie, D
    Author3: Morris, R
    Date: 19??
    Title: The Hagelin Cipher Machine (M-209), Cryptanalysis from Ciphertext Alone
    Periodical: Cryptologia
    Issue & Page numbers: to appear
    Comments: "Cryptanalysis of the M-209 from ciphertext only." (006)

    Bibliography Sequence Number: 594
    Author1: Watson, E. J
    Date: 1962
    Title: Primitive Polynomial (mod 2)
    Periodical: Mathematics of Computation
    Issue & Page numbers: 16: 368-369

    Bibliography Sequence Number: 595
    Author1: Groth, Edward J
    Date: 1971
    Title: Generation of Binary Sequences with Controllable Complexity
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-17,3 (May):288-296

    Bibliography Sequence Number: 596
    Author1: Sloane, N. J. A
    Date: 1973
    Title: A Handbook of Integer Sequences
    Publisher: NY: Academic Press

    Bibliography Sequence Number: 597
    Author1: Faggin, F
    Date: 1975
    Title: The Role of Technology in Microcomputer Design and Evolution
    Periodical: IEEE Trans. Circuits Syst
    Issue & Page numbers: CAS-7 (Feb): 4-13

    Bibliography Sequence Number: 598
    Author1: Faggin, F
    Date: 1975
    Title: Microprocessor Technology: Yesterday, Today, and Tomorrow
    Periodical: EDN
    Issue & Page numbers: 20-Nov-75

    Bibliography Sequence Number: 599
    Author1: Connolly, Ray
    Date: 1978
    Title: Pentagon to Fund Major IC Program
    Periodical: Electronics
    Issue & Page numbers: 14-Sep-78: 81-82

    Bibliography Sequence Number: 600
    Author1: unknown
    Date: 1978
    Title: VHSI Proposal Finds Willing Audience
    Periodical: Electronics
    Issue & Page numbers: 28-Sep-78: 89-90

    Bibliography Sequence Number: 601
    Author1: McCalmont, A. M
    Date: 1973
    Title: Voice Privacy (Scrambling) for More Effective Communications Techniques,
    Systems, and Operations
    Publisher: Technical Communications Corp

    Bibliography Sequence Number: 602
    Author1: Gold, B
    Date: 1977
    Title: Digital Speech Networks
    Periodical: Proceedings of the IEEE
    Issue & Page numbers: 65 (Dec): 1636-1638

    Bibliography Sequence Number: 603
    Author1: Stone, H. S
    Date: 1973
    Title: Discrete Mathematical Structures
    Publisher: Chicago, IIssue & Page numbers: Science Research Assoc.

    Bibliography Sequence Number: 604
    Author1: Parzen, E
    Date: 1960
    Title: Modern Probability Theory and Its Applications
    Publisher: NY: Wiley

    Bibliography Sequence Number: 605
    Author1: Gallager, R. G
    Date: 1968
    Title: Information Theory and Reliable Communication
    Publisher: NY: Wiley

    Bibliography Sequence Number: 606
    Author1: Lin, S
    Date: 1970
    Title: Error COrrecting Codes
    Publisher: Englewood Cliffs, NJ: Prentice-Hall

    Bibliography Sequence Number: 607
    Author1: DeMillo, R. A
    Author2: Dobkin, D. P
    Author3: Jones, A. K et al editors
    Date: 1978
    Title: Foundations of Secure Computation
    Publisher: NY: Academic Press
    Comments: 4:Lipton, R. J.
    Comments: see Ref 579 for a specific article

    Bibliography Sequence Number: 608
    Author1: Saltzer, J. H
    Author2: Schroeder, M. D
    Date: 75
    Title: The Protection of Information in Computer Systems
    Periodical: Proceedings of the IEEE
    Issue & Page numbers: 63 (Sept): 1278-1308

    Bibliography Sequence Number: 609
    Author1: Gleason, Norma
    Date: 1981
    Title: Baconian Ciphers
    Periodical: GAMES
    Issue & Page numbers: Jan/Feb: 42,66,69
    Keywords: bacon

    Bibliography Sequence Number: 610
    Author1: Friedman, William F
    Date: 1963
    Title: Six Lectures on Cryptology
    Publisher: n.p.: National Security Agency
    Length: 186
    Comments: Accessioned by National Archives from NSA; Available for $.20 per page as SRH-004

    Bibliography Sequence Number: 611
    Author1: U.S. Army Security Agency
    Date: 1946
    Title: Historical Background of the Signal Security Agency, Volume 2: World War I, 1917-1919
    Publisher: n.p

    Bibliography Sequence Number: 612
    Author1: Speeding, James
    Author2: Ellis, Robert L
    Author3: Heath, Douglas D, Editors
    Date: 1869
    Title: The Works of Francis Bacon, Volume Author2: De Augmentis Scientiarum (The Advancement of Learning)
    Publisher: NY: Hurd and Houghton
    Keywords: bacon
    Comments: U. of Pa. Library #119/B13.13
    Comments: pages 419-427, 499-503 (an appendix on crypto)

    Bibliography Sequence Number: 613
    Author1: Bussey, W. H
    Date: 1905
    Title: Galois Field Tables for p**n<=169
    Periodical: Bull. Amer. Math. Soc.
    Issue & Page numbers: 12: 22-38

    Bibliography Sequence Number: 614
    Author1: Bussey, W. H
    Date: 1910
    Title: Tables of Galois Fields of Order Less than 1000
    Periodical: Bull. Amer. Math. Soc
    Issue & Page numbers: 16: 188-206

    Bibliography Sequence Number: 615
    Author1: Carlitz, L
    Date: 1953
    Title: Permutations in a Finite Field
    Periodical: Proc. Amer. Math. Soc.
    Issue & Page numbers: 4: 538
    Keywords: GF

    Bibliography Sequence Number: 616
    Author1: Carlitz, L
    Date: 1960
    Title: A Theorem on Permutations in a Finite Field
    Periodical: Proc. Amer. Math. Soc
    Issue & Page numbers: 11: 456-459
    Keywords: GF

    Bibliography Sequence Number: 617
    Author1: Carlitz, L
    Date: 1962
    Title: Some Theorems on Permutation Polynomials
    Periodical: Bull. Amer. Math. Soc.
    Issue & Page numbers: 68: 120-122
    Keywords: GF

    Bibliography Sequence Number: 618
    Author1: Carlitz, L
    Date: 1963
    Title: Permutations in a FInite Field
    Periodical: Acta Scientiarum Mathematicarum
    Issue & Page numbers: 24: 196-203
    Keywords: GF

    Bibliography Sequence Number: 619
    Author1: Carmichael, R. D
    Date: 1937
    Title: Groups of Finite Order
    Publisher: NY: Ginn and Co
    Keywords: GF

    Bibliography Sequence Number: 620
    Author1: Church, R
    Date: 1935
    Title: Tables of Irreducible Polynomials for the First Four Prime Moduli
    Periodical: Annals of Math
    Issue & Page numbers: 36: 198-209
    Keywords: GF

    Bibliography Sequence Number: 621
    Author1: Dickson, Leonard E
    Date: 1896
    Title: Analytic Functions Suitable to Represent Substitutions
    Periodical: Amer. J. Math
    Issue & Page numbers: 18: 210-218
    Keywords: GF

    Bibliography Sequence Number: 622
    Author1: Dickson, Leonard E
    Date: 1896-1897
    Title: The Analytic Representation of Substitutions of a Power of a Prime Number of Letters with a Discussion of the Linear Group
    Periodical: Annals of Math
    Issue & Page numbers: 11: 65-120,161-183
    Keywords: GF

    Bibliography Sequence Number: 623
    Author1: Fryer, K. D
    Date: 1955
    Title: Notes on Permutations in a Finite Field
    Periodical: Proc. Amer. Math. Soc
    Issue & Page numbers: 6: 1-2
    Keywords: Keywords: GF

    Bibliography Sequence Number: 624
    Author1: Nobauer, W
    Date: 1968
    Title: Uber Eine Klasse von Permutationpolynomen und die Dadurch Dargestellten Gruppen
    Periodical: J. Reine Agnew. Math
    Issue & Page numbers: 231: 216-219

    Bibliography Sequence Number: 625
    Author1: Redei, L
    Date: 1946-1948
    Title: Uber Eindeutig Umkehrbare Polynome in Endlichen Korpern
    Periodical: Acti Sci. Math. Szeged
    Issue & Page numbers: 11: 85-92

    Bibliography Sequence Number: 626
    Author1: Stahnhe, Wayne
    Date: 1973
    Title: Primitive Binary Polynomials
    Periodical: Mathematics of Computation
    Issue & Page numbers: 27: 977-980

    Bibliography Sequence Number: 627
    Author1: Swift, J. D
    Date: 1960
    Title: Construction of Galois Fields of Characteristic Two and Irreducible Polynomials
    Periodical: Mathematics of Computation
    Issue & Page numbers: 14: 99-103

