Bibliography Sequence Number: 100
Author1: Diffie, Whitfield
Author2: Hellman, Martin E
Date: 1976
Title: Multiuser Cryptographic Techniques
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 45:109-112
Keywords: RSA
Keywords: PKC
Comments: U.P. Moore Library: 510.78/J667
Comments: "This paper describes two approaches to supplying secure first contact
Comments: between users of a computer network, without sending keys along outside
Comments: channels, and some related problems." (006)
References:
538
004
107
117
108
Bibliography Sequence Number: 101
Author1: Merkle, Ralph C
Date: 1978
Title: Secure Communication over insecure channels
Periodical: CACM
Issue & Page numbers: 21 (Apr): 294-299
Keywords: PKC
Comments: "This paper introduced the concept of public key distribution independently
Comments: of Diffie and Hellman" (006)
References:
004
117
025
383
005
027
575
Bibliography Sequence Number: 102
Author1: Sperry Rand Corporation
Date: 1969
Title: Direct Access Storage Device Concepts
Publisher: Sperry Rand Corporation
Length: pages A-2 and A-3
Keywords: primes
Comments: These two pages are a list of the first 10,000 prime numbers (1 to 104,723)
Comments: Document UE-604
Bibliography Sequence Number: 103
Author1: Rabin, Michael O
Date: 1979
Title: Digitalized signatures and public-key functions as intractable as factorization
Periodical: MIT/LCS/TR-212
Keywords: RSA
Comments: "A variation of the RSA scheme with E=2 is shown to have cryptanalytic
Comments: difficulty equivalent to factoring." (006)
References:
658
004
013
659
660
005
014
Bibliography Sequence Number: 104
Author1: Postikov, M M
Date: 1961
Title: Fundamentals of Galois' Theory
Publisher: Delhi, India: Hindustan Publishing Corporation
Keywords: GF
Comments: Moore School Library Number 512.86/P845.EH
Bibliography Sequence Number: 105
Author1: Knuth, Donald E
Date: 1973
Title: Sorting and Searching: The Art of Computer Programming, Volume 3
Publisher: Reading MA: Addison Wesley
Keywords: background
Bibliography Sequence Number: 106
Author1: Wilkes, M. V
Date: 1975
Title: Time-Sharing Computing Systems, Third Edition
Publisher: NY: Elsevier
Comments: orig. publ. 1968
References:
004
Bibliography Sequence Number: 107
Author1: Evans Jr., A
Author2: Kantrowitz, W
Author3: Weiss, E
Date: 1974
Title: A User Authentication System Not Requiring Secrecy in the Computer
Periodical: CACM
Issue & Page numbers: 17 (Aug): 437-442
Keywords: system design and implementation
Comments: "This paper describes a oneway function obtained by using a transformamtion
Comments: similar to the IBM Lucifer system and using the argument as both input and
key." (006)
Bibliography Sequence Number: 108
Author1: Purdy, George B
Date: 1974
Title: A high-security log-in procedure
Periodical: CACM
Issue & Page numbers: (Aug): 442-445
Keywords: system design and implementation
Comments: "This paper studies the use of a polynomial of very high degree over
Comments: a finite field as a one-way function. This function has subsequently
Comments: been used to protect the passwords on the BBN TENEX system." (006)
Bibliography Sequence Number: 109
Author1: Aho, A V
Author2: Hopcroft, J E
Author3: Ullman, J D
Date: 1974
Title: The Design and Analysis of Computer Algorithms
Publisher: Reading, MA: Addison-Wesley
Keywords: background
Bibliography Sequence Number: 110
Author1: Karp, R M
Date: 1972
Title: Reducibility among Combinatorial Problems
Periodical: in Complexity of Computer Computations; R.E. Miller et al Ed.;NY: Plenum
Issue & Page numbers: 85-104
Keywords: RSA
Bibliography Sequence Number: 111
Author1: Pohlig, Stephen C
Author2: Hellman, Martin E
Date: 78
Title: An improved algorithm for computing logarithms in GF(p) and its cryptographic significance
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-24, 1 (Jan):106-110
Keywords: Cryptanalysis
Keywords: GF
Comments: Abstract - A cryptographic system is described which is secure if and
Comments: only if computing logarithms ober GF(p) is infeasible. Previously published
Comments: algorithms for computing this function require O(Publisher: *.5) complexity in
Comments: both time and space. An improved algorithm is derived which requires
Comments: O(log**2 p) complexity if p-1 has only small prime factors. Such
Comments: values of p must be avoided in the cryptosystem. Constructive uses for
Comments: the new algorithm are also described.
