The Cryptosystems Journal Hypertext Bibliography of Classical Cryptology (Part 1 of 9)

This bibliography was part of my (Tony Patti's) Master's Thesis (M.S. Computer & Information
Sciences) entitled
" An Operational, Computerized, Galois Field Cryptosystem with a Computerized,
Cross-Referenced, and
Annotated Bibliography of Cryptology ", which was completed in July 1981, and
sponsored by Dr. Howard L.
Morgan, at the Moore School of the University of Pennsylvania.

Bibliography Sequence Number: 001
Author1: Gardner, Martin
Date: 1977
Title: Mathematical Games: A New Kind of Cipher That Would Take Millions of Years to Break
Periodical: Scientific American
Issue & Page numbers: 237, 2 (August):120-124,140
Keywords: RSA
Comments: Excellent
References:
002
025
014

Bibliography Sequence Number: 002
Author1: Rivest, Ronald L
Author2: Shamir, Adi
Author3: Adleman, Leonard M
Date: 1977
Title: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
Publisher: MIT Laboratory for Computer Science Document MIT/LCS/TM-82
Length: 15 pages
Keywords: RSA
Comments: Excellent - The basis for the August 1977 Scientific American article
References:
004
007
092
009
010
011
012
013
014
016
015

Bibliography Sequence Number: 003
Author1: Hellman, Martin E
Date: 1979
Title: The Mathematics of Public-Key Cryptography
Periodical: Scientific American
Issue & Page numbers: August 1979:146-157,198
Keywords: RSA
References:
025
004
005
006

Bibliography Sequence Number: 004
Author1: Diffie, Whitfield
Author2: Hellman, Martin E
Date: 76
Title: New Directions in Cryptography
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: Vol. IT-22, No. 6 (Nov):644-654
Keywords: PKC
Comments: "This paper examines several new possibilities in cryptography systems
Comments: which require no prior key channel, unforgeable digital signatures, and
Comments: the use of complexity theory to study the security of cryptographic
Comments: systems." (006)
References:
101
025
027
113
100
007
105
111
106
107
108
112
109
110

Bibliography Sequence Number: 005
Author1: Rivest, Ronald L
Author2: Shamir, Adi
3:Adleman, Leonard M
Date: 1978
Title: A Method for Obtaining Digital Signatures and Public Key Cryptosystems
Periodical: CACM
Issue & Page numbers: 21, 2 (Feb):120-126,179
Keywords: RSA
Comments: "This paper describes a public key cryptosystem based on exponentiation
Comments: in modular arithmetic." (006)
References:
004
112
007
092
101
009
010
111
011
012
013
014
016
015

Bibliography Sequence Number: 006
Author1: Diffie, Whitfield
Author2: Hellman, Martin E
Date: 79
Title: Privacy and Authentication: An Introduction to Cryptography
Periodical: Proceedings of the IEEE
Issue & Page numbers: 67, 3 (March 1979):397-427
Keywords: RSA
Comments: Excellent
References:
533
534
535
536
537
538
436
428
539
482
540
541
655
542
543
544
049
545
546
088
072
547
205
548
549
550
029
061
159
174
070
142
551
552
553
554
555
223
111
593
419
556
372
396
112
439
442
441
654
375
557
376
558
133
050
645
656
657
559
560
561
562
563
564
373
565
566
567
568
025
182
569
570
571
572
398
516
574
027
575
380
498
576
577
399
578
579
237
487
489
119
662
117
404
377
100
004
101
103
005
154
580
168
287
581
582
107
583
324
374
385
386
108
584
391
585
586
587
588
589
590
591
112
561
027
373
113
286
592
004
101
005
383
382
142
029
205
025
419
079
223
593
072
662
399
409
417
594
595
554
596
408
336
017
583
117
324
391
543
375
372
562
557
376
040
597
598
599
600
533
534
601
602
007
154
162
388
603
604
605
428
100
441
606
654
607
608
188
546
108
107
655