    Bibliography Sequence Number: 628
    Author1: Weinberger, E. B
    Date: 1950
    Title: The Determination and Group Properties of Minimum Functions in a Galois Field
    Publisher: Ph.D. Thesis, Univ. of Pittsburgh
    Keywords: GF

    Bibliography Sequence Number: 629
    Author1: Wells, Charles
    Date: 1967
    Title: Groups of Permutation Polynomials
    Periodical: Monatsh. Math
    Issue & Page numbers: 71: 248-262
    Keywords: GF

    Bibliography Sequence Number: 630
    Author1: Williams, K. S
    Date: 1971
    Title: Note on Dickson's Permutation Polynomials
    Periodical: Duke Math. J
    Issue & Page numbers: 38: 659-665
    Keywords: GF

    Bibliography Sequence Number: 631
    Author1: Levine, Jack
    Date: 1963
    Title: Analysis of the case n=3 in Algebraic Cryptography with Involutory Key-Matrix and Known Alphabet
    Periodical: Jour. fuer die Reine und Angewandte Mathematik
    Issue & Page numbers: 213: 1-30
    Keywords: GF

    Bibliography Sequence Number: 632
    Author1: Von Neumann, ?
    Author2: Morgenstern, ?
    Date: 47
    Title: The Theory of Games

    Bibliography Sequence Number: 633
    Author1: Doob, J. L
    Date: 1941
    Title: Probility as Measure
    Periodical: Annals of Math. Stat
    Issue & Page numbers: 12: 206-214

    Bibliography Sequence Number: 634
    Author1: Hopf, E
    Date: 1934
    Title: On Causality, Statistics, and Probability
    Periodical: Journal of Math. and Physics
    Issue & Page numbers: 13: 51-102

    Bibliography Sequence Number: 635
    Author1: Cohn, H
    Date: 1962
    Title: A Second Course in Number Theory
    Publisher: NY: John Wiley & Sons
    Keywords: RSA
    Comments: pages 13-18

    Bibliography Sequence Number: 636
    Author1: Nagell, T
    Date: 1951
    Title: Introduction to Number Theory
    Publisher: NY: John Wiley & Sons
    Keywords: RSA

    Bibliography Sequence Number: 637
    Author1: Mairson, H. G
    Date: 1977
    Title: Some New Upper Bounds on the Generation of Prime Numbers
    Periodical: CACM
    Issue & Page numbers: 20,9 (Sep):664-669
    Keywords: PRIMES

    Bibliography Sequence Number: 638
    Author1: Blakley, G. R
    Author2: Borosh, I
    Date: 79
    Title: Rivest-Shamir-Adleman Public Key Cryptosystems do not Always Conceal Messages
    Publisher: in Computers and Mathematics with Applications; volume 5

    Bibliography Sequence Number: 639
    Author1: Hewitt, Edwin
    Date: 1976
    Title: Certain Conguences that Hold Identically
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 83: 270-271
    References: 010

    Bibliography Sequence Number: 640
    Author1: Livingstone, A. E
    Author2: Livingstone, M. L
    Date: 78
    Title: The Conguence a**(r+s) = a**r (mod m)
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 85: 79-100

    Bibliography Sequence Number: 641
    Author1: Monier, L
    Date: 1978
    Title: Evaluation and Comparison of Two Efficient Probabilistic Primality Testing Algorithms
    Periodical: Rapport de Recherche no. 20
    Comments: Equipe de Recherche Associee Au C.N.R.S. no. 452
    Comments: "Al Khowarizmi" Laboratoire de Rescherche en Informatique

    Bibliography Sequence Number: 642
    Author1: Editor
    Date: 1979
    Title: None
    Periodical: Scientific American
    Issue & Page numbers: 240, 1 (Jan): 85,88
    Keywords: primes
    Comments: concerns 25th Mersenne Prime

    Bibliography Sequence Number: 643
    Author1: Brillouin, L
    Date: 1962
    Title: Science and Information Theory, 2nd Edition
    Publisher: London: Academic Press

    Bibliography Sequence Number: 644
    Author1: Keyes, R. W
    Date: 1975
    Title: Physical Limits in Digital Electronics
    Periodical: Proceedings of the IEEE
    Issue & Page numbers: 63 (May): 740-747

    Bibliography Sequence Number: 645
    Author1: National Bureau of Standards
    Date: 1976
    Title: Report of the 1976 Workshop on Estimation of Significant Advances in Computer Technology
    Publisher: NBSIR 76-1189
    Comments: P. Meissner author?

    Bibliography Sequence Number: 646
    Author1: Erdos, P
    Date: 1960
    Title: On Almost Primes
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 57:404-407
    Keywords: PRIMES

    Bibliography Sequence Number: 647
    Author1: McCarthy, J
    Date: 1975
    Title: unknown
    Periodical: CACM
    Issue & Page numbers: 18, 2 (Feb): 131-132

    Bibliography Sequence Number: 648
    Author1: Hoffman, Lance J. editor
    Date: 1973
    Title: Security and Privacy in Computer Systems
    Publisher: Los Angeles, CA: Melville Publ
    Comments: pages 99-123 is #538

    Bibliography Sequence Number:
    Bibliography Sequence Number:
    650
    Author1: Davis, Martin
    Date: 1973
    Title: Hilbert's Tenth Problem is Unsolvable
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 80, 3 (March): 233-269

    Bibliography Sequence Number: 651
    Author1: Merkhofer, Lee W
    Author2: Engle, Steve B
    Author3: Wood, Charles C
    Date: 1980
    Title: Decision Analysis Applied to a Technology Assessment of Public Key Cryptographic Systems
    Periodical: ASEE Annual Conference Proceedings
    Issue & Page numbers: 1-8
    Keywords: RSA
    Comments: note error that I found on page 4 - RSA PKC key size should be
    Comments: '200 digits' not '200 bits' (Charles Wood verifies the error in
    Comments: private communication of 13Jun80
    References: 002 100 652 653

    Bibliography Sequence Number: 652
    Author1: Merkle, Ralph C
    Date: 1980
    Title: Protocols for Public Key Cryptosystems
    Periodical: Bell Northern Research
    Issue & Page numbers: 29-Jan-80
    Comments: Palo Alto, CA

    Bibliography Sequence Number: 653
    Author1: Shine, L. J
    Date: 1979
    Title: Data and Voice Encryption
    Publisher: International Resource Development Inc.
    Comments: March

    Bibliography Sequence Number: 654
    Author1: General Services Administration
    Date: 1977
    Title: Federal Standard 1027 (proposed): Telecommunications: Security Requirements for use of the DES
    Publisher: General Services Administration
    Keywords: DES

    Bibliography Sequence Number: 655
    Author1: National Bureau of Standards
    Date: 1978
    Title: NBS Special Publication 500-21 (two volumes)
    Publisher: NBS
    Comments: Includes "Design Alternatives for Computer Network Security" and
    Comments: "The Network Security Center: A System Level Approach to Computer Security"

    Bibliography Sequence Number: 656
    Author1: National Bureau of Standards
    Date: 1975
    Title: Guidelines for Implementing and Using the NBS DES
    Publisher: NBS (Draft)

    Bibliography Sequence Number: 657
    Author1: National Bureau of Standards
    Date: 1978
    Title: Computer Security and the DES, NBS Special Publicatin 500-7
    Publisher: NBS
    Comments: Keywords: DES

    Bibliography Sequence Number: 658
    Author1: Berlekamp, Elwyn R
    Date: 1970
    Title: Factoring Polynomials over Large Finite Fields
    Periodical: Mathematics of Computation
    Issue & Page numbers: 24:713-735

    Bibliography Sequence Number: 659
    Author1: Rabin, Michael O
    Date: 1978
    Title: Digitalized Signatures
    Publisher: in Foundations of Secure Computations, R. Lipton and R. DeMillo editors; NY: Academic Press

    Bibliography Sequence Number: 660
    Author1: Rabin, Michael O
    Date: 19??
    Title: Probabilistic Algorithms in Finite Fields
    Periodical: Submitted for Publication

    Bibliography Sequence Number: 661
    Author1: Kent, Steve T
    Date: 1977
    Title: Encryption-Based Protection for Interactive User/Computer Communication
    Periodical: Proc. Fifth Data Communication Symp.
    Issue & Page numbers: 5-7 to 5-13
    Comments: NY: ACM

    Bibliography Sequence Number: 662
    Author1: Pohlig, Stephen C
    Date: 19??
    Title: Algebraic and Combinatoric Aspects of Cryptography
    Publisher: Ph.D. dissertation SEL-77-038 and Tech. Rep. No. 6602-1, Stanford, CA: Stanford Electron. Labs.

