Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "4.114",
%%%     date            = "02 November 2023",
%%%     time            = "07:28:45 MDT",
%%%     filename        = "cryptography.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "26725 29879 122963 1260134",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Blowfish; cipher;
%%%                        Clipper; code breaking; cracking;
%%%                        cryptanalysis; crypto; cryptobytes;
%%%                        cryptography; cryptology; cryptosystem; data
%%%                        encryption algorithm; decryption; DES;
%%%                        Diffie; digital signature; encryption;
%%%                        Hellmann; International Data Encryption
%%%                        Algorithm (IDEA); Kahn; Kerberos; key escrow;
%%%                        kleptography; PGP; Pretty Good Privacy;
%%%                        Rivest; RSA; Schneier; Smart Card;
%%%                        steganography; Twofish; Zimmermann",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is bibliography of publications on
%%%                        cryptography and related subjects for the
%%%                        years 1404--1989.  Material for years
%%%                        1990--date appears in companion
%%%                        bibliographies, cryptography1990.bib,
%%%                        cryptography2000.bib, and so on, to reduce
%%%                        the size of this bibliography.
%%%
%%%                        At version 3.29 of this file, the number of
%%%                        entries exceeded 4000, so material for the
%%%                        1990s was moved into a new file,
%%%                        cryptography1990.bib.
%%%
%%%                        The initial draft of this bibliography was
%%%                        extracted using the bibsearch utility from
%%%                        the large TeX User Group and BibNet Project
%%%                        bibliography archives, available on the
%%%                        Internet at
%%%
%%%                            ftp://ftp.math.utah.edu/pub/tex/bib
%%%                            https://www.math.utah.edu/pub/tex/bib/index-table.html
%%%
%%%                        and
%%%
%%%                            ftp://ftp.math.utah.edu/pub/bibnet
%%%                            https://www.math.utah.edu/pub/bibnet/index.html
%%%
%%%                        As of August 2017, these archives hold more
%%%                        than 1,300,000 bibliographic entries in
%%%                        BibTeX form.
%%%
%%%                        Those results were then augmented by entries
%%%                        for books found in the University of
%%%                        California Melvyl catalog, the Library of
%%%                        Congress catalog, and the OCLC WorldCat
%%%                        database, and by other publications found in
%%%                        the Compendex database, the OCLC Contents1st,
%%%                        Proceedings, and PapersFirst databases, and
%%%                        the MathSciNet database.
%%%
%%%                        Counterpane Systems maintains a Web site at
%%%
%%%                            http://www.counterpane.com/
%%%                            http://www.counterpane.com/publish.html
%%%
%%%                        with a substantial number of their technical
%%%                        reports and articles available in electronic
%%%                        form.
%%%
%%%                        The International Association for Cryptologic
%%%                        Research (IACR) is a ``non-profit scientific
%%%                        organization whose primary purpose is to
%%%                        further research in cryptology and related
%%%                        fields''.  It has a World-Wide Web site at
%%%
%%%                            http://www.iacr.org/index.html
%%%
%%%                        IACR publishes an email newsletter thrice
%%%                        yearly.  Back issues are available starting
%%%                        with Volume 15, Number 1, Fall 1998 at the
%%%                        above site.  It also supports a distinguished
%%%                        lecture series
%%%
%%%                            http://www.iacr.org/publications/dl/
%%%
%%%                        and a preprint server
%%%
%%%                            http://www.iacr.org/publications/preprint.html
%%%
%%%                        The Cryptography and Security Group at the
%%%                        Department of Computer Science and
%%%                        Engineering of the University of California
%%%                        at San Diego supports a World-Wide Web site,
%%%                        called the Theory of Cryptography Library, at
%%%
%%%                            http://philby.ucsd.edu/cryptolib/
%%%
%%%                        There is another site with cryptographic
%%%                        miscellanea and news articles at
%%%
%%%                            http://cryptome.org/
%%%
%%%                        There is an archive of the cryptography
%%%                        mailing list at
%%%
%%%                            http://www.mail-archive.com/cryptography%40wasabisystems.com/
%%%
%%%                        All of the cited references from all of the
%%%                        articles in the online journal CryptoBytes
%%%                        are also included, with referencedin key
%%%                        values recording the source of citations.
%%%
%%%                        However, publications in the journals
%%%
%%%                            * Cryptography and Communications,
%%%                            * Cryptologia,
%%%                            * Designs, Codes, and Cryptography,
%%%                            * Groups Complexity Cryptology,
%%%                            * Journal of Cryptology,
%%%                            * Journal of Discrete Mathematical
%%%                              Sciences and Cryptography
%%%
%%%                        are generally excluded, unless they are
%%%                        cross-referenced by other entries in this
%%%                        bibliography, because they are covered in
%%%                        separate companion bibliographies,
%%%                        cryptologia.bib, designscodescryptogr.bib,
%%%                        jcryptology.bib, and jdiscrmathscicrypto.bib.
%%%
%%%                        Historical note: Whitfield Diffie, Martin
%%%                        E. Hellman, and Ralph Merkle are justly
%%%                        credited with the first publicly-reported
%%%                        discovery (in 1976--78) of public-key key
%%%                        cryptography.  However, three British
%%%                        researchers, James Ellis, Clifford Cocks and
%%%                        Malcolm Williamson independently discovered
%%%                        it earlier (about 1975), but their work was
%%%                        secret until its declassification in 1997.
%%%                        See entries Ellis:1975:PKC, Diffie:1976:NDC,
%%%                        Merkle:1978:HIS, Merkle:1978:SCI.  I have not
%%%                        yet been able to locate the declassified
%%%                        reports.  Two reports by Alan Turing on
%%%                        cryptography (entries Turing:1941:APC and
%%%                        Turing:1941:SR) were similarly closely-held
%%%                        secrets, and were only declassified in 2012.
%%%
%%%                        At version 4.114, the year coverage looked
%%%                        like this:
%%%
%%%                             1404 (   1)    1606 (   3)    1808 (   0)
%%%                             1418 (   0)    1620 (   1)    1822 (   0)
%%%                             1419 (   0)    1621 (   3)    1823 (   0)
%%%                             1425 (   0)    1627 (   1)    1829 (   0)
%%%                             1431 (   0)    1633 (   1)    1835 (   0)
%%%                             1439 (   0)    1641 (   1)    1843 (   0)
%%%                             1442 (   0)    1644 (   2)    1846 (   0)
%%%                             1459 (   0)    1661 (   0)    1863 (   1)
%%%                             1460 (   0)    1662 (   0)    1864 (   1)
%%%                             1464 (   0)    1666 (   1)    1868 (   0)
%%%                             1469 (   0)    1671 (   0)    1873 (   1)
%%%                             1470 (   1)    1672 (   0)    1874 (   1)
%%%                             1474 (   0)    1676 (   1)    1878 (   0)
%%%                             1479 (   0)    1681 (   0)    1883 (   1)
%%%                             1481 (   0)    1683 (   0)    1885 (   1)
%%%                             1486 (   0)    1688 (   0)    1890 (   1)
%%%                             1488 (   0)    1690 (   0)    1892 (   1)
%%%                             1490 (   0)    1692 (   1)    1894 (   0)
%%%                             1494 (   0)    1696 (   0)    1898 (   1)
%%%                             1496 (   0)    1698 (   0)    1900 (   1)
%%%                             1498 (   0)    1700 (   0)    1902 (   1)
%%%                             1500 (   0)    1702 (   0)    1904 (   1)
%%%                             1508 (   0)    1710 (   0)    1912 (   1)
%%%                             1510 (   0)    1712 (   0)    1914 (   1)
%%%                             1511 (   0)    1713 (   0)    1915 (   1)
%%%                             1515 (   0)    1717 (   0)    1919 (   1)
%%%                             1516 (   0)    1718 (   0)    1920 (   1)
%%%                             1517 (   0)    1719 (   0)    1921 (   1)
%%%                             1518 (   1)    1720 (   0)    1922 (   4)
%%%                             1519 (   0)    1721 (   0)    1923 (   1)
%%%                             1520 (   0)    1722 (   0)    1924 (   2)
%%%                             1521 (   0)    1723 (   0)    1925 (   2)
%%%                             1522 (   0)    1724 (   0)    1926 (   1)
%%%                             1523 (   0)    1725 (   0)    1927 (   2)
%%%                             1524 (   0)    1726 (   0)    1928 (   1)
%%%                             1525 (   0)    1727 (   0)    1929 (   2)
%%%                             1527 (   0)    1729 (   0)    1931 (   3)
%%%                             1528 (   0)    1730 (   0)    1932 (   1)
%%%                             1529 (   0)    1731 (   0)    1933 (   1)
%%%                             1531 (   0)    1733 (   0)    1935 (   5)
%%%                             1532 (   0)    1734 (   0)    1936 (   3)
%%%                             1534 (   0)    1736 (   0)    1938 (   2)
%%%                             1535 (   0)    1737 (   0)    1939 (   8)
%%%                             1536 (   0)    1738 (   0)    1940 (   3)
%%%                             1537 (   0)    1739 (   1)    1941 (   5)
%%%                             1538 (   0)    1740 (   0)    1942 (   2)
%%%                             1539 (   0)    1741 (   0)    1943 (   9)
%%%                             1540 (   0)    1742 (   0)    1944 (   2)
%%%                             1541 (   0)    1743 (   0)    1945 (   6)
%%%                             1542 (   0)    1744 (   0)    1946 (   2)
%%%                             1543 (   0)    1745 (   0)    1947 (   2)
%%%                             1544 (   0)    1746 (   0)    1948 (   3)
%%%                             1545 (   0)    1747 (   0)    1949 (   1)
%%%                             1547 (   0)    1749 (   0)    1951 (   1)
%%%                             1548 (   0)    1750 (   0)    1952 (   2)
%%%                             1549 (   0)    1751 (   0)    1953 (   1)
%%%                             1550 (   0)    1752 (   0)    1954 (   1)
%%%                             1551 (   0)    1753 (   0)    1955 (   5)
%%%                             1552 (   0)    1754 (   0)    1956 (   4)
%%%                             1553 (   0)    1755 (   0)    1957 (   3)
%%%                             1554 (   0)    1756 (   0)    1958 (   2)
%%%                             1555 (   0)    1757 (   0)    1959 (   1)
%%%                             1556 (   0)    1758 (   0)    1960 (   6)
%%%                             1557 (   0)    1759 (   0)    1961 (   5)
%%%                             1559 (   0)    1761 (   0)    1963 (   4)
%%%                             1560 (   0)    1762 (   0)    1964 (   1)
%%%                             1561 (   0)    1763 (   0)    1965 (   1)
%%%                             1562 (   0)    1764 (   0)    1966 (   3)
%%%                             1563 (   0)    1765 (   0)    1967 (   9)
%%%                             1564 (   0)    1766 (   0)    1968 (   6)
%%%                             1565 (   0)    1767 (   0)    1969 (   7)
%%%                             1566 (   0)    1768 (   0)    1970 (   9)
%%%                             1567 (   0)    1769 (   0)    1971 (   7)
%%%                             1568 (   0)    1770 (   0)    1972 (   6)
%%%                             1569 (   0)    1771 (   0)    1973 (  11)
%%%                             1570 (   0)    1772 (   0)    1974 (  20)
%%%                             1571 (   0)    1773 (   0)    1975 (  24)
%%%                             1572 (   0)    1774 (   0)    1976 (  33)
%%%                             1573 (   0)    1775 (   0)    1977 (  22)
%%%                             1574 (   0)    1776 (   0)    1978 (  34)
%%%                             1575 (   0)    1777 (   0)    1979 (  57)
%%%                             1576 (   0)    1778 (   0)    1980 (  38)
%%%                             1577 (   0)    1779 (   0)    1981 (  51)
%%%                             1578 (   0)    1780 (   0)    1982 (  71)
%%%                             1579 (   0)    1781 (   0)    1983 (  74)
%%%                             1580 (   0)    1782 (   0)    1984 (  66)
%%%                             1581 (   0)    1783 (   0)    1985 ( 119)
%%%                             1582 (   0)    1784 (   0)    1986 (  79)
%%%                             1583 (   0)    1785 (   0)    1987 ( 100)
%%%                             1584 (   0)    1786 (   0)    1988 ( 139)
%%%                             1585 (   0)    1787 (   0)    1989 ( 108)
%%%                             1586 (   0)    1788 (   0)    1990 (   1)
%%%                             1587 (   0)    1789 (   0)    1991 (   1)
%%%                             1588 (   0)    1790 (   0)    1992 (   1)
%%%                             1589 (   0)    1791 (   0)    1993 (   2)
%%%                             1592 (   0)    1794 (   0)    1996 (   1)
%%%                             1593 (   0)    1795 (   0)    1997 (   2)
%%%                             1594 (   0)    1796 (   0)    1998 (   3)
%%%                             1595 (   0)    1797 (   0)    1999 (   3)
%%%                             1596 (   0)    1798 (   0)    2000 (   1)
%%%                             1597 (   0)    1799 (   0)    2001 (   1)
%%%                             1598 (   0)    1800 (   0)    2002 (   1)
%%%                             1605 (   0)    1807 (   0)    2009 (   1)
%%%                             19xx (   2)
%%%
%%%                             Article:        561
%%%                             Book:           306
%%%                             Booklet:          1
%%%                             InCollection:    31
%%%                             InProceedings:  142
%%%                             Manual:          19
%%%                             MastersThesis:   39
%%%                             Misc:            16
%%%                             Periodical:       3
%%%                             PhdThesis:       11
%%%                             Proceedings:     62
%%%                             TechReport:      66
%%%                             Unpublished:      3
%%%
%%%                             Total entries: 1260
%%%
%%%                        There is a hypertext bibliography of
%%%                        classical cryptography at
%%%
%%%                            http://ourworld.compuserve.com/homepages/crypto/BIB1XX.HTM
%%%
%%%                        CIPHER, the Electronic Newsletter of the
%%%                        Technical Committee on Security and Privacy,
%%%                        A Technical Committee of the Computer Society
%%%                        of the IEEE, is available on the World-Wide
%%%                        Web at
%%%
%%%                            http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher
%%%
%%%                        with pointers to all back issues (1994--1998).
%%%
%%%                        ``CRYPTO-GRAM is a free monthly newsletter
%%%                        providing summaries, analyses, insights, and
%%%                        commentaries on cryptography and computer
%%%                        security.  To subscribe, visit
%%%
%%%                            http://www.counterpane.com/crypto-gram.html
%%%
%%%                        or send a blank message to
%%%
%%%                            crypto-gram-subscribe at chaparraltree.com
%%%
%%%                        Back issues are available on
%%%
%%%                            http://www.counterpane.com''
%%%
%%%                        CRYPTO-GRAM is a good source of news of
%%%                        recent developments in the field, and
%%%                        contains many interesting essays on aspects
%%%                        of cryptography.
%%%
%%%                        There is a Web site on steganography at
%%%
%%%                            http://www.cl.cam.ac.uk/~fapp2/steganography/
%%%
%%%                        In this bibliography, entries are sorted
%%%                        first by ascending year, and within each
%%%                        year, alphabetically by author or editor,
%%%                        and then, if necessary, by the 3-letter
%%%                        abbreviation at the end of the BibTeX
%%%                        citation tag, using the bibsort -byyear
%%%                        utility.  Year order has been chosen to
%%%                        make it easier to identify the most recent
%%%                        work.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"
  # "\ifx \undefined \cprime \def \cprime {$\mathsurround=0pt '$}\fi"
  # "\ifx \undefined \Dbar \def \Dbar {\leavevmode\raise0.2ex\hbox{--}\kern-0.5emD} \fi"
  # "\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi"
  # "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi"
  # "\ifx \undefined \operatorname \def \operatorname #1{{\rm #1}}\fi"
  # "\hyphenation{
        Aba-di
        Arch-ives
        Ding-yi
        for-ge-ry
        Go-pa-la-krish-nan
        Hi-de-ki
        Kraw-czyk
        Lands-verk
        Law-rence
        Leigh-ton
        Mich-ael
        Moell-er
        North-ridge
        para-digm
        para-digms
        Piep-rzyk
        Piv-e-teau
        Ram-kilde
        Re-tro-fit-ting
        Rich-ard
        Sho-stak
        Si-ro-mo-n-ey
        Ste-ph-en
        The-o-dore
        Tho-m-as
        Tzone-lih
        venge-ance
        Will-iam
        Ye-sh-i-va
    }"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-bs =   "Bruce Schneier,
                    Counterpane Systems,
                    101 East Minnehaha Parkway,
                    Minneapolis, MN 55419,
                    e-mail: \path|schneier@counterpane.com"}

@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

@String{ack-pb =     "Preston Briggs,
                     Tera Computer Company,
                     2815 Eastlake East,
                     Seattle, WA 98102,
                     USA,
                     Tel: +1 206 325-0800,
                     e-mail: \path|preston@tera.com|"}

%%% ====================================================================
%%% Institution abbreviations:
@String{inst-COUNTERPANE-INTERNET-SECURITY = "Counterpane Internet Security"}

@String{inst-COUNTERPANE-INTERNET-SECURITY:adr = "3031 Tisch Way, Suite 100PE,
                                  San Jose, CA 95128, USA"}

@String{inst-COUNTERPANE-LABS = "Counterpane Systems"}

@String{inst-COUNTERPANE-LABS:adr = "101 East Minnehaha Parkway, Minneapolis,
                                   MN 55419"}

@String{inst-COUNTERPANE-SYSTEMS = "Counterpane Systems"}

@String{inst-COUNTERPANE-SYSTEMS:adr = "101 East Minnehaha Parkway, Minneapolis,
                                   MN 55419"}

%% Old address:
%% String{inst-COUNTERPANE-SYSTEMS:adr = "Oak Park, IL, USA"}
@String{inst-CSU                = "Colorado State University"}

@String{inst-CSU:adr            = "Fort Collins, CO, USA"}

@String{inst-IBM-WATSON         = "IBM T. J. Watson Research Center"}

@String{inst-IBM-WATSON:adr     = "Yorktown Heights, NY, USA"}

@String{inst-KENT-STATE-UNIV    = "Kent State University"}

@String{inst-KENT-STATE-UNIV:adr = "Kent, OH, USA"}

@String{inst-MIT-CS             = "Massachusetts Institute of Technology,
                                  Computer Science Lab."}

@String{inst-MIT:adr            = "Cambridge, Massachusetts"}

@String{inst-NORTHWESTERN-UNIVERSITY = "Northwestern University"}

@String{inst-NORTHWESTERN-UNIVERSITY:adr = "Evanston, IL, USA"}

@String{inst-SRC-IDA            = "Supercomputing Research Center: IDA"}

@String{inst-SRC-IDA:adr        = "Lanham, MD, USA"}

@String{inst-UC-BERKELEY-ICSI   = "International Computer Science Institute"}

@String{inst-UC-BERKELEY-ICSI:adr = "Berkeley, CA, USA"}

@String{inst-UIUC-CSRD          = "University of Illinois at Urbana-Champaign,
                                  Center for Supercomputing Research and
                                  Development"}

@String{inst-UIUC-CSRD:adr      = "Urbana, IL 61801, USA"}

@String{inst-UTK                = "University of Tennessee, Knoxville"}

@String{inst-UTK:adr            = "Knoxville, TN 37996, USA"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-ADV-ENG-SOFTWARE      = "Advances in Engineering Software"}

@String{j-ADV-IMAGING           = "Advanced Imaging"}

@String{j-ALGORITHMICA          = "Algorithmica"}

@String{j-AM-DOC                = "American Documentation"}

@String{j-AMBIX                 = "Ambix: Journal of the Society for the History
                                  of Alchemy and Chemistry"}

@String{j-AMER-MATH-MONTHLY     = "American Mathematical Monthly"}

@String{j-AMER-STAT             = "The American Statistician"}

@String{j-ANN-BIOMED-ENG        = "Annals of biomedical engineering"}

@String{j-ANN-HIST-COMPUT       = "Annals of the History of Computing"}

@String{j-ANN-MATH              = "Annals of Mathematics"}

@String{j-ANNALS-MATH-STAT      = "Ann. Math. Stat."}

@String{j-APPL-ALGEBRA-ENG-COMMUN-COMPUT = "Applicable algebra in engineering,
                                  communication and computing"}

@String{j-APPL-MATH-COMP        = "Applied Mathematics and Computation"}

@String{j-APPL-MATH-LETT        = "Applied Mathematics Letters"}

@String{j-APPL-NUM-MATH         = "Applied Numerical Mathematics: Transactions
                                  of IMACS"}

@String{j-APPL-STAT             = "Applied Statistics"}

@String{j-ATT-BELL-LAB-TECH-J   = "ATT Bell Lab. tech. j"}

@String{j-ATT-TECH-J            = "AT\&T Technical Journal"}

@String{j-BANK-SYST-TECHNOL     = "Bank systems + technology"}

@String{j-BELL-SYST-TECH-J      = "The Bell System Technical Journal"}

@String{j-BIT                   = "BIT"}

@String{j-BT-TECH-J             = "BT Technology Journal"}

@String{j-BULL-AUSTRAL-MATH-SOC = "Bulletin of the Australian Mathematical
                                  Society"}

@String{j-BYTE                  = "BYTE Magazine"}

@String{j-C-PLUS-PLUS-REPORT    = "C++ Report"}

@String{j-CACM                  = "Communications of the Association for
                                  Computing Machinery"}

@String{j-CCCUJ                 = "C/C++ Users Journal"}

@String{j-CG-WORLD              = "Computer Graphics World"}

@String{j-CGF                   = "Com{\-}pu{\-}ter Graphics Forum"}

@String{j-CGIP                  = "Computer Graphics and Image Processing"}

@String{j-CHIN-J-COMPUTERS      = "Chinese Journal of Computers = Chi suan chi
                                  hsueh pao"}

@String{j-CISCO-WORLD           = "Cisco World: The Independent Journal for
                                  Internetworking Professionals"}

@String{j-COLLEGE-MATH-J        = "College Mathematics Journal"}

@String{j-COMP-ARCH-NEWS        = "ACM SIGARCH Computer Architecture News"}

@String{j-COMP-COMM-REV         = "Computer Communications Review, ACM
                                  SIGCOMM"}

@String{j-COMP-GRAPHICS         = "Computer Graphics"}

@String{j-COMP-J                = "The Computer Journal"}

@String{j-COMP-LANG-MAG         = "Computer Language Magazine"}

@String{j-COMP-LANGS            = "Computer Languages"}

@String{j-COMP-LAW-SECURITY-REP = "The Computer Law and Security Report"}

@String{j-COMP-NET              = "Computer Networks: The International Journal
                                   of Distributed Informatique"}

@String{j-COMP-NET-AMSTERDAM    = "Computer Networks (Amsterdam, Netherlands:
                                  1999)"}

@String{j-COMP-NET-ISDN         = "Computer Networks and ISDN Systems"}

@String{j-COMP-PHYSICS          = "Computers in physics"}

@String{j-COMP-STRUCTURES       = "Computers and Structures"}

@String{j-COMP-SURV             = "ACM Computing Surveys"}

@String{j-COMP-SYS              = "Computing Systems"}

@String{j-COMPLEX-SYSTEMS       = "Complex Systems"}

@String{j-COMPUT-COMPLEX        = "Computational complexity"}

@String{j-COMPUT-MATH-APPL      = "Computers and Mathematics with Applications"}

@String{j-COMPUT-METH-PROG-BIOMED = "Computer Methods and Programs in
                                  Biomedicine"}

@String{j-COMPUT-PHYS           = "Computers in Physics"}

@String{j-COMPUT-SECUR          = "Computers and Security"}

@String{j-COMPUT-SECUR-J        = "Computer Security Journal"}

@String{j-COMPUT-SYST-ENG       = "Computing systems in engineering: an
                                  international journal"}

@String{j-COMPUT-SYST-SCI-ENG   = "Computer Systems Science and Engineering"}

@String{j-COMPUTER              = "Computer"}

@String{j-COMPUTERS-AND-GRAPHICS = "Computers and Graphics"}

@String{j-COMPUTERWORLD         = "Computerworld"}

@String{j-COMPUTING             = "Computing"}
%%%
@String{j-CONG-NUM              = "Congressus Numerantium"}

@String{j-CONN-LAW-REVIEW       = "Connecticut Law Review"}

@String{j-CRYPTOBYTES           = "CryptoBytes"}

@String{j-CRYPTOLOG             = "Cryptolog"}

@String{j-CRYPTOLOGIA           = "Cryptologia"}

@String{j-CUJ                   = "C Users Journal"}

@String{j-CVGIP                 = "Computer Vision, Graphics, and Image
                                  Processing"}

@String{j-CVGIP-GMIP            = "Computer Vision, Graphics, and Image
                                  Processing. Graphical Models and Image
                                  Processing"}

@String{j-DATAMATION            = "Datamation"}

@String{j-DDDU                  = "Dr. Dobb's Developer Update"}

@String{j-DDJ                   = "Dr. Dobb's Journal of Software Tools"}

@String{j-DEC-TECH-J            = "Digital Technical Journal of Digital
                                  Equipment Corporation"}

@String{j-DESIGN-NEWS           = "Design news"}

@String{j-DESIGNS-CODES-CRYPTOGR = "Designs, Codes, and Cryptography"}

@String{j-DIALECTICA            = "Dialectica: International Review of
                                  Philosophy of Knowledge"}

@String{j-DISCRETE-APPL-MATH    = "Discrete Applied Mathematics"}

@String{j-DISCRETE-MATH-APPL    = "Discrete Mathematics and Applications"}

@String{j-ELECT-COMM-JAPAN-3-FUND-ELECT-SCI = "Electronics and communications
                                  in Japan. Part 3, Fundamental electronic
                                  science"}

@String{j-ELECT-LETTERS         = "Electronics Letters"}

@String{j-ELECTRONIC-DESIGN     = "Electronic Design"}

@String{j-ELECTRONICS           = "Electronics"}

@String{j-EMBED-SYS-PROG        = "Embedded Systems Programming"}

@String{j-ENG-FRACTURE-MECH     = "Engineering fracture mechanics"}

@String{j-EPODD                 = "Electronic
                                  Pub\-lish\-ing\emdash{}Orig\-i\-na\-tion,
                                  Dissemination, and Design"}

@String{j-ETT                   = "European Transactions on
                                  Telecommunications: ETT"}

@String{j-EUR-J-OPER-RES        = "European Journal of Operational Research"}

@String{j-EUR-TRANS-TELECOMM    = "European transactions on telecommunications
                                  and related technologies"}

@String{j-EUUG-NEWSLETTER       = "EUUG Newsletter"}

@String{j-FED-REGIST            = "Federal Register"}

@String{j-FINANC-TECH-INT-BULL  = "Financial Technology International
                                  Bulletin"}

@String{j-FUT-GEN-COMP-SYS      = "Future Generation Computer Systems"}

@String{j-GRAPH-MODELS-IMAGE-PROC = "Graphical models and image processing:
                                  GMIP"}

@String{j-HEWLETT-PACKARD-J     = "Hew\-lett-Pack\-ard Journal: technical
                                  information from the laboratories of
                                  Hew\-lett-Pack\-ard Company"}

@String{j-HIST-MATH             = "Historia Mathematica"}

@String{j-HONEYWELL-COMP-J      = "Honeywell Computer Journal"}

@String{j-IBM-JRD               = "IBM Journal of Research and Development"}

@String{j-IBM-SYS-J             = "IBM Systems Journal"}

@String{j-IEE-CONF-PUBL         = "IEE conference publication"}

@String{j-IEE-PROC-VIS-IMAGE-SIGNAL-PROCESS = "IEE proceedings. Vision, image,
                                  and signal processing"}

@String{j-IEEE-ANN-HIST-COMPUT  = "IEEE Annals of the History of Computing"}

@String{j-IEEE-ASSP             = "IEEE Trans. ASSP"}

@String{j-IEEE-CGA              = "IEEE Computer Graphics and Applications"}

@String{j-IEEE-COMM-MAG         = "IEEE Communications Magazine"}

@String{j-IEEE-J-SEL-AREAS-COMMUN = "IEEE Journal on Selected Areas in
                                  Communications"}

@String{j-IEEE-MICRO            = "IEEE Micro"}

@String{j-IEEE-MULTIMEDIA       = "IEEE MultiMedia"}

@String{j-IEEE-PAR-DIST-TECH    = "IEEE parallel and distributed technology:
                                  systems and applications"}

@String{j-IEEE-SOFTWARE         = "IEEE Software"}

@String{j-IEEE-SPECTRUM         = "IEEE Spectrum"}

@String{j-IEEE-TRANS-COMM       = "IEEE Transactions on Communications"}

@String{j-IEEE-TRANS-COMPUT     = "IEEE Transactions on Computers"}

@String{j-IEEE-TRANS-CONSUMER-ELECTRONICS = "IEEE Transactions on Consumer
                                  Electronics"}

@String{j-IEEE-TRANS-IMAGE-PROCESS = "IEEE Transactions on Image Processing"}

@String{j-IEEE-TRANS-INF-THEORY = "IEEE Transactions on Information Theory"}

@String{j-IEEE-TRANS-NETWORKING = "IEEE\slash ACM Transactions on Networking"}

@String{j-IEEE-TRANS-PAR-DIST-SYS = "IEEE Transactions on Parallel and
                                  Distributed Systems"}

@String{j-IEEE-TRANS-PATT-ANAL-MACH-INTEL = "IEEE Transactions on Pattern
                                  Analysis and Machine Intelligence"}

@String{j-IEEE-TRANS-PROF-COMM  = "IEEE Transactions on Professional
                                  Communication"}

@String{j-IEEE-TRANS-SOFTW-ENG  = "IEEE Transactions on Software Engineering"}

@String{j-IEICE-TRANS-FUND-ELECT = "IEICE Transactions on Fundamentals of
                                  Electronics Communications and Computer
                                  Sciences"}

@String{j-IJQC                  = "International Journal of Quantum Chemistry"}

@String{j-IJSAHPC               = "The International Journal of Supercomputer
                                  Applications and High Performance Computing"}

@String{j-IMAGE-VIS-COMPUT      = "Image and Vision Computing"}

@String{j-INF-COMM-TECH-LAW     = "Information \& Communications Technology
                                  Law"}

@String{j-INF-COMPUT            = "Information and Computation"}

@String{j-INF-CONTROL           = "Information and Control"}

@String{j-INF-SOC               = "The Information Society"}

@String{j-INFO-PROC-LETT        = "Information Processing Letters"}

@String{j-INFO-PROC-MAN         = "Information Processing and Management"}

@String{j-INFORMATIK-SPEKTRUM   = "Informatik Spektrum"}

@String{j-INFORMATION-WEEK      = "Information Week"}

@String{j-INFOWORLD             = "InfoWorld"}

@String{j-INT-J-BIFURC-CHAOS-APPL-SCI-ENG = "International journal of
                                  bifurcation and chaos in applied sciences and
                                  engineering"}

@String{j-INT-J-COMPUT-INF-SCI  = "International Journal of Computer and
                                  Information Sciences"}

@String{j-INT-J-COMPUT-MATH     = "International Journal of Computer
                                  Mathematics"}

@String{j-INT-J-COMPUT-SYST-SCI-ENG = "International Journal of Computer
                                  Systems Science and Engineering"}

@String{j-INT-J-ELECTRON        = "International Journal of Electronics
                                  Theoretical \& Experimental"}

@String{j-INT-J-SYST-SCI        = "International Journal of Systems Science"}

@String{j-INT-J-THEOR-PHYS      = "International Journal of Theoretical
                                  Physics"}

@String{j-INTELL-NATL-SECUR     = "Intelligence and National Security"}

@String{j-ISIS                  = "Isis"}

@String{j-J-ACM                 = "Journal of the Association for Computing
                                  Machinery"}

@String{j-J-ALG                 = "Journal of Algorithms"}

@String{j-J-COMP-SCI-TECH       = "Journal of computer science and technology"}

@String{j-J-COMP-SECUR          = "Journal of Computer Security"}

@String{j-J-COMP-SYS-SCI        = "Journal of Computer and System Sciences"}

@String{j-J-CRYPTOLOGY          = "Journal of Cryptology"}

@String{j-J-DOC                 = "Journal of Documentation"}

@String{j-J-ELECTRON-IMAGING    = "Journal of Electronic Imaging"}

@String{j-J-ENG-MECH            = "Journal of Engineering Mechanics"}

@String{j-J-MATH-PHYS           = "Journal of Mathematical Physics"}

@String{j-J-PAR-DIST-COMP       = "Journal of Parallel and Distributed
                                  Computing"}

@String{j-J-PHYS-E              = "Journal of Physics. E: Scientific
                                  Instruments"}

@String{j-J-RES-NATL-INST-STAND-TECHNOL = "Journal of research of the National
                                  Institute of Standards and Technology"}

@String{j-J-SCI-IND-RES         = "Journal of Scientific and Industrial
                                  Research"}

@String{j-J-SIAM                = "Journal of the Society for Industrial and
                                  Applied Mathematics"}

@String{j-J-SUPERCOMPUTING      = "The Journal of Supercomputing"}

@String{j-J-SYMBOLIC-COMP       = "Journal of Symbolic Computation"}

@String{j-J-SYST-SOFTW          = "The Journal of Systems and Software"}

@String{j-J-UCS                 = "J.UCS: Journal of Universal Computer
                                  Science"}

@String{j-J-VIS-COMP-ANIMATION  = "The Journal of Visualization and Computer
                                  Animation"}

@String{j-JAVAWORLD             = "JavaWorld: IDG's magazine for the Java
                                  community"}

@String{j-LECT-NOTES-COMP-SCI   = "Lecture Notes in Computer Science"}

@String{j-LINEAR-ALGEBRA-APPL   = "Linear Algebra and its Applications"}

@String{j-LINUX-J               = "Linux Journal"}

@String{j-LMS-J-COMPUT-MATH     = "LMS Journal of Computation and Mathematics"}

@String{j-LOGIN                 = ";login: the USENIX Association newsletter"}

@String{j-MACUSER               = "MacUser"}

@String{j-MATH-COMP-EDU         = "Mathematics and computer education"}

@String{j-MATH-COMP-MODELLING   = "Mathematical and computer modelling"}

@String{j-MATH-COMPUT           = "Mathematics of Computation"}

@String{j-MATH-GAZ              = "The Mathematical Gazette"}

@String{j-MATH-MAG              = "Mathematics Magazine"}

@String{j-MATH-SEMESTERBER      = "Mathematische Semesterberichte"}

@String{j-MATH-SLOVACA          = "Mathematica Slovaca"}

@String{j-MATHEMATICA-J         = "Mathematica Journal"}

@String{j-MATHEMATIKA           = "Mathematika"}

@String{j-MICROELECT-RELIABILITY = "Microelectronics and Reliability"}

@String{j-N-I-A-CR              = "Newsletter of the International Association
                                  for Cryptologic Research"}

@String{j-NAMS                  = "Notices of the American Mathematical
                                  Society"}

@String{j-NORDIC-J-COMPUT       = "Nordic Journal of Computing"}

@String{j-NTT-R-D               = "NTT R\&D"}

@String{j-NUM-LIN-ALG-APPL      = "Numerical linear algebra with applications"}

@String{j-NUM-MATH              = "Numerische Mathematik"}

@String{j-NUMER-ALGORITHMS      = "Numerical Algorithms"}

@String{j-NY-TIMES              = "New York Times"}

@String{j-OBZORNIK-MAT-FIZ      = "Dru{\\v{s}}tvo Matematikov, Fizikov in
                                  Astronomov SRS. Obzornik za Matematiko in
                                  Fiziko"}

@String{j-OPEN-COMPUTING        = "Open Computing"}

@String{j-OPEN-SYSTEMS-TODAY    = "Open Systems Today"}

@String{j-OPER-SYS-REV          = "Operating Systems Review"}

@String{j-PARALLEL-ALGORITHMS-APPL = "Parallel Algorithms and Applications"}

@String{j-PARALLEL-COMPUTING    = "Parallel Computing"}

@String{j-PARALLEL-PROCESS-LETT = "Parallel Processing Letters"}

@String{j-PC-TECH               = "PC Techniques"}

@String{j-PERFORM-COMPUT        = "Performance Computing"}

@String{j-PHILIPS-J-RES         = "Philips Journal of Research"}

@String{j-PROC-ICASSP           = "Proceedings of the International Conference
                                  on Acoustics, Speech, and Signal Processing"}

@String{j-PROC-CAMBRIDGE-PHIL-SOC = "Proceedings of the Cambridge Philosophical
                                  Society. Mathematical and physical sciences"}

@String{j-PROC-IEEE             = "Proceedings of the IEEE"}

@String{j-PROC-SPIE             = "Proceedings of the SPIE --- The
                                  International Society for Optical
                                  Engineering"}

@String{j-SCI-AMER              = "Scientific American"}

@String{j-SCI-AMER-INT-ED       = "Scientific American [International
                                  Edition]"}

@String{j-SCI-COMPUT-PROGRAM    = "Science of Computer Programming"}

@String{j-SCIENCE               = "Science"}

@String{j-SCIENCE-NEWS          = "Science News (Washington, DC)"}

@String{j-SIAM-J-ALG-DISC-METH  = "SIAM Journal on Algebraic and Discrete
                                  Methods"}

@String{j-SIAM-J-APPL-MATH      = "SIAM Journal on Applied Mathematics"}

@String{j-SIAM-J-COMPUT         = "SIAM Journal on Computing"}

@String{j-SIAM-J-DISCR-MATH     = "SIAM Journal on Discrete Mathematics"}

@String{j-SIAM-J-MAT-ANA-APPL   = "SIAM Journal on Matrix Analysis and
                                  Applications"}

@String{j-SIAM-J-NUMER-ANAL     = "SIAM Journal on Numerical Analysis"}

@String{j-SIAM-J-SCI-STAT-COMP  = "SIAM Journal on Scientific and Statistical
                                  Computing"}

@String{j-SIAM-REVIEW           = "SIAM Review"}

@String{j-SIG-PROC              = "Signal Processing"}

@String{j-SIGACT                = "ACM SIGACT News"}

@String{j-SIGADA-LETTERS        = "ACM SIGADA Ada Letters"}

@String{j-SIGCSE                = "SIGCSE Bulletin (ACM Special Interest Group
                                  on Computer Science Education)"}

@String{j-SIGMETRICS            = "ACM SIGMETRICS Performance Evaluation
                                  Review"}

@String{j-SIGMOD                = "SIGMOD Record (ACM Special Interest Group
                                  on Management of Data)"}

@String{j-SIGNUM                = "ACM SIGNUM Newsletter"}

@String{j-SIGPLAN               = "ACM SIG{\-}PLAN Notices"}

@String{j-SIGSAM                = "SIGSAM Bulletin (ACM Special Interest Group
                                  on Symbolic and Algebraic Manipulation)"}

@String{j-SIGSOFT               = "ACM SIGSOFT Software Engineering Notes"}

@String{j-SMITHSONIAN           = "Smithsonian"}

@String{j-SOUTHCON              = "Southcon Conference Record"}

@String{j-SPE                   = "Soft\-ware\emdash Prac\-tice and
                                  Experience"}

@String{j-SUNSERVER             = "SunServer"}

@String{j-SUPER-REV             = "Supercomputing Review"}

@String{j-SUPERCOMPUTER         = "Supercomputer"}

@String{j-SUPERCOMPUTING-REVIEW = "Supercomputing Review"}

@String{j-SYS-ADMIN             = "Sys Admin: The Journal for UNIX Systems
                                  Administrators"}

@String{j-SYS-COMP-JAPAN        = "Systems and computers in Japan"}

@String{j-TECH-COMMUN           = "Technical Communication"}

@String{j-TECH-CULTURE          = "Technology and Culture"}

@String{j-TELECOMMUNICATIONS-AMERICAS-ED = "Telecommunications (Americas Edition)"}

@String{j-THEOR-COMP-SCI        = "Theoretical Computer Science"}

@String{j-TOCS                  = "ACM Transactions on Computer Systems"}

@String{j-TODS                  = "ACM Transactions on Database Systems"}

@String{j-TOIS                  = "ACM Transactions on Information Systems"}

@String{j-TOMS                  = "ACM Transactions on Mathematical Software"}

@String{j-TOOIS                 = "ACM Transactions on Office Information
                                   Systems"}

@String{j-TOPLAS                = "ACM Transactions on Programming Languages
                                  and Systems"}

@String{j-TRANS-AM-NUCL-SOC     = "Transactions of the American Nuclear
                                  Society"}

@String{j-UNIX-DEVELOPER        = "UNIX Developer"}

@String{j-UNIX-WORLD            = "UNIX/world"}

@String{j-VISIBLE-LANGUAGE      = "Visible Language"}

@String{j-WEBSERVER             = "WebServer Magazine: For Managers of World
                                  Wide Web Sites"}

@String{j-WORD-WAYS             = "Word Ways"}

@String{j-X-RESOURCE            = "{The X Resource}"}

%%% ====================================================================
%%% Organization abbreviations:
@String{org-GENERAL-ELECTRIC    = "General Electric"}

@String{org-GENERAL-ELECTRIC:adr = "Schenectady, NY, USA"}

%%% ====================================================================
%%% Publisher abbreviations:
@String{pub-A-K-PETERS          = "A. K. Peters, Ltd."}
@String{pub-A-K-PETERS:adr      = "Wellesley, MA, USA"}

@String{pub-ACADEMIC            = "Academic Press"}
@String{pub-ACADEMIC:adr        = "New York, NY, USA"}

@String{pub-ACM                 = "ACM Press"}
@String{pub-ACM:adr             = "New York, NY 10036, USA"}

@String{pub-AEGEAN-PARK         = "Aegean Park Press"}
@String{pub-AEGEAN-PARK:adr     = "Laguna Hills, CA, USA"}

@String{pub-AFIPS               = "AFIPS Press"}
@String{pub-AFIPS:adr           = "Montvale, NJ, USA"}

@String{pub-AMS                 = "American Mathematical Society"}
@String{pub-AMS:adr             = "Providence, RI, USA"}

@String{pub-ANSI                = "American National Standards Institute"}
@String{pub-ANSI:adr            = "1430 Broadway, New York, NY 10018, USA"}

@String{pub-AP-PROFESSIONAL     = "AP Professional"}
@String{pub-AP-PROFESSIONAL:adr = "Boston, MA, USA"}

@String{pub-ARTECH              = "Artech House Inc."}
@String{pub-ARTECH:adr          = "Norwood, MA, USA"}

@String{pub-AW                  = "Ad{\-d}i{\-s}on-Wes{\-l}ey"}
@String{pub-AW:adr              = "Reading, MA, USA"}

@String{pub-BIRKHAUSER          = "Birkh{\"a}user Verlag"}
@String{pub-BIRKHAUSER:adr      = "Basel, Switzerland"}

@String{pub-BLACKWELL-SCI       = "Blackwell Scientific Publications"}
@String{pub-BLACKWELL-SCI:adr   = "Oxford, UK"}

@String{pub-CAMBRIDGE           = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr       = "Cambridge, UK"}

@String{pub-CHAPMAN-HALL        = "Chapman and Hall, Ltd."}
@String{pub-CHAPMAN-HALL:adr    = "London, UK"}

@String{pub-CLARENDON           = "Clarendon Press"}
@String{pub-CLARENDON:adr       = "Oxford, UK"}

@String{pub-CRC                 = "CRC Press"}
@String{pub-CRC:adr             = "2000 N.W. Corporate Blvd., Boca Raton,
                                  FL 33431-9868, USA"}

@String{pub-CUP                 = "Cambridge University Press"}
@String{pub-CUP:adr             = "New York, NY, USA"}

@String{pub-DEKKER              = "Marcel Dekker, Inc."}
@String{pub-DEKKER:adr          = "New York, NY, USA"}

@String{pub-DOUBLEDAY           = "Doubleday"}
@String{pub-DOUBLEDAY:adr       = "New York, NY, USA"}

@String{pub-DOVER               = "Dover Publications, Inc."}
@String{pub-DOVER:adr           = "New York, NY, USA"}

@String{pub-ELSEVIER            = "Elsevier"}
@String{pub-ELSEVIER:adr        = "Amsterdam, The Netherlands"}

@String{pub-ESP                 = "Elsevier Science Publishers"}
@String{pub-ESP:adr             = "Amsterdam, The Netherlands"}

@String{pub-FREEMAN             = "W.H. Freeman"}
@String{pub-FREEMAN:adr         = "San Francisco, CA, USA and New York, NY,
                                  USA"}

@String{pub-GAUTHIER-VILLARS    = "Gauthier-Villars"}
@String{pub-GAUTHIER-VILLARS:adr = "Paris, France"}

@String{pub-GORDON-BREACH       = "Gordon and Breach"}
@String{pub-GORDON-BREACH:adr   = "Langhorne, PA, USA"}

@String{pub-HARCOURT-BRACE-JOVANOVICH = "Harcourt, Brace, Jovanovich"}
@String{pub-HARCOURT-BRACE-JOVANOVICH:adr = "San Diego, CA, USA"}

@String{pub-HARPER-ROW          = "Harper \& Row"}
@String{pub-HARPER-ROW:adr      = "New York, NY, USA"}

@String{pub-HARTUNG-GORRE       = "Hartung-Gorre Verlag"}
@String{pub-HARTUNG-GORRE:adr   = "Konstanz, Switzerland"}

@String{pub-HAYDEN-BOOK         = "Hayden Book Co."}
@String{pub-HAYDEN-BOOK:adr     = "Rochelle Park, NJ, USA"}

@String{pub-HOLDEN-DAY          = "Holden-Day"}
@String{pub-HOLDEN-DAY:adr      = "San Francisco, CA, USA"}

@String{pub-HOUGHTON-MIFFLIN    = "Houghton-Mifflin"}
@String{pub-HOUGHTON-MIFFLIN:adr = "Boston, MA, USA"}

@String{pub-IBM                 = "IBM Corporation"}
@String{pub-IBM:adr             = "San Jose, CA, USA"}

@String{pub-IEE                 = "IEE"}
@String{pub-IEE:adr             = "London, UK"}

@String{pub-IEEE                = "IEEE Computer Society Press"}
@String{pub-IEEE:adr            = "1109 Spring Street, Suite 300, Silver
                                  Spring, MD 20910, USA"}

@String{pub-IMA                 = "Institute of Mathematics and its
                                  Applications"}
@String{pub-IMA:adr             = "Southend-on-Sea, UK"}

@String{pub-IOS                 = "IOS Press"}
@String{pub-IOS:adr             = "Postal Drawer 10558, Burke, VA 2209-0558,
                                  USA"}

@String{pub-ISO                 = "International Organization for
                                  Standardization"}
@String{pub-ISO:adr             = "Geneva, Switzerland"}

@String{pub-JOHNS-HOPKINS       = "The Johns Hopkins University Press"}
@String{pub-JOHNS-HOPKINS:adr   = "Baltimore, MD, USA"}

@String{pub-JW                  = "John Wiley"}
@String{pub-JW:adr              = "New York, NY, USA"}

@String{pub-KAP                 = "Kluwer Academic Publisher"}
@String{pub-KAP:adr             = "Norwell, MA, USA, and Dordrecht, The
                                  Netherlands"}

@String{pub-KLUWER              = "Kluwer Academic Publishers"}
@String{pub-KLUWER:adr          = "Dordrecht, The Netherlands"}

@String{pub-KNOPF               = "Alfred A. Knopf"}
@String{pub-KNOPF:adr           = "New York, NY, USA"}

@String{pub-MACMILLAN           = "MacMillan Publishing Company"}
@String{pub-MACMILLAN:adr       = "New York, NY, USA"}

@String{pub-MANNING             = "Manning Publications"}
@String{pub-MANNING:adr         = "Greenwich, CT, USA"}

@String{pub-MASSON              = "Masson Editeur"}
@String{pub-MASSON:adr          = "Masson, France"}

@String{pub-MATH-ASSOC-AMER     = "Mathematical Association of America"}
@String{pub-MATH-ASSOC-AMER:adr = "Washington, DC, USA"}

@String{pub-MCGRAW-HILL         = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr     = "New York, NY, USA"}

@String{pub-MILLER-FREEMAN      = "Miller Freeman Publications"}
@String{pub-MILLER-FREEMAN:adr  = "San Francisco, CA, USA"}

@String{pub-MINDQ               = "MindQ Publishing, Inc."}
@String{pub-MINDQ:adr           = "450 Springpark Place Ste. 1200, Herndon, VA
                                  20170, USA, Tel: +1 703 708-9380"}

@String{pub-MIT                 = "MIT Press"}
@String{pub-MIT:adr             = "Cambridge, MA, USA"}

@String{pub-NAP                 = "National Academy Press"}
@String{pub-NAP:adr             = "Washington, DC, USA"}

@String{pub-NAT-COMP-CENTRE     = "National Computing Centre"}
@String{pub-NAT-COMP-CENTRE:adr = "Manchester, UK"}

@String{pub-NBS                 = "U.S. National Bureau of Standards"}
@String{pub-NBS:adr             = "Gaithersburg, MD, USA"}

@String{pub-NIST                = "National Institute for Standards and
                                  Technology"}
@String{pub-NIST:adr            = "Gaithersburg, MD 20899-8900, USA"}

@String{pub-NORTH-HOLLAND       = "North-Hol{\-}land"}
@String{pub-NORTH-HOLLAND:adr   = "Amsterdam, The Netherlands"}

@String{pub-NORTON              = "W. W. Norton \& Co."}
@String{pub-NORTON:adr          = "New York, NY, USA"}

@String{pub-NTIS                = "National Technical Information Service"}
@String{pub-NTIS:adr            = "Washington, DC, USA"}

@String{pub-ORA                 = "O'Reilly \& {Associates, Inc.}"}
@String{pub-ORA:adr             = "103a Morris Street, Sebastopol, CA 95472,
                                  USA, Tel: +1 707 829 0515, and 90 Sherman
                                  Street, Cambridge, MA 02140, USA, Tel: +1
                                  617 354 5800"}

@String{pub-OXFORD              = "Oxford University Press"}
@String{pub-OXFORD:adr          = "Walton Street, Oxford OX2 6DP, UK"}

@String{pub-PEACHPIT            = "Peachpit Press, Inc."}
@String{pub-PEACHPIT:adr        = "1085 Keith Avenue, Berkeley, CA 94708, USA"}

@String{pub-PH                  = "Pren{\-}tice-Hall, Inc."}
@String{pub-PH:adr              = "Upper Saddle River, NJ 07458, USA"}

@String{pub-PHPTR               = "Pren{\-}tice-Hall PTR"}
@String{pub-PHPTR:adr           = "Upper Saddle River, NJ 07458, USA"}

@String{pub-PLENUM              = "Plenum Press"}
@String{pub-PLENUM:adr          = "New York, NY, USA; London, UK"}

@String{pub-PRINCETON          = "Princeton University Press"}
@String{pub-PRINCETON:adr      = "Princeton, NJ, USA"}

@String{pub-PROJECT-GUTENBERG   = "Project Gutenberg"}
@String{pub-PROJECT-GUTENBERG:adr = "P.O. Box 2782, Champaign, IL 61825-2782,
                                  USA"}

@String{pub-RANDOM              = "Random House"}
@String{pub-RANDOM:adr          = "New York, NY, USA"}

@String{pub-REIDEL              = "D. Reidel"}
@String{pub-REIDEL:adr          = "Dordrecht, Boston, Lancaster, Tokyo"}

@String{pub-RSA                 = "RSA Data Security, Inc."}
@String{pub-RSA:adr             = "Redwood City, CA, USA"}

@String{pub-SAMS                = "Howard W. Sams"}
@String{pub-SAMS:adr            = "Indianapolis, IN 46268, USA"}

@String{pub-SIAM                = "Society for Industrial and Applied
                                  Mathematics"}
@String{pub-SIAM:adr            = "Philadelphia, PA, USA"}

@String{pub-SIMON-SCHUSTER      = "Simon and Schuster"}
@String{pub-SIMON-SCHUSTER:adr  = "1230 Ave. of the Americas, New York, NY
                                  10020, USA"}

@String{pub-SPE                 = "Society of Petroleum Engineers"}
@String{pub-SPE:adr             = "Richardson, TX, USA"}

@String{pub-SPIE                = "Society of Photo-optical
                                  Instrumentation Engineers (SPIE)"}
@String{pub-SPIE:adr            = "Bellingham, WA, USA"}

@String{pub-SRI                 = "SRI International"}
@String{pub-SRI:adr             = "333 Ravenswood Avenue, Menlo Park, CA
                                  94025-3493, USA, Tel: +1 415 859 6387, FAX:
                                  +1 415 859-6028"}

@String{pub-STATSCI             = "StatSci, a Division of MathSoft, Inc."}
@String{pub-STATSCI:adr         = "Seattle, WA, USA"}

@String{pub-SUN                 = "Sun Microsystems"}
@String{pub-SUN:adr             = "2550 Garcia Avenue, Mountain View, CA
                                  94043, USA"}

@String{pub-SV                  = "Spring{\-}er-Ver{\-}lag"}
@String{pub-SV:adr              = "Berlin, Germany~/ Heidelberg, Germany~/
                                  London, UK~/ etc."}

@String{pub-USC-ISI             = "University of Southern California,
                                  Information Sciences Institute"}
@String{pub-USC-ISI:adr         = "Marina del Rey, CA, USA"}

@String{pub-USENIX              = "USENIX Association"}
@String{pub-USENIX:adr          = "Berkeley, CA, USA"}

@String{pub-USGPO               = "United States Government Printing Office"}
@String{pub-USGPO:adr           = "Washington, DC, USA"}

@String{pub-UTILITAS-MATH       = "Utilitas Mathematica Publishers"}
@String{pub-UTILITAS-MATH:adr   = "Winnipeg, Manitoba, Canada"}

@String{pub-VENTANA             = "Ventana Press"}
@String{pub-VENTANA:adr         = "Chapel Hill, NC, USA"}

@String{pub-WESTVIEW            = "Westview Press"}
@String{pub-WESTVIEW:adr        = "Boulder, CO, USA"}

@String{pub-WILEY               = "John Wiley and Sons, Inc."}
@String{pub-WILEY:adr           = "New York, NY, USA"}

@String{pub-WORLD-SCI           = "World Scientific Publishing Co."}
@String{pub-WORLD-SCI:adr       = "Singapore; Philadelphia, PA, USA; River
                                  Edge, NJ, USA"}

%%% ====================================================================
%%% Series abbreviations:
@String{ser-LNAI                = "Lecture Notes in Artificial Intelligence"}

@String{ser-LNCS                = "Lecture Notes in Computer Science"}

@String{ser-LNMATH              = "Lecture Notes in Mathematics"}

@String{ser-PROJECT-GUTENBERG   = "Project Gutenberg"}

@String{ser-SIGPLAN             = "ACM SIG{\-}PLAN Notices"}

%%% ====================================================================
%%% Bibliography entries, sorted by year, and then by citation label:
@Book{Simonetta:1404:LTC,
  author =       "Cicco Simonetta",
  title =        "{[Little} tract on cryptanalysis]",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1404",
  bibdate =      "Sun Dec 24 09:39:18 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cited in \cite[page 25]{Callimahos:1992:HC}. Elsewhere
                 in the journal (volume 12, number 5, May 1985, page
                 11), the year is given as 1471, the author as Sicco
                 Simonetta, and the title as \booktitle{Regulae ad
                 extrahendum litteras zifferatas sine exemplo. (Latin)
                 [Rules for extracting an enciphered text: an
                 example]}.",
}

@Book{Alberti:1470:TC,
  author =       "Leon Battista Alberti",
  title =        "Trattati in Cifra. ({Italian}) [{Treatises} in
                 ciphers]",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1470",
  bibdate =      "Sun Dec 24 09:37:07 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "Leon Battista Alberti (1404--1472)",
  language =     "Italian",
  remark =       "Cited in \cite[page 25]{Callimahos:1992:HC}.",
  remark =       "Alberti is considered the father of Western
                 cryptology, according to \cite[page
                 26]{Callimahos:1992:HC}.",
}

@Book{Trithemius:1518:PLS,
  author =       "Johannes Trithemius",
  title =        "Polygraphiae Libri Sex",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1518",
  bibdate =      "Thu Feb 05 06:27:05 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "Latin",
  remark =       "This book is cited in a 4-Feb-2015 New York Times
                 article ``Cracking Codes through the Centuries'' as the
                 earliest printed book on cryptography. However,
                 Callimahos \cite[page 25]{Callimahos:1992:HC} gives the
                 year as 1531.",
}

@Book{Trithemius:1606:CGT,
  author =       "Johannes Trithemius",
  title =        "Clauis generalis triplex in libros steganographicos
                 {Iohannis Trithemij} \ldots{}",
  publisher =    "Iohannis Berneri",
  address =      "Frankfurt, Germany",
  pages =        "7 + 1",
  year =         "1606",
  LCCN =         "Z103.T84 S 1606",
  bibdate =      "Wed Apr 14 06:33:41 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Ab ipso authore conscripta \ldots{} Darmbstadij:
                 Excudebat Balthasar Hofmann, impensis Iohannis Berneri,
                 bibliop. Francof., anno 1606.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1606:CSI,
  author =       "Johannes Trithemius",
  title =        "Clauis {Steganographiae Ioannis Trithemij}, abbatis
                 {Spanheimensis}, ad Serenissimum Principem Dn.
                 {Philippum} \ldots{}",
  publisher =    "Ioannem Bernerum",
  address =      "Frankfurt, Germany",
  pages =        "70",
  year =         "1606",
  LCCN =         "Z103.T84 S 1606",
  bibdate =      "Wed Apr 14 06:14:52 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Venundatur apud Ioannem Bernerum, bibliopolam
                 Francofurtensem, anno 1606.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1606:SHE,
  author =       "Johannes Trithemius",
  title =        "Steganographia: hoc est, ars per occultam scripturam
                 animi sui voluntatem absentibus aperiendi certa",
  publisher =    "Matthiae Beckeri",
  address =      "Frankfurt, Germany",
  pages =        "8 + 180",
  year =         "1606",
  LCCN =         "Z103.T84 S 1606",
  bibdate =      "Wed Apr 14 06:18:44 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Authore \ldots{} Ioanne Trithemio \ldots{}; praefixa
                 est huic operi sua clauis, seu vera introductio ab ipso
                 authore concinnata \ldots{} nunc vero in gratiam
                 secretioris philosophiae studiosorum publici iuris
                 facta. Francofurti. Ex officina typographica Matthiae
                 Beckeri, sumptibus Ioannis Berneri, anno 1606.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Schwenter:1620:SSN,
  author =       "Daniel Schwenter",
  title =        "{Steganologia \& steganographia nova: Geheime
                 magische, naturliche Red vnd Schreibkunst, einem in der
                 nahe vnd ferrne Alsbalden oder in gewiser Zeit, so woln
                 in Schimpff als Ernst, etwas verborgens vnnd geheimes
                 zu eroffnen durch Reden, Schreiben vnd mancherley
                 Instrumenta: item wie verborgene Schrifften zu machen,
                 auffzulosen, vnd mit sonderlichen Kunsten zu
                 schreiben}",
  publisher =    "Resene Gibronte Runeclus Hanedi",
  address =      "N{\"u}rnberg, Germany",
  pages =        "16 + 299 + 5",
  year =         "1620",
  LCCN =         "KK276 .E36 1575; Z103.5",
  bibdate =      "Wed Apr 14 06:21:05 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Publication year uncertain. Publicirt vnd an Tag
                 gegeben durch Resene Gibronte Runeclus Hanedi \ldots{}
                 Nurnberg: Inn Verlegung Simon Halbmayers.",
  acknowledgement = ack-nhfb,
  annote =       "Schwenter, Daniel, 1585--1636. The Trithemius ciphers
                 were finally solved in 1998 by J. Reeds
                 \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1621:CGT,
  author =       "Johannes Trithemius",
  title =        "Clauis generalis triplex in libros steganographicos
                 {Iohannis Trithemij} \ldots{}",
  publisher =    "Balthasar Hofmann",
  address =      "Darmstadt, Germany",
  pages =        "7 + 1",
  year =         "1621",
  LCCN =         "Z103 .T84 1621",
  bibdate =      "Wed Apr 14 06:07:51 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Ab ipso authore conscripta \ldots{} Darmbstadij.
                 Excudebat Balthasar Hofmann, impensis Iohannis Berneri,
                 bibliop. Francof., anno 1621.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1621:CSI,
  author =       "Johannes Trithemius",
  title =        "Clauis Steganographiae {Ioannis Trithemij}, abbatis
                 Spanheimensis, ad Serenissimum Principem Dn.
                 {Philippum} \ldots{}",
  publisher =    "Iohannem Bernerum",
  address =      "Frankfurt, Germany",
  pages =        "64",
  year =         "1621",
  LCCN =         "Z103 .T84 1621",
  bibdate =      "Wed Apr 14 06:09:58 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Venundatur apud Iohannem Bernerum, bibliopolam
                 Francofurtensem, anno 1621.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1621:SHE,
  author =       "Johannes Trithemius",
  title =        "Steganographia: hoc est, ars per occultam scripturam
                 animi sui voluntatem absentibus aperiendi certa",
  publisher =    "Balthasaris Aulaeandri",
  address =      "Darmstadt, Germany",
  pages =        "8 + 152 + 2",
  year =         "1621",
  LCCN =         "Z103 .T84 1621",
  bibdate =      "Wed Apr 14 06:04:51 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Authore \ldots{} Ioanne Trithemio \ldots{}; praefixa
                 est huic operi sua clauis, seu vera introductio ab ipso
                 authore concinnata \ldots{} nunc vero in gratiam
                 secretioris philosophiae studiosorum publici iuris
                 facta. Darmbstadij. Ex officina typographica
                 Balthasaris Aulaeandri, sumptibus vero Ioannis Berneri,
                 bibliop. Francof., anno 1621",
  acknowledgement = ack-nhfb,
  annote =       "Trithemius, Johannes, 1462--1516. The Trithemius
                 ciphers were finally solved in 1998 by J. Reeds
                 \cite{Reeds:1998:SCB}.",
}

@Book{Puteanus:1627:EPC,
  author =       "Erycius Puteanus",
  title =        "{ErycI} Puteani Cryptographia Tassiana, sive,
                 Clandestina scripti",
  publisher =    "Typis Cornelii Coenesteynii",
  address =      "Louvanii",
  pages =        "18 + 2",
  year =         "1627",
  LCCN =         "Z103.5 .P88 1627",
  bibdate =      "Mon Sep 13 07:01:38 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Schwenter:1633:SSA,
  author =       "Daniel Schwenter",
  title =        "{Steganologia \& [i.e. et] steganographia aucta:
                 geheime, magische, naturliche Red vnnd Schreibkunst}",
  publisher =    "Resene Gibronte Runeclusam Hunidem",
  address =      "N{\"u}rnberg, Germany",
  pages =        "24 + 370",
  year =         "1633",
  LCCN =         "Z103 .S38 1633",
  bibdate =      "Wed Apr 14 06:28:21 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Auffs neue revidirt, an etlichen Orten corrigirt,
                 \ldots{} augirt, vnd dann zum drittenmal in Truck
                 verfertiget durch Janum Herculem de Sunde, sonst Resene
                 Gibronte Runeclusam Hunidem \ldots{}. Nurnberg, In
                 Verlegung Jeremiae Dumlers [between 1633 and 1636].",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Wilkins:1641:MSS,
  author =       "John Wilkins",
  title =        "{Mercury}, or the Secret and Swift Messenger",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1641",
  bibdate =      "Thu Feb 05 06:32:55 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "This book is cited in a 4-Feb-2015 New York Times
                 article ``Cracking Codes through the Centuries'' with
                 the comments ``[the book] suggests writing with \the
                 juice of glow-worms' to create messages that can be
                 read only in the dark, or `glutinous moisture' --- milk
                 or fat --- that the recipient can read only by
                 scattering dust on the letters. Alphabets could be
                 translated into musical notes or flowers.''",
}