Bibliography Sequence Number: 007
Author1: Knuth, Donald E
Date: 1969
Title: Seminumerical Algorithms: The Art of Computer
Programming, Volume 2
Publisher: Reading MA: Addison Wesley
Keywords: Background
Keywords: GF
Keywords: RANDOM
Comments: Esp. Exercise 4.5.2.15
Comments: esp. pages 363-378

Bibliography Sequence Number: 008
Author1: National Security Agency
Date: 19??
Title: Careers for Engineers, Mathematicians, Computer Scientists at the National Security
Agency
Publisher: n.p
Keywords: NSA
Keywords: GF
Comments: especially page 5

Bibliography Sequence Number: 009
Author1: Miller, Gary L
Date: 1975
Title: Riemann's Hypothesis and Tests for Primality
Periodical: Proceedings of the Seventh Annual ACM Symposium on the Theory of
Computing
Issue & Page numbers: 234-239
Comments: held in Albuquerque, New Mexico
Comments: not yet cross-referenced
Comments: An extended version of this paper is available as Research Report
Comments: CS-75-27 from the Department of Computer Science, University of Waterloo,
Comments: Ontario, Canada (Oct. 1975)
References:
110
025

Bibliography Sequence Number: 010
Author1: Niven, Ivan M
Author2: Zuckerman, Herbert S
Date: 60
Title: An Introduction to the Theory of Numbers
Publisher: NY: John Wiley & Sons
Comments: U.P. Math-Physics Library 512.81/N6491/1960
Comments: It appears that there is also a 1972 edition.

Bibliography Sequence Number: 011
Author1: Pollard, J M
Date: 1974
Title: Theorems on factorization and primality testing
Periodical: Proc. Camb. Phil. Soc
Issue & Page numbers: 521-528
Keywords: RSA

Bibliography Sequence Number: 012
Author1: Potter, R J
Date: 1977
Title: Electronic Mail
Periodical: Science
Issue & Page numbers: 195, 4283 (18 March 1977):1160-1164
Keywords: RSA

Bibliography Sequence Number: 013
Author1: Rabin, Michael O
Date: 1976
Title: Probabilistic Algorithms
Periodical: in Algorithms and Complexity: Recent Results and New Directions; J.F. Traub
(ed.), New
YorKeywords:
Academic Press
Issue & Page numbers: 21-40
Keywords: RSA
Comments: edited by J F Traub

Bibliography Sequence Number: 014
Author1: Solovay, R
Author2: Strassen, V
Date: 77
Title: A Fast Monte-Carlo Test for Primality
Periodical: SIAM Journal on Computing
Issue & Page numbers: March 1977:84-85
Keywords: RSA
Comments: not yet cross-referenced
References:
025
010
646

Bibliography Sequence Number: 015
Author1: National Bureau of Standards
Date: 1975
Title: Federal Information Processing Data Encryption: Proposed Standard
Periodical: Federal Register
Issue & Page numbers: 40, 149 (1 Aug 1975):32395-32414
Keywords: RSA
Keywords: DES
Comments: not yet cross-referenced

Bibliography Sequence Number: 016
Author1: National Bureau of Standards
Date: 1975
Title: Encryption Algorithm for Computer Data Protection: Requests for Comments
Periodical: Federal Register
Issue & Page numbers: 40, 52 (17 Mar):12067-12250
Keywords: RSA
Keywords: DES
Comments: pages 12134-12139 are "Request for Comments"?
Comments: Richard W. Roberts the author?

Bibliography Sequence Number: 017
Author1: Hill, Lester S
Date: 1929
Title: Cryptography in an Algebraic Alphabet
Periodical: American Mathematical Monthly
Issue & Page numbers: 36:306-312
Keywords: GF

Bibliography Sequence Number: 018
Author1: Costas, John P
Date: 1979
Title: Cryptography in the Field, Part
Author1: An Overview
Periodical: BYTE
Issue & Page numbers: March 1979:56-64
References:
197

Bibliography Sequence Number: 019
Author1: Meushaw, Robert V
Date: 1979
Title: The Standard Data Encryption Algorithm, Part 1
Periodical: BYTE
Issue & Page numbers: March 1979:66-74
Keywords: DES
References:
198
050