Comments: "A discussion of a cryptographic system with a high degree of
Comments: mathematical structure and simplicity." (006)
Bibliography Sequence Number: 112
Author1: Diffie, Whitfield
Author2: Hellman, Martin E
Date: 77
Title: Exhaustive Cryptanalysis of the NBS data encryption standard
Periodical: Computer
Issue & Page numbers: 10 (June): 74-84
Keywords: DES
Comments: "This paper gives a detailed cost estimate for the construction of
Comments: a highly parallel special purpose computer to break the DES in one day."
(006)
References:
016
015
562
004
643
644
645
375
133
399
027
113
572
Bibliography Sequence Number: 113
Author1: Hellman, Martin E
Date: 1977
Title: An extension of the Shannon theory approach to Cryptography
Periodical: IEEE Transactions on Information Theory, Sep. 1975
Issue & Page numbers: IT-23, 3 (May):289-294
Comments: Abstract - Shannons information-theoretic approach to cryptography is
Comments: reviewed and extended. It is shown that Shannons random cipher model
Comments: is conservative in that a randomly chosen cipher is essentially the worst
Comments: possible. This is in contrast with error-correcting codes where a randomly
Comments: chosen code is essentially the best possible. The concepts of mathching
Comments: a cipher to a language and of the trade-off between local and global
Comments: uncertainty are also developed.
Bibliography Sequence Number: 114
Author1: MacLaren, M. D
Author2: Marsaglia, G
Date: 65
Title: Uniform random number generators
Periodical: Journal of the ACM
Issue & Page numbers: 12: 83-89
Keywords: background
Keywords: RANDOM
Bibliography Sequence Number: 115
Author1: Yao, Andrew
Date: 1977
Title: Probabilistic ComputationBibliography Sequence Number: Toward a Unified
Measure of Complexity
Periodical: 18th Annual Symposium on Foundations of Computer Science
Issue & Page numbers: 222-227
Keywords: Complexity
Bibliography Sequence Number: 116
Author1: Blinchikoff, H
Author2: Zverov, Z
Date: 76
Title: Filtering in the Time and Frequency Domains
Publisher: NY: Wiley
Keywords: Misc.?
Bibliography Sequence Number: 117
Author1: Feistel, Horst
Date: 1973
Title: Cryptography and Computer Privacy
Periodical: Scientific American
Issue & Page numbers: 228:15-23
Keywords: Popular
Comments: "This article gives the most readable account of the operation of
Comments: the IBM Lucifer cipher." (006)
Bibliography Sequence Number: 118
Author1: Meyer, Carl H
Date: 1974
Title: Enciphering Data for Secure Transmission
Periodical: Computer Design
Issue & Page numbers: ApriIssue & Page numbers: 129-134
Bibliography Sequence Number: 119
Author1: Meyer, Carl H
Author2: Tuchman, Walter L
Date: 72
Title: Pseudo-random codes can be cracked
Periodical: Electronic Design
Issue & Page numbers: 20, 23 (9 Nov):74-76
Bibliography Sequence Number: 120
Author1: Lehmer, D H
Date: 1951
Title: article name?