@Book{duCarlet:1644:CCV,
  author =       "Maistre Iean Robert {du Carlet}",
  title =        "La cryptographie: contenant vne tres-subtile manier
                 d'escrire secr{\`e}tement. ({French}) [{Cryptography}:
                 containing a very subtle manner of secret writing]",
  publisher =    "Imprimeur ordinaire du Roy et R. Aurelhe, Marchand
                 libraire",
  address =      "Paris, France",
  pages =        "234 + 2",
  year =         "1644",
  LCCN =         "Z103.5 .D82 1644b",
  bibdate =      "Mon Sep 13 06:54:53 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
}

@Book{Mersenne:1644:CPM,
  author =       "Marin Mersenne",
  title =        "Cogitata Physica-Mathematica \ldots{} [Tractatus de
                 mensuris ponderibus atque nummis \ldots{} Hydraulica
                 pneumatica; arsque navigandi. Harmonia theorica,
                 practica. Et Mechanica phaenomena. Ballistica et
                 acontismologia]",
  publisher =    "Antonii Bertier",
  address =      "Paris, France",
  pages =        "[30], 40 [24], 41--370, [16], 96, [8], 138, [34] +
                 40",
  day =          "1",
  month =        apr,
  year =         "1644",
  bibdate =      "Sat Aug 23 10:04:54 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes. This is the book that introduced the
                 conjecture that numbers of the form $ M(n) = 2^n - 1 $
                 are prime for $ n = 2, 3, 5, 7, 13, 17, 19, 31, 67,
                 127, $ and $ 257 $, but could not test this claim.
                 Euler showed in 1750 that $ M(31) $ is prime. Lucas
                 showed in 1876 that $ M(127) $ is prime. Pervouchine
                 showed in 1883 that $ M(61) $ is prime, finally
                 disproving the Mersenne conjecture. Powers in the early
                 1900s showed that $ M(89) $ and $ M(107) $ are prime,
                 both missed by Mersenne. By 1947, it was known that the
                 correct list is $ 2, 3, 5, 7, 13, 17, 19, 31, 61, 89,
                 107 $, and $ 127 $, so Mersenne had five errors in his
                 list: $ 67 $ and $ 257 $ should have been removed, and
                 $ 61, 89 $, and $ 107 $ added. By late 2001, 39
                 Mersenne primes were known, the five largest having
                 been found by massive distributed computing efforts
                 through the Great Internet Mersenne Primes Search
                 (GIMPS) project. The largest of these is $ M(13466917)
                 $, a number containing 4,053,946 digits.",
  URL =          "http://www.mersenne.org/prime.htm;
                 http://www.mersenne.org/status.htm",
  acknowledgement = ack-nhfb,
  annote =       "Peracta est haec impressio die 1. April. 1644.",
  keywords =     "Marin Mersenne (1588--1648)",
  language =     "Latin",
  tableofcontents = "I: De mensuris, ponderibus, & nummis Hebraicis,
                 Graecis, & Romanis ad Gallica redactis. -- II: De
                 hydraulico-pneumaticis phaenomenis. -- III: De arte
                 nautica, sev histiodromia, & hydrostatica. -- IV: De
                 musica theorica & practica. -- V: De mechanicis
                 phaenomenis. -- VI: De ballisticis, sev
                 acontismologicis phaenomenis",
}

@Book{Morland:1666:NMC,
  author =       "Sir Samuel Morland",
  title =        "A New Method of Cryptography",
  publisher =    "????",
  address =      "????",
  pages =        "12",
  year =         "1666",
  bibdate =      "Tue Jul 05 14:50:30 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Microfilm in Folger Shakespeare Library, Washington,
                 DC, USA.",
  acknowledgement = ack-nhfb,
  remark =       "This book is cited in a 4-Feb-2015 New York Times
                 article ``Cracking Codes through the Centuries'' with
                 the comment ``His [Morland's] proposal for a cyclologic
                 cryptographic machine, illustrated on the book's last
                 page, relies on a series of cipher wheels that make it
                 a close cousin to Sigaba and Enigma''.",
}

@Book{Heidel:1676:JTP,
  author =       "Wolfgango Ernesto Heidel",
  title =        "{Johannis Trithemii} primo Spanheimensis deinde {Divi
                 Jacobi Peapolitani} abbatis {Steganographia}: quae
                 hucusq[ue] a nemine intellecta sed passim ut
                 supposititia, perniciosa, magica \& necromantica
                 rejecta, elusa, damnata \& sententiam inquisitionis
                 passa, nunc tandem vindicata, reserata et illustrata
                 ubi post vindicias Trithemii clarissime explicantur
                 conjurationes spirituum ex {Arabicis}, {Hebraicis},
                 {Chaldaicis} \& {Graecis} spirituum nominibus juxta
                 quosdam conglobatae, aut secundum alios ex barbaris \&
                 nihil significantibus verbis concinnatae: deinde
                 solvuntur \& exhibentur artificia nova steganographica
                 a {Trithemio} in literis ad {Arnoldum Bostium} \&
                 {Polygraphia} promissa, in hunc diem a nemine capta,
                 sed pro paradoxis \& impossibilibus habita \& summe
                 desiderata",
  publisher =    "Wormatiense, Moguntiae. Sumptibus Joannis Petri
                 Zubrodt",
  address =      "",
  pages =        "8 + 394 (or 396) + 4",
  year =         "1676",
  LCCN =         "Z103 .T84 1676",
  bibdate =      "Wed Apr 14 06:11:27 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Includes Heidel's life of Trithemius and his
                 vindication of the Steganographia.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Morrice:1692:EB,
  author =       "Roger Morrice",
  title =        "Entring Book",
  publisher =    "????",
  address =      "????",
  pages =        "1500",
  year =         "1692",
  bibdate =      "Mon Sep 15 16:32:21 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  URL =          "http://www.hist.cam.ac.uk/seminars_events/events/roger-morrice.html;
                 http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2003/08/29/ndiary29.xml",
  acknowledgement = ack-nhfb,
  remark =       "From the Cambridge Web site: ``The Morrice Project
                 exists to publish Roger Morrice's Entring Book, the
                 most important unpublished record of British political
                 and religious history of the second half of the
                 seventeenth century. The fragile, three volume, 1500
                 page manuscript of Roger Morrice's Entring Book is in
                 Dr Williams's Library, 14 Gordon Square, London, the
                 pre-eminent research library of English Protestant
                 Nonconformity. The Entring Book is 900,000 words long
                 and covers the years 1677 to 1691.''\par

                 From the Telegraph story of 29-Aug-2003: ``A remarkable
                 million-word account of life in late 17th century
                 England which is as vivid as Samuel Pepys's diary has
                 been transcribed by experts after lying largely
                 forgotten for more than three centuries.\par

                 A specialist code-breaker was brought in to crack the
                 shorthand that Roger Morrice, a Puritan minister turned
                 political journalist, used in part of the diary to stop
                 the King's agents reading it. \ldots{} \par

                 Now the transcription has been completed and six
                 volumes of Morrice's well-informed account of a
                 turbulent period during which England was ruled by
                 three different monarchs will be published in 2005.\par
                 About 40,000 words of the diary were in code and the
                 team, led by the Cambridge academic Dr Mark Goldie,
                 brought in an expert in 17th century shorthand to
                 reveal for the first time what Morrice had written.''",
  xxnote =       "Exact publication year unknown; I set it to just after
                 the years covered.",
}

@Book{Conradi:1739:CDS,
  author =       "David Arnold Conradi",
  title =        "Cryptographia denudata; sive, Ars deciferandi, quae
                 occulte scripta sunt in quocunque linguarum genere,
                 praecipue in {Germanica, Batava, Latina, Anglica,
                 Gallica, Italica, Graeca}",
  publisher =    "Apud P. Bonk",
  address =      "Lugduni Batavorum",
  pages =        "73",
  year =         "1739",
  LCCN =         "Z103 .C66",
  bibdate =      "Mon Sep 13 07:04:09 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Kasiski:1863:GDG,
  author =       "Friedrich Wilhelm Kasiski",
  title =        "{Die Geheimschriften und die Dechiffrirkunst, Mit
                 besonderer Ber{\"u}cksichtigung der deutschen und
                 franz{\"o}sischen Sprache}. ({German}) [{Secret}
                 writing and the art of deciphering, with special
                 reference to the {German} and {French} languages]",
  publisher =    "E. S. Mittler und Sohn",
  address =      "Berlin, Germany",
  pages =        "viii + 95 + 4",
  year =         "1863",
  LCCN =         "????",
  bibdate =      "Sat May 16 11:30:41 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "This is the first published account of the breaking of
                 the Vigen{\`e}re Cipher, although Charles Babbage
                 accomplished that in 1854; Babbage's planned book on
                 cryptography was never completed or published. See
                 \cite{Singh:1999:CBE,Lewand:2010:PC} for more on
                 Kasiski and Babbage's work.",
}

@Book{Colaco:1864:CRO,
  author =       "F. N. Cola{\c{c}}o",
  title =        "A cryptographia revelada, ou, Arte de traduzir e
                 decifrar as escrituras obscuras, quaesquer que sejao os
                 caracteres empregados. ({Portuguese}) [{Cryptography}
                 revealed, or, the art of translating and deciphering
                 obscure writings, whatever the characters employed]",
  publisher =    "De Santos e Cia",
  address =      "Pernambuco, Brazil",
  pages =        "93",
  year =         "1864",
  LCCN =         "Z104 .C68 1846",
  bibdate =      "Mon Sep 13 06:59:12 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "Portuguese",
  xxnote =       "Check year: Library of Congress has conflicting data:
                 1846 and 1864??",
}

@Book{S:1873:COD,
  author =       "H. S.",
  title =        "Cryptographie, ou, Divers syst{\`e}mes d'{\'e}crire
                 secr{\`e}te sp{\'e}cialement pour l'usage des cartes
                 postales: combinations alphab{\'e}tiques,
                 correspondance chiffr{\'e}e, {\'e}criture par signes:
                 divers proc{\'e}d{\'e}s pour la fabrication d'encres
                 sympathiques",
  publisher =    "G. Jousset",
  address =      "Paris, France",
  pages =        "8",
  year =         "1873",
  LCCN =         "Z104 .H16 1873",
  bibdate =      "Mon Sep 13 06:51:31 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Jevons:1874:PS,
  author =       "W. Stanley Jevons",
  title =        "The Principles of Science",
  publisher =    "????",
  address =      "????",
  pages =        "??--??",
  year =         "1874",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 7]{Odlyzko:1995:FIF}.",
}

@Article{Kerckhoffs:1883:CMF,
  author =       "Auguste Kerckhoffs (von Nieuwenhof)",
  title =        "La Cryptographie Militaire. ({French}) [{Military}
                 cryptography]",
  journal =      "Journal des Sciences Militaires",
  volume =       "IX",
  number =       "??",
  pages =        "5--38, 161--191",
  month =        jan # "\slash " # feb,
  year =         "1883",
  bibdate =      "Thu May 16 08:07:14 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/kerckhoffs/la_cryptographie_militaire_i.htm
                 https://www.petitcolas.net/kerckhoffs/;
                 https://www.petitcolas.net/kerckhoffs/crypto_militaire_1_b.pdf;
                 https://www.petitcolas.net/kerckhoffs/crypto_militaire_2.pdf",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced online at the indicated URL. This is one of
                 the early papers that argues for publication of
                 cryptographic algorithms, as discussed by Bruce
                 Schneier in the CRYPTO-GRAM newsletter of 15-May-2002.
                 Also discussed in \cite{Cohen:1987:IIP} in Chapter 2.1:
                 ``A Short History of Cryptography'': Cohen writes:
                 ``Kerckhoffs \ldots{} set forth six basic requirements
                 of cryptography. We note that the easily remembered key
                 is very amenable to attack, and that these rules, as
                 all others, should be questioned before placing trust
                 in them: \begin{itemize} \item ciphertext should be
                 unbreakable in practice \item the cryptosystem should
                 be convenient for the correspondents \item the key
                 should be easily remembered and changeable \item the
                 ciphertext should be transmissible by telegraph \item
                 the cipher apparatus should be easily portable \item
                 the cipher machine should be relatively easily to use
                 \end{itemize} ''",
  language =     "French",
  xxpages =      "38--??",
}

@Book{Josse:1885:CSA,
  author =       "H. (Henri) Joss{\'e}",
  title =        "La cryptographie et ses applications {\`a} l'art
                 militaire",
  publisher =    "Libraire militaire de L. Baudoin",
  address =      "Paris, France",
  pages =        "103",
  year =         "1885",
  LCCN =         "Z104 .J67 1885",
  bibdate =      "Thu May 16 08:13:44 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Perret:1890:RCS,
  author =       "P.-M. Perret",
  title =        "Les r{\`e}gles de {Cicco Simonetta} pour le
                 d{\'e}chiffrement des {\'e}critures secr{\`e}tes (4
                 juillet 1474). ({French}) [The rules of {Cicco
                 Simonetta} for decryption of secret writings ({4 July
                 1474})]",
  journal =      "Biblioth{\`e}que de l{\'E}cole des chartes",
  volume =       "51",
  pages =        "516--525",
  year =         "1890",
  ISSN =         "0373-6237 (print), 1953-8138 (electronic)",
  ISSN-L =       "0373-6237",
  bibdate =      "Sun Dec 24 17:37:36 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.jstor.org/stable/43000437",
  acknowledgement = ack-nhfb,
  language =     "French",
  xxDOI =        "https://doi.org/10.2307/43000437",
}

@Article{Valerio:1892:C,
  author =       "Paul Louis Eugene Valerio",
  title =        "De la Cryptographie",
  journal =      "Journal des Sciences militares, 9th series, Paris",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  month =        dec,
  year =         "1892",
  bibdate =      "Thu Oct 31 18:47:22 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Date cited as 9th series, Dec 1892--May 1895.",
}

@Book{Hulme:1898:CHP,
  author =       "F. Edward (Frederick Edward) Hulme",
  title =        "Cryptography; or, The history, principles, and
                 practice of cipher-writing",
  publisher =    "Ward, Lock and Co., Limited",
  address =      "????",
  pages =        "192",
  year =         "1898",
  LCCN =         "Z 104 H91",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "First edition. Galland, p. 94. Bound in yellow cloth;
                 stamped in black. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Walden:1900:ADB,
  author =       "John William Henry Walden",
  title =        "{August, Duke of Braunschweig-Luneburg}: The
                 cryptomenytics and cryptography of {Gustavus Selenus}:
                 in nine books: wherein is also contained a most clear
                 elucidation of the {Steganographia}, a book at one time
                 composed in magic and enigmatic form by {Johannes
                 Trithemius}",
  publisher =    "????",
  address =      "????",
  year =         "1900",
  LCCN =         "Z103 .A95 1900",
  bibdate =      "Wed Apr 14 06:24:45 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "August, Duke of Braunschweig-Luneburg 1579--1666. The
                 Trithemius ciphers were finally solved in 1998 by J.
                 Reeds \cite{Reeds:1998:SCB}.",
}

@Book{delaStelle:1902:TCF,
  author =       "F{\'e}lix-Marie de la Stelle",
  title =        "Trait{\'e} de cryptographie. ({French}) [{Treatise} on
                 cryptography]",
  publisher =    pub-GAUTHIER-VILLARS,
  address =      pub-GAUTHIER-VILLARS:adr,
  pages =        "????",
  year =         "1902",
  bibdate =      "Sun Dec 24 09:50:59 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "F{\'e}lix-Marie de la Stelle (or Delastelle)
                 (1840--1902)",
  remark =       "Cited in \cite[page 26]{Callimahos:1992:HC}.",
}

@Article{Guarini:1904:MTT,
  author =       "Emile Guarini",
  title =        "The {Malcotti} Telecryptograph for Telegraphing Upon
                 Telephone Lines",
  journal =      j-SCI-AMER,
  volume =       "91",
  number =       "12",
  pages =        "193--194",
  day =          "17",
  month =        sep,
  year =         "1904",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican09171904-193a",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:20:28 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1900.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v91/n12/pdf/scientificamerican09171904-193a.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "cryptography; decryption; encryption",
}

@Article{Claudy:1912:TMS,
  author =       "C. H. Claudy",
  title =        "A Triple Mirror for Secret Signaling",
  journal =      j-SCI-AMER,
  volume =       "107",
  number =       "17",
  pages =        "346--346",
  day =          "26",
  month =        oct,
  year =         "1912",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican10261912-346",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:15:12 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v107/n17/pdf/scientificamerican10261912-346.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@TechReport{Mauborgne:1914:APC,
  author =       "Joseph O. Mauborgne",
  title =        "An Advanced Problem in Cryptography and Solution",
  institution =  "Army Service School's Press",
  address =      "Ft. Leavenworth, KS, USA",
  pages =        "21",
  year =         "1914",
  bibdate =      "Sun Dec 24 09:44:44 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Solution of the Playfair Cipher, invented by Sir
                 Charles Wheatstone, but named by Lord Lyon Playfair of
                 the UK Foreign Office. WorldCat dates this as 1918.",
}

@Article{Edwards:1915:CCT,
  author =       "E. C. Edwards",
  title =        "Cipher Codes and their Uses",
  journal =      j-SCI-AMER,
  volume =       "113",
  number =       "1",
  pages =        "9--9",
  day =          "3",
  month =        jul,
  year =         "1915",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican07031915-9",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:20:13 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v113/n1/pdf/scientificamerican07031915-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Honore:1919:STS,
  author =       "F. Honore",
  title =        "The Secret Telephone, Are Sound Waves ever Visible?",
  journal =      j-SCI-AMER,
  volume =       "121",
  number =       "23",
  pages =        "555--555",
  day =          "6",
  month =        dec,
  year =         "1919",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican12061919-555",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:27:45 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v121/n23/pdf/scientificamerican12061919-555.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Meador:1920:KCE,
  author =       "J. E. D. Meador",
  title =        "Keeping the Camera on an Even Keel, Telephoning in
                 Cipher",
  journal =      j-SCI-AMER,
  volume =       "123",
  number =       "5",
  pages =        "107--107",
  day =          "31",
  month =        jul,
  year =         "1920",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican07311920-107a",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:11:40 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v123/n5/pdf/scientificamerican07311920-107a.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Arensberg:1921:CD,
  author =       "Walter Arensberg",
  title =        "The cryptography of {Dante}",
  publisher =    pub-KNOPF,
  address =      pub-KNOPF:adr,
  pages =        "x + 494",
  year =         "1921",
  LCCN =         "PQ4406.A7",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; Dante Alighieri, 1265--1321 ---
                 symbolism; Dante Alighieri, 1265--1321 Divina
                 Commedia",
}

@Article{Anonymous:1922:PUS,
  author =       "Anonymous",
  title =        "Practical Uses for the Spectroscope, Secret Radio
                 Communication",
  journal =      j-SCI-AMER,
  volume =       "127",
  number =       "4",
  pages =        "259--259",
  month =        oct,
  year =         "1922",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican1022-259",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:13:39 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v127/n4/pdf/scientificamerican1022-259.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Arensberg:1922:CSP,
  author =       "Walter Arensberg",
  title =        "The cryptography of {Shakespeare}. Part one",
  publisher =    "Howard Bowen",
  address =      "Los Angeles, CA, USA",
  pages =        "ix + 280",
  year =         "1922",
  LCCN =         "PR2944.A6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "No more published. Source: Bequest of George Fabyan,
                 1940. DLC",
  acknowledgement = ack-nhfb,
  keywords =     "Shakespeare, William, 1564-1616 --- authorship ---
                 Baconian theory",
}

@Book{Budge:1922:RS,
  author =       "Sir E. A. Wallis (Ernest Alfred Wallis) Budge",
  title =        "The {Rosetta} Stone",
  publisher =    "British Museum Press",
  address =      "London, UK",
  pages =        "8 + 1",
  year =         "1922",
  LCCN =         "PJ1531.R3 1913",
  bibdate =      "Tue Dec 01 10:37:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted with revisions in 1935, 1950, and 1968.",
  acknowledgement = ack-nhfb,
}

@Book{Langie:1922:C,
  author =       "Andr{\'e} Langie and James Cruickshank Henderson
                 Macbeth",
  title =        "Cryptography",
  publisher =    "Constable and Company Limited",
  address =      "London, UK",
  pages =        "vii + 1 + 192",
  year =         "1922",
  LCCN =         "Z 104 L26dE",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Bibliography: p.158.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{USASC:1923:EC,
  author =       "{United States.Army.Signal Corps} and {George Fabyan
                 Collection (Library of Congress)}",
  title =        "Elements of cryptanalysis",
  number =       "3",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "vii + 157",
  year =         "1923",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Training pamphlet",
  acknowledgement = ack-nhfb,
  annote =       "LC copy is item no. 717 of the George Fabyan
                 Collection.",
  keywords =     "Ciphers; Cryptography",
}

@Book{USWarDept:1924:EC,
  author =       "{United States.War Dept}",
  title =        "Elements of cryptanalysis",
  volume =       "3",
  publisher =    "Government Printing Office",
  address =      "Washington, DC, USA",
  pages =        "vii + 157",
  year =         "1924",
  LCCN =         "Z104 .U6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Its training pamphlet",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{USWD:1924:EC,
  author =       "{United States.War Dept}",
  title =        "Elements of cryptanalysis",
  number =       "3",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "vii + 157",
  year =         "1924",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Its Training pamphlet",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography.",
}

@Book{Givierge:1925:CC,
  author =       "Marcel Givierge",
  title =        "Cours de cryptographie",
  publisher =    "Berger-Levrault",
  address =      "Paris, France",
  pages =        "ix + 304",
  year =         "1925",
  LCCN =         "Z104 .G43",
  bibdate =      "Sat Sep 25 10:58:57 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cited in \cite{Shannon:1949:CTS}.",
}

@Book{Lange:1925:TC,
  author =       "Andr{\'e} Lange and E. A. Soudart",
  title =        "Trait{\'e} de cryptographie. ({French}) [{Treatise} on
                 cryptography]",
  publisher =    "Librairie F{\'e}lix Alcan",
  address =      "Paris, France",
  pages =        "xii + 366 + vi",
  year =         "1925",
  LCCN =         "Z104 .L26 1925",
  bibdate =      "Sun Dec 24 17:46:24 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  language =     "French",
  remark =       "LC copy is item no. 411 of the George Fabyan
                 Collection (Riverbank Laboratories, west of Chicago,
                 IL, USA)",
  subject =      "Cryptography; Cyphers; Signs and symbols",
}

@Article{Vernam:1926:CPT,
  author =       "G. S. Vernam",
  title =        "Cipher Printing Telegraph Systems for Secret Wire and
                 Radio Telegraphic Communications",
  journal =      "Journal American Institute of Electrical Engineers",
  volume =       "{XLV}",
  number =       "??",
  pages =        "109--115",
  year =         "1926",
  bibdate =      "Sat Sep 25 11:06:06 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cited in \cite{Shannon:1949:CTS}.",
}

@Article{Russell:1927:CMS,
  author =       "Henry Norris Russell",
  title =        "Cipher Messages of the Stars",
  journal =      j-SCI-AMER,
  volume =       "137",
  number =       "2",
  pages =        "118--119",
  month =        aug,
  year =         "1927",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican0827-118",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:15:38 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v137/n2/pdf/scientificamerican0827-118.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Tippett:1927:RSN,
  author =       "L. H. C. (Leonard Henry Caleb) Tippett",
  title =        "Random sampling numbers",
  volume =       "15",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "viii + xxvi",
  year =         "1927",
  bibdate =      "Sat Aug 23 08:23:19 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in 1952. Reprinted in 1959 with a foreword
                 by Karl Pearson.",
  series =       "Tracts for computers",
  acknowledgement = ack-nhfb,
  annote =       "This may be the first known publication of tables of
                 random numbers. I found an unsubstantiated claim that
                 they were determined by taking the middle digits from
                 area measurements of English churches. See also
                 \cite{Rand:1955:MRD}.",
}

@Article{Sarton:1928:BRBn,
  author =       "George Sarton",
  title =        "Book Review: {{\booktitle{The Cipher of Roger Bacon}}
                 by William Romaine Newbold; Roland Grubb Kent}",
  journal =      j-ISIS,
  volume =       "11",
  number =       "1",
  pages =        "141--145",
  month =        sep,
  year =         "1928",
  CODEN =        "ISISA4",
  ISSN =         "0021-1753 (print), 1545-6994 (electronic)",
  ISSN-L =       "0021-1753",
  bibdate =      "Tue Jul 30 21:57:51 MDT 2013",
  bibsource =    "http://www.jstor.org/action/showPublication?journalCode=isis;
                 http://www.jstor.org/stable/i302190;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/isis1920.bib",
  URL =          "http://www.jstor.org/stable/224770",
  acknowledgement = ack-nhfb,
  fjournal =     "Isis",
  journal-URL =  "http://www.jstor.org/page/journal/isis/about.html",
}

@Book{Budge:1929:RSB,
  author =       "Sir E. A. Wallis(Ernest Alfred Wallis) Budge",
  title =        "The {Rosetta} Stone in the {British Museum}: the
                 {Greek}, {Demotic} and {Hieroglyphic} texts of the
                 decree inscribed on the {Rosetta} Stone conferring
                 additional honours on {Ptolemy V. Epiphanes (203-181
                 B.C.) \ldots{}}",
  publisher =    "British Museum Press",
  address =      "London, UK",
  pages =        "viii + 323",
  year =         "1929",
  LCCN =         "PJ1531 .R3 1929",
  bibdate =      "Tue Dec 01 10:37:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted with revisions in 1929, 1935, 1950, and
                 1968.",
  acknowledgement = ack-nhfb,
}

@Article{Hill:1929:CAA,
  author =       "Lester S. Hill",
  title =        "Cryptography in an Algebraic Alphabet",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "36",
  number =       "6",
  pages =        "306--312",
  month =        jun # "\slash " # jul,
  year =         "1929",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:39:12 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Booklet{Gylden:1931:CEI,
  author =       "Yves Gyld{\'e}n",
  title =        "Chifferbyr{\aa}ernas Insatser i V{\"a}rldskriget Till
                 Lands. ({Swedish}) [{Cipher} bureaus' operations in the
                 {World War} on land]",
  address =      "Stockholm, Sweden",
  year =         "1931",
  bibdate =      "Sun Dec 24 10:27:31 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  remark =       "Cited in \cite[page 11]{Gylden:1933:CCB}.",
}

@Article{Hill:1931:CCL,
  author =       "Lester S. Hill",
  title =        "Concerning Certain Linear Transformation Apparatus of
                 Cryptography",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "38",
  number =       "3",
  pages =        "135--154",
  month =        mar,
  year =         "1931",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:10 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{Yardley:1931:ABC,
  author =       "Herbert O. Yardley",
  title =        "The {American Black Chamber}",
  publisher =    "Faber \& Faber Limited",
  address =      "London, UK",
  pages =        "x + 264 + 1",
  year =         "1931",
  LCCN =         "D639.S7 Y3 1931b",
  bibdate =      "Wed Nov 15 14:21:04 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "The history and work of the Cryptographic bureau,
                 officially known as section 8 of the Military
                 intelligence division (MI-8).",
  acknowledgement = ack-nhfb,
}

@Book{Givierge:1932:CC,
  author =       "Marcel Givierge",
  title =        "Cours de cryptographie",
  publisher =    "Berger-Levrault",
  address =      "Paris, France",
  edition =      "Deuxi{\`e}me",
  pages =        "ix + 304",
  year =         "1932",
  bibdate =      "Sat Sep 25 10:58:57 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gylden:1933:CCB,
  author =       "Yves Gyld{\'e}n",
  title =        "The Contribution of the Cryptographic Bureaus in the
                 {World War}",
  journal =      "The Signal Corps Bulletin",
  number =       "75--81",
  pages =        "??--??",
  month =        nov # "--" # dec,
  year =         "1933--1934",
  bibdate =      "Sun Dec 24 10:23:49 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://archive.org/download/cryptolog_96/cryptolog_96.pdf",
  acknowledgement = ack-nhfb,
  remark =       "Small extract reprinted in \booktitle{Cryptolog},
                 volume 12, number 5, May 1985, page 11.",
}

@Book{Friedman:1935:ICA,
  author =       "William F. (William Frederick) Friedman",
  title =        "The index of coincidence and its applications in
                 cryptanalysis: technical paper",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "87 + 3",
  year =         "1935",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: War Department, Office of the Chief
                 Signal Officer, Washington. Register no. 200. The
                 present paper was prepared in 1923. It is a revision of
                 an earlier paper with the same title published in 1922
                 by the Riverbank Laboratories, Geneva, Ill.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography.",
}

@Book{Friedman:1935:MCP,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis. Part 1, monoalphabetic
                 substitution systems",
  number =       "30",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "149",
  year =         "1935",
  ISBN =         "0-89412-044-1",
  ISBN-13 =      "978-0-89412-044-2",
  LCCN =         "Z103.5.F77 1992",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Four volumes.",
  series =       "Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "On cover: With new added problems for the student. (p.
                 143--149) Reprint. Originally published: Washington,
                 DC: U.S. G.P.O., between 1935 and 1945.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Communications, Military; Cryptography",
}

@Book{Friedman:1935:PIS,
  author =       "William F. (William Frederick) Friedman",
  title =        "The principles of indirect symmetry of position in
                 secondary alphabets and their application in the
                 solution of polyalphabetic substitution ciphers:
                 technical paper",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "????",
  year =         "1935",
  bibdate =      "Tue Dec 26 07:21:46 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
}

@Book{Kullback:1935:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis: technical
                 paper",
  publisher =    "War Dept., Office of the Chief Signal Officer: U.S.
                 G.P.O.",
  address =      "Washington, DC, USA",
  pages =        "various",
  year =         "1935",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Rowlett:1935:FAP,
  author =       "Frank B. Rowlett and William F. Friedman",
  title =        "Further applications of the principles of indirect
                 symmetry of position in secondary alphabets: technical
                 paper",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "????",
  year =         "1935",
  bibdate =      "Tue Dec 26 07:23:00 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Gylden:1936:AMC,
  author =       "Yves Gylden",
  title =        "Analysis of model {C-36} cryptograph from the
                 viewpoint of cryptanalysis",
  publisher =    "A. B. Teknik co.",
  address =      "Stockholm, Sweden",
  pages =        "22",
  year =         "1936",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Xeroxed on rectos only; unbound. Translated from the
                 French into English. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Book{Nanovic:1936:SWI,
  author =       "John Leonard Nanovic",
  title =        "Secret writing: an introduction to cryptograms,
                 ciphers and codes",
  publisher =    "D. Kemp and Co",
  address =      "New York, NY, USA",
  pages =        "x + 117 + 1",
  year =         "1936",
  LCCN =         "Z104 .N3",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also reprint \cite{Nanovic:1974:SWI}.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Sacco:1936:MC,
  author =       "Luigi Sacco",
  title =        "Manuale di crittografia. ({Italian}) [{Manual} of
                 cryptography]",
  publisher =    "Tipografia Santa Barbara",
  address =      "Roma, Italia",
  edition =      "Second",
  pages =        "viii + 247 + 8",
  year =         "1936",
  bibdate =      "Tue Dec 26 07:04:56 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "Italian",
}

@Book{Gylden:1938:APV,
  author =       "Yves Gylden",
  title =        "Analysis from the point of view of cryptanalysis of
                 ``cryptograph type {C-36},'' provided with six key
                 wheels, 27 slide bars, the latter having movable
                 projections, single or multiple",
  publisher =    "A. B. Teknik co.",
  address =      "Stockholm, Sweden",
  pages =        "10",
  year =         "1938",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Xeroxed on rectos only; unbound. Translated from the
                 French into English. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Book{Kullback:1938:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis",
  publisher =    "War Department, Office of the Chief Signal Officer",
  address =      "Washington, DC, USA",
  edition =      "Revised",
  pages =        "194",
  year =         "1938",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: War Department, Office of the Chief
                 Signal Officer, Washington. ``Confidential.''
                 ``Register no. 170.''",
  keywords =     "Ciphers; Cryptography",
  remark =       "From \cite{Anscombe:2003:QCC}: ``A bookseller
                 description [of this book]: `This classic text provides
                 various statistical tests: the Chi Test, which affords
                 a quantitative measure of the degree of similarity
                 between two distributions, and the Phi Test, which
                 provides a quantitative measurement of the degree of
                 non-randomness of a distribution. Text includes
                 numerous tabulations of frequency data in other
                 languages.'.''",
}

@TechReport{Anonymous:1939:ITM,
  author =       "Anonymous",
  title =        "Introductory talk to members of the {William and Mary
                 College} cryptanalysis class",
  institution =  "William and Mary College",
  address =      "Williamsburg, VA, USA",
  pages =        "7",
  year =         "1939",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from typescript.",
}

@Book{Baudouin:1939:ECF,
  author =       "Roger Baudouin",
  title =        "{{\'E}}l{\'e}ments de cryptographie. ({French})
                 [{Elements} of cryptography]",
  publisher =    "A. Pedone",
  address =      "Paris, France",
  pages =        "336",
  year =         "1939",
  bibdate =      "Tue Dec 26 07:17:01 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
}

@Book{DAgapeyeff:1939:CC,
  author =       "Alexander D'Agapeyeff",
  title =        "Codes and ciphers",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "160",
  year =         "1939",
  LCCN =         "Z104 .D3 1939",
  bibdate =      "Sat Apr 20 12:19:43 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Friedman:1939:CAC,
  author =       "William F. (William Frederick) Friedman",
  title =        "The cryptanalyst accepts a challenge",
  publisher =    "War Department, Office of the Chief Signal Officer",
  address =      "Washington, DC, USA",
  pages =        "24--36",
  year =         "1939",
  LCCN =         "????",
  bibdate =      "Wed May 11 23:30:34 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  remark =       "An article analyzed from The Signal Corps bulletin,
                 no. 103, January--March, 1939.",
  subject =      "Cryptography; Ciphers; CHR 1939; PRO Mendelsohn,
                 Charles J. (Charles Jastrow) (donor); PRO Mendelsohn,
                 Esther Jastrow (donor)",
}

@Book{Friedman:1939:MC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis",
  publisher =    "New York Public Library",
  address =      "New York, NY, USA",
  year =         "1939",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "1 microfilm reel",
  acknowledgement = ack-nhfb,
  annote =       "Titles and statements of authorship from label on
                 container. First work originally published: Washington:
                 U.S. G.P.O., 1939- 1943. 4 v. Vols. 1-2, 3rd ed. Vol.
                 3, 2nd ed. Second work originally published:
                 Washington: U.S. G.P.O., 1942. v, 316 p.",
  author-dates = "1891--1969",
  keywords =     "Cryptography.",
}

@Book{Gaines:1939:ECS,
  author =       "Helen Fouche Gaines",
  title =        "Elementary cryptanalysis: a study of ciphers and their
                 solution",
  publisher =    "American Photographic Publishing Co.",
  address =      "Boston, MA, USA",
  pages =        "vi + 230 + 1",
  year =         "1939",
  LCCN =         "Z104 .G3",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "First edition. Galland, p. 72. Inscribed by Gelett
                 Burgess. Bound in gray cloth; stamped in red; top edges
                 stained red. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Mendelsohn:1939:CC,
  author =       "Charles Jastrow Mendelsohn",
  title =        "{Cardan} on cryptography",
  publisher =    "Yeshiva College",
  address =      "New York, NY, USA",
  pages =        "157--168",
  year =         "1939",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted from Scripta mathematica, Vol. 6, No. 3,
                 October, 1939. J. S. Galland, Bibliography of \ldots{}
                 cryptology, 1945, p. 124.",
  acknowledgement = ack-nhfb,
  keywords =     "Cardano, Girolamo, 1501--1576; cryptography",
}

@Book{Pratt:1939:SUS,
  author =       "Fletcher Pratt",
  title =        "Secret and urgent: the story of codes and ciphers",
  publisher =    "Robert Hale",
  address =      "London, UK",
  pages =        "282",
  year =         "1939",
  LCCN =         "Z104 .P92 1939",
  bibdate =      "Sat Apr 20 12:05:03 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Reprinted in 1939 by the Bobbs-Merrill Company, New
                 York, NY, USA, in 1942 by Blue Ribbon Books, Garden
                 City, NY, USA, and in 1996 by Aegean Park Press, Laguna
                 Hills, CA, USA.",
  tableofcontents = "1. Sermons in Stones \\
                 2. The Element of Doubt \\
                 3. Jargon \\
                 4. Invention and Death \\
                 5. Bacon or Shakespeare? \\
                 6. Satellites of the Royal Sun \\
                 7. Kings, Thieves and Diarists \\
                 8. Failure \\
                 9. The Revival \\
                 10. Code \\
                 11. The War of Cryptographers \\
                 12. The Cryptographers' War",
}

@Book{Gaines:1940:ECS,
  author =       "Helen Fouche Gaines",
  title =        "Elementary cryptanalysis; a study of ciphers and their
                 solution",
  publisher =    pub-CHAPMAN-HALL,
  address =      pub-CHAPMAN-HALL:adr,
  pages =        "vi + 230 + 23",
  year =         "1940",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Inscription by the author pasted in. Bound in gray
                 cloth; stamped in red; top edges stained red. Dust
                 jacket.",
  keywords =     "Ciphers; Cryptography",
}

@Book{USASC:1940:CML,
  author =       "{United States Army Signal Corps}",
  title =        "Cryptanalyst's manual",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "????",
  year =         "1940",
  LCCN =         "Z104 .U33c",
  bibdate =      "Wed May 11 23:30:34 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Prepared under the direction of the Chief Signal
                 Officer.",
  subject =      "cryptography",
}

@Book{Yardley:1940:SSA,
  author =       "Herbert O. Yardley",
  title =        "Secret service in {America}: The {American Black
                 Chamber}",
  publisher =    "Faber \& Faber Limited",
  address =      "London, UK",
  pages =        "x + 264 + 1",
  year =         "1940",
  LCCN =         "D639.S7 Y3 1940",
  bibdate =      "Wed Nov 15 14:23:09 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "The history and work of the Cryptographic bureau,
                 officially known as section 8 of the Military
                 intelligence division (MI-8).",
  acknowledgement = ack-nhfb,
}

@Book{Friedman:1941:MCP,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis. Part {IV}, Transposition and
                 fractionating systems",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "189",
  year =         "1941",
  ISBN =         "0-89412-198-7 (paperback), 0-89412-199-5 (library
                 bound)",
  ISBN-13 =      "978-0-89412-198-2 (paperback), 978-0-89412-199-9
                 (library bound)",
  LCCN =         "Z103.5.F77 1992",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Cryptographic series; 61",
  acknowledgement = ack-nhfb,
  alttitle =     "Transposition and fractionating series",
  annote =       "Reprint of a U.S. military text, originally published
                 in 1941. Declassified December 1992.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Communications, Military; Cryptography",
}

@TechReport{Turing:1941:APC,
  author =       "Alan M. Turing",
  title =        "The Applications of Probability to Cryptography",
  type =         "Report",
  institution =  "GCHQ",
  address =      "Cheltenham, UK",
  year =         "1941",
  bibdate =      "Wed Apr 25 10:25:22 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Unclassified and released 23 April 2012. Date
                 uncertain, but believed to be between April 1941 and
                 April 1942.",
  URL =          "http://www.gchq.gov.uk/Press/Pages/turing-papers-released.aspx;
                 http://www.theregister.co.uk/2012/04/23/turing_papers_released/",
  acknowledgement = ack-nhfb,
}

@TechReport{Turing:1941:SR,
  author =       "Alan M. Turing",
  title =        "On Statistics of Repetitions",
  type =         "Report",
  institution =  "GCHQ",
  address =      "Cheltenham, UK",
  year =         "1941",
  bibdate =      "Wed Apr 25 10:25:22 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Unclassified and released 23 April 2012. Date
                 uncertain, but believed to be between April 1941 and
                 April 1942.",
  URL =          "http://www.gchq.gov.uk/Press/Pages/turing-papers-released.aspx;
                 http://www.theregister.co.uk/2012/04/23/turing_papers_released/",
  acknowledgement = ack-nhfb,
}

@Book{Volts:1941:BC,
  author =       "James D. Volts and David Shulman",
  title =        "Bibliography of cryptography",
  publisher =    "U. S. Army",
  address =      "Cincinnati, OH. USA",
  pages =        "93",
  year =         "1941",
  LCCN =         "Z103.A1 V6 1941",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Typewritten (carbon copy) Three heavy leaves precede
                 sections II-IV (not included in pagination). This copy
                 was made especially for the United States Army from the
                 original manuscript. Third copy: pencilled note on
                 cover. Contents: pt.1. Cryptography; pt.2. Titles
                 relating indirectly to cryptography; pt.3. Rejected
                 titles; pt.4. Author index.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers --- bibliography; cryptography ---
                 bibliography",
}

@Book{Volts:1941:BCP,
  author =       "James D. Volts",
  title =        "Bibliography of cryptography: Part {I}: Cryptography",
  publisher =    "U. S. Army",
  address =      "Cincinnati, OH, USA",
  pages =        "various",
  year =         "1941",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Chronologically arranged, covering period 1518--1940,
                 and indexed by authors.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Book{Friedman:1942:MC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  edition =      "Third",
  pages =        "various",
  year =         "1942",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  alttitle =     "Restricted",
  annote =       "Each pt. has separate t.p. and numbering sequence. pt.
                 1. Monoalphabetic substitution systems --- pt. 2.
                 Simple varities of polyalphabetic substitution systems
                 --- pt. 3. Simpler varieties of aperiodic substitution
                 systems --- pt. 4. Transportation and fractionating
                 systems.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Communications, Military; Cryptography",
}

@Book{USASC:1942:ACC,
  author =       "{United States.Army.Signal Corps}",
  title =        "Articles on cryptography and cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "v + 316",
  year =         "1942",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: War Department. Office of the Chief
                 Signal Officer, Washington. ``Reprinted from the Signal
                 Corps Bulletin.''",
  keywords =     "Cryptography.",
}

@Book{Gaines:1943:ECS,
  author =       "Helen Fouche Gaines",
  title =        "Elementary cryptanalysis: a study of ciphers and their
                 solution",
  publisher =    "American Photographic Publishing Co.",
  address =      "Boston, MA, USA",
  pages =        "vi + 230 + 1",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Fourth printing. Errata slip tipped in before Preface.
                 Bound in gray cloth; stamped in red; top edges stained
                 red. Library of the American Cryptogram Association
                 (George C. Lamb Collection).",
  keywords =     "Ciphers; Cryptography.",
}

@Book{Hitt:1943:MSM,
  author =       "Parker Hitt",
  title =        "Manual for the solution of military ciphers \ldots{}
                 For use in {Donald D. Millikin}'s cryptography and
                 cryptanalysis classes",
  publisher =    "New York University Bookstore",
  address =      "New York, NY, USA",
  pages =        "viii + 101 + 22",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reprint. Galland, p. 90. Bound in blue paper wrappers;
                 printed in black. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  keywords =     "Ciphers; Cryptography.",
}

@Book{Millikin:1943:ECCa,
  author =       "Donald D. Millikin",
  title =        "Elementary cryptography and cryptanalysis",
  volume =       "56",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "vii + 132",
  year =         "1943",
  ISBN =         "0-89412-173-1 (soft cover), 0-89412-174-X (library
                 bound)",
  ISBN-13 =      "978-0-89412-173-9 (soft cover), 978-0-89412-174-6
                 (library bound)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "``\ldots{} reproduction of a classic text written and
                 used by Donald D. Millikin to introduce cryptography
                 and cryptanalysis to college students at New York
                 University in 1943.''",
  keywords =     "Ciphers; Cryptography",
}

@Book{Millikin:1943:ECCb,
  author =       "Donald D. Millikin",
  title =        "Elementary cryptography and cryptanalysis",
  publisher =    "New York University Bookstore",
  address =      "New York, NY, USA",
  edition =      "Second",
  pages =        "vii + 132 + 1 + 28",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy",
  keywords =     "Cryptography.",
}

@Book{Millikin:1943:ECCc,
  author =       "Donald D. Millikin",
  title =        "Elementary cryptography and cryptanalysis",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Third",
  pages =        "vii + 132",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy.",
  keywords =     "Cryptography.",
}

@Book{Smith:1943:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography, the science of secret writing",
  publisher =    pub-NORTON,
  address =      pub-NORTON:adr,
  pages =        "164",
  year =         "1943",
  LCCN =         "Z104 .S5",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Wolfe:1943:FCCa,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis",
  publisher =    "Brooklyn college press",
  address =      "Brooklyn, NY, USA",
  pages =        "??",
  year =         "1943",
  LCCN =         "Z104 .W6 1943 v. 1-3 (1943)",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reproduced from type-written copy. Lesson 11 (44 numb)
                 inserted after v. 2.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Wolfe:1943:FCCb,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis",
  publisher =    "University Press",
  address =      "Ann Arbor, MI, USA",
  pages =        "various",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy.",
  keywords =     "Cryptography.",
}

@Book{Wolfe:1943:FCCc,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis",
  publisher =    "Brooklyn College Press",
  address =      "Brooklyn, NY, USA",
  pages =        "various",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  acknowledgement = ack-nhfb,
  annote =       "Mimeographed on rectos only. Bound in printed paper
                 wrappers. Library of the American Cryptogram
                 Association (George C. Lamb Collection)",
  keywords =     "Ciphers; Cryptography",
}

@Book{Gaines:1944:CSC,
  author =       "Helen Fouche Gaines",
  title =        "Cryptanalysis: a study of ciphers and their solution",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  year =         "1944",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Codigos (Ou Codificacao)",
}

@Book{Smith:1944:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography: the science of secret writing",
  publisher =    "G. Allen and Unwin",
  address =      "London, UK",
  pages =        "164",
  year =         "1944",
  LCCN =         "Z104.S5",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@TechReport{Alexander:1945:CHG,
  author =       "C. H. O'D. Alexander",
  title =        "Cryptologic History of the {German Naval Enigma}",
  type =         "{GC\&CS} Report",
  number =       "HW 25/7",
  institution =  "British National Archives",
  address =      "????",
  year =         "1945",
  bibdate =      "Thu Mar 06 16:07:17 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Galland:1945:HABa,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  publisher =    inst-NORTHWESTERN-UNIVERSITY,
  address =      inst-NORTHWESTERN-UNIVERSITY:adr,
  pages =        "viii + 11 + 209",
  year =         "1945",
  LCCN =         "Z103.A1 G3",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``Works consulted and utilized'' in preface.",
  series =       "Northwestern University studies in the humanities no.
                 10",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Book{Galland:1945:HABb,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  number =       "10",
  publisher =    "AMS Press",
  address =      "New York, NY, USA",
  pages =        "viii + 209",
  year =         "1945",
  ISBN =         "0-404-50710-7",
  ISBN-13 =      "978-0-404-50710-7",
  LCCN =         "Z103.A1G3 1970",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Northwestern University humanities series; v. 10",
  acknowledgement = ack-nhfb,
  annote =       "Bound in blue cloth; stamped in gold. Library of the
                 American Cryptogram Association (George C. Lamb
                 Collection). Master microform held by: UnM. Microfilm.
                 Ann Arbor, Mich., University Microfilms International,
                 19--. 1 reel. 35 mm.",
  keywords =     "Cryptography --- Bibliography.",
}

@Book{Galland:1945:HABc,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  volume =       "71",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "209",
  year =         "1945",
  ISBN =         "0-89412-252-5",
  ISBN-13 =      "978-0-89412-252-1",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  alttitle =     "Bibliography of the literature of cryptology",
  keywords =     "Cryptography --- Bibliography.",
}

@TechReport{Good:1945:GRT,
  author =       "I. Jack Good and Donald Michie and Geoffrey Timms",
  title =        "General Report on {Tunny}",
  type =         "{GC\&CS} report",
  number =       "HW 25/4",
  institution =  "British National Archives",
  address =      "????",
  year =         "1945",
  bibdate =      "Thu Mar 06 16:13:00 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{Shannon:1945:MTC,
  author =       "Claude Shannon",
  title =        "A Mathematical Theory of Cryptography",
  type =         "Classified report",
  institution =  "Bell Laboratories",
  address =      "Murray Hill, NJ, USA",
  day =          "1",
  month =        sep,
  year =         "1945",
  bibdate =      "Mon Nov 04 18:32:51 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bstj1940.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "In this paper, the binary-choice measure was called
                 `alternative'; the term `bit' did not appear in print
                 until \cite{Shannon:1948:MTCa}.",
}

@Book{Baudouin:1946:ECF,
  author =       "Roger Baudouin",
  title =        "{{\'E}}l{\'e}ments de cryptographie. ({French})
                 [{Elements} of cryptography]",
  publisher =    "A. Pedone",
  address =      "Paris, France",
  pages =        "336",
  year =         "1946",
  bibdate =      "Tue Dec 26 07:17:01 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
}

@Article{Landers:1946:RPR,
  author =       "A. W. Landers",
  title =        "Recent Publications: Reviews: {{\em An Historical and
                 Analytical Bibliography of the Literature of
                 Cryptology}}, by {J. S. Galland}",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "53",
  number =       "6",
  pages =        "330--331",
  month =        jun # "\slash " # jul,
  year =         "1946",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:38:13 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{Bond:1947:FSC,
  author =       "Raymond T. (Raymond Tostevin) Bond",
  title =        "Famous stories of code and cipher",
  publisher =    "Rinehart and Company",
  address =      "New York; Toronto",
  pages =        "xxvi + 342",
  year =         "1947",
  LCCN =         "PS648.C6 B65",
  bibdate =      "Wed Nov 25 14:08:17 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in 1965 by Collier Books.",
  acknowledgement = ack-nhfb,
}

@Book{Sacco:1947:MC,
  author =       "Luigi Sacco",
  title =        "Manuale di crittografia. ({Italian}) [{Manual} of
                 cryptography]",
  publisher =    "Istituto Polygrafico Dello Stato",
  address =      "Roma, Italia",
  edition =      "Third",
  pages =        "xii + 374",
  year =         "1947",
  bibdate =      "Tue Dec 26 07:04:56 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "Italian",
}

@Article{Shannon:1948:MTCa,
  author =       "Claude Shannon",
  title =        "A Mathematical Theory of Communication",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "27",
  number =       "3",
  pages =        "379--423",
  month =        jul,
  year =         "1948",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Mon Nov 04 18:36:13 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "From the first page: ``If the base $2$ is used the
                 resulting units may be called binary digits, or more
                 briefly, {\em bits}, a word suggested by J. W.
                 Tukey.''. This is the first known printed instance of
                 the word `bit' with the meaning of binary digit.",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Article{Shannon:1948:MTCb,
  author =       "Claude Shannon",
  title =        "A Mathematical Theory of Communication (continued)",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "27",
  number =       "4",
  pages =        "623--656",
  month =        oct,
  year =         "1948",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Mon Nov 04 18:36:13 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Book{Zim:1948:CSW,
  author =       "Herbert S. Zim",
  title =        "Codes and secret writing",
  publisher =    "William Morrow",
  address =      "New York, NY, USA",
  pages =        "vi + 154",
  year =         "1948",
  LCCN =         "Z104 .Z5",
  bibdate =      "Wed Nov 25 14:13:48 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Children's book.",
}

@Article{Shannon:1949:CTS,
  author =       "Claude Shannon",
  title =        "Communication Theory of Secrecy Systems",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "28",
  number =       "4",
  pages =        "656--715",
  month =        "????",
  year =         "1949",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Sat Sep 25 10:52:04 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "A footnote on the initial page says: ``The material in
                 this paper appeared in a confidential report, `A
                 Mathematical Theory of Cryptography', dated Sept.~1,
                 1946, which has now been declassified.''.",
  URL =          "http://en.wikipedia.org/wiki/Communication_Theory_of_Secrecy_Systems;
                 http://www.cs.ucla.edu/~jkong/research/security/shannon1949.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  remark =       "The Wikipedia entry credits this paper as the
                 foundation of modern cryptography. Diffie and Hellman
                 \cite[page 653]{Diffie:1976:NDC} remark: ``Shannon
                 [this paper] showed that the one time pad systems,
                 which had been in use since the late twenties [1920s]
                 offered `perfect security' (a form of unconditional
                 security).''",
}

@Book{Sacco:1951:MCF,
  author =       "Luigi Sacco",
  title =        "Manuel de cryptographie. ({French}) [{Manual} of
                 cryptography]",
  publisher =    "Payot",
  address =      "Paris, France",
  pages =        "????",
  year =         "1951",
  bibdate =      "Tue Dec 26 07:10:55 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
  remark =       "French translation of third Italian edition.",
}

@Book{Andree:1952:C,
  author =       "Richard Vernon Andree",
  title =        "Cryptanalysis",
  publisher =    "Yeshiva College",
  address =      "New York, NY, USA",
  pages =        "5--16",
  year =         "1952",
  MRclass =      "09.0X",
  MRnumber =     "14,124d",
  bibdate =      "Wed Nov 25 14:18:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted from Scripta mathematica, Vol. 28, No. 1.
                 March, 1952.",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Article{Porges:1952:MNC,
  author =       "Arthur Porges",
  title =        "Mathematical Notes: a Continued Fraction Cipher",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "59",
  number =       "4",
  pages =        "236--236",
  month =        apr,
  year =         "1952",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:41 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{deVries:1953:SMC,
  author =       "M. {de Vries}",
  title =        "Statistical methods in cryptanalysis",
  publisher =    "Math. Centrum Amsterdam",
  address =      "Amsterdam, The Netherlands",
  pages =        "15",
  year =         "1953",
  MRclass =      "62.0X",
  MRnumber =     "15,974d",
  MRreviewer =   "H. Campaigne",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Rapport ZW 1953-014",
}

@TechReport{Behrens:1954:EUP,
  author =       "Carl E. Behrens",
  title =        "Effects on {U-boat} performance of intelligence from
                 decryption of {Allied} communication",
  type =         "Technical report OEG study",
  number =       "553",
  institution =  "Distributed by NTIS",
  address =      "Springfield, VA, USA",
  pages =        "various",
  year =         "1954",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "``Prepared by Operations Evaluation Group, Office of
                 the Chief of Naval Operations\ldots{}Prepared for:
                 Office of the Chief of Operations (Navy) 28 April
                 1954.'' On cover: ``distributed by Defense Technical
                 Information Center''.",
  keywords =     "Military intelligence; Military surveillance;
                 Submarine boats --- World War, 1939-1945",
}

@Book{Friedman:1955:CLS,
  author =       "William F. (William Frederick) Friedman and Elizebeth
                 Friedman and Louis B. (Louis Booker) Wright",
  title =        "The cryptologist looks at {Shakespeare}",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1955",
  LCCN =         "????",
  bibdate =      "Fri Dec 22 09:28:29 MST 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Original typescript, awarded Folger literary prize,
                 1955.",
  acknowledgement = ack-nhfb,
  author-dates = "Elizebeth Smith Friedman (1892--1980); William
                 Frederick Friedman (1891--1969)",
  remark =       "Published 1957 as \booktitle{The Shakespearean ciphers
                 examined}, in reduced form. Also: Copy of award from
                 American Shakespeare Theatre and Academy, 1958; Letter
                 from Mr. and Mrs. W. F. Friedman to Dr. Wright, June 9,
                 1959, with Dr. Wright's reply of June 12, 1959.",
  subject =      "Shakespeare, William; Authorship; Manuscripts;
                 Friedman, William F. (William Frederick);
                 Correspondence; Friedman, Elizebeth; Wright, Louis B.
                 (Louis Booker); Ciphers; Authorship; Ciphers",
  subject-dates = "William Shakespeare (1564--1616)",
}

@MastersThesis{Hoffer:1955:MAC,
  author =       "Carol M. Hoffer",
  title =        "On the mathematical approach to cryptanalysis",
  type =         "Thesis",
  school =       "University of South Dakota",
  address =      "Vermillion, SD, USA",
  pages =        "65",
  year =         "1955",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Book{Rand:1955:MRD,
  author =       "{Rand Corporation}",
  title =        "A Million Random Digits With 100,000 Normal Deviates",
  publisher =    "Free Press",
  address =      "Glencoe, IL, USA",
  pages =        "xxv + 400 + 200",
  year =         "1955",
  ISBN =         "0-02-925790-5",
  ISBN-13 =      "978-0-02-925790-6",
  LCCN =         "QA276.5 .R3",
  bibdate =      "Sat Aug 23 07:58:03 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in 1966 and 2001 \cite{Rand:2001:MRD}. See
                 also \cite{Tippett:1927:RSN}.",
  acknowledgement = ack-nhfb,
}

@Book{Sawirudin:1955:PND,
  author =       "Sawirudin",
  title =        "Pegawai negeri dan {PGP} baru",
  publisher =    "Badan Penerbitan Dewan Nasional SOBSI",
  address =      "Djakarta",
  edition =      "Cet. 1.",
  pages =        "93",
  year =         "1955",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Photocopy. [S.1.: s.n., 1958?].",
  keywords =     "Indonesia --- Officials and employees --- Salaries,
                 etc.",
}

@Book{Smith:1955:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography; the science of secret writing",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "164",
  year =         "1955",
  LCCN =         "Z104 .S6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``An unabridged republication of the first edition
                 with corrections.''",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Epstein:1956:FBC,
  author =       "Sam Epstein and Beryl Epstein",
  title =        "The first book of codes and ciphers",
  publisher =    "Franklin Watts",
  address =      "New York, NY, USA",
  year =         "1956",
  LCCN =         "Z104 .E68",
  bibdate =      "Wed Nov 25 14:12:11 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Pictures by Laszlo Roth",
  acknowledgement = ack-nhfb,
  annote =       "Children's book.",
}

@Book{Friedman:1956:CCC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Codes and ciphers (cryptology)",
  publisher =    "Encyclopaedia Britannica",
  address =      "Chicago, IL, USA",
  pages =        "8",
  year =         "1956",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Caption title. ``From Encyclopaedia Britannica,
                 copyright 1956.'' Text in double columns.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography; Cryptography --- Equipment and
                 supplies; Cryptography --- History",
}

@Book{Gaines:1956:CSC,
  author =       "Helen Fouch{\'e} Gaines",
  title =        "Cryptanalysis: a study of ciphers and their solution",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "237",
  year =         "1956",
  ISBN =         "0-486-20097-3",
  ISBN-13 =      "978-0-486-20097-2",
  LCCN =         "Z104 .G3 1956",
  MRclass =      "99.0X",
  MRnumber =     "19,519g",
  MRreviewer =   "H. Campaigne",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Formerly published under the title: Elementary
                 cryptanalysis.",
  acknowledgement = ack-nhfb,
  annote =       "Unabridged and corrected edition of \ldots{} [the
                 author's] Elementary cryptanalysis.",
  keywords =     "Ciphers; Cryptography",
}

@Article{Seaton:1956:THS,
  author =       "E. Seaton",
  title =        "{Thomas Hariot}'s Secret Script",
  journal =      j-AMBIX,
  volume =       "5",
  number =       "3--4",
  pages =        "111--114",
  year =         "1956",
  CODEN =        "AMBXAO",
  DOI =          "https://doi.org/10.1179/amb.1956.5.3-4.111",
  ISSN =         "0002-6980 (print), 1745-8234 (electronic)",
  ISSN-L =       "0002-6980",
  bibdate =      "Wed Apr 25 21:08:25 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ambix.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.tandfonline.com/doi/abs/10.1179/amb.1956.5.3-4.111",
  acknowledgement = ack-nhfb,
  ajournal =     "Ambix",
  fjournal =     "Ambix: Journal of the Society for the History of
                 Alchemy and Chemistry",
  journal-URL =  "http://www.tandfonline.com/loi/yamb20",
  onlinedate =   "18 Jul 2013",
}

@Article{Davison:1957:SCG,
  author =       "W. H. T. Davison and M. Gordon",
  title =        "Sorting for chemical groups using
                 {Gordon--Kendall--Davison} ciphers",
  journal =      j-AM-DOC,
  volume =       "8",
  number =       "3",
  pages =        "202--210",
  month =        jul,
  year =         "1957",
  CODEN =        "AMDOA7",
  DOI =          "https://doi.org/10.1002/asi.5090080305",
  ISSN =         "0096-946X",
  ISSN-L =       "0096-946X",
  bibdate =      "Fri Sep 11 06:21:07 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/amdoc.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "American Documentation",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)2330-1643/",
  onlinedate =   "19 Apr 2007",
}

@Book{Friedman:1957:SCE,
  author =       "William F. (William Frederick) Friedman and Elizebeth
                 S. (Elizebeth Smith) Friedman",
  title =        "The {Shakespearean} Ciphers Examined: an analysis of
                 cryptographic systems used as evidence that some author
                 other than {William Shakespeare} wrote the plays
                 commonly attributed to him",
  publisher =    pub-CUP,
  address =      pub-CUP:adr,
  pages =        "4 + vii--xvi + 1 + 302 + 1",
  year =         "1957",
  LCCN =         "PR2937 .F7",
  bibdate =      "Wed Nov 25 14:04:49 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  tableofcontents = "The great controversy \\
                 Cryptology as a science \\
                 Ignatius Donnelly and The great cryptogram \\
                 The cipher in the epitaph \\
                 Dr. Owen and his word cipher \\
                 A miscellany \\
                 Acrostics and anagrams \\
                 The long word and other anagrams \\
                 The string cipher of William Stone Booth \\
                 Walter Conrad Arensberg \\
                 The strange story of Dr. Cunningham and Maria Bauer \\
                 Odd numbers \\
                 The Bilateral Cipher and Elizabeth Wells Gallup \\
                 Mrs. Gallup and Colonel Fabyan \\
                 Elizabethan printing and its bearing on the Bilateral
                 Cipher \\
                 A study of the Gallup decipherments \\
                 General Cartier and the Bilateral Cipher \\
                 The Bilateral Cipher: experiments and deductions \\
                 Conclusions",
}

@Book{Gleason:1957:ECP,
  author =       "Andrew M. Gleason",
  title =        "Elementary course in probability",
  publisher =    "National Security Agency, Office of Research and
                 Development, Mathematical Research Division",
  address =      "Washington, DC, USA",
  edition =      "Second",
  pages =        "various",
  year =         "1957",
  LCCN =         "Z104 .G53 1957",
  bibdate =      "Wed May 11 23:23:17 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Revised by Walter F. Penney and Ronald E. Wyllys.",
  acknowledgement = ack-nhfb,
  subject =      "cryptography; probabilities",
}