Bibliography Sequence Number: 020
Author1: Witt, Evans
Date: 1978
Title: Computers Spawn a New Brand of Crime
Periodical: The Sunday Plain Dealer
Issue & Page numbers: 5 Feb 1978:Four-5
Keywords: RSA
Keywords: NSA
Keywords: DES
Comments: Excellent

Bibliography Sequence Number: 021
Author1: Rivest, Ronald L
Date: 1980
Title: A Description of a Single-Chip Implementation of the RSA Cipher
Periodical: Lambda
Issue & Page numbers: I, 3 (fourth quarter):14-18
Keywords: RSA
Comments: very interesting description of hardware chip for RSA algorithm
References:
367
226
244
256
004
006
001
368
056
369
005
021

Bibliography Sequence Number: 022
Author1: Shamir, Ali
Date: 1977
Title: Factoring Numbers in O(Log n) Arithmetic Steps
Publisher: MIT/LCS/TM-91
Length: 13
Keywords: PRIMES
References:
002
011
649
650
007
257

Bibliography Sequence Number: 023
Author1: National Bureau of Standards
Date: 1977
Title: Validating the Correctness of Hardware Implementation of the NBS Data
Encryption Standard, NBS
Special
Publication 500-20
Publisher: NBS
Keywords: DES

Bibliography Sequence Number: 024
Author1: Katzan, H
Date: 1977
Title: The Standard Data Encryption Algorithm
Publisher: NY: Petrocelli Books
Keywords: DES

Bibliography Sequence Number: 025
Author1: Kahn, David
Date: 1967
Title: The Codebreakers: The Story of Secret Writing
Publisher: NY: Macmillan
Length: 1164 pages
Keywords: GF
Keywords: NSA
Keywords: Historical
Comments: Bought 29Jan79.
Comments: Ninth Printing 1979
Comments: "This is the most complete history of cryptology available, containing
Comments: within its thousand pages material sufficient to reward several careful
Comments: readings. As a technical reference, it leaves much to be desired,
Comments: because it is concerned more with the influence of cryptology than with
Comments: its technical development, though much of the latter comes through.
Comments: despite its nontechnical orientation, a lot can be learned from a
Comments: careful study of the many details assembled. In addition, Kahn conveys
Comments: a valuable feel for the subject, through the experience of past
Comments: cryptologists." (006)
Comments: Especially interesting:
Comments: pp. 99-105 on cryptanalytic letter frequency analysis
Comments: pp. 189-213 on telegraphy and cryptography (chapter 6)
Comments: pp. 298-299 on radio and cryptanalysis
Comments: pp. 374-386 on William Friedman and his writings. especially his
Comments: Kappa Test, Kullbach's Phi and Chi Tests, and
Comments: Kasiski's Determination.
Comments: pp. 398-401 on One-Time Systems
Comments: pp. 404-410 on Hill's Algebraic Multigraphic Substitutions
Comments: pp. 410-415 on rotor principles
Comments: pp. 522-523 on invisible inks
Comments: pp. 672-736 on NSA
References:
029

Bibliography Sequence Number: 026
Author1: Vernam, G S
Date: 1926
Title: Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic
Communications
Periodical: Journal of the American Institute of Electrical Engineers
Issue & Page numbers: 45:109-115
Keywords: RANDOM
References:
059

Bibliography Sequence Number: 027
Author1: Shannon, Claude E
Date: 1949
Title: Communication Theory of Secrecy Systems
Periodical: Bell System Technical Journal
Issue & Page numbers: 28 (October):656-715
Keywords: Information Theory
Keywords: Classic
Comments: Classic and Excellent
Comments: "The material in this paper appeared originally in a confidential
Comments: report 'A Mathematical Theory of Cryptography' dated Sept. 1, 1945,
Comments: which has since been declassified" (page 656)
Comments: "This is a classic paper in which Shannon develops the information
Comments: theoretic foundation for classical cryptanalysis, characterizes the
Comments: systems which are unbreakable for information theoretic reasons, and
Comments: outlines the construction of product ciphers." (006)
References:
389
029
078
632
633
026
017
043
464
634