Periodical: Proc. 2nd Symp. Large Scale Digital Computing Mach
Issue & Page numbers: 141-146
Comments: Harvard Univ.: Cambridge, MA
Bibliography Sequence Number: 121
Author1: Lesser, Robert
Date: 1975
Title: A Celebration of Comic Art and Memorabilia
Publisher: NY: Hawthorn Books
Length: 292 pages
Bibliography Sequence Number: 122
AuthorAuthor1: Deavours, Cipher A
Date: 1977
Title: Analysis of the Hebern Cryptograph using Isomorphs
Periodical: Cryptologia
Issue & Page numbers: 1: 167-185
References:
695
696
025
Bibliography Sequence Number: 123
Author1: Reeds, James A
Date: 1977
Title: Rotor Algebra
Periodical: Cryptologia
Issue & Page numbers: 1: 186-194
References:
122
159
174
070
Bibliography Sequence Number: 124
Author1: Penney, Walter
Date: 1977
Title: Grille Reconstruction
Periodical: Cryptologia
Issue & Page numbers: 1: 195-200
References:
151
Bibliography Sequence Number: 125
Author1: Kahn, David
Date: 1977
Title: The Significance of COdebreaking and Intelligence in Allied Strategy and Tactics
Periodical: Cryptologia
Issue & Page numbers: 1: 209-222
References:
698
025
Bibliography Sequence Number: 126
Author1: Deavours, Cipher A
Date: 1977
Title: The Kappa Test
Periodical: Cryptologia
Issue & Page numbers: 1: 223-231
References:
025
061
Bibliography Sequence Number: 127
Author1: Winkel, Brian J
Date: 1977
Title: Word Ways, A Journal Worth Going Your Way
Periodical: Cryptologia
Issue & Page numbers: 1: 232-233
Bibliography Sequence Number: 128
Author1: Reeds, James A
Date: 1977
Title: Entropy Calculations and Particular Methods of Cryptanalysis
Periodical: Cryptologia
Issue & Page numbers: 1: 235-254
Bibliography Sequence Number: 128
References:
205
113
025
699
027
700
Bibliography Sequence Number: 129
Author1: Kruh, Louis
Date: 1977
Title: Cipher EquipmenTitle: Hagelin Pocket Cryptographer, Type CD-57
Periodical: Cryptologia
Issue & Page numbers: 1: 255-260
References:
701
Bibliography Sequence Number: 130
Author1: Leighton, Albert C
Date: 1977
Title: "The Earliest Use of a Dot Cipher"
Periodical: Cryptologia
Issue & Page numbers: 1: 261-274
References:
025
Bibliography Sequence Number: 131
Author1: Royal Canadian Mint
Date: 1977
Title: DPEPE DPJO: A Canadian Coin Piece With a Message
Periodical: Cryptologia
Issue & Page numbers: 1: 275-277
Bibliography Sequence Number: 132
Author1: Deavours, Cipher A
Date: 1977
Title: Kullback's "Statistical Methods of Cryptanalysis" - Book Review
Periodical: Cryptologia
Issue & Page numbers: 1: 278-280
References:
061
Bibliography Sequence Number: 133
Author1: Morris, Robert
Author2: Sloane, Neil J. A
Author3: Wyner, Aaron D
Date: 1977
Title: Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard
Periodical: Cryptologia
Issue & Page numbers: 1: 281-291
Keywords: DES
References:
702
427
428
396
703
551
270
112
107
583
117
704
324
705
580
553
025
557
558
489
119
016
108
027
391
708
543
419
106
562
Bibliography Sequence Number: 134
Author1: National Bureau of Standards
Date: 1977
Title: Proposed Federal Information Processing Data Encryption Standard
Periodical: Cryptologia
Issue & Page numbers: 1: 292-306
Keywords: DES
References:
016
Bibliography Sequence Number: 135
Author1: Winkel, Brian J
Date: 1977
Title: Epilogue
Periodical: Cryptologia
Issue & Page numbers: 1: 309
References:
093
Bibliography Sequence Number: 136
Author1: Deavours, Cipher A
Date: 1977
Title: The Ithaca Connection: Computer Cryptography in the Making
Periodical: Cryptologia
Issue & Page numbers: 1: 312-317
References:
001
004
709
110
Bibliography Sequence Number: 137
Author1: Winkel, Brian J
Date: 1977
Title: Poe Challenge Cipher Solutions
Periodical: Cryptologia
Issue & Page numbers: 1: 318-325
Bibliography Sequence Number: 138
Author1: Eckler, A. Ross
Date: 1977
Title: A Rapid Yes-No Computer-Aided Communicator