    Bibliography Sequence Number: 663
    Author1: Flynn, Robert
    Author2: Campasano, Anthony S
    Date: 78
    Title: Data Dependent Keys for a Selective Encryption Terminal
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 47:1127-1129

    Bibliography Sequence Number: 664
    Author1: Konfelder, L. M
    Date: 19??
    Title: A Method of Certification
    Publisher: Cambridge, MA: MIT Lab. Comp. Sci. Tech. Rep.

    Bibliography Sequence Number: 665
    Author1: Montgomery, W. A
    Date: 1977
    Title: Measurements of Sharing in MULTICS
    Periodical: Proc. 6th Symp. on Operating Syst. Principles, Special Issue, Operating Syst. Rev. (ACM)
    Issue & Page numbers: 11, 5 (Nov):85-90

    Bibliography Sequence Number: 666
    Author1: Rivest, Ronald L
    Author2: Adleman, Leonard M
    Author3: Dertouzos, M. L
    Date: 1978
    Title: On Data Banks and Privacy Homomorphisms
    Publisher: in Foundations of Secure Computation; R. DeMillo et al Editors; NY: Academic Press

    Bibliography Sequence Number: 667
    Author1: U.S. Patent Office
    Date: 1937
    Title: Patent No. 2,089,603: Ciphering Machine (M-209)
    Publisher: Assigned to Boris Hagelin 10-AUG-37
    Keywords: PATENT

    Bibliography Sequence Number: 668
    Author1: Bolt Beranek and Newman Inc
    Date: 1978
    Title: Report 1822: Interface Message Processor: Specification for the Interconnection of a Host >and an IMP
    Publisher: BBN available from NTIS as No. ADA 055 996 for $9.50
    Keywords: NSA
    Comments: Appendix H: Interfacing a Host to a Private Line Interface
    Comments: (the PLI supports the KG-34 (Key Generator) and gives
    Comments: some tidbits concerning operational considerations such as Red/Black environments,
    Comments: TEMPEST (leakage of secure data by radiation), COMSEC/TRANSEC, etc.

    Bibliography Sequence Number: 669
    Author1: American Telephone and Telegraph Company
    Date: 1974
    Title: 303 Type Wideband Data Stations
    Publisher: Bell System Data Communications Technical Reference
    Length: 39
    Keywords: NSA

    Bibliography Sequence Number: 670
    Author1: Gaines, R. S
    Author2: Shapiro, R. A
    Date: 78
    Title: Some Security Principles and Their Application to Computer Security
    Publisher: in Foundations of Secure Computation; R.A. DeMillo et. al editors; NY: Academic Press
    Length: 223-236
    Comments: also in Oper. Syst. Rev. 12,3 (July):19-28

    Bibliography Sequence Number: 671
    Author1: Culik II, K
    Author2: Maurer, H. A
    Date: 1979
    Title: Secure Information Storage and Retrieval Using New Results in Cryptography
    Periodical: Information Processing Letters
    Issue & Page numbers: 8,4:181-186

    Bibliography Sequence Number: 672
    Author1: Shamir, Ali
    Date: 1979
    Title: On the Cryptocomplexity of Knapsack Systems
    Publisher: MIT/LCS/TM-129
    References: 004 403 110 056 383 103 005 388 412 673

    Bibliography Sequence Number: 673
    Author1: Stockmeyer, L
    Date: 1976
    Title: The Polynomial-Time Hierarchy
    Periodical: TCS
    Issue & Page numbers: October

    Bibliography Sequence Number: 674
    Author1: Merkhofer, Lee W
    Author2: Wood, Charles C
    Date: 80
    Title: Private Communication 27-Aug-80 concerning A Technology Assessment of Public Key Cryptosystems
    Publisher: .

    Bibliography Sequence Number: 675
    Author1: Marsh, D. C. B
    Date: 1970
    Title: Cryptology as a Senior Seminar Topic
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 77:761-764
    References: 871 404 165 167 846

    Bibliography Sequence Number: 676
    Author1: Kruh, Louis
    Date: 1971
    Title: The Cryptograph that was Invented Three Times
    Periodical: The Retired Officer
    Issue & Page numbers: April

    Bibliography Sequence Number: 677
    Author1: Copland, Miles
    Date: 1975
    Title: Beyond Cloak and Cipher
    Publisher: NY: Pennacle Books
    Comments: pages 364-366 concern Vigenere with random one time pad; accompanying
    Comments: text should be ignored.

    Bibliography Sequence Number: 678
    Author1: Adleman, Leonard M
    Author2: Manders, K
    Date: 1977
    Title: Reducibility, Randomness, and Intractibility (sic)
    Periodical: Proc. ACM Symp. on Theory of Computing
    Issue & Page numbers: 151-163

    Bibliography Sequence Number: 679
    Author1: Friedman, William F
    Date: 1942
    Title: American Army Field Codes in the American Expeditionary Forces During the First World War
    Publisher: Washington: GPO

    Bibliography Sequence Number: 680
    Author1: Marshall, Lt. Col. Max L. (ed.)
    Date: 1965
    Title: The Story of the U.S. Army Signal Corps
    Publisher: NY: Franklin Watts

    Bibliography Sequence Number: 681
    Author1: Myer, Brig. General Albert J
    Date: 1868
    Title: A Manual of Signals
    Publisher: NY: D. Van Nostrand

    Bibliography Sequence Number: 682
    Author1: U.S. Army Eastern Signal Corps Schools
    Date: 1942
    Title: Historical Sketch of the Signal Corps (1860-1941), Pamphlet No. 32
    Publisher: Fort Monmouth: Eastern Signal Corps Schools

    Bibliography Sequence Number: 683
    Author1: U.S. Army Security Agency
    Date: 19??
    Title: Historical Background of the Signal Security Agency, Volume One: Codes and Ciphers Prior to World War I
    Publisher: n.p.:n.n.
    Comments: Date: 46 above

    Bibliography Sequence Number: 684
    Author1: U.S. Patent Office
    Date: 1965
    Title: Patent No. 0,050,946: Improvement in Signals
    Publisher: Issued to A.J. Myer 14-Nov-1865
    Comments: Date: 1865 above

    Bibliography Sequence Number: 685
    Author1: U.S. Patent Office
    Date: 1877
    Title: Patent No. 0,197,199: Cryptographic Device
    Publisher: Issued to F.S. Baldwin 20-Nov-1877

    Bibliography Sequence Number: 686
    Author1: U.S. Patent Office
    Date: 1924
    Title: Patent No. 1,500,077: Coding Device
    Publisher: Issued to S. H. Huntington 1-Jul-1924

    Bibliography Sequence Number: 687
    Author1: U.S. War Department, Office of the Chief Signal Officer
    Date: 1916
    Title: Document No. 500: Signal Book United States Army
    Publisher: Washington: GPO

    Bibliography Sequence Number: 688
    Author1: U.S. War Department, Office of the Chief Signal Officer
    Date: 1910
    Title: Manual No. 6: Visual Signaling
    Publisher: Washington: GPO

    Bibliography Sequence Number: 689
    Author1: Friedman, William F
    Author2: Friedman, Elizabeth S
    Date: 57
    Title: The Shakespearean Ciphers Examined
    Publisher: Cambridge: Cambridge University Press

    Bibliography Sequence Number: 690
    Author1: Gantmacher, F. R
    Date: 1960
    Title: The Theory of Matrices, Volume 2
    Publisher: NY: Chelsea Pub. Co.

    Bibliography Sequence Number: 691
    Author1: U.S. Army Security Agency
    Date: 1948
    Title: History of the Signal Security Agency, Volume One: Organization. Part I, 1939-1945
    Publisher: Washington: Army Security Agency

    Bibliography Sequence Number: 692
    Author1: U.S. Army Security Agency
    Date: 1948
    Title: Operating and Keying Instructions for Converter M-325(T)
    Publisher: n.p.:Army Security Agency

    Bibliography Sequence Number: 693
    Author1: U.S. Congress. Senate. Committee on the Judiciary.
    Date: 1956
    Title: William F. Friedman
    Publisher: Report No. 1815 (23-Apr-56) 84th Cong., 2d Session, Wash: GPO

    Bibliography Sequence Number: 694
    Author1: Adleman, Leonard M
    Date: 1979
    Title: Times, Space, and Randomness
    Periodical: MIT/LCS/TM-131

    Bibliography Sequence Number: 695
    Author1: Friedman, William F
    Date: 1925
    Title: Analysis of a Mechanico-Electrical Cryptograph
    Publisher: Washington: GPO (Part 1: 1934),(Part 2: 1935) original report 1925

    Bibliography Sequence Number: 696
    Author1: U.S. Patent Office
    Date: 1928
    Title: Patent No. 1,683,072: ??
    Publisher: Issued to William F. Friedman 4-Sep-28

    Bibliography Sequence Number: 697
    Author1: Winkel, Brian J. editor
    Date: 1977
    Title: Epilogue
    Periodical: Cryptologia
    Issue & Page numbers: 1: 206-207
    References: 061 070