@InCollection{Gamow:1958:CAP,
  author =       "George Gamow and Martynas Y{\c{c}}as",
  booktitle =    "{Das Universum. Unser Bild vom Weltall}. ({German})
                 [{The Universe}. {Our} picture of the {Universe}]",
  title =        "The cryptographic approach to the problem of protein
                 synthesis",
  publisher =    "????",
  address =      "Wiesbaden, Germany",
  pages =        "????",
  year =         "1958",
  LCCN =         "",
  bibdate =      "Sat Jun 02 09:24:50 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/g/gamow-george.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Levine:1958:VMS,
  author =       "Jack Levine",
  title =        "Variable Matrix Substitution in Algebraic
                 Cryptography",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "65",
  number =       "3",
  pages =        "170--179",
  month =        mar,
  year =         "1958",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:38:55 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{Bowers:1959:DSP,
  author =       "William Maxwell Bowers",
  title =        "Digraphic substitution: the {Playfair} cipher, the
                 four square cipher",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "46",
  year =         "1959",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 1",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers.",
}

@Book{Anonymous:1960:CNH,
  author =       "Anonymous",
  title =        "Cryptanalysis, a new horizon, by {Dr. Cryptogram}
                 [pseudonym]",
  publisher =    "American Cryptogram Association",
  address =      "New York, NY, USA (??)",
  pages =        "10 + 1 + 27",
  year =         "1960",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "An address to the Annual Convention of the American
                 Cryptogram Association, 1960. Printed by a spirit
                 process on rectos only. In plastic binder. Library of
                 the American Cryptogram Association (George C. Lamb
                 Collection).",
  keywords =     "Cryptography.",
}

@Book{Bowers:1960:BC,
  author =       "William Maxwell Bowers",
  title =        "The bifid cipher",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "48",
  year =         "1960",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 2",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers.",
}

@Book{Bowers:1960:PC,
  author =       "William Maxwell Bowers and William G. Bryan",
  title =        "Practical cryptanalysis",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "??",
  year =         "1960",
  LCCN =         "Z103 .B6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Bound in printed paper wrappers. Contents: v. 1.
                 Digraphic substitution; the playfair cypher, the four
                 square cypher.-- v. 2. The Bifid cipher. --- v. 3. The
                 Trifid cipher.-- v. 4. Cryptographic ABC'S;
                 Substitution and transposition ciphers, by William G.
                 Bryan. --- v. 5. Cryptographic ABC's; periodic ciphers,
                 miscellaneous, by William G. Bryan.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Bowers:1960:TC,
  author =       "William Maxwell Bowers",
  title =        "The trifid cipher",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "ix + 55",
  year =         "1960",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 3",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers.",
}

@Article{Mandelbrot:1960:BRJa,
  author =       "Beno{\^\i}t Mandelbrot",
  title =        "Book Review: {John Chadwick, \booktitle{The
                 Decipherment of Linear B} (1958) Cambridge University
                 Press}",
  journal =      j-INF-CONTROL,
  volume =       "3",
  number =       "1",
  pages =        "95--96",
  month =        mar,
  year =         "1960",
  CODEN =        "IFCNA4",
  DOI =          "https://doi.org/10.1016/S0019-9958(60)90347-8",
  ISSN =         "0019-9958 (print), 1878-2981 (electronic)",
  ISSN-L =       "0019-9958",
  bibdate =      "Sat Sep 8 16:48:41 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/m/mandelbrot-benoit.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0019995860903478",
  acknowledgement = ack-nhfb,
  fjournal =     "Information and Control",
}

@Article{Pelta:1960:SP,
  author =       "Harold N. Pelta",
  title =        "Selfcipher: Programming",
  journal =      j-CACM,
  volume =       "3",
  number =       "2",
  pages =        "83--83",
  month =        feb,
  year =         "1960",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Nov 25 18:19:25 MST 2005",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm3.html#Pelta60;
                 http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm1960.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  oldlabel =     "Pelta60",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Pelta60",
}

@Book{Barker:1961:CSC,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of the single columnar transposition
                 cipher",
  publisher =    "C. E. Tuttle Co.",
  address =      "Rutland, VT, USA",
  pages =        "x + 1 + 140",
  year =         "1961",
  LCCN =         "Z103 Z32",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "First edition. Bound in tan cloth; stamped in black;
                 red endpapers. Dust jacket. Library of The American
                 Cryptogram Association (George C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Article{Levine:1961:SAH,
  author =       "Jack Levine",
  title =        "Some Applications of High-Speed Computers to the Case
                 $ n = 2 $ of Algebraic Cryptography",
  journal =      j-MATH-COMPUT,
  volume =       "15",
  number =       "75",
  pages =        "254--260",
  month =        jul,
  year =         "1961",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcomp1960.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Article{Levine:1961:SECa,
  author =       "Jack Levine",
  title =        "Some Elementary Cryptanalysis of Algebraic
                 Cryptography",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "68",
  number =       "5",
  pages =        "411--418",
  month =        may,
  year =         "1961",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  MRclass =      "94.10",
  MRnumber =     "23 \#B2111",
  bibdate =      "Mon Jun 28 12:36:19 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{Levine:1961:SECb,
  author =       "Jack Levine",
  title =        "Some elementary cryptanalysis of algebraic
                 cryptography",
  publisher =    "Mathematical Association of America",
  address =      "Buffalo, NY, USA",
  pages =        "411--418",
  year =         "1961",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint from American Mathematical Monthly, vol. 68,
                 no. 5, May 1961.",
  acknowledgement = ack-nhfb,
  annote =       "Bound in blue paper wrappers; printed in black.
                 Library of the American Cryptogram Association (George
                 C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Book{Shulman:1961:GC,
  author =       "David Shulman and Joseph Weintraub",
  title =        "A glossary of cryptography",
  publisher =    "Crypto Press",
  address =      "New York, NY, USA",
  pages =        "various",
  year =         "1961",
  LCCN =         "Z103 .S48",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Handbook of cryptography; section 1",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- terminology",
}

@Book{Friedman:1963:SLC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Six lectures on cryptology",
  publisher =    "????",
  address =      "????",
  pages =        "iii + 182",
  year =         "1963",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "SRH-004.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography",
}

@Book{Kahn:1963:PNU,
  author =       "David Kahn",
  title =        "Plaintext in the new unabridged: an examination of the
                 definitions on cryptology in {Webster's Third New
                 International Dictionary}",
  publisher =    "Crypto Press",
  address =      "New York, NY, USA",
  pages =        "35",
  year =         "1963",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography --- Terminology; language; Webster's
                 third new international dictionary of the English",
}

@Book{Thompson:1963:SDE,
  author =       "James Westfall Thompson and Saul Kussiel Padover",
  title =        "Secret diplomacy; espionage and cryptography,
                 1500-1815",
  publisher =    "F. Ungar Pub. Co",
  address =      "New York, NY, USA",
  pages =        "290",
  year =         "1963",
  LCCN =         "JX1648 .T5 1963",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``Appendix: Cryptography'': p. 253--263. Bibliography:
                 p. 265--282.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- history; diplomacy --- history;
                 Europe --- politics and government; secret service",
}

@Article{Zafiropulo:1963:RAD,
  author =       "Jean Zafiropulo",
  title =        "Le r{\^o}le de l'analogie dans le d{\'e}chiffrement de
                 l'{\'e}criture myc{\'e}nienne lin{\'e}aire {B}.
                 ({French}) [{The} role of analogy in deciphering
                 {Mycenaean} linear script {B}]",
  journal =      j-DIALECTICA,
  volume =       "17",
  number =       "4",
  pages =        "307--327",
  month =        dec,
  year =         "1963",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1111/j.1746-8361.1963.tb00466.x",
  ISSN =         "0012-2017 (print), 1746-8361 (electronic)",
  ISSN-L =       "0012-2017",
  bibdate =      "Thu Jul 20 09:32:38 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dialectica.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dialectica: International Review of Philosophy of
                 Knowledge",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1746-8361",
  language =     "French",
}

@Book{Laffin:1964:CCS,
  author =       "John Laffin",
  title =        "Codes and ciphers: secret writing through the ages",
  publisher =    "Abelard-Schuman",
  address =      "????",
  pages =        "164",
  year =         "1964",
  LCCN =         "",
  bibdate =      "Sat Apr 20 12:01:11 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Stout:1965:DRN,
  author =       "Rex Stout",
  title =        "The Doorbell Rang: a Nero Wolfe Novel",
  publisher =    "????",
  address =      "????",
  pages =        "??",
  year =         "1965",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 5]{Rivest:1998:CWC}.",
}

@Article{Kahn:1966:MC,
  author =       "David Kahn",
  title =        "Modern Cryptology",
  journal =      j-SCI-AMER,
  volume =       "215",
  number =       "1",
  pages =        "38--46",
  month =        jul,
  year =         "1966",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican0766-38",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 15:58:23 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1960.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v215/n1/pdf/scientificamerican0766-38.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Sinkov:1966:ECM,
  author =       "Abraham Sinkov",
  title =        "Elementary cryptanalysis: a mathematical approach",
  volume =       "22",
  publisher =    pub-MATH-ASSOC-AMER,
  address =      pub-MATH-ASSOC-AMER:adr,
  pages =        "ix + 222",
  year =         "1966",
  ISBN =         "0-88385-622-0",
  ISBN-13 =      "978-0-88385-622-2",
  LCCN =         "Z 104 S47 1980",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "With a supplement by Paul L. Irwin. Reissued in 1975
                 and 1980.",
  series =       "New mathematical library",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Tuchman:1966:ZT,
  author =       "Barbara W. Tuchman",
  title =        "The {Zimmermann} telegram",
  publisher =    pub-MACMILLAN,
  address =      pub-MACMILLAN:adr,
  pages =        "xii + 244",
  year =         "1966",
  LCCN =         "D511 .T77 1966",
  bibdate =      "Wed Nov 25 13:57:39 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of original 1958 edition. Kahn
                 \cite{Kahn:1996:CSS} describes this book as
                 ``recount[ing] the political effects of the most
                 important cryptogram solution in history''.",
  acknowledgement = ack-nhfb,
}

@Book{Bowers:1967:PC,
  author =       "William Maxwell Bowers and William G. Bryan",
  title =        "Practical cryptanalysis",
  publisher =    "American Cryptogrm Association",
  address =      "Greenfield, MA, USA",
  pages =        "various",
  year =         "1967",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Bound in printed paper wrappers. From the library of
                 the American Cryptogram Association. (The George C.
                 Lamb Collection.) V. I. Digraphic substitution, by
                 Bowers.-- V. II. The Bifid cipher, by Bowers.-- V. III.
                 The Trifid cipher.-- V. IV and V. ``Cryptographic
                 ABC'S'' by William G. Bryan.",
  keywords =     "Cryptography.",
}

@Article{Brillhart:1967:SFR,
  author =       "John Brillhart and J. L. Selfridge",
  title =        "Some Factorizations of $ 2^n \pm 1 $ and Related
                 Results",
  journal =      j-MATH-COMPUT,
  volume =       "21",
  number =       "97",
  pages =        "87--96",
  month =        jan,
  year =         "1967",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Book{Bryan:1967:CA,
  author =       "William G. Bryan",
  title =        "Cryptographic {ABC}'s",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  year =         "1967",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 4, 5",
  acknowledgement = ack-nhfb,
  annote =       "v. 1. Substitution and transposition ciphers.--v. 2.
                 Periodic ciphers. Miscellaneous.",
  keywords =     "Ciphers.",
}

@Book{Farago:1967:BSS,
  author =       "Ladislas Farago",
  title =        "The broken seal: the story of {Operation Magic} and
                 the {Pearl Harbor} disaster",
  publisher =    pub-RANDOM,
  address =      pub-RANDOM:adr,
  pages =        "439",
  year =         "1967",
  LCCN =         "D742.U5 F3",
  bibdate =      "Thu Apr 29 18:01:53 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also reprint \cite{Farago:1969:BSS}.",
  acknowledgement = ack-nhfb,
}

@Book{Golomb:1967:SRS,
  author =       "S. Golomb",
  title =        "Shift Register Sequences",
  publisher =    pub-HOLDEN-DAY,
  address =      pub-HOLDEN-DAY:adr,
  pages =        "xiv + 224",
  year =         "1967",
  LCCN =         "QA267.5.S4 G6",
  bibdate =      "Mon Nov 30 08:47:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Portions co-authored with Lloyd R. Welch, Richard M.
                 Goldstein, and Alfred W. Hales.",
  acknowledgement = ack-nhfb,
}

@Book{Kahn:1967:CSSa,
  author =       "David Kahn",
  title =        "The codebreakers: the story of secret writing",
  publisher =    pub-MACMILLAN,
  address =      pub-MACMILLAN:adr,
  pages =        "xvi + 1164",
  year =         "1967",
  LCCN =         "Z103 .K28",
  bibdate =      "Tue Dec 01 08:31:37 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-c.html#cryptography",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1000.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Book{Kahn:1967:CSSb,
  author =       "David Kahn",
  title =        "The codebreakers: the story of secret writing",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  pages =        "xvi + 1164",
  year =         "1967",
  LCCN =         "Z103 .K28 1967",
  bibdate =      "Tue Dec 01 08:35:10 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Kullback:1967:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis",
  number =       "14",
  publisher =    "National Archives",
  address =      "Washington, DC, USA",
  edition =      "Revised",
  pages =        "iii + 194",
  year =         "1967",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Technical literature series monograph",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
  remark =       "From \cite{Anscombe:2003:QCC}: ``A bookseller
                 description [of this book]: `This classic text provides
                 various statistical tests: the Chi Test, which affords
                 a quantitative measure of the degree of similarity
                 between two distributions, and the Phi Test, which
                 provides a quantitative measurement of the degree of
                 non-randomness of a distribution. Text includes
                 numerous tabulations of frequency data in other
                 languages.'.''",
}

@Book{Monge:1967:NMC,
  author =       "Alf Monge and O. G. Landsverk",
  title =        "Norse medieval cryptography in runic carvings",
  publisher =    "Norseman Press",
  address =      "Glendale, CA, USA",
  pages =        "224",
  year =         "1967",
  LCCN =         "E105 .M65",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Includes bibliographies.",
  acknowledgement = ack-nhfb,
  keywords =     "America --- discovery and exploration --- Norse;
                 cryptography; runes",
}

@Article{Ayoub:1968:EEK,
  author =       "F. Ayoub",
  title =        "Erratum: Encryption with keyed random permutations",
  journal =      j-ELECT-LETTERS,
  volume =       "17",
  number =       "??",
  pages =        "??--??",
  month =        feb,
  year =         "1968",
  CODEN =        "ELLEAK",
  DOI =          "https://doi.org/10.1049/el:19810541",
  ISSN =         "0013-5194 (print), 1350-911X (electronic)",
  ISSN-L =       "0013-5194",
  bibdate =      "Fri Dec 30 16:39:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4246020",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220",
  fjournal =     "Electronics Letters",
}

@Article{Ayoub:1968:EKR,
  author =       "F. Ayoub",
  title =        "Encryption with keyed random permutations",
  journal =      j-ELECT-LETTERS,
  volume =       "17",
  number =       "??",
  pages =        "583--585",
  month =        feb,
  year =         "1968",
  CODEN =        "ELLEAK",
  DOI =          "https://doi.org/10.1049/el:19810411",
  ISSN =         "0013-5194 (print), 1350-911X (electronic)",
  ISSN-L =       "0013-5194",
  bibdate =      "Fri Dec 30 16:39:40 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4245887",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220",
  fjournal =     "Electronics Letters",
}

@Book{Sinkov:1968:ECMa,
  author =       "Abraham Sinkov",
  title =        "Elementary cryptanalysis: a mathematical approach",
  volume =       "22",
  publisher =    pub-RANDOM,
  address =      pub-RANDOM:adr,
  pages =        "ix + 189",
  year =         "1968",
  LCCN =         "QA11 .N5 v.22",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "New mathematical library",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Sinkov:1968:ECMb,
  author =       "Abraham Sinkov",
  title =        "Elementary cryptanalysis: a mathematical approach",
  volume =       "22",
  publisher =    pub-MATH-ASSOC-AMER,
  address =      pub-MATH-ASSOC-AMER:adr,
  pages =        "ix + 222",
  year =         "1968",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "New mathematical library",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Wilkes:1968:TSCa,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  volume =       "5",
  publisher =    "Macdonald and Co.",
  address =      "London, UK",
  pages =        "vii + 102",
  year =         "1968",
  ISBN =         "0-356-02426-1",
  ISBN-13 =      "978-0-356-02426-4",
  LCCN =         "QA76.5 .W523 1968b",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Macdonald computer monographs",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography.",
  subject =      "Time-sharing computer systems",
}

@Book{Wilkes:1968:TSCb,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  volume =       "5",
  publisher =    "American Elsevier Pub. Co.",
  address =      "New York, NY, USA",
  pages =        "102",
  year =         "1968",
  LCCN =         "QA76.5 .W523",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Computer monograph series",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography.",
  subject =      "Time-sharing computer systems",
}

@Book{Farago:1969:BSS,
  author =       "Ladislas Farago",
  title =        "The broken seal: the story of {Operation Magic} and
                 the {Pearl Harbor} disaster",
  publisher =    "Mayflower",
  address =      "London, UK",
  pages =        "415",
  year =         "1969",
  LCCN =         "D742.U5 F3",
  bibdate =      "Wed Nov 25 14:00:32 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of \cite{Farago:1967:BSS}.",
  acknowledgement = ack-nhfb,
}

@Book{Knuth:1969:SA,
  author =       "Donald E. Knuth",
  title =        "Seminumerical Algorithms",
  volume =       "2",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xi + 624",
  year =         "1969",
  ISBN =         "0-201-03802-1",
  ISBN-13 =      "978-0-201-03802-6",
  LCCN =         "QA76.5 .K57",
  MRclass =      "68.00 (65.00)",
  MRnumber =     "44 \#3531",
  MRreviewer =   "M. Muller",
  bibdate =      "Wed Dec 15 15:47:38 1993",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/benfords-law.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  price =        "US\$19.75",
  series =       "The Art of Computer Programming",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Handschuh:1998:SCC}.",
  remark =       "Benford's Law is discussed on pp. 219--229.",
  tableofcontents = "3: Random Numbers \\
                 3.1. Introduction / 1 \\
                 3.2. Generating Uniform Random Numbers / 9 \\
                 3.2.1. The Linear Congruential Method / 9 \\
                 3.2.1.1. Choice of modulus / 11 \\
                 3.2.1.2. Choice of multiplier / 15 \\
                 3.2.1.3. Potency / 21 \\
                 3.2.2. Other Methods / 25 \\
                 3.3. Statistical Tests / 34 \\
                 3.3.1. General Test Procedures for Studying Random Data
                 / 35 \\
                 3.3.2. Empirical Tests / 54 \\
                 *3.3.3. Theoretical Tests / 69 \\
                 3.3.4. The Spectral Test / 82 \\
                 3.4. Other Types of Random Quantities / 100 \\
                 3.4.1. Numerical Distributions / 101 \\
                 3.4.2. Random Sampling and Shuffling / 121 \\
                 *3.5. What is a Random Sequence? / 127 \\
                 3.6. Summary / 155 \\
                 4: Arithmetic \\
                 4.1. Positional Number Systems / 162 \\
                 4.2. Floating-Point Arithmetic / 180 \\
                 4.2.1. Single-Precision Calculations / 180 \\
                 4.2.2. Accuracy of Floating-Point Arithmetic / 195 \\
                 *4.2.3. Double-Precision Calculations / 210 \\
                 4.2.4. Statistical Distribution / 218 \\
                 4.3. Multiple-Precision Arithmetic / 229 \\
                 4.3.1. The Classical Algorithms / 229 \\
                 *4.3.2. Modular Arithmetic / 248 \\
                 *4.3.3. How Fast Can We Multiply? / 258 \\
                 4.4. Radix Conversion / 280 \\
                 4.5. Rational Arithmetic / 290 \\
                 4.5.1. Fractions / 290 \\
                 4.5.2. The Greatest Common Divisor / 293 \\
                 *4.5.3. Analysis of Euclid's Algorithm / 316 \\
                 4.5.4. Factoring into Primes / 339 \\
                 4.6. Polynomial Arithmetic / 360 \\
                 4.6.1. Division of Polynomials / 363 \\
                 *4.6.2. Factorization of Polynomials / 381 \\
                 4.6.3. Evaluation of Powers / 398 \\
                 4.6.4. Evaluation of Polynomials / 422 \\
                 *4.7. Manipulation of Power Series / 444 \\
                 Answers to Exercises / 452 \\
                 Appendix A: MIX / 565 \\
                 1. Description of MIX / 565 \\
                 2. The MIX Assembly Language / 584 \\
                 Appendix B: Tables of Numerical Quantities / 596 \\
                 1. Fundamental Constants (decimal) / 596 \\
                 2. Fundamental Constants (octal) / 597 \\
                 3. Harmonic Numbers, Bernoulli Numbers, Fibonacci
                 Numbers / 598 \\
                 Appendix C: Index to Notations / 600 \\
                 Index and Glossary / 605",
  xxyear =       "{\noopsort{1968c}}1969",
}

@Book{Knuth:1969:SNM,
  author =       "Donald E. Knuth",
  title =        "Semi\-nu\-mer\-i\-cal Algorithms",
  volume =       "2",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xi + 624",
  year =         "1969",
  ISBN =         "0-201-03802-1",
  ISBN-13 =      "978-0-201-03802-6",
  LCCN =         "QA76.5 .K57",
  bibdate =      "Wed Dec 15 15:47:38 1993",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See pages 248--250.",
  price =        "US\$19.75",
  series =       "The Art of Computer Programming",
  acknowledgement = ack-nhfb,
}

@Article{Leighton:1969:SCA,
  author =       "Albert C. Leighton",
  title =        "Secret Communication among the {Greeks} and {Romans}",
  journal =      j-TECH-CULTURE,
  volume =       "10",
  number =       "2",
  pages =        "139--154",
  month =        apr,
  year =         "1969",
  CODEN =        "TECUA3",
  DOI =          "https://doi.org/10.1353/tech.1969.a892350",
  ISSN =         "0040-165X (print), 1097-3729 (electronic)",
  ISSN-L =       "0040-165X",
  bibdate =      "Sat Sep 30 08:23:14 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/techculture1960.bib",
  URL =          "https://muse.jhu.edu/pub/1/article/892350/pdf",
  acknowledgement = ack-nhfb,
  ajournal =     "Tech. Culture",
  fjournal =     "Technology and Culture",
  journal-URL =  "https://muse.jhu.edu/journal/194",
}

@Article{Schroeder:1969:IC,
  author =       "M. R. Schroeder",
  title =        "Images from computers",
  journal =      j-IEEE-SPECTRUM,
  volume =       "6",
  number =       "3",
  pages =        "66--78",
  month =        mar,
  year =         "1969",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1969.5214005",
  ISSN =         "1939-9340",
  ISSN-L =       "0018-9235",
  bibdate =      "Wed Jan 15 11:58:06 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1960.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Application software; Brightness; Cryptography;
                 Laboratories; Optical computing; Optical films; Optical
                 materials; Optical signal processing; Spectrogram;
                 Telephony",
}

@Article{VanTassel:1969:ACT,
  author =       "Dennie {Van Tassel}",
  title =        "Advanced Cryptographic Techniques for Computers",
  journal =      j-CACM,
  volume =       "12",
  number =       "12",
  pages =        "664--665",
  month =        dec,
  year =         "1969",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Mar 24 21:38:51 MST 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1960.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Cryptographic techniques which can be used to maintain
                 the confidentiality of information processed by
                 computers are dealt with. Special emphasis is paid to
                 the unique characteristics of computer files that make
                 many cryptographic methods of little use. Relative
                 security, costs, and preferred methods are included in
                 this paper.",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "San Jose State Coll., CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "ciphers secrecy systems; codes; computational
                 linguistics; confidential information processing;
                 cryptanalysis; cryptographic; security of data;
                 security systems",
}

@Book{Winterbotham:1969:SP,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "Secret and personal",
  publisher =    "Kimber",
  address =      "London, UK",
  pages =        "192",
  year =         "1969",
  ISBN =         "0-7183-0321-0",
  ISBN-13 =      "978-0-7183-0321-1",
  LCCN =         "D810.S7 W48; D810.S7 W73",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
  subject =      "World War, 1939--1945; Secret service; Great Britain",
}

@TechReport{Feistel:1970:CCD,
  author =       "Horst Feistel",
  title =        "Cryptographic coding for data-bank privacy",
  type =         "Research Report",
  number =       "RC-2827",
  institution =  inst-IBM-WATSON,
  address =      inst-IBM-WATSON:adr,
  day =          "18",
  month =        mar,
  year =         "1970",
  bibdate =      "Sat Jun 10 11:33:02 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Galland:1970:HAB,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  number =       "10",
  publisher =    "AMS Press",
  address =      "New York, NY, USA",
  pages =        "viii + 209",
  year =         "1970",
  ISBN =         "0-404-50710-7",
  ISBN-13 =      "978-0-404-50710-7",
  LCCN =         "Z103.A1 G3 1970",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Northwestern University studies in the humanities",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Article{Gingerich:1970:BRB,
  author =       "Owen Gingerich",
  title =        "Book Review: {{\booktitle{The Codebreakers. The Story
                 of Secret Writing}} by David Kahn}",
  journal =      j-ISIS,
  volume =       "61",
  number =       "3",
  pages =        "405--406",
  month =        "Autumn",
  year =         "1970",
  CODEN =        "ISISA4",
  ISSN =         "0021-1753 (print), 1545-6994 (electronic)",
  ISSN-L =       "0021-1753",
  bibdate =      "Tue Jul 30 21:28:42 MDT 2013",
  bibsource =    "http://www.jstor.org/action/showPublication?journalCode=isis;
                 http://www.jstor.org/stable/i302289;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/isis1970.bib",
  URL =          "http://www.jstor.org/stable/229701",
  acknowledgement = ack-nhfb,
  fjournal =     "Isis",
  journal-URL =  "http://www.jstor.org/page/journal/isis/about.html",
}

@Book{Marsh:1970:CSS,
  author =       "D. C. B. Marsh",
  title =        "Cryptology as a senior seminar topic",
  publisher =    "Mathematical Association of America",
  address =      "Buffalo, NY, USA",
  pages =        "761--764",
  year =         "1970",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint from American Mathematical Monthly, vol. 77,
                 no. 7, August-September, 1970.",
  acknowledgement = ack-nhfb,
  annote =       "Library of the American Cryptogram Association (George
                 C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Article{Marsh:1970:MEC,
  author =       "D. C. B. Marsh",
  title =        "Mathematical Education: Cryptology as a Senior Seminar
                 Topic",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "77",
  number =       "7",
  pages =        "761--764",
  month =        aug # "\slash " # sep,
  year =         "1970",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:02 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{Stark:1970:INT,
  author =       "Harold M. Stark",
  title =        "An introduction to number theory",
  publisher =    "Markham Publishing Company",
  address =      "Chicago, IL, USA",
  pages =        "x + 347",
  year =         "1970",
  ISBN =         "0-8410-1014-5",
  ISBN-13 =      "978-0-8410-1014-7",
  LCCN =         "QA241 .S72",
  bibdate =      "Fri Jun 24 14:24:21 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Markham mathematics series",
  acknowledgement = ack-nhfb,
  subject =      "Number theory",
}

@TechReport{Tuckerman:1970:SVV,
  author =       "Bryant Tuckerman",
  title =        "A study of the {Vigen{\'e}re--Vernam} single and
                 multiple loop enciphering systems",
  type =         "Research Report",
  number =       "RC-2879",
  institution =  inst-IBM-WATSON,
  address =      inst-IBM-WATSON:adr,
  day =          "14",
  month =        may,
  year =         "1970",
  bibdate =      "Sat Jun 10 12:30:19 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Manual{USDOS:1970:BC,
  author =       "{United States.Dept.of the Army}",
  title =        "Basic cryptanalysis",
  type =         "Field Manual",
  number =       "FM 34-40-2",
  organization = pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "various",
  day =          "13",
  month =        sep,
  year =         "1970",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  alttitle =     "TM 32-220 20 August 1970.",
  keywords =     "Cryptography --- Military aspects --- Handbooks,
                 manuals, etc; Security systems --- Military aspects ---
                 Handbooks, manuals, etc; United States. --- Army ---
                 Handbooks, manuals, etc",
}

@Book{Wolfe:1970:SWC,
  author =       "James Raymond Wolfe",
  title =        "Secret writing: the craft of the cryptographer",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "192",
  year =         "1970",
  LCCN =         "652.8 W",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Explains the distinction between ciphers and codes and
                 describes their past and present use in secret
                 communications.",
  acknowledgement = ack-nhfb,
  annote =       "High-school level book.",
  keywords =     "ciphers; cryptography",
}

@Article{Campaigne:1971:REC,
  author =       "H. H. Campaigne",
  title =        "Reviews: {{\em Elementary Cryptanalysis --- A
                 Mathematical Approach}}, by {Abraham Sinkov}",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "78",
  number =       "4",
  pages =        "423--423",
  month =        apr,
  year =         "1971",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:19 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{DAgapeyeff:1971:CC,
  author =       "Alexander D'Agapeyeff",
  title =        "Codes and ciphers",
  publisher =    "Gryphon Books",
  address =      "Ann Arbor, MI, USA",
  pages =        "160",
  year =         "1971",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "Z103 .D35 1971",
  bibdate =      "Sat Apr 20 13:40:57 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of \cite{DAgapeyeff:1939:CC}.",
  acknowledgement = ack-nhfb,
}

@Article{Girdansky:1971:DPC,
  author =       "M. B. Girdansky",
  title =        "Data privacy --- cryptology and the computer at {IBM
                 Research},",
  journal =      "IBM Research Reports",
  volume =       "7",
  number =       "4",
  pages =        "12",
  year =         "1971",
  bibdate =      "Sat Jun 10 11:41:21 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hammer:1971:SSC,
  author =       "Carl Hammer",
  title =        "Signature Simulation and Certain Cryptographic Codes",
  journal =      j-CACM,
  volume =       "14",
  number =       "1",
  pages =        "3--14",
  month =        jan,
  year =         "1971",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Three cyphers allegedly authored by Thomas Jefferson
                 Beale in 1822 have been the subject of intensive study
                 for over 100 years. Generations of cryptanalysts have
                 expended untold man-years, thus far without success,
                 attempting tode code them; vast armies of fortune
                 hunters and treasure seekers have devoted Herculean
                 labors to digging up the rolling hills of Virginia
                 trying to locate the promised bonanza. \par

                 The history of pertinent activities would fill volumes,
                 yet serious students of cryptography have always had
                 nagging doubts about the cyphers' authenticity. It has
                 been alleged that the ``known solution'' to Cypher
                 Number Two: 115, 73, 24, 818, 37, 52, 49, \ldots{} (``I
                 have deposited in the County of Bedford about four
                 miles from Buford's in an excavation or vault
                 \ldots{}'') with the aid of an unsanitized version of
                 the Declaration of Independence was merely a superb,
                 imaginative, and grandiose hoax perpetrated ages ago
                 for whatever reasons. Modern computer technology could
                 obviously perform signature analyses the process of
                 encoding itself so as to yield new clues and deeper
                 insights into their construction. For the benefit of
                 the uninitiated, the encoding method used in the second
                 cypher employs a specified document whose words are
                 simply numbered consecutively, and first letters of
                 these words are sought out at random to match the
                 letters of these words are sought out at random to
                 match the letters of the clear text or message.
                 \par

                 The sequence of numbers corresponding to these matches
                 is then written down as the final code. While
                 primitive, the process has the advantage of relative
                 security until the source document becomes known; at
                 that moment the cypher can be decoded even by second
                 graders. The work now completed with the help of our
                 UNIVAC 1108 includes numerous analytical studies of the
                 Beale cyphers and various types of simulations.
                 \par

                 For example, we have turned the entire process of
                 simulated encoding by various schemes over to the
                 machine and analyzed the signatures of these synthetic
                 codes; we have also encoded various messages by hand,
                 using different texts and a variety of methods to
                 obtain their signatures. These simulations provide
                 convincing evidence that the signatures are both
                 process and data dependent; they indicate also very
                 strongly that Mr. Beale's cyphers are for real and that
                 it is merely a matter of time before someone finds the
                 correct source document and locates the right vault in
                 the common-wealth of Virginia.",
  acknowledgement = ack-nhfb,
  classcodes =   "B6120B (Codes); C6130 (Data handling techniques)",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "Beale Cyphers codes; codes; computer applications;
                 computer signature simulation; cryptanalysis; cyphers;
                 Declaration of Independence; decoding; encoding; Magna
                 Carta; numerical cryptographic codes; pseudotext;
                 results analysis; signature; simulation; Thomas
                 Jefferson Beale; treasure site identification",
  treatment =    "A Application",
}

@Book{Smith:1971:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography, the science of secret writing",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "164",
  year =         "1971",
  ISBN =         "0-486-20247-X",
  ISBN-13 =      "978-0-486-20247-1",
  LCCN =         "Z 104 S65c 1971",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``This Dover edition, first published in 1955, is an
                 unabridged and corrected republication of the work
                 originally published by W. W. Norton and Company in
                 1943.'' ``Copyright renewed 1971.'' Bibliography: p.
                 156.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@TechReport{Smith:1971:DLC,
  author =       "J. L. Smith",
  title =        "The design of {Lucifer}, a cryptographic device for
                 data communications",
  type =         "Research Report",
  number =       "RC-3326",
  institution =  inst-IBM-WATSON,
  address =      inst-IBM-WATSON:adr,
  year =         "1971",
  bibdate =      "Sat Jun 10 12:23:30 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Vincent:1971:PAG,
  author =       "C. H. Vincent",
  title =        "Precautions for accuracy in the generation of truly
                 random binary numbers",
  journal =      j-J-PHYS-E,
  volume =       "4",
  number =       "11",
  pages =        "825--828",
  year =         "1971",
  CODEN =        "JPSIAE",
  DOI =          "https://doi.org/10.1088/0022-3735/5/6/521",
  ISSN =         "0022-3735",
  bibdate =      "Sat Nov 29 15:13:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See corrigendum \cite{Vincent:1972:CPA}.",
  URL =          "http://stacks.iop.org/0022-3735/4/i=11/a=007",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Physics. E: Scientific instruments",
  journal-URL =  "http://iopscience.iop.org/0022-3735/",
}

@Article{Beardsley:1972:YCI,
  author =       "C. W. Beardsley",
  title =        "Is your computer insecure?",
  journal =      j-IEEE-SPECTRUM,
  volume =       "9",
  number =       "1",
  pages =        "67--78",
  month =        jan,
  year =         "1972",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1972.5218476",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Communication system control; Computer crime; Computer
                 errors; Computerized monitoring; Condition monitoring;
                 Cryptography; Disaster management; Hardware; Process
                 control; Remote monitoring",
}

@Article{Girdansky:1972:CCD,
  author =       "M. B. Girdansky",
  title =        "Cryptology, the computer and data privacy",
  journal =      "Computers and Automation",
  volume =       "21",
  number =       "??",
  pages =        "12--19",
  month =        apr,
  year =         "1972",
  bibdate =      "Sat Jun 10 11:43:49 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Meyer:1972:PCC,
  author =       "C. H. Meyer and W. L. Tuchman",
  title =        "Pseudorandom codes can be cracked",
  journal =      j-ELECTRONIC-DESIGN,
  volume =       "20",
  number =       "23",
  pages =        "74--76",
  day =          "9",
  month =        nov,
  year =         "1972",
  CODEN =        "ELODAW",
  ISSN =         "0013-4872 (print), 1944-9550 (electronic)",
  ISSN-L =       "0013-4872",
  bibdate =      "Sat Jun 10 12:07:32 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Electronic Design",
}

@Article{Smith:1972:EAC,
  author =       "J. L. Smith and W. A. Notz and P. R. Osseck",
  title =        "An experimental application of cryptography to a
                 remotely accessed data system",
  journal =      "Proceedings of the ACM 1972 Annual Conference",
  volume =       "??",
  number =       "??",
  pages =        "282--297",
  month =        "????",
  year =         "1972",
  bibdate =      "Sat Jun 10 12:27:33 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Vincent:1972:CPA,
  author =       "C. H. Vincent",
  title =        "Corrigendum: {Precautions for accuracy in the
                 generation of truly random binary numbers}",
  journal =      j-J-PHYS-E,
  volume =       "5",
  number =       "6",
  pages =        "546--546",
  year =         "1972",
  CODEN =        "JPSIAE",
  ISSN =         "0022-3735",
  bibdate =      "Sat Nov 29 15:13:30 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "See \cite{Vincent:1971:PAG}.",
  URL =          "http://stacks.iop.org/0022-3735/5/i=6/a=521",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Physics. E: Scientific instruments",
  journal-URL =  "http://iopscience.iop.org/0022-3735/",
}

@Book{Wilkes:1972:TSC,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  volume =       "5",
  publisher =    "Macdonald and Co.",
  address =      "London, UK",
  edition =      "Second",
  pages =        "ix + 149",
  year =         "1972",
  ISBN =         "0-444-19583-1 (Elsevier)",
  ISBN-13 =      "978-0-444-19583-8 (Elsevier)",
  LCCN =         "QA76.5 .W523 1972",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Computer monographs",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography.",
  subject =      "Time-sharing computer systems",
}

@Book{Bertrand:1973:EOP,
  author =       "Gustave Bertrand",
  title =        "{Enigma}; ou, La plus grande {\'e}nigme de la guerre
                 1939--1945",
  publisher =    "Plon",
  address =      "Paris, France",
  pages =        "295 + 2 + 16",
  year =         "1973",
  LCCN =         "????",
  bibdate =      "Sun Dec 01 09:15:14 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
}

@Article{Chesson:1973:CC,
  author =       "F. W. (Frederick William) Chesson",
  title =        "Computers and cryptology",
  journal =      j-DATAMATION,
  volume =       "??",
  number =       "??",
  pages =        "62--77",
  month =        jan,
  year =         "1973",
  CODEN =        "DTMNAT",
  ISSN =         "0011-6963",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Datamation",
}

@Article{Feistel:1973:CCP,
  author =       "Horst Feistel",
  title =        "Cryptography and Computer Privacy",
  journal =      j-SCI-AMER,
  volume =       "228",
  number =       "5",
  pages =        "15--23",
  month =        may,
  year =         "1973",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam.bib",
  acknowledgement = ack-nhfb,
  annote =       "Survey of cryptography for data bases.",
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "code security; computer privacy; cryptography",
  referencedin = "Referenced in \cite[Ref. 14]{Biham:1998:TA}.",
}

@Book{Futrelle:1973:BTM,
  author =       "Jacques Futrelle",
  title =        "Best ``{Thinking Machine}'' detective stories",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "ix + 241",
  year =         "1973",
  ISBN =         "0-486-20537-1",
  ISBN-13 =      "978-0-486-20537-3",
  LCCN =         "PS3511.U98 B4",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  contents =     "The problem of cell 13.--The crystal gazer.--The
                 scarlet thread.--The flaming phantom.--The problem of
                 the stolen Rubens.--The missing necklace.--The phantom
                 motor.--The brown coat.--His perfect alibi.--The lost
                 radium.--Kidnapped Baby Blake, millionaire.--The fatal
                 cipher.",
  keywords =     "detective and mystery stories",
}

@Article{Geffe:1973:HPD,
  author =       "P. Geffe",
  title =        "How to protect data with ciphers that are really hard
                 to break",
  journal =      j-ELECTRONICS,
  volume =       "46",
  number =       "1",
  pages =        "99--101",
  year =         "1973",
  ISSN =         "0883-4989",
  bibdate =      "Mon Nov 30 08:58:36 1998",
  bibsource =    "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This cipher was later broken by
                 \cite{Siegenthaler:1985:DCS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Electronics",
}

@Book{Higenbottam:1973:CC,
  author =       "Frank Higenbottam",
  title =        "Codes and ciphers",
  publisher =    "English Universities Press",
  address =      "London, UK",
  pages =        "180 (est.)",
  year =         "1973",
  ISBN =         "0-340-12493-8",
  ISBN-13 =      "978-0-340-12493-2",
  LCCN =         "????",
  bibdate =      "Sat Apr 20 12:10:26 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Knuth:1973:FA,
  author =       "Donald E. Knuth",
  title =        "Fundamental Algorithms",
  volume =       "1",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  edition =      "Second",
  pages =        "xxi + 634",
  year =         "1973",
  ISBN =         "0-201-03809-9",
  ISBN-13 =      "978-0-201-03809-5",
  LCCN =         "QA76.6 .K641 1973",
  bibdate =      "Wed Dec 15 10:36:21 1993",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  series =       "The Art of Computer Programming",
  acknowledgement = ack-nhfb,
  tableofcontents = "1: Basic Concepts / 1 \\
                 1.1. Algorithms / 1 \\
                 1.2. Mathematical Preliminaries / 10 \\
                 1.2.1. Mathematical Induction / 11 \\
                 1.2.2. Numbers, Powers, and Logarithms / 21 \\
                 1.2.3. Sums and Products / 26 \\
                 1.2.4. Integer Functions and Elementary Number Theory /
                 37 \\
                 1.2.5. Permutations and Factorials / 44 \\
                 1.2.6. Binomial Coefficients / 51 \\
                 1.2.7. Harmonic Numbers / 73 \\
                 1.2.8. Fibonacci Numbers / 78 \\
                 1.2.9. Generating Functions / 86 \\
                 1.2.10. Analysis of an Algorithm / 94 \\
                 *1.2.11. Asymptotic Representations / 104 \\
                 *1.2.11.1. The O-notation / 104 \\
                 *1.2.11.2. Euler's summation formula / 108 \\
                 *1.2.11.3. Some asymptotic calculations / 112 \\
                 1.3. MIX / 120 \\
                 1.3.1. Description of MIX / 120 \\
                 1.3.2. The MIX Assembly Language / 141 \\
                 1.3.3. Applications to Permutations / 160 \\
                 1.4. Some Fundamental Programming Techniques / 182 \\
                 1.4.1. Subroutines / 182 \\
                 1.4.2. Coroutines / 190 \\
                 1.4.3. Interpretive Routines / 197 \\
                 1.4.3.1. A MIX simulator / 198 \\
                 1.4.3.2. Trace routines / 208 \\
                 1.4.4. Input and Output / 211 \\
                 1.4.5. History and Bibliography / 225 \\
                 2: Information Structures / 228 \\
                 2.1. Introduction / 228 \\
                 2.2 Linear Lists / 234 \\
                 2.2.1. Stacks, Queues, and Deques / 234 \\
                 2.2.2. Sequential Allocation / 240 \\
                 2.2.3. Linked Allocation / 251 \\
                 2.2.4. Circular Lists / 270 \\
                 2.2.5. Doubly Linked Lists / 278 \\
                 2.2.6. Arrays and Orthogonal Lists / 295 \\
                 2.3. Trees / 305 \\
                 2.3.1. Traversing Binary Trees / 315 \\
                 2.3.2. Binary Tree Representation of Trees / 332 \\
                 2.3.3. Other Representations of Trees / 347 \\
                 2.3.4. Basic Mathematical Properties of Trees / 362 \\
                 2.3.4.1. Free trees / 362 \\
                 *2.3.4.2. Oriented trees / 371 \\
                 *2.3.4.3. The ``infinity lemma'' / 381 \\
                 *2.3.4.4. Enumeration of trees / 385 \\
                 2.3.4.5. Path length / 399 \\
                 *2.3.4.6. History and bibliography / 405 \\
                 2.3.5. Lists and Garbage Collection / 406 \\
                 2.4. Multilinked Structures / 423 \\
                 2.5. Dynamic Storage Allocation / 435 \\
                 2.6. History and Bibliography / 456 \\
                 Answers to Exercises / 465 \\
                 Appendix A: Index to Notations / 607 \\
                 Appendix B: Tables of Numerical Quantities \\
                 1. Fundamental Constants (decimal) / 613 \\
                 2. Fundamental Constants (octal) / 614 \\
                 3. Harmonic Numbers, Bernoulli Numbers, Fibonacci
                 Numbers / 615 \\
                 Index and Glossary / 617",
}

@Article{Lampson:1973:NCP,
  author =       "Butler W. Lampson",
  title =        "A Note on the Confinement Problem",
  journal =      j-CACM,
  volume =       "16",
  number =       "10",
  pages =        "613--615",
  month =        oct,
  year =         "1973",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1014.html",
  abstract =     "This note explores the problem of confining a program
                 during its execution so that it cannot transmit
                 information to any other program except its caller. A
                 set of examples attempts to stake out the boundaries of
                 the problem. Necessary conditions for a solution are
                 stated and informally justified.",
  acknowledgement = ack-nhfb,
  annote =       "Prevention of privacy leaks between programs.",
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "723",
  corpsource =   "Xerox Palo Alto Res. Center, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "computer systems programming; confinement; information
                 hiding; leakage of data; operating systems (computers);
                 privacy; proprietary program; protection; security;
                 security of data; steganography",
  treatment =    "P Practical",
}

@Article{Meyer:1973:DCC,
  author =       "C. H. Meyer",
  title =        "Design considerations for cryptography",
  journal =      "AFIPS Conference Proceedings",
  volume =       "42",
  number =       "??",
  pages =        "603--606",
  month =        "????",
  year =         "1973",
  bibdate =      "Sat Jun 10 12:06:00 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Norman:1973:SWB,
  author =       "Bruce Norman",
  title =        "Secret warfare: the battle of codes and ciphers",
  publisher =    "David and Charles",
  address =      "Newton Abbot, UK",
  pages =        "187",
  year =         "1973",
  ISBN =         "0-7153-6223-2",
  ISBN-13 =      "978-0-7153-6223-5",
  LCCN =         "Z103 .N67",
  bibdate =      "Sat Apr 20 12:02:52 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Saltzer:1973:PCI,
  author =       "Jerome H. Saltzer",
  title =        "Protection and control of information sharing in
                 {Multics}",
  journal =      j-OPER-SYS-REV,
  volume =       "7",
  number =       "4",
  pages =        "119--119",
  month =        oct,
  year =         "1973",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/957195.808059",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Thu Feb 23 08:03:02 MST 2017",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/opersysrev.bib",
  abstract =     "This paper describes the design of mechanisms to
                 control sharing of information in the Multics system.
                 Seven design principles help provide insight into the
                 tradeoffs among different possible designs. The key
                 mechanisms described include access control lists,
                 hierarchical control of access specifications,
                 identification and authentication of users, and primary
                 memory protection. The paper ends with a discussion of
                 several known weaknesses in the current protection
                 mechanism design.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J597",
}

@Article{Bartek:1974:EDS,
  author =       "Douglas J. Bartek",
  title =        "Encryption for data security",
  journal =      j-HONEYWELL-COMP-J,
  volume =       "8",
  number =       "2",
  pages =        "86--89",
  month =        "????",
  year =         "1974",
  CODEN =        "HNCJA3",
  ISSN =         "0046-7847",
  bibdate =      "Sat Jun 10 11:10:59 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Honeywell Computer Journal",
}

@Article{Borucki:1974:MNN,
  author =       "L. J. Borucki and J. B. Diaz",
  title =        "Mathematical Notes: a Note on Primes, with Arbitrary
                 Initial or Terminal Decimal Ciphers, in {Dirichlet}
                 Arithmetic Progressions",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "81",
  number =       "9",
  pages =        "1001--1002",
  month =        nov,
  year =         "1974",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:37:41 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Article{Evans:1974:UAS,
  author =       "Arthur {Evans, Jr.} and William Kantrowitz and Edwin
                 Weiss",
  title =        "A User Authentication Scheme Not Requiring Secrecy in
                 the Computer",
  journal =      j-CACM,
  volume =       "17",
  number =       "8",
  pages =        "437--442",
  month =        aug,
  year =         "1974",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 06:38:18 MST 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm17.html#EvansKW74;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "In many computer operating systems a user
                 authenticates himself by entering a secret password
                 known solely to himself and the system. The system
                 compares this password with one recorded in a Password
                 Table which is available to only the authentication
                 program. The integrity of the system depends on keeping
                 the table secret. In this paper a password scheme is
                 presented which does not require secrecy in the
                 computer. All aspects of the system, including all
                 relevant code and data bases, may be known by anyone
                 attempting to intrude. The scheme is based on using a
                 function H which the would-be intruder is unable to
                 invert. This function is applied to the user's password
                 and the result compared to a table entry, a match being
                 interpreted as authentication of the user. The intruder
                 may know all about H and have access to the table, but
                 he can penetrate the system only if he can invert H to
                 determine an input that produces a given output. This
                 paper discusses issues surrounding selection of a
                 suitable H.",
  acknowledgement = ack-nhfb,
  annote =       "Password protection by irreversible transformation",
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "722; 723",
  corpsource =   "MIT, Lexington, MA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "authentication; computer operating systems;
                 cryptology; engineering problems; human; invert; one
                 way encryption; operating system security; operating
                 systems (computers); password scheme; security;
                 security of data; user authentication scheme",
  oldlabel =     "EvansKW74",
  treatment =    "A Application; T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/EvansKW74",
}

@Misc{Feistel:1974:BCC,
  author =       "Horst Feistel",
  title =        "Block cipher cryptographic system",
  howpublished = "{U.S.} Patent No. 3,798,359.",
  day =          "19",
  month =        mar,
  year =         "1974",
  bibdate =      "Sat Jun 10 11:35:48 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Friedman:1974:ETR,
  author =       "Theodore D. Friedman and Lance J. Hoffman",
  title =        "Execution Time Requirements for Encipherment
                 Programs",
  journal =      j-CACM,
  volume =       "17",
  number =       "8",
  pages =        "445--449",
  month =        aug,
  year =         "1974",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See letter \cite{McCarthy:1975:AFP}.",
  abstract =     "The time taken to decipher 20,000 words of data by
                 four additive methods on a Control Data 6400 computer
                 was measured using assembly language and Fortran
                 routines. Standard deviations were computed for 100
                 runs by each method, and from this the range of error
                 at the 95 percent confidence level was calculated. The
                 time required for selecting and fetching the plaintext
                 data and for storing the ciphertext was separately
                 measured (the ``null transformation''), and was then
                 compared with the times required by each enciphering
                 method. The enciphering processes required at least
                 four times as much cpu time when programmed in
                 Fortran.",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "723",
  corpsource =   "Univ. California, Berkeley, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "additive ciphers; assembly language; cpu;
                 cryptography; cryptology; data processing; double key
                 encipherment; enciphering time coefficient;
                 encipherment programs; errors; execution time;
                 experiments; Fortran; null; one word key; operating
                 systems (computers); privacy transformations;
                 protection; pseudo random key; security; security of
                 data; time; transformation",
  treatment =    "A Application; T Theoretical or Mathematical; X
                 Experimental",
}

@Article{Gelb:1974:RWD,
  author =       "I. J. Gelb",
  title =        "Records, Writing, and Decipherment",
  journal =      j-VISIBLE-LANGUAGE,
  volume =       "VIII",
  number =       "4",
  pages =        "293--318",
  month =        "Autumn",
  year =         "1974",
  CODEN =        "VSLGAO",
  ISSN =         "0022-2224 (print), 2691-5529 (electronic)",
  ISSN-L =       "0022-2224",
  bibdate =      "Tue Feb 9 08:33:00 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/visible-language.bib",
  URL =          "https://s3-us-west-2.amazonaws.com/visiblelanguage/pdf/V8N4_1974_E.pdf",
  abstract =     "Written records together with material remains derived
                 from excavations form the main bases for our
                 understanding of past civilizations and their
                 underlying language systems. There is no systematic
                 treatment of written records, and little attention has
                 been paid to the interrelationship between ancient
                 writing and language. Full systems of writing express
                 language at two levels --- morphological and phonetic
                 --- which give rise to three basic writing systems
                 types --- logo-syllabic, syllabic, and alphabetic. Four
                 categories of decipherment --- based on our relative
                 knowledge of the writing system and the language ---
                 are discussed: known writing/known language; unknown
                 writing/known language; known writing/unknown language;
                 and unknown writing/unknown language. From a
                 cryptanalytic point of view there are two general
                 decipherment methods: (1) utilization of external
                 information to determine probable contents (e.g.,
                 bilingual texts,) and (2) internal information from an
                 analysis of the text itself (structure and typology).
                 The assumption of the underlying language is critical
                 for deciphering procedures and provides the test of
                 successful decipherment.",
  acknowledgement = ack-nhfb,
  ajournal =     "Visible Lang.",
  fjournal =     "Visible Language",
  journal-URL =  "https://journals.uc.edu/index.php/vl",
  old-journal-url = "http://visiblelanguage.herokuapp.com/",
}

@TechReport{Grossman:1974:GTR,
  author =       "E. Grossman",
  title =        "Group theoretic remarks on cryptographic systems based
                 on two types of addition",
  type =         "Research Report",
  number =       "RC-4742",
  institution =  inst-IBM-WATSON,
  address =      inst-IBM-WATSON:adr,
  day =          "26",
  month =        feb,
  year =         "1974",
  bibdate =      "Sat Jun 10 11:46:57 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Haugen:1974:RSS,
  author =       "Einar Haugen",
  title =        "The Rune Stones of {Spirit Pond, Maine}",
  journal =      j-VISIBLE-LANGUAGE,
  volume =       "VIII",
  number =       "1",
  pages =        "33--64",
  month =        "Winter",
  year =         "1974",
  CODEN =        "VSLGAO",
  ISSN =         "0022-2224 (print), 2691-5529 (electronic)",
  ISSN-L =       "0022-2224",
  bibdate =      "Tue Feb 9 08:33:00 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/visible-language.bib",
  URL =          "https://s3-us-west-2.amazonaws.com/visiblelanguage/pdf/V8N1_1974_E.pdf",
  abstract =     "The author reports on his official investigation of
                 the inscription on three rune stones discovered in 1971
                 by Walter J. Elliott near Spirit Pond, Maine (USA). In
                 determining the authenticity of the stones as Viking
                 Age artifacts, three steps were involved: (1)
                 transcription of the runes, (2) transliteration into
                 the Latin alphabet, and (3) interpretation of the
                 meaning of the inscriptions. The relationship of runes
                 (as alphabetic symbols) to the history of Scandinavian
                 languages is outlined; special problems of these
                 inscriptions are discussed: (1) the runes are not those
                 used in the eleventh or later centuries, (2) spelling
                 and the use of ``runic'' numerals are inconsistent with
                 runic and scribal practice, (3) the grammatical form is
                 unrecognizable as Old Norse, (4) peculiarities relate
                 directly to the Kensington Stone inscription in
                 Minnesota. Conclusion: the inscriptions could not have
                 been carved by Scandinavian Vikings in the Middle Ages,
                 and probably date since 1932.",
  acknowledgement = ack-nhfb,
  ajournal =     "Visible Lang.",
  fjournal =     "Visible Language",
  old-journal-URL =  "http://visiblelanguage.herokuapp.com/",
  journal-URL =  "https://journals.uc.edu/index.php/vl",
}

@Book{Kahn:1974:C,
  author =       "David Kahn",
  title =        "The Codebreakers",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  edition =      "Abridged",
  pages =        "xvi + 576",
  year =         "1974",
  ISBN =         "0-02-560460-0, 0-297-76785-2",
  ISBN-13 =      "978-0-02-560460-5, 978-0-297-76785-5",
  LCCN =         "Z103 .K28 1974",
  bibdate =      "Thu Jul 23 17:02:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  abstract =     "The first comprehensive history of secret
                 communication from ancient times to the threshold of
                 outer space.",
  acknowledgement = ack-nhfb,
  subject =      "Cryptography; History; Ciphers; Cryptographie;
                 Histoire; Ciphers; Cryptography; Codierung;
                 Geheimschrift; Geschichte; Informationstheorie;
                 Kryptologie; Cryptographers; Informationstheorie;
                 Geheimschrift; Geschichte; Codierung; Kryptologie",
  tableofcontents = "A few words \\
                 One day of MAGIC \\
                 The pageant of cryptology \\
                 The first 3,000 years \\
                 The rise of the West \\
                 On the origin of a species \\
                 The era of the black chambers \\
                 The contribution of the dilettantes \\
                 Crises of the Union \\
                 The professor, the soldier, and the man on Devil's
                 Island \\
                 Room 40 \\
                 A war of intercepts \\
                 Two Americans \\
                 Secrecy for sale \\
                 Duel in the ether: the Axis \\
                 Duel in the ether: neutrals and Allies \\
                 Censors, scramblers, and spies \\
                 The scrutable orientals \\
                 PYCCKAR KPNNTONOTNR \\
                 N.S.A. \\
                 Sideshows \\
                 The anatomy of cryptology \\
                 Heterogeneous impulses \\
                 Rumrunners, businessmen, and makers of non-secret codes
                 \\
                 Ciphers in the past tense \\
                 The pathology of cryptology \\
                 Paracryptology \\
                 Ancestral voices \\
                 Messages from outer space",
}

@Book{Nanovic:1974:SWI,
  author =       "Nanovic, John L. (John Leonard)",
  title =        "Secret writing: an introduction to cryptograms,
                 ciphers, and codes",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "x + 117",
  year =         "1974",
  ISBN =         "0-486-23062-7",
  ISBN-13 =      "978-0-486-23062-7",
  LCCN =         "Z104.N35 1974",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of the 1936 edition \cite{Nanovic:1936:SWI}.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptograms; cryptography",
}

@Article{Pollard:1974:TFP,
  author =       "J. Pollard",
  title =        "Theorems on factorization and primality testing",
  journal =      j-PROC-CAMBRIDGE-PHIL-SOC,
  volume =       "76",
  pages =        "521--528",
  year =         "1974",
  CODEN =        "PCPSA4",
  ISSN =         "0008-1981",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the Cambridge Philosophical Society.
                 Mathematical and physical sciences",
  referencedin = "Referenced in \cite[Ref. 18]{Kaliski:1995:SUR}.",
}

@Article{Purdy:1974:HSL,
  author =       "George B. Purdy",
  title =        "A High Security Log-in Procedure",
  journal =      j-CACM,
  volume =       "17",
  number =       "8",
  pages =        "442--445",
  month =        aug,
  year =         "1974",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/361082.361089",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://dl.acm.org/doi/10.1145/361082.361089",
  abstract =     "The protection of time sharing systems from
                 unauthorized users is often achieved by the use of
                 passwords. By using one-way ciphers to code the
                 passwords, the risks involved with storing the
                 passwords in the computer can be avoided. The selection
                 of a suitable one-way cipher is discussed. It is
                 suggested that for this purpose polynomials over a
                 prime modulus are superior to one-way ciphers derived
                 from Shannon codes.",
  acknowledgement = ack-nhfb,
  annote =       "Password protection by irreversible cryptographic
                 transformation",
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "722; 723",
  corpsource =   "Univ. Illinois, Urbana-Champaign, IL, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "code; computer operating systems; cryptography; data
                 processing --- Security of Data; one way ciphers;
                 operating systems; operating systems (computers);
                 passwords; security; security of data; time sharing
                 systems",
  treatment =    "A Application; T Theoretical or Mathematical",
}

@Manual{Richards:1974:SWP,
  author =       "Sheila R. Richards",
  title =        "Secret writing in the public records: {Henry
                 VIII--George II}",
  publisher =    "H.M.S.O.",
  address =      "London",
  pages =        "x + 173 + 4 plates",
  year =         "1974",
  ISBN =         "0-11-440054-7",
  ISBN-13 =      "978-0-11-440054-5",
  LCCN =         "DA310 .G681 1974",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Contains one hundred documents, all but one of which
                 are written wholly or partially in cipher and are now
                 deciphered and printed in full for the first time.
                 Includes letters in French or Italian, with a summary
                 in English.",
  price =        "UK\pounds4.50",
  acknowledgement = ack-nhfb,
  keywords =     "Great Britain --- history --- 18th Century ---
                 sources; Great Britain --- history --- stuarts,
                 1603--1714 --- sources; Great Britain --- history ---
                 Tudors, 1485--1603 --- sources",
}

@TechReport{Rivest:1974:AAR,
  author =       "Ronald L. Rivest",
  title =        "Analysis of Associative Retrieval Algorithms",
  type =         "Technical Report",
  number =       "TR.54",
  institution =  "Institut de la Recherche en Informatique et
                 Automatique, now Institut National de Recherche en
                 Informatique et Automatique (INRIA)",
  address =      "Domaine de Voluceau --- Rocquencourt --- B.P. 105,
                 78153 Le Chesnay Cedex, France",
  pages =        "??",
  month =        feb,
  year =         "1974",
  bibdate =      "Thu Jul 21 09:32:07 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "Also published in/as: Stanford CSD report 74-415. Also
                 published in/as: SIAM Journal for Computing,
                 Springer-Verlag (Heidelberg, FRG and New York NY,
                 USA)-Verlag, 1976, with mod. title.",
  acknowledgement = ack-nhfb,
  annote =       "Combinatorial hashing for retrieval.",
}

@InProceedings{Rivest:1974:HCA,
  author =       "R. L. Rivest",
  title =        "On hash-coding algorithms for partial-match
                 retrieval",
  crossref =     "IEEE:1974:ASS",
  pages =        "95--103",
  year =         "1974",
  bibdate =      "Mon Jul 18 10:06:22 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Smith:1974:RBC,
  author =       "J. L. Smith",
  title =        "Recirculating block cipher cryptographic system",
  howpublished = "{U.S.} Patent No. 3,796,830",
  day =          "12",
  month =        mar,
  year =         "1974",
  bibdate =      "Sat Jun 10 12:25:23 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Thomas:1974:RPS,
  author =       "R. Thomas",
  title =        "{RFC 644}: On the problem of signature authentication
                 for network mail",
  day =          "22",
  month =        jul,
  year =         "1974",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Status: UNKNOWN. Not online.",
  URL =          "ftp://ftp.internic.net/rfc/rfc644.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc644.txt",
  acknowledgement = ack-nhfb,
  online =       "no",
  status =       "UNKNOWN",
}

@Book{Winterbotham:1974:US,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Ultra} secret",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  pages =        "xiii + 199",
  year =         "1974",
  ISBN =         "0-297-76832-8",
  ISBN-13 =      "978-0-297-76832-6",
  LCCN =         "D810.C88 W56",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  subject =      "Winterbotham, F. W; (Frederick William); World War,
                 1939--1945; Cryptography; Secret service; Great
                 Britain; Personal narratives, British; Enigma cipher
                 system",
  subject-dates = "1897--1990",
}

@Book{Winterbotham:1974:USF,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Ultra} secret: the first account of the most
                 astounding cryptanalysis coup of {World War II} --- how
                 the {British} broke the {German} code and read most of
                 the signals between {Hitler} and his generals
                 throughout the war",
  publisher =    pub-HARPER-ROW,
  address =      pub-HARPER-ROW:adr,
  pages =        "xiii + 199",
  year =         "1974",
  ISBN =         "0-06-014678-8",
  ISBN-13 =      "978-0-06-014678-8",
  LCCN =         "D810.C95 W73 1974",
  bibdate =      "Fri May 13 06:39:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
  subject =      "Winterbotham, F. W; (Frederick William); World War,
                 1939-1945; Cryptography; Secret service; Great Britain;
                 Personal narratives, English",
}