Periodical: Cryptologia
Issue & Page numbers: 1: 326-333
References:
710
711
464
Bibliography Sequence Number: 139
Author1: Kruh, Louis
Date: 1977
Title: Cipher Equipment: MA4210 Alphanumeric Pocket Cipher
Periodical: Cryptologia
Issue & Page numbers: 1: 334-336
Bibliography Sequence Number: 140
Author1: Kahn, David
Date: 1977
Title: Ecclesiastical Cryptography: A Review
Periodical: Cryptologia
Issue & Page numbers: 1: 337
Bibliography Sequence Number: 141
Author1: Brawley, Joel V
Author2: Levine, Jack
Date: 77
Title: Equivalences of Vigenere Systems
Periodical: Cryptologia
Issue & Page numbers: 1: 338-361
References:
712
713
714
029
025
142
Bibliography Sequence Number: 142
Author1: Sinkov, Abraham
Date: 1968
Title: Elementary Cryptanalysis, A Mathematical Approach
Publisher: NY: Random House
Keywords: Classical
Comments: This volume is now part of the New Mathematical Library, published by
Comments: the Mathematical Association of America (1966): Washington DC
Comments: "This is the best elementary cryptanalysis book available." (006)
Bibliography Sequence Number: 143
Author1: Marsh, D. C. B
Date: 1977
Title: Cryptography at the Colorado School of Mines
Periodical: Cryptologia
Issue & Page numbers: 1: 362-363
References:
029
025
675
142
Bibliography Sequence Number: 144
Author1: Straight, David W
Date: 1977
Title: Cryptanalysis and Data Security Course at the University of Tennessee
Periodical: Cryptologia
Issue & Page numbers: 1: 363-365
References:
029
715
025
142
Bibliography Sequence Number: 145
Author1: Bright, Herbert S
Date: 1977
Title: Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext,
Chosen-Plaintext
Periodical: Cryptologia
Issue & Page numbers: 1: 366-370
Keywords: RANDOM
Comments: text of COMPLAN TN-913-14, 25SEP77 version
References:
396
716
582
323
419
274
Bibliography Sequence Number: 146
Author1: Kahn, David
Date: 1977
Title: Reports from the Reich
Periodical: Cryptologia
Issue & Page numbers: 1: 371
Bibliography Sequence Number: 147
Author1: Kruh, Louis
Date: 1977
Title: The Churchyard Ciphers
Periodical: Cryptologia
Issue & Page numbers: 1: 372-375
References:
079
025
Bibliography Sequence Number: 148
Author1: Highland, Harold J
Date: 1977
Title: CENSOREDate: A Simulation Excercise
Periodical: Cryptologia
Issue & Page numbers: 1: 376-377
Bibliography Sequence Number: 149
Author1: Kahn, David
Date: 1977
Title: German Military Eavesdroppers
Periodical: Cryptologia
Issue & Page numbers: 1: 378-380
Bibliography Sequence Number: 150
Author1: Deavours, Cipher A
Author2: Reeds, James A
Date: 77
Title: The Enigma: Part I, Historical Perspectives
Periodical: Cryptologia
Issue & Page numbers: 1: 381-391
References:
717
718
719
720
721
722
723
724
122
097
725
070
726
698
025
Bibliography Sequence Number: 151
Author1: Winkel, Brian J
Date: 1977
Title: Solution
Periodical: Cryptologia
Issue & Page numbers: 1: 391
References:
124
Bibliography Sequence Number: 152
Author1: Fagone, Peter P
Date: 1977
Title: A Message in Cipher Written by General Cornwallis during the Revolutionary War
Periodical: Cryptologia
Issue & Page numbers: 1: 392-395
References:
025
Bibliography Sequence Number: 153
Author1: Winkel, Brian J
Date: 1977
Title: There and There: A Department
Periodical: Cryptologia
Issue & Page numbers: 1: 396-405
Keywords: DES
Keywords: RSA
Keywords: NSA
References:
727
728
729
730
563
564
Bibliography Sequence Number: 154
Author1: Simmons, Gustavus J
Author2: Norris, Michael J
Date: 77
Title: Preliminary Comments on the M.I.T. Public-Key Cryptosystem
Periodical: Cryptologia
Issue & Page numbers: 1: 406-414
Keywords: RSA
References:
004
002
001
635
636
Bibliography Sequence Number: 155
Author1: Barker, Wayne G
Date: 1978
Title: Solving a Hagelin, Type CD-57, Cipher
Periodical: Cryptologia
Issue & Page numbers: 2: 1-8