    Bibliography Sequence Number: 698
    Author1: Winterbotham, Frederick W
    Date: 1974
    Title: The Ultra Secret
    Publisher: NY: Harper and Row

    Bibliography Sequence Number: 699
    Author1: Raisbeck, G
    Date: 1963
    Title: Information Theory, An Introduction for Scientists and Engineers
    Publisher: Cambridge, MA: MIT Press

    Bibliography Sequence Number: 700
    Author1: Wolfowitz, J
    Date: 1961
    Title: Coding Theorems of Information Theory
    Publisher: Berlin: Springer-Verlag

    Bibliography Sequence Number: 701
    Author1: U.S. Patent Office
    Date: 1958
    Title: Patent No. 2,851,794: Cryptogrammic Coding and Decoding Apparatus
    Publisher: Issued to Boris C. Hagelin 16-Sep-58

    Bibliography Sequence Number: 702
    Author1: Bartek, D. J
    Date: 1974
    Title: Encryption for Data Security
    Periodical: Honeywell Computer Journal
    Issue & Page numbers: 8, Author2: 86-89

    Bibliography Sequence Number: 703
    Author1: Computation Planning Inc. (COMPLAN)
    Date: 1976
    Title: CryptopaKeywords: Modular Subroutine Library for Cryptographic Transformation
    Publisher: Bethesda, MDate: COMPLAN

    Bibliography Sequence Number: 704
    Author1: U.S. Patent Office
    Date: 1974
    Title: Patent No. 3,798,359: Block Cipher Cryptographic System
    Publisher: issued to ??? 19-Mar-74

    Bibliography Sequence Number: 705
    Author1: Girdansky, M. B
    Date: 1971
    Title: Data Privacy: Cryptology and the Computer at IBM Research
    Periodical: IBM Research Reports
    Issue & Page numbers: 7
    A:4:12 pages

    Bibliography Sequence Number: 706
    Author1: Guillen, M
    Date: 1976
    Title: Automated Cryptography
    Periodical: Science News
    Issue & Page numbers: 110,12 (18 Sep):188-190

    Bibliography Sequence Number: 707
    Author1: Savage, John E
    Date: 1976
    Title: The Complexity of Computing
    Publisher: NY: John Wiley
    Keywords: Complexity

    Bibliography Sequence Number: 708
    Author1: U.S. Patent Office
    Date: 1974
    Title: Patent No. 3,796,830: Recirculating Block Cipher Cryptographic System
    Publisher: issued to ??? 12-Mar-74

    Bibliography Sequence Number: 709
    Author1: Downey, ?
    Date: 1977
    Title: Multics Security Evaluatio: Password and File Encryption Techniques
    Publisher: Hanscom AFB, MA: Electronic Systems Division Report ESD-TR-74-193, Vol. III

    Bibliography Sequence Number: 710
    Author1: Kucera, H
    Author2: Francis, W. N
    Date: 67
    Title: Computational Analysis of Present-Day American English
    Publisher: Providence, RI: Brown University Press

    Bibliography Sequence Number: 711
    Author1: Lynch, Michael F
    Date: 1977
    Title: Variety Generation - A Reinterpretation of Shannon's Math. Theory of Comm. and its Implications for Inf. Sci.
    Periodical: J. Amer. Soc. Info. Sci.
    Issue & Page numbers: 28:19-25

    Bibliography Sequence Number: 712
    Author1: Brawley, Joel V
    Author2: Levine, Jack
    Date: 72
    Title: Equivalence Classes of Linear Mappings with Applications to Cryptography, Parts I and II
    Periodical: Duke Math J.
    Issue & Page numbers: 39:121-142

    Bibliography Sequence Number: 713
    Author1: Brawley, Joel V
    Author2: Levine, Jack
    Date: 72
    Title: Equivalence Classes of Involutory Mappings
    Periodical: Duke Math J.
    Issue & Page numbers: 39:211-217

    Bibliography Sequence Number: 714
    Author1: Dickson, Leonard E
    Date: 1952
    Title: History of the Theory of Numbers, Volume I
    Publisher: NY: Chelsea Pub. Co.

    Bibliography Sequence Number: 715
    Author1: Hoffman, Lance J
    Date: 1977
    Title: Modern Methods for Computer Security and Privacy
    Publisher: NY: Prentice-Hall

    Bibliography Sequence Number: 716
    Author1: Enison, R. L
    Author2: Bright, Herb S
    Date: 76
    Title: Improving the Use of a TLP Sequence as a Key Stream for VERNAM Encryption with Cryptopak (tm)
    Publisher: Bethesda, MD 20014: Computation Planning (COMPLAN) TN-913-8d
    Comments: Herb Bright is President of Computation Planning

    Bibliography Sequence Number: 717
    Author1: U.S. Patent Office
    Date: 1923
    Title: Patent No. 1,657,411: (Enigma)
    Publisher: Issued to Arthur Scherbius 6-Feb-23 as assignor for the German Firm Chiffriermaschinen
    Aktiengesellscaft

    Bibliography Sequence Number: 718
    Author1: U.S. Patent Office
    Date: 1926
    Title: Patent No. 1,705,641: (Enigma Enhancements)
    Publisher: issued to Willi Korn May 1926 as assignor for the German Firm C.A.

    Bibliography Sequence Number: 719
    Author1: U.S. Patent Office
    Date: 1926
    Title: Patent No. 1,73,886
    Publisher: issued to Willi Korn May 1926

    Bibliography Sequence Number: 720
    Author1: U.S. Patent Office
    Date: 1929
    Title: Patent No. 1,938,028
    Publisher: issued to Willi Korn Nov 1929

    Bibliography Sequence Number: 721
    Author1: U.S. Patent Office
    Date: 1929
    Title: Patent No. 1,905,593
    Publisher: issued to Willi Korn Nov 29

    Bibliography Sequence Number: 722
    Author1: Beesly, Patrick
    Date: 1977
    Title: Very Special Intelligence
    Publisher: London: Hamish Hamilton

    Bibliography Sequence Number: 723
    Author1: Bertrand, Gustave
    Date: 1973
    Title: Enigma
    Publisher: PariBibliography Sequence Number: Plon

    Bibliography Sequence Number: 724
    Author1: Brown, Anthony
    Date: 1975
    Title: Bodyguard of Lies
    Publisher: NY: Harper and Row

    Bibliography Sequence Number: 725
    Author1: Randell, Brian
    Date: 1976
    Title: The Colossus
    Publisher: Newcastle upon Tyne: Computing Laboratory, Universiry of Newcastle upon Tyne Technical Report Series No. 90

    Bibliography Sequence Number: 726
    Author1: Stevenson, William
    Date: 1976
    Title: A Man Called Intrepid
    Publisher: NY: Harcourt, Brace, Jovanovich

    Bibliography Sequence Number: 727
    Author1: Rapp, Richard T
    Date: 1970
    Title: Tuscan Diplomatic Letters: A Decipherment by Computer
    Periodical: Library Chronicle
    Issue & Page numbers: 36,1 (Winter):37-46

    Bibliography Sequence Number: 728
    Author1: Leighton, Albert C
    Date: 1977
    Title: Some Examples of Historical Cryptanalysis
    Periodical: Historia Mathematica
    Issue & Page numbers: 4:319-337

    Bibliography Sequence Number: 729
    Author1: unknown
    Date: 1977
    Title: The Growing Threat to Computer Security
    Periodical: Business Week
    Issue & Page numbers: 1 Aug:44-45

    Bibliography Sequence Number: 730
    Author1: unknown
    Date: 1977
    Title: "They Should Be Paranoid"
    Periodical: Datamation
    Issue & Page numbers: Sep: 29-30
    Comments: Reprinted in Cryptologia 1: 400-401
    Comments: Concerns Herb Bright, Pres. COMPALN

    Bibliography Sequence Number: 731
    Author1: U.S. Patent Office
    Date: 1924
    Title: Patent No. 1,503,250: Apparatus for and Method of Rapid Telegraphic Messages
    Publisher: submitted by Paul E. Sabine and William F. Friedman 29-JUL-24
    Keywords: PATENT

    Bibliography Sequence Number: 732
    Author1: U.S. Patent Office
    Date: 1925
    Title: Patent No. 1,522,775: Secret Signaling Apparatus for Automatically Enciphering and Deciphering Messages
    Publisher: submitted by William F. Friedman 13-JAN-25
    Keywords: PATENT

    Bibliography Sequence Number: 733
    Author1: U.S. Patent Office
    Date: 1924
    Title: Patent No. 1,516,180: Secret Signaling System Employing Apparatus for Automatically Enciphering and Deciphering Messages
    Publisher: submitted by William F. Friedman and Louis M. Evans 18-NOV-24
    Keywords: PATENT