Bibliography Sequence Number: 028
Author1: Gait, J
Date: 1977
Title: A New Nonlinear Pseudorandom Number Generator
Periodical: IEEE Transactions on Software Engineering
Issue & Page numbers: Vol SE-3, No. 5 (Sep 1977):359-363
Keywords: RSA
Keywords: RANDOM
References:
027
007
050
114
016
116
117
118
119
120

Bibliography Sequence Number: 029
Author1: Gaines, Helen Fouche
Date: 1956
Title: Cryptanalysis: A Study of Ciphers and their Solutions
Publisher: NY: Dover
Keywords: Classical
Comments: U.P. Moore Library EE/510.4/G127
Comments: Formerly Published under the title: "Elementary Cryptanalysis"
Comments: "This is the most readily available work on cryptanalysis, and gives
Comments: extensive coverage of classical systems." (006)

Bibliography Sequence Number: 030
Author1: Gersho, Allen
Date: 1978
Title: In this Issue
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):1
Comments: introduction to this interesting issue

Bibliography Sequence Number: 031
Author1: Gersho, Allen
Date: 1978
Title: Communications Privacy
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):2

Bibliography Sequence Number: 032
Author1: Hellman, Martin E
Date: 1978
Title: ComSoc Spotlight
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):3-4

Bibliography Sequence Number: 033
Author1: Davis, Ruth M
Date: 1978
Title: The Data Encryption Standard in Perspective
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):5-9
Keywords: DES

Bibliography Sequence Number: 034
Author1: Morris, Robert
Date: 1978
Title: The Data Encryption Standard -- Retrospective and Prospects
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):11-14
Keywords: DES
References:
424
133
112
040
376
425
426
391
015
270
427

Bibliography Sequence Number: 035
Author1: Campbell, Carl M
Date: 1978
Title: Design and Specification of Cryptographic Capabilities
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):15-19
Keywords: DES
References:
428

Bibliography Sequence Number: 036
Author1: Adleman, Leonard M
Author2: Rivest, Ronald L
Date: 78
Title: The Use of Public Key Cryptography in Communication System Design
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):20-23
Keywords: RSA
References:
429
004
372
378
383
005
430

Bibliography Sequence Number: 037
Author1: Hellman, Martin E
Date: 1978
Title: An Overview of Public Key Cryptography
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):24-31
Keywords: RSA
References:
112
428
431
004
101
005
383
382
007
432
111
433

Bibliography Sequence Number: 038
Author1: Branstad, Dennis K
Date: 1978
Title: Security of Computer Communication
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):33-40
Keywords: DES
References:
436
428
372
437
438
050
004
112
439
440
441
442
645
444
002
445

Bibliography Sequence Number: 039
Author1: Orceyre, Michael J
Author2: Heller, Ralph M
Date: 78
Title: An Approach to Secure Voice Communication Based on the Data Encryption
Standard
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):41-50
Keywords: DES
References:
050
038
431
380

Bibliography Sequence Number: 040
Author1: U.S. Senate Select Committee on Intelligence
Date: 1978
Title: Unclassified Summary: Involvement of NSA in the Development of the Data
Encryption Standard
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):53-55
Keywords: DES
Comments: Also reprinted in Cryptologia Author2: 387-389

Bibliography Sequence Number: 041
Author1: Hill, Sandy
Date: 1978
Title: Gentle Diversions
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):56-58
References:
025
142
434
088
435

Bibliography Sequence Number: 042
Author1: Dickson, Leonard E
Date: 1958
Title: Linear Groups with an Exposition of the Galois Field Theory
Publisher: NY: Dover
Keywords: GF
Comments: U. or Pa. Math Library Number 512.86/D564.2/1958

Bibliography Sequence Number: 043
Author1: Hill, Lester S
Date: 1931
Title: Concerning Certain Linear Transformation Apparatus of Cryptography
Periodical: American Mathematical Monthly
Issue & Page numbers: 38:135-154
Keywords: GF

Bibliography Sequence Number: 044
Author1: IBM
Date: 19??
Title: "A Cryptographic Management Scheme for Implementing the Data Encryption
Standard"
Periodical: IBM Systems Journal
Issue & Page numbers: Vol. 17 No. 2
Keywords: DES
Comments: Entire issue is $1.75
Comments: Article reprint is $.50 as order # G321-5066
Comments: from IBM Systems Journal Reprints
Comments: Armonk, NY 10504