References:
072
129
Bibliography Sequence Number: 156
Author1: Wilson, David
Date: 1978
Title: Cryptanalysis Course Down Under
Periodical: Cryptologia
Issue & Page numbers: 2: 9-11
Bibliography Sequence Number: 157
Author1: Kahn, David
Date: 1978
Title: The Forschungsamt: Nazi Germany's Most Secret Communications Intelligence
Agency
Periodical: Cryptologia
Issue & Page numbers: 2: 12-19
References:
158
065
Bibliography Sequence Number: 158
Author1: Kahn, David
Date: 1978
Title: Hitler's SpieBibliography Sequence Number: German Military Intelligence in
World War II
Publisher: NY: MacMillan
Length: 671 pages
Comments: $16.95
Bibliography Sequence Number: 159
Author1: Rohrbach, Hans
Date: 1978
Title: Mathematical and Mechanical Methods in Cryptography - Part I
Periodical: Cryptologia
Issue & Page numbers: 2: 20-37
Comments: "Mathematische und maschinelle Methoden biem chiffrieren und
dechiffrieren,
Comments: Fiat Review of German Science, 1939-1946 Applied Mathematics, Part I,
Comments: Article IX, Office of Military Government for Germany, Field Information
Comments: Agencies Technical, Wiesbaden, Germany, pp. 233-257, 1948. (Translated
Comments: by B. Hardie in two parts...
Comments: This paper describes some of the systems attacked by the German
Comments: cryptanalysts and discusses their sucesses and failures." (006)
Bibliography Sequence Number: 160
Author1: Kruh, Louis
Date: 1978
Title: The Inventions of William F. Friedman
Periodical: Cryptologia
Issue & Page numbers: 2: 38-61
Keywords: Classic
Comments: "This paper describes some of the systems attacked by the German
Comments: cryptanalysts and discusses their successes and failures." (006)
References:
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
161
097
150
753
754
755
756
Bibliography Sequence Number: 161
Author1: Clark, Ronald
Date: 1977
Title: The Man Who Broke Purple
Publisher: NY: Little, Brown & Co
Bibliography Sequence Number: 162
Author1: Rivest, Ronald L
Date: 1978
Title: Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key
Cryptosystem
Periodical: Cryptologia
Issue & Page numbers: 2: 62-65
References:
002
005
154
Bibliography Sequence Number: 163
Author1: Deavours, Cipher A
Date: 1978
Title: A Book Review: "Cryptanalysis of the Hagelin Cryptograph" by Wayne G. Barker
Periodical: Cryptologia
Issue & Page numbers: 2: 66-67
References:
072
Bibliography Sequence Number: 164
Author1: Knight, H. Gary
Date: 1978
Title: Cryptanalyst's Corner
Periodical: Cryptologia
Issue & Page numbers: 2: 68-74
References:
060
029
043
059
061
165
166
167
168
169
086
070
142
Bibliography Sequence Number: 165
Author1: Levine, Jack
Date: 1958
Title: Variable Matrix Substitution in Algebraic Cryptography
Periodical: American Mathematical Monthly
Issue & Page numbers: 65:170-179
Keywords: GF
Bibliography Sequence Number: 166
Author1: Levine, Jack
Date: 1961
Title: Some Applications of High-Speed Computers to the Case of N=2 of ALgebraic
Cryptography
Periodical: Mathematics of Computation
Issue & Page numbers: 15:254-260
Keywords: GF
Bibliography Sequence Number: 167
Author1: Levine, Jack
Date: 1961
Title: Some Elementary Crytanalysis of Algebraic Cryptography
Periodical: American Mathematical Monthly
Issue & Page numbers: 68:411-418
Keywords: GF
Bibliography Sequence Number: 168
Author1: Mellen, Greg E
Date: 1973
Title: Cryptology, Computers, and Common Sense
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 42: 569-579
Keywords: Survey
Comments: "A rather pessimistic survey of the application of cryptography." (006)
Bibliography Sequence Number: 169
Author1: Peck, Lyman C
Date: 1961
Title: Secret Codes, Remainder Arithmetic and Matrices
Periodical: Reston, VA: National Council of Teachers of Math
Bibliography Sequence Number: 170
Author1: Lynch, Frederick D
Date: 19??