    Bibliography Sequence Number: 734
    Author1: U.S. Patent Office
    Date: 1922
    Title: Patent No. 1,694,874: Method of Electrical Signaling
    Publisher: submitted by William F. Friedman 10-JUL-22
    Keywords: PATENT

    Bibliography Sequence Number: 735
    Author1: U.S. Patent Office
    Date: 1925
    Title: Patent No. 1,530,660: Printing Telegraph System
    Publisher: submitted by William F. Friedman 24-MAR-25
    Keywords: PATENT

    Bibliography Sequence Number: 736
    Author1: U.S. Patent Office
    Date: 1926
    Title: Patent No. 1,608,590: Alphabetical Chart
    Publisher: submitted by William F. Friedman 30-NOV-26
    Keywords: PATENT

    Bibliography Sequence Number: 737
    Author1: U.S. Patent Office
    Date: 1929
    Title: Patent No. 1,857,374: Cryptograph Enciphering and Deciphering Device
    Publisher: submitted by George A. Graham, Louis M. Evans, and William F. Friedman 28-MAR-29
    Keywords: PATENT

    Bibliography Sequence Number: 738
    Author1: U.S. Patent Office
    Date: 1932
    Title: Patent No. 2,028,772: Cryptographic System
    Publisher: submitted by William F. Friedman and George A. Graham 23-JAN-32
    Keywords: PATENT

    Bibliography Sequence Number: 739
    Author1: U.S. Patent Office
    Date: 1933
    Title: Patent Held in Secrecy: Converter M-134
    Publisher: submitted by William F. Friedman 25-JUL-33
    Keywords: PATENT

    Bibliography Sequence Number: 740
    Author1: U.S. Patent Office
    Date: 1935
    Title: Patent No. 2,080,416: Message Authenticating System
    Publisher: submitted by William F. Friedman 26-JUN-35
    Keywords: PATENT

    Bibliography Sequence Number: 741
    Author1: U.S. Patent Office
    Date: 1935
    Title: Patent No. 2,166,137: Electrical Switching Mechanism
    Publisher: submitted by William F. Friedman 19-Aug-35
    Keywords: PATENT

    Bibliography Sequence Number: 742
    Author1: U.S. Patent Office
    Date: 1936
    Title: Patent Held in SecreTitle: SIGABA (Converter M-134-C, ECM)
    Publisher: submitted by William F. Friedman and Frank B. Rowlett 23-MAR-36
    Keywords: PATENT

    Bibliography Sequence Number: 743
    Author1: U.S. Patent Office
    Date: 1936
    Title: Patent Held in SecreTitle: Converter M-134-T2
    Publisher: submitted by William F. Friedman 23-OCT-36
    Length: Date: 36 above
    Keywords: PATENT

    Bibliography Sequence Number: 744
    Author1: U.S. Patent Office
    Date: 1937
    Title: Patent No. 2,224,646: Electronic Control System for Tabulating Cards, Documents, and the Like
    Publisher: submitted by William F. Friedman and Vernam E. Whitman 22-APR-37
    Keywords: PATENT

    Bibliography Sequence Number: 745
    Author1: U.S. Patent Office
    Date: 1937
    Title: Patent No. 2,140,424: Cryptographic Device
    Publisher: submitted by William F. Friedman 7-JUN-37
    Keywords: PATENT

    Bibliography Sequence Number: 746
    Author1: U.S. Patent Office
    Date: 1937
    Title: Patent No. 2,139,676: Cryptographic Apparatus
    Publisher: submitted by William F. Friedman 4-AUG-37
    Keywords: PATENT

    Bibliography Sequence Number: 747
    Author1: U.S. Patent Office
    Date: 1939
    Title: Patent No. 2,395,863: Cryptographic Device [Strip Cipher Device M-138-A]
    Publisher: submitted by William F. Friedman 19-OCT-39
    Keywords: PATENT
    Comments: used widely in WW II and afterwards

    Bibliography Sequence Number: 748
    Author1: U.S. Patent Office
    Date: 1942
    Title: Patent Held in SecreTitle: SIGCUM (Converter M-228)
    Publisher: submitted by William F. Friedman and Frank B. Rowlett 16-MAY-42
    Keywords: PATENT

    Bibliography Sequence Number: 749
    Author1: U.S. Patent Office
    Date: 1943
    Title: Patent No. 2,552,548: Facsimile Enciphering System
    Publisher: submitted by William F. Friedman 6-MAR-43
    Keywords: PATENT

    Bibliography Sequence Number: 750
    Author1: U.S. Patent Office
    Date: 1943
    Title: Patent No. 2,465,367: System for Enciphering Facsimiles
    Publisher: submitted by William F. Friedman and Joseph O Mauborgne 12-MAR-43
    Keywords: PATENT

    Bibliography Sequence Number: 751
    Author1: U.S. Patent Office
    Date: 1944
    Title: Patent No. 2,877,565: Electrical Cryptograph [Converter M-325]
    Publisher: submitted by William F. Friedman 11-AUG-44
    Keywords: PATENT

    Bibliography Sequence Number: 752
    Author1: U.S. Patent Office
    Date: 1944
    Title: Patent No. 2,518,458: Authenticating Device
    Publisher: submitted by William F. Friedman 25-Aug-44
    Keywords: PATENT

    Bibliography Sequence Number: 753
    Author1: Terrett, Dulany
    Date: 1956
    Title: The Signal CorpBibliography Sequence Number: The Emergency
    Publisher: Washington: GPO

    Bibliography Sequence Number: 754
    Author1: Thompson, G. R
    Author2: Harris, D. R
    Date: 66
    Title: The Signal Corps: The Outcome
    Publisher: Washington: GPO

    Bibliography Sequence Number: 755
    Author1: U.S. Army Security Agency
    Date: 1946
    Title: Historical Background of the Signal Security Agency, Volume III, The Peace 1919-1939
    Publisher: n.p.:n.n.

    Bibliography Sequence Number: 756
    Author1: U.S. Congress, House Committee on the Judiciary
    Date: 1955
    Title: William F. Friedman
    Publisher: Report No. 260, 84th Congress, 1st Session, 21-MAR-55

    Bibliography Sequence Number: 757
    Author1: Magarell, Jack
    Date: 1977
    Title: A Cryptic Warning to Academe?
    Periodical: Chronicle of Higher Education
    Issue & Page numbers: 21-Nov-77:5-6

    Bibliography Sequence Number: 758
    Author1: Spiller, Roger J
    Date: 1976
    Title: Some Implications of ULTRA
    Periodical: Military Affairs
    Issue & Page numbers: ApriIssue & Page numbers: 49-54

    Bibliography Sequence Number: 759
    Author1: Deutch, Harold C
    Date: 1977
    Title: The Historical Impact of Revealing the Ultra Secret
    Periodical: Parameters, Journal of the U.S. Army War College
    Issue & Page numbers: 7,Author3: 16-54

    Bibliography Sequence Number: 760
    Author1: Korbonski, Steve
    Date: 1977
    Title: The True Story of Enigma: The German Code Machine in World War II
    Periodical: East European Quarterly
    Issue & Page numbers: 11,2 (Summer):227-234

    Bibliography Sequence Number: 761
    Author1: U.S. Army Security Agency
    Date: 1946
    Title: Historical Background of the Signal Security Agency, Volume Three: The Peace 1919-1939
    Publisher: n.p.:n.n.

    Bibliography Sequence Number: 762
    Author1: Way, Peter
    Date: 1977
    Title: Codes and Ciphers
    Publisher: London: Aldus Books
    Length: 144 pages
    Comments: Undercover: The Library of Espionage and Secret Warfare.
    Comments: Series Coordinator John Mason. Cost is 3.95 Pounds.

