The complete Bibliography comprises approximately 300,000 bytes and almost 9,000 lines
which were typed entirely by hand.
Bibliography Sequence Number: 001
Author1: Gardner, Martin
Date: 1977
Title: Mathematical Games: A New Kind of Cipher That Would Take Millions of Years
to Break
Periodical: Scientific American
Issue & Page numbers: 237, 2 (August):120-124,140
Keywords: RSA
Comments: Excellent
References:
002
025
014
Bibliography Sequence Number: 002
Author1: Rivest, Ronald L
Author2: Shamir, Adi
Author3: Adleman, Leonard M
Date: 1977
Title: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
Publisher: MIT Laboratory for Computer Science Document MIT/LCS/TM-82
Length: 15 pages
Keywords: RSA
Comments: Excellent - The basis for the August 1977 Scientific American article
References:
004
007
092
009
010
011
012
013
014
016
015
Bibliography Sequence Number: 003
Author1: Hellman, Martin E
Date: 1979
Title: The Mathematics of Public-Key Cryptography
Periodical: Scientific American
Issue & Page numbers: August 1979:146-157,198
Keywords: RSA
References:
025
004
005
006
Bibliography Sequence Number: 004
Author1: Diffie, Whitfield
Author2: Hellman, Martin E
Date: 76
Title: New Directions in Cryptography
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: Vol. IT-22, No. 6 (Nov):644-654
Keywords: PKC
Comments: "This paper examines several new possibilities in cryptography systems
Comments: which require no prior key channel, unforgeable digital signatures, and
Comments: the use of complexity theory to study the security of cryptographic
Comments: systems." (006)
References:
101
025
027
113
100
007
105
111
106
107
108
112
109
110
Bibliography Sequence Number: 005
Author1: Rivest, Ronald L
Author2: Shamir, Adi
3:Adleman, Leonard M
Date: 1978
Title: A Method for Obtaining Digital Signatures and Public Key Cryptosystems
Periodical: CACM
Issue & Page numbers: 21, 2 (Feb):120-126,179
Keywords: RSA
Comments: "This paper describes a public key cryptosystem based on exponentiation
Comments: in modular arithmetic." (006)
References:
004
112
007
092
101
009
010
111
011
012
013
014
016
015
Bibliography Sequence Number: 006
Author1: Diffie, Whitfield
Author2: Hellman, Martin E
Date: 79
Title: Privacy and Authentication: An Introduction to Cryptography
Periodical: Proceedings of the IEEE
Issue & Page numbers: 67, 3 (March 1979):397-427
Keywords: RSA
Comments: Excellent
References:
533
534
535
536
537
538
436
428
539
482
540
541
655
542
543
544
049
545
546
088
072
547
205
548
549
550
029
061
159
174
070
142
551
552
553
554
555
223
111
593
419
556
372
396
112
439
442
441
654
375
557
376
558
133
050
645
656
657
559
560
561
562
563
564
373
565
566
567
568
025
182
569
570
571
572
398
516
574
027
575
380
498
576
577
399
578
579
237
487
489
119
662
117
404
377
100
004
101
103
005
154
580
168
287
581
582
107
583
324
374
385
386
108
584
391
585
586
587
588
589
590
591
112
561
027
373
113
286
592
004
101
005
383
382
142
029
205
025
419
079
223
593
072
662
399
409
417
594
595
554
596
408
336
017
583
117
324
391
543
375
372
562
557
376
040
597
598
599
600
533
534
601
602
007
154
162
388
603
604
605
428
100
441
606
654
607
608
188
546
108
107
655
Bibliography Sequence Number: 007
Author1: Knuth, Donald E
Date: 1969
Title: Seminumerical Algorithms: The Art of Computer
Programming, Volume 2
Publisher: Reading MA: Addison Wesley
Keywords: Background
Keywords: GF
Keywords: RANDOM
Comments: Esp. Exercise 4.5.2.15
Comments: esp. pages 363-378
Bibliography Sequence Number: 008
Author1: National Security Agency
Date: 19??
Title: Careers for Engineers, Mathematicians, Computer Scientists at the National Security
Agency
Publisher: n.p
Keywords: NSA
Keywords: GF
Comments: especially page 5
Bibliography Sequence Number: 009
Author1: Miller, Gary L
Date: 1975
Title: Riemann's Hypothesis and Tests for Primality
Periodical: Proceedings of the Seventh Annual ACM Symposium on the Theory of
Computing
Issue & Page numbers: 234-239
Comments: held in Albuquerque, New Mexico
Comments: not yet cross-referenced
Comments: An extended version of this paper is available as Research Report
Comments: CS-75-27 from the Department of Computer Science, University of Waterloo,
Comments: Ontario, Canada (Oct. 1975)
References:
110
025
Bibliography Sequence Number: 010
Author1: Niven, Ivan M
Author2: Zuckerman, Herbert S
Date: 60
Title: An Introduction to the Theory of Numbers
Publisher: NY: John Wiley & Sons
Comments: U.P. Math-Physics Library 512.81/N6491/1960
Comments: It appears that there is also a 1972 edition.
Bibliography Sequence Number: 011
Author1: Pollard, J M
Date: 1974
Title: Theorems on factorization and primality testing
Periodical: Proc. Camb. Phil. Soc
Issue & Page numbers: 521-528
Keywords: RSA
Bibliography Sequence Number: 012
Author1: Potter, R J
Date: 1977
Title: Electronic Mail
Periodical: Science
Issue & Page numbers: 195, 4283 (18 March 1977):1160-1164
Keywords: RSA
Bibliography Sequence Number: 013
Author1: Rabin, Michael O
Date: 1976
Title: Probabilistic Algorithms
Periodical: in Algorithms and Complexity: Recent Results and New Directions; J.F. Traub
(ed.), New
YorKeywords:
Academic Press
Issue & Page numbers: 21-40
Keywords: RSA
Comments: edited by J F Traub
Bibliography Sequence Number: 014
Author1: Solovay, R
Author2: Strassen, V
Date: 77
Title: A Fast Monte-Carlo Test for Primality
Periodical: SIAM Journal on Computing
Issue & Page numbers: March 1977:84-85
Keywords: RSA
Comments: not yet cross-referenced
References:
025
010
646
Bibliography Sequence Number: 015
Author1: National Bureau of Standards
Date: 1975
Title: Federal Information Processing Data Encryption: Proposed Standard
Periodical: Federal Register
Issue & Page numbers: 40, 149 (1 Aug 1975):32395-32414
Keywords: RSA
Keywords: DES
Comments: not yet cross-referenced
Bibliography Sequence Number: 016
Author1: National Bureau of Standards
Date: 1975
Title: Encryption Algorithm for Computer Data Protection: Requests for Comments
Periodical: Federal Register
Issue & Page numbers: 40, 52 (17 Mar):12067-12250
Keywords: RSA
Keywords: DES
Comments: pages 12134-12139 are "Request for Comments"?
Comments: Richard W. Roberts the author?
Bibliography Sequence Number: 017
Author1: Hill, Lester S
Date: 1929
Title: Cryptography in an Algebraic Alphabet
Periodical: American Mathematical Monthly
Issue & Page numbers: 36:306-312
Keywords: GF
Bibliography Sequence Number: 018
Author1: Costas, John P
Date: 1979
Title: Cryptography in the Field, Part
Author1: An Overview
Periodical: BYTE
Issue & Page numbers: March 1979:56-64
References:
197
Bibliography Sequence Number: 019
Author1: Meushaw, Robert V
Date: 1979
Title: The Standard Data Encryption Algorithm, Part 1
Periodical: BYTE
Issue & Page numbers: March 1979:66-74
Keywords: DES
References:
198
050
Bibliography Sequence Number: 020
Author1: Witt, Evans
Date: 1978
Title: Computers Spawn a New Brand of Crime
Periodical: The Sunday Plain Dealer
Issue & Page numbers: 5 Feb 1978:Four-5
Keywords: RSA
Keywords: NSA
Keywords: DES
Comments: Excellent
Bibliography Sequence Number: 021
Author1: Rivest, Ronald L
Date: 1980
Title: A Description of a Single-Chip Implementation of the RSA Cipher
Periodical: Lambda
Issue & Page numbers: I, 3 (fourth quarter):14-18
Keywords: RSA
Comments: very interesting description of hardware chip for RSA algorithm
References:
367
226
244
256
004
006
001
368
056
369
005
021
Bibliography Sequence Number: 022
Author1: Shamir, Ali
Date: 1977
Title: Factoring Numbers in O(Log n) Arithmetic Steps
Publisher: MIT/LCS/TM-91
Length: 13
Keywords: PRIMES
References:
002
011
649
650
007
257
Bibliography Sequence Number: 023
Author1: National Bureau of Standards
Date: 1977
Title: Validating the Correctness of Hardware Implementation of the NBS Data
Encryption Standard, NBS
Special
Publication 500-20
Publisher: NBS
Keywords: DES
Bibliography Sequence Number: 024
Author1: Katzan, H
Date: 1977
Title: The Standard Data Encryption Algorithm
Publisher: NY: Petrocelli Books
Keywords: DES
Bibliography Sequence Number: 025
Author1: Kahn, David
Date: 1967
Title: The Codebreakers: The Story of Secret Writing
Publisher: NY: Macmillan
Length: 1164 pages
Keywords: GF
Keywords: NSA
Keywords: Historical
Comments: Bought 29Jan79.
Comments: Ninth Printing 1979
Comments: "This is the most complete history of cryptology available, containing
Comments: within its thousand pages material sufficient to reward several careful
Comments: readings. As a technical reference, it leaves much to be desired,
Comments: because it is concerned more with the influence of cryptology than with
Comments: its technical development, though much of the latter comes through.
Comments: despite its nontechnical orientation, a lot can be learned from a
Comments: careful study of the many details assembled. In addition, Kahn conveys
Comments: a valuable feel for the subject, through the experience of past
Comments: cryptologists." (006)
Comments: Especially interesting:
Comments: pp. 99-105 on cryptanalytic letter frequency analysis
Comments: pp. 189-213 on telegraphy and cryptography (chapter 6)
Comments: pp. 298-299 on radio and cryptanalysis
Comments: pp. 374-386 on William Friedman and his writings. especially his
Comments: Kappa Test, Kullbach's Phi and Chi Tests, and
Comments: Kasiski's Determination.
Comments: pp. 398-401 on One-Time Systems
Comments: pp. 404-410 on Hill's Algebraic Multigraphic Substitutions
Comments: pp. 410-415 on rotor principles
Comments: pp. 522-523 on invisible inks
Comments: pp. 672-736 on NSA
References:
029
Bibliography Sequence Number: 026
Author1: Vernam, G S
Date: 1926
Title: Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic
Communications
Periodical: Journal of the American Institute of Electrical Engineers
Issue & Page numbers: 45:109-115
Keywords: RANDOM
References:
059
Bibliography Sequence Number: 027
Author1: Shannon, Claude E
Date: 1949
Title: Communication Theory of Secrecy Systems
Periodical: Bell System Technical Journal
Issue & Page numbers: 28 (October):656-715
Keywords: Information Theory
Keywords: Classic
Comments: Classic and Excellent
Comments: "The material in this paper appeared originally in a confidential
Comments: report 'A Mathematical Theory of Cryptography' dated Sept. 1, 1945,
Comments: which has since been declassified" (page 656)
Comments: "This is a classic paper in which Shannon develops the information
Comments: theoretic foundation for classical cryptanalysis, characterizes the
Comments: systems which are unbreakable for information theoretic reasons, and
Comments: outlines the construction of product ciphers." (006)
References:
389
029
078
632
633
026
017
043
464
634
Bibliography Sequence Number: 028
Author1: Gait, J
Date: 1977
Title: A New Nonlinear Pseudorandom Number Generator
Periodical: IEEE Transactions on Software Engineering
Issue & Page numbers: Vol SE-3, No. 5 (Sep 1977):359-363
Keywords: RSA
Keywords: RANDOM
References:
027
007
050
114
016
116
117
118
119
120
Bibliography Sequence Number: 029
Author1: Gaines, Helen Fouche
Date: 1956
Title: Cryptanalysis: A Study of Ciphers and their Solutions
Publisher: NY: Dover
Keywords: Classical
Comments: U.P. Moore Library EE/510.4/G127
Comments: Formerly Published under the title: "Elementary Cryptanalysis"
Comments: "This is the most readily available work on cryptanalysis, and gives
Comments: extensive coverage of classical systems." (006)
Bibliography Sequence Number: 030
Author1: Gersho, Allen
Date: 1978
Title: In this Issue
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):1
Comments: introduction to this interesting issue
Bibliography Sequence Number: 031
Author1: Gersho, Allen
Date: 1978
Title: Communications Privacy
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):2
Bibliography Sequence Number: 032
Author1: Hellman, Martin E
Date: 1978
Title: ComSoc Spotlight
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):3-4
Bibliography Sequence Number: 033
Author1: Davis, Ruth M
Date: 1978
Title: The Data Encryption Standard in Perspective
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):5-9
Keywords: DES
Bibliography Sequence Number: 034
Author1: Morris, Robert
Date: 1978
Title: The Data Encryption Standard -- Retrospective and Prospects
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):11-14
Keywords: DES
References:
424
133
112
040
376
425
426
391
015
270
427
Bibliography Sequence Number: 035
Author1: Campbell, Carl M
Date: 1978
Title: Design and Specification of Cryptographic Capabilities
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):15-19
Keywords: DES
References:
428
Bibliography Sequence Number: 036
Author1: Adleman, Leonard M
Author2: Rivest, Ronald L
Date: 78
Title: The Use of Public Key Cryptography in Communication System Design
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):20-23
Keywords: RSA
References:
429
004
372
378
383
005
430
Bibliography Sequence Number: 037
Author1: Hellman, Martin E
Date: 1978
Title: An Overview of Public Key Cryptography
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):24-31
Keywords: RSA
References:
112
428
431
004
101
005
383
382
007
432
111
433
Bibliography Sequence Number: 038
Author1: Branstad, Dennis K
Date: 1978
Title: Security of Computer Communication
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):33-40
Keywords: DES
References:
436
428
372
437
438
050
004
112
439
440
441
442
645
444
002
445
Bibliography Sequence Number: 039
Author1: Orceyre, Michael J
Author2: Heller, Ralph M
Date: 78
Title: An Approach to Secure Voice Communication Based on the Data Encryption
Standard
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):41-50
Keywords: DES
References:
050
038
431
380
Bibliography Sequence Number: 040
Author1: U.S. Senate Select Committee on Intelligence
Date: 1978
Title: Unclassified Summary: Involvement of NSA in the Development of the Data
Encryption Standard
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):53-55
Keywords: DES
Comments: Also reprinted in Cryptologia Author2: 387-389
Bibliography Sequence Number: 041
Author1: Hill, Sandy
Date: 1978
Title: Gentle Diversions
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6 (Nov):56-58
References:
025
142
434
088
435
Bibliography Sequence Number: 042
Author1: Dickson, Leonard E
Date: 1958
Title: Linear Groups with an Exposition of the Galois Field Theory
Publisher: NY: Dover
Keywords: GF
Comments: U. or Pa. Math Library Number 512.86/D564.2/1958
Bibliography Sequence Number: 043
Author1: Hill, Lester S
Date: 1931
Title: Concerning Certain Linear Transformation Apparatus of Cryptography
Periodical: American Mathematical Monthly
Issue & Page numbers: 38:135-154
Keywords: GF
Bibliography Sequence Number: 044
Author1: IBM
Date: 19??
Title: "A Cryptographic Management Scheme for Implementing the Data Encryption
Standard"
Periodical: IBM Systems Journal
Issue & Page numbers: Vol. 17 No. 2
Keywords: DES
Comments: Entire issue is $1.75
Comments: Article reprint is $.50 as order # G321-5066
Comments: from IBM Systems Journal Reprints
Comments: Armonk, NY 10504
Bibliography Sequence Number: 045
Author1: Schechter, Bruce
Date: 1981
Title: A Prime Discovery
Periodical: Discover
Issue & Page numbers: 2, 1 (Jan):30-31
Keywords: primes
Comments: describes Len Adleman's new primality algorithm (see Ref. 367)
References:
367
Bibliography Sequence Number: 046
Author1: Denning, Peter J
Date: 1979
Title: Editor's Overview -- Special Section of Data Encryption
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 4 (Dec):283
References:
050
001
Bibliography Sequence Number: 047
Author1: Bright, Herbert S
Author2: Enison, Richard L
Date: 79
Title: Quasi-Random Number Sequences from a Long-Period TLP Generator with
Remarks on Application to
Cryptography
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 4 (Dec):357-370
Keywords: random
References:
396
145
322
585
323
505
506
507
508
509
510
511
512
028
513
514
515
516
517
518
007
519
520
521
522
114
523
524
525
050
027
417
526
527
528
529
530
026
531
532
422
423
Bibliography Sequence Number: 048
Author1: Shamir, Ali
Date: 1979
Title: How to Share a Secret
Periodical: CACM
Issue & Page numbers: 22, 11 (Nov):612-613
References:
109
370
007
005
Bibliography Sequence Number: 049
Author1: Needham, Roger M
Author2: Schroeder, Michael D
Date: 78
Title: Using Encryption for Authentication in Large Networks of Computers
Periodical: CACM
Issue & Page numbers: 21, 12 (Dec):993-998
Keywords: RSA
Keywords: Applications
Comments: AbstracTitle: "Use of encryption to achieve authenticated communication in
Comments: computer networks is discussed. Example protocols are presented for the
Comments: establishment of authenticated connections, for the management of
authenticated
Comments: mail, and for signature verification and document integrity guarantee.
Comments: Both conventional and public-key encryption algorithms are considered as
Comments: the basis for protocols.
References:
436
428
100
583
482
661
050
662
005
Bibliography Sequence Number: 050
Author1: National Bureau of Standards
Date: 1977
Title: Data Encryption Standard, FIPS Publication No. 46
Publisher: NBS
Keywords: DES
Keywords: RANDOM
Comments: NTIS for $4
Bibliography Sequence Number: 051
Author1: Denning, Dorothy E
Date: 1979
Title: Secure Personal Computing in an Insecure Network
Periodical: CACM
Issue & Page numbers: 22, 8 (Aug):476-482
Keywords: RSA
References:
004
663
481
664
485
486
056
101
383
665
050
049
492
005
666
497
057
Bibliography Sequence Number: 052
Author1: Morris, Robert
Author2: Thompson, Ken
Date: 79
Title: Password Security: A Case History
Periodical: CACM
Issue & Page numbers: 22, 11 (Nov):595-597
Comments: Abstract: "This paper describes the history of the design of the
Comments: password security scheme on a remotely accessed time-sharing system.
Comments: The present design was the result of countering observed attempts to
Comments: penetrate the system. The result is a compromise between extreme
Comments: security and ease of use."
References:
667
016
106
Bibliography Sequence Number: 053
Author1: Peleg, Shmuel
Author2: Rosenfeld, Azriel
Date: 79
Title: Breaking Substitution Ciphers Using a Relaxation Algorithm
Periodical: CACM
Issue & Page numbers: 22, 11 (Nov):598-605
References:
029
142
Bibliography Sequence Number: 054
Author1: Gries, David
Author2: Misra, Jayadev
Date: 78
Title: A Linear Sieve Algorithm for Finding Prime Numbers
Periodical: Communication of the ACM
Issue & Page numbers: 21, 12 (Dec 1978):999-1003
Keywords: primes
References:
007
258
637
009
Bibliography Sequence Number: 055
Author1: Denning, Dorothy E
Author2: Denning, Peter J
Date: 79
Title: Data Security
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 3 (Sep):227-249
Keywords: security
References:
057
004
001
188
485
056
025
049
492
608
051
439
670
380
052
050
487
666
107
106
112
188
481
383
005
494
413
664
Bibliography Sequence Number: 056
Author1: Lempel, Abraham
Date: 1979
Title: Cryptology in Transition
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 4 (Dec):285-303
Keywords: RSA
References:
109
371
372
004
112
006
372
373
001
374
375
113
025
110
007
376
377
378
379
380
381
382
101
383
009
133
050
384
385
386
111
013
387
005
162
388
389
027
390
154
142
391
014
040
392
Bibliography Sequence Number: 057
Author1: Simmons, Gustavus J
Date: 1979
Title: Symmetric and Asymmetric Encryption
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 4 (Dec):305-330
References:
393
036
394
336
395
396
145
397
090
004
112
107
117
029
028
001
374
398
399
400
037
401
003
402
017
043
188
403
404
025
110
061
056
405
406
407
408
101
383
119
133
049
409
111
108
103
005
410
411
412
413
389
027
414
154
415
416
417
418
419
026
106
420
421
422
423
Bibliography Sequence Number: 058
Author1: Popek, Gerald J
Author2: Kline, Charles S
Date: 79
Title: Encryption and Secure Computer Networks
Periodical: ACM Computing Surveys
Issue & Page numbers: 11, 4 (Dec):331-356
References:
109
473
436
428
474
475
476
100
004
112
006
477
107
478
479
117
324
480
481
482
483
484
433
486
056
487
380
488
101
489
050
655
049
490
491
492
493
494
495
002
005
496
497
498
057
499
Bibliography Sequence Number: 059
Author1: Hitt, Parker
Date: 1916
Title: Manual for the Solution of Military Ciphers
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #1 $9.76
Comments: 1977 reprint of 1916 publication: Fort Leavenworth
Bibliography Sequence Number: 060
Author1: Friedman, William F
Date: 1924
Title: Elements of Cryptanalysis
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #3 $12.80
Comments: 1976 reprint of 1924 War Department Training Pamphlet No. 3
Bibliography Sequence Number: 061
Author1: Kullback, Solomon
Date: 1938
Title: Statistical Methods in Cryptanalysis
Publisher: Laguna Hills, CA: Aegean Park Press
Keywords: Classical
Comments: Aegean #4 $14.56
Comments: 1976 reprint of 1938 Technical Paper of the Signal Intelligence Service
Comments: NSA reprint 1967
Comments: "This reprint of a 1938 paper is an extensive exposition of the use
Comments: of correlation in cryptanalysis." (006)
Bibliography Sequence Number: 062
Author1: Friedman, William F
Date: 19??
Title: Cryptography and Cryptanalysis
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #5 $12.96
References:
199
Bibliography Sequence Number: 063
Author1: Friedman, William F
Date: 1935
Title: Elememtary Military Cryptography
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #7 $9.76
Comments: 1976 Reprint of 1935 Special Text No. 165 in Army Extension Courses
Bibliography Sequence Number: 064
Author1: Friedman, William F
Date: 1944
Title: Advanced Military Cryptography
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #8 $11.84
Comments: 1976 reprint of TM 11-485, Washington: War Department
Bibliography Sequence Number: 065
Author1: Flicke, Wilhelm F
Date: 1954
Title: War Secrets in the Ether, Volume 1
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #9
Comments: trans. Ray W. Pettengill
Comments: 1977 reprint of 1954 NSA publication. In addition to Aegean, available
Comments: from National Archives as No. SRH-002 for $.20 * 312 pages (both
volumes?)
References:
200
Bibliography Sequence Number: 066
Author1: Friedman, William F
Date: 19??
Title: Solving German Codes in World War I
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #11 $13.28
Bibliography Sequence Number: 067
Author1: British War Office
Date: 19??
Title: Manual of Cryptography
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #28 $11.68
Bibliography Sequence Number: 068
Author1: Friedman, William F
Date: 19??
Title: History of the Use of Codes
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #12 $9.12
Bibliography Sequence Number: 069
Author1: Friedman, William F
Author2: Mendelsohn, Charles J
Date: 1938
Title: The Zimmerman Telegram of January 16, 1917 and its Cryptographic Background
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: 1977 reprint
Comments: Aegean #13 $6.56
Comments: 1976 reprint of 1938 Office of the Chief Signal Officer publication
Bibliography Sequence Number: 070
Author1: Sacco, General Luigi
Date: 1936
Title: Manual of Cryptography
Publisher: Laguna Hills, CA: Aegean Park Press
Keywords: Classical
Comments: Aegean #14 $15.36
Comments: Aegean is 1977 reprint of translated original Italian of 1936
Comments: "Manuale di crittografia, 2e edition riveduta e aumenta, Rome, Italy
Comments: 1936. (Translations, French-Manuel de Cryptographie, from 3rd Italian
Comments: edition by J. Bres, reviewed by the author with a preface by R. Leger,
Comments: Paris, France: Payot, 1951; English-Manual of Cryptography, Laguna
Comments: Hills, CA: Aegean Park Press, 1977.)
Comments: This work is noted for being particularly readable. It is similar
Comments: in scope to Eyraud [547] or Friedman [205], but slightly earlier in date."
(006)
Bibliography Sequence Number: 071
Author1: unknown
Date: 19??
Title: Origin and Development of the Army Security Agency 1917-1947
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #16 $7.04
Bibliography Sequence Number: 072
Author1: Barker, Wayne G
Date: 1977
Title: Cryptanalysis of the Hagelin Cryptograph
Publisher: Laguna Hills, CA: Aegean Park Press
Keywords: Classical
Comments: Aegean #17 $16.48
Bibliography Sequence Number: 073
Author1: Glyden
Date: 19??
Title: The Contribution of the Cryptographic Bureaus in the World War
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #18 $11.20
Bibliography Sequence Number: 074
Author1: unknown
Date: 19??
Title: History of Codes and Ciphers in the United States Prior to World War I
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #20 $13.44
Bibliography Sequence Number: 075
Author1: unknown
Date: 19??
Title: History of Codes and Ciphers in the United States During World War I
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #21 $15.68
Bibliography Sequence Number: 076
Author1: unknown
Date: 19??
Title: History of Codes and Ciphers in the United States During the Period Between the
World Wars, Part I
1919-1929
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #22 $15.68
Bibliography Sequence Number: 077
Author1: Barker, Wayne G
Date: 1975
Title: Cryptanalysis of the Simple Substitution Cipher with Word Divisions - Using
Non-Pattern Word Lists
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #2 $9.76
Bibliography Sequence Number: 078
Author1: Givierge, General Marcel
Date: 19??
Title: Course in Cryptography
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #19 $15.36
Bibliography Sequence Number: 079
Author1: Friedman, William F
Date: 19??
Title: The Riverbank Publications, Volume 1
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #23 $13.44
References:
202
203
Bibliography Sequence Number: 080
Author1: Barker, Wayne G
Date: 19??
Title: Cryptanalysis of an Enciphered Code Problem -- Where an "Additive" Method of
Encipherment has been
Used
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #26 $18.24
Bibliography Sequence Number: 081
Author1: D'Imperio, M. E
Date: 19??