Title: Pattern-Word List (Volume 1)
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: $14.60
Bibliography Sequence Number: 171
Author1: Weber, Ralph E
Date: 1978
Title: James Lovell and Secret Ciphers During the American Revolution
Periodical: Cryptologia
Issue & Page numbers: 2: 75-88
References:
172
Bibliography Sequence Number: 172
Author1: Weber, Ralph E
Date: 1978
Title: United States Diplomatic Codes and Ciphers, 1775-1938
Publisher: Chicago: New University Press
Length: approx 600
Comments: $49.95
Bibliography Sequence Number: 173
Author1: Winkel, Brian J
Date: 1978
Title: There and There
Periodical: Cryptologia
Issue & Page numbers: 2: 89-94
References:
757
758
759
760
Bibliography Sequence Number: 174
Author1: Rohrbach, Hans
Date: 1978
Title: Mathematical and Mechanical Methods in Cryptology - Part II
Periodical: Cryptologia
Issue & Page numbers: 2: 101-121
References:
159
Bibliography Sequence Number: 175
Author1: Kahn, David
Date: 1978
Title: Friedman's Life: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 2: 122-123
References:
161
Bibliography Sequence Number: 176
Author1: Knight, H. Gary
Date: 1978
Title: Cryptanalyst's Corner
Periodical: Cryptologia
Issue & Page numbers: 2: 124-128
References:
122
126
025
123
419
Bibliography Sequence Number: 177
Author1: Kruh, Louis
Date: 1978
Title: Who Wrote "The American Black Chamber"?
Periodical: Cryptologia
Issue & Page numbers: 2: 130-133
References:
025
611
761
178
179
180
181
182
Bibliography Sequence Number: 178
Author1: Yardley, Herbert O
Date: 1931
Title: Secret Inks
Periodical: Saturday Evening Post
Issue & Page numbers: 4 April 1931: pages ??
Bibliography Sequence Number: 179
Author1: Yardley, Herbert O
Date: 1931
Title: Codes
Periodical: Saturday Evening Post
Issue & Page numbers: 18 April 1931: pages ??
Bibliography Sequence Number: 180
Author1: Yardley, Herbert O
Date: 1931
Title: Ciphers
Periodical: Saturday Evening Post
Issue & Page numbers: 9 May 1931: pages ??
Bibliography Sequence Number: 181
Author1: Yardley, Herbert O
Date: 1931
Title: Cryptograms and Their Solutions
Periodical: Saturday Evening Post
Issue & Page numbers: 21 Nov 1931: pages ??