    Bibliography Sequence Number: 763
    Author1: unknown
    Date: 1977
    Title: A Secrecy Machine for Traveling Businessmen
    Periodical: Business Week
    Issue & Page numbers: 13-Jun:42D

    Bibliography Sequence Number: 764
    Author1: unknown
    Date: 1977
    Title: Low Power Hand-Held Encryption Unit Defies Sophisticated Code-Breakers
    Periodical: EDN
    Issue & Page numbers: 20AUG:52-54

    Bibliography Sequence Number: 765
    Author1: Bennet, Charles H
    Date: 1979
    Title: On Random and Hard-to-Describe Numbers
    Publisher: IBM Technical Report RC7483

    Bibliography Sequence Number: 766
    Author1: Hall Jr., Marshall
    Date: 1959
    Title: The Theory of Groups
    Publisher: NY:Macmillan

    Bibliography Sequence Number: 767
    Author1: Meyer, Carl H
    Author2: Tuchman, Walter L
    Date: 78
    Title: Putting Data Encryption to Work, Part I
    Periodical: Mini-Micro Systems
    Issue & Page numbers: Oct

    Bibliography Sequence Number: 768
    Author1: National Science Foundation
    Date: 1978
    Title: Computer Security
    Periodical: MOSAIC
    Issue & Page numbers: 9,4 (July/Aug):2-10

    Bibliography Sequence Number: 769
    Author1: Shapley, Deborah
    Date: 1978
    Title: Intelligence Agency Chief Seeks "Dialogue" with Academics
    Periodical: Science
    Issue & Page numbers: 202 (27OCT):407-410
    Comments: Interview with Vice Admiral B.R. Inman, NSA Director
    Keywords: NSA
    References: 872 873 376 390

    Bibliography Sequence Number: 770
    Author1: Shapley, Deborah
    Date: 1978
    Title: NSA Slaps Secrecy Order on Inventors' Communications Patent
    Periodical: SCIENCE
    Issue & Page numbers: 8SEPeriodical: 891
    A:893-894

    Bibliography Sequence Number: 771
    Author1: Jansson, B
    Date: 1966
    Title: Random Number Generators
    Publisher: Stockholm: Victor Petterson's Bokindustri Aktiebolag

    Bibliography Sequence Number: 772
    Author1: Winkel, Brian J
    Date: 1979
    Title: Studies on Cryptology
    Periodical: Cryptologia
    Issue & Page numbers: Author3: 52-53
    Keywords: NSA
    References: 065 773 610 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793

    Bibliography Sequence Number: 773
    Author1: Snyder, Samuel S
    Date: 1977
    Title: Influence of U.S. Cryptologic Organizations on the Digital Computer Industry
    Publisher: ???
    Length: 38
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-003

    Bibliography Sequence Number: 774
    Author1: unknown
    Date: 19??
    Title: Use of (CY/MSS ULTRA) by the United States War Department (1943-1945)
    Publisher: ???
    Length: 82
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-005

    Bibliography Sequence Number: 775
    Author1: unknown
    Date: 19??
    Title: Synthesis of Experiences in the use of ULTRA Intelligence by U.S. Army Field Commands in the European Theater of Operations
    Publisher: ???
    Length: 29
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-006

    Bibliography Sequence Number: 776
    Author1: unknown
    Date: 19??
    Title: Staff Study on Converter M-325 (Short Title: SIGFOY)
    Publisher: ???
    Length: 4
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-007

    Bibliography Sequence Number: 777
    Author1: unknown
    Date: 19??
    Title: Battle of the Atlantic, Volume II, U-Boat Operations (Dec. 1942-May 1945)
    Publisher: ???
    Length: 411
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-008

    Bibliography Sequence Number: 778
    Author1: unknown
    Date: 19??
    Title: Allied Communication Intelligence and the Battle of the Atlantic, Volume I (Dec. 1942-May 1945)
    Publisher: ???
    Length: 94
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-009

    Bibliography Sequence Number: 779
    Author1: unknown
    Date: 19??
    Title: A Project History (1946) - History of Converter M-325 (Short Title: SIGFOY)
    Publisher: ???
    Length: 48
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-010

    Bibliography Sequence Number: 780
    Author1: unknown
    Date: 19??
    Title: The Role of Communications Intelligence in Submarine Warfare in the Pacific (Jan. 1943-Oct. 1943). 8 Volumes
    Publisher: ???
    Length: 2442
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-011

    Bibliography Sequence Number: 781
    Author1: unknown
    Date: 19??
    Title: The Tole of Radio Intelligence in the American-Japanese Naval War, 1943-1944. 4 Volumes
    Publisher: ???
    Length: 2279
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-012

    Bibliography Sequence Number: 782
    Author1: unknown
    Date: 1945
    Title: History of U.S. Strategic Air Force Europe vs. German Air Force
    Publisher: ???
    Length: 386
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-013

    Bibliography Sequence Number: 783
    Author1: unknown
    Date: 1919
    Title: Final Report of the Radio Intelligence Section, General Headquarters, American Expeditionary Forces
    Publisher: ???
    Length: 56
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-014

    Bibliography Sequence Number: 784
    Author1: unknown
    Date: 1945
    Title: Notes on German Fuel Position by G-2 SHEAF
    Publisher: ???
    Length: 44
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-015

    Bibliography Sequence Number: 785
    Author1: unknown
    Date: 1944
    Title: The Need for New Legislation Against Unauthorized Disclosures of Communication Intelligence Activities
    Publisher: ???
    Length: 110
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-016

    Bibliography Sequence Number: 786
    Author1: unknown
    Date: 1945
    Title: Allied Strategic Air Force Target Planning
    Publisher: ???
    Length: 66
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-017

    Bibliography Sequence Number: 787
    Author1: unknown
    Date: 19??
    Title: Blockade-Running Between Europe and the Far East by Submarines, 1942-1944
    Publisher: ???
    Length: 34
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-019

    Bibliography Sequence Number: 788
    Author1: unknown
    Date: 1945
    Title: Narrative, Combat Intelligence Center, Joint Intelligence Center, Pacific Ocean Area
    Publisher: ???
    Length: 22
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-020

    Bibliography Sequence Number: 789
    Author1: unknown
    Date: 19??
    Title: Controlled Agent Communications Activities, 1944-1945
    Publisher: ???
    Length: 462
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-021

    Bibliography Sequence Number: 790
    Author1: unknown
    Date: 1945
    Title: ULTRA and the U.S. Seventh Army
    Publisher: ???
    Length: 7
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-022

    Bibliography Sequence Number: 791
    Author1: unknown
    Date: 1945
    Title: Reports by U.S. Army ULTRA Representatives with Army Field Commands in the European Theatre of
    Operations. Parts I and II
    Publisher: ???
    Length: 206
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-023

    Bibliography Sequence Number: 792
    Author1: unknown
    Date: 19??
    Title: German Naval Communication Intelligence, Volume III, Battle of the Atlantic
    Publisher: ???
    Length: 144
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-024

    Bibliography Sequence Number: 793
    Author1: unknown
    Date: 19??
    Title: Technical Intelligence from Allied Communication Intelligence, Volume IV, Battle of the Atlantic
    Publisher: ???
    Length: 102
    Keywords: NSA
    Comments: Accessioned by National Archives from NSA; available for $.20 per page as No. SRH-025

    Bibliography Sequence Number: 794
    Author1: Lennon, Richard E
    Date: 1978
    Title: Putting Data Encryption to Work - Part II
    Periodical: Mini-Micro Systems
    Issue & Page numbers: DeComments: 84-88

    Bibliography Sequence Number: 795
    Author1: Walker, Bruce J
    Author2: Blake, Ian F
    Date: ??
    Title: Computer Security and Protection Structures
    Publisher: NY: Academic Press?
    Comments: $16.50; not rated highly from a crypto standpoint in #250

    Bibliography Sequence Number: 796
    Author1: Walters, Richard C
    Date: 1976
    Title: Cryptology and Data Communications
    Publisher: MIT AI Lab; Working Paper 136
    Length: 21
    References: 427 100 112 004 107 583 117 580 797 113 025 482 168 119 016 108 111 542 027 391 545

    Bibliography Sequence Number: 797
    Author1: Hellman, Martin E
    Date: 1974
    Title: The Information Theoretic Approach to Cryptography
    Publisher: Stanford Univ. Information Systems Lab Pub.

    Bibliography Sequence Number: 798
    Author1: Rivest, Ronald L
    Author2: Sherman, Alan T
    Author3: Sipser, Michael
    Date: 1981
    Title: Towards a Formal Definition of Cryptographic Strength
    Publisher: unpublished; see [MIT-ML]RIVEST;FOCS 103
    References: 678 694 765 799 800 801 802 803 804 805 806 807 808 809 004 006 107 810 811 812 359 605 813 814 815 816 578 113 817 025 818 819 820 056 821 101 822 383 049 494 103 002 707 048 672 413 389 027 106 575 115

    Bibliography Sequence Number: 799
    Author1: Bennet, Charles H
    Author2: Gill, John
    Date: 1979
    Title: Relative to a Random Oracle A, PA = NPA = co-NPA with Probability 1
    Publisher: IBM Research Report RC7925
    Keywords: complexity

    Bibliography Sequence Number: 800
    Author1: Brassard, G
    Author2: Fortune, S
    Author3: Hopcroft, J
    Date: 78
    Title: A Note on Cryptography and NP inter CoNP-P
    Publisher: Cornell Univ. Comp. Sci. Dept. Tech. Rep. TR78-338
    Keywords: complexity

    Bibliography Sequence Number: 801
    Author1: Brassard, G
    Date: 1979
    Title: A Note on the Compexity of Cryptography
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-25 (March):232-233
    Keywords: complexity

    Bibliography Sequence Number: 802
    Author1: Brassard, G
    Date: 1979
    Title: Relativized Cryptography
    Periodical: Proc. 20th IEEE Symp. on Foundations of Computer Science
    Issue & Page numbers: 383-391
    Keywords: complexity