Title: The Voynich Manuscript -- An Elegant Enigma
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #27 $13.44
Bibliography Sequence Number: 082
Author1: McCalla, Thomas R
Date: 1968
Title: Introduction to Numerical Methods and FORTRAN Programming
Publisher: NY: John Wiley
Keywords: GF
Comments: Moore School Library Number QA/297/M25
Comments: especially chapter 5 - Matrix Methods and Systems of Linear Algebraic
Equations
Bibliography Sequence Number: 083
Author1: Winkel, Brian J
Date: 1977
Title: Why Cryptologia
Periodical: Cryptologia
Issue & Page numbers: 1-3
References:
025
675
Bibliography Sequence Number: 084
Author1: Mellen, Greg E
Author2: Greenwood, Lloyd
Date: 77
Title: The Cryptology of Multiplex Systems, Part I
Periodical: Cryptologia
Issue & Page numbers: 4-16
References:
025
079
676
747
029
285
064
061
Bibliography Sequence Number: 085
Author1: Harris, Barbara
Date: 1977
Title: A Different Kind of Column
Periodical: Cryptologia
Issue & Page numbers: 17-19
Bibliography Sequence Number: 086
Author1: Reeds, James A
Date: 1977
Title: "Cracking" a Random Number Generator
Periodical: Cryptologia
Issue & Page numbers: 20-26
References:
007
Bibliography Sequence Number: 087
Author1: Kahn, David
Date: 1977
Title: The Biggest Bibliography
Periodical: Cryptologia
Issue & Page numbers: 27-42
References:
088
Bibliography Sequence Number: 088
Author1: Shulman, David
Date: 1976
Title: An Annotated Bibliography of Cryptography
Publisher: NY: Garland Publishing Co
Length: xvi+372
Keywords: Biography
Comments: Garland Reference Library of the Humanities, Volume 37 for $35.00
Comments: "This bibliography has almost no overlap with the present one. It
Comments: offers the most extensive coverage of the classical literature available." (006)
Bibliography Sequence Number: 089
Author1: Shulman, David
Date: 1977
Title: A Reply to Kahn's Review
Periodical: Cryptologia
Issue & Page numbers: 43-45
Comments: not xrefed
Bibliography Sequence Number: 090
Author1: Deavours, Cipher A
Date: 1977
Title: Unicity Points in Cryptanalysis
Periodical: Cryptologia
Issue & Page numbers: 46-68
References:
027
113
025
419
677
Bibliography Sequence Number: 091
Author1: Kruh, Louis
Date: 1977
Title: Cipher EquipmenTitle: Cipher Disks
Periodical: Cryptologia
Issue & Page numbers: 69-75
References:
679
066
062
025
121
680
681
682
683
008
684
685
686
687
688
Bibliography Sequence Number: 092
Author1: Levine, Jack
Author2: Brawley, Joel V
Date: 77
Title: Some Cryptographic Applications of Permutation Polynomials
Periodical: Cryptologia
Issue & Page numbers: 76-92
Keywords: GF
Keywords: RSA
References:
337
334
613
614
615
616
617
618
619
620
621
622
042
623
624
625
626
627
594
628
629
630
Bibliography Sequence Number: 093
Author1: Winkel, Brian
Date: 1977
Title: Poe Challenge Cipher Finally Broken
Periodical: Cryptologia
Issue & Page numbers: 93-96
References:
062
025
823
142
824
Bibliography Sequence Number: 094
Author1: Hiatt, Blanchard
Date: 1977
Title: Age of Decipherment
Periodical: Cryptologia
Issue & Page numbers: 101-105
Bibliography Sequence Number: 095
Author1: Hiatt, Blanchard
Date: 1977
Title: "Count Forward Three Score and Ten..."
Periodical: Cryptologia
Issue & Page numbers: 106-115
Bibliography Sequence Number: 096
Author1: Schatz, Bruce R
Date: 1977
Title: Automated Analysis of Cryptograms
Periodical: Cryptologia
Issue & Page numbers: 116-142
References:
077
825
504
552
117
324
063
689
029
690
580
826
827
241
828
059
025
027
829
142
443
419
556
Bibliography Sequence Number: 097
Author1: Kruh, Louis
Date: 1977
Title: Cipher EquipmenTitle: Converter M-325(T)
Periodical: Cryptologia
Issue & Page numbers: 143-149
References:
691
692
693
751
Bibliography Sequence Number: 098
Author1: Mellen, Greg E
Author2: Greenwood, Lloyd
Date: 77
Title: The Cryptology of Multiplex Systems, Part II
Periodical: Cryptologia
Issue & Page numbers: 150-165
References:
142
025
Bibliography Sequence Number: 099
Author1: Kahn, David
Date: 1977
Title: "Get out your Secret Decoders, Boys and Girls ...."
Periodical: Cryptologia
Issue & Page numbers: 166
References:
121
Bibliography Sequence Number: 100
Author1: Diffie, Whitfield
Author2: Hellman, Martin E
Date: 1976
Title: Multiuser Cryptographic Techniques
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 45:109-112
Keywords: RSA
Keywords: PKC
Comments: U.P. Moore Library: 510.78/J667
Comments: "This paper describes two approaches to supplying secure first contact
Comments: between users of a computer network, without sending keys along outside
Comments: channels, and some related problems." (006)
References:
538
004
107
117
108
Bibliography Sequence Number: 101
Author1: Merkle, Ralph C
Date: 1978
Title: Secure Communication over insecure channels
Periodical: CACM
Issue & Page numbers: 21 (Apr): 294-299
Keywords: PKC
Comments: "This paper introduced the concept of public key distribution independently
Comments: of Diffie and Hellman" (006)
References:
004
117
025
383
005
027
575
Bibliography Sequence Number: 102
Author1: Sperry Rand Corporation
Date: 1969
Title: Direct Access Storage Device Concepts
Publisher: Sperry Rand Corporation
Length: pages A-2 and A-3
Keywords: primes
Comments: These two pages are a list of the first 10,000 prime numbers (1 to 104,723)
Comments: Document UE-604
Bibliography Sequence Number: 103
Author1: Rabin, Michael O
Date: 1979
Title: Digitalized signatures and public-key functions as intractable as factorization
Periodical: MIT/LCS/TR-212
Keywords: RSA
Comments: "A variation of the RSA scheme with E=2 is shown to have cryptanalytic
Comments: difficulty equivalent to factoring." (006)
References:
658
004
013
659
660
005
014
Bibliography Sequence Number: 104
Author1: Postikov, M M
Date: 1961
Title: Fundamentals of Galois' Theory
Publisher: Delhi, India: Hindustan Publishing Corporation
Keywords: GF
Comments: Moore School Library Number 512.86/P845.EH
Bibliography Sequence Number: 105
Author1: Knuth, Donald E
Date: 1973
Title: Sorting and Searching: The Art of Computer Programming, Volume 3
Publisher: Reading MA: Addison Wesley
Keywords: background
Bibliography Sequence Number: 106
Author1: Wilkes, M. V
Date: 1975
Title: Time-Sharing Computing Systems, Third Edition
Publisher: NY: Elsevier
Comments: orig. publ. 1968
References:
004
Bibliography Sequence Number: 107
Author1: Evans Jr., A
Author2: Kantrowitz, W
Author3: Weiss, E
Date: 1974
Title: A User Authentication System Not Requiring Secrecy in the Computer
Periodical: CACM
Issue & Page numbers: 17 (Aug): 437-442
Keywords: system design and implementation
Comments: "This paper describes a oneway function obtained by using a transformamtion
Comments: similar to the IBM Lucifer system and using the argument as both input and
key." (006)
Bibliography Sequence Number: 108
Author1: Purdy, George B
Date: 1974
Title: A high-security log-in procedure
Periodical: CACM
Issue & Page numbers: (Aug): 442-445
Keywords: system design and implementation
Comments: "This paper studies the use of a polynomial of very high degree over
Comments: a finite field as a one-way function. This function has subsequently
Comments: been used to protect the passwords on the BBN TENEX system." (006)
Bibliography Sequence Number: 109
Author1: Aho, A V
Author2: Hopcroft, J E
Author3: Ullman, J D
Date: 1974
Title: The Design and Analysis of Computer Algorithms
Publisher: Reading, MA: Addison-Wesley
Keywords: background
Bibliography Sequence Number: 110
Author1: Karp, R M
Date: 1972
Title: Reducibility among Combinatorial Problems
Periodical: in Complexity of Computer Computations; R.E. Miller et al Ed.;NY: Plenum
Issue & Page numbers: 85-104
Keywords: RSA
Bibliography Sequence Number: 111
Author1: Pohlig, Stephen C
Author2: Hellman, Martin E
Date: 78
Title: An improved algorithm for computing logarithms in GF(p) and its cryptographic
significance
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-24, 1 (Jan):106-110
Keywords: Cryptanalysis
Keywords: GF
Comments: Abstract - A cryptographic system is described which is secure if and
Comments: only if computing logarithms ober GF(p) is infeasible. Previously published
Comments: algorithms for computing this function require O(Publisher: *.5) complexity
in
Comments: both time and space. An improved algorithm is derived which requires
Comments: O(log**2 p) complexity if p-1 has only small prime factors. Such
Comments: values of p must be avoided in the cryptosystem. Constructive uses for
Comments: the new algorithm are also described.
Comments: "A discussion of a cryptographic system with a high degree of
Comments: mathematical structure and simplicity." (006)
Bibliography Sequence Number: 112
Author1: Diffie, Whitfield
Author2: Hellman, Martin E
Date: 77
Title: Exhaustive Cryptanalysis of the NBS data encryption standard
Periodical: Computer
Issue & Page numbers: 10 (June): 74-84
Keywords: DES
Comments: "This paper gives a detailed cost estimate for the construction of
Comments: a highly parallel special purpose computer to break the DES in one day."
(006)
References:
016
015
562
004
643
644
645
375
133
399
027
113
572
Bibliography Sequence Number: 113
Author1: Hellman, Martin E
Date: 1977
Title: An extension of the Shannon theory approach to Cryptography
Periodical: IEEE Transactions on Information Theory, Sep. 1975
Issue & Page numbers: IT-23, 3 (May):289-294
Comments: Abstract - Shannons information-theoretic approach to cryptography is
Comments: reviewed and extended. It is shown that Shannons random cipher model
Comments: is conservative in that a randomly chosen cipher is essentially the worst
Comments: possible. This is in contrast with error-correcting codes where a randomly
Comments: chosen code is essentially the best possible. The concepts of mathching
Comments: a cipher to a language and of the trade-off between local and global
Comments: uncertainty are also developed.
Bibliography Sequence Number: 114
Author1: MacLaren, M. D
Author2: Marsaglia, G
Date: 65
Title: Uniform random number generators
Periodical: Journal of the ACM
Issue & Page numbers: 12: 83-89
Keywords: background
Keywords: RANDOM
Bibliography Sequence Number: 115
Author1: Yao, Andrew
Date: 1977
Title: Probabilistic ComputationBibliography Sequence Number: Toward a Unified
Measure of Complexity
Periodical: 18th Annual Symposium on Foundations of Computer Science
Issue & Page numbers: 222-227
Keywords: Complexity
Bibliography Sequence Number: 116
Author1: Blinchikoff, H
Author2: Zverov, Z
Date: 76
Title: Filtering in the Time and Frequency Domains
Publisher: NY: Wiley
Keywords: Misc.?
Bibliography Sequence Number: 117
Author1: Feistel, Horst
Date: 1973
Title: Cryptography and Computer Privacy
Periodical: Scientific American
Issue & Page numbers: 228:15-23
Keywords: Popular
Comments: "This article gives the most readable account of the operation of
Comments: the IBM Lucifer cipher." (006)
Bibliography Sequence Number: 118
Author1: Meyer, Carl H
Date: 1974
Title: Enciphering Data for Secure Transmission
Periodical: Computer Design
Issue & Page numbers: ApriIssue & Page numbers: 129-134
Bibliography Sequence Number: 119
Author1: Meyer, Carl H
Author2: Tuchman, Walter L
Date: 72
Title: Pseudo-random codes can be cracked
Periodical: Electronic Design
Issue & Page numbers: 20, 23 (9 Nov):74-76
Bibliography Sequence Number: 120
Author1: Lehmer, D H
Date: 1951
Title: article name?
Periodical: Proc. 2nd Symp. Large Scale Digital Computing Mach
Issue & Page numbers: 141-146
Comments: Harvard Univ.: Cambridge, MA
Bibliography Sequence Number: 121
Author1: Lesser, Robert
Date: 1975
Title: A Celebration of Comic Art and Memorabilia
Publisher: NY: Hawthorn Books
Length: 292 pages
Bibliography Sequence Number: 122
AuthorAuthor1: Deavours, Cipher A
Date: 1977
Title: Analysis of the Hebern Cryptograph using Isomorphs
Periodical: Cryptologia
Issue & Page numbers: 1: 167-185
References:
695
696
025
Bibliography Sequence Number: 123
Author1: Reeds, James A
Date: 1977
Title: Rotor Algebra
Periodical: Cryptologia
Issue & Page numbers: 1: 186-194
References:
122
159
174
070
Bibliography Sequence Number: 124
Author1: Penney, Walter
Date: 1977
Title: Grille Reconstruction
Periodical: Cryptologia
Issue & Page numbers: 1: 195-200
References:
151
Bibliography Sequence Number: 125
Author1: Kahn, David
Date: 1977
Title: The Significance of COdebreaking and Intelligence in Allied Strategy and Tactics
Periodical: Cryptologia
Issue & Page numbers: 1: 209-222
References:
698
025
Bibliography Sequence Number: 126
Author1: Deavours, Cipher A
Date: 1977
Title: The Kappa Test
Periodical: Cryptologia
Issue & Page numbers: 1: 223-231
References:
025
061
Bibliography Sequence Number: 127
Author1: Winkel, Brian J
Date: 1977
Title: Word Ways, A Journal Worth Going Your Way
Periodical: Cryptologia
Issue & Page numbers: 1: 232-233
Bibliography Sequence Number: 128
Author1: Reeds, James A
Date: 1977
Title: Entropy Calculations and Particular Methods of Cryptanalysis
Periodical: Cryptologia
Issue & Page numbers: 1: 235-254
References:
205
113
025
699
027
700
Bibliography Sequence Number: 129
Author1: Kruh, Louis
Date: 1977
Title: Cipher EquipmenTitle: Hagelin Pocket Cryptographer, Type CD-57
Periodical: Cryptologia
Issue & Page numbers: 1: 255-260
References:
701
Bibliography Sequence Number: 130
Author1: Leighton, Albert C
Date: 1977
Title: "The Earliest Use of a Dot Cipher"
Periodical: Cryptologia
Issue & Page numbers: 1: 261-274
References:
025
Bibliography Sequence Number: 131
Author1: Royal Canadian Mint
Date: 1977
Title: DPEPE DPJO: A Canadian Coin Piece With a Message
Periodical: Cryptologia
Issue & Page numbers: 1: 275-277
Bibliography Sequence Number: 132
Author1: Deavours, Cipher A
Date: 1977
Title: Kullback's "Statistical Methods of Cryptanalysis" - Book Review
Periodical: Cryptologia
Issue & Page numbers: 1: 278-280
References:
061
Bibliography Sequence Number: 133
Author1: Morris, Robert
Author2: Sloane, Neil J. A
Author3: Wyner, Aaron D
Date: 1977
Title: Assessment of the National Bureau of Standards Proposed Federal Data Encryption
Standard
Periodical: Cryptologia
Issue & Page numbers: 1: 281-291
Keywords: DES
References:
702
427
428
396
703
551
270
112
107
583
117
704
324
705
580
553
025
557
558
489
119
016
108
027
391
708
543
419
106
562
Bibliography Sequence Number: 134
Author1: National Bureau of Standards
Date: 1977
Title: Proposed Federal Information Processing Data Encryption Standard
Periodical: Cryptologia
Issue & Page numbers: 1: 292-306
Keywords: DES
References:
016
Bibliography Sequence Number: 135
Author1: Winkel, Brian J
Date: 1977
Title: Epilogue
Periodical: Cryptologia
Issue & Page numbers: 1: 309
References:
093
Bibliography Sequence Number: 136
Author1: Deavours, Cipher A
Date: 1977
Title: The Ithaca Connection: Computer Cryptography in the Making
Periodical: Cryptologia
Issue & Page numbers: 1: 312-317
References:
001
004
709
110
Bibliography Sequence Number: 137
Author1: Winkel, Brian J
Date: 1977
Title: Poe Challenge Cipher Solutions
Periodical: Cryptologia
Issue & Page numbers: 1: 318-325
Bibliography Sequence Number: 138
Author1: Eckler, A. Ross
Date: 1977
Title: A Rapid Yes-No Computer-Aided Communicator
Periodical: Cryptologia
Issue & Page numbers: 1: 326-333
References:
710
711
464
Bibliography Sequence Number: 139
Author1: Kruh, Louis
Date: 1977
Title: Cipher Equipment: MA4210 Alphanumeric Pocket Cipher
Periodical: Cryptologia
Issue & Page numbers: 1: 334-336
Bibliography Sequence Number: 140
Author1: Kahn, David
Date: 1977
Title: Ecclesiastical Cryptography: A Review
Periodical: Cryptologia
Issue & Page numbers: 1: 337
Bibliography Sequence Number: 141
Author1: Brawley, Joel V
Author2: Levine, Jack
Date: 77
Title: Equivalences of Vigenere Systems
Periodical: Cryptologia
Issue & Page numbers: 1: 338-361
References:
712
713
714
029
025
142
Bibliography Sequence Number: 142
Author1: Sinkov, Abraham
Date: 1968
Title: Elementary Cryptanalysis, A Mathematical Approach
Publisher: NY: Random House
Keywords: Classical
Comments: This volume is now part of the New Mathematical Library, published by
Comments: the Mathematical Association of America (1966): Washington DC
Comments: "This is the best elementary cryptanalysis book available." (006)
Bibliography Sequence Number: 143
Author1: Marsh, D. C. B
Date: 1977
Title: Cryptography at the Colorado School of Mines
Periodical: Cryptologia
Issue & Page numbers: 1: 362-363
References:
029
025
675
142
Bibliography Sequence Number: 144
Author1: Straight, David W
Date: 1977
Title: Cryptanalysis and Data Security Course at the University of Tennessee
Periodical: Cryptologia
Issue & Page numbers: 1: 363-365
References:
029
715
025
142
Bibliography Sequence Number: 145
Author1: Bright, Herbert S
Date: 1977
Title: Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext,
Chosen-Plaintext
Periodical: Cryptologia
Issue & Page numbers: 1: 366-370
Keywords: RANDOM
Comments: text of COMPLAN TN-913-14, 25SEP77 version
References:
396
716
582
323
419
274
Bibliography Sequence Number: 146
Author1: Kahn, David
Date: 1977
Title: Reports from the Reich
Periodical: Cryptologia
Issue & Page numbers: 1: 371
Bibliography Sequence Number: 147
Author1: Kruh, Louis
Date: 1977
Title: The Churchyard Ciphers
Periodical: Cryptologia
Issue & Page numbers: 1: 372-375
References:
079
025
Bibliography Sequence Number: 148
Author1: Highland, Harold J
Date: 1977
Title: CENSOREDate: A Simulation Excercise
Periodical: Cryptologia
Issue & Page numbers: 1: 376-377
Bibliography Sequence Number: 149
Author1: Kahn, David
Date: 1977
Title: German Military Eavesdroppers
Periodical: Cryptologia
Issue & Page numbers: 1: 378-380
Bibliography Sequence Number: 150
Author1: Deavours, Cipher A
Author2: Reeds, James A
Date: 77
Title: The Enigma: Part I, Historical Perspectives
Periodical: Cryptologia
Issue & Page numbers: 1: 381-391
References:
717
718
719
720
721
722
723
724
122
097
725
070
726
698
025
Bibliography Sequence Number: 151
Author1: Winkel, Brian J
Date: 1977
Title: Solution
Periodical: Cryptologia
Issue & Page numbers: 1: 391
References:
124
Bibliography Sequence Number: 152
Author1: Fagone, Peter P
Date: 1977
Title: A Message in Cipher Written by General Cornwallis during the Revolutionary War
Periodical: Cryptologia
Issue & Page numbers: 1: 392-395
References:
025
Bibliography Sequence Number: 153
Author1: Winkel, Brian J
Date: 1977
Title: There and There: A Department
Periodical: Cryptologia
Issue & Page numbers: 1: 396-405
Keywords: DES
Keywords: RSA
Keywords: NSA
References:
727
728
729
730
563
564
Bibliography Sequence Number: 154
Author1: Simmons, Gustavus J
Author2: Norris, Michael J
Date: 77
Title: Preliminary Comments on the M.I.T. Public-Key Cryptosystem
Periodical: Cryptologia
Issue & Page numbers: 1: 406-414
Keywords: RSA
References:
004
002
001
635
636
Bibliography Sequence Number: 155
Author1: Barker, Wayne G
Date: 1978
Title: Solving a Hagelin, Type CD-57, Cipher
Periodical: Cryptologia
Issue & Page numbers: 2: 1-8
References:
072
129
Bibliography Sequence Number: 156
Author1: Wilson, David
Date: 1978
Title: Cryptanalysis Course Down Under
Periodical: Cryptologia
Issue & Page numbers: 2: 9-11
Bibliography Sequence Number: 157
Author1: Kahn, David
Date: 1978
Title: The Forschungsamt: Nazi Germany's Most Secret Communications Intelligence
Agency
Periodical: Cryptologia
Issue & Page numbers: 2: 12-19
References:
158
065
Bibliography Sequence Number: 158
Author1: Kahn, David
Date: 1978
Title: Hitler's SpieBibliography Sequence Number: German Military Intelligence in
World War II
Publisher: NY: MacMillan
Length: 671 pages
Comments: $16.95
Bibliography Sequence Number: 159
Author1: Rohrbach, Hans
Date: 1978
Title: Mathematical and Mechanical Methods in Cryptography - Part I
Periodical: Cryptologia
Issue & Page numbers: 2: 20-37
Comments: "Mathematische und maschinelle Methoden biem chiffrieren und
dechiffrieren,
Comments: Fiat Review of German Science, 1939-1946 Applied Mathematics, Part I,
Comments: Article IX, Office of Military Government for Germany, Field Information
Comments: Agencies Technical, Wiesbaden, Germany, pp. 233-257, 1948. (Translated
Comments: by B. Hardie in two parts...
Comments: This paper describes some of the systems attacked by the German
Comments: cryptanalysts and discusses their sucesses and failures." (006)
Bibliography Sequence Number: 160
Author1: Kruh, Louis
Date: 1978
Title: The Inventions of William F. Friedman
Periodical: Cryptologia
Issue & Page numbers: 2: 38-61
Keywords: Classic
Comments: "This paper describes some of the systems attacked by the German
Comments: cryptanalysts and discusses their successes and failures." (006)
References:
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
161
097
150
753
754
755
756
Bibliography Sequence Number: 161
Author1: Clark, Ronald
Date: 1977
Title: The Man Who Broke Purple
Publisher: NY: Little, Brown & Co
Bibliography Sequence Number: 162
Author1: Rivest, Ronald L
Date: 1978
Title: Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key
Cryptosystem
Periodical: Cryptologia
Issue & Page numbers: 2: 62-65
References:
002
005
154
Bibliography Sequence Number: 163
Author1: Deavours, Cipher A
Date: 1978
Title: A Book Review: "Cryptanalysis of the Hagelin Cryptograph" by Wayne G. Barker
Periodical: Cryptologia
Issue & Page numbers: 2: 66-67
References:
072
Bibliography Sequence Number: 164
Author1: Knight, H. Gary
Date: 1978
Title: Cryptanalyst's Corner
Periodical: Cryptologia
Issue & Page numbers: 2: 68-74
References:
060
029
043
059
061
165
166
167
168
169
086
070
142
Bibliography Sequence Number: 165
Author1: Levine, Jack
Date: 1958
Title: Variable Matrix Substitution in Algebraic Cryptography
Periodical: American Mathematical Monthly
Issue & Page numbers: 65:170-179
Keywords: GF
Bibliography Sequence Number: 166
Author1: Levine, Jack
Date: 1961
Title: Some Applications of High-Speed Computers to the Case of N=2 of ALgebraic
Cryptography
Periodical: Mathematics of Computation
Issue & Page numbers: 15:254-260
Keywords: GF
Bibliography Sequence Number: 167
Author1: Levine, Jack
Date: 1961
Title: Some Elementary Crytanalysis of Algebraic Cryptography
Periodical: American Mathematical Monthly
Issue & Page numbers: 68:411-418
Keywords: GF
Bibliography Sequence Number: 168
Author1: Mellen, Greg E
Date: 1973
Title: Cryptology, Computers, and Common Sense
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 42: 569-579
Keywords: Survey
Comments: "A rather pessimistic survey of the application of cryptography." (006)
Bibliography Sequence Number: 169
Author1: Peck, Lyman C
Date: 1961
Title: Secret Codes, Remainder Arithmetic and Matrices
Periodical: Reston, VA: National Council of Teachers of Math
Bibliography Sequence Number: 170
Author1: Lynch, Frederick D
Date: 19??
Title: Pattern-Word List (Volume 1)
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: $14.60
Bibliography Sequence Number: 171
Author1: Weber, Ralph E
Date: 1978
Title: James Lovell and Secret Ciphers During the American Revolution
Periodical: Cryptologia
Issue & Page numbers: 2: 75-88
References:
172
Bibliography Sequence Number: 172
Author1: Weber, Ralph E
Date: 1978
Title: United States Diplomatic Codes and Ciphers, 1775-1938
Publisher: Chicago: New University Press
Length: approx 600
Comments: $49.95
Bibliography Sequence Number: 173
Author1: Winkel, Brian J
Date: 1978
Title: There and There
Periodical: Cryptologia
Issue & Page numbers: 2: 89-94
References:
757
758
759
760
Bibliography Sequence Number: 174
Author1: Rohrbach, Hans
Date: 1978
Title: Mathematical and Mechanical Methods in Cryptology - Part II
Periodical: Cryptologia
Issue & Page numbers: 2: 101-121
References:
159
Bibliography Sequence Number: 175
Author1: Kahn, David
Date: 1978
Title: Friedman's Life: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 2: 122-123
References:
161
Bibliography Sequence Number: 176
Author1: Knight, H. Gary
Date: 1978
Title: Cryptanalyst's Corner
Periodical: Cryptologia
Issue & Page numbers: 2: 124-128
References:
122
126
025
123
419
Bibliography Sequence Number: 177
Author1: Kruh, Louis
Date: 1978
Title: Who Wrote "The American Black Chamber"?
Periodical: Cryptologia
Issue & Page numbers: 2: 130-133
References:
025
611
761
178
179
180
181
182
Bibliography Sequence Number: 178
Author1: Yardley, Herbert O
Date: 1931
Title: Secret Inks
Periodical: Saturday Evening Post
Issue & Page numbers: 4 April 1931: pages ??
Bibliography Sequence Number: 179
Author1: Yardley, Herbert O
Date: 1931
Title: Codes
Periodical: Saturday Evening Post
Issue & Page numbers: 18 April 1931: pages ??
Bibliography Sequence Number: 180
Author1: Yardley, Herbert O
Date: 1931
Title: Ciphers
Periodical: Saturday Evening Post
Issue & Page numbers: 9 May 1931: pages ??
Bibliography Sequence Number: 181
Author1: Yardley, Herbert O
Date: 1931
Title: Cryptograms and Their Solutions
Periodical: Saturday Evening Post
Issue & Page numbers: 21 Nov 1931: pages ??
Bibliography Sequence Number: 182
Author1: Yardley, Herbert O
Date: 1931
Title: The American Black Chamber
Publisher: Indianapolis: Bobbs-Merrill Co
Keywords: Historical
Comments: "This volume gives an excellent feeling for the flavor of cryptanalysis." (006)
Bibliography Sequence Number: 183
Author1: Deavours, Cipher A
Date: 1978
Title: Cryptology at Kean College
Periodical: Cryptologia
Issue & Page numbers: 2: 134-138
Bibliography Sequence Number: 184
Author1: Kahn, David
Date: 1978
Title: Nuggets from the ArchiveBibliography Sequence Number: Yardley Tries Again
Periodical: Cryptologia
Issue & Page numbers: 2: 139-143
References:
182
Bibliography Sequence Number: 185
Author1: Barker, Wayne G
Date: 1978
Title: The Unsolved d'Agapeyeff cipher
Periodical: Cryptologia
Issue & Page numbers: 2: 144-147
References:
093
137
186
Bibliography Sequence Number: 186
Author1: D'Agapeyeff, Alexander
Date: 1939
Title: Codes and Ciphers
Publisher: London: Oxford University Press
Bibliography Sequence Number: 187
Author1: Straight, David
Date: 1978
Title: An Outline of Computer Security: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 2: 148-150
References:
188
270
029
025
142
Bibliography Sequence Number: 188
Author1: Hoffman, Lance J
Date: 1977
Title: Modern Methods for Computer Security and Privacy
Publisher: Englewood Cliffs, NJ: Prentice-Hall
Comments: $17.95
Bibliography Sequence Number: 189
Author1: Kahn, David
Date: 1978
Title: Pictures Galore: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 2: 151
References:
762
025
698
Bibliography Sequence Number: 190
Author1: Rubin, Frank
Date: 1978
Title: Computer Methods for Decrypting Multiplex Ciphers
Periodical: Cryptologia
Issue & Page numbers: 2: 152-160
References:
084
Bibliography Sequence Number: 191
Author1: Winkel, Brian J
Date: 1978
Title: Casanova and the Beaufort Cipher
Periodical: Cryptologia
Issue & Page numbers: 2: 161-163
Bibliography Sequence Number: 192
Author1: Kruh, Louis
Date: 1978
Title: Cryptology as a Career
Periodical: Cryptologia
Issue & Page numbers: 2: 164-166
Bibliography Sequence Number: 193
Author1: Anonymous
Date: 1978
Title: Encryption Challenge
Periodical: Cryptologia
Issue & Page numbers: 2: 168-171
References:
086
Bibliography Sequence Number: 194
Author1: Kruh, Louis
Date: 1978
Title: Cipher EquipmenTitle: DH-26 Handheld Encryption Machine
Periodical: Cryptologia
Issue & Page numbers: 2: 172-177
References:
763
001
764
Bibliography Sequence Number: 195
Author1: Winkel, Brian J
Date: 1978
Title: A Tribute to Alf Monge
Periodical: Cryptologia
Issue & Page numbers: 2: 178-185
Bibliography Sequence Number: 196
Author1: Winkel, Brian J
Date: 1978
Title: There and There
Periodical: Cryptologia
Issue & Page numbers: 2: 186-194
Keywords: RSA
References:
698
758
759
765
062
154
162
378
Bibliography Sequence Number: 197
Author1: Costas, John P
Date: 1979
Title: Cryptography in the Field, Part 2: Using the Pocket Calculator
Periodical: BYTE
Issue & Page numbers: April 1979:144-165
References:
018
025
026
027
004
007
005
028
001
029
Bibliography Sequence Number: 198
Author1: Meushaw, Robert V
Date: 1979
Title: The Standard Data Encryption Algorithm, Part 2
Periodical: BYTE
Issue & Page numbers: April 1979:110-126
Keywords: DES
References:
019
050
023
024
Bibliography Sequence Number: 199
Author1: Friedman, William F., editor
Date: 19??