@Book{Barker:1975:CSS,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of the simple substitution cipher with
                 word divisions using non-pattern word lists",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "20 + 108",
  year =         "1975",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "Z103 .B3",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Bound in gray paper wrappers; printed in black and
                 gray. The George C. Lamb Collection.",
  keywords =     "ciphers; Ciphers; Cryptography; cryptography",
}

@InProceedings{Bayer:1975:EST,
  author =       "Rudolf Bayer and J. K. Metzger",
  title =        "On the Encipherment of Search Trees and Random Access
                 Files",
  crossref =     "Kerr:1975:PIC",
  pages =        "452--452",
  year =         "1975",
  bibdate =      "Fri Jan 12 07:50:25 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.vldb.org/dblp/db/conf/vldb/vldb75.html",
  URL =          "http://www.vldb.org/dblp/db/conf/vldb/BayerM75.html",
  acknowledgement = ack-nhfb,
  authorurl =    "http://www.vldb.org/dblp/db/indices/a-tree/b/Bayer:Rudolf.html;
                 http://www.vldb.org/dblp/db/indices/a-tree/m/Metzger:J=_K=.html",
}

@MastersThesis{Blatman:1975:MMC,
  author =       "Peter Blatman",
  title =        "Method of modern cryptanalysis: research project",
  type =         "Thesis ({M.S. in Electrical Engineering})",
  school =       "Department of Electrical Engineering and Computer
                 Sciences, University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "various",
  month =        jun,
  year =         "1975",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "computer sciences --- dissertations; dissertations,
                 academic --- UCB --- Electrical Engineering ---
                 1971--1980; University of California, Berkeley. Dept.
                 of Electrical Engineering and Computer Sciences",
}

@TechReport{Branstad:1975:DGI,
  author =       "D. K. Branstad",
  title =        "Draft guidelines for implementing and using the {NBS
                 Data Encryption Standard}",
  type =         "Report",
  number =       "??",
  institution =  pub-NBS,
  address =      pub-NBS:adr,
  day =          "10",
  month =        nov,
  year =         "1975",
  bibdate =      "Sat Jun 10 11:12:28 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Branstad:1975:EPC,
  author =       "D. K. Branstad",
  editor =       "????",
  booktitle =    "{Fourth Data Communications Symposium, 7--9 October
                 1975, Quebec City, Canada}",
  title =        "Encryption protection in computer data
                 communications,",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "??--??",
  year =         "1975",
  bibdate =      "Sat Jun 10 11:14:36 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brillhart:1975:NPC,
  author =       "John Brillhart and D. H. Lehmer and J. L. Selfridge",
  title =        "New primality criteria and factorizations of $ 2^m \pm
                 1 $",
  journal =      j-MATH-COMPUT,
  volume =       "29",
  number =       "130",
  pages =        "620--647",
  month =        apr,
  year =         "1975",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "B0210 (Algebra); C1110 (Algebra)",
  corpsource =   "Dept. Math., Univ. Arizona, Tucson, AZ, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "divisibility properties; factorizations; Fermat's
                 theorem; hyperbola; Lucas sequences; Mersenne numbers;
                 number theory; primality criteria; search bound",
  referencedin = "Referenced in \cite[Ref. 2]{Silverman:1997:FGR}.",
  treatment =    "T Theoretical or Mathematical",
}

@Book{Brown:1975:BL,
  author =       "Anthony Cave Brown",
  title =        "Bodyguard of lies",
  publisher =    pub-HARPER-ROW,
  address =      pub-HARPER-ROW:adr,
  pages =        "x + 947 + 8",
  year =         "1975",
  ISBN =         "0-06-010551-8",
  ISBN-13 =      "978-0-06-010551-8",
  LCCN =         "D810.S7 C36 1975",
  bibdate =      "Mon Aug 25 16:20:50 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Examines Allied intelligence and counter-intelligence
                 operations during World War II, describing the cipher
                 machine used to break German codes and the tactics,
                 ruses, and deception employed to ensure the successful
                 invasion of Normandy.",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Secret service; Secret
                 service.",
  tableofcontents = "Part 1. The origins of special means 1938--1942.
                 Ultra \\
                 Coventry \\
                 Special means operational \\
                 Part 2. The roots of conspiracy 1934--1943 \\
                 Canaris \\
                 The schwarze Kapelle \\
                 Friend or foe \\
                 The plot begins \\
                 The outbreak of war \\
                 Conspiracy at the Vatican \\
                 The Venlo incident \\
                 ``Adroit intrigue'' \\
                 Canaris at work \\
                 The assassination of Heydrich \\
                 Operation flash \\
                 Part 3. High strategy and low tactics 1943 \\
                 Casablanca \\
                 The battle of the Atlantic \\
                 The LCS and plan Jael \\
                 Mincemeat \\
                 Quebec \\
                 The Schwarze Kappelle, 1943 \\
                 Starkey \\
                 Prosper \\
                 The intelligence attack \\
                 Teheran \\
                 Cicero \\
                 Part 4. Cover and deception \\
                 January to June 1944. Eisenhower, supreme commander \\
                 The German supreme command \\
                 Bodyguard \\
                 The Balkans \\
                 Fortitude north \\
                 Fortitude south \\
                 Nuremberg \\
                 Aerial stratagems \\
                 Security \\
                 The wireless game \\
                 The French labyrinth \\
                 Canaris's last throw \\
                 Vendetta \\
                 The eve of D-day \\
                 Part 5. Normandy to nemesis \\
                 June 6 to August 20, 1944. D-day \\
                 The deceptions of D-day \\
                 Sword and stratagem \\
                 The French revolt \\
                 Rommel \\
                 The V1 \\
                 Goodwood \\
                 July 20, 1944 \\
                 The breakout \\
                 Gotterdammerung",
}

@Article{Coppersmith:1975:GCA,
  author =       "Don Coppersmith and Edna Grossman",
  title =        "Generators for Certain Alternating Groups with
                 Applications to Cryptography",
  journal =      j-SIAM-J-APPL-MATH,
  volume =       "29",
  number =       "4",
  pages =        "624--627",
  month =        dec,
  year =         "1975",
  CODEN =        "SMJMAP",
  ISSN =         "0036-1399 (print), 1095-712X (electronic)",
  ISSN-L =       "0036-1399",
  bibdate =      "Thu Oct 15 18:16:06 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjapplmath.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classification = "B0210 (Algebra); C1110 (Algebra); C6130 (Data
                 handling techniques)",
  corpsource =   "Dept. of Math. Sci., IBM Thomas J. Watson Res. Center,
                 Yorktown Heights, NY, USA",
  fjournal =     "SIAM Journal on Applied Mathematics",
  journal-URL =  "http://epubs.siam.org/siap",
  keywords =     "alternating groups; block ciphers; computer
                 encipherment of data; cryptography; data handling;
                 group theory; permutations; security; security of data;
                 subgroups",
  treatment =    "A Application; T Theoretical or Mathematical",
}

@TechReport{Diffie:1975:PRN,
  author =       "Whitfield Diffie",
  title =        "Preliminary remarks on the {National Bureau of
                 Standards} proposed standard encryption algorithm for
                 computer data protection",
  type =         "Unpublished report",
  institution =  "Stanford University",
  address =      "Stanford, CA, USA",
  month =        may,
  year =         "1975",
  bibdate =      "Sat Jun 10 11:20:54 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Ellis:1975:PKC,
  author =       "James Ellis and Clifford Cocks and Malcolm
                 Williamson",
  title =        "Public-key Cryptography",
  howpublished = "Classified reports (titles uncertain) at Government
                 Communications Headquarters (GCHQ), Cheltenham, UK.",
  year =         "1975",
  bibdate =      "Wed Apr 25 10:41:58 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Work declassified in 1997. Awarded the 100th IEEE
                 Milestone Award for the first discovery (albeit long
                 secret) of public-key cryptography.",
  URL =          "http://www.gchq.gov.uk/Press/Pages/100th-IEEE-milestone-award.aspx",
  acknowledgement = ack-nhfb,
}

@Article{Feistel:1975:SCT,
  author =       "H. Feistel and W. A. Notz and J. L. Smith",
  title =        "Some cryptographic techniques for machine-to-machine
                 data communications",
  journal =      j-PROC-IEEE,
  volume =       "63",
  number =       "??",
  pages =        "1545--1534",
  year =         "1975",
  CODEN =        "IEEPAD",
  DOI =          "https://doi.org/10.1109/PROC.1975.10005",
  ISSN =         "0018-9219 (print), 1558-2256 (electronic)",
  ISSN-L =       "0018-9219",
  bibdate =      "Sat Jun 10 11:37:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://ieeexplore.ieee.org/document/1451934",
  abstract =     "Some of the threats to the integrity of multiuser
                 teleprocessing systems and to the data they contain can
                 be countered by the use of cryptography.
                 Stream-generator ciphers are not ideally suited for
                 such an application, thus the use of block ciphers,
                 which have the beneficial property of a strong
                 nonlinear intersymbol dependence, is suggested. This
                 property provides the means for automatic error
                 detection for verifying the authenticity of terminal
                 operators, and for ensuring message integrity. An
                 experimental demonstration system has been constructed
                 to illustrate protection features that can be provided
                 for real applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the IEEE",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5",
}

@Book{Hardy:1975:ITN,
  author =       "Godfrey H. Hardy and Edward M. Wright",
  title =        "An Introduction to the Theory of Numbers",
  publisher =    pub-CLARENDON,
  address =      pub-CLARENDON:adr,
  edition =      "Fourth",
  pages =        "421",
  year =         "1975",
  ISBN =         "0-19-853310-7 (invalid checksum??)",
  ISBN-13 =      "978-0-19-853310-8",
  LCCN =         "????",
  bibdate =      "Fri Jun 24 12:32:14 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Jones:1975:ESP,
  author =       "Anita K. Jones and Richard J. Lipton",
  title =        "The enforcement of security policies for computation",
  journal =      j-OPER-SYS-REV,
  volume =       "9",
  number =       "5",
  pages =        "197--206",
  month =        nov,
  year =         "1975",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{McCarthy:1975:AFP,
  author =       "John McCarthy",
  title =        "{ACM Forum}: {Proposed} Criterion for a Cipher to be
                 Probable-Word-Proof",
  journal =      j-CACM,
  volume =       "18",
  number =       "2",
  pages =        "131--132",
  month =        feb,
  year =         "1975",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 26 10:24:13 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Friedman:1974:ETR}.",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{NBS:1975:EAC,
  author =       "{NBS}",
  title =        "Encryption algorithm for computer data protection:
                 requests for comments",
  journal =      j-FED-REGIST,
  volume =       "40",
  number =       "??",
  pages =        "12134--??",
  day =          "17",
  month =        mar,
  year =         "1975",
  CODEN =        "FEREAC",
  ISSN =         "0097-6326",
  ISSN-L =       "0097-6326",
  bibdate =      "Sat Jun 10 12:09:27 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Fed. regist. (Vienna, VA)",
  fjournal =     "Federal Register",
  journal-URL =  "https://www.archives.gov/federal-register",
  xxISSN =       "1097-7651",
}

@Article{NBS:1975:NPF,
  author =       "{NBS}",
  title =        "Notice of a Proposed Federal Information Processing
                 {Data Encryption Standard}",
  journal =      j-FED-REGIST,
  volume =       "40",
  number =       "??",
  pages =        "12607--??",
  day =          "12",
  month =        aug,
  year =         "1975",
  CODEN =        "FEREAC",
  ISSN =         "0097-6326",
  ISSN-L =       "0097-6326",
  bibdate =      "Sat Jun 10 12:18:37 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Federal Register",
  journal-URL =  "https://www.archives.gov/federal-register",
}

@PhdThesis{Neat:1975:NCC,
  author =       "Charlie Edmund Neat",
  title =        "A new computer cryptography: the Expanded Character
                 Set {(ECS)} cipher",
  school =       "Engineering, University of California, Los Angeles",
  address =      "Los Angeles, CA, USA",
  pages =        "xxi + 203",
  year =         "1975",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; computers --- access control; dissertations,
                 academic --- UCLA --- engineering; electronic data
                 processing --- security measures",
}

@TechReport{Pless:1975:ESC,
  author =       "Vera Pless",
  title =        "Encryption schemes for computer confidentially [sic]",
  type =         "MAC technical memorandum",
  number =       "63",
  institution =  "Massachusetts Institute of Technology, Project MAC",
  address =      "Cambridge, MA, USA",
  pages =        "19",
  year =         "1975",
  LCCN =         "QA76.9.A25 P55",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Research done under ARPA Order no.2095, ONR Contract
                 no. N00014-70-A-0362-0006 and IBM Contract 82280.",
  acknowledgement = ack-nhfb,
  annote =       "Research supported by the Advanced Research Projects
                 Agency under ARPA Order No. 2095 monitored by ONR
                 Contract No. N00014-70-A-0362-0006, and in part by IBM
                 Contract 82280. 18-19.",
  keywords =     "Computers; electronic data processing departments;
                 security measures",
}

@Book{Rohwer:1975:GIM,
  author =       "Jurgen Rohwer",
  title =        "{Geleitzugschlachten im Marz 1943:
                 F{\"u}hrungsprobleme im H{\"o}hepunkt der Schlacht im
                 Atlantik}. ({German}) [{Convoy} in {March 1943}:
                 implementation problems in the climax of the {Battle of
                 the Atlantic}]",
  publisher =    "Motorbuch",
  address =      "Stuttgart, Germany",
  pages =        "356",
  year =         "1975",
  ISBN =         "3-87943-383-6",
  ISBN-13 =      "978-3-87943-383-4",
  LCCN =         "????",
  bibdate =      "Tue Aug 26 07:20:00 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also English translation \cite{Rohwer:1977:CCB}.",
  acknowledgement = ack-nhfb,
  language =     "German",
}

@Article{Schroeder:1975:ESK,
  author =       "Michael D. Schroeder",
  title =        "Engineering a security kernel for {Multics}",
  journal =      j-OPER-SYS-REV,
  volume =       "9",
  number =       "5",
  pages =        "25--32",
  month =        nov,
  year =         "1975",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Wilkes:1975:TSC,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  publisher =    "Macdonald and Jane's",
  address =      "London, UK",
  edition =      "Third",
  pages =        "ii + 166",
  year =         "1975",
  ISBN =         "0-444-19525-4 (American Elsevier)",
  ISBN-13 =      "978-0-444-19525-8 (American Elsevier)",
  LCCN =         "QA76.53 .W54 1975",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Computer monographs",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography. Fragment on page 148 seems to be the
                 location.",
  subject =      "Time-sharing computer systems",
}

@Book{Winterbotham:1975:US,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Ultra} secret",
  publisher =    "Dell",
  address =      "New York, NY, USA",
  pages =        "286",
  year =         "1975",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "D810.C88 W56 1976",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
}

@MastersThesis{Worth:1975:CMA,
  author =       "Vivian I. Worth",
  title =        "Cryptology: mathematical applications",
  type =         "Thesis ({M.S.})",
  school =       "Central Missouri State University",
  address =      "Warrensburg, MO, USA",
  pages =        "iv + 63",
  year =         "1975",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Book{Anonymous:1976:CCA,
  author =       "Anonymous",
  title =        "Cryptography and cryptanalysis articles",
  volume =       "5",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "v + 144",
  year =         "1976",
  ISBN =         "0-89412-003-4",
  ISBN-13 =      "978-0-89412-003-9",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Article{Bayer:1976:EST,
  author =       "R. Bayer and J. K. Metzger",
  title =        "On the Encipherment of Search Trees and Random Access
                 Files",
  journal =      j-TODS,
  volume =       "1",
  number =       "1",
  pages =        "37--52",
  month =        mar,
  year =         "1976",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Sat Apr 14 10:34:48 MDT 2001",
  bibsource =    "Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Also published in \cite[p.~508--510]{Kerr:1975:PIC}.",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1976-1-1/p37-bayer/p37-bayer.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1976-1-1/p37-bayer/",
  abstract =     "The securing of information in indexed, random access
                 files by means of privacy transformations must be
                 considered as a problem distinct from that for
                 sequential files. Not only must processing overhead due
                 to encrypting be considered, but also threats to
                 encipherment arising from updating and the file
                 structure itself must be countered. A general
                 encipherment scheme is proposed for files maintained in
                 a paged structure in secondary storage. This is applied
                 to the encipherment of indexes organized as $B$-trees;
                 a $B$-tree is a particular type of multiway search
                 tree. Threats to the encipherment of $B$-trees,
                 especially relating to updating, are examined, and
                 countermeasures are proposed for each. In addition, the
                 effect of encipherment on file access and update, on
                 paging mechanisms, and on files related to the
                 enciphered index are discussed. Many of the concepts
                 presented may be readily transferred to other forms of
                 multiway index trees and to binary search trees.",
  acknowledgement = ack-nhfb,
  annote =       "Trees versus hashing as his 1974 IFIP paper?",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "",
  subject =      "Software --- Operating Systems --- Security and
                 Protection (D.4.6): {\bf Access controls}; Software ---
                 Operating Systems --- Security and Protection (D.4.6):
                 {\bf Cryptographic controls}",
}

@Article{Bright:1976:CUM,
  author =       "H. S. Bright and R. L. Enison",
  editor =       "????",
  title =        "Cryptography using modular software elements",
  journal =      "AFIPS Conference Proceedings",
  volume =       "45",
  number =       "??",
  pages =        "113--123",
  month =        "????",
  year =         "1976",
  bibdate =      "Sat Jun 10 11:17:44 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Budge:1976:RSB,
  author =       "Sir E. A. Wallis (Ernest Alfred Wallis) Budge",
  title =        "The {Rosetta} stone in the {British Museum}: the
                 {Greek}, demotic, and hieroglyphic texts of the decree
                 inscribed on the {Rosetta} stone conferring additional
                 honours on {Ptolemy V Epiphanes (203-181 B.C.)} with
                 {English} translations and a short history of the
                 decipherment of the {Egyptian} hieroglyphs, and an
                 appendix containing translations of the stelae of {San
                 (Tanis)} and {Tall al-Maskhutah}",
  publisher =    "AMS Press",
  address =      "New York, NY, USA",
  pages =        "325 + 22",
  year =         "1976",
  ISBN =         "0-404-11362-1",
  ISBN-13 =      "978-0-404-11362-9",
  LCCN =         "PJ1531.R5 B8 1976",
  bibdate =      "Tue Dec 01 10:45:33 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Casson:1976:SAD,
  author =       "Lionel Casson",
  title =        "{{\booktitle{The Story of Archaeological Decipherment,
                 from Egyptian Hieroglyphs to Linear B}} by Maurice
                 Pope} (review)",
  journal =      j-TECH-CULTURE,
  volume =       "17",
  number =       "3",
  pages =        "530--531",
  month =        jul,
  year =         "1976",
  CODEN =        "TECUA3",
  ISSN =         "0040-165X (print), 1097-3729 (electronic)",
  ISSN-L =       "0040-165X",
  bibdate =      "Sat Sep 30 08:23:32 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/techculture1970.bib",
  URL =          "https://muse.jhu.edu/pub/1/article/891767/pdf",
  acknowledgement = ack-nhfb,
  ajournal =     "Tech. Culture",
  fjournal =     "Technology and Culture",
  journal-URL =  "https://muse.jhu.edu/journal/194",
}

@TechReport{CPI:1976:CMS,
  author =       "{Computation Planning Incorporated}",
  title =        "{Cryptopak}: modular subroutine library for
                 cryptographic transformation",
  type =         "Report",
  institution =  "Computation Planning Incorporated",
  address =      "Bethesda, MD, USA",
  year =         "1976",
  bibdate =      "Sat Jun 10 11:19:06 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Diffie:1976:CPD,
  author =       "Whitfield Diffie and Martin E. Hellman",
  title =        "A critique of the proposed {Data Encryption
                 Standard}",
  journal =      j-CACM,
  volume =       "19",
  number =       "3",
  pages =        "164--165",
  month =        mar,
  year =         "1976",
  DOI =          "https://doi.org/10.1145/360018.360031",
  bibdate =      "Sat Jun 10 11:27:35 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://dl.acm.org/doi/pdf/10.1145/360018.360031",
  abstract =     "[From the first paragraph: ``Motivated by the growing
                 need for cryptographic protection of computerized data,
                 the National Bureau of Standards has proposed a data
                 encryption standard. The purpose of such a standard is
                 to foster compatibility among users and to ensure that
                 the algorithm used is of high quality. We believe that
                 the proposed standard fails to meet these criteria in
                 its current form and should be modified prior to its
                 adoption.''",
  acknowledgement = ack-nhfb,
}

@Article{Diffie:1976:NDC,
  author =       "Whitfield Diffie and Martin E. Hellman",
  title =        "New Directions in Cryptography",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-22",
  number =       "6",
  pages =        "644--654",
  month =        nov,
  year =         "1976",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1976.1055638",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://ee.stanford.edu/~hellman/publications/24.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  referencedin = "Referenced in \cite[Ref. 8]{Kaliski:1995:SUR},
                 \cite[Ref. 8]{Goldreich:1997:FMCb}, \cite[Ref.
                 1]{Wiener:1998:PCP}, \cite[Ref. 3]{Handschuh:1998:SCC},
                 \cite[Ref. 2]{Haber:1995:HDD}.",
  remark =       "This important paper, the first public description of
                 public-key cryptography (see also
                 \cite{Merkle:1978:SCI,Ellis:1975:PKC}), begins with the
                 prescient statement ``We stand today on the brink of a
                 revolution in cryptography.'' and ends with ``Thomas
                 Jefferson, a cryptographic amateur, invented a system
                 which was still in use in World War II [2, pp.
                 192--195], while the most noted cryptographic system of
                 the twentieth century, the rotor machine, was invented
                 simultaneously by four separate people, all amateurs
                 [2, pp. 415, 420, 422--424]. We hope this will inspire
                 others to work in this fascinating area in which
                 participation has been discouraged in the recent past
                 by a nearly total government monopoly.'' Their
                 reference [2] is \cite{Kahn:1967:CSSa}.",
}

@InProceedings{Diffie:1976:PKC,
  author =       "Whitfield Diffie and Martin E. Hellman",
  editor =       "{IEEE}",
  booktitle =    "{IEEE International Symposium on Information Theory,
                 June 21--24, 1976, Ronneby, Sweden}",
  title =        "Public key cryptography",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "??--??",
  year =         "1976",
  bibdate =      "Sat Jun 10 11:30:52 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Friedman:1976:AMC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Advanced military cryptography",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "113",
  year =         "1976",
  ISBN =         "0-89412-011-5",
  ISBN-13 =      "978-0-89412-011-4",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Continuation of Elementary military cryptography,
                 Aegean Park Press, 1976.",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "ciphers; cryptography",
}

@Book{Friedman:1976:CCA,
  author =       "William F. (William Frederick) Friedman",
  title =        "Cryptography and cryptanalysis articles",
  volume =       "5--6",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "??",
  year =         "1976",
  LCCN =         "Z103 .C79 1976",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "ciphers --- addresses, essays, lectures; cryptography
                 --- addresses, essays, lectures; Cryptography.",
}

@Book{Friedman:1976:CEC,
  author =       "William F. (William Frederick) Friedman",
  title =        "The classic elements of cryptanalysis: with new added
                 problems for the solver",
  volume =       "3",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "????",
  year =         "1976",
  ISBN =         "0-89412-002-6",
  ISBN-13 =      "978-0-89412-002-2",
  bibdate =      "Tue Dec 26 07:31:03 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Friedman:1976:EC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Elements of cryptanalysis",
  volume =       "3",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "172",
  year =         "1976",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography",
}

@Book{Friedman:1976:EMC,
  author =       "William Frederick Friedman",
  title =        "Elementary military cryptography",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "86",
  year =         "1976",
  ISBN =         "0-89412-010-7",
  ISBN-13 =      "978-0-89412-010-7",
  LCCN =         "Z104 .F8740 1976",
  bibdate =      "Fri Feb 16 11:46:14 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "On cover: Formerly Special text no. 165 (1935)",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "ciphers; cryptography",
}

@Book{Friedman:1976:ZTJ,
  author =       "William F. (William Frederick) Friedman and Charles
                 Jastrow Mendelsohn",
  title =        "The {Zimmermann} telegram of {January 16, 1917}, and
                 its cryptographic background",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "33",
  year =         "1976",
  ISBN =         "0-89412-009-3",
  ISBN-13 =      "978-0-89412-009-1",
  LCCN =         "D511 .F683 1976",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "William Frederick Friedman (1891--1969)",
  keywords =     "World War, 1914--1918 -- causes; Zimmermann, Arthur,
                 1864--1940",
}

@Article{Griffiths:1976:AMR,
  author =       "Patricia P. Griffiths and Bradford W. Wade",
  title =        "An Authorization Mechanism for a Relational Database
                 System",
  journal =      j-TODS,
  volume =       "1",
  number =       "3",
  pages =        "242--255",
  month =        sep,
  year =         "1976",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Sat Apr 14 10:34:48 MDT 2001",
  bibsource =    "Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tods.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1976-1-3/p242-griffiths/p242-griffiths.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1976-1-3/p242-griffiths/",
  abstract =     "A multiuser database system must selectively permit
                 users to share data, while retaining the ability to
                 restrict data access. There must be a mechanism to
                 provide protection and security, permitting information
                 to be accessed only by properly authorized users.
                 Further, when tables or restricted views of tables are
                 created and destroyed dynamically, the granting,
                 authentication, and revocation of authorization to use
                 them must also be dynamic. Each of these issues and
                 their solutions in the context of the relational
                 database management system System R are discussed.
                 \par

                 When a database user creates a table, he is fully and
                 solely authorized to perform upon it actions such as
                 read, insert, update, and delete. He may explicitly
                 grant to any other user any or all of his privileges on
                 the table. In addition he may specify that that user is
                 authorized to further grant these privileges to still
                 other users. The result is a directed graph of granted
                 privileges originating from the table creator.\par

                 At some later time a user A may revoke some or all of
                 the privileges which he previously granted to another
                 user B. This action usually revokes the entire subgraph
                 of the grants originating from A's grant to B. It may
                 be, however, that B will still possess the revoked
                 privileges by means of a grant from another user C, and
                 therefore some or all of B's grants should not be
                 revoked. This problem is discussed in detail, and an
                 algorithm for detecting exactly which of B's grants
                 should be revoked is presented.",
  acknowledgement = ack-nhfb,
  annote =       "Defines a dynamic authorization mechanism. A database
                 user can grant or revoke privileges (such as to read,
                 insert, or delete) on a file that he has created.
                 Furthermore, he can authorize others to grant these
                 same privileges. The database management system keeps
                 track of a directed graph, emanating from the creator
                 of granted privileges.",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "access control; authorization; data dependent
                 authorization; database systems; privacy; protection in
                 databases; revocation of authorization; security",
  subject =      "Information Systems --- Database Management ---
                 Systems (H.2.4): {\bf Relational databases};
                 Information Systems --- Database Management --- Systems
                 (H.2.4); Information Systems --- Database Management
                 --- General (H.2.0): {\bf Security, integrity, and
                 protection**}",
}

@Article{Guillen:1976:AC,
  author =       "M. Guillen",
  title =        "Automated cryptography",
  journal =      j-SCIENCE-NEWS,
  volume =       "110",
  number =       "12",
  pages =        "188--190",
  day =          "18",
  month =        sep,
  year =         "1976",
  CODEN =        "SCNEBK",
  ISSN =         "0036-8423 (print), 1943-0930 (electronic)",
  ISSN-L =       "0036-8423",
  bibdate =      "Sat Jun 10 11:48:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Science News (Washington, DC)",
  journal-URL =  "http://www.jstor.org/journals/00368423.html;
                 http://www.sciencenews.org/view/archives;
                 http://www3.interscience.wiley.com/journal/122396840/home",
}

@InProceedings{Guy:1976:HFN,
  author =       "R. K. Guy",
  title =        "How to factor a number",
  crossref =     "Hartnell:1976:PFM",
  pages =        "49--89",
  year =         "1976",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Odlyzko:1995:FIF}.",
}

@Article{Harrison:1976:POS,
  author =       "Michael A. Harrison and Walter L. Ruzzo and Jeffrey D.
                 Ullman",
  title =        "Protection in Operating Systems",
  journal =      j-CACM,
  volume =       "19",
  number =       "8",
  pages =        "461--471",
  month =        aug,
  year =         "1976",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68A99",
  MRnumber =     "54 14474",
  MRreviewer =   "George I. Davida",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "A model of protection mechanisms in computing systems
                 is presented and its appropriateness is argued. The
                 ``safety'' problem for protection systems under this
                 model is to determine in a given situation whether a
                 subject can acquire a particular right to an object. In
                 restricted cases, it can be shown that this problem is
                 decidable; i.e., there is an algorithm to determine
                 whether a system in a particular configuration is safe.
                 In general, and under surprisingly weak assumptions, it
                 cannot be decided if a situation is safe. Various
                 implications of this fact are discussed.",
  acknowledgement = ack-nhfb,
  classcodes =   "C4210 (Formal logic); C4220 (Automata theory); C6150J
                 (Operating systems)",
  classification = "721; 723",
  corpsource =   "Univ. of California, Berkeley, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "(computers); automata theory --- Turing Machines;
                 computability and decidability; computer operating
                 systems --- Design; computer security; data processing;
                 decidability; operating systems; protection; protection
                 systems; security model; security of data; Turing
                 machine; Turing machines",
  ort =          "ordner sicherheit",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@TechReport{Hellman:1976:SPN,
  author =       "M. E. Hellman",
  title =        "Statement to participants at {NBS} workshop on
                 cryptography in support of computer security",
  type =         "Unpublished memorandum",
  institution =  "????",
  address =      "????",
  day =          "21",
  month =        sep,
  year =         "1976",
  bibdate =      "Sat Jun 10 11:50:49 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kahn:1976:TC,
  author =       "David Kahn",
  title =        "Tapping computers",
  journal =      j-NY-TIMES,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "3",
  month =        apr,
  year =         "1976",
  CODEN =        "NYTIAO",
  ISSN =         "0362-4331 (print), 1542-667X, 1553-8095",
  ISSN-L =       "0362-4331",
  bibdate =      "Sat Jun 10 11:53:12 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "New York Times",
  journal-URL =  "http://www.nytimes.com/",
}

@Book{Kullback:1976:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis",
  volume =       "4",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Revised",
  pages =        "v + 206",
  year =         "1976",
  LCCN =         "Z104 .K84",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography; cryptography --- statistical
                 methods",
}

@TechReport{Lexar:1976:END,
  author =       "{Lexar Corporation}",
  title =        "An evaluation of the {NBS Data Encryption Standard}",
  type =         "Unpublished report",
  institution =  "Lexar Corporation",
  address =      "11611 San Vicente Boulevard, Los Angeles, CA, USA",
  year =         "1976",
  bibdate =      "Sat Jun 10 12:04:12 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Macalister:1976:SLI,
  author =       "Robert Alexander Stewart Macalister and John Sampson",
  title =        "The secret languages of {Ireland}: {Ogham},
                 {Hisperic}, {Bearlagair na Saer}, {Bog-Latin}, and
                 cryptography, with special reference to the origin and
                 nature of the {Shelta} language; partly based upon
                 collections and manuscripts of the late {John Sampson};
                 with an {English}-jargon vocabulary",
  publisher =    "APA-Philo Press",
  address =      "Amsterdam, The Netherlands",
  pages =        "x + 284",
  year =         "1976",
  ISBN =         "90-6022-276-8",
  ISBN-13 =      "978-90-6022-276-8",
  LCCN =         "PM9001 .M2 1976",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of the 1937 ed. published by the Cambridge
                 University Press, Cambridge, England.",
  acknowledgement = ack-nhfb,
  keywords =     "cant; Druids and Druidism; Irish language --- history;
                 Irish language --- writing; Shelta",
}

@MastersThesis{Marion:1976:ANB,
  author =       "Bruce Phillip Marion",
  title =        "Analysis of {National Bureau of Standards Data
                 Encryption Algorithm}",
  type =         "Thesis ({Engineer})",
  school =       "Department of Electrical Engineering, Stanford
                 University",
  address =      "Stanford, CA, USA",
  pages =        "v + 46",
  year =         "1976",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cipher and telegraph codes --- Data processing;
                 Electronic data processing departments --- Security
                 measures",
}

@Article{Miller:1976:RHT,
  author =       "G. L. Miller",
  title =        "{Reimann}'s hypothesis and tests for primality",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "13",
  pages =        "300--317",
  year =         "1976",
  CODEN =        "JCSSBM",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
  referencedin = "Referenced in \cite[Ref. 16]{Kaliski:1995:SUR}.",
}

@MastersThesis{Mitchell:1976:EAD,
  author =       "James Melvin Mitchell",
  title =        "Encryption algorithm for data security based on a
                 polyalphabetic substitution scheme and a pseudo-random
                 number generator",
  type =         "Thesis ({M.S.})",
  school =       "University of Tennessee, Knoxville",
  address =      "Knoxville, TN, USA",
  pages =        "v + 83",
  year =         "1976",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{NBS:1976:NWC,
  author =       "{NBS}",
  title =        "The {NBS} workshop on cryptography in support of
                 computer security",
  type =         "Unpublished memorandum",
  institution =  pub-NBS,
  address =      pub-NBS:adr,
  month =        sep,
  year =         "1976",
  bibdate =      "Sat Jun 10 12:20:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sambur:1976:SEM,
  author =       "M. R. Sambur and N. S. Jayant",
  title =        "Speech Encryption by Manipulations of {LPC}
                 Parameters",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "55",
  number =       "9",
  pages =        "1373--1388",
  month =        nov,
  year =         "1976",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Tue Nov 9 11:15:56 MST 2010",
  bibsource =    "http://bstj.bell-labs.com/oldfiles/year.1976/BSTJ.1976.5509.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://bstj.bell-labs.com/BSTJ/images/Vol55/bstj55-9-1373.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Book{Shulman:1976:ABC,
  author =       "David Shulman",
  title =        "An annotated bibliography of cryptography",
  volume =       "37",
  publisher =    "Garland Pub.",
  address =      "New York, NY, USA",
  pages =        "388",
  year =         "1976",
  ISBN =         "0-8240-9974-5",
  ISBN-13 =      "978-0-8240-9974-9",
  LCCN =         "Z103.A1 S58",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Garland reference library of the humanities",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Book{Stevenson:1976:MCI,
  author =       "William Stevenson",
  title =        "A man called {Intrepid}: the secret war",
  publisher =    pub-HARCOURT-BRACE-JOVANOVICH,
  address =      pub-HARCOURT-BRACE-JOVANOVICH:adr,
  pages =        "xxv + 486 + 16",
  year =         "1976",
  ISBN =         "0-15-156795-6",
  ISBN-13 =      "978-0-15-156795-9",
  LCCN =         "D810.S8 S85",
  bibdate =      "Mon Aug 25 16:25:51 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Stephenson, whose code name was Intrepid, tells how he
                 established a worldwide intelligence network to combat
                 Nazism.",
  acknowledgement = ack-nhfb,
  author-dates = "1924--2013",
  keywords =     "Bombe; cryptography; Ultra",
  subject =      "Stephenson, William Samuel; Stephenson, William
                 Samuel; World War, 1939--1945; Secret service; Secret
                 service",
  subject-dates = "1896--1989",
  tableofcontents = "Point of departure: a foreword by Intrepid \\
                 A break in the silence: a historical note by Charles
                 Howard Ellis \\
                 Significant dates \\
                 In time of peace \\
                 Fight on \\
                 Impeachable offenses \\
                 Cry, ``havoc!'' \\
                 An original and sinister touch \\
                 The end of the beginning \\
                 Epilogue: A view from another island \\
                 Valediction",
}

@Article{Yasaki:1976:EAK,
  author =       "E. K. Yasaki",
  title =        "Encryption algorithm: key size is the thing",
  journal =      j-DATAMATION,
  volume =       "22",
  number =       "3",
  pages =        "164--166",
  month =        mar,
  year =         "1976",
  CODEN =        "DTMNAT",
  ISSN =         "0011-6963",
  bibdate =      "Sat Jun 10 12:33:05 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Datamation",
}

@Book{Barker:1977:CHC,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of the {Hagelin} cryptograph",
  volume =       "17",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "xi + 223",
  year =         "1977",
  ISBN =         "0-89412-022-0",
  ISBN-13 =      "978-0-89412-022-0",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Claimed in \cite{} to be the main published work on
                 the Hagelin M-209 machine.",
  keywords =     "ciphers; Ciphers; Cryptography; cryptography",
}

@Book{Bell:1977:IVU,
  author =       "Ernest L. Bell",
  title =        "An initial view of {Ultra} as an {American} weapon",
  publisher =    "T S U Press",
  address =      "Keene, NH, USA",
  pages =        "iii + 110",
  year =         "1977",
  LCCN =         "D810.C88 B45",
  bibdate =      "Mon May 08 07:14:10 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  xxISBN =       "none",
}

@Book{Clark:1977:MWBa,
  author =       "Ronald William Clark",
  title =        "The man who broke {Purple}: the life of {Colonel
                 William F. Friedman}, who deciphered the {Japanese}
                 code in {World War II}",
  publisher =    "Little, Brown",
  address =      "Boston, MA, USA",
  pages =        "ix + 271",
  year =         "1977",
  ISBN =         "0-316-14595-5",
  ISBN-13 =      "978-0-316-14595-4",
  LCCN =         "UB290 .C58 1977",
  bibdate =      "Thu Mar 29 18:43:38 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Friedman, William F (William Frederick);
                 Cryptographers; United States; Biography",
  subject-dates = "1891--1969",
}

@Book{Clark:1977:MWBb,
  author =       "Ronald William Clark",
  title =        "The man who broke {Purple}: the life of the world's
                 greatest cryptologist, {Colonel William F. Friedman}",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  pages =        "xi + 212 + 4",
  year =         "1977",
  ISBN =         "0-297-77279-1",
  ISBN-13 =      "978-0-297-77279-8",
  LCCN =         "UB290 .C58 1977b",
  bibdate =      "Thu Mar 29 18:43:38 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Friedman, William F (William Frederick);
                 Cryptographers; United States; Biography",
  subject-dates = "1891--1969",
}

@Article{Diffie:1977:ECN,
  author =       "Whitfield Diffie and Martin E. Hellman",
  title =        "Exhaustive Cryptanalysis of the {NBS Data Encryption
                 Standard}",
  journal =      j-COMPUTER,
  volume =       "10",
  number =       "6",
  pages =        "74--84",
  month =        jun,
  year =         "1977",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
                 https://www.math.utah.edu/pub/tex/bib/computer.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "The article deals with data encryption standard
                 adopted by the National Bureau of Standards, providing
                 a basic argument concerning the standard's inadequate
                 level of security. Cost-effective ways are recommended
                 to avoid the problem.",
  acknowledgement = ack-nhfb,
  classification = "722; 902",
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  journalabr =   "Computer",
  keywords =     "cryptanalysis; data processing; standards",
  referencedin = "Referenced in \cite[Ref. 12]{Biham:1998:TA}.",
}

@Article{Feiertag:1977:PMS,
  author =       "R. J. Feiertag and K. N. Levitt and L. Robinson",
  title =        "Proving multilevel security of a system design",
  journal =      j-OPER-SYS-REV,
  volume =       "11",
  number =       "5",
  pages =        "57--65",
  month =        nov,
  year =         "1977",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Filby:1977:TPT,
  author =       "P. William Filby",
  title =        "Teaching {Purple} to Talk Saved Thousands",
  journal =      "Baltimore Sun",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "16",
  month =        oct,
  year =         "1977",
  bibdate =      "Sun Dec 24 08:50:19 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Review of \booktitle{The Man Who Broke Purple}, by
                 Ronald Clark.",
  acknowledgement = ack-nhfb,
}

@Manual{Gait:1977:VCH,
  author =       "Jason Gait",
  title =        "Validating the correctness of hardware implementations
                 of the {NBS Data Encryption Standard}",
  volume =       "500-20",
  organization = pub-NBS,
  address =      pub-NBS:adr,
  pages =        "iv + 40",
  month =        nov,
  year =         "1977",
  CODEN =        "XNBSAV",
  LCCN =         "T1.U52 no.500-20",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "NBS special publication, computer science and
                 technology",
  acknowledgement = ack-nhfb,
  govtdocnumber = "0 13.10:500-20",
  keywords =     "computers --- access control --- code words; Computers
                 --- Access control --- Passwords; computers --- access
                 control --- passwords; Computers --- Testing; computers
                 --- testing; Data encryption (Computer science); data
                 encryption (computer science); Monte Carlo method",
}

@Article{Gardner:1977:MGN,
  author =       "Martin Gardner",
  title =        "Mathematical Games: A new kind of cipher that would
                 take millions of years to break",
  journal =      j-SCI-AMER,
  volume =       "237",
  number =       "2",
  pages =        "120--124",
  month =        aug,
  year =         "1977",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican0877-120",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Wed May 22 12:01:13 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1970.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v237/n2/pdf/scientificamerican0877-120.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  referencedin = "Referenced in \cite[Ref. 5]{Odlyzko:1995:FIF},
                 \cite[Ref. 2]{Anonymous:1996:RF}.",
  remark =       "This article introduced public-key cryptography to a
                 wide audience.",
}

@Article{Kak:1977:SEU,
  author =       "S. C. Kak and N. S. Jayant",
  title =        "On Speech Encryption Using Waveform Scrambling",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "56",
  number =       "5",
  pages =        "781--808",
  month =        may # "--" # jun,
  year =         "1977",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Tue Nov 9 11:15:56 MST 2010",
  bibsource =    "http://bstj.bell-labs.com/oldfiles/year.1977/BSTJ.1977.5605.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://bstj.bell-labs.com/BSTJ/images/Vol56/bstj56-5-781.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Book{Katzan:1977:SDE,
  author =       "Harry {Katzan, Jr.}",
  title =        "The Standard Data Encryption Algorithm",
  publisher =    "Petrocelli Books",
  address =      "New York, NY, USA",
  pages =        "viii + 134",
  year =         "1977",
  ISBN =         "0-89433-016-0",
  ISBN-13 =      "978-0-89433-016-2",
  LCCN =         "QA76.9 .A25K37",
  bibdate =      "Wed Sep 28 08:01:24 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computer security --- Passwords; Data encryption
                 (Computer science)",
}

@Article{Kolata:1977:NCC,
  author =       "Gina Bari Kolata",
  title =        "News and Comment: Computer Encryption and the
                 {National Security Agency} Connection",
  journal =      j-SCIENCE,
  volume =       "197",
  number =       "4302",
  pages =        "438--440",
  day =          "29",
  month =        jul,
  year =         "1977",
  CODEN =        "SCIEAS",
  DOI =          "https://doi.org/10.1126/science.197.4302.438",
  ISSN =         "0036-8075 (print), 1095-9203 (electronic)",
  ISSN-L =       "0036-8075",
  bibdate =      "Sun Dec 24 09:02:13 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://science.sciencemag.org/content/197/4302/438/",
  acknowledgement = ack-nhfb,
  fjournal =     "Science",
  journal-URL =  "http://www.sciencemag.org/archive/",
  remark =       "This article discusses the view that the US National
                 Bureau of Standards (NBS) Data Encryption Standard
                 (DES) was possibly designed to allow a back door for
                 the US National Security Agency (NSA), or that the NSA
                 would have sufficient computer resources to break DES,
                 which has only a 56-bit encryption key.",
}

@Manual{NBS:1977:DES,
  author =       "{National Bureau of Standards}",
  title =        "Data Encryption Standard",
  volume =       "46",
  organization = "U. S. Department of Commerce",
  address =      "Washington, DC, USA",
  pages =        "18",
  month =        jan,
  year =         "1977",
  LCCN =         "JK468.A8 A31 no.46",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Federal information processing standards publication",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 21]{Biham:1998:TA}.",
  xxISBN =       "none",
}

@Book{Pierce:1977:SSP,
  author =       "Clayton C. Pierce",
  title =        "Secret and secure: privacy, cryptography, and secure
                 communication",
  publisher =    "Pierce",
  address =      "Ventura, CA, USA",
  pages =        "iv + 84",
  year =         "1977",
  LCCN =         "Z103.P531",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Article{Pless:1977:ESC,
  author =       "Vera S. Pless",
  title =        "Encryption schemes for computer confidentiality",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-26",
  number =       "11",
  pages =        "1133--1136",
  year =         "1977",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.1977.1674759",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  MRclass =      "94A10",
  MRnumber =     "57 \#5410",
  MRreviewer =   "A. T. Amin",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Rabin:1977:DS,
  author =       "M. O. Rabin",
  editor =       "Richard A. DeMillo and others",
  booktitle =    "Foundations of Secure Computation: Papers presented at
                 a 3 day workshop held at Georgia Institute of
                 Technology, Atlanta, October 1977",
  title =        "Digitalized Signatures",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "x + 404",
  year =         "1977",
  ISBN =         "0-12-210350-5",
  ISBN-13 =      "978-0-12-210350-6",
  LCCN =         "QA76.9.A25 F66",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 26]{Goldreich:1997:FMCb}.",
}

@Article{Rejewski:1977:ATP,
  author =       "Marian Rejewski",
  title =        "An application of the theory of permutations in
                 breaking the {Enigma} cipher",
  journal =      "Applications of Mathematicae, Polish Academy of
                 Sciences",
  volume =       "16",
  number =       "??",
  pages =        "543--559",
  month =        "????",
  year =         "1977",
  bibdate =      "Sun Dec 01 09:58:13 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Rohwer:1977:CCB,
  author =       "J{\"u}rgen Rohwer",
  title =        "The critical convoy battles of {March 1943}: the
                 battle for {HX.229\slash SC122}",
  publisher =    "Naval Institute Press",
  address =      "Annapolis, MD, USA",
  pages =        "256 + 32",
  year =         "1977",
  ISBN =         "0-87021-818-2",
  ISBN-13 =      "978-0-87021-818-7",
  LCCN =         "D770 .R59313",
  bibdate =      "Tue Aug 26 07:10:39 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Revised English translation by Derek Masters of the
                 German original \cite{Rohwer:1975:GIM}.",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite[Chapter 10]{Good:1979:EWC}, this
                 book contains some discussion of cryptanalysis. I have
                 been unable to locate a table of contents for this
                 book.",
  subject =      "World War, 1939--1945; Campaigns; Atlantic Ocean;
                 Naval operations; Submarine; Naval operations, German;
                 Naval convoys; History; 20th century; Military
                 campaigns.; Military operations, Naval; German.;
                 Submarine.; Naval convoys.",
}

@Book{Sacco:1977:MC,
  author =       "Luigi Sacco",
  title =        "Manual of cryptography",
  volume =       "14",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "x + 193",
  year =         "1977",
  ISBN =         "0-89412-016-6",
  ISBN-13 =      "978-0-89412-016-9",
  LCCN =         "Z104 .S313 1977",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: Manuale di crittografia. Bibliography:
                 p. viii.",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Sinnott:1977:CTC,
  author =       "Robert Sinnott",
  title =        "A catalogue of titles on chess, checkers, and
                 cryptology in the library of the {United States
                 Military Academy, West Point, New York}",
  publisher =    "????",
  address =      "Norwell, MA, USA",
  pages =        "35",
  year =         "1977",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Photostatic copy, partly of typescript, partly of
                 printed matter.",
  keywords =     "Checkers --- Bibliography --- Catalogs; Chess ---
                 Bibliography --- Catalogs; Cryptography ---
                 Bibliography --- Catalogs.",
}

@Book{USNBS:1977:DES,
  author =       "{United States.National Bureau of Standards}",
  title =        "{Data Encryption Standard}",
  volume =       "46",
  publisher =    pub-NBS,
  address =      pub-NBS:adr,
  pages =        "18",
  year =         "1977",
  LCCN =         "JK468.A8 A31 no.46",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Federal Information Processing Standards publication",
  acknowledgement = ack-nhfb,
  annote =       "Cover title.",
  keywords =     "Computers --- Access control --- Standards.",
}

@Article{Anonymous:1978:NPAd,
  author =       "Anonymous",
  title =        "New product applications: Single-board bipolar
                 microcomputer emulates any mini- or microcomputer",
  journal =      j-IEEE-SPECTRUM,
  volume =       "15",
  number =       "4",
  pages =        "68--73",
  month =        apr,
  year =         "1978",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1978.6367674",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Band pass filters; Companies; Cryptography;
                 Microcomputers; Microprocessors; Modems",
}

@Book{Anonymous:1978:ODA,
  author =       "Anonymous",
  title =        "The origin and development of the {Army Security
                 Agency}, 1917--1947",
  volume =       "16",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "51",
  year =         "1978",
  ISBN =         "0-89412-025-5",
  ISBN-13 =      "978-0-89412-025-1",
  LCCN =         "UB290 .O75 1978",
  bibdate =      "Mon Sep 13 06:43:57 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A cryptographic series",
  acknowledgement = ack-nhfb,
}

@TechReport{Chaum:1978:ICP,
  author =       "D. L. Chaum and R. S. Fabry",
  title =        "Implementing capability-based protection using
                 encryption",
  type =         "Technical Report",
  number =       "UCB/ERL M78/46",
  institution =  "University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  edition =      "July 17, 1978",
  pages =        "i + 9",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "This work was partially supported by the National
                 Science Foundation Center.",
  keywords =     "Computer networks --- Access control; Computers ---
                 Access control; Cryptography",
}

@Article{Christiansen:1978:SL,
  author =       "D. Christiansen",
  title =        "Spectral lines",
  journal =      j-IEEE-SPECTRUM,
  volume =       "15",
  number =       "1",
  pages =        "23--23",
  month =        jan,
  year =         "1978",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1978.6369376",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Graphics; IEEE publications; Libraries;
                 Materials; Microprocessors; Organizations",
}

@Article{Ehrsam:1978:CKM,
  author =       "William F. Ehrsam and Stephen M. Matyas and Carl H.
                 Meyer and Walter L. Tuchman",
  title =        "A Cryptographic Key Management Scheme for Implementing
                 the {Data Encryption Standard}",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "106--125",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Data being transmitted through a communications
                 network can be protected by cryptography. In a data
                 processing environment, cryptography is implemented by
                 an algorithm which utilizes a secret key, or sequence
                 of bits. Any key-controlled cryptographic algorithm,
                 such as the Data Encryption Standard, requires a
                 protocol for the management of its cryptographic keys.
                 The complexity of the key management protocol
                 ultimately depends on the level of functional
                 capability provided by the cryptographic system. This
                 paper discusses a possible key management scheme that
                 provides the support necessary to protect
                 communications between individual end users (end-to-end
                 encryption) and that also can be used to protect data
                 stored or transported on removable media.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Filby:1978:BRM,
  author =       "P. William Filby",
  title =        "Book Review: {{\booktitle{The Man Who Broke Purple}},
                 by Ronald Clark, 271 pages, Little, Brown}",
  journal =      j-CRYPTOLOG,
  volume =       "5",
  number =       "1",
  pages =        "13--14",
  month =        jan,
  year =         "1978",
  ISSN =         "0740-7602",
  ISSN-L =       "0740-7602",
  bibdate =      "Sun Dec 24 08:50:19 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of \cite{Filby:1977:TPT}.",
  URL =          "https://archive.org/download/cryptolog_38/cryptolog_38.pdf",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Funk:1978:DUS,
  author =       "Mark Robert Funk",
  title =        "A digital ultrasound system for data collection,
                 imaging, and tissue signature analysis",
  type =         "Thesis ({M.S.})",
  school =       "Department of Electrical Engineering, Michigan State
                 University",
  address =      "East Lansing, MI 48824, USA",
  pages =        "vii + 141",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Tissues --- Analysis; Ultrasonics in biology ---
                 Automation; Ultrasonics in biology.",
}

@Article{Gaines:1978:SSP,
  author =       "R. Stockton Gaines and Norman Z. Shapiro",
  title =        "Some security principles and their application to
                 computer security",
  journal =      j-OPER-SYS-REV,
  volume =       "12",
  number =       "3",
  pages =        "19--28",
  month =        jul,
  year =         "1978",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:44 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Gait:1978:EEP,
  author =       "Jason Gait",
  title =        "Easy entry: the password encryption problem",
  journal =      j-OPER-SYS-REV,
  volume =       "12",
  number =       "3",
  pages =        "54--60",
  month =        jul,
  year =         "1978",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:44 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Givierge:1978:CC,
  author =       "Marcel Givierge",
  title =        "Course in cryptography",
  volume =       "19",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "164",
  year =         "1978",
  ISBN =         "0-89412-028-X",
  ISBN-13 =      "978-0-89412-028-2",
  LCCN =         "",
  bibdate =      "Sat Sep 25 11:01:24 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "English translation of \cite{Givierge:1932:CC}",
  series =       "A cryptographic series",
  acknowledgement = ack-nhfb,
}

@Article{Herlestam:1978:CRS,
  author =       "Tore Herlestam",
  title =        "Critical remarks on some public-key cryptosystems",
  journal =      j-BIT,
  volume =       "18",
  number =       "4",
  pages =        "493--496",
  month =        dec,
  year =         "1978",
  CODEN =        "NBITAB",
  DOI =          "https://doi.org/10.1007/BF01932028",
  ISSN =         "0006-3835 (print), 1572-9125 (electronic)",
  ISSN-L =       "0006-3835",
  MRclass =      "94B99",
  MRnumber =     "80b:94033",
  MRreviewer =   "M. C. Cheng",
  bibdate =      "Wed Jan 4 18:52:15 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=18&issue=4;
                 https://www.math.utah.edu/pub/tex/bib/bit.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=18&issue=4&spage=493",
  fjournal =     "BIT; Nordisk Tidskrift for Informationsbehandling
                 (BIT)",
  journal-URL =  "http://link.springer.com/journal/10543",
}

@Book{Jones:1978:MSW,
  author =       "Reginald V. Jones",
  title =        "Most secret war: [{British} scientific intelligence,
                 1939--1945]",
  publisher =    "Hamilton",
  address =      "London, UK",
  pages =        "xx + 556 + 16",
  year =         "1978",
  ISBN =         "0-241-89746-7",
  ISBN-13 =      "978-0-241-89746-1",
  LCCN =         "????",
  bibdate =      "Mon Aug 25 16:47:40 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "1911--",
  subject =      "Geheimdienst; Spionage; Weltkrieg (1939--1945);
                 Geschichte; Gro{\ss}britannien; Jones, R. V (Reginald
                 Victor); World War, 1939--1945; Secret service; Great
                 Britain; Personal narratives, British; Technology;
                 Scientists; England; Biography; Service des
                 renseignements militaires; Guerre mondiale, 1939--1945;
                 Service secret; Grande-Bretagne; Tweede Wereldoorlog;
                 Geheime Diensten; Natuurwetenschappen; Technische
                 wetenschappen; Scientists; Secret service; Technology;
                 History; George VI, 1936--1952",
}

@Book{Jones:1978:WWB,
  author =       "R. V. (Reginald Victor) Jones",
  title =        "The Wizard War: {British} Scientific Intelligence,
                 1939--1945",
  publisher =    "Coward, McCann and Geoghegan",
  address =      "New York, NY, USA",
  pages =        "xx + 556 + 16",
  year =         "1978",
  ISBN =         "0-698-10896-5",
  ISBN-13 =      "978-0-698-10896-7",
  LCCN =         "D810.C88 J66 1978",
  bibdate =      "Thu Aug 9 14:32:26 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/b/bohr-niels.bib;
                 https://www.math.utah.edu/pub/bibnet/authors/h/heisenberg-werner.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "https://en.wikipedia.org/wiki/Reginald_Victor_Jones",
  acknowledgement = ack-nhfb,
  author-dates = "Reginald Victor Jones (29 September 1911--17 December
                 1997)",
  remark =       "This is an excellent memoir by the World War II head
                 of British Air Intelligence. It has extensive coverage
                 of the development and use of radar and signal-homing
                 on both sides of the War. The author had substantial
                 influence in the intelligence services because he had
                 authority for direct contact with Prime Minister
                 Winston Churchill, when the need arose. Chapter 48
                 describes extensive meetings between the author and
                 Niels Bohr, and his son Aage Bohr. Chapters 44--46
                 discuss the Nazi flying bombs and rockets developed,
                 and tested in Baltic Ocean flights, by the Werner von
                 Braun team at Peenemuende on the north German coast,
                 and how successful the British were at eliminating many
                 of them before the attacks were successful. The book
                 also has shorter commentary on the 1945--1946
                 internment at Farm Hall (just outside Cambridge, UK) of
                 ten German atomic scientists, and the fact that all of
                 their conversations were secretly recorded,
                 transcribed, and translated from German to English. The
                 book was written more than 15 years before the expiry
                 of the fifty-year period mandated by the British
                 Official Secrets Act that finally allowed the release
                 of the transcripts of the recordings, but nevertheless
                 appears to be quite accurate about what was learned
                 from them. After the war, the author had several
                 opportunities to meet with high-ranking officers from
                 the war-time German military, and to learn how much
                 each side of the conflict knew of the other's
                 activities.",
  subject =      "Geheimdienst; Spionage; Weltkrieg (1939--1945);
                 Geschichte; Gro{\ss}britannien; Jones, R. V (Reginald
                 Victor); World War, 1939--1945; Secret service; Great
                 Britain; Personal narratives, British; Technology;
                 Scientists; England; Biography; Service des
                 renseignements militaires; Guerre mondiale, 1939--1945;
                 Service secret; Grande-Bretagne; Tweede Wereldoorlog;
                 Geheime Diensten; Natuurwetenschappen; Technische
                 wetenschappen; Scientists; Secret service; Technology;
                 History; George VI, 1936--1952",
  tableofcontents = "Illustrations / ix \\
                 Foreword by the Vicomtesse de Clarens / xiii \\
                 Acknowledgements / xv \\
                 Introduction / xvii \\
                 Part 1 \\
                 1: The men who went first / 3 \\
                 2: Friends and rivals / 13 \\
                 3: The Clarendon laboratory 1936--1938 / 21 \\
                 4: Inferior red 1936--1938 / 34 \\
                 5: Exile / 45 \\
                 6: The day before war broke out / 53 \\
                 7: The secret weapon / 57 \\
                 8: The Oslo report / 67 \\
                 9: A plan for intelligence / 72 \\
                 10: The phoney war / 78 \\
                 11: The crooked leg / 92 \\
                 12: Reflections / 106 \\
                 13: The fortunes of major Wintle / 111 \\
                 14: The fifth column / 114 \\
                 15: The Edda revived / 120 \\
                 16: Knickebein Jammed --- and photographed / 127 \\
                 17: The X-apparatus / 135 \\
                 18: Coventry / 146 \\
                 19: Target no. 54 / 154 \\
                 20: The atrocious crime / 161 \\
                 21: Wotan's other eye / 172 \\
                 22: Retrospect and prospect / 179 \\
                 Part 2 \\
                 23: Freya / 189 \\
                 24: Beams on the wane / 203 \\
                 25: `Jay' / 215 \\
                 26: W{\"u}rzburg / 223 \\
                 27: The Bruneval raid / 233 \\
                 28: The Baedeker beams / 250 \\
                 29: El Hatto / 254 \\
                 30: Pineapple / 260 \\
                 31: The Kammhuber line / 264 \\
                 32: Lichtenstein / 280 \\
                 33: Window / 287 \\
                 34: Hamburg / 300 \\
                 35: Heavy water / 306 \\
                 36: Revelations from the Secret Service / 310 \\
                 37: Full stretch / 318 \\
                 38: Peenem{\"u}nde / 332 \\
                 39: FZG 76 / 349 \\
                 40: The Americans convinced / 376 \\
                 41: Flames: problems of bomber command / 381 \\
                 42: The Baby Blitz / 396 \\
                 43: D-Day / 400 \\
                 44: V-1 / 413 \\
                 45: V-2 / 430 \\
                 46: V-3 / 462 \\
                 47: Bomber triumph / 465 \\
                 48: Nuclear energy / 472 \\
                 49: A.D.I. (science) overseas / 484 \\
                 50: The year of madness / 492 \\
                 51: German generals and staff colleges / 499 \\
                 52: Swords into ploughshares, bombs into saucers / 507
                 \\
                 53: Exeunt / 514 \\
                 Epilogue / 523 \\
                 Notes / 535 \\
                 Glossary / 539 \\
                 Index / 543",
}

@InCollection{Kam:1978:SDS,
  author =       "John B. Kam and George I. Davida",
  booktitle =    "Foundations of secure computation (Workshop, Georgia
                 Inst. Tech., Atlanta, Ga., 1977)",
  title =        "A structured design of substitution-permutation
                 encryption network",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "95--113",
  year =         "1978",
  MRclass =      "68B15 (68H05 94A99 94B15)",
  MRnumber =     "80b:68031",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
}

@Article{Lennon:1978:CAI,
  author =       "Richard E. Lennon",
  title =        "Cryptography Architecture for Information Security",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "138--150",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Information being transferred from point to point over
                 a public communications carrier or stored on portable
                 media can be protected, by the use of cryptography,
                 from accidental or intentional disclosure. Control
                 functions are required to ensure synchronization of the
                 process. In a communications environment, the control
                 functions become logically part of the network
                 architecture. IBM's Systems Network Architecture (SNA)
                 has been extended to allow the use of cryptography when
                 sensitive information is being processed. Architectural
                 similarities for the file environment are discussed.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; data processing",
}

@Book{Lewin:1978:UGW,
  author =       "Ronald Lewin",
  title =        "{Ultra} goes to war: the first account of {World War
                 II}'s greatest secret based on official documents",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "397 + 6",
  year =         "1978",
  ISBN =         "0-07-037453-8",
  ISBN-13 =      "978-0-07-037453-9",
  LCCN =         "D810.S7 L43 1978; D810.S7L43",
  bibdate =      "Fri May 13 08:13:27 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  price =        "US\$12.95",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939-1945; Secret service; Great Britain",
}

@Article{Matyas:1978:GDI,
  author =       "Stephen M. Matyas and Carl H. Meyer",
  title =        "Generation, Distribution, and Installation of
                 Cryptographic Keys",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "126--137",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A key controlled cryptographic system requires a
                 mechanism for the safe and secure generation,
                 distribution, and installation of its cryptographic
                 keys. Possible key generation, distribution, and
                 installation procedures are discussed for the key
                 management scheme presented in an accompanying paper.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Merkle:1978:HIS,
  author =       "Ralph Merkle and Martin E. Hellman",
  title =        "Hiding Information and Signatures in Trap Door
                 Knapsacks",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "24",
  number =       "5",
  pages =        "525--530",
  year =         "1978",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1978.1055927",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Thu Jan 21 14:42:38 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Merkle:1978:SCI,
  author =       "Ralph C. Merkle",
  title =        "Secure Communications Over Insecure Channels",
  journal =      j-CACM,
  volume =       "21",
  number =       "4",
  pages =        "294--299",
  month =        apr,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "According to traditional conceptions of cryptographic
                 security, it is necessary to transmit a key, by secret
                 means, before encrypted messages can be sent securely.
                 This paper shows that it is possible to select a key
                 over open communications channels in such a fashion
                 that communications security can be maintained. A
                 method is described which forces any enemy to expend an
                 amount of work which increases as the square of the
                 work required of the two communicants to select the
                 key. The method provides a logically new kind of
                 protection against the passive eaves dropper. It
                 suggests that further research on this topic will be
                 highly rewarding, both in a theoretical and a practical
                 sense.",
  acknowledgement = ack-nhfb,
  annote =       "This article was originally submitted August 1975; was
                 the publication delay due to U.S. Government security
                 reviews?",
  classcodes =   "C5600 (Data communication equipment and techniques);
                 C6130 (Data handling techniques)",
  classification = "723",
  corpsource =   "Dept. of Electrical Engng. and Computer Sci., Univ. of
                 California, Berkeley, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "communications channels; communications security;
                 computer network security; cryptographic security;
                 cryptography; cryptology; data communication systems;
                 data processing; insecure channels; key distribution;
                 open; passive eavesdropper; passive eavesdropping;
                 protection; public key cryptosystem; Security; security
                 of data; wiretap",
  treatment =    "T Theoretical or Mathematical",
}