    Bibliography Sequence Number: 803
    Author1: Brassard, G
    Date: 1980
    Title: A Time-Luck Tradeoff in Cryptography
    Periodical: Proc. 21st IEEE Symp. on Foundations of Computer Science
    Issue & Page numbers: 380-386
    Keywords: complexity

    Bibliography Sequence Number: 804
    Author1: Chaitin, G. J
    Date: 1966
    Title: On the Length of Programs for Computing Finite Binary Sequences
    Periodical: Journal of the ACM
    Issue & Page numbers: 13: 547-569
    Keywords: complexity

    Bibliography Sequence Number: 805
    Author1: Chaitin, G. J
    Date: 1975
    Title: Randomness and Mathematical Proof
    Periodical: Scientific American
    Issue & Page numbers: 232 (May):47-52
    Keywords: complexity

    Bibliography Sequence Number: 806
    Author1: Chaitin, G. J
    Date: 1975
    Title: A Theory of Program Size Formally Identical to Information Theory
    Periodical: Journal of the ACM
    Issue & Page numbers: 22 (July):329-340
    Keywords: complexity

    Bibliography Sequence Number: 807
    Author1: Chaitin, G. J
    Date: 1976
    Title: Algorithmic Entropy of Sets
    Periodical: Comp. Maths. with Apps.
    Issue & Page numbers: Author2: 233-245
    Keywords: complexity

    Bibliography Sequence Number: 808
    Author1: Chaum, David L
    Date: 1981
    Title: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    Periodical: CACM
    Issue & Page numbers: 24 (Feb):84-88
    Keywords: complexity

    Bibliography Sequence Number: 809
    Author1: Demers, A
    Author2: Kelemen, C
    Author3: Reusch, B
    Date: 76
    Title: On Encryption Systems Realized by Finite Transducers
    Publisher: Cornell Univ. Comp. Sci. Dept. Tech. Rep. 76-291
    Keywords: complexity

    Bibliography Sequence Number: 810
    Author1: Even, S
    Author2: Yacobi, Y
    Date: 1980
    Title: An Observation Concerning the Complexity of Problems with Few Solutions and its Application to
    Cryptography
    Publisher: Technion Comp. Sci. Tech. Rep. 167
    Keywords: complexity

    Bibliography Sequence Number: 811
    Author1: Even, S
    Author2: Yacobi, Y
    Date: 1980
    Title: Cryptocomplexity and NP-completeness
    Publisher: Technion Comp. Sci. Tech. Rep. 172
    Keywords: complexity

    Bibliography Sequence Number: 812
    Author1: Even, S
    Author2: Yacobi, Y
    Date: 1980
    Title: Relations among Public Key Signature Systems
    Publisher: Technion Computer Science Technical Report 175
    Keywords: complexity

    Bibliography Sequence Number: 813
    Author1: Gardner, Martin
    Date: 1979
    Title: Mathematical Games
    Periodical: Scientific American
    Issue & Page numbers: Nov:24-34
    Keywords: complexity

    Bibliography Sequence Number: 814
    Author1: Garey, M. R
    Author2: Johnson, D. S
    Date: 1979
    Title: Computers and Intractibility
    Publisher: Freedman and Company
    Keywords: complexity

    Bibliography Sequence Number: 815
    Author1: Gewirtz, William L
    Date: 1974
    Title: Investigations in the Theory of Descriptive Complexity
    Publisher: New York Univ. Ph.D. Thesis, Courant Institute of Math. Sciences Rep. NSO-5
    Keywords: complexity

    Bibliography Sequence Number: 816
    Author1: Gordon, John
    Date: 1980
    Title: Use of Intractable Problems in Cryptography
    Periodical: Information Privacy
    Issue & Page numbers: 2 (Sep):178-184
    Keywords: complexity

    Bibliography Sequence Number: 817
    Author1: Hopcroft, John E
    Author2: Ullman, Jeffrey
    Date: 1979
    Title: Introduction to Automata Theory, Languages, and Computation
    Publisher: Reading: Addison Wesley
    Keywords: complexity

    Bibliography Sequence Number: 818
    Author1: Katseff, Howard P
    Author2: Sipser, Michael
    Date: 1979
    Title: Several Results in Program Size Complexity
    Periodical: Proc. 18th Symp. on Foundations of Computer Science
    Issue & Page numbers: 82-89
    Keywords: complexity

    Bibliography Sequence Number: 819
    Author1: Kolmogorov, A
    Date: 1965
    Title: Three Approaches to the Quantitative Definition of Information
    Periodical: Problems of Inform. Transmission
    Issue & Page numbers: 1 (Jan-Mar):1-7
    Keywords: complexity

    Bibliography Sequence Number: 820
    Author1: Lamport, L
    Date: 1979
    Title: Constructing Digital Signatures from a One-Way Function
    Publisher: SRI International Technical Report CSL-98
    Keywords: complexity

    Bibliography Sequence Number: 821
    Author1: Lieberherr, Karl
    Date: 1980
    Title: Uniform Complexity and Digital Signatures
    Publisher: Princeton University Department of EE and CS Tech. Rep.
    Keywords: complexity

    Bibliography Sequence Number: 822
    Author1: Merkle, Ralph C
    Date: 1979
    Title: Secrecy, Authentication, and Public Key Systems
    Publisher: Stanford Information Systems Lab. Tech. Rep. 1979-1
    Keywords: complexity

    Bibliography Sequence Number: 823
    Author1: Poe, Edgar Allen
    Date: 1841
    Title: A Few Words on Secret Writing
    Periodical: Graham's Magazine
    Issue & Page numbers: 19 (July):33-38

    Bibliography Sequence Number: 824
    Author1: Wimsatt Jr., William K
    Date: 1943
    Title: What Poe Knew About Cryptography
    Periodical: Publications of the Modern Language Association
    Issue & Page numbers: 58:754-779

    Bibliography Sequence Number: 825
    Author1: Bobrow, D. G
    Author2: Raphael, B
    Date: 1974
    Title: New Programming Languages for Artificial Intelligence Research
    Periodical: ACM Computing Surveys
    Issue & Page numbers: 6:155-174
    Comments: "SNOBOL-like prog. lang. spec. designed for cryptanalysis" (096)

    Bibliography Sequence Number: 826
    Author1: Golub, G
    Date: 1969
    Title: Singular Value Decomposition of a Complex Matrix
    Periodical: CACM
    Issue & Page numbers: 12: 564-565
    Comments: Algorithm 358

    Bibliography Sequence Number: 827
    Author1: Golub, G
    Author2: Reinsch, C
    Date: 1970
    Title: Singular Value Decomposition and Least Squares Solutions
    Periodical: Numerische Mathematik
    Issue & Page numbers: 14:403-420

    Bibliography Sequence Number: 828
    Author1: Harris, F. A
    Date: 1959
    Title: Solving Simple Substitution Ciphers
    Publisher: Bethesda, MDate: American Cryptogram Assoc.
    Comments: Orig. 1943

    Bibliography Sequence Number: 829
    Author1: Silver, R
    Date: 1959
    Title: Decryptor
    Periodical: MIT Lincoln Lab Quarterly Progress Report, Division 5 (Information Processing)
    Issue & Page numbers: (Dec): 57-60

    Bibliography Sequence Number: 830
    Author1: Lauer, Rudolph F
    Date: 1981
    Title: Computer Simulation of Classical Substitution Cryptographic Systems
    Publisher: Laguna Hills, CA: Aegean Park Press
    Length: 111 pages
    Keywords: computer
    Comments: Aegean #32 $19.84
    References: 828 762 831 025 142 029 832 471 833 078 070 060 063 064 079 202 203 205 548 549 550 091 059 096 835 829 547 141 300 061 268 281 836 067 610 084 098 190 242 837 072 838 128 129 252 223 122 695 839 840 123 150 251 841 277 842 161 097 662 321 017 043 843 713 844 845 166 165 167 846 631 282 283 712 350 311 326 849

    Bibliography Sequence Number: 831
    Author1: Norman, Bruce
    Date: 1973
    Title: Secret Warfare: The Battle of Codes and Ciphers
    Publisher: Washington: Acropolis Books Ltd

    Bibliography Sequence Number: 832
    Author1: Bielewicz, Julian A
    Date: 1976
    Title: Secret Language: Communicating in Codes and Ciphers
    Publisher: Australia: Holt, Rinehart and Winston

    Bibliography Sequence Number: 833
    Author1: Zanotti, Mario
    Date: 1928
    Title: Cryptography: Secret Writing
    Publisher: Milan

    Bibliography Sequence Number: 834
    Author1: Nance, Richard E
    Author2: Overstreet Jr., Claude
    Date: 1978
    Title: Some Experimental Observations on the Behavior of Composite Random Number Generators
    Publisher: Operations Research
    Length: 26,5 (Sep-Oct)
    Keywords: random