Title: Cryptography and Cryptanalysis, Volume 2
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #6 $12.96
References:
062
Bibliography Sequence Number: 200
Author1: Flicke, Wilhelm F
Date: 1977
Title: War Secrets in the Ether, Volume 2
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #10 $14.72
References:
065
Bibliography Sequence Number: 201
Author1: Lynch, Frederick D
Date: 19??
Title: Pattern-Word List
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #15 $11.68
Bibliography Sequence Number: 202
Author1: Friedman, William F
Date: 19??
Title: The Riverbank Publications, Volume 2
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #24 $13.44
References:
079
203
Bibliography Sequence Number: 203
Author1: Friedman, William F
Date: 19??
Title: The Riverbank Publications, Volume 3
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #25 $13.44
References:
079
202
Bibliography Sequence Number: 204
Author1: Deavours, Cipher A
Date: 19??
Title: Principles of Modern Cryptanalysis, Part I
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #20 $22.40
Bibliography Sequence Number: 205
Author1: Friedman, William F
Date: 1944
Title: Military Cryptanalysis, Volume I - Monoalphabetic Substitution Systems
Publisher: Laguna Hills, CA: Aegean Park Press
Keywords: Classic
Keywords: BACONIAN (pages 60 and 99)
Comments: Aegean #30 $15.84
Comments: reprint; Originally published Washington, DComments: U.S. Gov. Printing
Office
Comments: "This is the most detailed course in cryptography which has slipped
Comments: into public hands, and one of the most readable. Although out of
Comments: print, it is available in several major libraries." (006)
References:
612
Bibliography Sequence Number: 206
Author1: National Defense Research Committee
Date: 19??
Title: Speech and Facsimile Scrambling and Decoding, A Basic Text on Speech
Scrambling
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #31 $18.24
Bibliography Sequence Number: 207
Author1: Winkel, Brian J., editor
Date: 1977
Title: Cryptologia, Volume 1 (1977)
Publisher: Laguna Hills, CA: Aegean Park Press
Length: 421
Comments: Aegean #N1 $25.60
Bibliography Sequence Number: 208
Author1: Winkel, Brian J., editor
Date: 1978
Title: Cryptologia, Volume 2 (1978)
Publisher: Laguna Hills, CA: Aegean Park Press
Length: 399
Comments: Aegean #N2 $25.60
Bibliography Sequence Number: 209
Author1: Barker, Wayne G
Date: 19??
Title: Cryptograms, 110 Cryptograms without Solutions
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #N3 $3.96
Bibliography Sequence Number: 210
Author1: Randolph, Borris
Date: 19??
Title: Cryptofun
Publisher: Laguna Hills, CA: Aegean Park Press
Comments: Aegean #N4 #3.96
Bibliography Sequence Number: 211
Author1: Chives, J. Rives
Date: 1978
Title: My Recollections of G.2 A.6
Periodical: Cryptologia
Issue & Page numbers: 2: 201-214
References:
059
Bibliography Sequence Number: 212
Author1: Rubin, Frank
Date: 1978
Title: Computer Methods for Decrypting Random Stream Ciphers
Periodical: Cryptologia
Issue & Page numbers: 2: 215-231
Bibliography Sequence Number: 213
Author1: Arnold, Philip M
Date: 1978
Title: A Forgotten Book on CIphers
Periodical: Cryptologia
Issue & Page numbers: 2: 232-235
Keywords: ancient
Bibliography Sequence Number: 214
Author1: Foster, Caxton C
Date: 1978
Title: Cryptanalysis and Computers
Periodical: Cryptologia
Issue & Page numbers: 2: 236-237
References:
142
029
Bibliography Sequence Number: 215
Author1: Knight, H. Gary
Date: 1978
Title: Cryptanalysts' Corner
Periodical: Cryptologia
Issue & Page numbers: 2: 238-241
References:
060
059
070
061
Bibliography Sequence Number: 216
Author1: Kruh, Louis
Date: 1978
Title: A Catalog of Historical Interest
Periodical: Cryptologia
Issue & Page numbers: 2: 242-253
Bibliography Sequence Number: 217
Author1: Winkel, Brian J
Date: 1978
Title: Astle Cipher Solved
Periodical: Cryptologia
Issue & Page numbers: 2: 254-256
Bibliography Sequence Number: 218
Author1: Kahn, David
Date: 1978
Title: A Famous Variation: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 2: 257
Bibliography Sequence Number: 219
Author1: Kahn, David
Date: 1978
Title: Reveling in Deception: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 2: 258-259
References:
220
Bibliography Sequence Number: 220
Author1: Montagu, Ewen
Date: 1978
Title: Beyond Top Secret Ultra
Publisher: NY: Coward, McCann & Geoghegan
Length: 192
References:
219
Bibliography Sequence Number: 221
Author1: Heitzenrater, Richard
Date: 1978
Title: Decoding Wesley's Diaries
Periodical: Cryptologia
Issue & Page numbers: 2: 260-264
Bibliography Sequence Number: 222
Author1: Kahn, David
Date: 1978
Title: Short Notices - Reviews
Periodical: Cryptologia
Issue & Page numbers: 2: 265-266
Bibliography Sequence Number: 223
Author1: Morris, Robert
Date: 1978
Title: The Hagelin Cipher Machine (M-209): Reconstruction of the Internal Settings
Periodical: Cryptologia
Issue & Page numbers: 2: 267-289
Keywords: cryptanalysis
Comments: "Cryptanalysis of the M-209 with known plaintext." (006)
References:
025
Bibliography Sequence Number: 224
Author1: Kahn, David
Date: 1978
Title: Capsule Reviews for Crypto Buffs
Periodical: Cryptologia
Issue & Page numbers: 2: 290-292
Bibliography Sequence Number: 225
Author1: Winkel, Brian J
Date: 1978
Title: There and There
Periodical: Cryptologia
Issue & Page numbers: 2: 293-298
References:
028
101
Bibliography Sequence Number: 226
Author1: Blakley, Bob
Author2: Blakley, G. R
Date: 78
Title: Security of Number Theoretic Public Key Cryptosystems against Random Attack,
Part I
Periodical: Cryptologia
Issue & Page numbers: 2: 305-321
References:
244
256
638
004
257
258
002
162
154
Bibliography Sequence Number: 227
Author1: Kruh, Louis
Date: 1978
Title: What the Nazis were doing
Periodical: Cryptologia
Issue & Page numbers: 2: 322-323
References:
158
Bibliography Sequence Number: 228
Author1: Oakley, Howard T
Date: 1978
Title: The Riverbank Publications on Cryptology
Periodical: Cryptologia
Issue & Page numbers: 2: 324-330
References:
079
202
203
Bibliography Sequence Number: 229
Author1: Kahn, David
Date: 1978
Title: Extraordinary Codebreaker, Outstanding Family: A Review
Periodical: Cryptologia
Issue & Page numbers: 2: 331-333
Bibliography Sequence Number: 230
Author1: Kruh, Louis
Date: 1978
Title: A 19th-Century Challenge Cipher
Periodical: Cryptologia
Issue & Page numbers: 2: 334
Bibliography Sequence Number: 231
Author1: Knight, H. Gary
Date: 1978
Title: Cryptanalysts' Corner
Periodical: Cryptologia
Issue & Page numbers: 2: 335-337
References:
164
079
060
059
070
Bibliography Sequence Number: 232
Author1: Kruh, Louis
Date: 1978
Title: A Catalog of Historical Interest, Part II
Periodical: Cryptologia
Issue & Page numbers: 2: 338-349
Bibliography Sequence Number: 233
Author1: Callas, Nicholas P
Date: 1978
Title: An Application of Computers in Cryptography
Periodical: Cryptologia
Issue & Page numbers: 2: 350-364
Comments: FORTRAN program
Bibliography Sequence Number: 234
Author1: Kahn, David
Date: 1978
Title: One of the WorsTitle: A Review
Periodical: Cryptologia
Issue & Page numbers: 2: 365
Bibliography Sequence Number: 235
Author1: Kruh, Louis
Date: 1978
Title: Rent A Code
Periodical: Cryptologia
Issue & Page numbers: 2: 366-367
Keywords: 1
Bibliography Sequence Number: 236
Author1: Winkel, Brian J
Date: 1978
Title: "Action Line" Challenge
Periodical: Cryptologia
Issue & Page numbers: 2: 368-370
Bibliography Sequence Number: 237
Author1: Kinnucan, Paul
Date: 1978
Title: Data Encryption Gurus: Tuchman and Meyer
Periodical: Cryptologia
Issue & Page numbers: 2: 371-381
Keywords: DES
Comments: Reprinted from Mini-Micro Systems, II, 9 (Oct 78)
Comments: "History of the DES from the IBM point of view." (006)
Bibliography Sequence Number: 238
Author1: Winkel, Brian J
Date: 1978
Title: There and There
Periodical: Cryptologia
Issue & Page numbers: 2: 382-393
References:
577
767
237
392
040
769
770
439
380
487
Bibliography Sequence Number: 239
Author1: Kahn, David
Date: 1979
Title: The Ultra Conference
Periodical: Cryptologia
Issue & Page numbers: 3: 1-8
Keywords: hist
Bibliography Sequence Number: 240
Author1: Hammer, Carl
Date: 1979
Title: How dir TJB encode B2?
Periodical: Cryptologia
Issue & Page numbers: 3: 9-15
References:
029
241
025
142
Bibliography Sequence Number: 241
Author1: Hammer, Carl
Date: 1971
Title: Signature Simulation and Certain Cryptographic Codes
Periodical: CACM
Issue & Page numbers: 14 (Jan):3-14
Bibliography Sequence Number: 242
Author1: Rohrbach, Hans
Date: 1979
Title: Report on the Decipherment of the American Strip Cipher O-2 by the German
Foreign Office
Periodical: Cryptologia
Issue & Page numbers: 3: 16-26
Keywords: hist
Bibliography Sequence Number: 243
Author1: Makar, Boshra H
Date: 1979
Title: Cryptology at St. Peter's College
Periodical: Cryptologia
Issue & Page numbers: 3: 27-28
References:
025
029
070
117
001
088
Bibliography Sequence Number: 244
Author1: Blakley, Bob
Author2: Blakley, G. R
Date: 79
Title: Security of Number Theoretic Public Key Cryptosystems against Random Attack,
Part II
Periodical: Cryptologia
Issue & Page numbers: 3: 29-42
Keywords: RSA
References:
256
226
638
004
257
258
005
162
154
Bibliography Sequence Number: 245
Author1: Ford, James R
Date: 1979
Title: The HP-67/96 Cryptograph
Periodical: Cryptologia
Issue & Page numbers: 3: 43-50
Keywords: calculator
References:
027
002
017
029
771
154
Bibliography Sequence Number: 246
Author1: Kruh, Louis
Date: 1979
Title: A Xerograph of a Classic
Periodical: Cryptologia
Issue & Page numbers: 3: 50
Keywords: ancient
References:
247
Bibliography Sequence Number: 247
Author1: Trithemius, Johannes
Date: ????
Title: Polygraphie, Et Universelle escriture Cabalistique de M. I. Tritheme Abbe
Publisher: Ann Arbor: University Microfilms Inc
Length: 600 pages
Comments: Facsimile copy from University Microfilms Inc., Ann Arbor, MI 41806 for
$76.60
Bibliography Sequence Number: 248
Author1: Sulzberger Jr., A. O
Date: 1979
Title: Papers Disclose Allie's Edge in Knowing German Codes
Periodical: Cryptologia
Issue & Page numbers: 3: 51-52
Keywords: hist
Comments: Reprinted by permission of the New York Times
Comments: 2-FEB-79 p. A13.
Bibliography Sequence Number: 249
Author1: Shulman, David
Date: 1979
Title: A Sherlockian Cryptogram
Periodical: Cryptologia
Issue & Page numbers: 3: 54-56
Comments: Cryptologia Volume 3 Page 121 has solution
Bibliography Sequence Number: 250
Author1: Winkel, Brian J
Date: 1979
Title: There and There
Periodical: Cryptologia
Issue & Page numbers: 3: 57-62
References:
030
795
794
049
Bibliography Sequence Number: 251
Author1: Good, I. J
Date: 1979
Title: Early Work on Computers at Bletchley
Periodical: Cryptologia
Issue & Page numbers: 3: 65-77
Keywords: hist
References:
722
724
850
851
025
239
852
726
698
Bibliography Sequence Number: 252
Author1: Kruh, Louis
Date: 1979
Title: Devices and Machines: The Hagelin Cryptographer,
Type C-52
Periodical: Cryptologia
Issue & Page numbers: 3: 78-82
Keywords: hist
Bibliography Sequence Number: 253
Author1: Reeds, James A
Date: 1979
Title: Solution of Challenge Cipher
Periodical: Cryptologia
Issue & Page numbers: 3: 83-95
References:
193
086
853
854
Bibliography Sequence Number: 254
Author1: Kahn, David
Date: 1979
Title: American Codes: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 3: 96-99
Keywords: ancient
References:
172
Bibliography Sequence Number: 255
Author1: Shulman, David
Date: 1979
Title: The Macbeth Test Message
Periodical: Cryptologia
Issue & Page numbers: 3: 100-104
References:
088
Bibliography Sequence Number: 256
Author1: Blakley, Bob
Author2: Blakley, G. R
Date: 79
Title: Security of Number Theoretic Public Key Cryptosystems Against Random Attack,
Part III
Periodical: Cryptologia
Issue & Page numbers: 3: 105-118
Keywords: RSA
References:
244
226
638
004
257
258
005
162
154
639
640
009
641
013
530
642
Bibliography Sequence Number: 257
Author1: Hardy, G. H
Author2: Wright, E. M
Date: 65
Title: An Introduction to the Theory of Numbers
Publisher: London: Oxford University Press
Keywords: number theory
Comments: 4th edition
Bibliography Sequence Number: 258
Author1: LeVeque, W. J
Date: 1958
Title: Topics in Number Theory, Volume 1
Publisher: Reading,MA: Addison-Wesley
Keywords: number theory
Comments: 1st edition
Bibliography Sequence Number: 259
Author1: Kahn, David
Date: 1979
Title: A German Consular Cipher
Periodical: Cryptologia
Issue & Page numbers: 3: 119
Keywords: hist
Bibliography Sequence Number: 260
Author1: Wilson, David
Date: 1979
Title: Littlewood's Cipher, Part 1: A Challenge
Periodical: Cryptologia
Issue & Page numbers: 3: 120-121
Bibliography Sequence Number: 261
Author1: Hardie, Bradford
Date: 1979
Title: Book Review: Ultra Goes to War
Periodical: Cryptologia
Issue & Page numbers: 3: 122-126
Keywords: hist
References:
852
Bibliography Sequence Number: 262
Author1: Inman, Bobby R
Date: 1979
Title: The NSA Perspective on Telecommunications Protection in the Nongovernmental
Sector
Periodical: Cryptologia
Issue & Page numbers: 3: 129-135
Keywords: NSA
Comments: really interesting
Comments: on-line as NSAPOS.TXT
Comments: Reprinted from SIGNAL, The Official Journal of the Armed Forces
Communications
Comments: and Electronics Association; March 1979
Bibliography Sequence Number: 263
Author1: Mellen, Greg
Date: 1979
Title: J. F. Byrne and the Chaocipher Work in Progress
Periodical: Cryptologia
Issue & Page numbers: 3: 136-154
References:
025
029
059
122
072
Bibliography Sequence Number: 264
Author1: Rubin, Frank
Date: 1979
Title: Solving a Cipher Based on Multiple Random Number Streams
Periodical: Cryptologia
Issue & Page numbers: 3: 155-157
References:
193
Bibliography Sequence Number: 265
Author1: Kahn, David
Date: 1979
Title: The Futility of it All
Periodical: Cryptologia
Issue & Page numbers: 3: 158-165
Bibliography Sequence Number: 266
Author1: Kruh, Louis
Date: 1979
Title: The Deadly Double Advertisements: Pearl Harbor Warning or Coincidence
Periodical: Cryptologia
Issue & Page numbers: 3: 166-171
Keywords: hist
Bibliography Sequence Number: 267
Author1: Wilson, David
Date: 1979
Title: Littlewood's Cipher, Part 2: A Method of Solution
Periodical: Cryptologia
Issue & Page numbers: 3: 172-176
References:
029
Bibliography Sequence Number: 268
Author1: Levine, Jack
Author2: Willet, Michael
Date: 79
Title: The Two-Message Problem in Cipher Text Autokey, Part 1
Periodical: Cryptologia
Issue & Page numbers: 3: 177-186
References:
017
043
282
283
070
Bibliography Sequence Number: 269
Author1: Yuval, Gideon
Date: 1979
Title: How to Swindle Rabin
Periodical: Cryptologia
Issue & Page numbers: 3: 187-189
References:
659
050
270
112
Bibliography Sequence Number: 270
Author1: Diffie, Whitfield
Author2: Hellman, Martin E
Date: 76
Title: A Critique of the Proposed DES
Periodical: CACM
Issue & Page numbers: 19: 164-165
Keywords: DES
References:
015
016
117
324
647
Bibliography Sequence Number: 271
Author1: Kahn, David
Date: 1979
Title: Classic ReviveDate: A Review
Periodical: Cryptologia
Issue & Page numbers: 3: 190-191
References:
061
063
060
069
Bibliography Sequence Number: 272
Author1: Sams, Eric
Date: 1979
Title: Musical Cryptography
Periodical: Cryptologia
Issue & Page numbers: 3: 193-201
References:
025
Bibliography Sequence Number: 273
Author1: Rubin, Frank
Date: 1979
Title: Cryptographic Aspects of Data Compression Codes
Periodical: Cryptologia
Issue & Page numbers: 3: 202-205
References:
274
275
Bibliography Sequence Number: 274
Author1: Huffman, D. A
Date: 1952
Title: A Method for the Construction of Minimum Redundancy Codes
Periodical: Proc. IRE
Issue & Page numbers: 40 (Sep):1098
Bibliography Sequence Number: 275
Author1: Rubin, Frank
Date: 1979
Title: Experiments in Text File Compression
Periodical: Cryptologia
Issue & Page numbers: CACM 19 (Nov): 616-623
Bibliography Sequence Number: 276
Author1: Kruh, Louis
Date: 1979
Title: CP-III: One Time Cypher Pad Manual Encryption Device
Periodical: Cryptologia
Issue & Page numbers: 3: 206-209
Keywords: hist
Keywords: device
References:
025
Bibliography Sequence Number: 277
Author1: Kahn, David
Date: 1979
Title: The Geheimschreiber
Periodical: Cryptologia
Issue & Page numbers: 3: 210-214
Keywords: hist
Keywords: device
Comments: includes interesting WW II prisoner Interrogation Report
References:
025
Bibliography Sequence Number: 278
Author1: Arnold, Philip M
Date: 1979
Title: Ciphers for the Educated Man
Periodical: Cryptologia
Issue & Page numbers: 3: 215-216
Bibliography Sequence Number: 279
Author1: Kruh, Louis
Date: 1979
Title: Short Notices
Periodical: Cryptologia
Issue & Page numbers: 3: 217-219
References:
280
Bibliography Sequence Number: 280
Author1: Blackstock, Paul W
Author2: Schaf, Frank L eds
Date: 78
Title: Intelligence, Espionage, Counterespionage, and Covert Operations: A Guide to
Information Sources
Publisher: Detroit: Gale Research Co
Length: 255 pages
Comments: $18
Bibliography Sequence Number: 281
Author1: Levine, Jack
Author2: Willet, Michael
Date: 79
Title: The Two-Message Problem in Cipher Text Autokey, Part 2
Periodical: Cryptologia
Issue & Page numbers: 3: 220-231
References:
017
043
282
283
070
268
Bibliography Sequence Number: 282
Author1: Levine, Jack
Author2: Brawley, Joel V
Date: 66
Title: Involutory Commutants with some Applications to Algebraic Cryptography, Part I
Periodical: J. Reine Agnew. Math
Issue & Page numbers: 224:20-43
Bibliography Sequence Number: 283
Author1: Levine, Jack
Author2: Brawley, Joel V
Date: 67
Title: Involutory Commutants with some Applications to Algebraic Cryptography, Part II
Periodical: J. Reine Agnew. Math
Issue & Page numbers: 227:1-24
Bibliography Sequence Number: 284
Author1: Fischer, Elliot
Date: 1979
Title: Language Redundancy and Cryptanalysis
Periodical: Cryptologia
Issue & Page numbers: 3: 233-235
References:
090
285
286
061
029
287
Bibliography Sequence Number: 285
Author1: Shannon, Claude E
Author2: Weaver, Warren
Date: 49
Title: The Mathematical Theory of Communication
Publisher: Urbana: University of Illinois Press
Bibliography Sequence Number: 286
Author1: Shannon, Claude E
Date: 1951
Title: Prediction and Entropy of Printed English
Periodical: Bell System Technical Journal
Issue & Page numbers: January: 50-64
Bibliography Sequence Number: 287
Author1: Turn, Rein
Date: 1973
Title: Privacy Transformations for Databank Systems
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 42: 589-601
Comments: "Survey of the fundamentals of cryptography with a view to data bank
Comments: applications." (006)
Bibliography Sequence Number: 288
Author1: Kruh, Louis
Date: 1979
Title: The Day the Friedmans had a Typo in their Photo
Periodical: Cryptologia
Issue & Page numbers: 3: 236-241
Keywords: BACON
Comments: excellent
References:
611
161
610
289
Bibliography Sequence Number: 289
Author1: Rhodes, John K
Date: 1925
Title: He Solves the Secrets of Cipher Writing
Periodical: The American Magazine
Issue & Page numbers: Jan:36-39,60,62
Keywords: BACON
Bibliography Sequence Number: 290
Author1: Knight, H. Gary
Date: 1979
Title: Cryptanalysts' Corner
Periodical: Cryptologia
Issue & Page numbers: 3: 242
Comments: Hint is in Cryptologia 4:29
Bibliography Sequence Number: 291
Author1: Arnold, Philip M
Date: 1979
Title: A German Code Book
Periodical: Cryptologia
Issue & Page numbers: 3: 243-245
Comments: See Cryptologia 4:54-55 for picture of the code book
Bibliography Sequence Number: 292
Author1: Hardie, Bradford
Date: 1979
Title: A Theory of Cryptography
Periodical: Cryptologia
Issue & Page numbers: 3: 246-247
References:
029
159
174
025
Bibliography Sequence Number: 293
Author1: Winkel, Brian J
Date: 1979
Title: There and There
Periodical: Cryptologia
Issue & Page numbers: 3: 248-251
References:
855
006
Bibliography Sequence Number: 294
Author1: Fagone, Peter P
Date: 1980
Title: The Solution of a Cromwellian Era Spy Message (Circa 1648)
Periodical: Cryptologia
Issue & Page numbers: 4:1-4
Keywords: ancient
Bibliography Sequence Number: 295
Author1: Kruh, Louis
Date: 1980
Title: Cipher Devices: The CRYPTOMATIC HC-520
Periodical: Cryptologia
Issue & Page numbers: 4:5-14
Keywords: device
Bibliography Sequence Number: 296
Author1: Golomb, Solomon W
Date: 1980
Title: Cryptographic Reflections on the Genetic Code
Periodical: Cryptologia
Issue & Page numbers: 4:15-19
Bibliography Sequence Number: 297
Author1: Richter, Michael
Date: 1980
Title: A Note on Public-Key Cryptosystems
Periodical: Cryptologia
Issue & Page numbers: 4:20-22
Keywords: NSA
References:
004
002
005
Bibliography Sequence Number: 298
Author1: Kruh, Louis
Date: 1980
Title: Memories of Friedman
Periodical: Cryptologia
Issue & Page numbers: 4:23-26
Bibliography Sequence Number: 299
Author1: Knight, H. Gary
Date: 1980
Title: Cryptanalysts' Corner
Periodical: Cryptologia
Issue & Page numbers: 4:27-29
References:
164
060
029
059
070
142
300
Bibliography Sequence Number: 300
Author1: Bryan, W. G
Date: 1967
Title: Practical Cryptanalysis, Volume V: Periodic Ciphers
Publisher: The American Cryptogram Association
Bibliography Sequence Number: 301
Author1: Rivest, Ronald L
Date: 1980
Title: "Forwards and Backwards" Encryption
Periodical: Cryptologia
Issue & Page numbers: 4:30-33
References:
028
025
007
118
119
302
086
253
Bibliography Sequence Number: 302
Author1: Pless, Vera
Date: 1977
Title: Cracking a Random Number Generator
Periodical: IEEE Trans. on Computers
Issue & Page numbers: 26:1133-1136
Keywords: RANDOM
Bibliography Sequence Number: 303
Author1: Kruh, Louis
Date: 1980
Title: The Ciphering System for a 19th Century Challenge CIpher
Periodical: Cryptologia
Issue & Page numbers: 4:34-35
Bibliography Sequence Number: 304
Author1: Kahn, David
Date: 1980
Title: Problems of the Unbreakable Cipher
Periodical: Cryptologia
Issue & Page numbers: 4:36-40
Bibliography Sequence Number: 305
Author1: Shulman, David
Date: 1980
Title: Another Solution to the Sherlockian Cryptogram
Periodical: Cryptologia
Issue & Page numbers: 4:41
Bibliography Sequence Number: 306
Author1: Kahn, David
Date: 1980
Title: The Market for Encryption
Periodical: Cryptologia
Issue & Page numbers: 4:42-44
Keywords: DEVICES
Bibliography Sequence Number: 307
Author1: Kruh, Louis
Date: 1980
Title: Reminiscences of a Master Cryptologist
Periodical: Cryptologia
Issue & Page numbers: 4:45-50
Comments: interview with Frank B. Rowlett
Bibliography Sequence Number: 308
Author1: Eckler, A. Ross
Date: 1980
Title: Some Comments on the Use of the HP 67/97 as a Cryptograph
Periodical: Cryptologia
Issue & Page numbers: 4:51-53
Keywords: calculator
References:
245
856
771
007
139
194
857
086
Bibliography Sequence Number: 309
Author1: Winkel, Brian J
Date: 1980
Title: There and There
Periodical: Cryptologia
Issue & Page numbers: 4:54-61
References:
291
858
859
860
861
862
834
671
368
Bibliography Sequence Number: 310
Author1: Kahn, David
Date: 1980
Title: Interviews with Cryptologists
Periodical: Cryptologia
Issue & Page numbers: 4:65-70
References:
157
158
159
174
Bibliography Sequence Number: 311
Author1: Levine, Jack
Author2: Hartwig, Robert E
Date: 80
Title: Applications of the Drazin Inverse to the Hill Cryptographic System, Part I
Periodical: Cryptologia
Issue & Page numbers: 4:71-85
Keywords: GF
References:
017
043
167
166
Bibliography Sequence Number: 312
Author1: Shulman, David
Date: 1980
Title: A Curious Cryptic Composition
Periodical: Cryptologia
Issue & Page numbers: 4:86-88
Bibliography Sequence Number: 313
Author1: Outerbridge, Richard
Date: 1980
Title: Some Cryptographic and Computing Applications of the Toshiba LC-836MN Memo
Note 30 Pocket Calculator
Periodical: Cryptologia
Issue & Page numbers: 4:89-94
Keywords: calculator
Bibliography Sequence Number: 314
Author1: Arnold, Philip M
Date: 1980
Title: An Apology for Jacopo Silvestri
Periodical: Cryptologia
Issue & Page numbers: 4:96-103
References:
025
Bibliography Sequence Number: 315
Author1: Raven, Francis A
Date: 1980
Title: Memories of the PacifiComments: Book Reviews
Periodical: Cryptologia
Issue & Page numbers: 4:104-108
Keywords: hist
References:
865
Bibliography Sequence Number: 316
Author1: Wall, Rajendra S
Date: 1980
Title: Decryption of Simple Substitution Cyphers with Word Divisions using a Content
Addressable Memory
Periodical: Cryptologia
Issue & Page numbers: 4:109-115
References:
029
007
142
Bibliography Sequence Number: 317
Author1: Gillogly, James J
Date: 1980
Title: The Beale Cipher: A Dissenting Opinion
Periodical: Cryptologia
Issue & Page numbers: 4:116-119
References:
025
Bibliography Sequence Number: 318
Author1: Kahn, David
Date: 1980
Title: Nuggets from the Archives
Periodical: Cryptologia
Issue & Page numbers: 4:120-121
Keywords: hist
Bibliography Sequence Number: 319
Author1: Winkel, Brian J
Date: 1980
Title: Solution to Cryptanalysts' Corner Scotch Homophonic
Periodical: Cryptologia
Issue & Page numbers: 4:122
Bibliography Sequence Number: 320
Author1: Winkel, Brian J
Date: 1980
Title: There and There
Periodical: Cryptologia
Issue & Page numbers: 4:123-126
Bibliography Sequence Number: 321
Author1: Deavours, Cipher A
Date: 1980
Title: The Black Chamber: A Column How the British Broke Enigma
Periodical: Cryptologia
Issue & Page numbers: 4:129-132
Keywords: hist
Bibliography Sequence Number: 322
Author1: Bright, Herbert S
Date: 1980
Title: High-Speed Indirect Cryption
Periodical: Cryptologia
Issue & Page numbers: 4:133-139
Keywords: RANDOM
Comments: text of COMPLAN TN-913-35, 5OCT79 version
References:
027
323
028
047
324
Bibliography Sequence Number: 323
Author1: Chaitin, G. J
Date: 1974
Title: Information-Theoretic Limitations of Formal Systems
Periodical: Journal ACM
Issue & Page numbers: 21,3 (July): 403-424
Keywords: RANDOM
Bibliography Sequence Number: 324
Author1: Feistel, Horst
Author2: Notz, W. A
Author3: Smith, J. L
Date: 1975
Title: Some Cryptographic Techniques for Machine-to-Machine Data Communication
Periodical: Proceedings of the IEEE
Issue & Page numbers: 63,1
Author1: 1545-1554
Comments: "These two papers [Refs 324 and 583] describe various ways of building
Comments: block cipher systems and shows their application to a variety of
Comments: privacy and authentication problems in computer systems and networks."