@TechReport{Needham:1978:UEAa,
  author =       "R. M. (Roger Michael) Needham and Michael D.
                 Schroeder",
  title =        "Using encryption for authentication in large networks
                 of computers",
  number =       "CSL-78-4",
  institution =  "Xerox Palo Alto Research Center",
  address =      "Palo Alto, CA, USA",
  pages =        "??",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted June 1982.",
  acknowledgement = ack-nhfb,
}

@Article{Needham:1978:UEAb,
  author =       "Roger M. Needham and Michael D. Schroeder",
  title =        "Using Encryption for Authentication in Large Networks
                 of Computers",
  journal =      j-CACM,
  volume =       "21",
  number =       "12",
  pages =        "993--999",
  month =        dec,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 07:07:33 MST 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm21.html#NeedhamS78;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Use of encryption to achieve authenticated
                 communication in computer networks is discussed.
                 Example protocols are presented for the establishment
                 of authenticated connections, for the management of
                 authenticated mail, and for signature verification and
                 document integrity guarantee. Both conventional and
                 public-key encryption algorithms are considered as the
                 basis for protocols.",
  acknowledgement = ack-nhfb,
  classcodes =   "C5620 (Computer networks and techniques); C6130 (Data
                 handling techniques)",
  classification = "723",
  corpsource =   "Xerox Palo Alto Res. Center, Palo Alto, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "authenticated communication; computer networks; data
                 processing --- Security of Data; document integrity;
                 encryption; guarantee; protocols; public key encryption
                 algorithms; security of data; signature verification",
  oldlabel =     "NeedhamS78",
  treatment =    "P Practical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/NeedhamS78",
}

@Article{Nilsson:1978:OST,
  author =       "Arne Nilsson and Rolf Blom and Harald Wesemeyer and S.
                 Hellstrom",
  title =        "On overflow systems in telephone networks: general
                 service times in the secondary group",
  journal =      "Ericsson technics",
  volume =       "34",
  number =       "2",
  publisher =    "Telefonaktiebolaget L. M. Ericsson",
  address =      "Stockholm, Sweden",
  pages =        "48--128",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Caption title.",
  keywords =     "Computer networks; Computers --- Access control;
                 Electrets; Encryption methods in data networks;
                 Telephone systems",
}

@Book{Oakley:1978:RPC,
  author =       "Howard T. Oakley",
  title =        "The {Riverbank} publications on cryptology",
  publisher =    "????",
  address =      "Washington, DC, USA",
  pages =        "324--330",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Fabyan, George, --- 1867-1936; Friedman,
                 William F. --- (William Frederick), --- 1891-1969;
                 Publication (Riverbank Laboratories); Riverbank
                 Laboratories. --- Dept. of Ciphers",
}

@Article{Payne:1978:OEN,
  author =       "W. H. Payne and K. L. McMillen",
  title =        "Orderly Enumeration of Nonsingular Binary Matrices
                 Applied to Text Encryption",
  journal =      j-CACM,
  volume =       "21",
  number =       "4",
  pages =        "259--263",
  month =        apr,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68C05",
  MRnumber =     "80h:68031",
  MRreviewer =   "P. E. O'Neil",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  abstract =     "Nonsingular binary matrices of order N, i.e.,
                 nonsingular over the field left brace 0,1 right brace,
                 and an initial segment of the natural numbers are
                 placed in one-to-one correspondence. Each natural
                 number corresponds to two intermediate vectors. These
                 vectors are mapped into a nonsingular binary matrix.
                 Examples of complete enumeration of all 2 multiplied by
                 2 and 3 multiplied by 3 nonsingular binary matrices
                 were produced by mapping the intermediate vectors to
                 the matrices. The mapping has application to the Vernam
                 encipherment method using pseudorandom number
                 sequences. A bit string formed from bytes of text of a
                 data encryption key can be used as a representation of
                 a natural number. This natural number is transformed to
                 a nonsingular binary matrix. Key leverage is obtained
                 by using the matrix as a ``seed'' in a shift register
                 sequence pseudorandom number generator.",
  acknowledgement = ack-nhfb,
  classcodes =   "C4140 (Linear algebra); C6130 (Data handling
                 techniques)",
  classification = "723",
  corpsource =   "Washington State Univ., Pullman, WA, USA",
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "binary sequences; bit string; computer programming;
                 data encryption key; encoding; enumeration; mapped;
                 matrix algebra; natural number; nonsingular binary
                 matrices; pseudorandom number; sequences; text editing;
                 text encryption; Vernam encipherment method",
  oldlabel =     "PayneM78",
  treatment =    "A Application; T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/PayneM78",
}

@Article{Pohlig:1978:IAC,
  author =       "S. C. Pohlig and M. E. Hellman",
  title =        "An improved algorithm for computing logarithms over {$
                 {\rm GF}(p) $} and its cryptographic significance",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "24",
  number =       "1",
  pages =        "106--111",
  month =        "????",
  year =         "1978",
  CODEN =        "IETTAW",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Thu Sep 22 18:53:42 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=18",
}

@Article{Pollard:1978:MCM,
  author =       "J. M. Pollard",
  title =        "{Monte Carlo} Methods for Index Computation $ (\bmod
                 p) $",
  journal =      j-MATH-COMPUT,
  volume =       "32",
  number =       "143",
  pages =        "918--924",
  month =        jul,
  year =         "1978",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Mon Jul 19 08:06:24 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "C1140G (Monte Carlo methods)",
  corpsource =   "Math. Dept., Plessey Telecommunications Res.,
                 Maidenhead, UK",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "factorisation of; index computation; integers; Monte
                 Carlo methods",
  referencedin = "Referenced in \cite[Ref. 7]{Wiener:1998:PCP} and
                 \cite[Ref. 8]{Escott:1999:AEC}.",
  treatment =    "T Theoretical or Mathematical",
}

@Unpublished{Reeds:1978:HCM,
  author =       "J. Reeds and D. Ritchie and R. Morris",
  title =        "The {Hagelin} Cypher Machine ({M-209}): Cryptanalysis
                 from Ciphertext Alone",
  year =         "1978",
  bibdate =      "Thu Apr 29 18:08:31 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Submitted to the journal Cryptologia, but never
                 published. For the story behind the suppression of
                 publication, see \cite{Ritchie:19xx:DCW}. Internal
                 technical memoranda TM 78-1271-10, TM 78-1273-2.",
  acknowledgement = ack-nhfb,
}

@Article{Rivest:1978:MOD,
  author =       "Ronald L. Rivest and Adi Shamir and Leonard M.
                 Adleman",
  title =        "A Method for Obtaining Digital Signatures and Public
                 Key Cryptosystems",
  journal =      j-CACM,
  volume =       "21",
  number =       "2",
  pages =        "120--126",
  month =        feb,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "94A05",
  MRnumber =     "83m:94003",
  MRreviewer =   "J. L. Selfridge",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "The basics of trap-door functions and the famous RSA
                 public key cryptosystem are presented in this paper.",
  abstract =     "An encryption method is presented with the novel
                 property that publicly revealing an encryption key does
                 not thereby reveal the corresponding decryption key.
                 This has two important consequences: (1) Couriers or
                 other secure means are not needed to transmit keys,
                 since a message can be enciphered using an encryption
                 key publicly revealed by the intended recipient. (2) A
                 message can be ``signed'' using a privately held
                 decryption key. Anyone can verify this signature using
                 the corresponding publicly revealed encryption key.
                 Signatures cannot be forged, and a signer cannot later
                 deny the validity of his signature.",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  classification = "723",
  corpsource =   "Dept. of Math., MIT, Cambridge, MA, USA",
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "computer programming; cryptography; cryptosystems;
                 data handling; data processing --- Security of Data;
                 decryption key; digital signatures; encryption key;
                 number theory; operating protection; RSA; security;
                 security of data",
  referencedin = "Referenced in \cite[Ref. 12]{Handschuh:1998:SCC},
                 \cite[Ref. 21]{Kaliski:1995:SUR}, \cite[Ref.
                 5]{Haber:1995:HDD}, \cite[Ref. 8]{Wiener:1998:PCP},
                 \cite[Ref. 27]{Goldreich:1997:FMCb}.",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Saltzer:1978:DS,
  author =       "Jerome H. Saltzer",
  title =        "On digital signatures",
  journal =      j-OPER-SYS-REV,
  volume =       "12",
  number =       "2",
  pages =        "12--14",
  month =        apr,
  year =         "1978",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:39 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Stark:1978:INT,
  author =       "Harold M. Stark",
  title =        "An introduction to number theory",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "x + 347",
  year =         "1978",
  ISBN =         "0-262-69060-8",
  ISBN-13 =      "978-0-262-69060-7",
  LCCN =         "QA241 .S72 1978",
  bibdate =      "Fri Jun 24 14:19:16 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Originally published in \cite{Stark:1970:INT}.",
  subject =      "Number theory",
  xxnote =       "Some library catalogs give year as 1981.",
}

@Manual{USCSC:1978:CSD,
  author =       "{United States.Civil Service Commission}",
  title =        "Computer security and the {Data Encryption Standard}:
                 proceedings of the {Conference on Computer Security and
                 the Data Encryption Standard held at the National
                 Bureau of Standards in Gaithersburg, Maryland, on
                 February 15, 1977}",
  number =       "500-27",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "viii + 125",
  year =         "1978",
  LCCN =         "T1.U52 no.500- 27",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "NBS special publication. Computer science and
                 technology",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- passwords; data encryption
                 (computer science)",
}

@Book{USCSSC:1978:USN,
  author =       "{United States.Congress.Senate.Select Committee on
                 Intelligence}",
  title =        "Unclassified summary --- involvement of {NSA} in the
                 development of the {Data Encryption Standard}: staff
                 report of the {Senate Select Committee on Intelligence,
                 United States Senate}",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "ii + 4",
  month =        apr,
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: 95th Congress, 2d session. Committee
                 print.",
  keywords =     "Cryptography; Data encryption (Computer science);
                 United States. --- National Security Agency",
}

@Book{Winterbotham:1978:NC,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Nazi} connection",
  publisher =    pub-HARPER-ROW,
  address =      pub-HARPER-ROW:adr,
  pages =        "222",
  year =         "1978",
  ISBN =         "0-06-014686-9",
  ISBN-13 =      "978-0-06-014686-3",
  LCCN =         "D810.S8 .W538 1978",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
  subject =      "Winterbotham, F. W; (Frederick William); World War,
                 1939-1945; Secret service; Great Britain; Spies;
                 Biography; Germany; Personal narratives, British",
  subject-dates = "1897--1990",
}

@InProceedings{Adleman:1979:SAD,
  author =       "L. M. Adleman",
  title =        "A subexponential algorithm for the discrete
                 logarithm",
  crossref =     "IEEE:1979:ASF",
  pages =        "55--60",
  year =         "1979",
  DOI =          "https://doi.org/10.1109/SFCS.1979.2",
  bibdate =      "Sun Mar 11 10:27:21 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@PhdThesis{Andelman:1979:MLE,
  author =       "Dov Andelman",
  title =        "Maximum likelihood estimation applied to
                 cryptanalysis",
  type =         "Thesis ({Ph.D.})",
  school =       "Stanford University",
  address =      "Stanford, CA, USA",
  pages =        "viii + 167",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Estimation theory; Maxima and minima.",
}

@Article{Anonymous:1979:SSA,
  author =       "Anonymous",
  title =        "{SB}. {Security Agency} denies tampering with {DES}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "39--39",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1979.6368158",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Educational institutions; Electrical engineering;
                 Encryption; National security; Public key",
}

@Book{Barker:1979:CEC,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of an enciphered code problem: where an
                 ``additive'' method of encipherment has been used",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "vii + 174",
  year =         "1979",
  ISBN =         "0-89412-037-9",
  ISBN-13 =      "978-0-89412-037-4",
  LCCN =         "Z103 .B333",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Barker:1979:HCCa,
  editor =       "Wayne G. Barker",
  title =        "The history of codes and ciphers in the {United
                 States} during {World War I}",
  volume =       "20",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "263",
  year =         "1979",
  ISBN =         "0-89412-031-X",
  ISBN-13 =      "978-0-89412-031-2",
  LCCN =         "D639.C75 H57 1979",
  bibdate =      "Mon Sep 13 06:32:02 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
}

@Book{Barker:1979:HCCb,
  editor =       "Wayne G. Barker",
  title =        "The history of codes and ciphers in the {United
                 States} during the period between the {World Wars}",
  volume =       "22, 54",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "various",
  year =         "1979",
  ISBN =         "0-89412-039-5 (part 1), 0-89412-165-0 (part 2)",
  ISBN-13 =      "978-0-89412-039-8 (part 1), 978-0-89412-165-4 (part
                 2)",
  LCCN =         "UB290 .H47 1979",
  bibdate =      "Mon Sep 13 06:37:57 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Two volumes. This book was written about 1946 by the
                 Historical Section of the Army Security Agency",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
}

@Article{Blakley:1979:RSA,
  author =       "G. R. Blakley and I. Borosh",
  title =        "{Rivest--Shamir--Adleman} public key cryptosystems do
                 not always conceal messages",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "5",
  number =       "3",
  pages =        "169--178",
  year =         "1979",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94B99 (10A25 94A24)",
  MRnumber =     "81e:94026",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse.bib",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
  remark =       "This paper points out that the some keys in the RSA
                 may fail to encrypt: instead, they produce an output
                 ciphertext that is identical to the input plaintext.
                 See also \cite{Smith:1979:UFM,Bergmann:2009:DKR}",
}

@InProceedings{Blakley:1979:SCK,
  author =       "G. R. Blakley",
  title =        "Safeguarding cryptographic keys",
  crossref =     "Merwin:1979:NCC",
  pages =        "313--317",
  year =         "1979",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL},
                 \cite[Ref. 2]{Gemmell:1997:ITC}.",
  xxauthor =     "R. Blakley",
}

@Article{Branstad:1979:VHD,
  author =       "D. Branstad",
  title =        "{V}. `{Hellman}'s data does not support his
                 conclusion'",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "41--41",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1979.6368161",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  abstract =     "Neither the information obtained by the National
                 Bureau of Standards nor the discussions in Prof. Martin
                 Hellman's paper support his conclusion that the Data
                 Encryption Standard will likely be ``totally insecure
                 within ten years.'",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Algorithm design and analysis; Educational
                 institutions; Encryption; National security;
                 Standards",
}

@Article{Bright:1979:QRN,
  author =       "Herbert S. Bright and Richard L. Enison",
  title =        "Quasi-Random Number Sequences from a Long-Period {TLP}
                 Generator with Remarks on Application to Cryptography",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "357--370",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Sep 19 21:17:11 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@MastersThesis{Chaum:1979:UEM,
  author =       "David Chaum",
  title =        "Untraceable electronic mail, return addresses, and
                 digital pseudonyms",
  type =         "Thesis ({M.S. in Computer Science})",
  school =       "University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  month =        jun,
  year =         "1979",
  bibdate =      "Mon Dec 28 13:41:04 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Culik:1979:SIS,
  author =       "K. {Culik, II} and H. A. Maurer",
  title =        "Secure Information Storage and Retrieval Using New
                 Results in Cryptography",
  journal =      j-INFO-PROC-LETT,
  volume =       "8",
  number =       "4",
  pages =        "181--186",
  day =          "30",
  month =        apr,
  year =         "1979",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68B15 (68H05)",
  MRnumber =     "80h:68010",
  MRreviewer =   "James W. Snively, Jr.",
  bibdate =      "Tue Nov 17 10:49:43 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C6130 (Data handling techniques)",
  corpsource =   "Dept. of Computer Sci., Univ. of Waterloo, Waterloo,
                 Ont., Canada",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "cryptography; data processing --- Security of Data;
                 encoding; information retrieval; information retrieval
                 systems; information storage; information systems;
                 security of data",
}

@Article{Davida:1979:IHS,
  author =       "G. I. Davida",
  title =        "{III}. `{Hellman}'s scheme breaks {DES} in its basic
                 form'",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "39--39",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1979.6368159",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Educational institutions; Electrical engineering;
                 Encryption; National security; Public key",
}

@Article{Denning:1979:EOS,
  author =       "Peter J. Denning",
  title =        "Editor's Overview --- Special Section on Data
                 Encryption",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "283--283",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356791",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1979:SPC,
  author =       "Dorothy E. Denning",
  title =        "Secure Personal Computing in an Insecure Network",
  journal =      j-CACM,
  volume =       "22",
  number =       "8",
  pages =        "476--482",
  month =        aug,
  year =         "1979",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68A05 (68B15 94A99)",
  MRnumber =     "80d:68010",
  bibdate =      "Mon Jan 22 06:35:06 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm22.html#Denning79;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "Computer Sci. Dept., Purdue Univ., West Lafayette, IN,
                 USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "communication links; confidential data; confidential
                 files; encoding; encryption; insecure network; secure
                 personal computing; security of data",
  oldlabel =     "Denning79",
  treatment =    "P Practical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Denning79",
}

@TechReport{Dreher:1979:PSC,
  author =       "Felix F. Dreher",
  title =        "Privacy and security in computer based systems using
                 encryption",
  type =         "Pittsburg State University. School of Business
                 monograph series",
  number =       "7",
  institution =  "Pittsburg State University. Gladys A. Kelce School of
                 Business and Economics.",
  address =      "Pittsburg, KS, USA",
  pages =        "8",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Cover title.",
  keywords =     "Computers --- Access control; Electronic data
                 processing departments --- Security measures",
}

@Book{Garey:1979:CIG,
  author =       "Michael R. Garey and David S. Johnson",
  title =        "Computers and Intractability: a Guide to the Theory of
                 {NP}-Completeness",
  publisher =    pub-FREEMAN,
  address =      pub-FREEMAN:adr,
  pages =        "x + 338",
  year =         "1979",
  ISBN =         "0-7167-1045-5, 0-7167-1044-7",
  ISBN-13 =      "978-0-7167-1045-5, 978-0-7167-1044-8",
  bibdate =      "Sun Mar 11 10:56:42 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/subjects/acc-stab-num-alg.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Garlinski:1979:IEW,
  author =       "J{\'o}zef Garli{\'n}ski",
  title =        "Intercept: the {Enigma} war",
  publisher =    "J. M. Dent",
  address =      "London, UK",
  pages =        "xx + 219 + 8",
  year =         "1979",
  ISBN =         "0-460-04337-4",
  ISBN-13 =      "978-0-460-04337-3",
  LCCN =         "D810.C88 G37",
  bibdate =      "Tue Sep 4 07:56:36 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939-1945; Cryptography",
}

@Article{Gligor:1979:OMA,
  author =       "V. D. Gligor and B. G. Lindsay",
  title =        "Object Migration and Authentication",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "SE-5",
  number =       "6",
  pages =        "607--611",
  month =        nov # "\slash " # dec,
  year =         "1979",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/TSE.1979.230196",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 08:07:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng1970.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1702677",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@Article{Good:1979:EWC,
  author =       "I. J. Good",
  title =        "Early Work on Computers at {Bletchley}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "1",
  number =       "1",
  pages =        "38--48",
  month =        jul # "\slash " # sep,
  year =         "1979",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:16 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/annhistcomput.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1979/pdf/a1038.pdf;
                 http://www.computer.org/annals/an1979/a1038abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  keywords =     "Bletchley; Bombe; chessplayers as cryptanalysts;
                 Colossus; cryptanalysis; Enigma; Geheimschreiber;
                 Government Code and Cypher School; history of
                 computers; Turing; Ultra",
}

@Book{Hardy:1979:ITN,
  author =       "G. H. (Godfrey Harold) Hardy and Edward Maitland
                 Wright",
  title =        "An introduction to the theory of numbers",
  publisher =    pub-CLARENDON,
  address =      pub-CLARENDON:adr,
  edition =      "Fifth",
  pages =        "xvi + 426",
  year =         "1979",
  ISBN =         "0-19-853170-2, 0-19-853171-0 (paperback)",
  ISBN-13 =      "978-0-19-853170-8, 978-0-19-853171-5 (paperback)",
  LCCN =         "QA241 .H28 1979",
  bibdate =      "Fri Jun 24 12:34:44 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  author-dates = "1877--1947",
  subject =      "Number theory",
}

@Article{Hellman:1979:MPK,
  author =       "Martin E. Hellman",
  title =        "The Mathematics of Public-Key Cryptography",
  journal =      j-SCI-AMER,
  volume =       "241",
  number =       "2",
  pages =        "146--157 (Intl. ed. 130--139)",
  month =        aug,
  year =         "1979",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Tue May 19 18:01:43 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C6130 (Data handling techniques);
                 C6160 (Database management systems (DBMS))",
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "computer privacy; cryptography; electronic
                 communications; encoding; encryption; knapsack problem;
                 mathematics; P-NP problem; public key cryptography;
                 public-key cryptosystem; random numbers; security of
                 data; trap-door one-way functions",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Hellman:1979:WTI,
  author =       "M. E. Hellman",
  title =        "{I}. `{DES} will be totally insecure within ten
                 years'",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "32--40",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1979.6368157",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Algorithm design and analysis; Computers; Encryption;
                 Standards",
}

@Manual{Hinsley:1979:BISa,
  author =       "F. H. (Francis Harry) Hinsley and E. E. Thomas",
  title =        "{British} intelligence in the {Second World War}: its
                 influence on strategy and operations",
  publisher =    "H.M. Stationery Office",
  address =      "London, UK",
  pages =        "various",
  year =         "1979",
  ISBN =         "0-11-630933-4 (vol. 1)",
  ISBN-13 =      "978-0-11-630933-4 (vol. 1)",
  LCCN =         "D810.S7 H49 1979b v.1-2 (1979--1981)",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Vol. 3, pt. 2 has additional author C. A. G.
                 Simkins.",
  price =        "UK\pounds10.00 (vol. 1)",
  series =       "History of the Second World War",
  acknowledgement = ack-nhfb,
  keywords =     "Great Britain --- history --- George VI, 1936--1952;
                 World War, 1939--1945 --- secret service --- Great
                 Britain",
}

@Book{Hinsley:1979:BISb,
  author =       "F. H. (Francis Harry) Hinsley and Michael Eliot
                 Howard",
  title =        "{British} intelligence in the {Second World War}: its
                 influence on strategy and operations",
  publisher =    pub-CUP,
  address =      pub-CUP:adr,
  pages =        "various",
  year =         "1979",
  ISBN =         "0-521-22940-5 (vol. 1)",
  ISBN-13 =      "978-0-521-22940-1 (vol. 1)",
  LCCN =         "D810.S7 H47 1979b",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Vols. 3-4 in series: History of the Second World War.
                 Vol. 4 has subtitle: Security and counter-intelligence;
                 Vol. 5 has subtitle: Strategic deception.",
  acknowledgement = ack-nhfb,
  contents =     "v. 1-3. Its influence on strategy and operations ---
                 v. 5. Strategic deception",
  keywords =     "World War, 1939--1945; World War, 1939--1945 ---
                 secret service --- Great Britain",
}

@Book{IRD:1979:DVE,
  author =       "{International Resource Development, Inc.}",
  title =        "Data and voice encryption",
  publisher =    "International Resource Development",
  address =      "New Canaan, CT, USA",
  pages =        "iv + 124",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography equipment industry --- United States;
                 Market surveys --- United States.",
}

@Article{Kahn:1979:CGP,
  author =       "David Kahn",
  title =        "Cryptology goes public",
  journal =      "Foreign affairs (Council on Foreign Relations)",
  volume =       "58",
  number =       "1",
  publisher =    "Council on Foreign Relations",
  address =      "New York, NY, USA",
  pages =        "141--159",
  month =        "Fall",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Caption title. Detached from Foreign affairs, v. 58,
                 no. 1, fall 1979.",
  keywords =     "Ciphers; Cryptography",
}

@Article{Kam:1979:SDS,
  author =       "John B. Kam and George I. Davida",
  title =        "Structured design of substitution-permutation
                 encryption networks",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "28",
  number =       "10",
  pages =        "747--753",
  year =         "1979",
  CODEN =        "ITCOB4",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  MRclass =      "68B15 (68H05)",
  MRnumber =     "80h:68013",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Institute of Electrical and Electronics Engineers.
                 Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Knoble:1979:AEO,
  author =       "H. D. Knoble",
  title =        "{Algorithm 536}: An Efficient One-Way Enciphering
                 Algorithm [{Z}]",
  journal =      j-TOMS,
  volume =       "5",
  number =       "1",
  pages =        "108--111",
  month =        mar,
  year =         "1979",
  CODEN =        "ACMSCU",
  DOI =          "https://doi.org/10.1145/355815.355823",
  ISSN =         "0098-3500 (print), 1557-7295 (electronic)",
  ISSN-L =       "0098-3500",
  bibdate =      "Sat Aug 27 23:58:53 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Mathematical Software",
  journal-URL =  "http://portal.acm.org/toc.cfm?idx=J782",
}

@Article{Knoble:1979:EOW,
  author =       "H. D. Knoble and C. {Forney, Jr.} and F. S. Bader",
  title =        "An Efficient One-Way Enciphering Algorithm",
  journal =      j-TOMS,
  volume =       "5",
  number =       "1",
  pages =        "97--107",
  month =        mar,
  year =         "1979",
  CODEN =        "ACMSCU",
  DOI =          "https://doi.org/10.1145/355815.355822",
  ISSN =         "0098-3500 (print), 1557-7295 (electronic)",
  ISSN-L =       "0098-3500",
  bibdate =      "Sat Aug 27 23:13:25 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Mathematical Software",
  journal-URL =  "http://portal.acm.org/toc.cfm?idx=J782",
}

@Article{Leighton:1979:BRA,
  author =       "Albert C. Leighton",
  title =        "Book Review: {{\booktitle{An annotated bibliography of
                 cryptography}}: By David Shulman. Garland Reference
                 Library of the Humanities, Vol. 37 New York\slash
                 London (Garland Publishing Inc.). 1976. xvi + 372 pp.
                 illus. \$35.00}",
  journal =      j-HIST-MATH,
  volume =       "6",
  number =       "2",
  pages =        "213--218",
  month =        may,
  year =         "1979",
  CODEN =        "HIMADS",
  ISSN =         "0315-0860 (print), 1090-249X (electronic)",
  ISSN-L =       "0315-0860",
  bibdate =      "Wed Jun 26 06:17:09 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/histmath.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0315086079900934",
  acknowledgement = ack-nhfb,
  fjournal =     "Historia Mathematica",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03150860/",
}

@Article{Leighton:1979:BRB,
  author =       "Albert C. Leighton",
  title =        "Book Review: {{\booktitle{An annotated bibliography of
                 cryptography}}: By David Shulman. Garland Reference
                 Library of the Humanities, Vol. 37 New York\slash
                 London (Garland Publishing Inc.). 1976. xvi + 372 pp.
                 illus. \$35.00}",
  journal =      j-HIST-MATH,
  volume =       "6",
  number =       "2",
  pages =        "213--218",
  month =        may,
  year =         "1979",
  CODEN =        "HIMADS",
  ISSN =         "0315-0860 (print), 1090-249X (electronic)",
  ISSN-L =       "0315-0860",
  bibdate =      "Wed Jun 26 06:17:09 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/histmath.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0315086079900934",
  acknowledgement = ack-nhfb,
  fjournal =     "Historia Mathematica",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03150860",
}

@Article{Lempel:1979:CT,
  author =       "Abraham Lempel",
  title =        "Cryptology in Transition",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "285--303",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356792",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lu:1979:EGC,
  author =       "Shyue Ching Lu",
  title =        "The existence of good cryptosystems for key rates
                 greater than the message redundancy",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "25",
  number =       "4",
  pages =        "475--477",
  year =         "1979",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1979.1056061",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94B99",
  MRnumber =     "80g:94069a",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@MastersThesis{Ma:1979:RAD,
  author =       "Robert Ma",
  title =        "Review and analysis of the {Data Encryption
                 Standard}",
  type =         "Master of Science, Plan II.",
  school =       "Department of Electrical Engineering and Computer
                 Sciences, University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "70",
  year =         "1979",
  LCCN =         "TK7 .U5 1979:1:M-N",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Matyas:1979:DSO,
  author =       "Stephen M. Matyas",
  title =        "Digital Signatures --- an Overview",
  journal =      j-COMP-NET,
  volume =       "3",
  number =       "2",
  pages =        "87--94",
  month =        apr,
  year =         "1979",
  CODEN =        "CNETDP",
  ISSN =         "0376-5075",
  ISSN-L =       "0376-5075",
  bibdate =      "Sat Sep 25 18:04:41 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Kingston, NY",
  classification = "723",
  fjournal =     "Computer Networks",
  journalabr =   "Comput Networks",
  keywords =     "data processing; digital signatures",
}

@Article{Peleg:1979:BSC,
  author =       "Shmuel Peleg and Azriel Rosenfeld",
  title =        "Breaking Substitution Ciphers Using a Relaxation
                 Algorithm",
  journal =      j-CACM,
  volume =       "22",
  number =       "11",
  pages =        "598--605",
  month =        nov,
  year =         "1979",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 07:12:05 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm22.html#PelegR79;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C1230 (Artificial intelligence)",
  corpsource =   "Univ. of Maryland, College Park, MD, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "artificial intelligence; computer security;
                 cryptography; decoding; joint letter probabilities;
                 letters; plaintext; relaxation; relaxation algorithm;
                 substitution ciphers; updating scheme",
  oldlabel =     "PelegR79",
  ort =          "ordner sicherheit",
  treatment =    "T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/PelegR79",
}

@Article{Popek:1979:ESC,
  author =       "Gerald J. Popek and Charles S. Kline",
  title =        "Encryption and Secure Computer Networks",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "331--356",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356794",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@InCollection{Reeds:1979:CMC,
  author =       "James Reeds",
  booktitle =    "Information linkage between applied mathematics and
                 industry (Proc. First Annual Workshop, Naval
                 Postgraduate School, Monterey, Calif., 1978)",
  title =        "Cracking a multiplicative congruential encryption
                 algorithm",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "467--472",
  year =         "1979",
  MRclass =      "94B99 (65C10)",
  MRnumber =     "80h:94040",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
}

@Article{Rivest:1979:CRC,
  author =       "Ronald L. Rivest",
  title =        "Critical remarks on: {``Critical remarks on some
                 public-key cryptosystems'' [BIT {\bf 18}(4), 1978, pp.
                 493--496; MR 80b:94033 ] by Tore Herlestam}",
  journal =      j-BIT,
  volume =       "19",
  number =       "2",
  pages =        "274--275",
  month =        jun,
  year =         "1979",
  CODEN =        "NBITAB",
  DOI =          "https://doi.org/10.1007/BF01930859",
  ISSN =         "0006-3835 (print), 1572-9125 (electronic)",
  ISSN-L =       "0006-3835",
  MRclass =      "94B99 (68B99)",
  MRnumber =     "80m:94070",
  MRreviewer =   "M. C. Cheng",
  bibdate =      "Wed Jan 4 18:52:16 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=19&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/bit.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Herlestam:1978:CRS}.",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=19&issue=2&spage=274",
  acknowledgement = ack-nhfb,
  fjournal =     "BIT; Nordisk Tidskrift for Informationsbehandling
                 (BIT)",
  journal-URL =  "http://link.springer.com/journal/10543",
}

@Article{Rubin:1979:DSC,
  author =       "F. Rubin",
  title =        "Decrypting a Stream Cipher Based on {J}--{K}
                 Flip-Flops",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-28",
  number =       "7",
  pages =        "483--487",
  month =        jul,
  year =         "1979",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.1979.1675392",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 11 06:49:39 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput1970.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1675392",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Shamir:1979:HSS,
  author =       "Adi Shamir",
  title =        "How to Share a Secret",
  journal =      j-CACM,
  volume =       "22",
  number =       "11",
  pages =        "612--613",
  month =        nov,
  year =         "1979",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "94B99 (68E99)",
  MRnumber =     "80g:94070",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "protection against loss of keys by dividing the data
                 into pieces.",
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "MIT, Cambridge, MA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "computer security; cryptographic systems;
                 cryptography; encoding; key management; robust key
                 management schemes; security breaches; security of
                 data",
  ort =          "ordner sicherheit",
  referencedin = "Referenced in \cite[Ref. 38]{Gemmell:1997:ITC},
                 \cite[Ref. 26]{Canetti:1997:PSL}.",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@InProceedings{Simmons:1979:CCA,
  author =       "Gustavus J. Simmons",
  booktitle =    "Proceedings of the Eighth Manitoba Conference on
                 Numerical Mathematics and Computing (Univ. Manitoba,
                 Winnipeg, Man., 1978)",
  title =        "Computational complexity and asymmetric encryption",
  publisher =    pub-UTILITAS-MATH,
  address =      pub-UTILITAS-MATH:adr,
  pages =        "65--93",
  year =         "1979",
  MRclass =      "68B15 (68C25 94B99)",
  MRnumber =     "80h:68017",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  series =       "Congress. Numer., XXII",
}

@InProceedings{Simmons:1979:HID,
  author =       "G. J. Simmons",
  editor =       "{IEEE}",
  booktitle =    "{IEEE} {EASCON '79}, Washington, {DC, 1979}",
  title =        "How to Insure that Data Acquired to Verify Treaty
                 Compliance are Trustworthy",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "661--662",
  year =         "1979",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Thu Jan 21 14:46:12 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Simmons:1979:SAE,
  author =       "Gustavus J. Simmons",
  title =        "Symmetric and Asymmetric Encryption",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "305--330",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356793",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Smith:1979:UFM,
  author =       "Donald R. Smith and James T. Palmer",
  title =        "Universal fixed messages and the
                 {Rivest--Shamir--Adleman} cryptosystem",
  journal =      j-MATHEMATIKA,
  volume =       "26",
  number =       "1",
  pages =        "44--52",
  year =         "1979",
  CODEN =        "MTKAAB",
  ISSN =         "0025-5793",
  MRclass =      "94B99",
  MRnumber =     "80m:94071",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse.bib",
  fjournal =     "Mathematika. A Journal of Pure and Applied
                 Mathematics",
  remark =       "This paper points out that the some keys in the RSA
                 may fail to encrypt: instead, they produce an output
                 ciphertext that is identical to the input plaintext.
                 See also \cite{Blakley:1979:RSA,Bergmann:2009:DKR}",
}

@Article{Snyder:1979:IUC,
  author =       "Samuel S. Snyder",
  title =        "Influence of {U.S. Cryptologic Organizations} on the
                 digital computer industry",
  journal =      j-J-SYST-SOFTW,
  volume =       "1",
  number =       "1",
  pages =        "87--102",
  month =        "????",
  year =         "1979",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed Sep 8 07:38:41 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Tuchman:1979:HPN,
  author =       "W. Tuchman",
  title =        "{Hellman} presents no shortcut solutions to {DES}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "40--41",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  referencedin = "Referenced in \cite[Ref. 25]{Biham:1998:TA}.",
}

@Article{Tuchman:1979:IHP,
  author =       "W. Tuchman",
  title =        "{IV}. `{Hellman} presents no shortcut solutions to the
                 {DES}'",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "40--41",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1979.6368160",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Algorithm design and analysis; Computers; Educational
                 institutions; Encryption; Standards",
}

@TechReport{USNA:1979:CS,
  author =       "{United States.National Archives and Records
                 Service}",
  title =        "Cryptology studies",
  type =         "Records of the National Security Agency",
  number =       "RG457",
  institution =  "National Archives of the United States",
  address =      "Washington, DC, USA",
  pages =        "??",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "reel 1. Studies SRH002-007.--reel 2. Studies SRM026,
                 SRM028-037.-- reel 3. Studies SRH-001, SRH-038.",
  keywords =     "Ciphers; Cryptography; World War, 1939-1945 ---
                 Cryptography.",
}

@Book{USNSG:1979:IRW,
  author =       "{United States.Naval Security Group}",
  title =        "Intelligence reports on the war in the {Atlantic},
                 1942--1945: the account of the war in the {Atlantic}
                 from {Dec. 1942} to {May 1945} as seen through and
                 influenced by decryption of {German} naval radio
                 traffic: [guide]",
  publisher =    "Michael Glazier",
  address =      "Wilmington, DE, USA",
  pages =        "6",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Microfilm (positive). v. 1. Allied communication
                 intelligence and the battle of the Atlantic.--v.2.
                 U-boat operations.--v. 3. German naval communications
                 intelligence.--v. 4. Technical intelligence from Allied
                 C.I. Released by the Department of the Navy, Naval
                 Security Group Command Headquarters. v. 1. Allied
                 communication intelligence and the battle of the
                 Atlantic.--v.2. U-boat operations.--v. 3. German naval
                 communications intelligence.--v. 4. Technical
                 intelligence from Allied C.I.",
  keywords =     "Cipher and telegraph codes; Germany. --- Kriegsmarine
                 --- Communication systems; World War, 1939--1945 ---
                 Atlantic Ocean; World War, 1939--1945 ---
                 Communications, Military; World War, 1939--1945 ---
                 Cryptography; World War, 1939--1945 --- Naval
                 operations, American; World War, 1939--1945 --- Naval
                 operations, German; World War, 1939-1945 --- Atlantic
                 Ocean",
}

@Book{Weber:1979:USD,
  author =       "Ralph Edward Weber",
  title =        "{United States} Diplomatic Codes and Ciphers,
                 1775--1938",
  publisher =    "Precedent Publishing",
  address =      "Chicago, IL, USA",
  pages =        "xviii + 633",
  year =         "1979",
  ISBN =         "0-913750-20-4",
  ISBN-13 =      "978-0-913750-20-9",
  LCCN =         "Z103 .W4",
  bibdate =      "Tue Dec 01 10:53:24 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$49.95",
  acknowledgement = ack-nhfb,
}

@Article{Williams:1979:CAA,
  author =       "P. W. Williams and D. Woodhead",
  title =        "Computer assisted analysis of cryptic crosswords",
  journal =      j-COMP-J,
  volume =       "22",
  number =       "1",
  pages =        "67--70",
  month =        feb,
  year =         "1979",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C7830D (Computer games)",
  corpsource =   "Computation Dept., Univ. of Manchester, Manchester,
                 UK",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "BNF type definition; computer analysis program;
                 cryptic crosswords; games of skill; language LACROSS;
                 personal computing",
  treatment =    "A Application; P Practical",
}

@Article{Williams:1979:SRC,
  author =       "H. C. Williams and B. Schmid",
  title =        "Some remarks concerning the {M.I.T.} public-key
                 cryptosystem",
  journal =      j-BIT,
  volume =       "19",
  number =       "4",
  pages =        "525--538",
  month =        dec,
  year =         "1979",
  CODEN =        "BITTEL, NBITAB",
  DOI =          "https://doi.org/10.1007/BF01931269",
  ISSN =         "0006-3835 (print), 1572-9125 (electronic)",
  ISSN-L =       "0006-3835",
  MRclass =      "94B99",
  MRnumber =     "80m:94072",
  bibdate =      "Wed Jan 4 18:52:16 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=19&issue=4;
                 https://www.math.utah.edu/pub/tex/bib/bit.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=19&issue=4&spage=525",
  acknowledgement = ack-nhfb,
  fjournal =     "BIT; Nordisk Tidskrift for Informationsbehandling
                 (BIT)",
  journal-URL =  "http://link.springer.com/journal/10543",
  referencedin = "Referenced in \cite[Ref. 25]{Kaliski:1995:SUR}.",
}

@Manual{Zeidler:1979:DDE,
  author =       "Howard M. Zeidler",
  title =        "Digital data encryption",
  organization = pub-SRI,
  address =      pub-SRI:adr,
  pages =        "20",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Guidelines - SRI International, Business Intelligence
                 Program; no. 1044 Guidelines (Business Intelligence
                 Program (SRI International)); no. 1044",
  acknowledgement = ack-nhfb,
  annote =       "Cover title.",
  keywords =     "Computers --- Access control --- Passwords; Data
                 encryption (Computer science)",
}

@PhdThesis{Andelman:1980:MLE,
  author =       "Dov Andelman",
  title =        "Maximum likelihood estimation applied to
                 cryptanalysis",
  type =         "Thesis ({Ph.D.})",
  school =       "Department of Electrical Engineering, Stanford
                 University",
  address =      "Stanford, CA, USA",
  pages =        "viii + 167",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Maxima and minima.",
}

@TechReport{Anonymous:1980:ACS,
  author =       "Anonymous",
  title =        "An Assessment of civil sector uses of digital data
                 encryption",
  number =       "",
  institution =  "Department of Engineering and Public Policy,
                 Department of Social Sciences and School of Urban and
                 Public Affairs, Carnegie-Mellon University",
  address =      "Pittsburgh, PA, USA",
  pages =        "128",
  month =        nov,
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Draft version produced in April 1980, final revised
                 version produced November 1980.",
  keywords =     "Computers --- Access control; Digital communications;
                 Electronic data processing departments --- Security
                 measures.",
}

@Book{Bennett:1980:UWN,
  author =       "Ralph Francis Bennett",
  title =        "{Ultra} in the {West}: the {Normandy} campaign,
                 1944--45",
  publisher =    "Scribner",
  address =      "New York, NY, USA",
  pages =        "xvi + 336",
  year =         "1980",
  ISBN =         "0-684-16704-2",
  ISBN-13 =      "978-0-684-16704-6",
  LCCN =         "D756.5.N6 B44 1980",
  bibdate =      "Mon May 8 07:06:44 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$17.50",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Campaigns; France; Normandy;
                 Cryptography; Secret Service; Great Britain; Normandy
                 (France); History",
}

@Article{Berstis:1980:SPD,
  author =       "Viktors Berstis",
  title =        "Security and protection of data in the {IBM
                 System\slash 38}",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "8",
  number =       "3",
  pages =        "245--252",
  year =         "1980",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 16:54:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Book:1980:UDC,
  author =       "R. V. Book and Sai Choi Kwan",
  title =        "On Uniquely Decipherable Codes with Two Codewords",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-29",
  number =       "4",
  pages =        "324--325",
  month =        apr,
  year =         "1980",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.1980.1675571",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 10 19:15:25 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1675571",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Book{Calvocoressi:1980:TSU,
  author =       "Peter Calvocoressi",
  title =        "Top secret ultra",
  publisher =    "Pantheon Books",
  address =      "New York, NY, USA",
  pages =        "132",
  year =         "1980",
  ISBN =         "0-394-51154-9",
  ISBN-13 =      "978-0-394-51154-2",
  LCCN =         "D810.C88C34 1980",
  bibdate =      "Tue Dec 01 08:23:32 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Diffie:1980:CAM,
  author =       "B. W. Diffie and M. E. Hellman and R. C. Merkle",
  title =        "Cryptographic Apparatus and Method",
  howpublished = "US Patent No. 4,200,770A.",
  day =          "29",
  month =        apr,
  year =         "1980",
  bibdate =      "Sat Nov 29 13:44:46 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Patent filed 6 September 1977.",
  URL =          "https://www.google.com/patents/US4200770",
  abstract =     "A cryptographic system transmits a computationally
                 secure cryptogram over an insecure communication
                 channel without prearrangement of a cipher key. A
                 secure cipher key is generated by the conversers from
                 transformations of exchanged transformed signals. The
                 conversers each possess a secret signal and exchange an
                 initial transformation of the secret signal with the
                 other converser. The received transformation of the
                 other converser's secret signal is again transformed
                 with the receiving converser's secret signal to
                 generate a secure cipher key. The transformations use
                 non-secret operations that are easily performed but
                 extremely difficult to invert. It is infeasible for an
                 eavesdropper to invert the initial transformation to
                 obtain either conversers' secret signal, or duplicate
                 the latter transformation to obtain the secure cipher
                 key.",
  acknowledgement = ack-nhfb,
}

@Article{Estell:1980:BW,
  author =       "Robert G. Estell",
  title =        "Benchmarks and watermarks",
  journal =      j-SIGMETRICS,
  volume =       "9",
  number =       "3",
  pages =        "39--44",
  month =        "Fall",
  year =         "1980",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1041883.1041885",
  ISSN =         "0163-5999 (print), 1557-9484 (electronic)",
  ISSN-L =       "0163-5999",
  bibdate =      "Thu Jun 26 10:55:53 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Historically, benchmark tests have been one of several
                 ways to size a computer system, and measure its
                 performance. Today, it is more important to test the
                 System Software than the machine hardware. (Thus the
                 term `watermark' (as on bond paper) for software
                 tests.) Watermarks of software suffer the same
                 limitations and risks as benchmarks of hardware: e.a.,
                 they should be supplemented with simulations, models,
                 and other analysis and design tools of our trade.
                 Perhaps most significantly, watermarks, like
                 benchmarks, can be biased by their creators.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMETRICS Performance Evaluation Review",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J618",
}

@TechReport{Gait:1980:CST,
  author =       "Jason Gait",
  title =        "Computer science and technology: maintenance testing
                 for the {Data Encryption Standard}",
  type =         "United States. National Bureau of Standards Special
                 publication",
  number =       "500-61",
  institution =  pub-NBS,
  address =      pub-NBS:adr,
  pages =        "25",
  year =         "1980",
  ISSN =         "0083-1883",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Manual{Gait:1980:MTD,
  author =       "Jason Gait",
  title =        "Maintenance testing for the {Data Encryption
                 Standard}",
  volume =       "500-61",
  number =       "500-61",
  organization = pub-NBS,
  address =      pub-NBS:adr,
  pages =        "iii + 25",
  month =        aug,
  year =         "1980",
  CODEN =        "XNBSAV",
  LCCN =         "T1.U52 no.500-61",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "NBS special publication Computer science and
                 technology",
  acknowledgement = ack-nhfb,
  govtdocnumber = "C 13.10:500-61 247",
  keywords =     "computers --- access control; Computers --- Access
                 control --- Passwords; cryptography --- data
                 processing; Cryptography --- Data processing; Data
                 encryption (Computer science); Electronic data
                 processing departments --- Security measures;
                 electronic data processing departments --- security
                 measures; Monte Carlo method",
}

@Manual{Gait:1980:VCH,
  author =       "Jason Gait",
  title =        "Validating the correctness of hardware implementations
                 of the {NBS Data Encryption Standard}",
  number =       "500-20",
  organization = pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "iv + 40",
  year =         "1980",
  LCCN =         "C 13.10:500-20/2 Government Information U.S.",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$2.25 (paperback)",
  series =       "NBS special publication. Computer science and
                 technology",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Code words; computers
                 --- access control --- code words; computers ---
                 testing; Computers --- Testing; Data encryption
                 (Computer science); data encryption (computer science);
                 Monte Carlo method",
}

@Book{Garlinski:1980:EW,
  author =       "J{\'o}zef Garli{\'n}ski",
  title =        "The {Enigma} war",
  publisher =    "Scribner",
  address =      "New York, NY, USA",
  pages =        "xx + 219 + 8",
  year =         "1980",
  ISBN =         "0-684-15866-3",
  ISBN-13 =      "978-0-684-15866-2",
  LCCN =         "D810.S7 G32 1980",
  bibdate =      "Tue Sep 4 06:00:21 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$14.95",
  acknowledgement = ack-nhfb,
  remark =       "Original British edition \cite{Garlinski:1979:IEW}.",
  subject =      "World War, 1939-1945; Secret service; Cryptography",
}

@Article{Goethals:1980:CAL,
  author =       "J.-M. Goethals and C. Couvreur",
  title =        "A cryptanalytic attack on the {Lu-Lee} public-key
                 cryptosystem",
  journal =      j-PHILIPS-J-RES,
  volume =       "35",
  number =       "4-5",
  pages =        "301--306",
  year =         "1980",
  CODEN =        "PHJRD9",
  ISSN =         "0165-5817",
  ISSN-L =       "0165-5817",
  MRclass =      "94A99",
  MRnumber =     "82b:94018",
  MRreviewer =   "Tai Yang Hwang",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Philips Journal of Research",
}

@Article{Gudes:1980:DCB,
  author =       "E. Gudes",
  title =        "The Design of a Cryptography Based Secure File
                 System",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "SE-6",
  number =       "5",
  pages =        "411--420",
  month =        sep # "\slash " # oct,
  year =         "1980",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/TSE.1980.230489",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 08:07:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng1980.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1702757",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@Book{Hamming:1980:CIT,
  author =       "R. W. (Richard Wesley) Hamming",
  title =        "Coding and information theory",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "xii + 239",
  year =         "1980",
  ISBN =         "0-13-139139-9",
  ISBN-13 =      "978-0-13-139139-0",
  LCCN =         "QA268 .H35 1980",
  bibdate =      "Fri Jun 24 21:02:55 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$19.95",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Information theory",
}

@MastersThesis{Hood:1980:EFS,
  author =       "William Chester Hood",
  title =        "Encryption as a file security measure in large
                 operating systems",
  type =         "Thesis ({M.S.})",
  school =       "University of Tennessee, Knoxville",
  address =      "Knoxville, TN, USA",
  pages =        "iv + 116",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "[103]-112.",
  keywords =     "Computers --- Access control.",
}

@TechReport{Knuth:1980:DLC,
  author =       "Donald E. Knuth",
  title =        "Deciphering a linear congruential encryption",
  type =         "Report",
  number =       "024800",
  institution =  "Department of Computer Science, Stanford University",
  address =      "Stanford, CA, USA",
  year =         "1980",
  bibdate =      "Wed Feb 22 13:51:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  remark =       "Published in \cite{Knuth:1985:DLC}.",
}

@Article{Konheim:1980:ICP,
  author =       "Alan G. Konheim and Marian H. Mack and Robert K.
                 McNeill and Bryant Tuckerman and Gerald Waldbaum",
  title =        "The {IPS} Cryptographic Programs",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "2",
  pages =        "253--283",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Cryptographic methods of data protection have taken on
                 new importance as computers have become faster and as
                 strong cryptographic algorithms, such as the Data
                 Encryption Standard (DES), have become available. But a
                 standard encipherment technique is only the first step
                 in applying cryptography in a computing center. This
                 paper discusses the Information Protection System
                 (IPS), a set of cryptographic application programs
                 designed to use the DES algorithm in a working
                 computing center. In designing IPS, several important
                 augmentations of DES were formulated.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; information protection system",
}

@Article{Leiss:1980:NSS,
  author =       "E. Leiss",
  title =        "A note on a signature system based on probabilistic
                 logic",
  journal =      j-INFO-PROC-LETT,
  volume =       "11",
  number =       "2",
  pages =        "110--113",
  day =          "??",
  month =        oct,
  year =         "1980",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "C4210 (Formal logic); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Computer Sci., Univ. of Houston, Houston, TX,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "data privacy; digitalised signature system;
                 probabilistic logic; requirements",
  treatment =    "A Application",
}

@Article{Lu:1980:AEG,
  author =       "Shyue Ching Lu",
  title =        "Addition to: {``The existence of good cryptosystems
                 for key rates greater than the message redundancy''
                 [IEEE Trans. Inform. Theory {\bf 25} (1979), no. 4,
                 475--477;\ MR 80g:94069]}",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "26",
  number =       "1",
  pages =        "129--129",
  year =         "1980",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1980.1056129",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94B99",
  MRnumber =     "80g:94069b",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Luccio:1980:CMC,
  author =       "F. Luccio and S. Mazzone",
  title =        "A cryptosystem for multiple communication",
  journal =      j-INFO-PROC-LETT,
  volume =       "10",
  number =       "4--5",
  pages =        "180--183",
  day =          "5",
  month =        jul,
  year =         "1980",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Nov 17 10:49:43 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See notes \cite{Meijer:1981:NCM,Hellman:1981:ACA}.",
  acknowledgement = ack-nhfb,
  classification = "723; B6120B (Codes); B6210L (Computer
                 communications); C5620 (Computer networks and
                 techniques); C6130 (Data handling techniques)",
  corpsource =   "Univ. of Pisa, Pisa, Italy",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "authentication; computer networks; cryptosystem;
                 cryptosystems; data transmission; encoding; multiple
                 communication; security of data",
  treatment =    "P Practical",
}

@InProceedings{Merkle:1980:PPK,
  author =       "R. C. Merkle",
  title =        "Protocols for public key cryptosystems",
  crossref =     "IEEE:1980:PSS",
  pages =        "??--??",
  year =         "1980",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 22]{Goldreich:1997:FMCb}.",
}

@Manual{NBS:1980:MO,
  author =       "{National Bureau of Standards}",
  title =        "{DES} Modes of Operation",
  volume =       "81",
  organization = "U. S. Department of Commerce",
  address =      "Washington, DC, USA",
  pages =        "16",
  month =        dec,
  year =         "1980",
  LCCN =         "C 13.52:81",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Federal information processing standards publication",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 22]{Biham:1998:TA}.",
  xxISBN =       "none",
}

@Book{Pearcey:1980:EDS,
  author =       "T. (Trevor) Pearcey",
  title =        "Encryption in data systems and communication",
  publisher =    "Caulfield Institute of Technology. Computer Abuse
                 Research and Bureau (CITCARB)",
  address =      "Caulfield, Victoria, Australia",
  pages =        "99",
  year =         "1980",
  ISBN =         "0-909176-14-0",
  ISBN-13 =      "978-0-909176-14-3",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Cover title. At head of title: Caulfield Institute of
                 Technology. CITCARB. [1]-10.",
  keywords =     "Cryptography; Data transmission systems --- Security
                 measures",
}

@Article{Pomerance:1980:P,
  author =       "Carl Pomerance and J. L. Selfridge and Samuel S.
                 {Wagstaff, Jr.}",
  title =        "The Pseudoprimes to $ 25 \cdot 10^9 $",
  journal =      j-MATH-COMPUT,
  volume =       "35",
  number =       "151",
  pages =        "1003--1026",
  month =        jul,
  year =         "1980",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  MRclass =      "10A40 (10-04 10A25)",
  MRnumber =     "82g:10030",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "B0210 (Algebra); C1110 (Algebra)",
  corpsource =   "Dept. of Math., Univ. of Illinois, Urbana, IL, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "Carmichael numbers; counting function; Lucas
                 sequences; mathematical analysis; primality;
                 pseudoprimes",
  referencedin = "Referenced in \cite[Ref. 9]{Silverman:1997:FGR}.",
  treatment =    "T Theoretical or Mathematical",
}

@Book{Pritchard:1980:DE,
  author =       "John Arthur Thomas (John A. T.) Pritchard",
  title =        "Data encryption",
  publisher =    pub-NAT-COMP-CENTRE,
  address =      pub-NAT-COMP-CENTRE:adr,
  pages =        "126 (or 118??)",
  year =         "1980",
  ISBN =         "0-85012-253-8",
  ISBN-13 =      "978-0-85012-253-4",
  LCCN =         "QA76.9.A25 P7",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "and bibliographies.",
  keywords =     "Computers --- Access control --- Passwords.",
}

@Book{Pronzini:1980:MCC,
  author =       "Bill Pronzini",
  title =        "Mummy!: a chrestomathy of crypt-ology",
  publisher =    "Arbor House",
  address =      "New York, NY, USA",
  pages =        "xii + 273",
  year =         "1980",
  ISBN =         "0-87795-271-X",
  ISBN-13 =      "978-0-87795-271-8",
  LCCN =         "PN 6120.95 M77 M86 1980",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Contents: Doyle, A.C. Lot no. 249.--Poe, E.A. Some
                 words with a mummy.--Benson, E.F. Monkeys.--Wollheim,
                 D.A. Bones.--Williams, T. The vengeance of
                 Nitocris.--Gautier, T. The mummy's foot.--Bloch, R. The
                 eyes of the mummy.--Powell, T. Charlie.--Hoch, E.D. The
                 weekend magus.--Lansdale, J.R. The princess.--Mayhar,
                 A. The eagle-claw rattle.--Grant, C.L. The other
                 room.--Malzberg, B.N. Revelation in seven
                 stages.--Bibliography.",
  price =        "US\$10.95",
  acknowledgement = ack-nhfb,
  keywords =     "mummies --- fiction",
}

@Article{Rivest:1980:DSC,
  author =       "R. L. Rivest",
  title =        "A description of a single-chip implementation of the
                 {RSA} cipher",
  journal =      "Lambda: the magazine of {VLSI} design",
  volume =       "1",
  number =       "3",
  pages =        "14--18",
  month =        "Fourth Quarter",
  year =         "1980",
  CODEN =        "VDESDP",
  ISSN =         "0273-8414",
  ISSN-L =       "0273-8414",
  bibdate =      "Thu Aug 21 06:25:34 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shulman:1980:BRB,
  author =       "David Shulman",
  title =        "Book Review: {{\booktitle{United States diplomatic
                 codes and ciphers 1775--1938}}: By Ralph E. Weber.
                 Chicago. xviii + 633 pp. Illus. \$49.95}",
  journal =      j-HIST-MATH,
  volume =       "7",
  number =       "4",
  pages =        "452--454",
  month =        nov,
  year =         "1980",
  CODEN =        "HIMADS",
  ISSN =         "0315-0860 (print), 1090-249X (electronic)",
  ISSN-L =       "0315-0860",
  bibdate =      "Wed Jun 26 06:17:21 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/histmath.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0315086080900142",
  acknowledgement = ack-nhfb,
  fjournal =     "Historia Mathematica",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03150860",
}

@Article{Shulman:1980:BRU,
  author =       "David Shulman",
  title =        "Book Review: {{\booktitle{United States diplomatic
                 codes and ciphers 1775--1938}}: By Ralph E. Weber.
                 Chicago. xviii + 633 pp. Illus. \$49.95}",
  journal =      j-HIST-MATH,
  volume =       "7",
  number =       "4",
  pages =        "452--454",
  month =        nov,
  year =         "1980",
  CODEN =        "HIMADS",
  ISSN =         "0315-0860 (print), 1090-249X (electronic)",
  ISSN-L =       "0315-0860",
  bibdate =      "Wed Jun 26 06:17:21 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/histmath.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0315086080900142",
  acknowledgement = ack-nhfb,
  fjournal =     "Historia Mathematica",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03150860/",
}

@Article{Snyder:1980:CAP,
  author =       "Samuel S. Snyder",
  title =        "Computer Advances Pioneered by Cryptologic
                 Organizations",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "2",
  number =       "1",
  pages =        "60--70",
  month =        jan # "\slash " # mar,
  year =         "1980",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:17 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1980/pdf/a1060.pdf;
                 http://www.computer.org/annals/an1980/a1060abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@MastersThesis{Sorkis:1980:USM,
  author =       "Michael Sorkis",
  title =        "Use of statistically matched codes in a data
                 encryption system",
  type =         "Thesis ({M.S.})",
  school =       "Southern Illinois University at Carbondale",
  address =      "Carbondale, IL, USA",
  pages =        "v + 91",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Book{USWD:1980:EC,
  author =       "{United States.War Dept} and {United
                 States.Adjutant-General's Office}",
  title =        "Elements of cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "165",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Training pamphlet; no. 3 War Dept document; no. 117
                 Training pamphlet (United States. War Dept.); no. 3.
                 Document (United States. War Dept.); no. 117",
  acknowledgement = ack-nhfb,
  annote =       "Photocopy.",
  keywords =     "Ciphers; Cryptography.",
}

@Article{Voukalis:1980:DFC,
  author =       "D. C. Voukalis",
  title =        "The distance factor in cryptosystems",
  journal =      j-INT-J-ELECTRON,
  volume =       "49",
  number =       "1",
  pages =        "73--75",
  year =         "1980",
  CODEN =        "IJELA2",
  ISSN =         "0020-7217",
  ISSN-L =       "0020-7217",
  MRclass =      "94B99",
  MRnumber =     "82k:94021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "International Journal of Electronics",
}

@Article{Voukalis:1980:GSE,
  author =       "D. C. Voukalis",
  title =        "A good solution of the encryption problem using matrix
                 code, distance factor and {PN} sequences",
  journal =      "Internat. J. Electron.",
  volume =       "48",
  number =       "3",
  pages =        "271--274",
  year =         "1980",
  CODEN =        "IJELA2",
  ISSN =         "0020-7217",
  MRclass =      "94A99",
  MRnumber =     "82b:94020",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "International Journal of Electronics",
}

@MastersThesis{Wells:1980:ADB,
  author =       "David L. Wells",
  title =        "Achieving data base protection through the use of
                 subkey encryption",
  type =         "Thesis ({Doctor of Engineering})",
  school =       "University of Wisconsin-Milwaukee",
  address =      "Milwaukee, WI, USA",
  pages =        "131",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Electronic data processing departments --- Security
                 measures.",
}

@Article{Williams:1980:MRP,
  author =       "H. C. Williams",
  title =        "A modification of the {RSA} public-key encryption
                 procedure",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "26",
  number =       "6",
  pages =        "726--729",
  year =         "1980",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1980.1056264",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94B99 (10A25)",
  MRnumber =     "81k:94041",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{ACE:1981:RPC,
  author =       "{American Council on Education}",
  title =        "Report of the {Public Cryptography Study Group}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "435--450",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jan 28 14:37:22 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See the opposing view in \cite{Davida:1981:CAR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@TechReport{Ahlswede:1981:BCG,
  author =       "R. Ahlswede and G. Dueck",
  title =        "Bad codes are good ciphers",
  type =         "Report",
  institution =  "Universit{\"a}t Bielefeld",
  address =      "Bielefeld, Germany",
  year =         "1981",
  bibdate =      "Sat Apr 20 12:15:46 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Submitted in Nov. 1980 to the proceedings of the
                 International Colloquium on Information Theory, to be
                 held at Budapest in August 1981.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:CHP,
  author =       "Anonymous",
  title =        "Corrections: {How Polish Mathematicians Deciphered the
                 Enigma, 3(3) 232}, {Reviews: H. H. Goldstine: A History
                 of Numerical Analysis, 3(3) 293}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "4",
  pages =        "407--407",
  month =        oct # "\slash " # dec,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 01 10:35:25 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Rejewski:1981:HPM,Salzer:1981:RHH}.",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a4400.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{Anonymous:1981:GIU,
  author =       "Anonymous",
  title =        "Guidelines for implementing and using the {NBS} Data
                 Encryption Standard",
  volume =       "74",
  publisher =    pub-NBS,
  address =      pub-NBS:adr,
  pages =        "39",
  year =         "1981",
  ISSN =         "0083-1816",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "United States. National Bureau of Standards. Federal
                 information processing standards publication, FIPS
                 PUB",
  acknowledgement = ack-nhfb,
}