Bibliography Sequence Number: 182
Author1: Yardley, Herbert O
Date: 1931
Title: The American Black Chamber
Publisher: Indianapolis: Bobbs-Merrill Co
Keywords: Historical
Comments: "This volume gives an excellent feeling for the flavor of cryptanalysis." (006)
Bibliography Sequence Number: 183
Author1: Deavours, Cipher A
Date: 1978
Title: Cryptology at Kean College
Periodical: Cryptologia
Issue & Page numbers: 2: 134-138
Bibliography Sequence Number: 184
Author1: Kahn, David
Date: 1978
Title: Nuggets from the ArchiveBibliography Sequence Number: Yardley Tries Again
Periodical: Cryptologia
Issue & Page numbers: 2: 139-143
References:
182
Bibliography Sequence Number: 185
Author1: Barker, Wayne G
Date: 1978
Title: The Unsolved d'Agapeyeff cipher
Periodical: Cryptologia
Issue & Page numbers: 2: 144-147
References:
093
137
186
Bibliography Sequence Number: 186
Author1: D'Agapeyeff, Alexander
Date: 1939
Title: Codes and Ciphers
Publisher: London: Oxford University Press
Bibliography Sequence Number: 187
Author1: Straight, David
Date: 1978
Title: An Outline of Computer Security: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 2: 148-150
References:
188
270
029
025
142
Bibliography Sequence Number: 188
Author1: Hoffman, Lance J
Date: 1977
Title: Modern Methods for Computer Security and Privacy
Publisher: Englewood Cliffs, NJ: Prentice-Hall
Comments: $17.95
Bibliography Sequence Number: 189
Author1: Kahn, David
Date: 1978
Title: Pictures Galore: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 2: 151
References:
762
025
698
Bibliography Sequence Number: 190
Author1: Rubin, Frank
Date: 1978
Title: Computer Methods for Decrypting Multiplex Ciphers
Periodical: Cryptologia
Issue & Page numbers: 2: 152-160
References:
084
Bibliography Sequence Number: 191
Author1: Winkel, Brian J
Date: 1978
Title: Casanova and the Beaufort Cipher
Periodical: Cryptologia
Issue & Page numbers: 2: 161-163
Bibliography Sequence Number: 192
Author1: Kruh, Louis
Date: 1978
Title: Cryptology as a Career
Periodical: Cryptologia
Issue & Page numbers: 2: 164-166
Bibliography Sequence Number: 193
Author1: Anonymous
Date: 1978
Title: Encryption Challenge
Periodical: Cryptologia
Issue & Page numbers: 2: 168-171
References:
086
Bibliography Sequence Number: 194
Author1: Kruh, Louis
Date: 1978
Title: Cipher EquipmenTitle: DH-26 Handheld Encryption Machine
Periodical: Cryptologia
Issue & Page numbers: 2: 172-177
References:
763
001
764
Bibliography Sequence Number: 195
Author1: Winkel, Brian J
Date: 1978
Title: A Tribute to Alf Monge
Periodical: Cryptologia
Issue & Page numbers: 2: 178-185
Bibliography Sequence Number: 196
Author1: Winkel, Brian J
Date: 1978
Title: There and There
Periodical: Cryptologia
Issue & Page numbers: 2: 186-194
Keywords: RSA
References:
698
758
759
765
062
154
162
378
Bibliography Sequence Number: 197
Author1: Costas, John P
Date: 1979
Title: Cryptography in the Field, Part 2: Using the Pocket Calculator
Periodical: BYTE
Issue & Page numbers: April 1979:144-165
References:
018
025
026
027
004
007
005
028
001
029
Bibliography Sequence Number: 198
Author1: Meushaw, Robert V
Date: 1979
Title: The Standard Data Encryption Algorithm, Part 2
Periodical: BYTE
Issue & Page numbers: April 1979:110-126
Keywords: DES
References:
019
050
023
024
Bibliography Sequence Number: 199
Author1: Friedman, William F., editor
Date: 19??
Title: Cryptography and Cryptanalysis, Volume 2
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #6 $12.96
References:
062
Return to Cryptosystems Journal Home Page
Next Page ("Bibliography Part 3 of 9")
Previous Page ("Bibliography part 1 of 9")
Copyright © 1996 Cryptosystems Journal.
Most recent update on 12-JUN-96.