Bibliography Sequence Number: 045
Author1: Schechter, Bruce
Date: 1981
Title: A Prime Discovery
Periodical: Discover
Issue & Page numbers: 2, 1 (Jan):30-31
Keywords: primes
Comments: describes Len Adleman's new primality algorithm (see Ref. 367)
References:
367

Bibliography Sequence Number: 046
Author1: Denning, Peter J
Date: 1979
Title: Editor's Overview -- Special Section of Data Encryption
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 4 (Dec):283
References:
050
001

Bibliography Sequence Number: 047
Author1: Bright, Herbert S
Author2: Enison, Richard L
Date: 79
Title: Quasi-Random Number Sequences from a Long-Period TLP Generator with
Remarks on Application to
Cryptography
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 4 (Dec):357-370
Keywords: random
References:
396
145
322
585
323
505
506
507
508
509
510
511
512
028
513
514
515
516
517
518
007
519
520
521
522
114
523
524
525
050
027
417
526
527
528
529
530
026
531
532
422
423

Bibliography Sequence Number: 048
Author1: Shamir, Ali
Date: 1979
Title: How to Share a Secret
Periodical: CACM
Issue & Page numbers: 22, 11 (Nov):612-613
References:
109
370
007
005

Bibliography Sequence Number: 049
Author1: Needham, Roger M
Author2: Schroeder, Michael D
Date: 78
Title: Using Encryption for Authentication in Large Networks of Computers
Periodical: CACM
Issue & Page numbers: 21, 12 (Dec):993-998
Keywords: RSA
Keywords: Applications
Comments: AbstracTitle: "Use of encryption to achieve authenticated communication in
Comments: computer networks is discussed. Example protocols are presented for the
Comments: establishment of authenticated connections, for the management of
authenticated
Comments: mail, and for signature verification and document integrity guarantee.
Comments: Both conventional and public-key encryption algorithms are considered as
Comments: the basis for protocols.
References:
436
428
100
583
482
661
050
662
005

Bibliography Sequence Number: 050
Author1: National Bureau of Standards
Date: 1977
Title: Data Encryption Standard, FIPS Publication No. 46
Publisher: NBS
Keywords: DES
Keywords: RANDOM
Comments: NTIS for $4

Bibliography Sequence Number: 051
Author1: Denning, Dorothy E
Date: 1979
Title: Secure Personal Computing in an Insecure Network
Periodical: CACM
Issue & Page numbers: 22, 8 (Aug):476-482
Keywords: RSA
References:
004
663
481
664
485
486
056
101
383
665
050
049
492
005
666
497
057

Bibliography Sequence Number: 052
Author1: Morris, Robert
Author2: Thompson, Ken
Date: 79
Title: Password Security: A Case History
Periodical: CACM
Issue & Page numbers: 22, 11 (Nov):595-597
Comments: Abstract: "This paper describes the history of the design of the
Comments: password security scheme on a remotely accessed time-sharing system.
Comments: The present design was the result of countering observed attempts to
Comments: penetrate the system. The result is a compromise between extreme
Comments: security and ease of use."
References:
667
016
106

Bibliography Sequence Number: 053
Author1: Peleg, Shmuel
Author2: Rosenfeld, Azriel
Date: 79
Title: Breaking Substitution Ciphers Using a Relaxation Algorithm
Periodical: CACM
Issue & Page numbers: 22, 11 (Nov):598-605
References:
029
142

Bibliography Sequence Number: 054
Author1: Gries, David
Author2: Misra, Jayadev
Date: 78
Title: A Linear Sieve Algorithm for Finding Prime Numbers
Periodical: Communication of the ACM
Issue & Page numbers: 21, 12 (Dec 1978):999-1003
Keywords: primes
References:
007
258
637
009