@Article{Asmuth:1981:EAC,
  author =       "C. A. Asmuth and G. R. Blakley",
  title =        "An efficient algorithm for constructing a cryptosystem
                 which is harder to break than two other cryptosystems",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "7",
  number =       "6",
  pages =        "447--450",
  year =         "1981",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94B99 (68C05)",
  MRnumber =     "83d:94020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
}

@Article{Ayoub:1981:EKR,
  author =       "F. Ayoub",
  title =        "Encryption with keyed random permutations",
  journal =      j-ELECT-LETTERS,
  volume =       "17",
  number =       "17",
  pages =        "583--585",
  year =         "1981",
  CODEN =        "ELLEAK",
  ISSN =         "0013-5194",
  ISSN-L =       "0013-5194",
  MRclass =      "94B25 (05A05)",
  MRnumber =     "82h:94023",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Electronics Letters",
}

@Article{Baum:1981:RPC,
  author =       "Werner A. Baum and David H. Brandin and R. Creighton
                 Buck and George I. Davida and George Handelman and
                 Martin E. Hellman and Ira Michael Heyman and Wilfred
                 Kaplan and Daniel C. Schwartz",
  title =        "Report of the {Public Cryptography Study Group},
                 prepared for {American Council on Education, One Dupont
                 Circle, Washington, DC 20036, February 7, 1981}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "435--445",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jan 28 14:37:22 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See the opposing view in \cite{Davida:1981:CAR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Beesly:1981:CIW,
  author =       "Patrick Beesly",
  title =        "Cryptanalysis and its influence on the war at sea
                 1914--1918",
  publisher =    "U.S. Naval Academy",
  address =      "Annapolis, MD, USA",
  pages =        "13",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Xerox copy.",
  xxnote =       "Check publisher??",
}

@Article{Booth:1981:ASU,
  author =       "K. S. Booth",
  title =        "Authentication of Signatures Using Public Key
                 Encryption",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "772--774",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Sep 22 11:36:41 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "One of Needham and Schroeder's proposed signature
                 authentication protocols is shown to fail when there is
                 a possibility of compromised keys: this invalidates one
                 of the applications of their technique. A more
                 elaborate mechanism is proposed which does not require
                 a network clock, but does require a third party to the
                 transaction. The latter approach is shown to be
                 reliable in a fairly strong sence.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Brassard:1981:TLT,
  author =       "Gilles Brassard",
  title =        "A time-luck tradeoff in relativized cryptography",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "22",
  number =       "3",
  pages =        "280--311",
  month =        jun,
  year =         "1981",
  CODEN =        "JCSSBM",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:25:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0022000081900349",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Book{Brownell:1981:ODN,
  author =       "George A. Brownell",
  title =        "The origin and development of the {National Security
                 Agency}",
  volume =       "35",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "x + 98",
  year =         "1981",
  ISBN =         "0-89412-054-9",
  ISBN-13 =      "978-0-89412-054-1",
  LCCN =         "UB290 .B76 1981",
  bibdate =      "Mon Sep 13 06:41:04 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Edited by Wayne G. Barker. Originally published as
                 report of the Ad hoc Committee to Study the
                 Communications Intelligence Activities of the United
                 States, George A. Brownell, chairman.",
  series =       "A cryptographic series",
  acknowledgement = ack-nhfb,
}

@Article{Burchard:1981:NNF,
  author =       "Hank Burchard",
  title =        "News and Notices: {Finerman and Lee Receive ACM
                 Awards}; Summer Positions at {Digital Computer Museum};
                 {CBI Fellowship 1982--1983}; {GMD} Activities in the
                 History of Computing; Request for Articles; {Edwards}
                 Speaks at {Digital Computer Museum}; Exhibit of Cipher
                 Machines",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "4",
  pages =        "410--413",
  month =        oct # "\slash " # dec,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:18 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a4410.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{CBEMA:1981:ANS,
  author =       "{Computer and Business Equipment Manufacturers
                 Association} and {American National Standards
                 Institute}",
  title =        "{American National Standard Data Encryption
                 Algorithm}",
  publisher =    pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "16",
  day =          "30",
  month =        dec,
  year =         "1981",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "ANSI X3.92-1981.",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory --- standards --- United States;
                 computers --- access control --- standards --- United
                 States; data protection --- standards --- United
                 States",
}

@Article{Chaum:1981:UEM,
  author =       "D. Chaum",
  title =        "Untraceable electronic mail, return addresses, and
                 digital pseudonyms",
  journal =      j-CACM,
  volume =       "24",
  number =       "2",
  pages =        "84--88",
  month =        feb,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1019.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "information hiding; steganography",
}

@Book{Clark:1981:ECC,
  author =       "George C. {Clark, Jr.} and J. Bibb Cain",
  title =        "Error-correction coding for digital communications",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  pages =        "xii + 422",
  year =         "1981",
  ISBN =         "0-306-40615-2",
  ISBN-13 =      "978-0-306-40615-7",
  LCCN =         "TK5102.5 .C52",
  bibdate =      "Mon Nov 30 08:53:48 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Periodical{Crypto:1981:ACP,
  author =       "CRYPTO",
  title =        "Advances in cryptology: proceedings of {CRYPTO}",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  pages =        "various",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Volumes for 1984 to 1989 were published in the
                 Springer-Verlag Lecture Notes in Computer Science
                 series.",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Congresses;
                 Cryptography --- Congresses.",
}

@Article{Davida:1981:CAR,
  author =       "George I. Davida",
  title =        "The Case Against Restraints on Non-Governmental
                 Research in Cryptography",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "445--450",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jan 28 14:39:33 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This is an opposing view published with
                 \cite{ACE:1981:RPC}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Davida:1981:DES,
  author =       "George I. Davida and David L. Wells and John B. Kam",
  title =        "A Database Encryption System with Subkeys",
  journal =      j-TODS,
  volume =       "6",
  number =       "2",
  pages =        "312--328",
  month =        jun,
  year =         "1981",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  MRclass =      "68B15",
  MRnumber =     "82f:68020",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "Compendex database; Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1981-6-2/p312-davida/p312-davida.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1981-6-2/p312-davida/",
  abstract =     "A new cryptosystem that is suitable for database
                 encryption is presented. The system has the important
                 property of having subkeys that allow the encryption
                 and decryption of fields within a record. The system is
                 based on the Chinese Remainder Theorem.",
  acknowledgement = ack-nhfb,
  annote =       "Subkeys allow the encryption and decryption of fields
                 within a record. The system is based on the Chinese
                 Remainder Theorem.",
  classification = "723",
  fjournal =     "Association for Computing Machinery. Transactions on
                 Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "codes, symbolic; data base systems; data security;
                 databases; decryption; encryption; subkeys",
  subject =      "Data --- Data Encryption (E.3)",
}

@Article{Denning:1981:MKG,
  author =       "Dorothy E. Denning and Fred B. Schneider",
  title =        "Master keys for group sharing",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "1",
  pages =        "23--25",
  day =          "13",
  month =        feb,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94B99",
  MRnumber =     "82d:94046",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also note \cite{Brouwer:1982:NMK}.",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes)",
  corpsource =   "Computer Sci. Dept., Purdue Univ., W. Lafayette, IN,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "Diffie and Hellman's public-key distribution scheme;
                 encoding; group sharing; master key; Shamir's threshold
                 scheme",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Denning:1981:MMK,
  author =       "D. E. Denning and H. Meijer and F. B. Schneider",
  title =        "More on master keys for group sharing",
  journal =      j-INFO-PROC-LETT,
  volume =       "13",
  number =       "3",
  pages =        "125--126",
  day =          "13",
  month =        dec,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C0230 (Economic, social and
                 political aspects of computing); C6130 (Data handling
                 techniques)",
  corpsource =   "Computer Sci. Dept., Purdue Univ., West Lafayette, IN,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "cryptography; encryption; group sharing; master keys",
  treatment =    "P Practical",
}

@Article{Denning:1981:SRR,
  author =       "Peter J. Denning and David H. Brandin",
  title =        "Special Report: Report of the {Public Cryptography
                 Study Group}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "434--434",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 01 07:47:27 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Gifford:1981:CSI,
  author =       "David K. Gifford",
  title =        "Cryptographic sealing for information secrecy and
                 authentication",
  journal =      j-OPER-SYS-REV,
  volume =       "15",
  number =       "5",
  pages =        "123--124",
  month =        dec,
  year =         "1981",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Hellman:1981:ACA,
  author =       "M. E. Hellman",
  title =        "Another cryptanalytic attack on {``A cryptosystem for
                 multiple communication''} {[Inform. Process. Lett. {\bf
                 10}(4--5), 5 July 1980, pp. 180--183]}",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "4",
  pages =        "182--183",
  day =          "13",
  month =        aug,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Luccio:1980:CMC,Meijer:1981:NCM}.",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes)",
  corpsource =   "Dept. of Electrical Engng., Stanford Univ., Stanford,
                 CA, USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "authentification; cryptography; cryptosystem; data
                 communication systems; multiple communication; plain
                 text attack; security; text attack",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Henry:1981:BJB,
  author =       "P. S. Henry",
  title =        "{B.S.T.J.} Briefs: Fast Decryption Algorithm for the
                 Knapsack Cryptographic System",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "60",
  number =       "5",
  pages =        "767--773",
  month =        may # "--" # jun,
  year =         "1981",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Tue Nov 9 11:15:56 MST 2010",
  bibsource =    "http://bstj.bell-labs.com/oldfiles/year.1981/BSTJ.1981.6005.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://bstj.bell-labs.com/BSTJ/images/Vol60/bstj60-5-767.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@TechReport{Hershey:1981:DLP,
  author =       "J. E. (John E.) Hershey",
  title =        "The discrete logarithm public cryptographic system",
  type =         "NTIA report",
  number =       "81-81, PB82-130097",
  institution =  "U.S. Dept. of Commerce, National Telecommunications
                 and Information Administration",
  address =      "Washington, DC, USA (??)",
  pages =        "iv + 40",
  month =        sep,
  year =         "1981",
  LCCN =         "C 60.10: 81-81 Govt Pub",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; finite fields (algebra)",
}

@TechReport{IDC:1981:DE,
  author =       "{International Data Corporation}",
  title =        "Data encryption",
  type =         "Research memorandum",
  number =       "IDC \#ISPS-M81-10.",
  institution =  "International Data Corporation",
  address =      "Framingham, MA, USA",
  pages =        "30",
  month =        oct,
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ingemarsson:1981:UAS,
  author =       "Ingemar Ingemarsson and C. K. Wong",
  title =        "Use Authentication Scheme for Shared Data Based on a
                 Trap-Door One-Way Function",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "2",
  pages =        "63--67",
  month =        apr,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Jan 29 09:23:05 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "data base systems",
}

@TechReport{IRD:1981:DTV,
  author =       "{International Resource Development, Inc.}",
  title =        "Data, text, and voice encryption equipment",
  type =         "Report",
  number =       "183",
  institution =  "IRD",
  address =      "30 High St., Norwalk, CT 06851, USA",
  pages =        "vi + 154",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography equipment industry; Cryptography
                 equipment industry --- United States; Market surveys
                 --- United States.",
}

@TechReport{Juenemann:1981:DES,
  author =       "Robert R. Juenemann",
  title =        "The {Data Encryption Standard} vs. Exhaustive Search",
  type =         "Report",
  institution =  "Satellite Business Systems",
  address =      "McLean, VA, USA",
  day =          "5",
  month =        feb,
  year =         "1981",
  bibdate =      "Fri May 21 14:57:54 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Konheim:1981:CP,
  author =       "Alan G. Konheim",
  title =        "Cryptography, a primer",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xiv + 432",
  year =         "1981",
  ISBN =         "0-471-08132-9",
  ISBN-13 =      "978-0-471-08132-6",
  LCCN =         "Z103 .K66 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "A Wiley-interscience publication",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; telecommunication ---
                 security measures",
}

@Article{Lamport:1981:TNP,
  author =       "Leslie Lamport",
  title =        "Technical Note: Password Authentication with Insecure
                 Communication",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "770--772",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 06:57:19 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Lamport81;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  oldlabel =     "Lamport81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Lamport81",
}

@Book{Lange:1981:TC,
  author =       "Andr{\'e} Lange and E. A. Soudart",
  title =        "Treatise on cryptography",
  volume =       "36",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "xvi + 168",
  year =         "1981",
  ISBN =         "0-89412-055-7 (paperback)",
  ISBN-13 =      "978-0-89412-055-8 (paperback)",
  LCCN =         "Z104.L2613 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: Traite de cryptographie / par
                 Andr{\'e} Lange et E.-A. Soudart. ``Plus many problems
                 in French for the solver''",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Langie:1981:CSS,
  author =       "Andre Langie",
  title =        "Cryptography: a study on secret writings",
  volume =       "38",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "vii + 192",
  year =         "1981",
  ISBN =         "0-89412-061-1",
  ISBN-13 =      "978-0-89412-061-9",
  LCCN =         "Z104 .L28 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: De la cryptographie. Reprint of an
                 unspecified previous ed. Bibliography: p. 158.",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Lauer:1981:CSC,
  author =       "Rudolph F. Lauer",
  title =        "Computer simulation of classical substitution
                 cryptographic systems",
  volume =       "32",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "xi + 111",
  year =         "1981",
  ISBN =         "0-89412-050-6",
  ISBN-13 =      "978-0-89412-050-3",
  LCCN =         "Z104 .L38 1981",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "basic (computer program language); cryptography;
                 cryptography -- computer programs; electronic data
                 processing -- cryptography",
}

@Article{Lieberherr:1981:UCD,
  author =       "K. Lieberherr",
  title =        "Uniform complexity and digital signatures",
  journal =      j-THEOR-COMP-SCI,
  volume =       "16",
  number =       "1",
  pages =        "99--110",
  month =        oct,
  year =         "1981",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:36:07 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs1980.bib",
  acknowledgement = ack-nhfb,
  classification = "C4240 (Programming and algorithm theory)",
  corpsource =   "Dept. of Electrical Engng. and Computer Sci.,
                 Princeton Univ., Princeton, NJ, USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "computational complexity; digital signatures; security
                 of data; signature checking; signature production;
                 uniform complexity",
  pubcountry =   "Netherlands",
  treatment =    "T Theoretical or Mathematical",
}

@Article{McEliece:1981:SSR,
  author =       "R. J. McEliece and D. V. Sarwate",
  title =        "On sharing secrets and {Reed--Solomon} codes",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "583--584",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "94B35",
  MRnumber =     "82h:94024",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@TechReport{Meijer:1981:DSS,
  author =       "Henk Meijer and Selim G. Akl",
  title =        "Digital signature schemes",
  type =         "Technical report",
  number =       "81-120",
  institution =  "Department of Computing and Information Science,
                 Queen's University",
  address =      "Kingston, ON, Canada",
  pages =        "10",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Meijer:1981:NCM,
  author =       "H. Meijer",
  title =        "A note on {``A cryptosystem for multiple
                 communication''} {[Inform. Process. Lett. {\bf
                 10}(4--5), 5 July 1980, pp. 180--183]}",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "4",
  pages =        "179--181",
  day =          "13",
  month =        aug,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Luccio:1980:CMC,Hellman:1981:ACA}.",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes)",
  corpsource =   "Dept. of Math. and Statistics, Queen's Univ.,
                 Kingston, Ont., Canada",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "cryptography; cryptosystem; cyphertext; data
                 communication systems; multiple communication; node;
                 plain-text attack; secret messages; security",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Merkle:1981:SME,
  author =       "Ralph C. Merkle and Martin E. Hellman",
  title =        "On the Security of Multiple Encryption",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "465--467",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68K05 (94A24 94B99)",
  MRnumber =     "82f:68103",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  referencedin = "Referenced in \cite[Ref. 20]{Biham:1998:TA}.",
}

@MastersThesis{Mulherin:1981:FDE,
  author =       "Michael Hugh Mulherin",
  title =        "A file data encryption system using {Galois} fields",
  volume =       "52731",
  type =         "Thesis ({M.Sc.Cs.})",
  publisher =    "National Library of Canada",
  school =       "University of New Brunswick",
  address =      "Ottawa, ON, Canada",
  pages =        "174",
  year =         "1981",
  ISBN =         "0-315-04837-9",
  ISBN-13 =      "978-0-315-04837-9",
  ISSN =         "0227-3845",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "2 microfiche(s) (174 fr.)",
  series =       "Canadian theses on microfiche = Th{\`e}ses canadiennes
                 sur microfiche",
  acknowledgement = ack-nhfb,
}

@Article{Muller:1981:SRP,
  author =       "Winfried B. M{\"u}ller and Wilfried N{\"o}bauer",
  title =        "Some remarks on public-key cryptosystems",
  journal =      "Studia Sci. Math. Hungar.",
  volume =       "16",
  number =       "1-2",
  pages =        "71--76",
  year =         "1981",
  CODEN =        "SSMHAX",
  ISSN =         "0081-6906",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "85e:94018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Studia Scientiarum Mathematicarum Hungarica. A
                 Quarterly of the Hungarian Academy of Sciences",
}

@Book{OConnell:1981:CDE,
  author =       "Richard O'Connell",
  title =        "Crypto-ease: a data encryption dictionary",
  publisher =    "Atlantis Editions",
  address =      "Philadelphia, PA, USA",
  pages =        "33",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Dictionaries;
                 Dictionaries; Electronic data processing departments
                 --- Security measures",
}

@TechReport{Rabin:1981:HES,
  author =       "Michael O. Rabin",
  title =        "How to exchange secrets by oblivious transfer",
  type =         "Technical Report",
  number =       "TR-81",
  institution =  "Aiken Computation Laboratory, Harvard University",
  address =      "Cambridge, MA, USA",
  year =         "1981",
  bibdate =      "Sun Mar 11 11:14:25 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://eprint.iacr.org/2005/187.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Rejewski:1981:HPM,
  author =       "Marian Rejewski",
  title =        "How {Polish} Mathematicians Deciphered the {Enigma}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "3",
  pages =        "213--234",
  month =        jul # "\slash " # sep,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:18 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Afterwords by Cipher A. Deavours and I. J. Good. This
                 article was entitled ``Jak matematycy polscy
                 rozszyfrowz Enigmg{\c{e}}'' in the Annals of the Polish
                 Mathematical Society, Series II, Wiadomo{\'s}ci
                 Matematyczne, Volume 23, 1980, 1-28, translated by Joan
                 Stepenske. See minor correction
                 \cite{Anonymous:1981:CHP}.",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a3213.pdf;
                 http://www.computer.org/annals/an1981/a3213abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Salzer:1981:RHH,
  author =       "Herbert E. Salzer and Eric A. Weiss and Henry S. Tropp
                 and Jane Smith and Robert W. Rector",
  title =        "Reviews: {H. H. Goldstine: A History of Numerical
                 Analysis}; {Electronics: An Age of Innovation}; {J. A.
                 N. Lee: Banquet Anecdotes and Conference Excerpts}; {R.
                 L. Wexelblat: History of Programming Languages}:
                 Capsule Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "3",
  pages =        "289--302",
  month =        jul # "\slash " # sep,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:18 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See minor correction \cite{Anonymous:1981:CHP}.",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a3289.pdf;
                 http://www.computer.org/annals/an1981/a3289abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@MastersThesis{Seshadri:1981:KPP,
  author =       "Raghavan Seshadri",
  title =        "Knapsack problems in public key encryption systems",
  type =         "Thesis ({M.S.})",
  school =       "University of Oklahoma",
  address =      "Norman, OK, USA",
  pages =        "vii + 99",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Sidhu:1981:APG,
  author =       "Deepinder P. Sidhu",
  title =        "Authentication Protocols for General Communication
                 Channels",
  crossref =     "IEEE:1981:CLC",
  pages =        "30--40",
  year =         "1981",
  bibdate =      "Sat Sep 25 20:21:07 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Brookhaven Natl Lab, Upton, NY,USA",
  classification = "723; 731",
  conference =   "6th Conference on Local Computer Networks",
  conflocation = "Minneapolis, MN, USA",
  journalabr =   "Conf Local Comput Networks",
  keywords =     "authentication protocols; communication channels;
                 completeness; computer networks; deadlock freeness;
                 encryption; fifo channels; liveness; non-fifo channels;
                 public-key encryption",
  meetingaddress = "Minneapolis, MN, USA",
  sponsor =      "Univ of Minn, Comput Cent, Minneapolis, USA; IEEE,
                 Twin Cities Chapter, USA; IEEE Comput Soc Tech Comm on
                 Comput Commun, Los Alamitos, Calif, USA",
}

@Article{Smith:1981:VEP,
  author =       "Michael K. Smith and Ann E. Siebert and Benedetto L.
                 DiVito and Donald I. Good",
  title =        "A verified encrypted packet interface",
  journal =      j-SIGSOFT,
  volume =       "6",
  number =       "3",
  pages =        "13--16",
  month =        jul,
  year =         "1981",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1010832.1010838",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:11:35 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsoft1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Book{USNBS:1981:GIU,
  author =       "{United States.National Bureau of Standards}",
  title =        "Guidelines for implementing and using the {NBS Data
                 Encryption Standard}: category: {ADP} operations,
                 subcategory: computer security",
  publisher =    pub-NBS,
  address =      pub-NBS:adr,
  pages =        "39",
  day =          "1",
  month =        apr,
  year =         "1981",
  CODEN =        "FIPPAT",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "FIPS Pub; 74",
  acknowledgement = ack-nhfb,
  keywords =     "Computer networks --- Security measures --- Standards;
                 Computers --- Access control --- Standards; Electronic
                 data processing departments --- Security measures;
                 Standards",
}

@Article{Wegman:1981:NHF,
  author =       "Mark N. Wegman and J. Lawrence Carter",
  title =        "New Hash Functions and Their Use in Authentication and
                 Set Equality",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "22",
  number =       "3",
  pages =        "265--279",
  month =        jun,
  year =         "1981",
  CODEN =        "JCSSBM",
  ISSN =         "0022-0000",
  ISSN-L =       "0022-0000",
  bibdate =      "Sat Jan 25 17:38:12 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  abstract =     "In this paper we exhibit several new classes of hash
                 functions with certain desirable properties, and
                 introduce two novel applications for hashing which make
                 use of these functions. One class contains a small
                 number of functions, yet is almost universal2. If the
                 functions hash n-bit long names into m-bit indices,
                 then specifying a member of the class requires only
                 O((m + log2 log2(n)) g log2(n)) bits as compared to
                 O(n) bits for earlier techniques. For long names, this
                 is about a factor of m larger than the lower bound of $
                 m + \log_2 n \log_2 m $ bits. An application of this
                 class is a provably secure authentication technique for
                 sending messages over insecure lines. A second class of
                 functions satisfies a much stronger property than
                 universal2. We present the application of testing sets
                 for equality. The authentication technique allows the
                 receiver to be certain that a message is genuine. An
                 ``enemy'' even one with infinite computer resources
                 cannot forge or modify a message without detection. The
                 set equality technique allows operations including
                 ``add member to set,'' ``delete member from set,'' and
                 ``test two sets for equality'' to be performed in
                 expected constant time and with less than a specified
                 probability of error.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
  journalabr =   "J Comput Syst Sci",
  keywords =     "computer metatheory; cryptography; hash functions",
}

@Article{Anonymous:1982:BRCa,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Cryptography: a primer}}:
                 Alan G. Konheim: New York: John Wiley and Sons, 1981.
                 xiv + 432 pp. \$34.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "84--84",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488290030X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Anonymous:1982:CC,
  author =       "Anonymous",
  title =        "A course in cryptanalysis",
  volume =       "33, 34",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  year =         "1982",
  ISBN =         "0-89412-052-2 (vol. 1), 0-89412-053-0 (vol. 2)",
  ISBN-13 =      "978-0-89412-052-7 (vol. 1), 978-0-89412-053-4 (vol.
                 2)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Originally published in 1942. Revised and enlarged. v.
                 1. Explanatory text and short exercises; v. 2. Figures
                 and cipher texts.",
  keywords =     "Cryptography.",
}

@Misc{Anonymous:1982:ESS,
  author =       "Anonymous",
  title =        "Encryption scrambling the satellite signal for
                 security",
  publisher =    "Instant Replay",
  address =      "Arlington, VA, USA",
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "1 sound cassette (75 min.)",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: ``Space communications in the
                 80's.'' Presented at the Seventh Annual Conference of
                 the Public Service Satellite Consortium, October 19-22,
                 1982, Washington, DC",
  keywords =     "Telecommunication.",
}

@Article{Anonymous:1982:NNPa,
  author =       "Anonymous",
  title =        "News and Notices: {Pioneer Award Established by
                 Computer Society}; {Undergraduate Paper Competition in
                 Cryptology}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "4",
  number =       "2",
  pages =        "184--184",
  month =        apr # "\slash " # jun,
  year =         "1982",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1982/pdf/a2184.pdf;
                 http://www.computer.org/annals/an1982/a2184abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{Bamford:1982:PPR,
  author =       "James Bamford",
  title =        "The puzzle palace: a report on {America}'s most secret
                 agency",
  publisher =    pub-HOUGHTON-MIFFLIN,
  address =      pub-HOUGHTON-MIFFLIN:adr,
  pages =        "465",
  year =         "1982",
  ISBN =         "0-395-31286-8",
  ISBN-13 =      "978-0-395-31286-5",
  LCCN =         "KF7683.N32 B3",
  bibdate =      "Thu Jan 21 14:10:29 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "United States National Security Agency",
}

@Article{Bauer:1982:KVM,
  author =       "Friedrich L. Bauer",
  title =        "{Kryptologie --- Verfahren und Maximen}. ({German})
                 [{Cryptology} --- procedures and maxims]",
  journal =      j-INFORMATIK-SPEKTRUM,
  volume =       "5",
  number =       "??",
  pages =        "74--81",
  month =        "????",
  year =         "1982",
  CODEN =        "INSKDW",
  ISSN =         "0170-6012 (print), 1432-122X (electronic)",
  ISSN-L =       "0170-6012",
  MRclass =      "94A99 94-01",
  bibdate =      "Fri Aug 21 15:10:11 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/b/bauer-friedrich-ludwig.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  ZMnumber =     "0488.94019",
  acknowledgement = ack-nhfb,
  author-dates = "Friedrich (``Fritz'') Ludwig Bauer (10 June 1924--26
                 March 2015)",
  fjournal =     "Informatik Spektrum",
  journal-URL =  "http://link.springer.com/journal/287",
  keywords =     "code systems; cryptology; encryption; survey of
                 classical cryptographic methods",
  language =     "German",
  zmid =         "03769510",
}

@MastersThesis{Becker:1982:EDE,
  author =       "Michael S. Becker",
  title =        "An exercise with the {Data Encryption Standard}",
  type =         "Master of Science, Plan II",
  school =       "Department of Electrical Engineering and Computer
                 Sciences, University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "56",
  year =         "1982",
  LCCN =         "TK7 .U5 1982:2:B-C",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Beker:1982:CSP,
  author =       "Henry Beker and F. C. (Frederick Charles) Piper",
  title =        "Cipher systems: the protection of communications",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "427",
  year =         "1982",
  ISBN =         "0-471-89192-4",
  ISBN-13 =      "978-0-471-89192-5",
  LCCN =         "Z104 .B39 1982",
  bibdate =      "Sun Nov 20 19:54:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "According to the introduction to Fred Piper's 2005
                 Turing Lecture (Computer Journal 48(2), 145--156, March
                 2005, this is one of the first books published on the
                 protection of communications.",
  subject =      "Ciphers; Cryptography",
}

@InProceedings{Blum:1982:CFT,
  author =       "Manuel Blum",
  title =        "Coin Flipping by Telephone --- a Protocol for Solving
                 Impossible Problems",
  crossref =     "Rudolph:1982:HTI",
  pages =        "133--137",
  year =         "1982",
  bibdate =      "Sun Mar 11 10:10:54 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/conf/compcon/compcon1982.html#Blum82;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "See published article \cite{Blum:1983:CFT}.",
}

@InProceedings{Blum:1982:HGC,
  author =       "Manuel Blum and Silvio Micali",
  title =        "How to Generate Cryptographically Strong Sequences of
                 Pseudo-Random Bits",
  crossref =     "IEEE:1982:ASF",
  pages =        "112--117",
  year =         "1982",
  DOI =          "https://doi.org/10.1109/SFCS.1982.72",
  bibdate =      "Wed Dec 21 06:47:00 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  xxpages =      "464--479",
}

@Book{Bosworth:1982:CCC,
  author =       "Bruce Bosworth",
  title =        "Codes, ciphers, and computers: an introduction to
                 information security",
  publisher =    pub-HAYDEN-BOOK,
  address =      pub-HAYDEN-BOOK:adr,
  pages =        "259",
  year =         "1982",
  ISBN =         "0-8104-5149-2",
  ISBN-13 =      "978-0-8104-5149-0",
  LCCN =         "Z103.B58 1982",
  bibdate =      "Sat Apr 20 11:51:26 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Branstad:1982:ISS,
  author =       "Dennis K. Branstad and Miles E. Smid",
  title =        "Integrity and security standards based on
                 cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "255--260",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488290044X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Brouwer:1982:NMK,
  author =       "Andries E. Brouwer and Peter {van Emde Boas}",
  title =        "A note on: {``Master keys for group sharing'' [Inform.
                 Process. Lett. {\bf 12} (1981), no. 1, 23--25; MR
                 82d:94046] by D. E. Denning and F. B. Schneider}",
  journal =      j-INFO-PROC-LETT,
  volume =       "14",
  number =       "1",
  pages =        "12--14",
  day =          "27",
  month =        mar,
  year =         "1982",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94B99",
  MRnumber =     "83h:94019",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Denning:1981:MKG}.",
  acknowledgement = ack-nhfb,
  classification = "C6130 (Data handling techniques)",
  corpsource =   "Dept. of Pure Math., Math. Centre, Amsterdam,
                 Netherlands",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "cryptography; group keys; group sharing; master keys",
  treatment =    "P Practical",
}

@Article{Buck:1982:PCS,
  author =       "R. Creighton Buck",
  title =        "The public cryptography study group",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "249--254",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900438",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{DeMillo:1982:CP,
  author =       "Richard A. DeMillo and Nancy A. Lynch and Michael J.
                 Merritt",
  title =        "Cryptographic protocols",
  crossref =     "ACM:1982:PFA",
  pages =        "383--400",
  year =         "1982",
  bibdate =      "Wed Feb 20 18:33:45 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Denning:1982:CDS,
  author =       "Dorothy Elizabeth Robling Denning",
  title =        "Cryptography and data security",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xiii + 400",
  year =         "1982",
  ISBN =         "0-201-10150-5",
  ISBN-13 =      "978-0-201-10150-8",
  LCCN =         "QA76.9.A25 .D46 1982",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$22.95",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control; cryptography; data
                 protection",
}

@Article{Diffie:1982:CTF,
  author =       "Whitfield Diffie",
  title =        "Cryptographic technology: fifteen year forecast",
  journal =      j-SIGACT,
  volume =       "14",
  number =       "4",
  pages =        "38--57",
  month =        "Fall--Winter",
  year =         "1982",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1008902.1008903",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 08:21:21 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "This paper examines the forces driving public
                 development of cryptography today and projects the
                 course of the field over the next fifteen years with
                 attention to the possible influence of government
                 regulation. This paper was prepared, under contractual
                 arrangements to CRC Systems, in support of the Commerce
                 Department (National Telecommunications and Information
                 Administration, Special Projects Office) response to a
                 White House Office of Science and Technology Policy
                 request that the secretaries of the Departments of
                 Commerce and Defense propose a national policy on
                 cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@InCollection{Diffie:1982:CVP,
  author =       "Whitfield Diffie",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Conventional versus public key cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "41--72",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 720",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@Article{Ecker:1982:MGE,
  author =       "A. Ecker",
  title =        "{{\"U}ber die mathematischen Grundlagen einiger
                 Chiffrierverfahren}. ({German}) [{On} the mathematical
                 foundations of some cryptosystems]",
  journal =      j-COMPUTING,
  volume =       "29",
  number =       "4",
  pages =        "277--287",
  year =         "1982",
  CODEN =        "CMPTA2",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  MRclass =      "94B99 (10A10 20A05)",
  MRnumber =     "84d:94023",
  MRreviewer =   "J. H. van Lint",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Computing. Archiv f{\"u}r Informatik und Numerik",
  journal-URL =  "http://link.springer.com/journal/607",
  language =     "German",
}

@Article{Feynman:1982:SPC,
  author =       "Richard P. Feynman",
  title =        "Simulating physics with computers",
  journal =      j-INT-J-THEOR-PHYS,
  volume =       "21",
  number =       "6--7",
  pages =        "467--488",
  year =         "1982",
  CODEN =        "IJTPBM",
  DOI =          "https://doi.org/10.1007/BF02650179",
  ISSN =         "0020-7748",
  ISSN-L =       "0020-7748",
  MRclass =      "68J99",
  MRnumber =     "658311",
  bibdate =      "Sat Apr 9 15:46:55 2011",
  bibsource =    "ftp://ftp.math.utah.edu/pub/bibnet/authors/f/feynman-richard-p.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Physics of computation, Part II (Dedham, Mass.,
                 1981)",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Theoretical Physics",
  journal-URL =  "http://link.springer.com/journal/10773",
  remark =       "This paper contains an early proposal for quantum
                 cryptography.",
  xxvolume =     "B2",
}

@Book{Foster:1982:CM,
  author =       "Caxton C. Foster",
  title =        "Cryptanalysis for microcomputers",
  publisher =    pub-HAYDEN-BOOK,
  address =      pub-HAYDEN-BOOK:adr,
  pages =        "333",
  year =         "1982",
  ISBN =         "0-8104-5174-3 (paperback)",
  ISBN-13 =      "978-0-8104-5174-2 (paperback)",
  LCCN =         "Z103.F67 1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$14.95",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers --- Data processing; Cryptography --- Data
                 processing; Microcomputers.",
}

@Article{Gabriel:1982:VPI,
  author =       "Richard Gabriel",
  title =        "{Verschl{\"u}sselungsabbildungen mit Pseudo-Inversen,
                 Zufallsgeneratoren und T{\"a}felungen}. ({German})
                 [{Encryption} mapping with pseudoinverses, random
                 generators and tilings]",
  journal =      "Kybernetika (Prague)",
  volume =       "18",
  number =       "6",
  pages =        "485--504",
  year =         "1982",
  CODEN =        "KYBNAI",
  ISSN =         "0023-5954",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "85a:94023",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Kybernetika",
  language =     "German",
}

@Manual{Gersho:1982:ACR,
  author =       "Allen Gersho",
  title =        "Advances in cryptography: a report on {CRYPTO} 81",
  number =       "82-04",
  publisher =    "Department of Electrical and Computer Engineering,
                 University of California, Santa Barbara",
  address =      "Santa Barbara, CA, USA",
  pages =        "viii + 156",
  year =         "1982",
  LCCN =         "QA76.9.A25 I14 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``Sponsored by the Data and Computer Communications
                 Committees of the IEEE Communications Society with the
                 cooperation of the Dept. of Electrical and Computer
                 Engineering, University of California, Santa Barbara.''
                 --- Verso of t.p. ``August 20, 1982.'' Includes
                 bibliographies.",
  series =       "ECE report",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses",
}

@Article{Gifford:1982:CSI,
  author =       "D. K. Gifford and A. K. Jones",
  title =        "Cryptographic Sealing for Information Security and
                 Authentication",
  journal =      j-CACM,
  volume =       "25",
  number =       "4",
  pages =        "274--286",
  month =        apr,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "A new protection mechanism is described that provides
                 general primitives for protection and authentication.
                 The mechanism is based on the idea of sealing an object
                 with a key. Sealed objects are self-authenticating, and
                 in the absence of an appropriate set of keys, only
                 provide information about the size of their contents.
                 New keys can be freely created at any time, and keys
                 can also be derived from existing keys with operators
                 that include Key-And and Key-Or. This flexibility
                 allows the protection mechanism to implement common
                 protection mechanisms such as capabilities, access
                 control lists, and information flow control. The
                 mechanism is enforced with a synthesis of conventional
                 cryptography, public-key cryptography, and a threshold
                 scheme.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "CACM protection operating cryptography",
}

@InProceedings{Gilmour-Bryson:1982:CDT,
  author =       "A. Gilmour-Bryson",
  title =        "Coding of the depositions of the {Templars}",
  crossref =     "Ciampi:1982:EVS",
  pages =        "451--467",
  year =         "1982",
  bibdate =      "Sat Feb 17 14:59:04 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "From {\em Computing Reviews\/}: ``The article reports
                 on the progress of an historical study using a computer
                 for statistical analysis. The subject of the study is a
                 mass of trial depositions of the Knights Templar. The
                 purpose of the project is to find statistical
                 regularities in the large amount of testimony and to
                 create a model for similar studies.

                 The Order of the Knights Templar, founded around 1100,
                 was the first Christian military order. After the
                 Crusades, in the early fourteenth century, 127 articles
                 of accusation were brought against the order, including
                 charges of idolatry, sacrilege, and sodomy. The data
                 being studied are the responses of 900 men to each of
                 127 accusations. The article details the accusations
                 and the way in which the responses are being coded. The
                 statistical package SAS (Statistical Analysis System)
                 will be used. Examples of the results to be sought are:
                 tallies of guilty/innocent responses, tallies of
                 offenses committed versus seen versus heard about, and
                 correlations between, for example, age and other
                 responses. Depositions that differ markedly from the
                 average response will be identified.''",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; legal aspects",
  review =       "ACM CR 40531",
  subject =      "E.4 Data, CODING AND INFORMATION THEORY, Nonsecret
                 encoding schemes \\ G.3 Mathematics of Computing,
                 PROBABILITY AND STATISTICS, Statistical computing \\
                 J.1 Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Law J Computer Applications, SOCIAL AND
                 BEHAVIORAL SCIENCES",
}

@InProceedings{Goldwasser:1982:PEH,
  author =       "Shafi Goldwasser and Silvio Micali",
  title =        "Probabilistic encryption \& how to play mental poker
                 keeping secret all partial information",
  crossref =     "ACM:1982:PFA",
  pages =        "365--377",
  year =         "1982",
  bibdate =      "Wed Feb 20 18:33:45 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Golomb:1982:SRS,
  author =       "S. Golomb",
  title =        "Shift Register Sequences",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Revised",
  pages =        "xvi + 247",
  year =         "1982",
  ISBN =         "0-89412-048-4",
  ISBN-13 =      "978-0-89412-048-0",
  LCCN =         "QA267.5.S4 G6 1982",
  bibdate =      "Mon Nov 30 08:47:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Portions co-authored with Lloyd R. Welch, Richard M.
                 Goldstein, and Alfred W. Hales.",
  acknowledgement = ack-nhfb,
}

@Article{Gray:1982:ICT,
  author =       "P. E. Gray",
  title =        "Information control {I}: Technology transfer at issue:
                 The academic viewpoint: Educators believe efforts to
                 limit transfer of knowledge at the university level are
                 likely to weaken the {U.S.} lead in innovation",
  journal =      j-IEEE-SPECTRUM,
  volume =       "19",
  number =       "5",
  pages =        "64--68",
  month =        may,
  year =         "1982",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1982.6366886",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 16:51:45 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Educational institutions; Government;
                 Laboratories; National security; Very high speed
                 integrated circuits",
}

@Article{Grover:1982:CP,
  author =       "Derrick Grover",
  title =        "Cryptography: a Primer",
  journal =      j-COMP-J,
  volume =       "25",
  number =       "3",
  pages =        "400c-400",
  month =        aug,
  year =         "1982",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/25.3.400-c",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Dec 4 14:48:13 MST 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/25/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/25/3/400-c.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Guillou:1982:CT,
  author =       "L. C. Guillou and B. Lorig",
  title =        "Cryptography and teleinformatics",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "27--33",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900220",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Henry:1982:FDA,
  author =       "Paul S. Henry",
  title =        "Fast decryption algorithm for the knapsack cipher",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "80--83",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900293",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Holland:1982:GSA,
  author =       "Edward R. Holland and James L. Robertson",
  title =        "{GUEST} --- a Signature Analysis Based Test System for
                 {ECL} Logic",
  journal =      j-HEWLETT-PACKARD-J,
  volume =       "33",
  number =       "3",
  pages =        "26--29",
  month =        mar,
  year =         "1982",
  CODEN =        "HPJOAX",
  ISSN =         "0018-1153",
  bibdate =      "Tue Mar 25 14:12:15 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hpj.bib",
  abstract =     "A special printed circuit board tester is developed,
                 the Gemini Universal ECL Signature Test (GUEST) system,
                 that can apply a signature analysis based tests to the
                 emitter coupled logic (ECL). The tester functions at
                 real-time clock rates up to 25 MHz and generates test
                 vectors algorithmically in real time by hardware for a
                 given unit-under-test (UUT). The hardware test vector
                 generation is illustrated and described, including
                 go\slash no go testing, fault backtracking, and
                 feedback loop breaking. A UUT test file is created and
                 verified for the accuracy of test generation.",
  acknowledgement = ack-nhfb,
  classcodes =   "B1265B (Logic circuits); B7210B (Automatic test and
                 measurement systems); C5210 (Logic design methods)",
  classification = "713; 721",
  fjournal =     "Hewlett-Packard Journal: technical information from
                 the laboratories of Hewlett-Packard Company",
  journalabr =   "Hewlett Packard J",
  keywords =     "automatic test equipment; ECL logic; Gemini Universal
                 ECL Signature; GUEST; HP 3000; logic circuits, emitter
                 coupled; logic testing; printed circuits; Series 64
                 boards; signature analysis; test system; Test system;
                 tester; unit-under-test (UUT)",
  treatment =    "P Practical",
}

@InCollection{Hoogendoorn:1982:SPK,
  author =       "P. J. Hoogendoorn",
  booktitle =    "Computational methods in number theory, {Part I}",
  title =        "On a secure public-key cryptosystem",
  volume =       "154",
  publisher =    "Math. Centrum",
  address =      "Amsterdam",
  pages =        "159--168",
  year =         "1982",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85b:68014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Math. Centre Tracts",
}

@Article{Kahn:1982:GLC,
  author =       "David Kahn",
  title =        "The grand lines of cryptology's development",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "245--248",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900426",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kasami:1982:KMS,
  author =       "Tadao Kasami and Saburo Yamamura and Kenichi Mori",
  title =        "A key management scheme for end-to-end encryption and
                 a formal verification of its security",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "3",
  pages =        "59--69 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "94B99",
  MRnumber =     "84i:94045",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@Article{Koyama:1982:CUM,
  author =       "Kenji Koyama",
  title =        "A cryptosystem using the master key for multi-address
                 communication",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "5",
  pages =        "36--46 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "85f:94014",
  MRreviewer =   "James W. Snively, Jr.",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@Article{Koyama:1982:MKR,
  author =       "Kenji Koyama",
  title =        "A master key for the {RSA} public-key cryptosystem",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "1",
  pages =        "63--70 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85a:68044",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@Article{Lamport:1982:BGP,
  author =       "Leslie Lamport and Robert Shostak and Marshall Pease",
  title =        "The {Byzantine} Generals Problem",
  journal =      j-TOPLAS,
  volume =       "4",
  number =       "3",
  pages =        "382--401",
  month =        jul,
  year =         "1982",
  CODEN =        "ATPSDT",
  ISSN =         "0164-0925 (print), 1558-4593 (electronic)",
  ISSN-L =       "0164-0925",
  bibdate =      "Sat Oct 17 12:24:31 1998",
  bibsource =    "Compiler/bevan.bib; Compiler/Compiler.Lins.bib;
                 Compiler/TOPLAS.bib; Database/dbase.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jamstatassoc.bib;
                 https://www.math.utah.edu/pub/tex/bib/toplas.bib",
  note =         "They proved that Byzantine agreement cannot be reached
                 unless fewer than one-third of the processes are
                 faulty. This result assumes that authentication, i.e.,
                 the crypting of messages to make them unforgeable, is
                 not used. With unforgeable messages, they show that the
                 problem is solvable for any $ n \geq t > 0 $, where $n$
                 is the total number of processes and $t$ is the number
                 of faulty processes.",
  abstract =     "Reliable computer systems must handle malfunctioning
                 components that give conflicting information to
                 different parts of the system. This situation can be
                 expressed abstractly in terms of a group of generals of
                 the Byzantine army camped with their troops around an
                 enemy city. Communicating only by messenger, the
                 generals must agree upon a common battle plan. However,
                 one or more of them may be traitors who will try and
                 confuse the others. The problem is to find an algorithm
                 to ensure that the loyal generals will reach agreement.
                 It is shown that, using only oral messages, this
                 problem is solvable if and only if more than two-thirds
                 of the generals are loyal; so a single traitor can
                 confound two loyal generals. With unforgeable written
                 messages, the problem is solvable for any number of
                 generals and possible traitors. Applications of the
                 solutions to reliable computer systems are then
                 discussed.",
  acknowledgement = ack-nhfb # " and " # ack-pb,
  checked =      "19940302",
  fjournal =     "ACM Transactions on Programming Languages and
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J783",
  keywords =     "fault tolerance; interactive consistency; network
                 communications; network operating systems;
                 reliability",
  source =       "Dept. Library",
}

@Book{Lewin:1982:AMC,
  author =       "Ronald Lewin",
  title =        "The {American} magic: codes, ciphers, and the defeat
                 of {Japan}",
  publisher =    "Farrar Straus Giroux",
  address =      "New York, NY, USA",
  pages =        "xv + 332",
  year =         "1982",
  ISBN =         "0-374-10417-4",
  ISBN-13 =      "978-0-374-10417-7",
  LCCN =         "D810.C88 .L48",
  bibdate =      "Sat Apr 20 12:07:03 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Matsumoto:1982:DTL,
  author =       "Tsutomu Matsumoto and Tomoko Okada and Hideki Imai",
  title =        "Directly transformed link encryption",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "6",
  pages =        "36--44 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85a:68045",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@InCollection{Merkle:1982:PPK,
  author =       "Ralph C. Merkle",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Protocols for public key cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "73--104",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 721",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@Book{Merkle:1982:SAP,
  author =       "Ralph C. (Ralph Charles) Merkle",
  title =        "Secrecy, authentication, and public key systems",
  volume =       "18",
  publisher =    "UMI Research Press",
  address =      "Ann Arbor, MI, USA",
  pages =        "104",
  year =         "1982",
  ISBN =         "0-8357-1384-9",
  ISBN-13 =      "978-0-8357-1384-9",
  LCCN =         "QA76.9.A25 M47 1982",
  bibdate =      "Thu Jan 21 14:22:11 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Revision of the author's thesis ({Ph.D.}---Stanford
                 University, 1979).",
  series =       "Computer science. Systems programming",
  acknowledgement = ack-nhfb,
}

@Book{Meyer:1982:CND,
  author =       "Carl H. Meyer and Stephen M. Matyas",
  title =        "Cryptography: a new dimension in computer data
                 security: a guide for the design and implementation of
                 secure systems",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xxi + 755",
  year =         "1982",
  ISBN =         "0-471-04892-5",
  ISBN-13 =      "978-0-471-04892-3",
  LCCN =         "Z103 .M55",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$39.95",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- handbooks, manuals, etc",
}

@InProceedings{Plumstead:1982:ISG,
  author =       "Joan Boyar Plumstead",
  title =        "Inferring a sequence generated by a linear
                 congruence",
  crossref =     "IEEE:1982:ASF",
  pages =        "153--159",
  year =         "1982",
  bibdate =      "Wed Jun 22 18:26:09 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Suppose it is known that $ \{ X_0, X_1, \ldots {}, X_n
                 \} $ is produced by a pseudo-random number generator of
                 the form $ X_{i + 1} = a X_i + b \bmod m $, but $a$,
                 $b$, and $m$ are unknown. Can one efficiently predict
                 the remainder of the sequence with knowledge of only a
                 few elements from that sequence? This question is
                 answered in the affirmative and an algorithm is
                 given.",
  acknowledgement = ack-nhfb,
  keywords =     "algorithm design and analysis; computer science;
                 cryptography; data analysis; error correction;
                 inference algorithms; power generation; random number
                 generation; sections; tiles",
}

@InCollection{Randell:1982:CGC,
  author =       "Brian Randell",
  title =        "{Colossus}: Godfather of the Computer (1977)",
  crossref =     "Randell:1982:ODC",
  pages =        "349--354",
  year =         "1982",
  bibdate =      "Sun Nov 03 08:36:11 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Rhodes-Burke:1982:RSA,
  author =       "Robert Rhodes-Burke",
  title =        "Retrofitting for Signature Analysis Simplified",
  journal =      j-HEWLETT-PACKARD-J,
  volume =       "33",
  number =       "1",
  pages =        "9--16",
  month =        jan,
  year =         "1982",
  CODEN =        "HPJOAX",
  ISSN =         "0018-1153",
  bibdate =      "Tue Mar 25 14:12:15 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hpj.bib",
  abstract =     "Four versions of Microprocessor Exerciser are
                 introduced that make it possible to apply signature
                 analysis trouble-shooting techniques to
                 microprocessor-based products not originally designed
                 for signal analysis methods, by providing preprogrammed
                 external stimulus routines and monitoring circuits.
                 Model 5001A for 6800-microprocessor is illustrated and
                 its operating modes are described.",
  acknowledgement = ack-nhfb,
  classcodes =   "C5130 (Microprocessor chips); C5210 (Logic design
                 methods)",
  classification = "722; 723",
  corpsource =   "Hewlett--Packard Co., Palo Alto, CA, USA",
  fjournal =     "Hewlett-Packard Journal: technical information from
                 the laboratories of Hewlett-Packard Company",
  journalabr =   "Hewlett Packard J",
  keywords =     "5001A; computers, microprocessor; external; fault
                 location; Hewlett--Packard; logic testing;
                 microprocessor chips; microprocessor exerciser;
                 microprocessor-based systems; signature analysis;
                 stimulus routines; troubleshooting; troubleshooting
                 techniques",
  treatment =    "P Practical",
}

@InCollection{Rivest:1982:MOD,
  author =       "Ronald Rivest and Adi Shamir and Leonard M. Adleman",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "A method for obtaining digital signatures and public
                 key cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "217--239",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 726",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@PhdThesis{Schaumuller-Bichl:1982:ADE,
  author =       "Ingrid Schaumuller-Bichl",
  title =        "{Zur Analyse des Data Encryption: Standard und
                 Synthese verwandter Chiffriersysteme}",
  volume =       "40",
  school =       "Johannes Kepler-Universit{\"a}t Linz",
  address =      "Linz, Austria",
  pages =        "168",
  year =         "1982",
  ISBN =         "3-85369-521-3",
  ISBN-13 =      "978-3-85369-521-0",
  LCCN =         "QA76.9.A25S33 1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Summary in English. Published by VWGO, Wien,
                 Austria.",
  series =       "Dissertationen der Johannes Kepler-Universit{\"a}t
                 Linz",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Passwords; Data
                 encryption (Computer science)",
}

@InCollection{Shamir:1982:PTA,
  author =       "Adi Shamir",
  booktitle =    "23rd annual symposium on foundations of computer
                 science (Chicago, Ill., 1982)",
  title =        "A polynomial time algorithm for breaking the basic
                 {Merkle--Hellman} cryptosystem",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "145--152",
  year =         "1982",
  MRclass =      "68P25",
  MRnumber =     "780 392",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Book{Shumaker:1982:RCJ,
  author =       "Wayne Shumaker",
  title =        "Renaissance curiosa: {John Dee}'s conversations with
                 angels, {Girolamo Cardano}'s horoscope of {Christ},
                 {Johannes Trithemius} and cryptography, {George
                 Dalgarno}'s Universal language",
  volume =       "8",
  publisher =    "Center for Medieval and Early Renaissance Studies",
  address =      "Binghamton, NY, USA",
  pages =        "207",
  year =         "1982",
  ISBN =         "0-86698-014-8",
  ISBN-13 =      "978-0-86698-014-2",
  LCCN =         "CB361 .S494 1982",
  bibdate =      "Mon Jul 19 08:47:18 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Intended audience: Renaissance specialists,
                 linguistics, students of occultism, and historians of
                 science.",
  series =       "Medieval and Renaissance texts and studies",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
  keywords =     "Cardano, Girolamo, 1501--1576; Dalgarno, George,
                 1626?--1687 ars signorum; Dee, John, 1527--1608 true
                 and faithful relation of what passed for many;
                 renaissance --- sources; Trithemius, Johannes,
                 1462--1516 steganographia; yeers between Dr. John Dee
                 \ldots{} and some spirits",
}

@InCollection{Simmons:1982:SAE,
  author =       "Gustavus J. Simmons",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Symmetric and asymmetric encryption",
  volume =       "69",
  publisher =    pub-WESTVIEW,
  address =      pub-WESTVIEW:adr,
  pages =        "241--298",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 727",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  series =       "AAAS Sel. Sympos. Ser.",
}

@Book{Simmons:1982:SCA,
  editor =       "Gustavus J. Simmons",
  title =        "Secure communications and asymmetric cryptosystems",
  volume =       "69",
  publisher =    "Westview Press",
  address =      "Boulder, CO",
  pages =        "x + 338",
  year =         "1982",
  ISBN =         "0-86531-338-5",
  ISBN-13 =      "978-0-86531-338-5",
  MRclass =      "94-06",
  MRnumber =     "85i:94001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Selected Symposia Series",
}

@Manual{USDA:1982:SMM,
  author =       "{United States.Dept.of the Army}",
  title =        "Soldier's manual: {MOS 32G}: fixed cryptographic
                 equipment repairer, skill levels 1 and 2",
  number =       "FM 11-32G1/2",
  organization = "Dept. of the Army, Headquarters",
  address =      "Washington, DC, USA (??)",
  pages =        "various",
  month =        may,
  year =         "1982",
  LCCN =         "D 101.20:11-32 G 1/2 Govt Pubs",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "communications, military -- handbooks, manuals, etc.;
                 United States. Army -- communications systems --
                 maintenance and repair -- handbooks, manuals, etc;
                 United States. Army -- handbooks, manuals, etc",
}

@Manual{USDA:1982:TGM,
  author =       "{United States.Dept.of the Army}",
  title =        "Trainer's guide: {MOS 32G}: fixed cryptographic
                 equipment repairer",
  number =       "FM 11-32G/TG",
  organization = "Dept. of the Army, Headquarters",
  address =      "Washington, DC, USA (??)",
  pages =        "35",
  day =          "14",
  month =        may,
  year =         "1982",
  LCCN =         "D 101.20:11-32 G/TG Govt Pubs",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "communications, military -- handbooks, manuals, etc;
                 United States. Army -- communications systems --
                 maintenance and repair -- handbooks, manuals, etc;
                 United States. Army -- handbooks, manuals, etc",
}

@Manual{USGSA:1982:TGS,
  author =       "{United States.General Services Administration}",
  title =        "Telecommunications: general security requirements for
                 equipment using the {Data Encryption Standard}",
  organization = "General Services Administration",
  address =      "Washington, DC, USA",
  pages =        "12",
  day =          "14",
  month =        apr,
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Federal Standard 1027.",
  acknowledgement = ack-nhfb,
}

@Book{Warren:1982:BTC,
  author =       "Alexander Z. Warren",
  title =        "{Basic-plus} through cryptanalysis; an introduction to
                 structured programming",
  publisher =    "????",
  address =      "????",
  pages =        "100",
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Privately printed",
  acknowledgement = ack-nhfb,
  keywords =     "BASIC-PLUS (Computer program language); Phillips
                 Academy --- Faculty",
}

@Book{Welchman:1982:HSS,
  author =       "Gordon Welchman",
  title =        "The {Hut Six} story: breaking the {Enigma} codes",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "ix + 326",
  year =         "1982",
  ISBN =         "0-07-069180-0",
  ISBN-13 =      "978-0-07-069180-3",
  LCCN =         "D810.C88 W44",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Welchman, Gordon; World War, 1939--1945 ---
                 cryptography; World War, 1939--1945 --- personal
                 narratives, British; World War, 1939--1945 --- secret
                 service --- Great Britain",
}

@TechReport{Wells:1982:USE,
  author =       "David L. Wells",
  title =        "The use of subkey encryption to counter traffic
                 analysis in communications networks",
  type =         "Technical report",
  number =       "CSE 8201",
  institution =  "Department of Computer Science and Engineering,
                 Southern Methodist University",
  address =      "Dallas, TX, USA",
  pages =        "24",
  month =        feb,
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Supported by the National Science Foundation under
                 grant no. MCS 8107479.",
  keywords =     "Computer networks.",
}

@Article{Wilkes:1982:MRJ,
  author =       "Maurice V. Wilkes and I. J. Good",
  title =        "Meetings in Retrospect: {J. G. Brainerd on the ENIAC};
                 {A Report on T. H. Flowers's Lecture on Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "4",
  number =       "1",
  pages =        "53--59",
  month =        jan # "\slash " # mar,
  year =         "1982",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1982/pdf/a1053.pdf;
                 http://www.computer.org/annals/an1982/a1053abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Willett:1982:CON,
  author =       "Michael Willett",
  title =        "Cryptography old and new",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "177--186",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900104",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Willett:1982:TPK,
  author =       "Michael Willett",
  title =        "A tutorial on public key cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "72--79",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900281",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InCollection{Williams:1982:CHP,
  author =       "Hugh C. Williams",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Computationally ``hard'' problems as a source for
                 cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "11--39",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 719",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@Article{Wood:1982:FAC,
  author =       "Charles Cresson Wood",
  title =        "Future applications of cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "65--71",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488290027X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Yao:1982:PSC,
  author =       "A. Yao",
  title =        "Protocols for Secure Computation",
  crossref =     "IEEE:1982:ASF",
  pages =        "160--164",
  year =         "1982",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 27]{Canetti:1997:PSL}.",
}

@InProceedings{Yao:1982:TAT,
  author =       "A. C. Yao",
  title =        "Theory and Application of Trapdoor Functions",
  crossref =     "IEEE:1982:ASF",
  pages =        "80--91",
  year =         "1982",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 28]{Goldreich:1997:FMCb}.",
}

@InProceedings{Adleman:1983:BGK,
  author =       "Leonard M. Adleman",
  title =        "On breaking generalized knapsack public key
                 cryptosystems",
  crossref =     "ACM:1983:PFA",
  pages =        "402--412",
  year =         "1983",
  bibdate =      "Thu Feb 21 06:51:34 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Adleman:1983:CCS,
  author =       "L. M. Adleman and R. L. Rivest and A. Shamir",
  title =        "Cryptographic Communications System and Method",
  howpublished = "US Patent No. 4,405,829.",
  day =          "20",
  month =        sep,
  year =         "1983",
  bibdate =      "Sat Nov 29 13:42:30 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Patent filed 14 September 1977.",
  URL =          "https://www.google.com/patents/US4405829",
  abstract =     "A cryptographic communications system and method. The
                 system includes a communications channel coupled to at
                 least one terminal having an encoding device and to at
                 least one terminal having a decoding device. A
                 message-to-be-transferred is enciphered to ciphertext
                 at the encoding terminal by first encoding the message
                 as a number $M$ in a predetermined set, and then
                 raising that number to a first predetermined power
                 (associated with the intended receiver) and finally
                 computing the remainder, or residue, $C$, when the
                 exponentiated number is divided by the product of two
                 predetermined prime numbers (associated with the
                 intended receiver). The residue $C$ is the ciphertext.
                 The ciphertext is deciphered to the original message at
                 the decoding terminal in a similar manner by raising
                 the ciphertext to a second predetermined power
                 (associated with the intended receiver), and then
                 computing the residue, $ M'$, when the exponentiated
                 ciphertext is divided by the product of the two
                 predetermined prime numbers associated with the
                 intended receiver. The residue $ M'$ corresponds to the
                 original encoded message $M$.",
  acknowledgement = ack-nhfb,
}

@Article{Akl:1983:CSP,
  author =       "Selim G. Akl and Peter D. Taylor",
  title =        "Cryptographic Solution to a Problem of Access Control
                 in a Hierarchy",
  journal =      j-TOCS,
  volume =       "1",
  number =       "3",
  pages =        "239--248",
  month =        aug,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:18:40 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@Article{Akritas:1983:CEA,
  author =       "A. G. Akritas and S. S. Iyengar and A. A. Rampuria",
  title =        "Computationally efficient algorithms for a one-time
                 pad scheme",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "12",
  number =       "4",
  pages =        "285--316",
  month =        aug,
  year =         "1983",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  MRclass =      "68P25 (94A99)",
  MRnumber =     "741 781",
  bibdate =      "Sat Apr 26 14:03:16 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "C6130 (Data handling techniques)",
  corpsource =   "Dept. of Computer Sci., Univ. of Kansas, Lawrence, KS,
                 USA",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "chi-square method; ciphers security; cryptography;
                 data processing; one-time pad scheme",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Alpern:1983:KEU,
  author =       "B. Alpern and F. B. Schneider",
  title =        "Key exchange using keyless cryptography",
  journal =      j-INFO-PROC-LETT,
  volume =       "16",
  number =       "2",
  pages =        "79--81",
  day =          "26",
  month =        feb,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); B6210L (Computer communications);
                 C5620 (Computer networks and techniques); C6130 (Data
                 handling techniques)",
  corpsource =   "Dept. of Computer Sci., Cornell Univ., Ithaca, NY,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "computer network; computer networks; cryptography;
                 keyless cryptography; protocols; secret keys",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@Book{ANSI:1983:ANS,
  author =       "{American National Standards Institute}",
  title =        "{American National Standard} for information systems:
                 data encryption algorithm: modes of operation",
  publisher =    pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "??",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ayoub:1983:DCE,
  author =       "F. Ayoub",
  title =        "The design of complete encryption networks using
                 cryptographically equivalent permutations",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "261--267",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488390010X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bauer:1983:KDP,
  author =       "R. K. Bauer and T. A. Berson and R. J. Feiertag",
  title =        "A Key Distribution Protocol Using Event Markers",
  journal =      j-TOCS,
  volume =       "1",
  number =       "3",
  pages =        "249--255",
  month =        aug,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:57:59 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@InProceedings{Ben-Or:1983:CSS,
  author =       "Michael Ben-Or and Benny Chor and Adi Shamir",
  title =        "On the cryptographic security of single {RSA} bits",
  crossref =     "ACM:1983:PFA",
  pages =        "421--430",
  year =         "1983",
  bibdate =      "Thu Feb 21 06:51:34 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Bertrand:1983:EGE,
  author =       "Gustave Bertrand",
  title =        "{Enigma}, or, The greatest enigma of the 1939--1945
                 war",
  publisher =    "????",
  address =      "????",
  pages =        "vi + 415",
  year =         "1983",
  LCCN =         "????",
  bibdate =      "Sun Dec 01 09:15:14 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "English translation by Russell Babcock Holmes of
                 \cite{Bertrand:1973:EOP}.",
  acknowledgement = ack-nhfb,
}