(006)
Bibliography Sequence Number: 325
Author1: Pady, Donald S
Author2: Kline, Laura S
Date: 80
Title: Finger Counting and the Identification of James VI's Secret Agents
Periodical: Cryptologia
Issue & Page numbers: 4:140-149
Keywords: ancient
Bibliography Sequence Number: 326
Author1: Levine, Jack
Author2: Hartwig, Robert E
Date: 80
Title: Applications of the Drazin Inverse to the Hill Cryptographic System, Part II
Periodical: Cryptologia
Issue & Page numbers: 4:150-168
Bibliography Sequence Number: 327
Author1: Barker, Wayne G
Date: 1980
Title: Opportunities for the Amateur Cryptanalyst can be Anywhere
Periodical: Cryptologia
Issue & Page numbers: 4:169-172
Bibliography Sequence Number: 328
Author1: Kruh, Louis
Date: 1980
Title: The Work of a DiplomaTitle: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 4:172
Bibliography Sequence Number: 329
Author1: Kahn, David
Date: 1980
Title: Spy CipherBibliography Sequence Number: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 4:173-176
Bibliography Sequence Number: 330
Author1: Knight, H. Gary
Date: 1980
Title: Cryptanalysts' Corner
Periodical: Cryptologia
Issue & Page numbers: 4:177-180
References:
025
331
070
060
059
029
Bibliography Sequence Number: 331
Author1: Bowers, William M
Date: 1959
Title: Practical Cryptanalysis Volume I. Digraphic Substitution
Publisher: Ventura, CA: The American Cryptogram Association
Keywords: 1-24
Bibliography Sequence Number: 332
Author1: Kruh, Louis
Date: 1980
Title: Cipher DeviceBibliography Sequence Number: TRS-80 Data Privacy System
Periodical: Cryptologia
Issue & Page numbers: 4:181-183
Keywords: device
Comments: have the company's literature for this product
Comments: in my files under "commercially available..."
Bibliography Sequence Number: 333
Author1: Cooper, R. H
Date: 1980
Title: Linear Transformations in Galois Fields and Their Application to Cryptography
Periodical: Cryptologia
Issue & Page numbers: 4:184-188
Keywords: GF
Comments: EXCELLECT - The starting point for my GF research
References:
334
042
335
007
336
337
142
017
043
Bibliography Sequence Number: 334
Author1: Albert, A. A
Date: 1956
Title: Fundamental Concepts of Higher Algebra
Publisher: Chicago: University of Chicago Press
Keywords: number theory
Keywords: GF
Bibliography Sequence Number: 335
Author1: Cooper, R. H
Date: 1977
Title: An Application of Galois Field Theory to Cryptography
Periodical: Proceedings of the Learned Societies Canadian Information Processing
Society
Keywords: GF
Comments: number theory
Comments: Computer Science Association:
Bibliography Sequence Number: 336
Author1: Berlekamp, Elwyn R
Date: 1968
Title: Algebraic Coding Theory
Publisher: NY: McGraw-Hill
Keywords: GF
Bibliography Sequence Number: 337
Author1: Alanen, J. D
Author2: Knuth, Donald E
Date: 64
Title: Tables of Finite Fields
Periodical: Sankhya Calcutta
Issue & Page numbers: 26: 305-328
Keywords: GF
Bibliography Sequence Number: 338
Author1: Ewing, Sir Alfred
Date: 1980
Title: Some Special War Work, Part I
Periodical: Cryptologia
Issue & Page numbers: 4:193-203
Keywords: hist
Bibliography Sequence Number: 339
Author1: Kochanski, Martin J
Date: 1980
Title: Remarks on Lu and Lee's Proposals for a Public-Key Cryptosystem
Periodical: Cryptologia
Issue & Page numbers: 4:204-207
Keywords: RSA
References:
340
005
Bibliography Sequence Number: 340
Author1: Lu, S. C
Author2: Lee, L. N
Date: 80
Title: A Simple and Effective Public-Key Cryptosystem
Periodical: Cryptologia
Issue & Page numbers: Comsat Technical Review 9:15-24 1979
Keywords: RSA
Bibliography Sequence Number: 341
Author1: Knight, H. Gary
Date: 1980
Title: Cryptanalyst's Corner
Periodical: Cryptologia
Issue & Page numbers: 4:208-212
Bibliography Sequence Number: 342
Author1: Nelson, Jim
Date: 1980
Title: The Development of Commercial Cryptosystem Standards
Periodical: Cryptologia
Issue & Page numbers: 4:213-224
Keywords: DES
Comments: not xrefed
Bibliography Sequence Number: 343
Author1: Kruh, Louis
Date: 1980
Title: Cipher Equipment: TST 1221
Periodical: Cryptologia
Issue & Page numbers: 4:225-229
Keywords: device
Bibliography Sequence Number: 344
Author1: Makar, Boshra H
Date: 1980
Title: Transfinite Cryptography
Periodical: Cryptologia
Issue & Page numbers: 4:230-237
Comments: not xrefed
Bibliography Sequence Number: 345
Author1: Kruh, Louis
Date: 1980
Title: Pearl Harbor Revisited: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 4:237
Bibliography Sequence Number: 346
Author1: Kahn, David
Date: 1980
Title: A Professional's Challenge
Periodical: Cryptologia
Issue & Page numbers: 4:238-239
References:
347
Bibliography Sequence Number: 347
Author1: Schuetz, Arthur
Date: 1980
Title: Secret Service Unmasked
Periodical: Cryptologia
Issue & Page numbers: London: Hutchinson 1950
Bibliography Sequence Number: 348
Author1: Deavours, Cipher A
Date: 1980
Title: La Methode Des Batons
Periodical: Cryptologia
Issue & Page numbers: 4:240-247
Keywords: hist
References:
025
174
161
Bibliography Sequence Number: 349
Author1: Kruh, Louis
Date: 1980
Title: A Remarkable View of Ancient America: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 4:248-249
Keywords: ancient
Bibliography Sequence Number: 350
Author1: Mellen, Greg
Date: 1981
Title: Graphic Solution of a Linear Transformation Cipher
Periodical: Cryptologia
Issue & Page numbers: 5:1-19
Keywords: GF
References:
017
142
165
167
166
631
Bibliography Sequence Number: 351
Author1: Kahn, David
Date: 1981
Title: The Public's Secrets
Periodical: Cryptologia
Issue & Page numbers: 5:20-26
Keywords: NSA
Bibliography Sequence Number: 352
Author1: Rivest, Ronald L
Date: 1981
Title: Statistical Analysis of the Hagelin Cryptograph
Periodical: Cryptologia
Issue & Page numbers: 5:27-32
Keywords: hist
References:
072
Bibliography Sequence Number: 353
Author1: Ewing, Sir Alfred
Date: 1981
Title: Some Special War Work, Part II
Periodical: Cryptologia
Issue & Page numbers: 5:33-39
Keywords: hist
Bibliography Sequence Number: 354
Author1: Mellen, Greg
Date: 1981
Title: Cryptanalyst's Corner
Periodical: Cryptologia
Issue & Page numbers: 5:40-42
Bibliography Sequence Number: 355
Author1: Deavours, Cipher A
Date: 1981
Title: Shutting off the Spigot in 1981
Periodical: Cryptologia
Issue & Page numbers: 5:43-45
Keywords: NSA
Bibliography Sequence Number: 356
Author1: Kruh, Louis
Date: 1981
Title: Cipher Equipment: Collins CR-200/220 Data Security Unit
Periodical: Cryptologia
Issue & Page numbers: 5:46-50
Keywords: DES
Keywords: device
Bibliography Sequence Number: 357
Author1: Rubin, Frank
Date: 1981
Title: Decrypting a Stream Cipher Based on J-K Flip-Flops
Periodical: Cryptologia
Issue & Page numbers: 5:51-57
References:
119
Bibliography Sequence Number: 358
Author1: Kruh, Louis
Date: 1981
Title: From the Ultra Conference: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 5:58
Bibliography Sequence Number: 359
Author1: Fischer, Elliott
Date: 1981
Title: A Theoretical Measure of Cryptographic Performance
Periodical: Cryptologia
Issue & Page numbers: 5:59-62
References:
086
007
027
Bibliography Sequence Number: 360
Author1: Kahn, David
Date: 1981
Title: German Spy Cryptograms
Periodical: Cryptologia
Issue & Page numbers: 5:65-66
Keywords: hist
Bibliography Sequence Number: 361
Author1: Hartwig, Robert E
Author2: Levine, Jack
Date: 81
Title: Applications of the Drazin Inverse to the Hill Cryptographic System, Part III
Periodical: Cryptologia
Issue & Page numbers: 5:67-77
References:
017
043
Bibliography Sequence Number: 362
Author1: Kallis Jr., Stephen A
Date: 1981
Title: The Code-O-Graph Cipher Disks
Periodical: Cryptologia
Issue & Page numbers: 5:78-83
Keywords: hist
Keywords: devices
References:
025
Bibliography Sequence Number: 363
Author1: Sturges, Gerald
Date: 1981
Title: The House Report on Public Cryptography
Periodical: Cryptologia
Issue & Page numbers: 5:84-93
Keywords: NSA
Bibliography Sequence Number: 364
Author1: Costas, John P
Date: 1981
Title: The Hand-Held Calculator as a Cryptographic Machine
Periodical: Cryptologia
Issue & Page numbers: 5:94-117
Keywords: calculator
References:
018
197
007
Bibliography Sequence Number: 365
Author1: Lembart, Lee
Date: 1981
Title: The Public Cryptography Study Group: U.S. and Mathematicians in Code Dispute
at Odds on Publishing Research
Periodical: Cryptologia
Issue & Page numbers: 5:118-122
Keywords: NSA
Bibliography Sequence Number: 366
Author1: Mellen, Greg
Date: 1981
Title: Cryptanalysts' Corner
Periodical: Cryptologia
Issue & Page numbers: 5:123
Bibliography Sequence Number: 367
Author1: Adleman, Leonard M
Date: 1980
Title: On Distinguishing Prime Numbers from Composite Numbers
Periodical: Proc. 21st FOCS Conference
Issue & Page numbers: October 1980
Keywords: primes
Comments: copy was mailed to me by Ron Rivest
Bibliography Sequence Number: 368
Author1: Kahn, David
Date: 1979
Title: Cryptology Goes Public
Periodical: Foreign Affairs
Issue & Page numbers: Fall 1979
Bibliography Sequence Number: 369
Author1: Pollard, J. M
Date: 1975
Title: A Monte Carlo Method for Factorization
Periodical: BIT
Issue & Page numbers: 15:
Keywords: primes
Bibliography Sequence Number: 370
Author1: Blakley, G. R
Date: 79
Title: Safeguarding Cryptographic Keys
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 48:313-317
Bibliography Sequence Number: 371
Author1: Berlekamp, Elwyn R
Author2: McElice, Robert J
Author3: Van Tilborg, Henk C. A
Date: 1978
Title: On the Inherent Intractability of Certain Coding Problems
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-24, 3 (May):384-386
Comments: Abstract - The fact that the general decoding problem for linear codes
Comments: and the general problem of finding the weights of a linear code are both
Comments: NP-complete is shown. This strongly suggests, but does not rigorously
Comments: imply, that no algorithm for either of these problems which runs in
Comments: polynomial time exists.
Bibliography Sequence Number: 372
Author1: Branstad, Dennis K
Author2: Gait, J
Author3: Katzke, S
Date: 1976
Title: Report of the Workshop on Cryptography in Support of Computer Security
Periodical: NBS Report IR 77-1291
Issue & Page numbers: 21-22
Keywords: DES
Comments: Sept 1976
Bibliography Sequence Number: 373
Author1: Friedman, William F
Date: 1967
Title: Cryptology
Periodical: Encyclopedia Britannica
Issue & Page numbers: 6: 844-851
Keywords: encyclopedia
Bibliography Sequence Number: 374
Author1: Geffe, Philip R
Date: 1973
Title: How to Protect Data With Ciphers that are Really Hard to Break
Periodical: Electronics
Issue & Page numbers: 46, 1 (4 Jan 73): 99-101
Keywords: system design and implementation
Comments: "A scheme for constructing a keystream by using a linear random
Comments: generator to select bits alternately from the streams produced by
Comments: two other linear random number generators." (006)
Bibliography Sequence Number: 375
Author1: Hellman, Martin E
Author2: Merkle, Ralph
Author3: Schroeppel, R et al
Date: 1976
Title: Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard
Publisher: Stanford U. Ctr. for Systems Research Report SEL 76-042
Length: 9 Sep 76
Comments: 4:Washington, L
Comments: 5:Diffie, Whitfield
Comments: 6:Pohlig, S
Comments: 7:Schweitzer, P
Comments: avail. from NTIS
Bibliography Sequence Number: 376
Author1: Kolata, Gina Bari
Date: 1977
Title: Computer Encryption and the National Security Agency Connection
Periodical: Science
Issue & Page numbers: 197 (29 Jul 77): 438-440
Keywords: NSA
Keywords: DES
Bibliography Sequence Number: 377
Author1: Kolata, Gina Bari
Date: 1977
Title: Cryptology on the Brink of a Revolution?
Periodical: Science
Issue & Page numbers: 197 (19 Aug 77): 747-748
Keywords: popular
Keywords: RSA
References:
874
Bibliography Sequence Number: 378
Author1: Kolata, Gina Bari
Date: 1978
Title: Cryptology: A Secret Meeting at IDA?
Periodical: Science
Issue & Page numbers: 200 (14 Apr 78): 184
Keywords: RSA
References:
377
Bibliography Sequence Number: 379
Author1: Lempel, A
Date: 1978
Title: Cryptology in Transition: A Survey
Periodical: Sperry Rand Research Center Report SCRC-RP-78-43
Issue & Page numbers: ??????
Comments: Sudbury
Comments: Mass. Sept 1978
Bibliography Sequence Number: 380
Author1: Matyas, S. M
Author2: Meyer, Carl H
Date: 78
Title: Generation, Distribution, and Installation of Cryptographic Keys
Periodical: IBM System Journal
Issue & Page numbers: 17, 2, 126-137
Keywords: Key Distribution
Bibliography Sequence Number: 381
Author1: McElliece, R. J
Date: 1977
Title: Encyclopedia of Mathematics and its Applications, Volume Author3: Theory of
Information and Coding
Publisher: Reading, MA: Addison-Wesley
Bibliography Sequence Number: 382
Author1: McElliece, R. J
Date: 1978
Title: A Public-Key Cryptosystem based on Algebraic Coding Theory
Periodical: Jet Propulsion Lab DSN Progress Report 42-44, Jan and Feb 1978
Bibliography Sequence Number: 383
Author1: Merkle, Ralph C
Author2: Hellman, Martin E
Date: 78
Title: Hiding Information and Signatures in Trapdoor Knapsacks
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-24 (Sep):525-530
Comments: Abstract - The knapsack problem is an NP-complete combinatorial problem
Comments: that is strongly believed to be computationally difficult to solve in
Comments: general. Specific instances of this problem that appear very difficult
Comments: to solve unless one possesses "trapdoor information" used in the design
Comments: of the problem are demonstrated. Because only the designer can easily
Comments: solve problems, others can send him information hidden in the solution
Comments: to the problems without fear that an eavesdropper will be able to extract
Comments: the information. This approach differs from usual cryptographic
Comments: systems in that a secret key is not needed. Conversely, only the
Comments: designer can generate signatures for messages, but anyone can easily
Comments: check their authenticity.
Bibliography Sequence Number: 384
Author1: Patterson, N. J
Date: 1975
Title: The Algebraic Decoding of Goppa Codes
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-21, 2 (March):203-207
Bibliography Sequence Number: 385
Author1: Perlman, M
Date: 1976
Title: Generation of Key in Cryptographic System for Secure Communications
Publisher: NASA Technical Brief 75-10278
Keywords: system design and implementation
Comments: "Discussion of some nonlinear shift registers with know periods." (006)
Bibliography Sequence Number: 386
Author1: Pless, Vera S
Date: 1977
Title: Encryption Schemes for Computer Confidentiality
Periodical: IEEE Transactions on Computers
Issue & Page numbers: C-26, 11 (Nov): 1133-1136
Keywords: system design and implementation
Comments: "An interesting discussion of the use of J-K flip flop networks to
Comments: produce maximal period keying sequences." (006)
Bibliography Sequence Number: 387
Author1: Rabin, Michael O
Date: 1977
Title: Complexity of Computations
Periodical: CACM
Issue & Page numbers: 20, 9 (Sep 1977): 625-633
Bibliography Sequence Number: 388
Author1: Shamir, Ali
Date: 1978
Title: A Fast Signature Scheme
Publisher: Cambridge, MA: MIT
Length: MIT/LCS/TM-107
Bibliography Sequence Number: 389
Author1: Shannon, Claude E
Date: 1948
Title: The Mathematical Theory of Communication
Periodical: Bell System Technical Journal
Issue & Page numbers: 27 (July and October 1948): 379-423, 623-656
Bibliography Sequence Number: 390
Author1: Shapley, Deborah
Author2: Kolata, Gina Bari
Date: 77
Title: Cryptology: Scientists Puzzle over Threat to Open Research, Publication
Periodical: Science
Issue & Page numbers: 197 (30 Sep 77): 1345-1349
Keywords: NSA
References:
376
377
848
Bibliography Sequence Number: 391
Author1: Smith, J. Lynn
Date: 1971
Title: The Design of Lucifer, a Cryptographic Device for Data Communications
Publisher: IBM Report RC 3326
Length: White Plains, NY: IBM
Keywords: system design and implementation
Comments: "This working paper gives a detailed discussion of the functioning,
Comments: hardware design, and costs of the IBM Lucifer system." (006)
Bibliography Sequence Number: 392
Author1: Sugarman, Robert
Date: 1978
Title: Freedom to Research and Publish on Cryptology Remains Unresolved
Periodical: IEEE Spectrum
Issue & Page numbers: 2, 5 (May 1878): News Supplement
Comments: could not locate. what is page number?
Bibliography Sequence Number: 393
Author1: ACME Code Company
Date: 1923
Title: ACME Commodity and Phrase Code
Publisher: San Francisco, CA: ACME Code Co
Bibliography Sequence Number: 394
Author1: Albert, A. A
Date: 1941
Title: Some Mathematical Aspects of Cryptography
Periodical: presented at the AMS 382nd Meeting
Issue & Page numbers: Manhattan, Kansas 21 Nov 1941
Bibliography Sequence Number: 395
Author1: Branstad, Dennis K
Date: 1979
Title: Hellman's Data Does Not Support His Conclusion
Periodical: IEEE Spectrum
Issue & Page numbers: 16, 7 (July 1979): 41
Bibliography Sequence Number: 396
Author1: Bright, Herbert S
Author2: Enison, Richard L
Date: 76
Title: Cryptography Using Modular Software Elements
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 45: 113-123
Keywords: DES
Keywords: RANDOM
Comments: "This paper describes the implementation and testing of the DES on several
computers." (006)
Bibliography Sequence Number: 397
Author1: Davida, George I
Date: 1979
Title: Hellman's Scheme Breaks DES in its Basic Form
Periodical: IEEE Spectrum
Issue & Page numbers: 16, 7 (July): 39
Bibliography Sequence Number: 398
Author1: Gilbert, E. N
Author2: MacWilliams, F. J
Author3: Sloane, N. J. A
Date: 1974
Title: Codes Which Detect Deception
Periodical: Bell System Technical Journal
Issue & Page numbers: 53, 3 (March): 405-423
Keywords: information theory
Comments: "This paper considers an interesting authentication problem which
Comments: arises in monitoring a nuclear test ban treaty. The problem is
Comments: closely related to digital signatures, which were not yet known." (006)
Bibliography Sequence Number: 399
Author1: Golomb, Solomon W
Date: 1967
Title: Shift Register Sequences
Publisher: San Francisco, CA: Holden-Day
Comments: "Shift registers are one of the best studied approaches to the
Comments: generation of pseudorandom sequences. This volume discusses the
Comments: randomness characteristics of sequences from both linear and
Comments: nonlinear shift registers." (006)
Bibliography Sequence Number: 400
Author1: Hart, G. L
Date: 1964
Title: The Beale Papers
Publisher: Roanoke, VA: Roanoke Public Library
Bibliography Sequence Number: 401
Author1: Hellman, Martin E
Date: 1979
Title: DES will be totally insecure within ten years
Periodical: IEEE Spectrum
Issue & Page numbers: 16, 7 (July 1979): 32-39
Bibliography Sequence Number: 402
Author1: Herlestam, T
Date: 1978
Title: Critical Remarks on Some Public-Key Cryptosystems
Periodical: BIT
Issue & Page numbers: 18 (1978) 493-496
Bibliography Sequence Number: 403
Author1: Horowitz, E
Author2: Sahni, S
Date: 74
Title: Computing Partitions with Applications to the Knapsack Problem
Periodical: Journal of the ACM
Issue & Page numbers: 21, 2 (April 1974): 277-292
Bibliography Sequence Number: 404
Author1: Kahn, David
Date: 1966
Title: Modern Cryptology
Periodical: Scientific American
Issue & Page numbers: 215 (July): 38-46
Keywords: popular
Comments: "This paper presents a superficial discussion of cryptology in roughly
Comments: the World War II period. Rotor and Hagelin machines are mentioned,
Comments: along with a discussion of one time pads, but neither mathematical
Comments: techniques in cryptanalysis nor the use of computers are covered." (006)
Bibliography Sequence Number: 405
Author1: Lipton, S. M
Author2: Matyas, S. M
Date: 78
Title: Making the Digital Signatures Legal - and Safeguarded
Periodical: Data Commun
Issue & Page numbers: 7, 2 (Feb): 41-52
Bibliography Sequence Number: 406
Author1: MacWilliams, F. J
Author2: Sloane, N. J. A
Date: 77
Title: The Theory of Error-Correcting Codes, Volumers I and II
Publisher: NY: North-Holland
Bibliography Sequence Number: 407
Author1: Martin, J
Date: 1973
Title: Security, Accuracy, and Privacy in Computing Systems
Publisher: Englewood Cliffs, NJ: Prentice-Hall
Bibliography Sequence Number: 408
Author1: Massey, J. L
Date: 1969
Title: Feedback Shift-Register Synthesis and BCH Decoding
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-15, 1 (Jan):122-127
Bibliography Sequence Number: 409
Author1: Peterson, W. W
Author2: Weldon, E. J
Date: 72
Title: Error Correcting Codes, 2nd Edition
Publisher: Cambridge, MA: MIT Press
Bibliography Sequence Number: 410
Author1: Roberts, R. W
Date: 1975
Title: Encryption Algorithm for Computer Data Encryption
Periodical: Federal Register
Issue & Page numbers: 40, 52 (17 Mar 75): 12134-12139
Comments: National Bureau of Standards (NBS)???
Bibliography Sequence Number: 411
Author1: Schroeppel, R
Author2: Shamir, Ali
Date: ??
Title: A TBibliography Sequence Number: *2 = O(n**2) time/space tradeoff for Certain
NP-Complete Problems
Publisher: to appear as MIT Lab. Comp. Sci. Rep
Bibliography Sequence Number: 412
Author1: Shamir, Ali
Author2: Zippel, R. E
Date: 78
Title: On the Security of the Merkle-Hellman Cryptographic Scheme
Publisher: MIT/LCS/TM-119
References:
383
110
004
258
Bibliography Sequence Number: 413
Author1: Shamir, Ali
Author2: Rivest, Ronald L
Author3: Adleman, Leonard M
Date: 1979
Title: Mental Poker
Publisher: Cambridge, MA: MIT Lab Comp. Sci, Tech. Rep. MIT/LCS/TM-125
Comments: Reprinted in The Mathematical Gardner (ed. D. Klarner)
Comments: Boston:Prindle, Weber, Schmidt (1981):37-43
Bibliography Sequence Number: 414
Author1: Shapley, Deborah
Date: 1978
Title: The New Unbreakable Codes - Will They Put NSA Out of Business?