Bibliography Sequence Number: 055
Author1: Denning, Dorothy E
Author2: Denning, Peter J
Date: 79
Title: Data Security
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 3 (Sep):227-249
Keywords: security
References:
057
004
001
188
485
056
025
049
492
608
051
439
670
380
052
050
487
666
107
106
112
188
481
383
005
494
413
664

Bibliography Sequence Number: 056
Author1: Lempel, Abraham
Date: 1979
Title: Cryptology in Transition
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 4 (Dec):285-303
Keywords: RSA
References:
109
371
372
004
112
006
372
373
001
374
375
113
025
110
007
376
377
378
379
380
381
382
101
383
009
133
050
384
385
386
111
013
387
005
162
388
389
027
390
154
142
391
014
040
392

Bibliography Sequence Number: 057
Author1: Simmons, Gustavus J
Date: 1979
Title: Symmetric and Asymmetric Encryption
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 4 (Dec):305-330
References:
393
036
394
336
395
396
145
397
090
004
112
107
117
029
028
001
374
398
399
400
037
401
003
402
017
043
188
403
404
025
110
061
056
405
406
407
408
101
383
119
133
049
409
111
108
103
005
410
411
412
413
389
027
414
154
415
416
417
418
419
026
106
420
421
422
423

Bibliography Sequence Number: 058
Author1: Popek, Gerald J
Author2: Kline, Charles S
Date: 79
Title: Encryption and Secure Computer Networks
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 4 (Dec):331-356
References:
109
473
436
428
474
475
476
100
004
112
006
477
107
478
479
117
324
480
481
482
483
484
433
486
056
487
380
488
101
489
050
655
049
490
491
492
493
494
495
002
005
496
497
498
057
499

Bibliography Sequence Number: 059
Author1: Hitt, Parker
Date: 1916
Title: Manual for the Solution of Military Ciphers
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #1 $9.76
Comments: 1977 reprint of 1916 publication: Fort Leavenworth

Bibliography Sequence Number: 060
Author1: Friedman, William F
Date: 1924
Title: Elements of Cryptanalysis
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #3 $12.80
Comments: 1976 reprint of 1924 War Department Training Pamphlet No. 3

Bibliography Sequence Number: 061
Author1: Kullback, Solomon
Date: 1938
Title: Statistical Methods in Cryptanalysis
Publisher: Laguna Hills, CA: Aegean Park Press
Keywords: Classical
Comments: Aegean #4 $14.56
Comments: 1976 reprint of 1938 Technical Paper of the Signal Intelligence Service
Comments: NSA reprint 1967
Comments: "This reprint of a 1938 paper is an extensive exposition of the use
Comments: of correlation in cryptanalysis." (006)

Bibliography Sequence Number: 062
Author1: Friedman, William F
Date: 19??
Title: Cryptography and Cryptanalysis
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #5 $12.96
References:
199

Bibliography Sequence Number: 063
Author1: Friedman, William F
Date: 1935
Title: Elememtary Military Cryptography
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #7 $9.76
Comments: 1976 Reprint of 1935 Special Text No. 165 in Army Extension Courses

Bibliography Sequence Number: 064
Author1: Friedman, William F
Date: 1944
Title: Advanced Military Cryptography
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #8 $11.84
Comments: 1976 reprint of TM 11-485, Washington: War Department

Bibliography Sequence Number: 065
Author1: Flicke, Wilhelm F
Date: 1954
Title: War Secrets in the Ether, Volume 1
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #9
Comments: trans. Ray W. Pettengill
Comments: 1977 reprint of 1954 NSA publication. In addition to Aegean, available
Comments: from National Archives as No. SRH-002 for $.20 * 312 pages (both
volumes?)
References:
200

Bibliography Sequence Number: 066
Author1: Friedman, William F
Date: 19??
Title: Solving German Codes in World War I
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #11 $13.28

Bibliography Sequence Number: 067
Author1: British War Office
Date: 19??
Title: Manual of Cryptography
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #28 $11.68

Bibliography Sequence Number: 068
Author1: Friedman, William F
Date: 19??
Title: History of the Use of Codes
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #12 $9.12