@Book{Blahut:1983:TPE,
  author =       "Richard E. Blahut",
  title =        "Theory and Practice of Error Control Coding",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xi + 500",
  year =         "1983",
  ISBN =         "0-201-10102-5",
  ISBN-13 =      "978-0-201-10102-7",
  LCCN =         "QA268 .B54 1983",
  bibdate =      "Mon Nov 30 08:52:10 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blum:1983:CFT,
  author =       "Manuel Blum",
  title =        "Coin Flipping by Telephone --- a Protocol for Solving
                 Impossible Problems",
  journal =      j-SIGACT,
  volume =       "15",
  number =       "1",
  pages =        "23--27",
  month =        jan,
  year =         "1983",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1008908.1008911",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Sun Mar 11 11:37:49 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "Alice and Bob want to flip a coin by telephone. (They
                 have just divorced, live in different cities, want to
                 decide who gets the car.) Bob would not like to tell
                 Alice HEADS and hear Alice (at the other end of the
                 line) say ``Here goes \ldots{} I'm flipping the
                 coin\ldots{}. You lost!'' Coin-flipping in the SPECIAL
                 way done here has a serious purpose. Indeed, it should
                 prove an INDISPENSABLE TOOL of the protocol designer.
                 Whenever a protocol requires one of two adversaries,
                 say Alice, to pick a sequence of bits at random, and
                 whenever it serves Alice's interests best NOT to pick
                 her sequence of bits at random, then coin-flipping (Bob
                 flipping coins to Alice) as defined here achieves the
                 desired goal: (1) It GUARANTEES to Bob that Alice will
                 pick her sequence of bits at random. Her bit is 1 if
                 Bob flips heads to her, 0 otherwise. (2) It GUARANTEES
                 to Alice that Bob will not know WHAT sequence of bits
                 he flipped to her. Coin-flipping has already proved
                 useful in solving a number of problems once thought
                 impossible: mental poker, certified mail, and exchange
                 of secrets. It will certainly prove a useful tool in
                 solving other problems as well.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Blum:1983:HES,
  author =       "Manuel Blum",
  title =        "How to Exchange (Secret) Keys",
  journal =      j-TOCS,
  volume =       "1",
  number =       "2",
  pages =        "175--193",
  month =        may,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:57:59 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.security.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Previously published in ACM STOC '83 proceedings,
                 pages 440--447.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@InProceedings{Brickell:1983:EAA,
  author =       "E. F. Brickell and J. C. Lagarias and A. M. Odlyzko",
  title =        "Evaluation of the {Adleman} attack on multiply
                 iterated knapsack cryptosystems",
  crossref =     "Chaum:1983:ACP",
  pages =        "39--42",
  year =         "1983",
  bibdate =      "Thu Apr 04 10:06:34 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brickell:1983:SRK,
  author =       "Ernest F. Brickell and Gustavus J. Simmons",
  title =        "A status report on knapsack based public key
                 cryptosystems",
  journal =      j-CONG-NUM,
  volume =       "37",
  pages =        "3--72",
  year =         "1983",
  ISSN =         "0384-9864",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "85f:94013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Congressus Numerantium. A Conference Journal on
                 Numerical Themes",
}

@Article{Bromley:1983:RFM,
  author =       "Allan G. Bromley and Martin Campbell-Kelly and K. W.
                 Smillie and Eric A. Weiss and Saul Rosen and Cipher A.
                 Deavours",
  title =        "Reviews: {O. I. Franksen: Mr. Babbage, the Difference
                 Engine, and the Problem of Notation: An Account of the
                 Origin of Recursiveness and Conditionals in Computer
                 Programming}; {H. Lukoff: from Dits to Bits}; {I.
                 Asimov: Asimov's Biographical Encyclopedia of Science
                 and Technology}; {J. Futrelle: Thinking Machine}; {R.
                 M. Hord: The Illiac IV}; {C. H. Meyer and S. M. Matyas:
                 Cryptography}; {T. J. Peters and R. H. Waterman: In
                 Search of Excellence}; {J. W. Stokes: 70 Years of Radio
                 Tubes and Valves}; {G. Welchman: The Hut Six Story};
                 Capsule Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "4",
  pages =        "411--427",
  month =        oct # "\slash " # dec,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Mon Nov 04 09:22:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a4411.pdf;
                 http://www.computer.org/annals/an1983/a4411abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@TechReport{CBEMA:1983:ANSa,
  author =       "{Computer and Business Equipment Manufacturers
                 Association} and {American National Standards
                 Institute}",
  title =        "{American National Standard for Information Systems}:
                 Data Link Encryption",
  type =         "????",
  number =       "ANSI X3.105-1983",
  institution =  pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "20",
  day =          "16",
  month =        may,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computer interfaces --- Standards; Programming
                 languages (Electronic computers) --- Standards",
}

@TechReport{CBEMA:1983:ANSb,
  author =       "{Computer and Business Equipment Manufacturers
                 Association} and {American National Standards
                 Institute}",
  title =        "{American National Standard for Information Systems}:
                 {Data Encryption Algorithm} --- Modes of Operation",
  type =         "????",
  number =       "ANSI X3.106-1983",
  institution =  pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "16",
  day =          "16",
  month =        may,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computer interfaces --- Standards; Programming
                 languages (Electronic computers) --- Standards",
}

@Article{Cesarini:1983:ACC,
  author =       "F. Cesarini and G. Soda",
  title =        "An algorithm to construct a compact {$B$}-tree in case
                 of ordered keys",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "1",
  pages =        "13--16",
  day =          "19",
  month =        jul,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C1160 (Combinatorial mathematics); C1260
                 (Information theory)",
  corpsource =   "Istituto di Informatica e Sistemistica, Univ. of
                 Florence, Florence, Italy",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "compact B-tree; computer programming; construction
                 algorithm; cryptography; data processing --- Data
                 Structures; ordered keys; overflow movings; trees
                 (mathematics)",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Chandler:1983:IMC,
  author =       "W. W. Chandler",
  title =        "The Installation and Maintenance of {Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "3",
  pages =        "260--262",
  month =        jul # "\slash " # sep,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:20 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a3260.pdf;
                 http://www.computer.org/annals/an1983/a3260abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@InProceedings{Chaum:1983:BSU,
  author =       "D. Chaum",
  editor =       "????",
  booktitle =    "{Advances in Cryptology, Proceedings of CRYPTO 82}",
  title =        "Blind signatures for untraceable payments",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  pages =        "199--203",
  year =         "1983",
  bibdate =      "Thu Sep 22 18:48:28 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Coombs:1983:MC,
  author =       "Allen W. M. Coombs",
  title =        "The Making of {Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "3",
  pages =        "253--259",
  month =        jul # "\slash " # sep,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:20 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a3253.pdf;
                 http://www.computer.org/annals/an1983/a3253abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{DeMillo:1983:ACC,
  author =       "Richard A. DeMillo and others",
  title =        "Applied cryptology, cryptographic protocols, and
                 computer security models",
  volume =       "29",
  publisher =    pub-AMS,
  address =      pub-AMS:adr,
  pages =        "xi + 192",
  year =         "1983",
  ISBN =         "0-8218-0041-8",
  ISBN-13 =      "978-0-8218-0041-6",
  ISSN =         "0160-7634",
  LCCN =         "QA1 .A56 v.29 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Expanded version of notes prepared for the AMS short
                 course entitled Cryptology in revolution, mathematics
                 and models, held in San Francisco, CA, Jan. 5--6, 1981,
                 by Richard A. DeMillo and others.",
  series =       "Proceedings of symposia in applied mathematics. AMS
                 short course lecture notes",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control; cryptography",
}

@Article{DeMillo:1983:PDS,
  author =       "R. DeMillo and M. Merritt",
  title =        "Protocols for Data Security",
  journal =      j-COMPUTER,
  volume =       "16",
  number =       "2",
  pages =        "39--50",
  month =        feb,
  year =         "1983",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1004.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "information hiding; steganography",
}

@Article{Dolev:1983:AAB,
  author =       "D. Dolev and H. R. Strong",
  title =        "Authenticated Algorithms for {Byzantine} Agreement",
  journal =      j-SIAM-J-COMPUT,
  volume =       "12",
  number =       "4",
  pages =        "656--666",
  month =        "????",
  year =         "1983",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68M10",
  MRnumber =     "85a:68004",
  bibdate =      "Mon Nov 29 10:59:59 MST 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/12/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Ecker:1983:FSR,
  author =       "A. Ecker",
  booktitle =    "Cryptography (Burg Feuerstein, 1982)",
  title =        "Finite semigroups and the {RSA}-cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "149",
  pages =        "353--369",
  year =         "1983",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A99 (20M35)",
  MRnumber =     "84k:94019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Flowers:1983:DC,
  author =       "Thomas H. Flowers",
  title =        "The Design of {Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "3",
  pages =        "239--253",
  month =        jul # "\slash " # sep,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:20 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Foreword by Howard Campaigne.",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a3239.pdf;
                 http://www.computer.org/annals/an1983/a3239abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
  xxpages =      "239--252",
}

@MastersThesis{Gullichsen:1983:BHS,
  author =       "Eric Alexander Gullichsen",
  title =        "Bidirectional heuristic search and spectral {S}-box
                 simplification for the cryptanalysis of the {NBS Data
                 Encryption Standard}",
  volume =       "64919",
  type =         "Thesis ({M.Sc.})",
  publisher =    "National Library of Canada",
  school =       "University of British Columbia",
  address =      "Ottawa, ON, Canada",
  year =         "1983",
  ISBN =         "0-315-17010-7",
  ISBN-13 =      "978-0-315-17010-0",
  ISSN =         "0227-3845",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "3 microfiches (265 fr.)",
  series =       "Canadian theses on microfiche = Th{\`e}ses canadiennes
                 sur microfiche",
  acknowledgement = ack-nhfb,
}

@Article{Highland:1983:BRCb,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Codes, ciphers and
                 computers: an introduction to information security}}:
                 Bruce Bosworth: Rochelle Park NJ: Hayden Book Company,
                 Inc., 1982. viii + 259 pp., \$13.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "83--84",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488390041X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Hodges:1983:ATE,
  author =       "Andrew Hodges",
  title =        "{Alan Turing}: the enigma",
  publisher =    pub-SIMON-SCHUSTER,
  address =      pub-SIMON-SCHUSTER:adr,
  pages =        "587",
  year =         "1983",
  ISBN =         "0-671-49207-1, 0-09-152130-0 (Burnett Books)",
  ISBN-13 =      "978-0-671-49207-6, 978-0-09-152130-1 (Burnett Books)",
  LCCN =         "QA29.T8 H63 1983",
  bibdate =      "Thu Jan 21 14:17:53 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hunter:1983:ERA,
  author =       "D. G. N. Hunter and A. R. McKenzie",
  title =        "Experiments with Relaxation Algorithms for Breaking
                 Simple Substitution Ciphers",
  journal =      j-COMP-J,
  volume =       "26",
  number =       "1",
  pages =        "68--71",
  month =        feb,
  year =         "1983",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C7890 (Other special applications of computing)",
  classification = "723",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "algorithms; cipher breaking; computer programming;
                 cryptography; decoding; relaxation; relaxation theory;
                 substitution ciphers; word boundaries",
  treatment =    "P Practical",
}

@Article{Israel:1983:AOS,
  author =       "J. E. Israel and T. A. Linden",
  title =        "Authentication in Office System Internetworks",
  journal =      j-TOOIS,
  volume =       "1",
  number =       "3",
  pages =        "193--210",
  month =        jul,
  year =         "1983",
  CODEN =        "ATOSDO",
  ISSN =         "0734-2047",
  ISSN-L =       "0734-2047",
  bibdate =      "Sat Jan 16 16:21:56 MST 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://liinwww.ira.uka.de/bibliography/Database/Graefe.html;
                 http://www.acm.org/pubs/tois/toc.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80",
  abstract =     "In a distributed office system, authentication data
                 (such as password) must be managed in such a way that
                 users and machines from different organizations can
                 easily authenticate themselves to each other. The
                 authentication facility must be secure, but user
                 convenience, decentralized administration, and a
                 capability for smooth, long-term evolution are also
                 important. In addition, the authentication arrangements
                 must not permit failures at a single node to cause
                 systemwide down time. The design used in the Xerox 8000
                 Series products is described. This design anticipates
                 applications in an open-network architecture where
                 there are nodes from diverse sources and one node does
                 not trust authentication checking done by other nodes.
                 Furthermore, in some offices encryption will be
                 required to authenticate data transmissions despite
                 hostile intruders on the network. Requirements and
                 design constraints when applying encryption for
                 authentication in office systems are discussed. It is
                 suggested that protocol standards for use in office
                 systems should allow unencrypted authentication as well
                 as two options for encrypted authentication. Issues
                 that will arise as an office system evolves to deal
                 with increasingly sophisticated threats from users of
                 the system are described.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Office Information Systems",
  keywords =     "Authentication; Computer-communication networks; Data
                 encryption; Data encryption standard (DES);
                 Decentralized systems; Distributed systems; Ethernet;
                 General; Heterogeneous systems; Information systems
                 applications; Internetworks; Network architecture and
                 design; Network communications; Network protocols;
                 Office automation; Open architecture; Protocol
                 architecture; Security; Security and protection;
                 Standardization",
}

@Book{Kahn:1983:KCS,
  author =       "David Kahn",
  title =        "{Kahn} on codes: secrets of the new cryptology",
  publisher =    pub-MACMILLAN,
  address =      pub-MACMILLAN:adr,
  pages =        "viii + 343",
  year =         "1983",
  ISBN =         "0-02-560640-9",
  ISBN-13 =      "978-0-02-560640-1",
  LCCN =         "Z103 .K29 1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Article{Kak:1983:EMP,
  author =       "Subhash C. Kak",
  title =        "Exponentiation modulo a polynomial for data security",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "12",
  number =       "5",
  pages =        "337--346",
  month =        oct,
  year =         "1983",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85f:68023",
  bibdate =      "Sat Apr 26 14:03:16 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "C6130 (Data handling techniques)",
  corpsource =   "Dept. of Electrical and Computer Engng., Louisiana
                 State Univ., Baton Rouge, LA, USA",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "cryptography; data security; encryption; exponential
                 modulo; public-key cryptosystem; RSA algorithm;
                 security of data",
  treatment =    "P Practical",
}

@Book{Koscielny:1983:PRD,
  author =       "Czeslaw Koscielny",
  title =        "Programowa realizacja dzialan w cialach skonczonych do
                 zastosowan w technice kodowania korekcyjnego i
                 kryptografii",
  volume =       "61. 11",
  publisher =    "Wydawn. Politechniki Wroclawskiej",
  address =      "Wroclaw, Poland",
  pages =        "115",
  year =         "1983",
  ISBN =         "????",
  ISBN-13 =      "????",
  ISSN =         "0324-9786",
  LCCN =         "QA76.9.A251 K6 1983",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Title on p. [2] of cover: A software approach to
                 computing in finite fields with applications to
                 error-correcting coding technique and cryptography.
                 Summary in English and Russian; legends and table of
                 contents also in English. Bibliography: p. 109--110.",
  price =        "zl93.00",
  series =       "Prace naukowe Instytutu Cybernetyki Technicznej
                 Politechniki Wroclawskiej; Seria Monografie",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; error-correcting codes (information
                 theory)",
}

@Article{Koyama:1983:MKR,
  author =       "Kenji Koyama",
  title =        "A master key for the {Rabin}'s public-key
                 cryptosystem",
  journal =      "Systems-Comput.-Controls",
  volume =       "14",
  number =       "6",
  pages =        "49--57 (1984)",
  year =         "1983",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "86j:94049",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@InCollection{Lakshmivarahan:1983:APK,
  author =       "S. Lakshmivarahan",
  booktitle =    "Advances in computers, Vol. 22",
  title =        "Algorithms for public key cryptosystems: theory and
                 application",
  volume =       "22",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "45--108",
  year =         "1983",
  MRclass =      "94A60",
  MRnumber =     "86f:94027",
  MRreviewer =   "M. R{\u{a}}duic{\u{a}}",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Adv. in Comput.",
}

@Book{Levine:1983:USC,
  author =       "Jack Levine",
  title =        "{United States} cryptographic patents, 1861--1981",
  publisher =    "Cryptologia",
  address =      "Terre Haute, IN, USA",
  pages =        "69",
  year =         "1983",
  ISBN =         "0-9610560-0-2",
  ISBN-13 =      "978-0-9610560-0-1",
  LCCN =         "T223.Z1 .L48",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; patents",
}

@Article{Lomet:1983:HPU,
  author =       "David B. Lomet",
  title =        "A high performance, universal, key associative access
                 method",
  journal =      j-SIGMOD,
  volume =       "13",
  number =       "4",
  pages =        "120--133",
  month =        may,
  year =         "1983",
  CODEN =        "SRECD8",
  ISSN =         "0163-5808 (print), 1943-5835 (electronic)",
  ISSN-L =       "0163-5808",
  bibdate =      "Sat Mar 6 07:33:53 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMOD Record",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J689",
}

@InProceedings{Massey:1983:LFC,
  author =       "J. L. Massey",
  editor =       "Edward C. van der Meulen",
  booktitle =    "{Proceedings of the Fourth Symposium on Information
                 Theory in the Benelux: held at the Brembergcentrum,
                 Haasrode, Belgium, May 26--27, 1983}",
  title =        "Logarithms in finite cycle groups -- cryptographic
                 issues",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "17--25",
  year =         "1983",
  ISBN =         "90-334-0690-X",
  ISBN-13 =      "978-90-334-0690-4",
  LCCN =         "Q350 S988 1983",
  bibdate =      "Sun Mar 11 10:44:22 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@PhdThesis{Meijer:1983:CCC,
  author =       "Henk Meijer",
  title =        "Cryptology computational complexity and applications",
  volume =       "65915",
  type =         "Thesis ({Ph.D.})",
  publisher =    "National Library of Canada",
  school =       "Queen's University",
  address =      "Ottawa, ON, Canada",
  year =         "1983",
  ISBN =         "0-315-18006-4",
  ISBN-13 =      "978-0-315-18006-2",
  ISSN =         "0227-3845",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "2 microfiches (179 fr.)",
  series =       "Canadian theses on microfiche = Th{\`e}ses canadiennes
                 sur microfiche",
  acknowledgement = ack-nhfb,
}

@Article{Moler:1983:SVA,
  author =       "Cleve Moler and Donald Morrison",
  title =        "Singular Value Analysis of Cryptograms",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "90",
  number =       "2",
  pages =        "78--87",
  month =        feb,
  year =         "1983",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:37:03 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Article{Morrison:1983:SEA,
  author =       "D. R. Morrison",
  title =        "Subtractive encryptors: alternatives to the {DES}",
  journal =      j-SIGACT,
  volume =       "15",
  number =       "1",
  pages =        "67--77",
  month =        "Winter--Spring",
  year =         "1983",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1008908.1008919",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 08:21:21 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Muller-Schloer:1983:MBC,
  author =       "C. M{\"u}ller-Schloer",
  title =        "A microprocessor-based cryptoprocessor",
  journal =      j-IEEE-MICRO,
  volume =       "3",
  number =       "5",
  pages =        "5--15",
  month =        sep # "\slash " # oct,
  year =         "1983",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.1983.291160",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Mon Apr 7 14:32:46 MDT 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "B6210L (Computer communications); C5250 (Microcomputer
                 techniques); C5620 (Computer networks and techniques)",
  classification = "723",
  corpsource =   "Siemens AG, Munich, West Germany",
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
  journalabr =   "IEEE Micro",
  keywords =     "computers; computers, microprocessor --- Applications;
                 crypto processor; cryptography; cryptoprocessor; data
                 communication systems; data encryption standard; data
                 privacy; data processing; electronic envelope;
                 electronic mail; hardware; host-computer application
                 programmer; hybrid system; IEEE 796 module;
                 IEEE-796-bus-compatible 8086 single-board computer;
                 microcomputers; microprocessor-based; RSA public-key;
                 satellite computers; security communication system;
                 software interface; special purpose; system; user
                 interface",
  treatment =    "P Practical",
}

@PhdThesis{Plumstead:1983:ISP,
  author =       "Joan Boyar Plumstead",
  title =        "Inferring Sequences Produced by Pseudo-Random Number
                 Generators",
  type =         "{Ph.D.} Dissertation",
  school =       "Department of Computer Science, University of
                 California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "ii + 56",
  month =        jun,
  year =         "1983",
  bibdate =      "Wed Jun 22 18:14:45 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "To solve the problem of inferring sequences produced
                 by pseudo-random number generators of a particular
                 form, one must present an efficient inference method
                 which, from knowledge of some of the numbers in a
                 sequence, predicts the remainder of the sequence.
                 Pseudo-random number generators of the following forms
                 are considered: (1) Linear congruential method, $ X(, i
                 + 1) = a X(, i) + b \bmod m $. (2) Linear congruences
                 with $n$ terms in the recurrence, for fixed $n$, $ X(,
                 i) = a(, 1) X(, i - 1) + a(, 2) X(, i - 2) + (.)(.)(.)
                 + a(, n) X(, i - n) + a(, n + 1) \bmod m $. (3)
                 Quadratic congruences, $ X(, i + 1) = a X(, i)('2) + b
                 X(, i) + c \bmod m $. In each case, it is assumed that
                 the coefficients and the modulus are unknown. It is
                 also assumed that whenever an incorrect prediction
                 occurs, the correct value is revealed before the next
                 prediction is made. Sequences of the first type can be
                 predicted with no more than $ 2 + \log (, 2) m $
                 errors, sequences of the second type with no more than
                 $ 2 + n('2) \log (, 2) n m $ errors, and sequences of
                 the third type with no more than $ 4 + 3 \log (, 2)m $
                 errors. All of the inference methods presented are
                 efficient. This shows that pseudo-random number
                 generators in any of these forms are cryptographically
                 insecure.",
  acknowledgement = ack-nhfb,
}

@Book{Price:1983:ABR,
  author =       "W. L. Price",
  title =        "Annotated bibliography of recent publications on data
                 security and cryptography",
  volume =       "35/83",
  publisher =    "National Physical Laboratory",
  address =      "Teddington, Middlesex, UK",
  edition =      "Sixth",
  pages =        "ii + 29",
  year =         "1983",
  LCCN =         "Z103.A1 P74 1983a",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted by permission of the Controller of Her
                 Britannic Majesty's Stationery Office. ``PB84-169168.''
                 Photocopy. Springfield, VA: National Technical
                 Information Service, [1983?]. 28 cm.",
  series =       "NPL-DITC",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography; data protection ---
                 bibliography",
}

@Article{Rivest:1983:MOD,
  author =       "R. L. Rivest and A. Shamir and L. Adleman",
  title =        "A Method for Obtaining Digital Signatures and
                 Public-Key Cryptosystems",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "96--99",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Sep 22 11:37:34 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "An encryption method is presented with the novel
                 property that publicly revealing an encryption key does
                 not thereby reveal the corresponding decryption key.
                 This has two important consequences: (1) Couriers or
                 other secure means are not needed to transmit keys,
                 since a message can be enciphered using an encryption
                 key publicly revealed by the intended recipient. Only
                 he can decipher the message, since only he knows the
                 corresponding decryption key. (2) A message can be
                 ``signed'' using a privately held decryption key.
                 Anyone can verify this signature using the
                 corresponding publicly revealed encryption key.
                 Signatures cannot be forged, and a signer cannot later
                 deny the validity of his signature. This has obvious
                 applications in ``electronic mail'' and ``electronic
                 funds transfer'' systems. A message is encrypted by
                 representing it as a number $M$, raising $M$ to a
                 publicly specified power $e$, and then taking the
                 remainder when the result is divided by the publicly
                 specified product, $n$, of two large secret prime
                 numbers $p$ and $q$. Decryption is similar; only a
                 different, secret, power $d$ is used, where $ e * d = =
                 1 (\mbox {mod}(p - 1)*(q - 1)) $. The security of the
                 system rests in part on the difficulty of factoring the
                 published divisor, n.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@TechReport{Rivest:1983:RET,
  author =       "Ronald L. Rivest and Alan T. Sherman",
  title =        "Randomized encryption techniques",
  type =         "Technical report",
  number =       "MIT/LCS/TM-234",
  institution =  "Massachusetts Institute of Technology, Laboratory for
                 Computer Science",
  address =      "Cambridge, MA, USA",
  pages =        "20",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Schell:1983:SPA,
  author =       "K. J. Schell",
  title =        "Security Printers Application of Lasers",
  journal =      "Proceedings of SPIE --- The International Society for
                 Optical Engineering",
  volume =       "396",
  pages =        "131--140",
  year =         "1983",
  CODEN =        "PSISDG",
  ISBN =         "0-89252-431-6",
  ISBN-13 =      "978-0-89252-431-0",
  ISSN =         "0277-786X (print), 1996-756X (electronic)",
  LCCN =         "TA1673 .A38 1983",
  bibdate =      "Mon May 11 18:28:54 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Industrial application of lasers in the graphic
                 industry is increasing. Examples are typesetting, color
                 separation and laser dot generating, laser printing,
                 laser gravure, laser plate making, etc. Application of
                 laser technology in the area of security printers had a
                 rather slow start but is speeding up rapidly. Encoding
                 credit cards by laser and holography are examples of
                 the application of lasers in this field. We summarize
                 known industrial applications of lasers in the graphic
                 industries and report about the applications of lasers
                 in the detection of a coded watermark. A step repeat
                 holographic laser camera for the production of
                 holograms in dichromatic gelatine is described.",
  acknowledgement = ack-nhfb,
  affiliation =  "Joh. Enschede \& Sons, Security Printers, Haarlem,
                 Neth",
  affiliationaddress = "Joh. Enschede \& Sons, Security Printers,
                 Haarlem, Neth",
  classification = "722; 743; 744; 745",
  conference =   "Advances in Laser Scanning and Recording.",
  journalabr =   "Proceedings of SPIE - The International Society for
                 Optical Engineering",
  keywords =     "coded watermark reacting; graphic industry laser
                 applications; graphic methods; holographic step and
                 repeat camera; Laser Applications; laser printing;
                 reflection holography; security printers' laser
                 applications; typesetting",
  meetingaddress = "Geneva, Switz",
  sponsor =      "SPIE, Bellingham, WA, USA",
}

@Article{Schobi:1983:FAT,
  author =       "P. Sch{\"o}bi and J. L. Massey",
  booktitle =    "Cryptography (Burg Feuerstein, 1982)",
  title =        "Fast authentication in a trapdoor-knapsack public key
                 cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "149",
  pages =        "289--306",
  year =         "1983",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94B99",
  MRnumber =     "84i:94047",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shamir:1983:ECT,
  author =       "Adi Shamir",
  title =        "Embedding Cryptographic Trapdoors in Arbitrary
                 Knapsack Systems",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "2",
  pages =        "77--79",
  day =          "24",
  month =        aug,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60",
  MRnumber =     "85e:94019",
  MRreviewer =   "Tai Yang Hwang",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C1260 (Information theory); C1290Z (Other
                 applications of systems theory); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Appl. Maths., Weizmann Inst. of Sci.,
                 Rehovot, Israel",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "arbitrary knapsack systems; cryptographic trapdoors;
                 cryptography; information theory; modular
                 multiplications; operations research; public-key
                 cryptography",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@Article{Shamir:1983:GCS,
  author =       "Adi Shamir",
  title =        "On the Generation of Cryptographically Strong
                 Pseudorandom Sequences",
  journal =      j-TOCS,
  volume =       "1",
  number =       "1",
  pages =        "38--44",
  month =        feb,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:57:59 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  keywords =     "TOCS",
}

@Article{Sicherman:1983:AQR,
  author =       "George L. Sicherman and Wiebren {De Jonge} and Reind
                 P. {Van De Riet}",
  title =        "Answering Queries without Revealing Secrets",
  journal =      j-TODS,
  volume =       "8",
  number =       "1",
  pages =        "41--59",
  month =        mar,
  year =         "1983",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Sat Apr 14 10:34:48 MDT 2001",
  bibsource =    "Compendex database; Database/Graefe.bib;
                 Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tods.bib;
                 Misc/is.bib",
  note =         "Also published in/as: reprinted in deJonge thesis,
                 Jun. 1985.",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1983-8-1/p41-sicherman/p41-sicherman.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1983-8-1/p41-sicherman/",
  abstract =     "Question-answering systems must often keep certain
                 information secret. This can be accomplished, for
                 example, by sometimes refusing to answer a query. Here
                 the danger of revealing a secret by refusing to answer
                 a query is investigated. First several criteria that
                 can be used to decide whether or not to answer a query
                 are developed. First several criteria that can be used
                 to decide whether or not to answer a query are
                 developed. Then it is shown which of these criteria are
                 safe if the questioner knows nothing at all about what
                 is kept secret. Furthermore, it is proved that one of
                 these criteria is safe even if the user of the system
                 knows which information is to be kept secret.",
  acknowledgement = ack-nhfb,
  acmcrnumber =  "8404-296",
  classification = "723",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "database systems, statistical security TODS; keeping
                 secrets; refusal to answer; strategy",
  subject =      "Information Systems --- Models and Principles ---
                 Systems and Information Theory (H.1.1): {\bf Value of
                 information}; Information Systems --- Models and
                 Principles --- User/Machine Systems (H.1.2);
                 Information Systems --- Information Storage and
                 Retrieval --- Systems and Software (H.3.4): {\bf
                 Current awareness systems (selective dissemination of
                 information--SDI)**}; Information Systems ---
                 Information Storage and Retrieval --- Systems and
                 Software (H.3.4): {\bf Question-answering (fact
                 retrieval) systems**}; Computing Methodologies ---
                 Artificial Intelligence --- Deduction and Theorem
                 Proving (I.2.3): {\bf Answer/reason extraction}",
}

@MastersThesis{Sieminski:1983:SBB,
  author =       "Gregory C. Sieminski",
  title =        "The search for a balance between scientific freedom
                 and national security: a case study of cryptology",
  type =         "Thesis ({M.S.})",
  school =       "Defense Intelligence College",
  address =      "Washington, DC, USA",
  pages =        "v + 73",
  month =        nov,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Intellectual freedom; National security
                 --- United States",
}

@Article{Silverman:1983:RVS,
  author =       "Jonathan M. Silverman",
  title =        "Reflections on the verification of the security of an
                 operating system kernel",
  journal =      j-OPER-SYS-REV,
  volume =       "17",
  number =       "5",
  pages =        "143--154",
  month =        oct,
  year =         "1983",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:54 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@InProceedings{Simmons:1983:PPS,
  author =       "G. J. Simmons",
  title =        "The Prisoners' Problem and the Subliminal Channel",
  crossref =     "Chaum:1983:ACP",
  pages =        "51--67",
  year =         "1983",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1001.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Article{Smith:1983:HCR,
  author =       "J. W. Smith and S. S. {Wagstaff, Jr.}",
  booktitle =    "Proceedings of the fourteenth Southeastern conference
                 on combinatorics, graph theory and computing (Boca
                 Raton, Fla., 1983)",
  title =        "How to crack an {RSA} cryptosystem",
  journal =      j-CONG-NUM,
  volume =       "40",
  pages =        "367--373",
  year =         "1983",
  ISSN =         "0384-9864",
  MRclass =      "94A60",
  MRnumber =     "86d:94020",
  MRreviewer =   "S. Guia{\c{s}}u",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Congressus Numerantium. A Conference Journal on
                 Numerical Themes",
}

@Article{Smith:1983:PKC,
  author =       "John Smith",
  title =        "Public Key Cryptography: An Introduction to a Powerful
                 Cryptographic System for Use on Microcomputers",
  journal =      j-BYTE,
  volume =       "7",
  number =       "??",
  pages =        "198--218",
  month =        Jan,
  year =         "1983",
  CODEN =        "BYTEDJ",
  ISSN =         "0360-5280",
  ISSN-L =       "0360-5280",
  bibsource =    "/usr/local/src/bib/bibliography/Misc/security.1.bib;
                 /usr/local/src/bib/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/byte1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This is a simple exposition of public key
                 cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "BYTE Magazine",
  keywords =     "algorithms; computer security; cryptography; RSA",
  ort =          "Ordner Sicherheit",
}

@TechReport{USGSA:1983:ISR,
  author =       "{United States.General Services Administration} and
                 {National Communications System (U.S.). Office of
                 Technology and Standards} and {National Institute of
                 Standards and Technology (U. S.)}",
  title =        "Interoperability and security requirements for use of
                 the {Data Encryption Standard} in the physical layer of
                 data communications",
  institution =  "General Services Administration, Office of Information
                 Resources Management",
  address =      "Washington, DC, USA",
  pages =        "4",
  day =          "3",
  month =        aug,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Federal standard 1026. Federal information processing
                 standards publication, FIPS PUB 139",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Standards.",
}

@Periodical{USNBS:1983:FPD,
  author =       "{United States.National Bureau of Standards}",
  title =        "{FIPS} Pub 46: {Data Encryption Standard}. {FIPS}
                 publication change notice",
  publisher =    "U.S. Department of Commerce, National Bureau of
                 Standards",
  address =      "Washinton, DC, USA",
  pages =        "various",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Electronic data processing departments --- Security
                 measures; Standards",
}

@Book{USWD:1983:EC,
  author =       "{United States.War Dept} and {United
                 States.Adjutant-General's Office}",
  title =        "Elements of cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "165",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "United States. War Dept. Training pamphlet no. 3. War
                 Dept document no. 117",
  acknowledgement = ack-nhfb,
  annote =       "Master microform held by: UnM. OP 66639. Microfilm.
                 Ann Arbor, Mich.: University Microfilms International,
                 19--. 1 reel; 35 mm.",
  keywords =     "Ciphers; Cryptography.",
}

@Article{Voydock:1983:SMH,
  author =       "Victor L. Voydock and Stephen T. Kent",
  title =        "Security Mechanisms in High-Level Network Protocols",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "2",
  pages =        "135--171",
  month =        jun,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356909.356913",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:27 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "The implications of adding security mechanisms to
                 high-level network protocols operating in an
                 open-system environment are analyzed. First the threats
                 to security that may arise in such an environment are
                 described, and then a set of goals for communications
                 security measures is established. This is followed by a
                 brief description of the two basic approaches to
                 communications security, link-oriented measures and
                 end-to-end measures, which concludes that end-to-end
                 measures are more appropriate in an open-system
                 environment. Next, relevant properties of data
                 encryption --- the fundamental technique on which all
                 communications security mechanisms are based --- are
                 discussed. The remainder of the paper describes how
                 end-to-end measures can be used to achieve each of the
                 security goals previously established.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "security os networks, computer networks",
}

@InProceedings{Wagner:1983:F,
  author =       "Neal R. Wagner",
  title =        "Fingerprinting",
  crossref =     "IEEE:1983:PSS",
  pages =        "18--22",
  year =         "1983",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1030.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Article{Weingarten:1983:CCP,
  author =       "F. Weingarten",
  title =        "Controlling cryptographic publication",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "41--48",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900330",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Willett:1983:TKS,
  author =       "Michael Willett",
  title =        "Trapdoor Knapsacks without Superincreasing Structure",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "1",
  pages =        "7--11",
  day =          "19",
  month =        jul,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "85e:94020",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C0230 (Economic, social and political aspects
                 of computing); C1260 (Information theory); C1290
                 (Applications of systems theory)",
  corpsource =   "Dept. of Math., Univ. of North Carolina, Greensboro,
                 NC, USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "computer programming; cryptography; information
                 theory; knapsacks; Merkle--Hellman public-key schemes;
                 operations research; polynomial-time algorithm;
                 superincreasing structure; trapdoor",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Williams:1983:PAP,
  author =       "M. H. Williams",
  title =        "The problem of absolute privacy",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "3",
  pages =        "169--171",
  day =          "5",
  month =        oct,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C6150J (Operating systems)",
  corpsource =   "Computer Sci. Dept., Heriot-Watt Univ., Edinburgh,
                 UK",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "computer operating systems; data privacy; data
                 processing --- Security of Data; data security; file
                 protection; operating systems (computers); security of
                 data",
  treatment =    "G General Review; P Practical",
}

@InProceedings{Winternitz:1983:POW,
  author =       "Robert S. Winternitz",
  title =        "Producing a One-Way Hash Function from {DES}",
  crossref =     "Chaum:1983:ACP",
  pages =        "203--207",
  year =         "1983",
  bibdate =      "Thu Oct 31 18:48:13 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
}

@Book{Wolfe:1983:FCC,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis [!]",
  publisher =    "Brooklyn College Press",
  address =      "Brooklyn",
  pages =        "various",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy. Mimeographed on
                 rectos only. Bound in printed paper wrappers. Library
                 of the American Cryptogram Association (George C. Lamb
                 Collection) Master microform held by: UnM. Microfilm.
                 Ann Arbor, Mich., University Microfilms International,
                 19--. reels. 35 mm.",
  keywords =     "Ciphers; Cryptography",
}

@Book{Yardley:1983:CBC,
  author =       "Herbert O. Yardley",
  title =        "The {Chinese Black Chamber}: an adventure in
                 espionage",
  publisher =    pub-HOUGHTON-MIFFLIN,
  address =      pub-HOUGHTON-MIFFLIN:adr,
  pages =        "xxiv + 225",
  year =         "1983",
  ISBN =         "0-395-34648-7",
  ISBN-13 =      "978-0-395-34648-8",
  LCCN =         "DS777.533.S65 Y37 1983",
  bibdate =      "Tue Dec 01 10:58:49 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Chinese title: Chung-kuo hei shih.",
  price =        "US\$13.95",
  acknowledgement = ack-nhfb,
}

@InProceedings{Alexi:1984:RRB,
  author =       "W. Alexi and B. Chor and O. Goldreich and C. P.
                 Schnorr",
  title =        "{RSA\slash Rabin} Bits are {$ 1 / 2 + 1 \mbox {Poly}
                 (\log N) $} Secure",
  crossref =     "IEEE:1984:ASF",
  pages =        "449--457",
  year =         "1984",
  bibdate =      "Thu Apr 5 06:13:39 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1984:BRP,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{The puzzle palace: a report
                 on NSA, America's most secret agency}}: James Bamford:
                 Boston: Houghton Mifflin Company, 1982, 465 pages.
                 \$16.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "57--57",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900300",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Anonymous:1984:ESC,
  author =       "Anonymous",
  title =        "{EDP} security: communications, database, end user,
                 encryption: advanced security concepts",
  number =       "3",
  publisher =    "FTP",
  address =      "Port Jefferson Station, NY, USA",
  pages =        "various",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "FTP technical library EDP security",
  acknowledgement = ack-nhfb,
}

@Article{Apostolico:1984:PMM,
  author =       "A. Apostolico and R. Giancarlo",
  title =        "Pattern matching machine implementation of a fast test
                 for unique decipherability",
  journal =      j-INFO-PROC-LETT,
  volume =       "18",
  number =       "3",
  pages =        "155--158",
  day =          "30",
  month =        mar,
  year =         "1984",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6140C (Optical information, image and video signal
                 processing); C1160 (Combinatorial mathematics); C1250
                 (Pattern recognition); C1260 (Information theory)",
  corpsource =   "ISI, Univ. of Salerno, Salerno, Italy",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "codes; fast implementation; graph theory; pattern
                 matching machine; pattern recognition; Sardinas-
                 Patterson-Even test; unique decipherability",
  treatment =    "N New Development; T Theoretical or Mathematical",
}

@Book{Barker:1984:CSG,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of shift-register generated stream
                 cipher systems",
  volume =       "39",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "ix + 247",
  year =         "1984",
  ISBN =         "0-89412-062-X",
  ISBN-13 =      "978-0-89412-062-6",
  LCCN =         "Z 104 B37 1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Spine title: Cryptanalysis --- stream cipher
                 systems.",
  keywords =     "Ciphers; Cryptography",
}

@Article{Blum:1984:HGC,
  author =       "Manuel Blum and Silvio Micali",
  title =        "How to Generate Cryptographically Strong Sequences of
                 Pseudo-Random Bits",
  journal =      j-SIAM-J-COMPUT,
  volume =       "13",
  number =       "4",
  pages =        "850--864",
  month =        "????",
  year =         "1984",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68P25 (65C10 68Q20)",
  MRnumber =     "86a:68021",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  referencedin = "Referenced in \cite[Ref. 7]{Goldreich:1997:FMCb}.",
}

@InProceedings{Blum:1984:IUC,
  author =       "Manuel Blum",
  title =        "Independent Unbiased Coin Flips from a Correlated
                 Biased Source: a Finite State {Markov} Chain",
  crossref =     "IEEE:1984:ASF",
  pages =        "425--433",
  year =         "1984",
  bibdate =      "Thu Feb 02 17:24:58 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Boyer:1984:PCR,
  author =       "Robert S. Boyer and J. Strother Moore",
  title =        "Proof checking the {RSA} public key encryption
                 algorithm",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "91",
  number =       "3",
  pages =        "181--189",
  year =         "1984",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  MRclass =      "68P25 (68T15 94A60)",
  MRnumber =     "85k:68024",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/amermathmonthly1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  fjournal =     "The American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@InCollection{Brickell:1984:EAA,
  author =       "E. F. Brickell and J. C. Lagarias and A. M. Odlyzko",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Evaluation of the {Adleman} attack on multiply
                 iterated knapsack cryptosystems (abstract)",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "39--42",
  year =         "1984",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "799 719",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Burton:1984:RPKa,
  author =       "Charles E. Burton",
  title =        "{RSA}: a Public Key Cryptography System Part {I}",
  journal =      j-DDJ,
  volume =       "9",
  number =       "3",
  pages =        "16--??",
  month =        mar,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 http://www.ddj.com/index/author/index.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib;
                 https://www.math.utah.edu/pub/tex/bib/fortran2.bib",
  acknowledgement = ack-nhfb,
  classification = "723; 921",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "computer programming --- Algorithms; computer
                 programming languages --- Fortran; computer programs;
                 computers, microprocessor --- Applications;
                 cryptography; modulo arithmetic; multi precision
                 arithmetic; public key system (PKS); Rational Fortran
                 (RATFOR)",
  pagecount =    "22p between p 16 and 43",
}

@Article{Burton:1984:RPKb,
  author =       "Charles E. Burton",
  title =        "{RSA}: a Public Key Cryptography System Part {II}",
  journal =      j-DDJ,
  volume =       "9",
  number =       "4",
  pages =        "32--??",
  month =        apr,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 http://www.ddj.com/index/author/index.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "computer programs; data processing; public key
                 cryptography",
  pagecount =    "20p between p 32 and 59",
}

@Article{Coppersmith:1984:FEL,
  author =       "D. Coppersmith",
  title =        "Fast evaluations of logarithms in fields of
                 characteristic two",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-30",
  number =       "4",
  pages =        "587--594",
  month =        "????",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1984.1056941",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Sun Mar 11 10:29:59 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Denning:1984:DSR,
  author =       "Dorothy E. Denning",
  title =        "Digital Signatures with {RSA} and Other Public-Key
                 Cryptosystems",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "388--392",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68P25",
  MRnumber =     "784 134",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InCollection{Denning:1984:FEA,
  author =       "Dorothy E. Denning",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Field encryption and authentication",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  pages =        "231--247",
  year =         "1984",
  MRclass =      "94A60",
  MRnumber =     "86j:94044",
  MRreviewer =   "Evangelos Kranakis",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
}

@Article{Fisher:1984:CCS,
  author =       "Warren W. Fisher",
  title =        "Cryptography for computer security: Making the
                 decision",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "229--233",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900440",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Franksen:1984:MBS,
  author =       "Ole Immanuel Franksen",
  title =        "{Mr. Babbage}'s secret: the tale of a cypher and
                 {APL}",
  publisher =    "Strandberg",
  address =      "Birkerod, Denmark",
  pages =        "319",
  year =         "1984",
  ISBN =         "87-87200-86-4",
  ISBN-13 =      "978-87-87200-86-8",
  LCCN =         "Z103.B2 F72 1984",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "APL (computer program language); Babbage, Charles,
                 1791--1871; ciphers --- history; cryptographers ---
                 Great Britain --- biography; cryptography --- history",
}

@Article{Frederickson:1984:PRT,
  author =       "P. Frederickson and R. Hiromoto and T. L. Jordan and
                 B. Smith and T. Warnock",
  title =        "Pseudo-random trees in {Monte Carlo}",
  journal =      j-PARALLEL-COMPUTING,
  volume =       "1",
  number =       "2",
  pages =        "175--180",
  month =        dec,
  year =         "1984",
  CODEN =        "PACOEJ",
  ISSN =         "0167-8191 (print), 1872-7336 (electronic)",
  ISSN-L =       "0167-8191",
  bibdate =      "Mon Apr 14 11:08:33 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/parallelcomputing.bib",
  acknowledgement = ack-nhfb,
  classification = "C1140G (Monte Carlo methods); C7300 (Natural
                 sciences computing); C7400 (Engineering computing)",
  corpsource =   "Los Alamos Nat. Lab., Los Alamos, NM, USA",
  fjournal =     "Parallel Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01678191/",
  keywords =     "digital simulation; Lehmer pseudorandom number
                 generator; MIMD architecture; Monte Carlo methods;
                 Monte Carlo simulations; parallel; parallel computers;
                 processing; pseudorandom trees; random number
                 generation; reproducibility; SIMD architecture;
                 supercomputer; trees (mathematics)",
  treatment =    "P Practical",
}

@Article{Goldwasser:1984:PE,
  author =       "Shafi Goldwasser and Silvio Micali",
  title =        "Probabilistic Encryption",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "28",
  number =       "2",
  pages =        "270--299",
  year =         "1984",
  CODEN =        "JCSSBM",
  ISSN =         "0022-0000",
  ISSN-L =       "0022-0000",
  MRclass =      "94A60 (11T71 68P25 68Q25)",
  MRnumber =     "86j:94047",
  MRreviewer =   "J. C. Lagarias",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  note =         "See also preliminary version in 14th STOC, 1982.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
  referencedin = "Referenced in \cite[Ref. 18]{Goldreich:1997:FMCb}.",
}

@PhdThesis{Goldwasser:1984:PET,
  author =       "Shafrira Goldwasser",
  title =        "Probabilistic encryption: theory and applications",
  type =         "Thesis ({Ph. D. in Computer Science})",
  school =       "Department of Computer Science, University of
                 California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "iv + 63",
  month =        dec,
  year =         "1984",
  LCCN =         "T7.6 .G628",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Photocopy. Ann Arbor, Mich.: University Microfilms
                 International, 1986. 22 cm.",
  keywords =     "Computers --- Access control; Cryptography;
                 dissertations; dissertations, academic --- UCB ---
                 computer science --- 1981--1990; University of
                 California, Berkeley. Computer Science Division",
}

@InProceedings{Grollmann:1984:CMP,
  author =       "J. Grollmann and A. L. Selman",
  title =        "Complexity Measures for Public-Key Cryptosystems",
  crossref =     "IEEE:1984:ASF",
  pages =        "495--503",
  year =         "1984",
  bibdate =      "Thu Apr 5 06:13:39 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Grundler:1984:DEH,
  author =       "Edward James Grundler",
  title =        "A data encryption hardware software package",
  type =         "Project ({M.S.})",
  school =       "California State University, Sacramento",
  address =      "Sacramento, CA, USA",
  pages =        "vii + 81",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Electronic data processing departments --- Security
                 measures.",
}

@Article{Haddon:1984:BRS,
  author =       "Bruce K. Haddon",
  title =        "Book review of ``{Security, IFIP\slash Sec'83:
                 proceedings of the first security conference''
                 North-Holland Publishing Co. 1983}",
  journal =      j-OPER-SYS-REV,
  volume =       "18",
  number =       "3",
  pages =        "14--14",
  month =        jul,
  year =         "1984",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:45 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Feak:1983:SIS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Haskett:1984:PAU,
  author =       "James A. Haskett",
  title =        "Pass-Algorithms: a User Validation Scheme Based on
                 Knowledge of Secret Algorithms",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "777--781",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 06:48:51 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Haskett84;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "cryptography",
  oldlabel =     "Haskett84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Haskett84",
}

@TechReport{IRD:1984:DTV,
  author =       "{International Resource Development, Inc.}",
  title =        "Data, text, and voice encryption equipment",
  type =         "Report",
  number =       "630",
  institution =  "International Resource Development",
  address =      "6 Prowitt St., Norwalk, CT 06855, USA",
  pages =        "vi + 184",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography equipment industry --- United States;
                 Market surveys --- United States.",
}

@InCollection{Jurgensen:1984:SRI,
  author =       "H. J{\"u}rgensen and D. E. Matthews",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Some results on the information theoretic analysis of
                 cryptosystems",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "303--356",
  year =         "1984",
  MRclass =      "94A60 (68Q25 94A17)",
  MRnumber =     "87b:94038",
  MRreviewer =   "James W. Snively, Jr.",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Kahn:1984:COS,
  author =       "D. Kahn",
  title =        "Cryptology and the origins of spread spectrum",
  journal =      j-IEEE-SPECTRUM,
  volume =       "21",
  number =       "9",
  pages =        "70--80",
  month =        sep,
  year =         "1984",
  CODEN =        "IEESAM",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1009.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  keywords =     "information hiding; steganography",
}

@Article{Kak:1984:MPK,
  author =       "S. C. Kak",
  title =        "On the method of puzzles for key distribution",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "13",
  number =       "2",
  pages =        "103--109",
  month =        apr,
  year =         "1984",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  bibdate =      "Sat Apr 26 12:20:22 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C6130 (Data handling techniques)",
  corpsource =   "Dept. of Electr. and Comput. Eng., Louisiana State
                 Univ., Baton Rouge, LA, USA",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "codes; cryptography; key distribution; nested puzzles
                 method; public channel; puzzles; work advantage",
  treatment =    "P Practical",
}

@MastersThesis{Kaliski:1984:AWA,
  author =       "Burton Stephen {Kaliski, Jr.}",
  title =        "Analysis of {Wyner}'s analog encryption scheme",
  type =         "Thesis ({B.S.})",
  school =       "Department of Electrical Engineering and Computer
                 Science, Massachusetts Institute of Technology",
  address =      "Cambridge, MA, USA",
  pages =        "97",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Supervised by Ronald L. Rivest.",
  acknowledgement = ack-nhfb,
}

@Article{Kothari:1984:CMW,
  author =       "S. Kothari and S. Lakshmivarahan",
  title =        "On the concealability of messages by the {Williams}
                 public-key encryption scheme",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "10",
  number =       "1",
  pages =        "15--24",
  year =         "1984",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94A60",
  MRnumber =     "85e:94017",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
}

@Book{Kozaczuk:1984:EHGa,
  author =       "W{\l}adys{\l}aw Kozaczuk",
  title =        "{Enigma}: how the {German} machine cipher was broken,
                 and how it was read by the {Allies} in {World War
                 Two}",
  publisher =    "Arms and Armour",
  address =      "London, UK",
  pages =        "xiv + 348",
  year =         "1984",
  ISBN =         "0-85368-640-8",
  ISBN-13 =      "978-0-85368-640-8",
  LCCN =         "D810.C88 K6813 1984b",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: W kregu Enigmy.",
  acknowledgement = ack-nhfb,
  keywords =     "World War, 1939--1945 --- cryptography",
}

@Book{Kozaczuk:1984:EHGb,
  author =       "W{\l}adys{\l}aw Kozaczuk",
  title =        "{Enigma}: How the {German} Machine Cipher Was Broken,
                 and How It Was Read by the {Allies} in {World War
                 Two}",
  publisher =    "University Publications of America",
  address =      "Frederick, MD, USA",
  pages =        "xiv + 348",
  year =         "1984",
  ISBN =         "0-89093-547-5",
  ISBN-13 =      "978-0-89093-547-7",
  LCCN =         "D810.C88 K6813 1984",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Edited and translated by Christopher Kasparek, from
                 the original Polish edition, {\em W kr{\c{e}}gu
                 Enigma}, Ksi{\c{a}}{\d{z}}ka i Wiedza, Warsaw, 1979.",
  price =        "US\$24.00",
  series =       "Foreign intelligence book series",
  acknowledgement = ack-nhfb,
  keywords =     "machine ciphers; World War, 1939--1945 ---
                 cryptography",
}

@Article{Krause:1984:DEI,
  author =       "Lothar Krause",
  title =        "Data encryption in {ISO}, the International
                 Organization for Standardization",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "234--236",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900452",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InCollection{Lagarias:1984:KPK,
  author =       "J. C. Lagarias",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Knapsack public key cryptosystems and {Diophantine}
                 approximation (extended abstract)",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "3--23",
  year =         "1984",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "86j:94050",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Lagarias:1984:PAS,
  author =       "J. C. Lagarias",
  booktitle =    "Automata, languages and programming (Antwerp, 1984)",
  title =        "Performance analysis of {Shamir}'s attack on the basic
                 {Merkle--Hellman} knapsack cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "172",
  pages =        "312--323",
  year =         "1984",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "68P25",
  MRnumber =     "784 259",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Landwehr:1984:SMM,
  author =       "Carl E. Landwehr and Constance L. Heitmeyer and John
                 McLean",
  title =        "A Security Model for Military Message System",
  journal =      j-TOCS,
  volume =       "2",
  number =       "3",
  pages =        "198--222",
  month =        aug,
  year =         "1984",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold/1984.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/bibsec.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@InCollection{Lidl:1984:PPR,
  author =       "Rudolf Lidl and Winfried B. M{\"u}ller",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Permutation polynomials in {RSA}-cryptosystems",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "293--301",
  year =         "1984",
  MRclass =      "94A60 (11T06)",
  MRnumber =     "86i:94040",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Mullin:1984:NMP,
  author =       "Albert A. Mullin",
  title =        "A note on the mathematics of public-key
                 cryptosystems",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "45--47",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900269",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@TechReport{NCSOTS:1984:ISR,
  author =       "{National Communications System (U.S.). Office of
                 Technology and Standards}",
  title =        "Interoperability and security requirements for use of
                 the {Data Encryption Standard} in the physical layer of
                 data communications",
  type =         "Federal standard",
  number =       "1026",
  institution =  "General Services Administration, Office of Information
                 Resources Management",
  address =      "Washington, DC, USA",
  pages =        "various",
  day =          "3",
  month =        aug,
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  govtdocnumber = "GS 2.8/3:1026 563",
  keywords =     "Cryptography --- Standards --- United States;
                 Government information --- Standards --- United
                 States",
}

@InProceedings{Nobauer:1984:CRS,
  author =       "Rupert N{\"o}bauer",
  title =        "Cryptanalysis of the {R{\'e}dei}-scheme",
  crossref =     "Eigenthaler:1984:CGA",
  pages =        "255--264",
  year =         "1984",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "87b:94040",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Odlyzko:1984:CAM,
  author =       "Andrew M. Odlyzko",
  title =        "Cryptanalytic attacks on the multiplicative knapsack
                 cryptosystem and on {Shamir}'s fast signature scheme",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-30",
  number =       "4",
  pages =        "594--601",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1984.1056942",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "86i:94041",
  MRreviewer =   "Tai Yang Hwang",
  bibdate =      "Mon Jul 19 07:08:40 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.research.att.com/~amo/doc/arch/knapsack.attacks.pdf;
                 http://www.research.att.com/~amo/doc/arch/knapsack.attacks.ps;
                 http://www.research.att.com/~amo/doc/arch/knapsack.attacks.troff",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  xxtitle =      "Cryptanalytic attacks on the multiplicative knapsack
                 cryptosystem and on {Shamir's} signature scheme",
}

@Article{Oldehoeft:1984:SSU,
  author =       "Arthur E. Oldehoeft and Robert McDonald",
  title =        "A software scheme for user-controlled file
                 encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "35--41",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900245",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ozarow:1984:WTC,
  author =       "Lawrence H. Ozarow and Aaron D. Wyner",
  title =        "Wire-tap channel {II}",
  journal =      j-ATT-BELL-LAB-TECH-J,
  volume =       "63",
  number =       "10 part 1",
  pages =        "2135--2157",
  year =         "1984",
  CODEN =        "ABLJER",
  ISSN =         "0748-612X (print), 2376-7162 (electronic)",
  ISSN-L =       "0748-612X",
  bibdate =      "Fri Nov 12 09:17:39 2010",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "In this paper we study a communication system in which
                 an unauthorized intruder is able to intercept a subset
                 of the transmitted symbols, and it is desired to
                 maximize the intruder's uncertainty about the data
                 without the use of an encryption key (either public or
                 private).",
  acknowledgement = ack-nhfb,
  fjournal =     "AT\&T Bell Laboratories Technical Journal",
  keywords =     "computers --- data communication systems",
  subject =      "conditional entropy; intruder's uncertainty;
                 unauthorized intruder; wire-tap channel",
  topic =        "data processing",
}

@Article{Porter:1984:CNS,
  author =       "Sig Porter",
  title =        "Cryptology and number sequences: Pseudorandom, random,
                 and perfectly random",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "43--44",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900257",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rao:1984:JEE,
  author =       "T. R. N. Rao",
  title =        "Joint encryption and error correction schemes",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "12",
  number =       "3",
  pages =        "240--241",
  month =        jun,
  year =         "1984",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:54 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Reeds:1984:FSU,
  author =       "James A. Reeds and Peter J. Weinberger",
  title =        "File Security and the {UNIX} System {\tt crypt}
                 Command",
  journal =      j-ATT-BELL-LAB-TECH-J,
  volume =       "63",
  number =       "8 part 2",
  pages =        "1673--1683",
  month =        oct,
  year =         "1984",
  CODEN =        "ABLJER",
  ISSN =         "0748-612X (print), 2376-7162 (electronic)",
  ISSN-L =       "0748-612X",
  bibdate =      "Fri Nov 12 09:17:39 2010",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in \cite[pp.~93--103]{ATT:1986:AUS}.",
  abstract =     "Sufficiently large files encrypted with the UNIX
                 system {\tt crypt} command can be deciphered in a few
                 hours by algebraic techniques and human interaction. We
                 outline such a decryption method and show it to be
                 applicable to a proposed strengthened algorithm as
                 well. We also discuss the role of encryption in file
                 security.",
  acknowledgement = ack-nhfb,
  fjournal =     "AT\&T Bell Laboratories Technical Journal",
  keywords =     "computer systems, digital",
  subject =      "crypt command; encryption; file security; UNIX
                 system",
  topic =        "data processing",
}

@Article{Rivest:1984:HEE,
  author =       "Ronald L. Rivest and Adi Shamir",
  title =        "How to Expose an Eavesdropper",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "393--395",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 27 13:18:33 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Routh:1984:PAA,
  author =       "Richard LeRoy Routh",
  title =        "A proposal for an architectural approach which
                 apparently solves all known software-based internal
                 computer security problems",
  journal =      j-OPER-SYS-REV,
  volume =       "18",
  number =       "3",
  pages =        "31--39",
  month =        jul,
  year =         "1984",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:45 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Saltzer:1984:EEA,
  author =       "J. H. Saltzer and D. P. Reed and D. D. Clark",
  key =          "Saltzer et al.",
  title =        "End-to-End Arguments in System Design",
  journal =      j-TOCS,
  volume =       "2",
  number =       "4",
  pages =        "277--288",
  month =        nov,
  year =         "1984",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Wed Mar 6 11:12:06 1985",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/digital.library.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Os/os.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/SE/dependability.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "This paper presents a design principle that helps
                 guide placement of functions among the modules of a
                 distributed computer system. The principle, called the
                 end-to-end argument, suggests that functions placed at
                 low levels of a system may be redundant or of little
                 value when compared with the cost of providing them at
                 that low level. Examples discussed in the paper include
                 bit-error recovery, security using encryption,
                 duplicate message suppression, recovery from system
                 crashes, and delivery acknowledgement. Low-level
                 mechanisms to support these functions are justified
                 only as performed enhancements.",
  acknowledgement = ack-nhfb,
  comments =     "Argues that you should put functionality at the higher
                 app layers, rather than at low layers. Includes a
                 security example",
  entered-by =   "Andreas Paepcke",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  keywords =     "data communication; design; design principles;
                 protocol design; TOCS",
}

@Book{Schroeder:1984:NTS,
  author =       "M. R. (Manfred Robert) Schroeder",
  title =        "Number theory in science and communication: with
                 applications in cryptography, physics, biology, digital
                 information, and computing",
  volume =       "7",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 324",
  year =         "1984",
  ISBN =         "0-387-12164-1",
  ISBN-13 =      "978-0-387-12164-2",
  LCCN =         "QA241 .S318 1984",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Springer series in information sciences",
  acknowledgement = ack-nhfb,
  keywords =     "number theory",
}

@Article{Shamir:1984:CCV,
  author =       "A. Shamir and C. P. Schnorr",
  title =        "Cryptanalysis of Certain Variants of {Rabin}'s
                 Signature Scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "19",
  number =       "3",
  pages =        "113--115",
  day =          "19",
  month =        oct,
  year =         "1984",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "86e:68029",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C6130 (Data handling techniques)",
  corpsource =   "Dept. of Appl. Math., Weizmann Inst. of Sci., Rehovot,
                 Israel",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "cleartext attacks; cryptanalysis; cryptography;
                 digital signatures; natural perturbation techniques;
                 protect; Rabin's signature scheme",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Shamir:1984:PTA,
  author =       "Adi Shamir",
  title =        "A polynomial-time algorithm for breaking the basic
                 {Merkle--Hellman} cryptosystem",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "30",
  number =       "5",
  pages =        "699--704",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1984.1056964",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60",
  MRnumber =     "86m:94032",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Siegenthaler:1984:CIN,
  author =       "T. Siegenthaler",
  title =        "Correlation-Immunity of Nonlinear Combining Functions
                 for Cryptographic Applications",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-30",
  number =       "5",
  pages =        "776--780",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1984.1056949",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Mon Nov 30 09:02:43 1998",
  bibsource =    "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Simmons:1984:HID,
  author =       "G. J. Simmons",
  title =        "How to Insure that Data Acquired to Verify Treaty
                 Compliance are Trustworthy",
  journal =      j-PROC-IEEE,
  volume =       "76",
  number =       "5",
  pages =        "621--627",
  month =        may,
  year =         "1984",
  CODEN =        "IEEPAD",
  ISSN =         "0018-9219",
  ISSN-L =       "0018-9219",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1003.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the IEEE",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5",
  keywords =     "information hiding; steganography",
}

@Article{Sorkin:1984:MCC,
  author =       "Arthur Sorkin and C. James Buchanan",
  title =        "Measurement of cryptographic capability protection
                 algorithms",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "101--116",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488490052X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Misc{StJohns:1984:RAS,
  author =       "M. {St. Johns}",
  title =        "{RFC 912}: Authentication service",
  day =          "1",
  month =        sep,
  year =         "1984",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}. Status:
                 UNKNOWN.",
  URL =          "ftp://ftp.internic.net/rfc/rfc912.txt;
                 ftp://ftp.internic.net/rfc/rfc931.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc912.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  format =       "TXT=4544 bytes",
  obsoletedby =  "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}.",
  online =       "yes",
  status =       "UNKNOWN",
}