Periodical: The Washington Post
Issue & Page numbers: 9 Jul 78: Outlook, Section B1
Bibliography Sequence Number: 415
Author1: Simmons, Gustavus J
Date: 1977
Title: Cryptology: The Mathematics of Secure Communication
Periodical: Math. Intell
Issue & Page numbers: 1, 4 (Oct): 406-414
Bibliography Sequence Number: 416
Author1: Sugarman, Robert
Date: 1979
Title: On Foiling Computer Crime
Periodical: IEEE Spectrum
Issue & Page numbers: 16, 7 (July): 31-32
Bibliography Sequence Number: 417
Author1: Tausworthe, R. C
Date: 1965
Title: Random Numbers Generated by Linear Recurrence Modulo Two
Periodical: Mathematics of Computation
Issue & Page numbers: 19: 201-209
Bibliography Sequence Number: 418
Author1: Tuchman, Walter L
Date: 1979
Title: Hellman Presents No Shortcut Solutions to the DES
Periodical: IEEE Spectrum
Issue & Page numbers: 16, 7 (July): 40-41
Bibliography Sequence Number: 419
Author1: Tuckerman, Bryant
Date: 1970
Title: A Study of the Vigenere-Vernam Single and Multiple Loop Enciphering Systems
Publisher: Yorktown Heights, NY: IBM T. J. Watson Research Center, Report RC-2879
(#13538)
Keywords: cryptanalysis
Comments: "Tuckerman develops cryptanalytic techniques for solving these ciphers
Comments: from either rather small amounts of matched plaintext and ciphertext
Comments: or larger amounts of pure ciphertext." (006)
Bibliography Sequence Number: 420
Author1: Williams, H. C
Author2: Schmid, B
Date: 79
Title: Some Remarks Concerning the MIT Public-Key Cryptosystem
Publisher: U. of Manitoba Dep. of Comp. Sci., Rep. 91
Comments: 22 May 79
Bibliography Sequence Number: 421
Author1: Williams, H. C
Date: 1979
Title: A Modification of the RSA Public-Key Encryption Procedure
Publisher: U. of Manitoba Dep. of Comp. Sci., Rep 92
Bibliography Sequence Number: 422
Author1: Zierler, N
Author2: Brillhart, J
Date: 68
Title: On Primitive Trinomials (mod 2), Part I
Periodical: Inform. Control
Issue & Page numbers: 13: 541-554
Keywords: RANDOM
Bibliography Sequence Number: 423
Author1: Zierler, N
Author2: Brillhart, J
Date: 69
Title: On Primitive Trinomials (mod 2), Part II
Periodical: Inform. Control
Issue & Page numbers: 14: 566-569
Keywords: RANDOM
Bibliography Sequence Number: 424
Author1: unknown
Date: 1971
Title: Data Privacy
Periodical: IBM Res. Rep
Issue & Page numbers: 7, 4
Bibliography Sequence Number: 425
Author1: Morris, Robert
Date: 1977
Title: Computer Security and the Bell System
Periodical: ??????
Issue & Page numbers: 197 (19 Aug 77): 716
Bibliography Sequence Number: 426
Author1: unknown
Date: 1978
Title: ??????
Periodical: Computerworld
Issue & Page numbers: (19 Jun 78): 15
Bibliography Sequence Number: 427
Author1: Branstad, Dennis K
Date: 1975
Title: Draft Guidelines for Implementing and Using the NBS Data Encryption Standard
(proposed)
Publisher: Washington, DComments: National Bureau of Standards
Keywords: DES
Comments: 10 Nov 75
Bibliography Sequence Number: 428
Author1: Branstad, Dennis K
Date: 1975
Title: Encryption Protection in Computer Data Communication Systems
Periodical: Proc. 4th Data Communications Symposium
Issue & Page numbers: 8.1-8.7
Keywords: Applications
Comments: avail from ACM or IEEE?
Bibliography Sequence Number: 429
Author1: Heinrich, F
Date: 19??
Title: The Network Security Center: A System Network Approach to Computer Network
Security
Publisher: Washington, DComments: National Bureau of Standards, Special Pub.
500-21-Vol. 2
Bibliography Sequence Number: 430
Author1: Sanders, C. W. et al
Date: 1977
Title: Selected Examples of Possible Approaches to Electronic Communication
Interception Operations
Publisher: MITRE Tech. Rep. MTR-7461, Jan 77
Bibliography Sequence Number: 431
Author1: IBM
Date: 1978
Title: (Special Issue on Cryptology)
Periodical: IBM Systems Journal
Issue & Page numbers: 17, 2
Bibliography Sequence Number: 432
Author1: Berlekamp, Elwyn R
Date: 1973
Title: Goppa Codes
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-19,5 (Sep):589-592
Bibliography Sequence Number: 433
Author1: Kohnfelder, L. M
Date: 1978
Title: Towards a Practical Public-Key Cryptosystem
Publisher: Cambridge, MA: MIT Lab. for Computer Science June 1978
Bibliography Sequence Number: 434
Author1: Ball, W. W. R
Author2: Coxeter, H. S. M
Date: 74
Title: Mathematical Recreations and Essays
Publisher: Toronto: Univ. Toronto Press, 12th Edition
Bibliography Sequence Number: 435
Author1: Bennet Jr., W. R
Date: 1976
Title: Scientific and Engineering Problem Solving With the Computer
Publisher: Englewood Cliffs, NJ: Prentice-Hall
Comments: Chapter 4
Bibliography Sequence Number: 436
Author1: Branstad, Dennis K
Date: 1973
Title: Security Aspects of Computer Networks
Periodical: Proc. AIAA Computer Network Syst. Conf.
Issue & Page numbers: Paper 73-427
Keywords: Applications
Bibliography Sequence Number: 437
Author1: Branstad, Dennis K
Date: 1978
Title: Computer Security and the Data Encryption Standard
Publisher: National Bureau of Standards Special Publ. 500-27
Bibliography Sequence Number: 438
Author1: Carpenter, R
Author2: Sokol, J
Author3: Rosenthal, R
Date: 1978
Title: A Microprocessor-Based Local Network Node
Periodical: COMPCON Proc., IEEE Computer Society
Issue & Page numbers: Sept. 1978
Bibliography Sequence Number: 439
Author1: Ehrsam, S
Author2: Matyas, S
Author3: Meyer, Carl H
Date: 1978
Title: A Cryptographic Key Management Scheme for Implementing the Data Encryption
Standard
Periodical: IBM Systems Journal
Issue & Page numbers: 17, Author2: 106-125
Keywords: DES
Comments: 4:Tuchman, W
Bibliography Sequence Number: 440
Author1: Everton, J
Date: 1978
Title: A Hierarchical Basis for Encryption Key Management in a Computer
Communications Network
Periodical: Trends and ApplicationBibliography Sequence Number: 1978 Proceedings of
the IEEE Computer Society
Issue & Page numbers: May 1978
Bibliography Sequence Number: 441
Author1: General Services Administration
Date: 1977
Title: Federal Standard 1026 (proposed): TelecommunicationBibliography Sequence
Number: Compatibility
requirements for use of the DES
Publisher: GSA
Keywords: DES
Comments: 13 Oct 1977
Bibliography Sequence Number: 442
Author1: Gait, J
Date: 1977
Title: Validating the Correctness of Hardware Implementations of the NBS DES. Special
Publ. 500-20
Publisher: National Bureau of Standards
Keywords: DES
Bibliography Sequence Number: 443
Author1: Stewart, G. W
Date: 73
Title: Introduction to Matrix Computation
Publisher: NY: Academic Press
Bibliography Sequence Number: 444
Author1: Meyer, Carl H
Author2: Matyas, S
Date: 78
Title: Cryptography: A New Dimension in Computer Data Security
Publisher: KETRON, Inc
Bibliography Sequence Number: 445
Author1: U.S. Patent Office
Date: 1978
Title: Patent No. 4,078,152: Block-Cipher Cryptographic System with Chaining
Publisher: Submitted by L. Tuckerman Mar-18; assigned to the IBM Corporation
Bibliography Sequence Number: 446
Author1: Bush, A. M
Date: 1978
Title: Some General Interest Books on Cryptology
Periodical: IEEE Communications Society Magazine
Issue & Page numbers: 16, 6: 32
References:
447
448
449
450
451
452
029
453
454
455
025
456
457
458
459
460
461
462
463
464
142
465
466
467
468
469
470
471
182
472
Bibliography Sequence Number: 447
Author1: Blackstock, Paul W
Date: 1969
Title: The Secret Road to World War II: Soviet Versus Western Intelligence 1921-1939
Publisher: NY: Quadrangle Books
Bibliography Sequence Number: 448
Author1: Burke, Davis
Date: 1969
Title: Get Yamamoto
Publisher: NY: Random House
Bibliography Sequence Number: 449
Author1: Dulles, Allen W
Date: 1966
Title: The Secret Surrender
Publisher: NY: Harper and Row
Bibliography Sequence Number: 450
Author1: Farago, Ladislas
Date: 1967
Title: The Broken Seal
Publisher: NY: Random House
Bibliography Sequence Number: 451
Author1: Foote, Alexander
Date: 1979
Title: Handbook for Spies
Publisher: NY: Doubleday
Bibliography Sequence Number: 452
Author1: Friedman, William F
Author2: Friedman, Elizabeth S
Date: 57
Title: The Shakespearean Cipher Examined
Publisher: NY: Cambridge University Press
Bibliography Sequence Number: 453
Author1: Galland, Joseph S
Date: 1945
Title: An Historical and Analytical Bibliography of the Literature of Cryptology
Publisher: NY: AMS Press
Bibliography Sequence Number: 454
Author1: Hoebling, A. A
Date: 1963
Title: The Week Before Pearl Harbor
Publisher: NY: Norton
Bibliography Sequence Number: 455
Author1: James, Admiral Sir William
Date: 1956
Title: The Code Breakers of Room 40
Publisher: NY: St. Martin
Bibliography Sequence Number: 456
Author1: Kimmel, Husband E
Date: 1955
Title: Admiral Kimmel's Story
Publisher: Chicago: Regnery
Bibliography Sequence Number: 457
Author1: Lavine, Abraham L
Date: 1921
Title: Circuits of Victory
Publisher: Garden City, NY: Doubleday and Page
Bibliography Sequence Number: 458
Author1: Lord, Walter
Date: 1967
Title: Incredible Victory
Publisher: NY: Harper and Row
Bibliography Sequence Number: 459
Author1: Masterman, C
Date: 1972
Title: The Double-Cross System in the Was of 1939-1945
Publisher: New Haven: Yale University Press
Bibliography Sequence Number: 460
Author1: McLachlan, Donald
Date: 1968
Title: Room 39: A Study in Naval Intelligence
Publisher: NY: Atheneum
Bibliography Sequence Number: 461
Author1: Moore, Dan T
Author2: Waller, Martha
Date: ??
Title: Cloak and Cipher
Publisher: NY: Bobbs-Merrill
Bibliography Sequence Number: 462
Author1: Morgenstern, George
Date: 1947
Title: Pearl Harbor: The Story of the Secret War
Publisher: NY: Devin-Adair
Bibliography Sequence Number: 463
Author1: Perrault, Gilles
Date: 1964
Title: The Secret of D-Day
Publisher: Boston: Little, Brown
Comments: Translated from the French by Len Ortzen
Bibliography Sequence Number: 464
Author1: Pratt, Fletcher
Date: 1939
Title: Secret and UrgenTitle: The Story of Codes and Ciphers
Publisher: NY:The Bobbs-Merrill Co.
Comments: Reprinted 1942 by Blue Ribbon Books, Garden City
Bibliography Sequence Number: 465
Author1: Smith, Laurence D
Date: 1943
Title: Cryptography
Publisher: NY: Norton
Bibliography Sequence Number: 466
Author1: Strong, Sir Kenneth
Date: 1972
Title: Men of Intelligence
Publisher: NY: St. Martin
Bibliography Sequence Number: 467
Author1: Theobald, Robert A
Date: 1954
Title: The Final Secret of Peral Harbor
Publisher: NY: Devin-Adair
Comments: The author was Rear Admiral, U.S.N., (Ret.)
Bibliography Sequence Number: 468
Author1: Trefousse Ed., Hans L
Date: 1958
Title: What Happened at Pearl Harbor
Publisher: NY: Twayne Publishers
Bibliography Sequence Number: 469
Author1: Tuchman, Barbara
Date: 1958
Title: The Zimmerman Telegram
Publisher: NY: Viking
Bibliography Sequence Number: 470
Author1: Wohlsetter, Roberta
Date: 1962
Title: Pearl Harbor: Warning and Decision
Publisher: StanforDate: Stanford University Press
Bibliography Sequence Number: 471
Author1: Wolfe, James R
Date: 1970
Title: Secret Writing: The Craft of the Cryptographer
Publisher: NY: McGraw-Hill
Bibliography Sequence Number: 472
Author1: Zacharias, Ellis M
Date: 1946
Title: Secret MissionBibliography Sequence Number: The Story of an Intelligence Officer
Publisher: NY: Putnam
Bibliography Sequence Number: 473
Author1: Boggs, D
Author2: Shoch, J
Author3: Taft, E
Date: 1980
Title: PuPeriodical: An Internetwork Architecture
Periodical: IEEE Transactions on Computers
Issue & Page numbers: Feb 1980 (to appear)
Comments: 4:Metcalfe, R
Bibliography Sequence Number: 474
Author1: Carlstedt, J
Author2: Bisbey, R
Author3: Popek, G
Date: 1975
Title: Pattern Directed Protection Evaluation
Publisher: Del Rey, CA: Information Sciences Inst., U. of Southern California; Rep.
ISI/RR-75-31
Bibliography Sequence Number: 475
Author1: Cerf, V
Author2: Kirstein, P
Date: 78
Title: Issues in Packet-Network Interconnection
Periodical: Proceedings of the IEEE
Issue & Page numbers: 66, 11 (Nov 1978): 1386-1408
Bibliography Sequence Number: 476
Author1: Dennis, J. B
Author2: Van Horn, E. C
Date: 66
Title: Programming Semantics for Multiprogrammed Computations
Periodical: CACM
Issue & Page numbers: 9, 3 (March): 143-155
Bibliography Sequence Number: 477
Author1: Downs, D
Author2: Popek, G
Date: 79
Title: Data Base System Security and Ingres
Periodical: Proc. Conf. Very Large Data Bases
Issue & Page numbers: ???
Bibliography Sequence Number: 478
Author1: Fabry, R. S
Date: 1974
Title: Capability-Based Addressing
Periodical: CACM
Issue & Page numbers: 17, 7: (July): 403-412
Bibliography Sequence Number: 479
Author1: Feiertag, Richard J
Author2: Neumann, Peter G
Date: 79
Title: The Foundations of a Provably Secure Operating System (PSOS)
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 48: 329-334
Bibliography Sequence Number: 480
Author1: Good, D I
Date: 1977
Title: Constructing Verified and Reliable Communications Processing Systems
Periodical: ACM Soft. Eng. Notes
Issue & Page numbers: (Oct 1977): 2-5
Bibliography Sequence Number: 481
Author1: Hellman, Martin E
Date: 1978
Title: Security in Communications Networks
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 47: 1131-1134
Bibliography Sequence Number: 482
Author1: Kent, Steve T
Date: 1976
Title: Encryption-Based Protection Protocols for Interactive User-Computer
Communication
Publisher: MIT/LCS/TR-162
Keywords: Applications
Comments: "This thesis develops protocols for the use of block cipher systems
Comments: in protecting and authenticating messages sent over networks with
Comments: asynchronous and full duplex line protocols" (006)
Comments: This is his M.S. Thesis, EECS Dept.
Bibliography Sequence Number: 483
Author1: Kimbleton, S. R
Author2: Schneider, G. M
Date: 75
Title: Computer Communications Networks: Approaches, Objectives and Performance
Considerations
Periodical: Comput. Surv
Issue & Page numbers: 7, 3 (Sept): 129-173
Bibliography Sequence Number: 484
Author1: Kline, Charles S
Author2: Popek, Gerald J
Date: 79
Title: Public Key vs. Conventional Key Encryption
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 48: 831-837
Bibliography Sequence Number: 485
Author1: Konheim, Alan G
Date: 1978
Title: Cryptographic Methods for Data Protection
Publisher: Yorktown Heights, NY: IBM T.J. Watson Res. Ctr. Rep. RC 7026 (#30100)
Bibliography Sequence Number: 486
Author1: Lampson, Butler W
Date: 1973
Title: A Note on the Confinement Problem
Periodical: CACM
Issue & Page numbers: 16, 10 (Oct): 613-615
Bibliography Sequence Number: 487
Author1: Lennon, R. E
Date: 1978
Title: Cryptography Architecture for Information Security
Periodical: IBM Systems Journal
Issue & Page numbers: 17, Author2: 138-150
Bibliography Sequence Number: 488
Author1: McCauley, E. J
Author2: Drongowski, P J
Date: 79
Title: KSOS - The Design of a Secure Operating System
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 48: 345-353
Bibliography Sequence Number: 489
Author1: Meyer, Carl H
Date: 1973
Title: Design Considerations for Cryptography
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 42: 603-606
Bibliography Sequence Number: 490
Author1: Popek, Gerald J
Date: 1974
Title: Protection Structures
Periodical: IEEE Computer
Issue & Page numbers: 7, 6 (June): 22-33
Bibliography Sequence Number: 491
Author1: Popek, Gerald J
Date: 1974
Title: A Principle of Kernel Design
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 43: 977-978
Bibliography Sequence Number: 492
Author1: Popek, Gerald J
Author2: Kline, C. S
Date: 78
Title: Design Issues for Secure Computer Networks
Periodical: in Operating Systems, an Advanced Course; R. Bayer et al Eds.;NY:
Speinger-Verlag
Bibliography Sequence Number: 493
Author1: Popek, Gerald J
Author2: Kampe, Mark
Author3: Kline, Charles S. et al
Date: 1979
Title: UCLA Secure Unix
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 48: 355-364
Comments: 4:Stoughton, Allen
Comments: 5:Urban, Michael
Comments: 6:Walton, Evelyn J
Bibliography Sequence Number: 494
Author1: Rabin, Michael O
Date: 1978
Title: Digitalized Signatures
Periodical: in Foundations of Secure Computing; R. DeMillo et al Eds.;NY:Academic
Press
Issue & Page numbers: 155-168
Bibliography Sequence Number: 495
Author1: Redell, D. D
Author2: Fabry, R. S
Date: 74
Title: Selective Revocation of Capabilities
Periodical: in Proc. IRIA Conf. Protection in Operating Systems
Issue & Page numbers: ??
Bibliography Sequence Number: 496
Author1: Roberts, L
Author2: Wessler, B
Date: 73
Title: The ARPA Network
Periodical: in Computer Communication Networks; Englewood Cliffs, NJ: Prentice-hall
Issue & Page numbers: 485-499
Bibliography Sequence Number: 497
Author1: Saltzer, J. H
Date: 1978
Title: On Digital Signatures
Periodical: ACM Operating Syst. Rev
Issue & Page numbers: 12, 2 (Apr): 12-14
Bibliography Sequence Number: 498
Author1: Sendrow, M
Date: 1978
Title: Key Management in EFT Environments
Periodical: in Proc. COMPCON
Issue & Page numbers: (8 Sep 78): 351-354
Keywords: key distribution
Comments: NY: IEEE
Bibliography Sequence Number: 499
Author1: Westin, A. F
Date: 1970
Title: Privacy and Freedom
Publisher: NY: Atheneum Press
Bibliography Sequence Number: 500
Author1: Kruh, Louis
Date: 1981
Title: A Code Problem: A Book Review
Periodical: Cryptologia
Issue & Page numbers: 5:124-125
References:
080
Bibliography Sequence Number: 501
Author1: Craig, Jim
Date: 1981
Title: A Data Encryption System with Low Overhead: An Effective, Low-Cost Way to
Disguise Computer
Data
Periodical: Information Systems News
Issue & Page numbers: (June 15): 26-27
Keywords: RANDOM
Comments: XOR scheme (faster than NBSDES) suggested for database cryption
Bibliography Sequence Number: 502
Author1: Marketing Consultants International, Inc
Date: 1981
Title: Who, What, and Where in COMMUNICATIONS SECURITY
Publisher: Hagerstown, MDate: M. C. I., Inc
Length: 124+xi pages
Keywords: RANDOM
Comments: $175
Bibliography Sequence Number: 503
Author1: Handelman, George H
Date: 1981
Title: Special ReporTitle: Cryptographic Research and the National Security
Periodical: SIAM News
Issue & Page numbers: 14, 3 (June): 1,4,5
Keywords: RANDOM
Keywords: NSA
Comments: The author is a member of the Public Cryptography Study Group of the
Comments: American Council on Education; and gives information concerning it.
References:
025
383
005
368
040
Bibliography Sequence Number: 504
Author1: Carroll, J., et. al. (eds)
Date: 1971
Title: The American Heritage Word Frequency Book
Publisher: Boston: Houghton Mifflin
Keywords: Freq
Comments: pages 565-567
Bibliography Sequence Number: 505
Author1: COMPLAN
Date: 1976
Title: TLP Sequence as Key Stream for Vernam Cryption
Publisher: Tech. Note TN-913-8d (26-Aug-76)
Keywords: RANDOM
Bibliography Sequence Number: 506
Author1: COMPLAN
Date: 1977
Title: Cryptopak (tm) Software Package Technical Description
Publisher: COMPLAN Inc.
Length: ??
Keywords: RANDOM
Comments: 17-MAR-7 version??
Comments: references Alfabit (tm) TD; 13-Apr-76 version
Bibliography Sequence Number: 507
Author1: COMPLAN
Date: 1977
Title: One-Way Keyed and Keyless Ciphers; Nonreproducible Cipher
Periodical: Tech. Note TN-913-24 (28-Feb-77)
Keywords: RANDOM
Bibliography Sequence Number: 508
Author1: COMPLAN
Date: 1978
Title: Some Considerations in the Design and Implementations of the QIK-CRYPT (tm)
Algorithm
Periodical: Tech. Note TN-913-33 (28-Jul-78)
Keywords: RANDOM
Bibliography Sequence Number: 509
Author1: Cooley, J. W
Author2: Tukey, J. W
Date: 65
Title: An Algorithm for the Machine Calculation of Complex Fourier Series
Periodical: Mathematics of Computation
Issue & Page numbers: 19: 297-301
Keywords: RANDOM
Bibliography Sequence Number: 510
Author1: Coveyou, R. R
Date: 1960
Title: Serial Correlation in the Generation of Pseudo-Random Numbers
Periodical: Journal of the ACM
Issue & Page numbers: 7, 1 (Jan): 72-74
Keywords: RANDOM
Bibliography Sequence Number: 511
Author1: Coveyou, R. R
Author2: MacPherson, R. D
Date: 67
Title: Fourier Analysis of Uniform Random Number Generators
Periodical: Journal of the ACM
Issue & Page numbers: 14, 1 (Jan): 100-119
Keywords: RANDOM
Bibliography Sequence Number: 512
Author1: Enison, R. L
Author2: Bright, H. S
Date: 76
Title: Preliminary Statistical Testing of a 64-bit Tausworthe-Lewis-Payne Quasirandom
Number Generator of
Mersenne Exponent Degree
Periodical: Proc. 9th Interface Symp. Computer Science and Statistics
Issue & Page numbers: 208-211
Keywords: RANDOM
Comments: David C. Hoaglin and Roy E. Welsch Editors
Comments: Prindle, Weber, and Schmidt, Boston
Bibliography Sequence Number: 513
Author1: Green, B. F
Author2: Smith, J. E. K
Author3: Klem, L
Date: 1959
Title: Empirical Tests of an Additive Random Number Generator
Periodical: Journal of the ACM
Issue & Page numbers: 6, 4 (Oct): 527-537
Keywords: RANDOM
Bibliography Sequence Number: 514
Author1: Greenberger, M
Date: 1961
Title: An A Priori Determination of Serial Correlation in Computer Generated Random
Numbers
Periodical: Mathematics of Computation
Issue & Page numbers: 15: 383-389
Keywords: RANDOM
Bibliography Sequence Number: 515
Author1: Gruenberger, F
Author2: Mark, A. M
Date: 51
Title: The Date: *2 Test for Random Digits
Periodical: MTAC
Issue & Page numbers: 5: 109-110
Keywords: RANDOM
Bibliography Sequence Number: 516
Author1: Ingemarsson, Ingemar
Date: 1976
Title: Analysis of Secret Functions with Application to Computer Cryptography
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 45: 125-127
Keywords: RANDOM
Keywords: INFORMATION THEORY
Bibliography Sequence Number: 517
Author1: Juncosa, M. L
Date: 1953
Title: Random Number Generation on the BRL High Speed Computing Machine
Publisher: BRL Report 855
Keywords: RANDOM
Bibliography Sequence Number: 518
Author1: Knuth, Donald
Date: 1965
Title: Construction of a Random Sequence
Periodical: BIT
Issue & Page numbers: 5: 246-250
Keywords: RANDOM
Bibliography Sequence Number: 519
Author1: Lehmer, D. H
Date: 1951
Title: Mathematical Methods in Large-Scale Computing Units
Periodical: Ann. Comput. Lab. Harvard U
Issue & Page numbers: 26: 141-146
Keywords: RANDOM
Bibliography Sequence Number: 520
Author1: Lewis, P. A. W
Author2: Goodman, A. S
Author3: Miller, J. M
Date: 1973
Title: A Pseudo-Random Number Generator for the System/360
Periodical: IBM Systems Journal
Issue & Page numbers: 8: 456-468
Keywords: RANDOM
Bibliography Sequence Number: 521
Author1: Lewis, T. G
Author2: Payne, W. H
Date: 73
Title: Generalized Feedback Shift Register Pseudorandom Number Algorithm
Periodical: J. ACM
Issue & Page numbers: 20, 3 (July): 456-468
Keywords: RANDOM
Bibliography Sequence Number: 522
Author1: Lindgren, B. W
Author2: McElrath, G. W
Date: 70
Title: Introduction to Probability and Statistics
Publisher: 3rd Edition; New YorKeywords: McMillan
Keywords: RANDOM
Comments: see page 170
Bibliography Sequence Number: 523
Author1: Marsaglia, G
Date: 1968
Title: Random Numbers Fall Mainly In the Planes
Periodical: Proc. Nat. Acad. Sci.
Issue & Page numbers: 6: 25-28
Keywords: RANDOM
Bibliography Sequence Number: 524
Author1: Martin-Lof, P
Date: 1966
Title: The Definition of Random Sequences
Periodical: Inform. Control
Issue & Page numbers: 9: 602-619
Keywords: RANDOM
Bibliography Sequence Number: 525
Author1: Moshman, J
Date: 1954
Title: The Generation of Pseudo-Random Numbers on a Decimal Calculator
Periodical: J. ACM
Issue & Page numbers: 1, 2 (April): 88-91
Keywords: RANDOM
Bibliography Sequence Number: 526
Author1: Thomas, W. I
Date: 1901
Title: ???
Periodical: Am. J. Sociol.
Issue & Page numbers: 6: 750-763
Keywords: RANDOM
Bibliography Sequence Number: 527
Author1: Tootill, J. P. R
Author2: Robinson, W. D
Author3: Adams, A. G
Date: 1971
Title: The Runs Up-And-Down Performances of Tausworthe Pseudo-Random Number
Generators
Periodical: J. ACM
Issue & Page numbers: 18, 3 (July): 381-399
Keywords: RANDOM
Bibliography Sequence Number: 528
Author1: Tootill, J. P. R
Author2: Robinson, W. D
Author3: Eagle, D. J
Date: 1973
Title: An Asymptotically Random Tausworthe Sequence
Periodical: J. ACM
Issue & Page numbers: 20, 3 (July): 469-481
Keywords: RANDOM
Bibliography Sequence Number: 529
Author1: Tuckerman, B
Date: 1971
Title: The 24th Mersenne Prime
Periodical: Proc. Nat. Acad. Sci USA
Issue & Page numbers: 68, 10 (Oct): 2319-2320
Keywords: RANDOM
Bibliography Sequence Number: 530
Author1: Editor
Date: 1979
Title: Onward and Upward
Periodical: Scientific American
Issue & Page numbers: 241, 3 (Sep): 32
Keywords: primes
Comments: concerns 26th and 27th Mersenne Prime
Bibliography Sequence Number: 531
Author1: Whittlesey, J. R. B
Date: 1968
Title: A Comparison of the Correlational Behavior of Random Number Generators for the
IBM 360
Periodical: CACM
Issue & Page numbers: 11, 9 (Sept): 641-644
Keywords: RANDOM
Bibliography Sequence Number: 532
Author1: Zierler, N
Date: 1969
Title: Primitive Trinomials whose degree is a Mersenne Exponent
Periodical: Inform. Control
Issue & Page numbers: 15: 67-69
Keywords: RANDOM
Bibliography Sequence Number: 533
Author1: Brunner, E. R
Date: 1976
Title: Efficient Speech Scrambling: An Economic Solution to the Secure Voice
Communication Problem
Periodical: Rec. Int. Conf. Communications Equipment and Systems
Issue & Page numbers: 336-339
Keywords: Analog Scrambling
Bibliography Sequence Number: 534
Author1: Kirchhofer, Kirk H
Date: 1976
Title: Secure Voice Communication - Cryptophony
Periodical: Int. Defense Rev.