Bibliography Sequence Number: 069
Author1: Friedman, William F
Author2: Mendelsohn, Charles J
Date: 1938
Title: The Zimmerman Telegram of January 16, 1917 and its Cryptographic Background
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: 1977 reprint
Comments: Aegean #13 $6.56
Comments: 1976 reprint of 1938 Office of the Chief Signal Officer publication

Bibliography Sequence Number: 070
Author1: Sacco, General Luigi
Date: 1936
Title: Manual of Cryptography
Publisher: Laguna Hills, CA: Aegean Park Press
Keywords: Classical
Comments: Aegean #14 $15.36
Comments: Aegean is 1977 reprint of translated original Italian of 1936
Comments: "Manuale di crittografia, 2e edition riveduta e aumenta, Rome, Italy
Comments: 1936. (Translations, French-Manuel de Cryptographie, from 3rd Italian
Comments: edition by J. Bres, reviewed by the author with a preface by R. Leger,
Comments: Paris, France: Payot, 1951; English-Manual of Cryptography, Laguna
Comments: Hills, CA: Aegean Park Press, 1977.)
Comments: This work is noted for being particularly readable. It is similar
Comments: in scope to Eyraud [547] or Friedman [205], but slightly earlier in date."
(006)

Bibliography Sequence Number: 071
Author1: unknown
Date: 19??
Title: Origin and Development of the Army Security Agency 1917-1947
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #16 $7.04

Bibliography Sequence Number: 072
Author1: Barker, Wayne G
Date: 1977
Title: Cryptanalysis of the Hagelin Cryptograph
Publisher: Laguna Hills, CA: Aegean Park Press
Keywords: Classical
Comments: Aegean #17 $16.48

Bibliography Sequence Number: 073
Author1: Glyden
Date: 19??
Title: The Contribution of the Cryptographic Bureaus in the World War
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #18 $11.20

Bibliography Sequence Number: 074
Author1: unknown
Date: 19??
Title: History of Codes and Ciphers in the United States Prior to World War I
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #20 $13.44

Bibliography Sequence Number: 075
Author1: unknown
Date: 19??
Title: History of Codes and Ciphers in the United States During World War I
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #21 $15.68

Bibliography Sequence Number: 076
Author1: unknown
Date: 19??
Title: History of Codes and Ciphers in the United States During the Period Between the
World Wars, Part I
1919-1929
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #22 $15.68

Bibliography Sequence Number: 077
Author1: Barker, Wayne G
Date: 1975
Title: Cryptanalysis of the Simple Substitution Cipher with Word Divisions - Using
Non-Pattern Word Lists
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #2 $9.76

Bibliography Sequence Number: 078
Author1: Givierge, General Marcel
Date: 19??
Title: Course in Cryptography
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #19 $15.36

Bibliography Sequence Number: 079
Author1: Friedman, William F
Date: 19??
Title: The Riverbank Publications, Volume 1
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #23 $13.44
References:
202
203

Bibliography Sequence Number: 080
Author1: Barker, Wayne G
Date: 19??
Title: Cryptanalysis of an Enciphered Code Problem -- Where an "Additive" Method of
Encipherment has been
Used
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #26 $18.24

Bibliography Sequence Number: 081
Author1: D'Imperio, M. E
Date: 19??
Title: The Voynich Manuscript -- An Elegant Enigma
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #27 $13.44

Bibliography Sequence Number: 082
Author1: McCalla, Thomas R
Date: 1968
Title: Introduction to Numerical Methods and FORTRAN Programming
Publisher: NY: John Wiley
Keywords: GF
Comments: Moore School Library Number QA/297/M25
Comments: especially chapter 5 - Matrix Methods and Systems of Linear Algebraic
Equations

Bibliography Sequence Number: 083
Author1: Winkel, Brian J
Date: 1977
Title: Why Cryptologia
Periodical: Cryptologia
Issue & Page numbers: 1-3
References:
025
675

Bibliography Sequence Number: 084
Author1: Mellen, Greg E
Author2: Greenwood, Lloyd
Date: 77
Title: The Cryptology of Multiplex Systems, Part I
Periodical: Cryptologia
Issue & Page numbers: 4-16
References:
025
079
676
747
029
285
064
061