    Bibliography Sequence Number: 835
    Author1: Matyas, Stephen M
    Date: 1974
    Title: A Computer Oriented Cryptanalytic Solution for Multiple Substitution Enciphering Systems
    Publisher: Univ. of Iowa Ph.D. Thesis

    Bibliography Sequence Number: 836
    Author1: Candela, Rosario
    Date: 1946
    Title: Isomorphism and its Application in Cryptanalytics
    Publisher: NY: Cardanus Press
    Comments: Parts II and IV have been reprinted as Appendix II of Ref. 830[Lau81]

    Bibliography Sequence Number: 837
    Author1: Garlinski, J
    Date: 1979
    Title: The Enigma War
    Publisher: NY: Charles Scribner's Sons

    Bibliography Sequence Number: 838
    Author1: Jacobs, W
    Date: 1977
    Title: Cipher Machines and Mathematics
    Periodical: Interdisciplinary Science Reviews
    Issue & Page numbers: 2,Author3: 277

    Bibliography Sequence Number: 839
    Author1: Johnson, B
    Date: 1978
    Title: The Secret War
    Publisher: NY: Methuen

    Bibliography Sequence Number: 840
    Author1: Lewin, R
    Date: 1978
    Title: Ultra Goes to War
    Publisher: NY: McGraw-Hill

    Bibliography Sequence Number: 841
    Author1: Luebbert, W. F
    Author2: Stoll, E. L
    Date: 1977
    Title: COLOSSUS and the Ultra Secret
    Periodical: Abacus
    Issue & Page numbers: 11

    Bibliography Sequence Number: 842
    Author1: Campaigne, H
    Date: 19??
    Title: Cryptanalysis
    Periodical: Encyclopedia of Computer Science and Technology
    Issue & Page numbers: 6:434
    A:NY: Marcel Dekker

    Bibliography Sequence Number: 843
    Author1: Mann, B
    Date: 1961
    Title: Cryptography with Matrices
    Periodical: The Pentagon
    Issue & Page numbers: 21 (Fall): 3

    Bibliography Sequence Number: 844
    Author1: Levine, Jack
    Date: 1958
    Title: Some Further Methods in Algebraic Cryptography
    Periodical: Journal Elisha Mitchell Science Society
    Issue & Page numbers: 74:110

    Bibliography Sequence Number: 845
    Author1: Levine, Jack
    Date: 1961
    Title: Cryptographic Slide Rules
    Periodical: Mathematics Magazine
    Issue & Page numbers: (Sep-Oct):322

    Bibliography Sequence Number: 846
    Author1: Levine, Jack
    Author2: Nahikian, H. M
    Date: 1962
    Title: On the Construction of Involutory Matrices
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 69:267-272

    Bibliography Sequence Number: 847
    Author1: Pless, Vera
    Date: 78
    Title: Error Correcting CodeBibliography Sequence Number: Practical Origins and Mathematical Implications
    Periodical: American Mathematical Monthly
    Issue & Page numbers: 85: 90-94

    Bibliography Sequence Number: 848
    Author1: unknown
    Date: 76
    Title: unknown
    Periodical: Science
    Issue & Page numbers: 8OcTitle: 166

    Bibliography Sequence Number: 849
    Author1: Konheim, Alan G
    Date: 1981
    Title: Cryptography: A Primer
    Publisher: NY: John Wiley and Sons

    Bibliography Sequence Number: 850
    Author1: Johnson, Brian
    Date: 1978
    Title: The Secret War
    Publisher: London: British Broadcasting Company

    Bibliography Sequence Number: 851
    Author1: Jones, Reginald Victor
    Date: 1978
    Title: Most Secret War
    Publisher: London: Hamish Hamilton
    Comments: American edition: The Wizard War: British Scientific Intelligence 1939-1945
    Comments: NY: Coward, McCann & Geoghegan 1978

    Bibliography Sequence Number: 852
    Author1: Lewin, Ronald
    Date: 1978
    Title: Ultra Goes to War
    Publisher: London: Hutchinson

    Bibliography Sequence Number: 853
    Author1: Slater, N. B
    Date: 1967
    Title: Gaps and Steps for the Sequence nTheta mod 1
    Periodical: Proc. Camb. Phil. Soc.
    Issue & Page numbers: 1115-1123

    Bibliography Sequence Number: 854
    Author1: Slater, N. B
    Date: 1964
    Title: Distribution Problems and Physical Applications
    Periodical: Compositio Math
    Issue & Page numbers: 176-183

    Bibliography Sequence Number: 855
    Author1: Metelski, John
    Date: 1978
    Title: Telecommunications Privacy and the Information Society
    Periodical: Telecommunications Policy
    Issue & Page numbers: DeComments: 327-335

    Bibliography Sequence Number: 856
    Author1: Hull, T. E
    Author2: Dobell, A. R
    Date: 1962
    Title: Random Number Generators
    Periodical: SIAM Review
    Issue & Page numbers: 4:330-354

    Bibliography Sequence Number: 857
    Author1: Marsaglia, G
    Date: 1972
    Title: The Structure of Linear Congruential Sequences
    Periodical: in Applications of Number Theory to Numerical Analysis ed. S.K. Zaremba NY: Academic Press

    Bibliography Sequence Number: 858
    Author1: Leighton, Albert C
    Date: 1979
    Title: Review of David Shulman's "Annotated Bibliography of Cryptography"
    Periodical: Historica Mathematica
    Issue & Page numbers: May:209-212
    References: 088

    Bibliography Sequence Number: 859
    Author1: Hindin, Harvey J
    Date: 1979
    Title: LSI-Based Data Encryption Discourages the Data Thief
    Periodical: Electronics
    Issue & Page numbers: 21Jun:107-120

    Bibliography Sequence Number: 860
    Author1: Budzinski, Robert
    Date: 1979
    Title: Single-Chip Computer Scrambles for Security
    Periodical: Electronics
    Issue & Page numbers: 19JuIssue & Page numbers: 140-144

    Bibliography Sequence Number: 861
    Author1: Beaston, John
    Date: 1979
    Title: One-Chip Data-Encryption Unit Accesses Memory Directly
    Periodical: Electronics
    Issue & Page numbers: 2Aug:126-129

    Bibliography Sequence Number: 862
    Author1: Meyer, Carl H
    Date: 78
    Title: Ciphertext/Plaintext and Ciphertext/Key Dependence vs Number of Rounds for the Data Encryption Standard
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 47: 1119-1126

    Bibliography Sequence Number: 863
    Author1: Burris, Harrison R
    Date: 76
    Title: Computer Network Cryptography Engineering
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 45: 91-96

    Bibliography Sequence Number: 864
    Author1: Michelman, Eric H
    Date: 79
    Title: The Design and Operation of Public-Key Cryptosystems
    Periodical: Proc. AFIPS NCC
    Issue & Page numbers: 48: 305-311

    Bibliography Sequence Number: 865
    Author1: Holmes, Captain W. J
    Date: 79
    Title: Double-Edged Secrets
    Publisher: Naval Institute Press
    Length: 233 pages
    Comments: $11.50

    Bibliography Sequence Number: 866
    Author1: unknown
    Date: 74
    Title: unknown
    Periodical: Datamation
    Issue & Page numbers: Feb: 90

    Bibliography Sequence Number: 867
    Author1: unknown
    Date: 75
    Title: unknown
    Periodical: Datamation
    Issue & Page numbers: March: 107

    Bibliography Sequence Number: 868
    Author1: Kahn, David
    Date: 76
    Title: unknown
    Periodical: Playboy
    Issue & Page numbers: ???

    Bibliography Sequence Number: 869
    Author1: National Security Agency
    Date: 79
    Title: Security Agency Denies Tampering with DES
    Periodical: IEEE Spectrum
    Issue & Page numbers: 16, 7 (July): 39
    Keywords: NSA

    Bibliography Sequence Number: 870
    Author1: Fak, Viiveke
    Date: 79
    Title: Repeated Use of Codes Which Detect Deception
    Periodical: IEEE Transactions on Information Theory
    Issue & Page numbers: IT-25, 2 (March): 233-234

    Bibliography Sequence Number: 871
    Author1: Andree, R. V
    Date: 52
    Title: Cryptanalysis
    Periodical: Scripta Math
    Issue & Page numbers: 18: 5-16

    Bibliography Sequence Number: 872
    Author1: unknown
    Date: 78
    Title: unknown
    Periodical: Science
    Issue & Page numbers: 8Sep: 891

    Bibliography Sequence Number: 873
    Author1: unknown
    Date: 77
    Title: unknown
    Periodical: Science
    Issue & Page numbers: 9Sep: 1061

    Bibliography Sequence Number: 874
    Author1: unknown
    Date: 76
    Title: unknown
    Periodical: Science
    Issue & Page numbers: 4June: 989

    Return to Cryptosystems Journal Home Page
    Next Page ("Download Cryptosystem Programs")

    Copyright © 1996 Cryptosystems Journal.
    Most recent update on 28-SEP-96.