Issue & Page numbers: 9 (May): 761-767
Keywords: Analog Scrambling
Bibliography Sequence Number: 535
Author1: McCalmont, A. M
Date: 1973
Title: Communication Security for Voice-Techniques, Systems, and Operations
Periodical: Telecommun.
Issue & Page numbers: April: 35-42
Keywords: Analog Scrambling
Bibliography Sequence Number: 536
Author1: McCalmont, A. M
Date: 1974
Title: How to Select and Apply Various Voice Scrambling Techniques
Periodical: Commun. News
Issue & Page numbers: Jan: 34-37
Keywords: Analog Scrambling
Bibliography Sequence Number: 537
Author1: Wyner, Aaron D
Date: 1979
Title: An Analog Scrambling Scheme Which Does Not Expand Bandwidth, Part I
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-25 (May)
Keywords: Analog Scrambling
Comments: "A promising new approach to analog scrambling using n-space rotations
Comments: of vectors of sample points as the keying elements, and discrete prolate
Comments: spheroidal wave functions to encode the signal in an optimally bandwidth
Comments: efficient manner." (006)
Bibliography Sequence Number: 538
Author1: Baran, Paul
Date: 1964
Title: On Distributed Communications: IX. Security,
Secrecy, and Tamper-Free
Considerations
Publisher: Santa Monica, CA: The Rand Corporation; RM-3765-PR
Keywords: Applications
Comments: Reprinted in Lance J. Hoffman, Ed. 'Security and Privacy in Computer
Systems'
Comments: Los Angeles, CA: Melville Publ. 1973, pp. 99-123
Comments: "This is a fine discussion of the application of stream cryptography to
Comments: computer networks. It is part of a series of papers which laid the
Comments: foundations for packetized computer networks" (006)
References:
648
Bibliography Sequence Number: 539
Author1: Gudes, Ehud
Author2: Koch, Harvey S
Author3: Stahl, Fred A
Date: 1976
Title: The Application of Cryptography for Data Base Security
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 45: 97-107
Keywords: Applications
Bibliography Sequence Number: 540
Author1: Keys, Richard R
Author2: Clamons, Eric H
Date: 74
Title: Security Architecture Using Encryption
Publisher: in Approaches to Privacy and Security in Computer Systems
Keywords: Applications
Comments: Proceedings of a conference held at the NBS; pages 37-41; March 4-5
Bibliography Sequence Number: 541
Author1: Keys, Richard R
Author2: Clamons, Eric H
Date: 74
Title: File Encryption as a Security Tool
Periodical: Honeywell Comput. J
Issue & Page numbers: 8, Author2: 90-93
Keywords: Applications
Bibliography Sequence Number: 542
Author1: Schmid, Pierre E
Date: 1976
Title: Review of Ciphering Methods to Achieve Communication Security in Data
Transmission Networks
Periodical: Proc. Int. Zurich Seminar on Digital Communications
Issue & Page numbers: March 11
Keywords: applications
Bibliography Sequence Number: 543
Author1: Smith, J. Lynn
Author2: Notz, W. A
Author3: Osseck, P. R
Date: 1972
Title: An Experimental Application of Cryptography to a Remotely Accessed Data System
Periodical: Proc. ACM Nat. Conf.
Issue & Page numbers: 282-297
Keywords: applications
Comments: "A description of the construction of an experimental system using Lucifer
Comments: to communicate with an IBM 360/67 timesharing system" (006)
Bibliography Sequence Number: 544
Author1: Feistel, Horst
Date: 1958
Title: A Survey of Problems and Systems in Authenticated Communication and Control
Publisher: MIT Lincoln Lab
Keywords: authentication
Bibliography Sequence Number: 545
Author1: Widmer, Walter R
Date: 1976
Title: Message Authentication, A Special Identification Requirement in One-Way Digital
Data Transmission
Periodical: Proc. Int. Zurich Seminar on Digital Communications
Keywords: authentication
Bibliography Sequence Number: 546
Author1: Scherf, John Arthur
Date: 1974
Title: Computer and Data Security: A Comprehensive Annotated Bibliography
Publisher: MIT Project MAC Tech. Rep. 122
Keywords: Bibliography
Comments: "This bibliography is less comprehensive on cryptography than the present
Comments: present one, but its extensive coverage of other aspects of computer
Comments: security will be of use to those interested in application of
Comments: cryptography." (006)
Bibliography Sequence Number: 547
Author1: Eyraud, Charles
Date: 1959
Title: Precis de Cryptographie Moderne
Publisher: Paris, France: Editions Raoul Tari, 1st Ed. 1953; 2nd ed. 1959
Keywords: Classical
Comments: "This is the most recent public treatise on cryptanalysis, and as such
Comments: touches on some relatively modern devices such as the Hagelin machine
Comments: which are omitted in earlier works" (006)
Bibliography Sequence Number: 548
Author1: Friedman, William F
Date: 1944
Title: Military Cryptanalysis, Volume II - Simpler Varieties of Polyalphabetic Substitution
Systems
Publisher: Washington, DComments: U.S. GPO
Keywords: Classical
Comments: several major libraries
References:
205
549
550
Bibliography Sequence Number: 549
Author1: Friedman, William F
Date: 1944
Title: Military Cryptanalysis, Volume III - Aperiodic Substitutions
Publisher: Washington, DComments: U.S. GPO
Keywords: classical
References:
205
548
550
Bibliography Sequence Number: 550
Author1: Friedman, William F
Date: 1944
Title: Military Cryptanalysis, Volume IV - Transposition Systems
Publisher: Washington, DComments: U.S. GPO
Keywords: classical
References:
205
548
549
Bibliography Sequence Number: 551
Author1: Coppersmith, Don
Author2: Grossman, Edna
Date: 75
Title: Generators for Certain Alternating Groups with Applications to Cryptography
Periodical: SIAM Journal of Applied Math
Issue & Page numbers: 29 (Dec): 624-627
Keywords: cryptanalysis
Comments: "This paper examines the family of permutation generated by schemes which
Comments: are in some ways a generalization and in some other ways a specialization
Comments: of the method used in the IBM Lucifer family of ciphers." (006)
Bibliography Sequence Number: 552
Author1: Edwards, Daniel J
Date: 1966
Title: OCAS - On-Line Cryptanalytic Aid System
Publisher: MIT Project MAC Tech. Rep. 27
Keywords: cryptanalysis
Comments: "A primitive system for computer aided cryptanalysis, including a language
Comments: with integer arithmetic and strings over definable alphabets. Routines
Comments: to find the period of a polyalphabetic cipher, do frequency counts, and
Comments: locate repeated sequences are shown, but not built in." (006)
Bibliography Sequence Number: 553
Author1: Grossman, Edna
Date: 1974
Title: Group Theoretic Remarks on Cryptographic Systems Based on Two Types of
Additon
Publisher: Yorktown Heights, NY: IBM T.J. Watson Research Center RC 4742 (Feb 26)
Keywords: cryptanalysis
Comments: "This paper determines the class of transformations generated by a system
Comments: which alternates addition mod 2 with additon mod Author2: *n." (006)
Bibliography Sequence Number: 554
Author1: Key, Edwin L
Date: 1976
Title: An Analysis of the Structure and Complexity of Non-Linear Binary Sequence
Generators
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-22 (Nov): 732-736
Keywords: cryptanalysis
Bibliography Sequence Number: 555
Author1: Kjeldsen, K
Date: 1976
Title: On the Cycle Structure of a Set of Nonlinear Shift Registers with Symmetric
Feedback Functions
Periodical: J. Combinatorial Theory (A)
Issue & Page numbers: Author2: 154-169
Keywords: cryptanalaysis
Bibliography Sequence Number: 556
Author1: Tuckerman, Bryant
Date: 1973
Title: Solution of a Substitution-Fractionation-Transposition Cipher
Publisher: Yorktown Heights, NY: T.J. Watson Research Center; RC 4537 (Sep 21)
Keywords: cryptanalysis
Comments: "Solution of a cipher which is similar to one round of the system
Comments: shown in Figure 10" (006)
Bibliography Sequence Number: 557
Author1: Kahn, David
Date: 1976
Title: Tapping Computers
Periodical: New York Times
Issue & Page numbers: April Author3: 27 (Op. Ed.)
Keywords: DES
Bibliography Sequence Number: 558
Author1: Lexar Corp
Date: 1976
Title: An Evaluation of the NBS Data Encryption Standard
Publisher: Los Angeles, CA: Lexar Corp.
Keywords: DES
Comments: "This report is remarkably similar to Hellman et al [Ref 375]" (006)
Comments: 11611 San Vicente Blvd
Bibliography Sequence Number: 559
Author1: Stephan, E
Date: 1978
Title: Communication Standards for using DES
Periodical: Proc. COMPCON
Keywords: DES
Bibliography Sequence Number: 560
Author1: Sykes, David J
Date: 1977
Title: Implementation of the NBS Encryption Standard
Periodical: presented at the 1977 Honeywell Computer Security and Privacy Symp. Apr
19-20
Keywords: DES
Bibliography Sequence Number: 561
Author1: Tuchman, Walter L
Date: 1978
Title: Efficacy of DES in Data Processing
Periodical: Proc. COMPCON
Keywords: DES
Bibliography Sequence Number: 562
Author1: Yasaki, Edward K
Date: 1976
Title: Encryption Algorithm: Key Size is the Thing
Periodical: Datamation
Issue & Page numbers: 22, 3 (March): 164, 166
Keywords: DES
References:
866
867
868
Bibliography Sequence Number: 563
Author1: Callimahos, Lambros D
Date: 1973
Title: Cryptography
Periodical: Colliers Encyclopedia
Issue & Page numbers: 7: 513-530
Keywords: ENCYCLOPEDIA
Bibliography Sequence Number: 564
Author1: Callimahos, Lambros D
Date: 1976
Title: Cryptology
Periodical: Encyclopedia Britanica, 15th ed., Macropedia
Issue & Page numbers: 5: 322-333
Keywords: ENCYCLOPEDIA
Bibliography Sequence Number: 565
Author1: Kahn, David
Date: 1976
Title: Cryptology
Periodical: Encyclopedia Americana
Issue & Page numbers: 8: 276-285
Keywords: ENCYCLOPEDIA
Bibliography Sequence Number: 566
Author1: Kahn, David
Date: 1963
Title: Plaintext in the New UnabridgeDate: An Examination of the Definitions on
Cryptology in Websters 3rd New Int. Dict.
Publisher: NY: Crypto Press
Keywords: Glossary
Comments: Section 2 of Handbook of Cryptography
Bibliography Sequence Number: 567
Author1: Flato, Linda
Date: 1978
Title: NSA's Computer Story: Report Lauds Intelligence Agency's Pioneering Role in
Computers
Periodical: Datamation
Issue & Page numbers: 24, 3 (March): 207,208,212
Keywords: historical
Bibliography Sequence Number: 568
Author1: Jones, Bian
Date: 1978
Title: The Secret War
Publisher: NY: Methuen
Keywords: historical
Comments: Chapter 6 contains a good account of British cryptanalysis during World War
II
Bibliography Sequence Number: 569
Author1: Chu, Wesley W
Author2: Neat, Charlie
Date: 76
Title: A New Computer Cryptography: The Expanded Character Set (ECS) Cipher
Publisher: Dedham, MA: Artech House
Keywords: homophonic systems
Comments: Advances in Computer Communications (Sect. XIII - Computer
Communications Security)
Bibliography Sequence Number: 570
Author1: Stahl, Fred A
Date: 1973
Title: A Homophonic Cipher for Computational Cryptography
Periodical: Proc. Nat. Computer Conf.
Issue & Page numbers: 565-568
Keywords: homophonic systems
Bibliography Sequence Number: 571
Author1: Stahl, Fred A
Date: 1974
Title: On Computational Security
Publisher: Ph.D. dissertation, Univ. Illinois, Urbana, Rep. R-637, UILU-ENG 73-2241,
Jan.
Keywords: homophonic systems
Bibliography Sequence Number: 572
Author1: Carleial, Aydano B
Author2: Hellman, Martin E
Date: 77
Title: A Note on Wyner's Wiretap Channel
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-23 (May): 387-390
Keywords: information theory
Comments: "This paper presents a slight generalization of Wyner's results on
Comments: wiretap channels and suggests a way to quantify Shannon's concept of
Comments: cryptographic diffusion" (006)
Bibliography Sequence Number: 573
Author1: Creighton, James E., editor
Date: 1900
Title: Advancement of Learning and Novum Organum by Francis Bacon
Publisher: NY: The Colonial Press
Keywords: Bacon
Comments: U. of Pa. Library Number 119/B113Aa
Comments: pages 167-171 are English translation of Latin in Ref 612 (pages 419-427)
Bibliography Sequence Number: 574
Author1: Leung-Yan-Cheong, S. K
Author2: Hellman, Martin E
Date: 78
Title: The Gaussian Wire-Tap Channel
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-24 (Sep): 451-456
Keywords: information theory
Bibliography Sequence Number: 575
Author1: Wyner, Aaron D
Date: 1975
Title: The Wiretap Channel
Periodical: Bell Syst. Tech. J
Issue & Page numbers: 54, 8 (Oct): 1355-1387
Keywords: information theory
Comments: "This paper evaluates the rate at which information can be conveyed
Comments: to a legitimate receiver and kept secret from a wiretapper whose
Comments: channel is noisier, introducing a new concept to both cryptography
Comments: and information theory" (006)
Bibliography Sequence Number: 576
Author1: Diffie, Whitfield
Date: 1978
Title: Data Security for EFT and Automated Business
Publisher: San Jose, CA: SBS Publishing
Comments: "Prognosis for the development and business applications of
Comments: communication security over the next twenty years, followed by
Comments: technical and business advice for companies interested in making
Comments: cryptographic products or employing cryptographic security." (006)
Bibliography Sequence Number: 577
Author1: Diffie, Whitfield
Date: 1978
Title: The Outlook for Computer Security
Periodical: Mini-Micro Syst
Issue & Page numbers: 2, 9 (Oct): 42-44
Comments: Fairly accurate brief summary of reference #576
Bibliography Sequence Number: 578
Author1: Halsey, James C
Date: 1970
Title: Finite Automata Admitting Inverses with Some Applications to Cryptography
Publisher: Ph.D. dissertation, Dep. Math., North Carolina State Univ., Raleigh, NC
Bibliography Sequence Number: 579
Author1: Kam, John B
Author2: Davida, George I
Date: 78
Title: A Structured Design of Substitution-Permutation Encryption Network
Publisher: in Foundations of Secure Computation; NY: Academic Press; DeMillo, R. A.
et al Editors
Comments: R. A. DeMillo, D. P. Doblin, A. K. Jones, R. J. Lipton, editors
Comments: "Design of complete S-P networks (every output depends on every input)
given complete S-boxes."
(006)
Bibliography Sequence Number: 580
Author1: Girdansky, M. B
Date: 1972
Title: Cryptology: The Computer and Data Privacy
Periodical: Computers and Automation
Issue & Page numbers: 21, 4 (April): 12-19
Keywords: survey
Comments: "This article gives an overview of cryptographic work at IBM
Comments: including a discussion of the weskness of linear feedback shift
Comments: registers, Tuckerman's attack on the Vigenere-Vernam systems, and Lucifer"
(006)
Bibliography Sequence Number: 581
Author1: Benedict, G. Gordon
Date: 1974
Title: An Enciphering Module for Multics
Publisher: MIT Project MAC, Tech. Memo. 50
Keywords: system design and implementation
Comments: "This masters thesis describes the computer implementation of the IBM
Comments: Lucifer system as described by Smith" (006)
Bibliography Sequence Number: 582
Author1: Carroll, J. M
Author2: McLelland, P. M
Date: 70
Title: Fast 'Infinite-Key' Privacy Transformation for Resource Sharing Systems
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 37:223-230
Keywords: system design and implementation
Comments: "This paper describes a stream cipher based on an additive random
Comments: number generator." (006)
Bibliography Sequence Number: 583
Author1: Feistel, Horst
Date: 1970
Title: Cryptographic Coding for Data-Bank Privacy
Publisher: Yorktown Heights, NY: IBM T.J. Watson Research Center; Rep. RC-2827
Keywords: system design and implementation
Bibliography Sequence Number: 584
Author1: Skatrud, R. O
Date: 1969
Title: A Consideration of the Application of Cryptographic Techniques to Data Processing
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 35: 111-117
Keywords: system design and implementation
Comments: "Describes two systems: a substitution system similar to a double loop
Comments: Vigenere, and a matrix transposition system." (006)
Bibliography Sequence Number: 585
Author1: Smith, J. Lynn
Date: 1971
Title: Hardware Implementation of a Cryptographic System
Periodical: IBM Tech. Disclosure Bull
Issue & Page numbers: 13: 1004-1008
Keywords: system design and implementation
Comments: "This describes the implementation of a system different from [reference
#391]" (006)
Bibliography Sequence Number: 586
Author1: Squires, J
Date: 1975
Title: Russ Monitor of U.S. Phones
Periodical: Chicago Tribune
Issue & Page numbers: 25-Jun-75: 123
Bibliography Sequence Number: 587
Author1: Davis, Ruth M
Date: 1978
Title: Remedies Sought to Defeat Soviet Eavesdropping on Microwave Links
Periodical: Microwave Syst
Issue & Page numbers: 8, 6 (June): 17-20
Bibliography Sequence Number: 588
Author1: U.S. Senate Select Committee to Study Gov. Op. wrt Intelligence Activities
Date: 1976
Title: Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of
Americans
Publisher: Washington, DComments: U.S. GPO
Comments: Report No. 94-755, Book 3
Comments: Final Report of the Committee
Bibliography Sequence Number: 589
Author1: Flanagan, J. L
Date: 1972
Title: Speech Analysis, Synthesis, and Perception, 2nd Edition
Publisher: Berlin, Germany: Springer-Verlag
Bibliography Sequence Number: 590
Author1: Reddy, D. Raj
Date: 1975
Title: Speech Recognition
Publisher: NY: Academic Press
Bibliography Sequence Number: 591
Author1: unknown
Date: 1978
Title: Special Issue on Packet Communication Networks
Periodical: Proceedings of the IEEE
Issue & Page numbers: November
Bibliography Sequence Number: 592
Author1: Cover, Thomas M
Author2: King, Roger C
Date: 78
Title: A Convergent Gambling Estimate of the Entropy of English
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-24,4 (Jul):413-421
Bibliography Sequence Number: 593
Author1: Reeds, J
Author2: Ritchie, D
Author3: Morris, R
Date: 19??
Title: The Hagelin Cipher Machine (M-209), Cryptanalysis from Ciphertext Alone
Periodical: Cryptologia
Issue & Page numbers: to appear
Comments: "Cryptanalysis of the M-209 from ciphertext only." (006)
Bibliography Sequence Number: 594
Author1: Watson, E. J
Date: 1962
Title: Primitive Polynomial (mod 2)
Periodical: Mathematics of Computation
Issue & Page numbers: 16: 368-369
Bibliography Sequence Number: 595
Author1: Groth, Edward J
Date: 1971
Title: Generation of Binary Sequences with Controllable Complexity
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-17,3 (May):288-296
Bibliography Sequence Number: 596
Author1: Sloane, N. J. A
Date: 1973
Title: A Handbook of Integer Sequences
Publisher: NY: Academic Press
Bibliography Sequence Number: 597
Author1: Faggin, F
Date: 1975
Title: The Role of Technology in Microcomputer Design and Evolution
Periodical: IEEE Trans. Circuits Syst
Issue & Page numbers: CAS-7 (Feb): 4-13
Bibliography Sequence Number: 598
Author1: Faggin, F
Date: 1975
Title: Microprocessor Technology: Yesterday, Today, and Tomorrow
Periodical: EDN
Issue & Page numbers: 20-Nov-75
Bibliography Sequence Number: 599
Author1: Connolly, Ray
Date: 1978
Title: Pentagon to Fund Major IC Program
Periodical: Electronics
Issue & Page numbers: 14-Sep-78: 81-82
Bibliography Sequence Number: 600
Author1: unknown
Date: 1978
Title: VHSI Proposal Finds Willing Audience
Periodical: Electronics
Issue & Page numbers: 28-Sep-78: 89-90
Bibliography Sequence Number: 601
Author1: McCalmont, A. M
Date: 1973
Title: Voice Privacy (Scrambling) for More Effective Communications Techniques,
Systems, and Operations
Publisher: Technical Communications Corp
Bibliography Sequence Number: 602
Author1: Gold, B
Date: 1977
Title: Digital Speech Networks
Periodical: Proceedings of the IEEE
Issue & Page numbers: 65 (Dec): 1636-1638
Bibliography Sequence Number: 603
Author1: Stone, H. S
Date: 1973
Title: Discrete Mathematical Structures
Publisher: Chicago, IIssue & Page numbers: Science Research Assoc.
Bibliography Sequence Number: 604
Author1: Parzen, E
Date: 1960
Title: Modern Probability Theory and Its Applications
Publisher: NY: Wiley
Bibliography Sequence Number: 605
Author1: Gallager, R. G
Date: 1968
Title: Information Theory and Reliable Communication
Publisher: NY: Wiley
Bibliography Sequence Number: 606
Author1: Lin, S
Date: 1970
Title: Error COrrecting Codes
Publisher: Englewood Cliffs, NJ: Prentice-Hall
Bibliography Sequence Number: 607
Author1: DeMillo, R. A
Author2: Dobkin, D. P
Author3: Jones, A. K et al editors
Date: 1978
Title: Foundations of Secure Computation
Publisher: NY: Academic Press
Comments: 4:Lipton, R. J.
Comments: see Ref 579 for a specific article
Bibliography Sequence Number: 608
Author1: Saltzer, J. H
Author2: Schroeder, M. D
Date: 75
Title: The Protection of Information in Computer Systems
Periodical: Proceedings of the IEEE
Issue & Page numbers: 63 (Sept): 1278-1308
Bibliography Sequence Number: 609
Author1: Gleason, Norma
Date: 1981
Title: Baconian Ciphers
Periodical: GAMES
Issue & Page numbers: Jan/Feb: 42,66,69
Keywords: bacon
Bibliography Sequence Number: 610
Author1: Friedman, William F
Date: 1963
Title: Six Lectures on Cryptology
Publisher: n.p.: National Security Agency
Length: 186
Comments: Accessioned by National Archives from NSA; Available for $.20 per page as
SRH-004
Bibliography Sequence Number: 611
Author1: U.S. Army Security Agency
Date: 1946
Title: Historical Background of the Signal Security Agency, Volume 2: World War I,
1917-1919
Publisher: n.p
Bibliography Sequence Number: 612
Author1: Speeding, James
Author2: Ellis, Robert L
Author3: Heath, Douglas D, Editors
Date: 1869
Title: The Works of Francis Bacon, Volume Author2: De Augmentis Scientiarum (The
Advancement of Learning)
Publisher: NY: Hurd and Houghton
Keywords: bacon
Comments: U. of Pa. Library #119/B13.13
Comments: pages 419-427, 499-503 (an appendix on crypto)
Bibliography Sequence Number: 613
Author1: Bussey, W. H
Date: 1905
Title: Galois Field Tables for p**n<=169
Periodical: Bull. Amer. Math. Soc.
Issue & Page numbers: 12: 22-38
Bibliography Sequence Number: 614
Author1: Bussey, W. H
Date: 1910
Title: Tables of Galois Fields of Order Less than 1000
Periodical: Bull. Amer. Math. Soc
Issue & Page numbers: 16: 188-206
Bibliography Sequence Number: 615
Author1: Carlitz, L
Date: 1953
Title: Permutations in a Finite Field
Periodical: Proc. Amer. Math. Soc.
Issue & Page numbers: 4: 538
Keywords: GF
Bibliography Sequence Number: 616
Author1: Carlitz, L
Date: 1960
Title: A Theorem on Permutations in a Finite Field
Periodical: Proc. Amer. Math. Soc
Issue & Page numbers: 11: 456-459
Keywords: GF
Bibliography Sequence Number: 617
Author1: Carlitz, L
Date: 1962
Title: Some Theorems on Permutation Polynomials
Periodical: Bull. Amer. Math. Soc.
Issue & Page numbers: 68: 120-122
Keywords: GF
Bibliography Sequence Number: 618
Author1: Carlitz, L
Date: 1963
Title: Permutations in a FInite Field
Periodical: Acta Scientiarum Mathematicarum
Issue & Page numbers: 24: 196-203
Keywords: GF
Bibliography Sequence Number: 619
Author1: Carmichael, R. D
Date: 1937
Title: Groups of Finite Order
Publisher: NY: Ginn and Co
Keywords: GF
Bibliography Sequence Number: 620
Author1: Church, R
Date: 1935
Title: Tables of Irreducible Polynomials for the First Four Prime Moduli
Periodical: Annals of Math
Issue & Page numbers: 36: 198-209
Keywords: GF
Bibliography Sequence Number: 621
Author1: Dickson, Leonard E
Date: 1896
Title: Analytic Functions Suitable to Represent Substitutions
Periodical: Amer. J. Math
Issue & Page numbers: 18: 210-218
Keywords: GF
Bibliography Sequence Number: 622
Author1: Dickson, Leonard E
Date: 1896-1897
Title: The Analytic Representation of Substitutions of a Power of a Prime Number of
Letters with a Discussion of the Linear Group
Periodical: Annals of Math
Issue & Page numbers: 11: 65-120,161-183
Keywords: GF
Bibliography Sequence Number: 623
Author1: Fryer, K. D
Date: 1955
Title: Notes on Permutations in a Finite Field
Periodical: Proc. Amer. Math. Soc
Issue & Page numbers: 6: 1-2
Keywords: Keywords: GF
Bibliography Sequence Number: 624
Author1: Nobauer, W
Date: 1968
Title: Uber Eine Klasse von Permutationpolynomen und die Dadurch Dargestellten
Gruppen
Periodical: J. Reine Agnew. Math
Issue & Page numbers: 231: 216-219
Bibliography Sequence Number: 625
Author1: Redei, L
Date: 1946-1948
Title: Uber Eindeutig Umkehrbare Polynome in Endlichen Korpern
Periodical: Acti Sci. Math. Szeged
Issue & Page numbers: 11: 85-92
Bibliography Sequence Number: 626
Author1: Stahnhe, Wayne
Date: 1973
Title: Primitive Binary Polynomials
Periodical: Mathematics of Computation
Issue & Page numbers: 27: 977-980
Bibliography Sequence Number: 627
Author1: Swift, J. D
Date: 1960
Title: Construction of Galois Fields of Characteristic Two and Irreducible Polynomials
Periodical: Mathematics of Computation
Issue & Page numbers: 14: 99-103
Bibliography Sequence Number: 628
Author1: Weinberger, E. B
Date: 1950
Title: The Determination and Group Properties of Minimum Functions in a Galois Field
Publisher: Ph.D. Thesis, Univ. of Pittsburgh
Keywords: GF
Bibliography Sequence Number: 629
Author1: Wells, Charles
Date: 1967
Title: Groups of Permutation Polynomials
Periodical: Monatsh. Math
Issue & Page numbers: 71: 248-262
Keywords: GF
Bibliography Sequence Number: 630
Author1: Williams, K. S
Date: 1971
Title: Note on Dickson's Permutation Polynomials
Periodical: Duke Math. J
Issue & Page numbers: 38: 659-665
Keywords: GF
Bibliography Sequence Number: 631
Author1: Levine, Jack
Date: 1963
Title: Analysis of the case n=3 in Algebraic Cryptography with Involutory Key-Matrix and
Known Alphabet
Periodical: Jour. fuer die Reine und Angewandte Mathematik
Issue & Page numbers: 213: 1-30
Keywords: GF
Bibliography Sequence Number: 632
Author1: Von Neumann, ?
Author2: Morgenstern, ?