Bibliography Sequence Number: 085
Author1: Harris, Barbara
Date: 1977
Title: A Different Kind of Column
Periodical: Cryptologia
Issue & Page numbers: 17-19

Bibliography Sequence Number: 086
Author1: Reeds, James A
Date: 1977
Title: "Cracking" a Random Number Generator
Periodical: Cryptologia
Issue & Page numbers: 20-26
References:
007

Bibliography Sequence Number: 087
Author1: Kahn, David
Date: 1977
Title: The Biggest Bibliography
Periodical: Cryptologia
Issue & Page numbers: 27-42
References:
088

Bibliography Sequence Number: 088
Author1: Shulman, David
Date: 1976
Title: An Annotated Bibliography of Cryptography
Publisher: NY: Garland Publishing Co
Length: xvi+372
Keywords: Biography
Comments: Garland Reference Library of the Humanities, Volume 37 for $35.00
Comments: "This bibliography has almost no overlap with the present one. It
Comments: offers the most extensive coverage of the classical literature available." (006)

Bibliography Sequence Number: 089
Author1: Shulman, David
Date: 1977
Title: A Reply to Kahn's Review
Periodical: Cryptologia
Issue & Page numbers: 43-45
Comments: not xrefed

Bibliography Sequence Number: 090
Author1: Deavours, Cipher A
Date: 1977
Title: Unicity Points in Cryptanalysis
Periodical: Cryptologia
Issue & Page numbers: 46-68
References:
027
113
025
419
677

Bibliography Sequence Number: 091
Author1: Kruh, Louis
Date: 1977
Title: Cipher EquipmenTitle: Cipher Disks
Periodical: Cryptologia
Issue & Page numbers: 69-75
References:
679
066
062
025
121
680
681
682
683
008
684
685
686
687
688

Bibliography Sequence Number: 092
Author1: Levine, Jack
Author2: Brawley, Joel V
Date: 77
Title: Some Cryptographic Applications of Permutation Polynomials
Periodical: Cryptologia
Issue & Page numbers: 76-92
Keywords: GF
Keywords: RSA
References:
337
334
613
614
615
616
617
618
619
620
621
622
042
623
624
625
626
627
594
628
629
630

Bibliography Sequence Number: 093
Author1: Winkel, Brian
Date: 1977
Title: Poe Challenge Cipher Finally Broken
Periodical: Cryptologia
Issue & Page numbers: 93-96
References:
062
025
823
142
824

Bibliography Sequence Number: 094
Author1: Hiatt, Blanchard
Date: 1977
Title: Age of Decipherment
Periodical: Cryptologia
Issue & Page numbers: 101-105

Bibliography Sequence Number: 095
Author1: Hiatt, Blanchard
Date: 1977
Title: "Count Forward Three Score and Ten..."
Periodical: Cryptologia
Issue & Page numbers: 106-115

Bibliography Sequence Number: 096
Author1: Schatz, Bruce R
Date: 1977
Title: Automated Analysis of Cryptograms
Periodical: Cryptologia
Issue & Page numbers: 116-142
References:
077
825
504
552
117
324
063
689
029
690
580
826
827
241
828
059
025
027
829
142
443
419
556

Bibliography Sequence Number: 097
Author1: Kruh, Louis
Date: 1977
Title: Cipher EquipmenTitle: Converter M-325(T)
Periodical: Cryptologia
Issue & Page numbers: 143-149
References:
691
692
693
751

Bibliography Sequence Number: 098
Author1: Mellen, Greg E
Author2: Greenwood, Lloyd
Date: 77
Title: The Cryptology of Multiplex Systems, Part II
Periodical: Cryptologia
Issue & Page numbers: 150-165
References:
142
025

Bibliography Sequence Number: 099
Author1: Kahn, David
Date: 1977
Title: "Get out your Secret Decoders, Boys and Girls ...."
Periodical: Cryptologia
Issue & Page numbers: 166
References:
121

Return to Cryptosystems Journal Home Page
Next Page ("Bibliography Part 2 of 9")
Previous Page ("Main Bibliography page")

Copyright © 1996 Cryptosystems Journal.
Most recent update on 12-JUN-96.