Date: 47
Title: The Theory of Games
Bibliography Sequence Number: 633
Author1: Doob, J. L
Date: 1941
Title: Probility as Measure
Periodical: Annals of Math. Stat
Issue & Page numbers: 12: 206-214
Bibliography Sequence Number: 634
Author1: Hopf, E
Date: 1934
Title: On Causality, Statistics, and Probability
Periodical: Journal of Math. and Physics
Issue & Page numbers: 13: 51-102
Bibliography Sequence Number: 635
Author1: Cohn, H
Date: 1962
Title: A Second Course in Number Theory
Publisher: NY: John Wiley & Sons
Keywords: RSA
Comments: pages 13-18
Bibliography Sequence Number: 636
Author1: Nagell, T
Date: 1951
Title: Introduction to Number Theory
Publisher: NY: John Wiley & Sons
Keywords: RSA
Bibliography Sequence Number: 637
Author1: Mairson, H. G
Date: 1977
Title: Some New Upper Bounds on the Generation of Prime Numbers
Periodical: CACM
Issue & Page numbers: 20,9 (Sep):664-669
Keywords: PRIMES
Bibliography Sequence Number: 638
Author1: Blakley, G. R
Author2: Borosh, I
Date: 79
Title: Rivest-Shamir-Adleman Public Key Cryptosystems do not Always Conceal
Messages
Publisher: in Computers and Mathematics with Applications; volume 5
Bibliography Sequence Number: 639
Author1: Hewitt, Edwin
Date: 1976
Title: Certain Conguences that Hold Identically
Periodical: American Mathematical Monthly
Issue & Page numbers: 83: 270-271
References:
010
Bibliography Sequence Number: 640
Author1: Livingstone, A. E
Author2: Livingstone, M. L
Date: 78
Title: The Conguence a**(r+s) = a**r (mod m)
Periodical: American Mathematical Monthly
Issue & Page numbers: 85: 79-100
Bibliography Sequence Number: 641
Author1: Monier, L
Date: 1978
Title: Evaluation and Comparison of Two Efficient Probabilistic Primality Testing
Algorithms
Periodical: Rapport de Recherche no. 20
Comments: Equipe de Recherche Associee Au C.N.R.S. no. 452
Comments: "Al Khowarizmi" Laboratoire de Rescherche en Informatique
Bibliography Sequence Number: 642
Author1: Editor
Date: 1979
Title: None
Periodical: Scientific American
Issue & Page numbers: 240, 1 (Jan): 85,88
Keywords: primes
Comments: concerns 25th Mersenne Prime
Bibliography Sequence Number: 643
Author1: Brillouin, L
Date: 1962
Title: Science and Information Theory, 2nd Edition
Publisher: London: Academic Press
Bibliography Sequence Number: 644
Author1: Keyes, R. W
Date: 1975
Title: Physical Limits in Digital Electronics
Periodical: Proceedings of the IEEE
Issue & Page numbers: 63 (May): 740-747
Bibliography Sequence Number: 645
Author1: National Bureau of Standards
Date: 1976
Title: Report of the 1976 Workshop on Estimation of Significant Advances in Computer
Technology
Publisher: NBSIR 76-1189
Comments: P. Meissner author?
Bibliography Sequence Number: 646
Author1: Erdos, P
Date: 1960
Title: On Almost Primes
Periodical: American Mathematical Monthly
Issue & Page numbers: 57:404-407
Keywords: PRIMES
Bibliography Sequence Number: 647
Author1: McCarthy, J
Date: 1975
Title: unknown
Periodical: CACM
Issue & Page numbers: 18, 2 (Feb): 131-132
Bibliography Sequence Number: 648
Author1: Hoffman, Lance J. editor
Date: 1973
Title: Security and Privacy in Computer Systems
Publisher: Los Angeles, CA: Melville Publ
Comments: pages 99-123 is #538
Bibliography Sequence Number:
Bibliography Sequence Number: 650
Author1: Davis, Martin
Date: 1973
Title: Hilbert's Tenth Problem is Unsolvable
Periodical: American Mathematical Monthly
Issue & Page numbers: 80, 3 (March): 233-269
Bibliography Sequence Number: 651
Author1: Merkhofer, Lee W
Author2: Engle, Steve B
Author3: Wood, Charles C
Date: 1980
Title: Decision Analysis Applied to a Technology Assessment of Public Key
Cryptographic Systems
Periodical: ASEE Annual Conference Proceedings
Issue & Page numbers: 1-8
Keywords: RSA
Comments: note error that I found on page 4 - RSA PKC key size should be
Comments: '200 digits' not '200 bits' (Charles Wood verifies the error in
Comments: private communication of 13Jun80
References:
002
100
652
653
Bibliography Sequence Number: 652
Author1: Merkle, Ralph C
Date: 1980
Title: Protocols for Public Key Cryptosystems
Periodical: Bell Northern Research
Issue & Page numbers: 29-Jan-80
Comments: Palo Alto, CA
Bibliography Sequence Number: 653
Author1: Shine, L. J
Date: 1979
Title: Data and Voice Encryption
Publisher: International Resource Development Inc.
Comments: March
Bibliography Sequence Number: 654
Author1: General Services Administration
Date: 1977
Title: Federal Standard 1027 (proposed): Telecommunications: Security Requirements for
use of the DES
Publisher: General Services Administration
Keywords: DES
Bibliography Sequence Number: 655
Author1: National Bureau of Standards
Date: 1978
Title: NBS Special Publication 500-21 (two volumes)
Publisher: NBS
Comments: Includes "Design Alternatives for Computer Network Security" and
Comments: "The Network Security Center: A System Level Approach to Computer
Security"
Bibliography Sequence Number: 656
Author1: National Bureau of Standards
Date: 1975
Title: Guidelines for Implementing and Using the NBS DES
Publisher: NBS (Draft)
Bibliography Sequence Number: 657
Author1: National Bureau of Standards
Date: 1978
Title: Computer Security and the DES, NBS Special Publicatin 500-7
Publisher: NBS
Comments: Keywords: DES
Bibliography Sequence Number: 658
Author1: Berlekamp, Elwyn R
Date: 1970
Title: Factoring Polynomials over Large Finite Fields
Periodical: Mathematics of Computation
Issue & Page numbers: 24:713-735
Bibliography Sequence Number: 659
Author1: Rabin, Michael O
Date: 1978
Title: Digitalized Signatures
Publisher: in Foundations of Secure Computations, R. Lipton and R. DeMillo editors;
NY: Academic Press
Bibliography Sequence Number: 660
Author1: Rabin, Michael O
Date: 19??
Title: Probabilistic Algorithms in Finite Fields
Periodical: Submitted for Publication
Bibliography Sequence Number: 661
Author1: Kent, Steve T
Date: 1977
Title: Encryption-Based Protection for Interactive User/Computer Communication
Periodical: Proc. Fifth Data Communication Symp.
Issue & Page numbers: 5-7 to 5-13
Comments: NY: ACM
Bibliography Sequence Number: 662
Author1: Pohlig, Stephen C
Date: 19??
Title: Algebraic and Combinatoric Aspects of Cryptography
Publisher: Ph.D. dissertation SEL-77-038 and Tech. Rep. No. 6602-1, Stanford, CA:
Stanford Electron. Labs.
Bibliography Sequence Number: 663
Author1: Flynn, Robert
Author2: Campasano, Anthony S
Date: 78
Title: Data Dependent Keys for a Selective Encryption Terminal
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 47:1127-1129
Bibliography Sequence Number: 664
Author1: Konfelder, L. M
Date: 19??
Title: A Method of Certification
Publisher: Cambridge, MA: MIT Lab. Comp. Sci. Tech. Rep.
Bibliography Sequence Number: 665
Author1: Montgomery, W. A
Date: 1977
Title: Measurements of Sharing in MULTICS
Periodical: Proc. 6th Symp. on Operating Syst. Principles, Special Issue, Operating Syst.
Rev. (ACM)
Issue & Page numbers: 11, 5 (Nov):85-90
Bibliography Sequence Number: 666
Author1: Rivest, Ronald L
Author2: Adleman, Leonard M
Author3: Dertouzos, M. L
Date: 1978
Title: On Data Banks and Privacy Homomorphisms
Publisher: in Foundations of Secure Computation; R. DeMillo et al Editors; NY:
Academic Press
Bibliography Sequence Number: 667
Author1: U.S. Patent Office
Date: 1937
Title: Patent No. 2,089,603: Ciphering Machine (M-209)
Publisher: Assigned to Boris Hagelin 10-AUG-37
Keywords: PATENT
Bibliography Sequence Number: 668
Author1: Bolt Beranek and Newman Inc
Date: 1978
Title: Report 1822: Interface Message Processor: Specification for the Interconnection of
a Host >and an IMP
Publisher: BBN available from NTIS as No. ADA 055 996 for $9.50
Keywords: NSA
Comments: Appendix H: Interfacing a Host to a Private Line Interface
Comments: (the PLI supports the KG-34 (Key Generator) and gives
Comments: some tidbits concerning operational considerations such as Red/Black
environments,
Comments: TEMPEST (leakage of secure data by radiation), COMSEC/TRANSEC, etc.
Bibliography Sequence Number: 669
Author1: American Telephone and Telegraph Company
Date: 1974
Title: 303 Type Wideband Data Stations
Publisher: Bell System Data Communications Technical Reference
Length: 39
Keywords: NSA
Bibliography Sequence Number: 670
Author1: Gaines, R. S
Author2: Shapiro, R. A
Date: 78
Title: Some Security Principles and Their Application to Computer Security
Publisher: in Foundations of Secure Computation; R.A. DeMillo et. al editors; NY:
Academic Press
Length: 223-236
Comments: also in Oper. Syst. Rev. 12,3 (July):19-28
Bibliography Sequence Number: 671
Author1: Culik II, K
Author2: Maurer, H. A
Date: 1979
Title: Secure Information Storage and Retrieval Using New Results in Cryptography
Periodical: Information Processing Letters
Issue & Page numbers: 8,4:181-186
Bibliography Sequence Number: 672
Author1: Shamir, Ali
Date: 1979
Title: On the Cryptocomplexity of Knapsack Systems
Publisher: MIT/LCS/TM-129
References:
004
403
110
056
383
103
005
388
412
673
Bibliography Sequence Number: 673
Author1: Stockmeyer, L
Date: 1976
Title: The Polynomial-Time Hierarchy
Periodical: TCS
Issue & Page numbers: October
Bibliography Sequence Number: 674
Author1: Merkhofer, Lee W
Author2: Wood, Charles C
Date: 80
Title: Private Communication 27-Aug-80 concerning A Technology Assessment of Public
Key Cryptosystems
Publisher: .
Bibliography Sequence Number: 675
Author1: Marsh, D. C. B
Date: 1970
Title: Cryptology as a Senior Seminar Topic
Periodical: American Mathematical Monthly
Issue & Page numbers: 77:761-764
References:
871
404
165
167
846
Bibliography Sequence Number: 676
Author1: Kruh, Louis
Date: 1971
Title: The Cryptograph that was Invented Three Times
Periodical: The Retired Officer
Issue & Page numbers: April
Bibliography Sequence Number: 677
Author1: Copland, Miles
Date: 1975
Title: Beyond Cloak and Cipher
Publisher: NY: Pennacle Books
Comments: pages 364-366 concern Vigenere with random one time pad; accompanying
Comments: text should be ignored.
Bibliography Sequence Number: 678
Author1: Adleman, Leonard M
Author2: Manders, K
Date: 1977
Title: Reducibility, Randomness, and Intractibility (sic)
Periodical: Proc. ACM Symp. on Theory of Computing
Issue & Page numbers: 151-163
Bibliography Sequence Number: 679
Author1: Friedman, William F
Date: 1942
Title: American Army Field Codes in the American Expeditionary Forces During the First
World War
Publisher: Washington: GPO
Bibliography Sequence Number: 680
Author1: Marshall, Lt. Col. Max L. (ed.)
Date: 1965
Title: The Story of the U.S. Army Signal Corps
Publisher: NY: Franklin Watts
Bibliography Sequence Number: 681
Author1: Myer, Brig. General Albert J
Date: 1868
Title: A Manual of Signals
Publisher: NY: D. Van Nostrand
Bibliography Sequence Number: 682
Author1: U.S. Army Eastern Signal Corps Schools
Date: 1942
Title: Historical Sketch of the Signal Corps (1860-1941), Pamphlet No. 32
Publisher: Fort Monmouth: Eastern Signal Corps Schools
Bibliography Sequence Number: 683
Author1: U.S. Army Security Agency
Date: 19??
Title: Historical Background of the Signal Security Agency, Volume One: Codes and
Ciphers Prior to World
War I
Publisher: n.p.:n.n.
Comments: Date: 46 above
Bibliography Sequence Number: 684
Author1: U.S. Patent Office
Date: 1965
Title: Patent No. 0,050,946: Improvement in Signals
Publisher: Issued to A.J. Myer 14-Nov-1865
Comments: Date: 1865 above
Bibliography Sequence Number: 685
Author1: U.S. Patent Office
Date: 1877
Title: Patent No. 0,197,199: Cryptographic Device
Publisher: Issued to F.S. Baldwin 20-Nov-1877
Bibliography Sequence Number: 686
Author1: U.S. Patent Office
Date: 1924
Title: Patent No. 1,500,077: Coding Device
Publisher: Issued to S. H. Huntington 1-Jul-1924
Bibliography Sequence Number: 687
Author1: U.S. War Department, Office of the Chief Signal Officer
Date: 1916
Title: Document No. 500: Signal Book United States Army
Publisher: Washington: GPO
Bibliography Sequence Number: 688
Author1: U.S. War Department, Office of the Chief Signal Officer
Date: 1910
Title: Manual No. 6: Visual Signaling
Publisher: Washington: GPO
Bibliography Sequence Number: 689
Author1: Friedman, William F
Author2: Friedman, Elizabeth S
Date: 57
Title: The Shakespearean Ciphers Examined
Publisher: Cambridge: Cambridge University Press
Bibliography Sequence Number: 690
Author1: Gantmacher, F. R
Date: 1960
Title: The Theory of Matrices, Volume 2
Publisher: NY: Chelsea Pub. Co.
Bibliography Sequence Number: 691
Author1: U.S. Army Security Agency
Date: 1948
Title: History of the Signal Security Agency, Volume One: Organization. Part I,
1939-1945
Publisher: Washington: Army Security Agency
Bibliography Sequence Number: 692
Author1: U.S. Army Security Agency
Date: 1948
Title: Operating and Keying Instructions for Converter M-325(T)
Publisher: n.p.:Army Security Agency
Bibliography Sequence Number: 693
Author1: U.S. Congress. Senate. Committee on the Judiciary.
Date: 1956
Title: William F. Friedman
Publisher: Report No. 1815 (23-Apr-56) 84th Cong., 2d Session, Wash: GPO
Bibliography Sequence Number: 694
Author1: Adleman, Leonard M
Date: 1979
Title: Times, Space, and Randomness
Periodical: MIT/LCS/TM-131
Bibliography Sequence Number: 695
Author1: Friedman, William F
Date: 1925
Title: Analysis of a Mechanico-Electrical Cryptograph
Publisher: Washington: GPO (Part 1: 1934),(Part 2: 1935) original report 1925
Bibliography Sequence Number: 696
Author1: U.S. Patent Office
Date: 1928
Title: Patent No. 1,683,072: ??
Publisher: Issued to William F. Friedman 4-Sep-28
Bibliography Sequence Number: 697
Author1: Winkel, Brian J. editor
Date: 1977
Title: Epilogue
Periodical: Cryptologia
Issue & Page numbers: 1: 206-207
References:
061
070
Bibliography Sequence Number: 698
Author1: Winterbotham, Frederick W
Date: 1974
Title: The Ultra Secret
Publisher: NY: Harper and Row
Bibliography Sequence Number: 699
Author1: Raisbeck, G
Date: 1963
Title: Information Theory, An Introduction for Scientists and Engineers
Publisher: Cambridge, MA: MIT Press
Bibliography Sequence Number: 700
Author1: Wolfowitz, J
Date: 1961
Title: Coding Theorems of Information Theory
Publisher: Berlin: Springer-Verlag
Bibliography Sequence Number: 701
Author1: U.S. Patent Office
Date: 1958
Title: Patent No. 2,851,794: Cryptogrammic Coding and Decoding Apparatus
Publisher: Issued to Boris C. Hagelin 16-Sep-58
Bibliography Sequence Number: 702
Author1: Bartek, D. J
Date: 1974
Title: Encryption for Data Security
Periodical: Honeywell Computer Journal
Issue & Page numbers: 8, Author2: 86-89
Bibliography Sequence Number: 703
Author1: Computation Planning Inc. (COMPLAN)
Date: 1976
Title: CryptopaKeywords: Modular Subroutine Library for Cryptographic
Transformation
Publisher: Bethesda, MDate: COMPLAN
Bibliography Sequence Number: 704
Author1: U.S. Patent Office
Date: 1974
Title: Patent No. 3,798,359: Block Cipher Cryptographic System
Publisher: issued to ??? 19-Mar-74
Bibliography Sequence Number: 705
Author1: Girdansky, M. B
Date: 1971
Title: Data Privacy: Cryptology and the Computer at IBM Research
Periodical: IBM Research Reports
Issue & Page numbers: 7
A:4:12 pages
Bibliography Sequence Number: 706
Author1: Guillen, M
Date: 1976
Title: Automated Cryptography
Periodical: Science News
Issue & Page numbers: 110,12 (18 Sep):188-190
Bibliography Sequence Number: 707
Author1: Savage, John E
Date: 1976
Title: The Complexity of Computing
Publisher: NY: John Wiley
Keywords: Complexity
Bibliography Sequence Number: 708
Author1: U.S. Patent Office
Date: 1974
Title: Patent No. 3,796,830: Recirculating Block Cipher Cryptographic System
Publisher: issued to ??? 12-Mar-74
Bibliography Sequence Number: 709
Author1: Downey, ?
Date: 1977
Title: Multics Security Evaluatio: Password and File Encryption Techniques
Publisher: Hanscom AFB, MA: Electronic Systems Division Report ESD-TR-74-193,
Vol. III
Bibliography Sequence Number: 710
Author1: Kucera, H
Author2: Francis, W. N
Date: 67
Title: Computational Analysis of Present-Day American English
Publisher: Providence, RI: Brown University Press
Bibliography Sequence Number: 711
Author1: Lynch, Michael F
Date: 1977
Title: Variety Generation - A Reinterpretation of Shannon's Math. Theory of Comm. and
its Implications for Inf.
Sci.
Periodical: J. Amer. Soc. Info. Sci.
Issue & Page numbers: 28:19-25
Bibliography Sequence Number: 712
Author1: Brawley, Joel V
Author2: Levine, Jack
Date: 72
Title: Equivalence Classes of Linear Mappings with Applications to Cryptography, Parts I
and II
Periodical: Duke Math J.
Issue & Page numbers: 39:121-142
Bibliography Sequence Number: 713
Author1: Brawley, Joel V
Author2: Levine, Jack
Date: 72
Title: Equivalence Classes of Involutory Mappings
Periodical: Duke Math J.
Issue & Page numbers: 39:211-217
Bibliography Sequence Number: 714
Author1: Dickson, Leonard E
Date: 1952
Title: History of the Theory of Numbers, Volume I
Publisher: NY: Chelsea Pub. Co.
Bibliography Sequence Number: 715
Author1: Hoffman, Lance J
Date: 1977
Title: Modern Methods for Computer Security and Privacy
Publisher: NY: Prentice-Hall
Bibliography Sequence Number: 716
Author1: Enison, R. L
Author2: Bright, Herb S
Date: 76
Title: Improving the Use of a TLP Sequence as a Key Stream for VERNAM Encryption
with Cryptopak (tm)
Publisher: Bethesda, MD 20014: Computation Planning (COMPLAN) TN-913-8d
Comments: Herb Bright is President of Computation Planning
Bibliography Sequence Number: 717
Author1: U.S. Patent Office
Date: 1923
Title: Patent No. 1,657,411: (Enigma)
Publisher: Issued to Arthur Scherbius 6-Feb-23 as assignor for the German Firm
Chiffriermaschinen
Aktiengesellscaft
Bibliography Sequence Number: 718
Author1: U.S. Patent Office
Date: 1926
Title: Patent No. 1,705,641: (Enigma Enhancements)
Publisher: issued to Willi Korn May 1926 as assignor for the German Firm C.A.
Bibliography Sequence Number: 719
Author1: U.S. Patent Office
Date: 1926
Title: Patent No. 1,73,886
Publisher: issued to Willi Korn May 1926
Bibliography Sequence Number: 720
Author1: U.S. Patent Office
Date: 1929
Title: Patent No. 1,938,028
Publisher: issued to Willi Korn Nov 1929
Bibliography Sequence Number: 721
Author1: U.S. Patent Office
Date: 1929
Title: Patent No. 1,905,593
Publisher: issued to Willi Korn Nov 29
Bibliography Sequence Number: 722
Author1: Beesly, Patrick
Date: 1977
Title: Very Special Intelligence
Publisher: London: Hamish Hamilton
Bibliography Sequence Number: 723
Author1: Bertrand, Gustave
Date: 1973
Title: Enigma
Publisher: PariBibliography Sequence Number: Plon
Bibliography Sequence Number: 724
Author1: Brown, Anthony
Date: 1975
Title: Bodyguard of Lies
Publisher: NY: Harper and Row
Bibliography Sequence Number: 725
Author1: Randell, Brian
Date: 1976
Title: The Colossus
Publisher: Newcastle upon Tyne: Computing Laboratory, Universiry of Newcastle upon
Tyne Technical Report Series No. 90
Bibliography Sequence Number: 726
Author1: Stevenson, William
Date: 1976
Title: A Man Called Intrepid
Publisher: NY: Harcourt, Brace, Jovanovich
Bibliography Sequence Number: 727
Author1: Rapp, Richard T
Date: 1970
Title: Tuscan Diplomatic Letters: A Decipherment by Computer
Periodical: Library Chronicle
Issue & Page numbers: 36,1 (Winter):37-46
Bibliography Sequence Number: 728
Author1: Leighton, Albert C
Date: 1977
Title: Some Examples of Historical Cryptanalysis
Periodical: Historia Mathematica
Issue & Page numbers: 4:319-337
Bibliography Sequence Number: 729
Author1: unknown
Date: 1977
Title: The Growing Threat to Computer Security
Periodical: Business Week
Issue & Page numbers: 1 Aug:44-45
Bibliography Sequence Number: 730
Author1: unknown
Date: 1977
Title: "They Should Be Paranoid"
Periodical: Datamation
Issue & Page numbers: Sep: 29-30
Comments: Reprinted in Cryptologia 1: 400-401
Comments: Concerns Herb Bright, Pres. COMPALN
Bibliography Sequence Number: 731
Author1: U.S. Patent Office
Date: 1924
Title: Patent No. 1,503,250: Apparatus for and Method of Rapid Telegraphic Messages
Publisher: submitted by Paul E. Sabine and William F. Friedman 29-JUL-24
Keywords: PATENT
Bibliography Sequence Number: 732
Author1: U.S. Patent Office
Date: 1925
Title: Patent No. 1,522,775: Secret Signaling Apparatus for Automatically Enciphering
and Deciphering Messages
Publisher: submitted by William F. Friedman 13-JAN-25
Keywords: PATENT
Bibliography Sequence Number: 733
Author1: U.S. Patent Office
Date: 1924
Title: Patent No. 1,516,180: Secret Signaling System Employing Apparatus for
Automatically Enciphering and Deciphering Messages
Publisher: submitted by William F. Friedman and Louis M. Evans 18-NOV-24
Keywords: PATENT
Bibliography Sequence Number: 734
Author1: U.S. Patent Office
Date: 1922
Title: Patent No. 1,694,874: Method of Electrical Signaling
Publisher: submitted by William F. Friedman 10-JUL-22
Keywords: PATENT
Bibliography Sequence Number: 735
Author1: U.S. Patent Office
Date: 1925
Title: Patent No. 1,530,660: Printing Telegraph System
Publisher: submitted by William F. Friedman 24-MAR-25
Keywords: PATENT
Bibliography Sequence Number: 736
Author1: U.S. Patent Office
Date: 1926
Title: Patent No. 1,608,590: Alphabetical Chart
Publisher: submitted by William F. Friedman 30-NOV-26
Keywords: PATENT
Bibliography Sequence Number: 737
Author1: U.S. Patent Office
Date: 1929
Title: Patent No. 1,857,374: Cryptograph Enciphering and Deciphering Device
Publisher: submitted by George A. Graham, Louis M. Evans, and William F. Friedman
28-MAR-29
Keywords: PATENT
Bibliography Sequence Number: 738
Author1: U.S. Patent Office
Date: 1932
Title: Patent No. 2,028,772: Cryptographic System
Publisher: submitted by William F. Friedman and George A. Graham 23-JAN-32
Keywords: PATENT
Bibliography Sequence Number: 739
Author1: U.S. Patent Office
Date: 1933
Title: Patent Held in Secrecy: Converter M-134
Publisher: submitted by William F. Friedman 25-JUL-33
Keywords: PATENT
Bibliography Sequence Number: 740
Author1: U.S. Patent Office
Date: 1935
Title: Patent No. 2,080,416: Message Authenticating System
Publisher: submitted by William F. Friedman 26-JUN-35
Keywords: PATENT
Bibliography Sequence Number: 741
Author1: U.S. Patent Office
Date: 1935
Title: Patent No. 2,166,137: Electrical Switching Mechanism
Publisher: submitted by William F. Friedman 19-Aug-35
Keywords: PATENT
Bibliography Sequence Number: 742
Author1: U.S. Patent Office
Date: 1936
Title: Patent Held in SecreTitle: SIGABA (Converter M-134-C, ECM)
Publisher: submitted by William F. Friedman and Frank B. Rowlett 23-MAR-36
Keywords: PATENT
Bibliography Sequence Number: 743
Author1: U.S. Patent Office
Date: 1936
Title: Patent Held in SecreTitle: Converter M-134-T2
Publisher: submitted by William F. Friedman 23-OCT-36
Length: Date: 36 above
Keywords: PATENT
Bibliography Sequence Number: 744
Author1: U.S. Patent Office
Date: 1937
Title: Patent No. 2,224,646: Electronic Control System for Tabulating Cards, Documents,
and the Like
Publisher: submitted by William F. Friedman and Vernam E. Whitman 22-APR-37
Keywords: PATENT
Bibliography Sequence Number: 745
Author1: U.S. Patent Office
Date: 1937
Title: Patent No. 2,140,424: Cryptographic Device
Publisher: submitted by William F. Friedman 7-JUN-37
Keywords: PATENT
Bibliography Sequence Number: 746
Author1: U.S. Patent Office
Date: 1937
Title: Patent No. 2,139,676: Cryptographic Apparatus
Publisher: submitted by William F. Friedman 4-AUG-37
Keywords: PATENT
Bibliography Sequence Number: 747
Author1: U.S. Patent Office
Date: 1939
Title: Patent No. 2,395,863: Cryptographic Device [Strip Cipher Device M-138-A]
Publisher: submitted by William F. Friedman 19-OCT-39
Keywords: PATENT
Comments: used widely in WW II and afterwards
Bibliography Sequence Number: 748
Author1: U.S. Patent Office
Date: 1942
Title: Patent Held in SecreTitle: SIGCUM (Converter M-228)
Publisher: submitted by William F. Friedman and Frank B. Rowlett 16-MAY-42
Keywords: PATENT
Bibliography Sequence Number: 749
Author1: U.S. Patent Office
Date: 1943
Title: Patent No. 2,552,548: Facsimile Enciphering System
Publisher: submitted by William F. Friedman 6-MAR-43
Keywords: PATENT
Bibliography Sequence Number: 750
Author1: U.S. Patent Office
Date: 1943
Title: Patent No. 2,465,367: System for Enciphering Facsimiles
Publisher: submitted by William F. Friedman and Joseph O Mauborgne 12-MAR-43
Keywords: PATENT
Bibliography Sequence Number: 751
Author1: U.S. Patent Office
Date: 1944
Title: Patent No. 2,877,565: Electrical Cryptograph [Converter M-325]
Publisher: submitted by William F. Friedman 11-AUG-44
Keywords: PATENT
Bibliography Sequence Number: 752
Author1: U.S. Patent Office
Date: 1944
Title: Patent No. 2,518,458: Authenticating Device
Publisher: submitted by William F. Friedman 25-Aug-44
Keywords: PATENT
Bibliography Sequence Number: 753
Author1: Terrett, Dulany
Date: 1956
Title: The Signal CorpBibliography Sequence Number: The Emergency
Publisher: Washington: GPO
Bibliography Sequence Number: 754
Author1: Thompson, G. R
Author2: Harris, D. R
Date: 66
Title: The Signal Corps: The Outcome
Publisher: Washington: GPO
Bibliography Sequence Number: 755
Author1: U.S. Army Security Agency
Date: 1946
Title: Historical Background of the Signal Security Agency, Volume III, The Peace
1919-1939
Publisher: n.p.:n.n.
Bibliography Sequence Number: 756
Author1: U.S. Congress, House Committee on the Judiciary
Date: 1955
Title: William F. Friedman
Publisher: Report No. 260, 84th Congress, 1st Session, 21-MAR-55
Bibliography Sequence Number: 757
Author1: Magarell, Jack
Date: 1977
Title: A Cryptic Warning to Academe?
Periodical: Chronicle of Higher Education
Issue & Page numbers: 21-Nov-77:5-6
Bibliography Sequence Number: 758
Author1: Spiller, Roger J
Date: 1976
Title: Some Implications of ULTRA
Periodical: Military Affairs
Issue & Page numbers: ApriIssue & Page numbers: 49-54
Bibliography Sequence Number: 759
Author1: Deutch, Harold C
Date: 1977
Title: The Historical Impact of Revealing the Ultra Secret
Periodical: Parameters, Journal of the U.S. Army War College
Issue & Page numbers: 7,Author3: 16-54
Bibliography Sequence Number: 760
Author1: Korbonski, Steve
Date: 1977
Title: The True Story of Enigma: The German Code Machine in World War II
Periodical: East European Quarterly
Issue & Page numbers: 11,2 (Summer):227-234
Bibliography Sequence Number: 761
Author1: U.S. Army Security Agency
Date: 1946
Title: Historical Background of the Signal Security Agency, Volume Three: The Peace
1919-1939
Publisher: n.p.:n.n.
Bibliography Sequence Number: 762
Author1: Way, Peter
Date: 1977
Title: Codes and Ciphers
Publisher: London: Aldus Books
Length: 144 pages
Comments: Undercover: The Library of Espionage and Secret Warfare.
Comments: Series Coordinator John Mason. Cost is 3.95 Pounds.
Bibliography Sequence Number: 763
Author1: unknown
Date: 1977
Title: A Secrecy Machine for Traveling Businessmen
Periodical: Business Week
Issue & Page numbers: 13-Jun:42D
Bibliography Sequence Number: 764
Author1: unknown
Date: 1977
Title: Low Power Hand-Held Encryption Unit Defies Sophisticated Code-Breakers
Periodical: EDN
Issue & Page numbers: 20AUG:52-54
Bibliography Sequence Number: 765
Author1: Bennet, Charles H
Date: 1979
Title: On Random and Hard-to-Describe Numbers
Publisher: IBM Technical Report RC7483
Bibliography Sequence Number: 766
Author1: Hall Jr., Marshall
Date: 1959
Title: The Theory of Groups
Publisher: NY:Macmillan
Bibliography Sequence Number: 767
Author1: Meyer, Carl H
Author2: Tuchman, Walter L
Date: 78
Title: Putting Data Encryption to Work, Part I
Periodical: Mini-Micro Systems
Issue & Page numbers: Oct
Bibliography Sequence Number: 768
Author1: National Science Foundation
Date: 1978
Title: Computer Security
Periodical: MOSAIC
Issue & Page numbers: 9,4 (July/Aug):2-10
Bibliography Sequence Number: 769
Author1: Shapley, Deborah
Date: 1978
Title: Intelligence Agency Chief Seeks "Dialogue" with Academics
Periodical: Science
Issue & Page numbers: 202 (27OCT):407-410
Comments: Interview with Vice Admiral B.R. Inman, NSA Director
Keywords: NSA
References:
872
873
376
390
Bibliography Sequence Number: 770
Author1: Shapley, Deborah
Date: 1978
Title: NSA Slaps Secrecy Order on Inventors' Communications Patent
Periodical: SCIENCE
Issue & Page numbers: 8SEPeriodical: 891
A:893-894
Bibliography Sequence Number: 771
Author1: Jansson, B
Date: 1966
Title: Random Number Generators
Publisher: Stockholm: Victor Petterson's Bokindustri Aktiebolag
Bibliography Sequence Number: 772
Author1: Winkel, Brian J
Date: 1979
Title: Studies on Cryptology
Periodical: Cryptologia
Issue & Page numbers: Author3: 52-53
Keywords: NSA
References:
065
773
610
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
Bibliography Sequence Number: 773
Author1: Snyder, Samuel S
Date: 1977
Title: Influence of U.S. Cryptologic Organizations on the Digital Computer Industry
Publisher: ???
Length: 38
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-003
Bibliography Sequence Number: 774
Author1: unknown
Date: 19??
Title: Use of (CY/MSS ULTRA) by the United States War Department (1943-1945)
Publisher: ???
Length: 82
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-005
Bibliography Sequence Number: 775
Author1: unknown
Date: 19??
Title: Synthesis of Experiences in the use of ULTRA Intelligence by U.S. Army Field
Commands in the European Theater of Operations
Publisher: ???
Length: 29
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-006
Bibliography Sequence Number: 776
Author1: unknown
Date: 19??
Title: Staff Study on Converter M-325 (Short Title: SIGFOY)
Publisher: ???
Length: 4
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-007
Bibliography Sequence Number: 777
Author1: unknown
Date: 19??
Title: Battle of the Atlantic, Volume II, U-Boat Operations (Dec. 1942-May 1945)
Publisher: ???
Length: 411
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-008
Bibliography Sequence Number: 778
Author1: unknown
Date: 19??
Title: Allied Communication Intelligence and the Battle of the Atlantic, Volume I (Dec.
1942-May 1945)
Publisher: ???
Length: 94
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-009
Bibliography Sequence Number: 779
Author1: unknown
Date: 19??
Title: A Project History (1946) - History of Converter M-325 (Short Title: SIGFOY)
Publisher: ???
Length: 48
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-010
Bibliography Sequence Number: 780
Author1: unknown
Date: 19??
Title: The Role of Communications Intelligence in Submarine Warfare in the Pacific (Jan.
1943-Oct. 1943). 8 Volumes
Publisher: ???
Length: 2442
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-011
Bibliography Sequence Number: 781
Author1: unknown
Date: 19??
Title: The Tole of Radio Intelligence in the American-Japanese Naval War, 1943-1944. 4
Volumes
Publisher: ???
Length: 2279
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-012
Bibliography Sequence Number: 782
Author1: unknown
Date: 1945
Title: History of U.S. Strategic Air Force Europe vs. German Air Force
Publisher: ???
Length: 386
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-013
Bibliography Sequence Number: 783
Author1: unknown
Date: 1919
Title: Final Report of the Radio Intelligence Section, General Headquarters, American
Expeditionary Forces
Publisher: ???
Length: 56
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-014
Bibliography Sequence Number: 784
Author1: unknown
Date: 1945
Title: Notes on German Fuel Position by G-2 SHEAF
Publisher: ???
Length: 44
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-015
Bibliography Sequence Number: 785
Author1: unknown
Date: 1944
Title: The Need for New Legislation Against Unauthorized Disclosures of Communication
Intelligence Activities
Publisher: ???
Length: 110
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-016
Bibliography Sequence Number: 786
Author1: unknown
Date: 1945
Title: Allied Strategic Air Force Target Planning
Publisher: ???
Length: 66
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-017
Bibliography Sequence Number: 787
Author1: unknown
Date: 19??
Title: Blockade-Running Between Europe and the Far East by Submarines, 1942-1944
Publisher: ???
Length: 34
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-019
Bibliography Sequence Number: 788
Author1: unknown
Date: 1945
Title: Narrative, Combat Intelligence Center, Joint Intelligence Center, Pacific Ocean Area
Publisher: ???
Length: 22
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-020
Bibliography Sequence Number: 789
Author1: unknown
Date: 19??
Title: Controlled Agent Communications Activities, 1944-1945
Publisher: ???
Length: 462
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-021
Bibliography Sequence Number: 790
Author1: unknown
Date: 1945
Title: ULTRA and the U.S. Seventh Army
Publisher: ???
Length: 7
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-022
Bibliography Sequence Number: 791
Author1: unknown
Date: 1945
Title: Reports by U.S. Army ULTRA Representatives with Army Field Commands in the
European Theatre of
Operations. Parts I and II
Publisher: ???
Length: 206
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-023
Bibliography Sequence Number: 792
Author1: unknown
Date: 19??
Title: German Naval Communication Intelligence, Volume III, Battle of the Atlantic
Publisher: ???
Length: 144
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-024
Bibliography Sequence Number: 793
Author1: unknown
Date: 19??
Title: Technical Intelligence from Allied Communication Intelligence, Volume IV, Battle
of the Atlantic
Publisher: ???
Length: 102
Keywords: NSA
Comments: Accessioned by National Archives from NSA; available for $.20 per page as
No. SRH-025
Bibliography Sequence Number: 794
Author1: Lennon, Richard E
Date: 1978
Title: Putting Data Encryption to Work - Part II
Periodical: Mini-Micro Systems
Issue & Page numbers: DeComments: 84-88
Bibliography Sequence Number: 795
Author1: Walker, Bruce J
Author2: Blake, Ian F
Date: ??
Title: Computer Security and Protection Structures
Publisher: NY: Academic Press?
Comments: $16.50; not rated highly from a crypto standpoint in #250
Bibliography Sequence Number: 796
Author1: Walters, Richard C
Date: 1976
Title: Cryptology and Data Communications
Publisher: MIT AI Lab; Working Paper 136
Length: 21
References:
427
100
112
004
107
583
117
580
797
113
025
482
168
119
016
108
111
542
027
391
545
Bibliography Sequence Number: 797
Author1: Hellman, Martin E
Date: 1974
Title: The Information Theoretic Approach to Cryptography
Publisher: Stanford Univ. Information Systems Lab Pub.
Bibliography Sequence Number: 798
Author1: Rivest, Ronald L
Author2: Sherman, Alan T
Author3: Sipser, Michael
Date: 1981
Title: Towards a Formal Definition of Cryptographic Strength
Publisher: unpublished; see [MIT-ML]RIVEST;FOCS 103
References:
678
694
765
799
800
801
802
803
804
805
806
807
808
809
004
006
107
810
811
812
359
605
813
814
815
816
578
113
817
025
818
819
820
056
821
101
822
383
049
494
103
002
707
048
672
413
389
027
106
575
115
Bibliography Sequence Number: 799
Author1: Bennet, Charles H
Author2: Gill, John
Date: 1979
Title: Relative to a Random Oracle A, PA = NPA = co-NPA with Probability 1
Publisher: IBM Research Report RC7925
Keywords: complexity
Bibliography Sequence Number: 800
Author1: Brassard, G
Author2: Fortune, S
Author3: Hopcroft, J
Date: 78
Title: A Note on Cryptography and NP inter CoNP-P
Publisher: Cornell Univ. Comp. Sci. Dept. Tech. Rep. TR78-338
Keywords: complexity
Bibliography Sequence Number: 801
Author1: Brassard, G
Date: 1979
Title: A Note on the Compexity of Cryptography
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-25 (March):232-233
Keywords: complexity
Bibliography Sequence Number: 802
Author1: Brassard, G
Date: 1979
Title: Relativized Cryptography
Periodical: Proc. 20th IEEE Symp. on Foundations of Computer Science
Issue & Page numbers: 383-391
Keywords: complexity
Bibliography Sequence Number: 803
Author1: Brassard, G
Date: 1980
Title: A Time-Luck Tradeoff in Cryptography
Periodical: Proc. 21st IEEE Symp. on Foundations of Computer Science
Issue & Page numbers: 380-386
Keywords: complexity
Bibliography Sequence Number: 804
Author1: Chaitin, G. J
Date: 1966
Title: On the Length of Programs for Computing Finite Binary Sequences
Periodical: Journal of the ACM
Issue & Page numbers: 13: 547-569
Keywords: complexity
Bibliography Sequence Number: 805
Author1: Chaitin, G. J
Date: 1975
Title: Randomness and Mathematical Proof
Periodical: Scientific American
Issue & Page numbers: 232 (May):47-52
Keywords: complexity
Bibliography Sequence Number: 806
Author1: Chaitin, G. J
Date: 1975
Title: A Theory of Program Size Formally Identical to Information Theory
Periodical: Journal of the ACM
Issue & Page numbers: 22 (July):329-340
Keywords: complexity
Bibliography Sequence Number: 807
Author1: Chaitin, G. J
Date: 1976
Title: Algorithmic Entropy of Sets
Periodical: Comp. Maths. with Apps.
Issue & Page numbers: Author2: 233-245
Keywords: complexity
Bibliography Sequence Number: 808
Author1: Chaum, David L
Date: 1981
Title: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
Periodical: CACM
Issue & Page numbers: 24 (Feb):84-88
Keywords: complexity
Bibliography Sequence Number: 809
Author1: Demers, A
Author2: Kelemen, C
Author3: Reusch, B
Date: 76
Title: On Encryption Systems Realized by Finite Transducers
Publisher: Cornell Univ. Comp. Sci. Dept. Tech. Rep. 76-291
Keywords: complexity
Bibliography Sequence Number: 810
Author1: Even, S
Author2: Yacobi, Y
Date: 1980
Title: An Observation Concerning the Complexity of Problems with Few Solutions and its
Application to
Cryptography
Publisher: Technion Comp. Sci. Tech. Rep. 167
Keywords: complexity
Bibliography Sequence Number: 811
Author1: Even, S
Author2: Yacobi, Y
Date: 1980
Title: Cryptocomplexity and NP-completeness
Publisher: Technion Comp. Sci. Tech. Rep. 172
Keywords: complexity
Bibliography Sequence Number: 812
Author1: Even, S
Author2: Yacobi, Y
Date: 1980
Title: Relations among Public Key Signature Systems
Publisher: Technion Computer Science Technical Report 175
Keywords: complexity
Bibliography Sequence Number: 813
Author1: Gardner, Martin
Date: 1979
Title: Mathematical Games
Periodical: Scientific American
Issue & Page numbers: Nov:24-34
Keywords: complexity
Bibliography Sequence Number: 814
Author1: Garey, M. R
Author2: Johnson, D. S
Date: 1979
Title: Computers and Intractibility
Publisher: Freedman and Company
Keywords: complexity
Bibliography Sequence Number: 815
Author1: Gewirtz, William L
Date: 1974
Title: Investigations in the Theory of Descriptive Complexity
Publisher: New York Univ. Ph.D. Thesis, Courant Institute of Math. Sciences Rep.
NSO-5
Keywords: complexity
Bibliography Sequence Number: 816
Author1: Gordon, John
Date: 1980
Title: Use of Intractable Problems in Cryptography
Periodical: Information Privacy
Issue & Page numbers: 2 (Sep):178-184
Keywords: complexity
Bibliography Sequence Number: 817
Author1: Hopcroft, John E
Author2: Ullman, Jeffrey
Date: 1979
Title: Introduction to Automata Theory, Languages, and Computation
Publisher: Reading: Addison Wesley
Keywords: complexity
Bibliography Sequence Number: 818
Author1: Katseff, Howard P
Author2: Sipser, Michael
Date: 1979
Title: Several Results in Program Size Complexity
Periodical: Proc. 18th Symp. on Foundations of Computer Science
Issue & Page numbers: 82-89
Keywords: complexity
Bibliography Sequence Number: 819
Author1: Kolmogorov, A
Date: 1965
Title: Three Approaches to the Quantitative Definition of Information
Periodical: Problems of Inform. Transmission
Issue & Page numbers: 1 (Jan-Mar):1-7
Keywords: complexity
Bibliography Sequence Number: 820
Author1: Lamport, L
Date: 1979
Title: Constructing Digital Signatures from a One-Way Function
Publisher: SRI International Technical Report CSL-98
Keywords: complexity
Bibliography Sequence Number: 821
Author1: Lieberherr, Karl
Date: 1980
Title: Uniform Complexity and Digital Signatures
Publisher: Princeton University Department of EE and CS Tech. Rep.
Keywords: complexity
Bibliography Sequence Number: 822
Author1: Merkle, Ralph C
Date: 1979
Title: Secrecy, Authentication, and Public Key Systems
Publisher: Stanford Information Systems Lab. Tech. Rep. 1979-1
Keywords: complexity
Bibliography Sequence Number: 823
Author1: Poe, Edgar Allen
Date: 1841
Title: A Few Words on Secret Writing
Periodical: Graham's Magazine
Issue & Page numbers: 19 (July):33-38
Bibliography Sequence Number: 824
Author1: Wimsatt Jr., William K
Date: 1943
Title: What Poe Knew About Cryptography
Periodical: Publications of the Modern Language Association
Issue & Page numbers: 58:754-779
Bibliography Sequence Number: 825
Author1: Bobrow, D. G
Author2: Raphael, B
Date: 1974
Title: New Programming Languages for Artificial Intelligence Research
Periodical: ACM Computing Surveys
Issue & Page numbers: 6:155-174
Comments: "SNOBOL-like prog. lang. spec. designed for cryptanalysis" (096)
Bibliography Sequence Number: 826
Author1: Golub, G
Date: 1969
Title: Singular Value Decomposition of a Complex Matrix
Periodical: CACM
Issue & Page numbers: 12: 564-565
Comments: Algorithm 358
Bibliography Sequence Number: 827
Author1: Golub, G
Author2: Reinsch, C
Date: 1970
Title: Singular Value Decomposition and Least Squares Solutions
Periodical: Numerische Mathematik
Issue & Page numbers: 14:403-420
Bibliography Sequence Number: 828
Author1: Harris, F. A
Date: 1959
Title: Solving Simple Substitution Ciphers
Publisher: Bethesda, MDate: American Cryptogram Assoc.
Comments: Orig. 1943
Bibliography Sequence Number: 829
Author1: Silver, R
Date: 1959
Title: Decryptor
Periodical: MIT Lincoln Lab Quarterly Progress Report, Division 5 (Information
Processing)
Issue & Page numbers: (Dec): 57-60
Bibliography Sequence Number: 830
Author1: Lauer, Rudolph F
Date: 1981
Title: Computer Simulation of Classical Substitution Cryptographic Systems
Publisher: Laguna Hills, CA: Aegean Park Press
Length: 111 pages
Keywords: computer
Comments: Aegean #32 $19.84
References:
828
762
831
025
142
029
832
471
833
078
070
060
063
064
079
202
203
205
548
549
550
091
059
096
835
829
547
141
300
061
268
281
836
067
610
084
098
190
242
837
072
838
128
129
252
223
122
695
839
840
123
150
251
841
277
842
161
097
662
321
017
043
843
713
844
845
166
165
167
846
631
282
283
712
350
311
326
849
Bibliography Sequence Number: 831
Author1: Norman, Bruce
Date: 1973
Title: Secret Warfare: The Battle of Codes and Ciphers
Publisher: Washington: Acropolis Books Ltd
Bibliography Sequence Number: 832
Author1: Bielewicz, Julian A
Date: 1976
Title: Secret Language: Communicating in Codes and Ciphers
Publisher: Australia: Holt, Rinehart and Winston
Bibliography Sequence Number: 833
Author1: Zanotti, Mario
Date: 1928
Title: Cryptography: Secret Writing
Publisher: Milan
Bibliography Sequence Number: 834
Author1: Nance, Richard E
Author2: Overstreet Jr., Claude
Date: 1978
Title: Some Experimental Observations on the Behavior of Composite Random Number
Generators
Publisher: Operations Research
Length: 26,5 (Sep-Oct)
Keywords: random
Bibliography Sequence Number: 835
Author1: Matyas, Stephen M
Date: 1974
Title: A Computer Oriented Cryptanalytic Solution for Multiple Substitution Enciphering
Systems
Publisher: Univ. of Iowa Ph.D. Thesis
Bibliography Sequence Number: 836
Author1: Candela, Rosario
Date: 1946
Title: Isomorphism and its Application in Cryptanalytics
Publisher: NY: Cardanus Press
Comments: Parts II and IV have been reprinted as Appendix II of Ref. 830[Lau81]
Bibliography Sequence Number: 837
Author1: Garlinski, J
Date: 1979
Title: The Enigma War
Publisher: NY: Charles Scribner's Sons
Bibliography Sequence Number: 838
Author1: Jacobs, W
Date: 1977
Title: Cipher Machines and Mathematics
Periodical: Interdisciplinary Science Reviews
Issue & Page numbers: 2,Author3: 277
Bibliography Sequence Number: 839
Author1: Johnson, B
Date: 1978
Title: The Secret War
Publisher: NY: Methuen
Bibliography Sequence Number: 840
Author1: Lewin, R
Date: 1978
Title: Ultra Goes to War
Publisher: NY: McGraw-Hill
Bibliography Sequence Number: 841
Author1: Luebbert, W. F
Author2: Stoll, E. L
Date: 1977
Title: COLOSSUS and the Ultra Secret
Periodical: Abacus
Issue & Page numbers: 11
Bibliography Sequence Number: 842
Author1: Campaigne, H
Date: 19??
Title: Cryptanalysis
Periodical: Encyclopedia of Computer Science and Technology
Issue & Page numbers: 6:434
A:NY: Marcel Dekker
Bibliography Sequence Number: 843
Author1: Mann, B
Date: 1961
Title: Cryptography with Matrices
Periodical: The Pentagon
Issue & Page numbers: 21 (Fall): 3
Bibliography Sequence Number: 844
Author1: Levine, Jack
Date: 1958
Title: Some Further Methods in Algebraic Cryptography
Periodical: Journal Elisha Mitchell Science Society
Issue & Page numbers: 74:110
Bibliography Sequence Number: 845
Author1: Levine, Jack
Date: 1961
Title: Cryptographic Slide Rules
Periodical: Mathematics Magazine
Issue & Page numbers: (Sep-Oct):322
Bibliography Sequence Number: 846
Author1: Levine, Jack
Author2: Nahikian, H. M
Date: 1962
Title: On the Construction of Involutory Matrices
Periodical: American Mathematical Monthly
Issue & Page numbers: 69:267-272
Bibliography Sequence Number: 847
Author1: Pless, Vera
Date: 78
Title: Error Correcting CodeBibliography Sequence Number: Practical Origins and
Mathematical Implications
Periodical: American Mathematical Monthly
Issue & Page numbers: 85: 90-94
Bibliography Sequence Number: 848
Author1: unknown
Date: 76
Title: unknown
Periodical: Science
Issue & Page numbers: 8OcTitle: 166
Bibliography Sequence Number: 849
Author1: Konheim, Alan G
Date: 1981
Title: Cryptography: A Primer
Publisher: NY: John Wiley and Sons
Bibliography Sequence Number: 850
Author1: Johnson, Brian
Date: 1978
Title: The Secret War
Publisher: London: British Broadcasting Company
Bibliography Sequence Number: 851
Author1: Jones, Reginald Victor
Date: 1978
Title: Most Secret War
Publisher: London: Hamish Hamilton
Comments: American edition: The Wizard War: British Scientific Intelligence
1939-1945
Comments: NY: Coward, McCann & Geoghegan 1978
Bibliography Sequence Number: 852
Author1: Lewin, Ronald
Date: 1978
Title: Ultra Goes to War
Publisher: London: Hutchinson
Bibliography Sequence Number: 853
Author1: Slater, N. B
Date: 1967
Title: Gaps and Steps for the Sequence nTheta mod 1
Periodical: Proc. Camb. Phil. Soc.
Issue & Page numbers: 1115-1123
Bibliography Sequence Number: 854
Author1: Slater, N. B
Date: 1964
Title: Distribution Problems and Physical Applications
Periodical: Compositio Math
Issue & Page numbers: 176-183
Bibliography Sequence Number: 855
Author1: Metelski, John
Date: 1978
Title: Telecommunications Privacy and the Information Society
Periodical: Telecommunications Policy
Issue & Page numbers: DeComments: 327-335
Bibliography Sequence Number: 856
Author1: Hull, T. E
Author2: Dobell, A. R
Date: 1962
Title: Random Number Generators
Periodical: SIAM Review
Issue & Page numbers: 4:330-354
Bibliography Sequence Number: 857
Author1: Marsaglia, G
Date: 1972
Title: The Structure of Linear Congruential Sequences
Periodical: in Applications of Number Theory to Numerical Analysis ed. S.K. Zaremba
NY: Academic Press
Bibliography Sequence Number: 858
Author1: Leighton, Albert C
Date: 1979
Title: Review of David Shulman's "Annotated Bibliography of Cryptography"
Periodical: Historica Mathematica
Issue & Page numbers: May:209-212
References:
088
Bibliography Sequence Number: 859
Author1: Hindin, Harvey J
Date: 1979
Title: LSI-Based Data Encryption Discourages the Data Thief
Periodical: Electronics
Issue & Page numbers: 21Jun:107-120
Bibliography Sequence Number: 860
Author1: Budzinski, Robert
Date: 1979
Title: Single-Chip Computer Scrambles for Security
Periodical: Electronics
Issue & Page numbers: 19JuIssue & Page numbers: 140-144
Bibliography Sequence Number: 861
Author1: Beaston, John
Date: 1979
Title: One-Chip Data-Encryption Unit Accesses Memory Directly
Periodical: Electronics
Issue & Page numbers: 2Aug:126-129
Bibliography Sequence Number: 862
Author1: Meyer, Carl H
Date: 78
Title: Ciphertext/Plaintext and Ciphertext/Key Dependence vs Number of Rounds for the
Data Encryption
Standard
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 47: 1119-1126
Bibliography Sequence Number: 863
Author1: Burris, Harrison R
Date: 76
Title: Computer Network Cryptography Engineering
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 45: 91-96
Bibliography Sequence Number: 864
Author1: Michelman, Eric H
Date: 79
Title: The Design and Operation of Public-Key Cryptosystems
Periodical: Proc. AFIPS NCC
Issue & Page numbers: 48: 305-311
Bibliography Sequence Number: 865
Author1: Holmes, Captain W. J
Date: 79
Title: Double-Edged Secrets
Publisher: Naval Institute Press
Length: 233 pages
Comments: $11.50
Bibliography Sequence Number: 866
Author1: unknown
Date: 74
Title: unknown
Periodical: Datamation
Issue & Page numbers: Feb: 90
Bibliography Sequence Number: 867
Author1: unknown
Date: 75
Title: unknown
Periodical: Datamation
Issue & Page numbers: March: 107
Bibliography Sequence Number: 868
Author1: Kahn, David
Date: 76
Title: unknown
Periodical: Playboy
Issue & Page numbers: ???
Bibliography Sequence Number: 869
Author1: National Security Agency
Date: 79
Title: Security Agency Denies Tampering with DES
Periodical: IEEE Spectrum
Issue & Page numbers: 16, 7 (July): 39
Keywords: NSA
Bibliography Sequence Number: 870
Author1: Fak, Viiveke
Date: 79
Title: Repeated Use of Codes Which Detect Deception
Periodical: IEEE Transactions on Information Theory
Issue & Page numbers: IT-25, 2 (March): 233-234
Bibliography Sequence Number: 871
Author1: Andree, R. V
Date: 52
Title: Cryptanalysis
Periodical: Scripta Math
Issue & Page numbers: 18: 5-16
Bibliography Sequence Number: 872
Author1: unknown
Date: 78
Title: unknown
Periodical: Science
Issue & Page numbers: 8Sep: 891
Bibliography Sequence Number: 873
Author1: unknown
Date: 77
Title: unknown
Periodical: Science
Issue & Page numbers: 9Sep: 1061
Bibliography Sequence Number: 874
Author1: unknown
Date: 76
Title: unknown
Periodical: Science
Issue & Page numbers: 4June: 989
Return to
Cryptosystems Journal Home Page
Next Page
("Download Cryptosystem Programs")
Copyright © 1996 Cryptosystems Journal.
Most recent update on 28-SEP-96.