@Article{Summers:1984:OCS,
  author =       "R. C. Summers",
  title =        "An Overview of Computer Security",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "309--325",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Presented is an overview of computer security,
                 including concepts, techniques, and measures relating
                 to the protection of computing systems and the
                 information they maintain against deliberate or
                 accidental threats. Motivations for security measures
                 are discussed. Security strategies are considered.
                 Actions and events that threaten security are
                 described, along with technical problems that can
                 prevent the computer from adequately dealing with
                 threats. Security models are surveyed. Specific
                 technical and administrative measures for promoting
                 security are described. Among the technical measures
                 discussed are design of secure systems, hardware and
                 operating systems, identification of users, encryption,
                 and access control packages. Administrative measures
                 include personnel, physical security of the computing
                 system, and auditing.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Los Angeles Scientific Cent, Los Angeles, CA,
                 USA",
  affiliationaddress = "IBM, Los Angeles Scientific Cent, Los Angeles,
                 CA, USA",
  classification = "723; 731",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; encryption; process control ---
                 Computer Applications; security measures; security
                 model; Security of Data; security threat sources",
}

@Article{Thersites:1984:IKE,
  author =       "Joan Thersites and John A. Thomas",
  title =        "An Infinite Key Encryption System",
  journal =      j-DDJ,
  volume =       "9",
  number =       "8",
  pages =        "44--??",
  month =        aug,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Mon Sep 2 09:09:39 MDT 1996",
  bibsource =    "http://www.ddj.com/index/author/index.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  xxnote =       "??Check author order??",
}

@Article{Thomas:1984:IKE,
  author =       "John A. Thomas and Joan Thersites",
  title =        "Infinite Key Encryption System",
  journal =      j-DDJ,
  volume =       "9",
  number =       "8",
  pages =        "44--??",
  month =        aug,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "codes, symbolic; computer programs; computers,
                 microcomputer; cryptography; data processing; file
                 encryption; infinite key encryption system; program
                 code; Security of Data",
  pagecount =    "35p between p 44 and 85",
}

@Article{Thompson:1984:RTT,
  author =       "Ken Thompson",
  title =        "Reflections on Trusting Trust",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "761--763",
  month =        aug,
  year =         "1984",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/358198.358210",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1028.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "information hiding; security; steganography; unix",
  remark =       "This is part two of the 1983 Turing Award Lecture.",
}

@Book{TI:1984:TTU,
  author =       "{Texas Instruments Inc}.",
  title =        "{TMS7500 TMS75C00} user's guide, data encryption
                 device: 8-bit microcomputer family",
  publisher =    "Texas Instruments",
  address =      "Dallas, TX, USA",
  pages =        "various",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "SPNU004",
  keywords =     "Microcomputers; TMS7500 (Computer).",
}

@Manual{USGSAOIRM:1984:ISR,
  author =       "{United States.General Services Administration.Office
                 of Information Resources Management}",
  title =        "Interoperability and security requirements for use of
                 the {Data Encryption Standard} in the physical layer of
                 data communications",
  number =       "1026",
  publisher =    "General Services Administration",
  address =      "Office of Information Resources Management",
  pages =        "various",
  year =         "1984",
  LCCN =         "GS 2.8/3:1026 Govt Pubs",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Cover title. ``August 3, 1983.'' ``FSC TELE.''",
  series =       "Federal standard",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- standards --- United States;
                 government information --- standards --- United
                 States",
}

@Article{Voydock:1984:SMT,
  author =       "Victor L. Voydock and Stephen T. Kent",
  title =        "Security Mechanisms in a Transport Layer Protocol",
  journal =      j-COMP-NET,
  volume =       "8",
  number =       "5--6",
  pages =        "433--449",
  month =        oct # "\slash " # dec,
  year =         "1984",
  CODEN =        "CNETDP",
  ISSN =         "0376-5075",
  ISSN-L =       "0376-5075",
  bibdate =      "Sat Sep 25 20:21:07 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Microcom Inc, Norwood, MA, USA",
  classification = "723; 902",
  fjournal =     "Computer Networks",
  journalabr =   "Comput Networks",
  keywords =     "Communication Systems; computer architecture ---
                 Standards; computer networks; computers --- Data; data
                 encryption standard; data processing --- Security of
                 Data; Protocols; security; transport layer protocol",
}

@InProceedings{Wah:1984:RAM,
  author =       "P. K. S. Wah and M. Z. Wang",
  editor =       "{IEEE}",
  booktitle =    "{1984 International Zurich Seminar on Digital
                 Communications: applications of source coding, channel
                 coding and secrecy coding: March 6--8, 1984,
                 Z{\"u}rich, Switzerland, Swiss Federal Institute of
                 Technology: proceedings}",
  title =        "Realization and application of the {Massey--Omura}
                 lock",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  bookpages =    "xi + 201",
  pages =        "175--182",
  year =         "1984",
  LCCN =         "TK7881.5 I65 1984",
  bibdate =      "Sun Mar 11 10:47:07 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "IEEE catalog number 84CH1998-4.",
  acknowledgement = ack-nhfb,
}

@Article{Winternitz:1984:SOH,
  author =       "Robert S. Winternitz",
  title =        "Secure One-Way Hash Function Built from {DES}",
  journal =      "Proceedings of the Symposium on Security and Privacy",
  pages =        "88--90",
  year =         "1984",
  CODEN =        "PSSPEO",
  ISBN =         "0-8186-0532-4",
  ISBN-13 =      "978-0-8186-0532-1",
  LCCN =         "QA76.9.A25 S95 1984",
  bibdate =      "Tue May 12 09:47:14 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "IEEE Service Cent. Piscataway, NJ, USA.",
  acknowledgement = ack-nhfb,
  classification = "723; 902",
  conference =   "Proceedings of the 1984 Symposium on Security and
                 Privacy.",
  journalabr =   "Proc Symp Secur Privacy",
  keywords =     "authentication of information; data encryption
                 standard (des); data processing; digital message
                 signing for security and efficiency; encryption
                 algorithms; randomly chosen block cipher; secure
                 one-way hash function",
  meetingaddress = "Oakland, CA, USA",
  sponsor =      "IEEE Computer Soc, Technical Committee on Security \&
                 Privacy, Los Alamitos, Calif, USA; IEEE, New York, NY,
                 USA",
}

@InProceedings{Akl:1985:FPR,
  author =       "Selim G. Akl and Henk Meijer",
  title =        "A Fast Pseudo Random Permutation Generator With
                 Applications to Cryptology",
  crossref =     "Blakley:1985:ACP",
  pages =        "269--275",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=269",
  acknowledgement = ack-nhfb,
}

@InProceedings{Anonymous:1985:BM,
  author =       "Anonymous",
  title =        "Back matter",
  crossref =     "Blakley:1985:ACP",
  pages =        "??--??",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=??",
  acknowledgement = ack-nhfb,
}

@TechReport{Anonymous:1985:DEA,
  author =       "Anonymous",
  title =        "Data encryption algorithm: Electronic funds transfer:
                 requirements for interfaces",
  institution =  "????",
  address =      "????",
  pages =        "16",
  year =         "1985",
  ISBN =         "0-7262-3764-7",
  ISBN-13 =      "978-0-7262-3764-5",
  bibdate =      "Wed Sep 28 07:58:30 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{Aruliah:1985:PIE,
  author =       "A. A. Aruliah and G. I. Parkin and Brian A. Wichmann",
  title =        "A {Pascal} implementation of the {DES} encryption
                 algorithm including cipher block chaining",
  type =         "NPL report",
  number =       "DITC 61/85",
  institution =  "National Physical Laboratory, Division of Information
                 Technology and Computing",
  address =      "Teddington, Middlesex, UK",
  pages =        "37",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Electronic data processing; Pascal
                 (Computer program language)",
}

@InProceedings{Beker:1985:KMS,
  author =       "Henry Beker and Michael Walker",
  title =        "Key Management for Secure Electronic Funds Transfer in
                 a Retail Environment",
  crossref =     "Blakley:1985:ACP",
  pages =        "401--410",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=401",
  acknowledgement = ack-nhfb,
}

@Book{Beker:1985:SSC,
  author =       "Henry Beker and F. C. (Frederick Charles) Piper",
  title =        "Secure speech communications",
  volume =       "3",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "xi + 267",
  year =         "1985",
  ISBN =         "0-12-084780-9",
  ISBN-13 =      "978-0-12-084780-8",
  LCCN =         "TK5102.5 .B354 1985",
  bibdate =      "Fri Nov 25 08:37:47 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Microelectronics and signal processing",
  acknowledgement = ack-nhfb,
  subject =      "Scrambling systems (Telecommunication)",
}

@InProceedings{Bennett:1985:UQC,
  author =       "Charles H. Bennett and Gilles Brassard",
  title =        "An Update on Quantum Cryptography",
  crossref =     "Blakley:1985:ACP",
  pages =        "475--480",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=475",
  acknowledgement = ack-nhfb,
}

@Article{Birrell:1985:SCU,
  author =       "Andrew D. Birrell",
  title =        "Secure Communication Using Remote Procedure Calls",
  journal =      j-TOCS,
  volume =       "3",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "1985",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 06:47:30 MST 1999",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tocs/1985-3-1/p1-birrell/",
  abstract =     "Research on encryption-based secure communication
                 protocols has reached a stage where it is feasible to
                 construct end-to-end secure protocols. The design of
                 such a protocol, built as part of a remote procedure
                 call package, is described. The security abstraction
                 presented to users of the package, the authentication
                 mechanisms, and the protocol for encrypting and
                 verifying remote calls are also described.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Xerox Corp",
  classification = "723",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  journalabr =   "ACM Trans Comput Syst",
  keywords =     "computer networks; cryptography; design;
                 experimentation; Protocols; remote procedure calls;
                 secure communication; security",
  subject =      "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
                 Protection, Cryptographic controls. {\bf C.2.0}
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, General, Security and protection (e.g.,
                 firewalls). {\bf C.2.2} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Protocol architecture.",
}

@InProceedings{Blake:1985:CLG,
  author =       "I. F. Blake and R. C. Mullin and S. A. Vanstone",
  title =        "Computing Logarithms in {$ {\rm GF}(2^n) $}",
  crossref =     "Blakley:1985:ACP",
  pages =        "73--82",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=73",
  acknowledgement = ack-nhfb,
}

@InProceedings{Blakley:1985:ITF,
  author =       "G. R. Blakley",
  title =        "Information Theory without the Finiteness Assumption,
                 {I}: Cryptosystems as Group-Theoretic Objects",
  crossref =     "Blakley:1985:ACP",
  pages =        "314--338",
  year =         "1985",
  MRclass =      "94A60 (20F99)",
  MRnumber =     "87c:94034",
  MRreviewer =   "D. Lieberman",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=314",
  acknowledgement = ack-nhfb,
}

@InProceedings{Blakley:1985:SRS,
  author =       "G. R. Blakley and Catherine Meadows",
  title =        "Security of Ramp Schemes",
  crossref =     "Blakley:1985:ACP",
  pages =        "242--268",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=242",
  acknowledgement = ack-nhfb,
}

@InProceedings{Blum:1985:EPP,
  author =       "Manuel Blum and Shafi Goldwasser",
  title =        "An Efficient Probabilistic Public-Key Encryption
                 Scheme Which Hides All Partial Information",
  crossref =     "Blakley:1985:ACP",
  pages =        "289--302",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "87e:94029",
  MRreviewer =   "Willi Meier",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=289",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Goldreich:1997:FMCb}.",
  xxpages =      "289--299",
}

@Article{Book:1985:CRE,
  author =       "Ronald V. Book and Friedrich Otto",
  title =        "Cancellation Rules and Extended Word Problems",
  journal =      j-INFO-PROC-LETT,
  volume =       "20",
  number =       "1",
  pages =        "5--11",
  day =          "2",
  month =        jan,
  year =         "1985",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68Q45 (03D03)",
  MRnumber =     "87d:68054",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California, Santa Barbara, Dep of Mathematics,
                 Santa Barbara, CA, USA",
  affiliationaddress = "Univ of California, Santa Barbara, Dep of
                 Mathematics, Santa Barbara, CA, USA",
  classification = "721; B6120B (Codes); B6150 (Communication system
                 theory)",
  corpsource =   "Dept. of Maths., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "automata theory; cancellation rules; Church--Rosser
                 property; computer metatheory; congruences;
                 cryptography; extended word problems; Formal Languages;
                 formal model; name-stamp protocols; protocols; public
                 key encryption; rewriting process; secure network
                 communication; Thue systems",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Book:1985:SNP,
  author =       "R. V. Book and F. Otto",
  title =        "On the security of name-stamp protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "39",
  number =       "2-3",
  pages =        "319--325",
  month =        aug,
  year =         "1985",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
  acknowledgement = ack-nhfb,
  classification = "C5620 (Computer networks and techniques); C6130
                 (Data handling techniques)",
  corpsource =   "Dept. of Math., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "cryptography; name-stamp protocols; p-parity cascade
                 protocols; protocols; security; two-party cascade
                 protocols",
  pubcountry =   "Netherlands A15",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Book:1985:SNS,
  author =       "R. V. Book and F. Otto",
  title =        "On the security of name-stamp protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "39",
  number =       "2-3",
  pages =        "319--325",
  month =        aug,
  year =         "1985",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "C5620 (Computer networks and techniques); C6130
                 (Data handling techniques)",
  corpsource =   "Dept. of Math., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "cryptography; name-stamp protocols; p-parity cascade
                 protocols; protocols; security; two-party cascade
                 protocols",
  pubcountry =   "Netherlands A15",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Book:1985:VTA,
  author =       "R. V. Book and F. Otto",
  title =        "On the verifiability of two-party algebraic
                 protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "40",
  number =       "2-3",
  pages =        "101--130",
  month =        "????",
  year =         "1985",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
  acknowledgement = ack-nhfb,
  classification = "B6210L (Computer communications); C5620 (Computer
                 networks and techniques); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Math., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "communication protocols; cryptography; protocols;
                 public-key cryptosystems; two-party algebraic
                 protocols; verifiability",
  pubcountry =   "Netherlands A02",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@Article{Bounas:1985:DDS,
  author =       "Adam C. Bounas",
  title =        "Direct determination of a ``seed'' binary matrix",
  journal =      j-INFO-PROC-LETT,
  volume =       "20",
  number =       "1",
  pages =        "47--50",
  day =          "2",
  month =        jan,
  year =         "1985",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60 (94A15)",
  MRnumber =     "86g:94038",
  MRreviewer =   "S. Guia{\c{s}}u",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Greek Atomic Energy Commission, Computer Science
                 Dep, Attiki, Greece",
  classification = "723; 922; B6120B (Codes); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Comput. Sci., Min. of Res. and Technol.,
                 Greek Atomic Energy Comm., Attiki, Greece",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "binary matrix; cryptography; data transformation;
                 generalized feedback shift register pseudorandom number
                 generator; keys; mathematical statistics --- Random
                 Number Generation; pseudorandom number generators;
                 random number generation; seed matrices; seed matrix;
                 stream enciphering",
  treatment =    "T Theoretical or Mathematical",
}

@InProceedings{Brickell:1985:BIK,
  author =       "Ernest F. Brickell",
  title =        "Breaking Iterated Knapsacks",
  crossref =     "Blakley:1985:ACP",
  pages =        "342--358",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=342",
  acknowledgement = ack-nhfb,
}

@Article{Burton:1985:EAC,
  author =       "Charles E. Burton",
  title =        "An Enhanced {ADFGVX} Cipher System",
  journal =      j-DDJ,
  volume =       "10",
  number =       "2",
  pages =        "48--??",
  month =        feb,
  year =         "1985",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 http://www.ddj.com/index/author/index.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "ADFGVX cipher; computer programs; cryptography; data
                 processing; decrypted text; encrypted messages;
                 information theory --- Data Compression; Security of
                 Data",
  pagecount =    "19p between p 48 and 70",
}

@Article{Chan:1985:NMP,
  author =       "B. Chan and H. Meijer",
  title =        "A note on the method of puzzles for key distribution",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "14",
  number =       "4",
  pages =        "221--223",
  month =        aug,
  year =         "1985",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  bibdate =      "Sat Apr 26 12:20:22 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C1260 (Information theory)",
  corpsource =   "Dept. of Comput. and Inf. Sci., Queens Univ.,
                 Kingston, Ont., Canada",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "cryptography; error correction codes; key
                 distribution; linear error correcting codes; public key
                 cryptosystem; puzzles; security of data",
  treatment =    "T Theoretical or Mathematical",
}

@InProceedings{Chaum:1985:HKS,
  author =       "David Chaum",
  title =        "How to Keep a Secret Alive Extensible Partial Key, Key
                 Safeguarding, and Threshold Systems",
  crossref =     "Blakley:1985:ACP",
  pages =        "481--485",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=481",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chaum:1985:NSC,
  author =       "David Chaum",
  title =        "New Secret Codes Can Prevent a Computerized Big
                 Brother",
  crossref =     "Blakley:1985:ACP",
  pages =        "432--433",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=432",
  acknowledgement = ack-nhfb,
}

@Article{Chaum:1985:SIT,
  author =       "David Chaum",
  title =        "Security without identification: transaction systems
                 to make big brother obsolete",
  journal =      j-CACM,
  volume =       "28",
  number =       "10",
  pages =        "1030--1044",
  month =        oct,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.acm.org/pubs/toc/;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-c.html#cacm1980",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4373.html;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1022.html",
  abstract =     "The large-scale automated transaction systems of the
                 near future can be designed to protect the privacy and
                 maintain the security of both individuals and
                 organizations.",
  acknowledgement = ack-nhfb,
  annote =       "Extensive article on use of random, transient personal
                 id's. A digital pseudonym with each organization.",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "design; human factors; information hiding; security;
                 steganography",
  referencedin = "Referenced in \cite[Ref. 4]{Kaliski:1995:SUR}.",
  review =       "ACM CR 8608-0693",
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Security and
                 protection. {\bf E.3}: Data, DATA ENCRYPTION. {\bf
                 J.1}: Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Financial. {\bf K.4.1}: Computing Milieux,
                 COMPUTERS AND SOCIETY, Public Policy Issues, Privacy.
                 {\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Social Issues, Abuse and crime involving computers.",
}

@InProceedings{Chen:1985:RGE,
  author =       "Su-shing Chen",
  title =        "On Rotation Group and Encryption of Analog Signals",
  crossref =     "Blakley:1985:ACP",
  pages =        "95--100",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=95",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chor:1985:KTP,
  author =       "Benny Chor and Ronald L. Rivest",
  title =        "A Knapsack Type Public Key Cryptosystem Based On
                 Arithmetic in Finite Fields (preliminary draft)",
  crossref =     "Blakley:1985:ACP",
  pages =        "54--65",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "820 013",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also revised version in \cite{Chor:1988:KTP}.",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=54",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chor:1985:RRL,
  author =       "Benny Chor and Oded Goldreich",
  title =        "{RSA\slash Rabin} least significant bits are {$ \frac
                 {1}{2} + \frac {1}{{\rm poly}(\log N)} $} secure
                 (extended abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "303--313",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=303",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chor:1985:VSS,
  author =       "B. Chor and S. Goldwasser and S. Micali and B.
                 Awerbuch",
  title =        "Verifiable Secret Sharing and Achieving Simultaneity
                 in the Presence of Faults",
  crossref =     "IEEE:1985:FOC",
  pages =        "383--395 (or 335--344??)",
  year =         "1985",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 7]{Canetti:1997:PSL},
                 \cite[Ref. 6]{Gemmell:1997:ITC}.",
  xxtitle =      "Verifiable Secret Sharing and Achieving Simultaneous
                 Broadcast",
}

@Article{Coppersmith:1985:AF,
  author =       "D. Coppersmith and J. H. Davenport",
  title =        "An Application of Factoring",
  journal =      j-J-SYMBOLIC-COMP,
  volume =       "1",
  number =       "2",
  pages =        "241--243",
  month =        jun,
  year =         "1985",
  CODEN =        "JSYCEH",
  ISSN =         "0747-7171 (print), 1095-855X (electronic)",
  ISSN-L =       "0747-7171",
  MRclass =      "11T71 (11Y16 68Q40)",
  MRnumber =     "87b:11125",
  MRreviewer =   "Kevin S. McCurley",
  bibdate =      "Sat May 10 15:54:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsymcomp.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Symbolic Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07477171",
  keywords =     "Factorization, Logarithms, Cryptography, SCRATCHPAD",
}

@InProceedings{Davies:1985:MAA,
  author =       "Donald Watts Davies",
  title =        "A Message Authenticator Algorithm Suitable for a
                 Mainframe Computer",
  crossref =     "Blakley:1985:ACP",
  pages =        "393--400",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=393",
  acknowledgement = ack-nhfb,
}

@InProceedings{Davio:1985:EHS,
  author =       "Marc Davio and Yvo Desmedt and Jo Goubert and Frank
                 Hoornaert and Jean-Jacques Quisquater",
  title =        "Efficient hardware and software implementations for
                 the {DES}",
  crossref =     "Blakley:1985:ACP",
  pages =        "144--146",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=144",
  acknowledgement = ack-nhfb,
}

@Article{Davis:1985:NRI,
  author =       "J. A. Davis and D. B. Holdridge",
  title =        "New results on integer factorizations",
  journal =      j-CONG-NUM,
  volume =       "46",
  pages =        "65--78",
  year =         "1985",
  ISSN =         "0384-9864",
  MRclass =      "11Y05 (94A60)",
  MRnumber =     "86f:11098",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Proceedings of the fourteenth Manitoba conference on
                 numerical mathematics and computing (Winnipeg, Man.,
                 1984).",
  acknowledgement = ack-nhfb,
  fjournal =     "Congressus Numerantium",
}

@InProceedings{Davis:1985:UFS,
  author =       "J. A. Davis and D. B. Holdridge",
  title =        "An Update on Factorization at {Sandia National
                 Laboratories}",
  crossref =     "Blakley:1985:ACP",
  pages =        "114--114",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=114",
  acknowledgement = ack-nhfb,
}

@Book{Dawson:1985:COL,
  author =       "M. J. Dawson",
  title =        "Cryptanalysis of ornithological literature",
  volume =       "4",
  publisher =    "Oriel Stringer",
  address =      "Brighton",
  pages =        "40",
  year =         "1985",
  ISBN =         "0-948122-04-8 (paperback)",
  ISBN-13 =      "978-0-948122-04-0 (paperback)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Caliologists' series",
  acknowledgement = ack-nhfb,
  keywords =     "Birds --- Great Britain --- Nests; Great Britain ---
                 Birds --- Nests",
}

@Book{Deavours:1985:MCM,
  author =       "Cipher A. Deavours and Louis Kruh",
  title =        "Machine cryptography and modern cryptanalysis",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "xiv + 258",
  year =         "1985",
  ISBN =         "0-89006-161-0",
  ISBN-13 =      "978-0-89006-161-9",
  LCCN =         "Z103 .D431 1985",
  MRclass =      "94A60 (01A60 94-03)",
  MRnumber =     "87h:94017",
  MRreviewer =   "Harriet Fell",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "The Artech House telecom library",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Machine ciphers; World War, 1939--1945
                 --- Cryptography.",
}

@InProceedings{Delsarte:1985:FCM,
  author =       "P. Delsarte and Y. Desmedt and A. Odlyzko and P.
                 Piret",
  title =        "Fast cryptanalysis of the {Matsumoto--Imai} public key
                 scheme",
  crossref =     "Beth:1985:ACP",
  pages =        "142--149",
  year =         "1985",
  DOI =          "https://doi.org/10.1007/3-540-39757-4_14",
  MRclass =      "94A60",
  MRnumber =     "87c:94037",
  bibdate =      "Mon Jul 19 07:03:50 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.research.att.com/~amo/doc/arch/break.mi.scheme.pdf;
                 http://www.research.att.com/~amo/doc/arch/break.mi.scheme.ps;
                 http://www.research.att.com/~amo/doc/arch/break.mi.scheme.troff",
  acknowledgement = ack-nhfb,
}

@InProceedings{Desmedt:1985:DOI,
  author =       "Yvo Desmedt and Jean-Jacques Quisquater and Marc
                 Davio",
  title =        "Dependence of output on input in {DES}: Small
                 avalanche characteristics",
  crossref =     "Blakley:1985:ACP",
  pages =        "359--376",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=359",
  acknowledgement = ack-nhfb,
}

@Book{DRC:1985:AAN,
  author =       "{Datapro Research Corporation}",
  title =        "All about network access control and data encryption
                 devices: with in-depth analyses of leading devices",
  publisher =    "Datapro Research Corporation",
  address =      "Delran, NJ, USA",
  pages =        "65",
  month =        jun,
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Special report prepared by editors of Datapro's
                 monthly loose-leaf services.",
  keywords =     "Computers --- Access control; Electronic data
                 processing.",
}

@TechReport{Ecker:1985:STS,
  author =       "Allen Ecker",
  title =        "Satellite television, signal encryption and the future
                 of broadband distribution",
  type =         "Seminar notes",
  institution =  "Communications Forum, Massachusetts Institute of
                 Technology",
  address =      "Cambridge, MA, USA",
  pages =        "13",
  day =          "19",
  month =        sep,
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{El-Gamal:1985:PCS,
  author =       "T. El-Gamal",
  title =        "A public-key cryptosystem and a signature scheme based
                 on discrete logarithms",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "4",
  pages =        "469--472",
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1985.1057074",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  referencedin = "Referenced in \cite[Ref. 4]{Handschuh:1998:SCC}.",
}

@Article{ElGamal:1985:PKCa,
  author =       "Taher ElGamal",
  title =        "A public key cryptosystem and a signature scheme based
                 on discrete logarithms",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "4",
  pages =        "469--472",
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1985.1057074",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "86j:94045",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@InProceedings{ElGamal:1985:PKCb,
  author =       "Taher ElGamal",
  title =        "A Public Key Cryptosystem and a Signature Scheme Based
                 on Discrete Logarithms",
  crossref =     "Blakley:1985:ACP",
  pages =        "10--18",
  year =         "1985",
  MRclass =      "94A60 (11T71 68P25)",
  MRnumber =     "87b:94037",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=10",
  acknowledgement = ack-nhfb,
}

@Article{ElGamal:1985:STA,
  author =       "Taher ElGamal",
  title =        "A subexponential-time algorithm for computing discrete
                 logarithms over {$ {\rm GF}(p^2) $}",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "4",
  pages =        "473--481",
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1985.1057075",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Sun Mar 11 10:34:00 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@InProceedings{Even:1985:CSW,
  author =       "Shimon Even",
  title =        "On the complexity of some word problems that arise in
                 testing the security of protocols",
  crossref =     "Apostolico:1985:CAW",
  pages =        "299--314",
  year =         "1985",
  MRclass =      "68Q25 (68P25 94A60)",
  MRnumber =     "87a:68080",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Even:1985:PCC,
  author =       "S. Even and O. Goldreich",
  title =        "On the Power of Cascade Ciphers",
  journal =      j-TOCS,
  volume =       "3",
  number =       "2",
  pages =        "108--116",
  month =        may,
  year =         "1985",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 06:47:30 MST 1999",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tocs/1985-3-2/p108-even/",
  abstract =     "The unicity distance of a cascade of random ciphers,
                 with respect to known plaintext attack, is shown to be
                 the sum of the key lengths. At time-space trade-off for
                 the exhaustive cracking of a cascade of ciphers is
                 shown. The structure of the set of permutations
                 realized by a cascade is studied; it is shown that only
                 l. 2**k exhaustive experiments are necessary to
                 determine the behavior of a cascade of l stages, each
                 having k key bits. It is concluded that the cascade of
                 random ciphers is not a random cipher. Yet, it is shown
                 that, with probability, the number of permutations
                 realizable by a cascade of l random ciphers, each
                 having k key bits, is 2**l**k. Next, it is shown that
                 two stages are not worse than one, by a simple
                 reduction of the cracking problem of any of the stages
                 to the cracking problem of the cascade. Finally, it is
                 shown that proving a nonpolynomial lower bound on the
                 cracking problem of long cascades is a hard task, since
                 such a bound implies that P does not equal NP.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technion-Israel Inst of Technology, Haifa, Isr",
  classification = "723",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  journalabr =   "ACM Trans Comput Syst",
  keywords =     "algorithms; cascade ciphers; cryptography; data
                 encryption; data processing --- Security of Data;
                 random ciphers; security; theory; unicity distance",
  subject =      "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
                 Protection. {\bf E.3} Data, DATA ENCRYPTION.",
}

@Article{Even:1985:RPS,
  author =       "Shimon Even and Oded Goldreich and Abraham Lempel",
  title =        "A randomized protocol for signing contracts",
  journal =      j-CACM,
  volume =       "28",
  number =       "6",
  pages =        "637--647",
  month =        jun,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68P25",
  MRnumber =     "800 680",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3818.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "security; theory; verification",
  review =       "ACM CR 8512-1137",
  subject =      "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption
                 standard (DES). {\bf E.3}: Data, DATA ENCRYPTION,
                 Public key cryptosystems. {\bf C.2.2}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Protocols. {\bf H.4.3}: Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Communications
                 Applications, Electronic mail. {\bf J.1}: Computer
                 Applications, ADMINISTRATIVE DATA PROCESSING,
                 Financial.",
}

@InProceedings{Fairfield:1985:LDE,
  author =       "R. C. Fairfield and A. Matusevich and J. Plany",
  title =        "An {LSI Digital Encryption Processor (DEP)}",
  crossref =     "Blakley:1985:ACP",
  pages =        "115--143",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "820 017",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=115",
  acknowledgement = ack-nhfb,
}

@InProceedings{Fairfield:1985:LRN,
  author =       "R. C. Fairfield and R. L. Mortenson and K. B.
                 Coulthart",
  title =        "An {LSI} Random Number Generator ({RNG})",
  crossref =     "Blakley:1985:ACP",
  pages =        "203--230",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=203",
  acknowledgement = ack-nhfb,
}

@InProceedings{Fortune:1985:PP,
  author =       "Steven Fortune and Michael Merritt",
  title =        "Poker Protocols",
  crossref =     "Blakley:1985:ACP",
  pages =        "454--464",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=454",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Franklin:1985:MID,
  author =       "Matthew Keith Franklin",
  title =        "Mathematical investigations of the {Data Encryption
                 Standard}",
  type =         "Thesis ({M.A. in Mathematics})",
  school =       "Department of Mathematics, University of California,
                 Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "36",
  month =        may,
  year =         "1985",
  LCCN =         "C 2 930 522",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "University of California, Berkeley --- dissertations
                 --- mathematics",
}

@Book{Franksen:1985:MBS,
  author =       "Ole Immanuel Franksen",
  title =        "{Mr. Babbage}'s secret: the tale of a cypher and
                 {APL}",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "319",
  year =         "1985",
  ISBN =         "0-13-604729-7",
  ISBN-13 =      "978-0-13-604729-2",
  LCCN =         "Z103.B2 F721 1985",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "APL (computer program language); Babbage, Charles,
                 1791--1871; ciphers --- history; cryptographers ---
                 Great Britain --- biography; cryptography --- history",
}

@Book{Gleason:1985:ECP,
  author =       "Andrew M. Gleason and Walter F. Penney and Ronald E.
                 Wyllys",
  title =        "Elementary course in probability for the
                 cryptanalyst",
  volume =       "41",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Revised",
  pages =        "????",
  year =         "1985",
  ISBN =         "0-89412-072-7",
  ISBN-13 =      "978-0-89412-072-5",
  LCCN =         "Z104 .G53 1985",
  bibdate =      "Wed May 11 23:23:17 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  subject =      "Probabilities; Cryptography",
}

@InProceedings{Goldreich:1985:CAR,
  author =       "Oded Goldreich and Shafi Goldwasser and Silvio
                 Micali",
  title =        "On the Cryptographic Applications of Random Functions
                 (Extended Abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "276--288",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=276",
  acknowledgement = ack-nhfb,
}

@InProceedings{Goldwasser:1985:PSS,
  author =       "Shafi Goldwasser and Silvio Micali and Ronald L.
                 Rivest",
  title =        "A {``Paradoxical''} Solution to the Signature
                 Problem",
  crossref =     "Blakley:1985:ACP",
  pages =        "467--467",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=467",
  acknowledgement = ack-nhfb,
}

@Article{Goodman:1985:NTK,
  author =       "R. M. F. Goodman and A. J. McAuley",
  booktitle =    "Advances in cryptology (Paris, 1984)",
  title =        "A new trapdoor knapsack public key cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "209",
  pages =        "150--158",
  year =         "1985",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "87c:94038",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Gordon:1985:SPE,
  author =       "John A. Gordon",
  title =        "Strong primes are easy to find",
  crossref =     "Beth:1985:ACP",
  pages =        "216--223",
  year =         "1985",
  DOI =          "https://doi.org/10.1007/3-540-39757-4_19",
  bibdate =      "Sun Mar 11 10:24:54 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "A {\em strong prime\/} $p$ is a prime that satisfies
                 three conditions: (1) $ p = 1 \bmod r $, (2) $ p = (s -
                 1) \bmod s $, and (3) $ r = 1 \bmod t $, where $r$,
                 $s$, and $t$ are all large random primes of a given
                 number of bits.",
}

@InProceedings{Haastad:1985:CST,
  author =       "J. H{\aa}stad and A. Shamir",
  title =        "The cryptographic security of truncated linearly
                 related variables",
  crossref =     "ACM:1985:PSA",
  pages =        "356--362",
  year =         "1985",
  bibdate =      "Wed Feb 20 18:33:46 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/22145/p356-hastad/p356-hastad.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/22145/p356-hastad/",
  acknowledgement = ack-nhfb,
}

@Manual{Hardy:1985:ECC,
  author =       "John M. Hardy and Dorothy W. Fuller and Douglas R.
                 Long and Jane C. Hartin and Faye Davis",
  title =        "Electronic cryptographic communications equipment
                 specialist {(AFSC 30650)}",
  number =       "CDC 30650",
  organization = "Extension Course Institute, Air University",
  address =      "????",
  pages =        "various",
  year =         "1985",
  LCCN =         "D 301.26/17-2:30650 2 8502 Govt Pubs; Other Govt Docs
                 numbers: D 301.26/17-2:30650 04 8502",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "``30650 -2 8502''--Vol. 2. ``30650 04 8502''--Vol. 4.
                 ``CDC 30650.'' Description based in vol. 2.
                 Bibliography: vol. 2, p. 153. Contents: v. 2. Advanced
                 electronics / [prepared by John M. Hardy; edited by
                 Dorothy W. Fuller] -- v. 4. Maintenance practices and
                 test equipment / [prepared by John M. Hardy, Douglas R.
                 Long; edited by Jane C. Hartin, Faye Davis].",
  keywords =     "cryptography -- handbooks, manuals, etc; electronics
                 in military engineering -- handbooks, manuals, etc;
                 United States. Air Force -- handbooks, manuals, etc",
}

@Article{HJH:1985:BRK,
  author =       "HJH",
  title =        "Book Review: {{\booktitle{Kahn on codes: Secrets of
                 the new cryptology}}: David Kahn New York: Macmillan
                 Publishing Company, 1984. 344 + viii pages, \$19.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "247--247",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900379",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Hoornaert:1985:EHI,
  author =       "Frank Hoornaert and Jo Goubert and Yvo Desmedt",
  title =        "Efficient hardware implementation of the {DES}",
  crossref =     "Blakley:1985:ACP",
  pages =        "147--173",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=147",
  acknowledgement = ack-nhfb,
}

@Article{Horgan:1985:TIT,
  author =       "J. Horgan",
  title =        "Thwarting the information thieves: Fear of spying
                 through simple or sophisticated electronics has spawned
                 an industry whose challenge is to block the illegal
                 interception of intelligence",
  journal =      j-IEEE-SPECTRUM,
  volume =       "22",
  number =       "7",
  pages =        "30--41",
  month =        jul,
  year =         "1985",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1985.6370754",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "bugs; Coaxial cables; communications interception;
                 Companies; Computer bugs; computer crime; cryptography;
                 data privacy; defense contractors; domestic
                 competitors; electronic surveillance; electronic
                 sweeps; encryption; expensive; foreign governments;
                 information thieves; Microwave theory and techniques;
                 private security vendors; Security; security of data;
                 Surveillance; tapes; time-consuming; US Government",
}

@Article{Hunter:1985:ARK,
  author =       "D. G. N. Hunter",
  title =        "{Algorithm 121}: {RSA} key calculation in {Ada}",
  journal =      j-COMP-J,
  volume =       "28",
  number =       "3",
  pages =        "343--348",
  month =        jul,
  year =         "1985",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/28.3.343",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  MRclass =      "94A60 (94-04)",
  MRnumber =     "86j:94048",
  bibdate =      "Tue Dec 4 14:48:18 MST 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/28/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/",
  note =         "See note \cite{Wichmann:1987:NAR}.",
  URL =          "http://comjnl.oxfordjournals.org/content/28/3/343.full.pdf+html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/343.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/344.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/345.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/346.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/347.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/348.tif",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "Stand. Telecommun. Labs. Ltd., Harlow, UK",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "16-bit microcomputers; Ada; Ada listings; assembly
                 code; cryptography; encryption programs; exponentiation
                 operation; finite arithmetic; general purpose
                 arithmetic packages; multiple precision arithmetic;
                 packages; RSA key calculation in",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Kak:1985:EEC,
  author =       "Subhash C. Kak",
  title =        "Encryption and error-correction coding using {$D$}
                 sequences",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "34",
  number =       "9",
  pages =        "803--809",
  year =         "1985",
  CODEN =        "ITCOB4",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "86k:94028",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Institute of Electrical and Electronics Engineers.
                 Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Kaliski:1985:WAE,
  author =       "Burt S. Kaliski",
  title =        "{Wyner}'s Analog Encryption Scheme: Results of a
                 Simulation",
  crossref =     "Blakley:1985:ACP",
  pages =        "83--94",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=83",
  acknowledgement = ack-nhfb,
}

@Article{Karger:1985:ADA,
  author =       "Paul A. Karger",
  title =        "Authentication and Discretionary Access Control in
                 Computer Networks",
  journal =      j-COMP-NET-ISDN,
  volume =       "10",
  number =       "1",
  pages =        "27--37",
  month =        aug,
  year =         "1985",
  CODEN =        "CNISE9",
  ISSN =         "0169-7552 (print), 1879-2324 (electronic)",
  ISSN-L =       "0169-7552",
  bibdate =      "Sat Sep 25 23:08:50 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Digital Equipment Corp, Littleton, MA, USA",
  classification = "723",
  fjournal =     "Computer Networks and ISDN Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01697552",
  journalabr =   "Comput Networks ISDN Syst",
  keywords =     "access control; authentication; computer networks;
                 data processing --- Security of Data; data security;
                 digital network architecture; network security",
}

@Article{Knuth:1985:DLC,
  author =       "Donald E. Knuth",
  title =        "Deciphering a linear congruential encryption",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "1",
  pages =        "49--52",
  month =        jan,
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1985.1056997",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60",
  MRnumber =     "87c:94040",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  note =         "Russian translation, to appear.",
  fjournal =     "IEEE Transactions on Information Theory",
  subject =      "G.3 Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation E Data, DATA
                 ENCRYPTION",
}

@InProceedings{Konheim:1985:CAE,
  author =       "Alan G. Konheim",
  title =        "Cryptanalysis of {ADFGVX} Encipherment Systems
                 (extended abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "339--341",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "820 027",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=339",
  acknowledgement = ack-nhfb,
}

@InProceedings{Kothari:1985:GLT,
  author =       "S. C. Kothari",
  title =        "Generalized Linear Threshold Scheme",
  crossref =     "Blakley:1985:ACP",
  pages =        "231--241",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=231",
  acknowledgement = ack-nhfb,
}

@Article{Lagarias:1985:SLD,
  author =       "J. C. Lagarias and A. M. Odlyzko",
  title =        "Solving Low-Density Subset Sum Problems",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "229--246",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Preliminary version in {\em Proc. 24th IEEE
                 Foundations Computer Science Symp.}, pp. 1--10, 1983.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2461.html",
  abstract =     "The subset sum problem is to decide whether or not a
                 0-1 integer programming problem which is NP-complete,
                 has a solution. The difficulty of solving it is the
                 basis of public-key cryptosystems of knapsack type. An
                 algorithm is proposed that searches for a solution when
                 given an instance of the subset sum problem. This
                 algorithm always halts in polynomial time but does not
                 always find a solution when one exists. It converts the
                 problem to one of finding a particular short vector in
                 a lattice, and then uses a lattice basis reduction
                 algorithm to attempt to find this short vector. The
                 performance of the proposed algorithm is analyzed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  classification = "721; 722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; automata theory --- Theorem
                 Proving; computer programming; computers, digital ---
                 Special Purpose Application; cryptography ---
                 Applications; data encryption; discrete mathematics;
                 integer lattice; measurement; public-key cryptosystems;
                 security; subset sum problems; theory; verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Number-theoretic computations. {\bf E.3}:
                 Data, DATA ENCRYPTION. {\bf G.1.6}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Optimization, Integer
                 programming. {\bf G.2.m}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Miscellaneous.",
}

@MastersThesis{Lassek:1985:CCA,
  author =       "Teresa A. Lassek",
  title =        "Cryptology and the computer age",
  type =         "Thesis ({Honors})",
  school =       "University of Nebraska at Omaha",
  address =      "Omaha, NE, USA",
  pages =        "58",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control; Cryptography; Data
                 protection",
}

@InProceedings{Leighton:1985:HBC,
  author =       "Albert C. Leighton and Stephen M. Matyas",
  title =        "The History of Book Ciphers",
  crossref =     "Blakley:1985:ACP",
  pages =        "101--113",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=101",
  acknowledgement = ack-nhfb,
}

@InProceedings{Leung:1985:SCT,
  author =       "A. K. Leung and S. E. Tavares",
  title =        "Sequence Complexity as a Test for Cryptographic
                 Systems",
  crossref =     "Blakley:1985:ACP",
  pages =        "468--474",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=468",
  acknowledgement = ack-nhfb,
}

@InProceedings{Levin:1985:OWF,
  author =       "L. A. Levin",
  title =        "One-way functions and pseudorandom generators",
  crossref =     "ACM:1985:PSA",
  pages =        "363--365",
  year =         "1985",
  bibdate =      "Wed Feb 20 18:33:46 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/22145/p363-levin/p363-levin.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/22145/p363-levin/",
  acknowledgement = ack-nhfb,
}

@Article{Lidl:1985:CBP,
  author =       "R. Lidl",
  booktitle =    "Advances in cryptology (Paris, 1984)",
  title =        "On cryptosystems based on polynomials and finite
                 fields",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "209",
  pages =        "10--15",
  year =         "1985",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "87c:94041",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mackinnon:1985:OAA,
  author =       "S. J. Mackinnon and P. D. Taylor and H. Meijer and S.
                 G. Akl",
  title =        "An Optimal Algorithm for Assigning Cryptographic Keys
                 to Control Access in a Hierarchy",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-34",
  number =       "9",
  pages =        "797--802",
  month =        sep,
  year =         "1985",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.1985.1676635",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 10 08:33:28 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1676635",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{McIvor:1985:SC,
  author =       "R. McIvor",
  title =        "Smart cards",
  journal =      j-SCI-AMER,
  volume =       "253",
  number =       "5",
  pages =        "130--137",
  month =        nov,
  year =         "1985",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Mon May 18 08:08:24 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B1265 (Digital electronics); C7120 (Financial
                 computing)",
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "credit cards; digital IC; digital integrated circuits;
                 EFTS; microelectronic chip; smart cards",
  treatment =    "G General Review",
}

@TechReport{Meijer:1985:MEN,
  author =       "Henk Meijer",
  title =        "Multiplication-permutation encryption networks",
  type =         "Technical report",
  number =       "85-171",
  institution =  "Department of Computing and Information Science,
                 Queen's University",
  address =      "Kingston, Ont., Canada",
  pages =        "15",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Supported by the Natural Sciences and Engineering
                 Research Council of Canada.",
  keywords =     "Cryptography.",
}

@MastersThesis{Miller:1985:PES,
  author =       "Jay I. Miller",
  title =        "A private-key encryption system based on plane
                 geometry",
  type =         "Thesis ({M.S. in Computer Science})",
  school =       "University of Wisconsin-Milwaukee",
  address =      "Milwaukee, WI, USA",
  pages =        "iv + 33 + 115",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Data protection; Geometry, Plane.",
}

@Article{Montgomery:1985:MMT,
  author =       "Peter L. Montgomery",
  title =        "Modular Multiplication Without Trial Division",
  journal =      j-MATH-COMPUT,
  volume =       "44",
  number =       "170",
  pages =        "519--521",
  month =        apr,
  year =         "1985",
  CODEN =        "MCMPAF",
  DOI =          "https://doi.org/10.1090/S0025-5718-1985-0777282-X",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  MRclass =      "11Y16",
  MRnumber =     "86e:11121",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcomp1980.bib;
                 JSTOR database",
  URL =          "http://www.ams.org/journals/mcom/1985-44-170/S0025-5718-1985-0777282-X/",
  acknowledgement = ack-nhfb,
  classcodes =   "C1160 (Combinatorial mathematics); C5230 (Digital
                 arithmetic methods); C6130 (Data handling techniques)",
  corpsource =   "Syst. Dev. Corp., Santa Monica, CA, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "digital arithmetic; integer; integer arithmetic;
                 modular arithmetic; modular multiplication;
                 multiplication; N-residue; N-residue arithmetic; number
                 theory",
  referencedin = "Referenced in \cite[Ref. 8]{Handschuh:1998:SCC}.",
  treatment =    "T Theoretical or Mathematical",
}

@Manual{NIST:1985:FPC,
  author =       "{NIST}",
  title =        "{FIPS PUB} 113: Computer Data Authentication",
  organization = "National Institute of Standards and Technology
                 (formerly National Bureau of Standards)",
  address =      "Gaithersburg, MD, USA",
  pages =        "??",
  day =          "30",
  month =        may,
  year =         "1985",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 7]{Kaliski:1995:MAM}.",
}

@Book{NIST:1985:FPSa,
  author =       "{National Institute of Standards and Technology}",
  title =        "{FIPS PUB 112}: Standard for Password Usage",
  publisher =    pub-NIST,
  address =      pub-NIST:adr,
  day =          "30",
  month =        may,
  year =         "1985",
  bibdate =      "Mon Nov 27 08:37:27 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.itl.nist.gov/fipspubs/fip112.htm",
  abstract =     "The document specifies basic security criteria for two
                 different uses of passwords in an ADP system, (1)
                 personal identity authentication and (2) data access
                 authorization. It establishes the basic criteria for
                 the design, implementation and use of a password system
                 in those systems where passwords are used. It
                 identifies fundamental ADP management functions
                 pertaining to passwords and specifies some user actions
                 required to satisfy these functions. In addition, it
                 specifies several technical features which may be
                 implemented in an ADP system in order to support a
                 password system. An implementation schedule is
                 established for compliance with the Standard. Numerous
                 guidelines are provided in the Appendices for managers
                 and users seeking to comply with the Standard.",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; data security; passphrase;
                 password; personal identification; systems security.",
}

@Book{NIST:1985:FPSb,
  author =       "{National Institute of Standards and Technology}",
  title =        "{FIPS PUB 113}: Standard for Computer Data
                 Authentication",
  publisher =    pub-NIST,
  address =      pub-NIST:adr,
  day =          "30",
  month =        may,
  year =         "1985",
  bibdate =      "Mon Nov 27 08:37:27 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.itl.nist.gov/fipspubs/fip113.htm",
  abstract =     "his publication specifies a standard to be used by
                 Federal organizations which require that the integrity
                 of computer data be cryptographically authenticated. In
                 addition, it may be used by any organization whenever
                 cryptographic authentication is desired. Cryptographic
                 authentication of data during transmission between
                 electronic components or while in storage is necessary
                 to maintain the integrity of the information
                 represented by the data. The standard specifies a
                 cryptographic authentication algorithm for use in ADP
                 systems and networks. The authentication algorithm
                 makes use of the Data Encryption Standard (DES)
                 cryptographic algorithm as defined in Federal
                 Information Processing Standard 46 (FIPS PUB 46).",
  acknowledgement = ack-nhfb,
  keywords =     "authentication; cryptography; data authentication
                 algorithm; Data Authentication Algorithm (DAA); Data
                 Encryption Standard (DES); data integrity; Federal
                 Information Processing Standard (FIPS)",
}

@InProceedings{Nobauer:1985:CRS,
  author =       "Rupert N{\"o}bauer",
  booktitle =    "Contributions to general algebra, 3 (Vienna, 1984)",
  title =        "Cryptanalysis of the {R{\'e}dei}-scheme",
  publisher =    "H{\"o}lder-Pichler-Tempsky",
  address =      "Vienna, Austria",
  pages =        "255--264",
  year =         "1985",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "87b:94040",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@InProceedings{Odlyzko:1985:DLF,
  author =       "A. M. Odlyzko",
  title =        "Discrete logarithms in finite fields and their
                 cryptographic significance",
  crossref =     "Beth:1985:ACP",
  pages =        "224--314",
  year =         "1985",
  DOI =          "https://doi.org/10.1007/3-540-39757-4_20",
  bibdate =      "Mon Jul 19 07:05:35 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.research.att.com/~amo/doc/arch/discrete.logs.pdf;
                 http://www.research.att.com/~amo/doc/arch/discrete.logs.ps;
                 http://www.research.att.com/~amo/doc/arch/discrete.logs.troff",
  acknowledgement = ack-nhfb,
}

@InProceedings{Ong:1985:ESS,
  author =       "H. Ong and C. P. Schnorr and A. Shamir",
  title =        "Efficient Signature Schemes Based on Polynomial
                 Equations (preliminary version)",
  crossref =     "Blakley:1985:ACP",
  pages =        "37--46",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=37",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Parthasarathy:1985:DSG,
  author =       "Aiyaswamy Parthasarathy",
  title =        "Digital signature generator for cryptographic
                 applications",
  type =         "Thesis ({M.S.})",
  school =       "South Dakota School of Mines and Technology",
  address =      "Rapid City, SD, USA",
  pages =        "148",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Code generators --- Computer programs; Communication
                 --- Code words; Cryptography --- Computer programs;
                 Generators (Computer programs); Telecommunication ---
                 Code words",
}

@PhdThesis{Peralta:1985:TRN,
  author =       "Rene Caupolican Peralta",
  title =        "Three results in number theory and cryptography: a new
                 algorithm to compute square roots modulo a prime
                 number; On the bit complexity of the discrete
                 logarithm; {A} framework for the study of
                 cryptoprotocols",
  type =         "Thesis ({Ph.D.})",
  school =       "Department of Computer Science, University of
                 California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "52",
  month =        dec,
  year =         "1985",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "dissertations; dissertations, academic --- UCB ---
                 computer science --- 1981--1990; University of
                 California, Berkeley. computer science division --",
}

@Article{Pieprzyk:1985:DPK,
  author =       "J{\'o}zef P. Pieprzyk and Dominik A. Rutkowski",
  title =        "Design of public key cryptosystems using idempotent
                 elements",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "4",
  pages =        "297--308",
  month =        dec,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900483",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pieprzyk:1985:MDI,
  author =       "J{\'o}zef P. Pieprzyk and Dominik A. Rutkowski",
  title =        "Modular design of information encipherment for
                 computer systems",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "211--218",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Proctor:1985:SSC,
  author =       "Norman Proctor",
  title =        "A Self-Synchronizing Cascaded Cipher System with
                 Dynamic Control of Error Propagation",
  crossref =     "Blakley:1985:ACP",
  pages =        "174--190",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=174",
  acknowledgement = ack-nhfb,
}

@InProceedings{Reeds:1985:NPR,
  author =       "J. A. Reeds and J. L. Manferdelli",
  title =        "{DES} has no Per Round Linear Factors",
  crossref =     "Blakley:1985:ACP",
  pages =        "377--389",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=377",
  acknowledgement = ack-nhfb,
}

@Article{Reischuk:1985:NSB,
  author =       "R. Reischuk",
  title =        "A new solution to the {Byzantine} generals problem",
  journal =      j-INF-CONTROL,
  pages =        "23--42",
  year =         "1985",
  CODEN =        "IFCNA4",
  ISSN =         "0019-9958 (print), 1878-2981 (electronic)",
  ISSN-L =       "0019-9958",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Information and Control",
  referencedin = "Referenced in \cite[Ref. 25]{Canetti:1997:PSL}.",
}

@InProceedings{Rivest:1985:RCP,
  author =       "Ronald L. Rivest",
  title =        "{RSA} chips (past\slash present\slash future)",
  crossref =     "Beth:1985:ACP",
  pages =        "159--163",
  year =         "1985",
  DOI =          "https://doi.org/10.1007/3-540-39757-4_16",
  bibdate =      "Sun Mar 11 10:23:55 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Ruggiu:1985:CCT,
  author =       "G. Ruggiu",
  title =        "Cryptology and complexity theories",
  crossref =     "Beth:1985:ACP",
  pages =        "3--9",
  year =         "1985",
  DOI =          "https://doi.org/10.1007/3-540-39757-4_1",
  bibdate =      "Sun Mar 11 10:18:50 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InCollection{Salomaa:1985:PKC,
  author =       "Arto Salomaa",
  booktitle =    "Parcella '84 (Berlin, 1984)",
  title =        "On a public-key cryptosystem based on parallel
                 rewriting",
  volume =       "25",
  publisher =    "Akademie-Verlag",
  address =      "Berlin",
  pages =        "209--214",
  year =         "1985",
  MRclass =      "68P25 (68Q50 94A60)",
  MRnumber =     "832 881",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Math. Res.",
}

@Book{Serpell:1985:CES,
  author =       "S. C. Serpell",
  title =        "Cryptographic equipment security: a code of practice",
  publisher =    "Institution of Electronic and Radio Engineers",
  address =      "London, UK",
  pages =        "25",
  year =         "1985",
  ISBN =         "0-903748-62-2 (paperback)",
  ISBN-13 =      "978-0-903748-62-9 (paperback)",
  LCCN =         "Z103.S47 1985",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography -- equipment and supplies",
}

@InProceedings{Serpell:1985:PES,
  author =       "S. C. Serpell and C. B. Brookson and B. L. Clark",
  title =        "A Prototype Encryption System Using Public Key",
  crossref =     "Blakley:1985:ACP",
  pages =        "3--9",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=3",
  acknowledgement = ack-nhfb,
}

@InProceedings{Shamir:1985:IBC,
  author =       "Adi Shamir",
  title =        "Identity-Based Cryptosystems and Signature Schemes",
  crossref =     "Blakley:1985:ACP",
  pages =        "47--53",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "820 012",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=47",
  acknowledgement = ack-nhfb,
}

@Article{Siegenthaler:1985:DCS,
  author =       "T. Siegenthaler",
  title =        "Decrypting a Class of Stream Ciphers Using Ciphertext
                 Only",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C34",
  pages =        "81--85",
  year =         "1985",
  CODEN =        "ITCOB4",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Nov 30 08:57:18 1998",
  bibsource =    "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This paper breaks the cipher of
                 \cite{Geffe:1973:HPD}.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Simmons:1985:ATC,
  author =       "Gustavus J. Simmons",
  title =        "Authentication Theory\slash Coding Theory",
  crossref =     "Blakley:1985:ACP",
  pages =        "411--431",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=411",
  acknowledgement = ack-nhfb,
}

@InProceedings{Simmons:1985:SCD,
  author =       "Gustavus J. Simmons",
  title =        "The Subliminal Channel and Digital Signatures",
  crossref =     "Beth:1985:ACP",
  pages =        "364--378",
  year =         "1985",
  DOI =          "https://doi.org/10.1007/3-540-39757-4_25",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1002.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Article{Singh:1985:IPS,
  author =       "Kamaljit Singh",
  title =        "On improvements to password security",
  journal =      j-OPER-SYS-REV,
  volume =       "19",
  number =       "1",
  pages =        "53--60",
  month =        jan,
  year =         "1985",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:34 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Smillie:1985:RFM,
  author =       "K. W. Smillie and F. L. Bauer and Ralph Erskine and
                 Henry S. Tropp",
  title =        "Reviews: {O. I. Franksen, Mr. Babbage's Secret}; {F.
                 H. Hinsley, British Intelligence in the Second World
                 War}; {T. M. Thompson, From Error-Correcting Codes
                 Through Sphere Packings to Simple Groups}; Capsule
                 Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "7",
  number =       "2",
  pages =        "185--191",
  month =        apr # "\slash " # jun,
  year =         "1985",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:22 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1985/pdf/a2185.pdf;
                 http://www.computer.org/annals/an1985/a2185abs.htm",
  acknowledgement = ack-nhfb,
  annote =       "The Thompson book review describes Hamming's July 1947
                 work in developing error-correcting codes, and
                 Shannon's later use of them in work on information
                 theory.",
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Misc{StJohns:1985:RAS,
  author =       "M. {St. Johns}",
  title =        "{RFC 931}: Authentication server",
  day =          "1",
  month =        jan,
  year =         "1985",
  bibdate =      "Fri Oct 17 17:15:44 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoleted RFC1413 \cite{StJohns:1993:RIP}. Obsoletes
                 RFC0912 \cite{StJohns:1984:RAS}. Status: UNKNOWN.",
  URL =          "ftp://ftp.internic.net/rfc/rfc912.txt;
                 ftp://ftp.internic.net/rfc/rfc931.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc912.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt",
  acknowledgement = ack-nhfb,
  format =       "TXT=8982 bytes",
  obsoletedby =  "Obsoleted RFC1413 \cite{StJohns:1993:RIP}.",
  obsoletes =    "Obsoletes RFC0912 \cite{StJohns:1984:RAS}.",
  online =       "yes",
  status =       "UNKNOWN",
}

@Article{Tao:1985:FAP,
  author =       "Ren Ji Tao and Shi Hua Chen",
  title =        "A finite automaton public key cryptosystem and digital
                 signatures",
  journal =      j-CHIN-J-COMPUTERS,
  volume =       "8",
  number =       "6",
  pages =        "401--409",
  year =         "1985",
  CODEN =        "JIXUDT",
  ISSN =         "0254-4164",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "87c:94045",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Chinese Journal of Computers. Jisuanji Xuebao",
}

@InProceedings{Tedrick:1985:FES,
  author =       "Tom Tedrick",
  title =        "Fair Exchange of Secrets (extended abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "434--438",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=434",
  acknowledgement = ack-nhfb,
}

@TechReport{USGSA:1985:ISR,
  author =       "{United States.General Services Administration} and
                 {National Communications System (U.S.). Office of
                 Technology and Standards} and {National Institute of
                 Standards and Technology (U. S.)}",
  title =        "Interoperability and security requirements for use of
                 the {Data Encryption Standard} with {CCITT} group 3
                 facsimile equipment",
  institution =  "General Services Administration, Office of Information
                 Resources Management",
  address =      "Washington, DC, USA",
  pages =        "2",
  day =          "4",
  month =        apr,
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Federal standard 1028. {Federal} information
                 processing standards publication, {FIPS PUB} 141",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Standards; Facsimile
                 transmission --- Standards.",
}

@Article{Vamos:1985:BRB,
  author =       "T. Vamos",
  title =        "Book Review: {{\booktitle{Mr. Babbage's secret. The
                 tale of a cypher --- and APL}}: Ole Immanuel
                 Franksen}",
  journal =      "Automatica",
  volume =       "21",
  number =       "5",
  pages =        "616",
  month =        sep,
  year =         "1985",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/0005-1098(85)90013-5",
  ISSN =         "????",
  bibdate =      "Mon Jan 14 21:51:21 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0005109885900135",
  acknowledgement = ack-nhfb,
}

@InProceedings{Vazirani:1985:ESP,
  author =       "Umesh V. Vazirani and Vijay V. Vazirani",
  title =        "Efficient and Secure Pseudo-Random Number Generation
                 (Extended Abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "193--202",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=193",
  acknowledgement = ack-nhfb,
}

@InProceedings{Vogel:1985:LCC,
  author =       "Rainer Vogel",
  title =        "On the linear complexity of cascaded sequences",
  crossref =     "Beth:1985:ACP",
  pages =        "99--109",
  year =         "1985",
  DOI =          "https://doi.org/10.1007/3-540-39757-4_11",
  bibdate =      "Mon Nov 30 09:03:36 1998",
  bibsource =    "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Wagner:1985:PKC,
  author =       "Neal R. Wagner and Marianne R. Magyarik",
  title =        "A Public-Key Cryptosystem Based on the Word Problem",
  crossref =     "Blakley:1985:ACP",
  pages =        "19--36",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "87b:94042",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=19",
  acknowledgement = ack-nhfb,
}

@Article{Weiss:1985:RCM,
  author =       "Eric A. Weiss and Henry S. Tropp and Ralph Erskine and
                 John A. N. Lee and Gwen Bell and M. R. Williams",
  title =        "Reviews: {The Computer Museum} and {J. Bernstein,
                 Three Degrees Above Zero: Bell Labs in the Information
                 Age} and {D. R. Hartree, Calculating Machines: Recent
                 and Prospective Developments and Their Impact on
                 Mathematical Physics, and, Calculating Instruments and
                 Machines} and {W. Kozaczuk, Enigma: How the German
                 Machine Cipher Was Broken and How It Was Read by the
                 Allies in World War Two} and {S. Levy, Hackers} and {A.
                 Osborne and J. Dvorak, Hypergrowth: The Rise and Fall
                 of Osborne Computer Corporation} and {E. W. Pugh,
                 Memories that Shaped an Industry} and Capsule Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "7",
  number =       "3",
  pages =        "258--277",
  month =        jul # "\slash " # sep,
  year =         "1985",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:22 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1985/pdf/a3258.pdf;
                 http://www.computer.org/annals/an1985/a3258abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@InProceedings{Williams:1985:SPK,
  author =       "H. C. Williams",
  title =        "Some Public-Key Crypto-Functions as Intractable as
                 Factorization",
  crossref =     "Blakley:1985:ACP",
  pages =        "66--70",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=66",
  acknowledgement = ack-nhfb,
}

@InProceedings{Yung:1985:CSP,
  author =       "Mordechai Yung",
  title =        "Cryptoprotocols: Subscription to a Public Key, The
                 Secret Blocking and The Multi-Player Mental Poker Game
                 (extended abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "439--453",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=439",
  acknowledgement = ack-nhfb,
}

@Article{Yung:1985:SUK,
  author =       "Mordechai M. Yung",
  title =        "A secure and useful ``keyless cryptosystem''",
  journal =      j-INFO-PROC-LETT,
  volume =       "21",
  number =       "1",
  pages =        "35--38",
  day =          "10",
  month =        jul,
  year =         "1985",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68P25",
  MRnumber =     "810 097",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Columbia Univ, Dep of Computer Science, New
                 York, NY, USA",
  classification = "723; B6120B (Codes); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Comput. Sci., Columbia Univ., New York, NY,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "authentication; communication environments;
                 cryptography; data transmission; encryption; key
                 generation protocol; keyless cryptography; protocol;
                 protocols; security",
  pubcountry =   "Netherlands A08",
  treatment =    "P Practical",
}

@Article{Andrew:1986:CSI,
  author =       "Christopher Andrew",
  title =        "Codebreaking and Signals Intelligence",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "1--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Article{Andrew:1986:TCB,
  author =       "Christopher Andrew and Keith Neilson",
  title =        "{Tsarist} Codebreakers and {British} Codes",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "6--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Article{Anonymous:1986:CPC,
  author =       "Anonymous",
  title =        "On cryptographic protection of capabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "98--99",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:MTT,
  author =       "Anonymous",
  title =        "Modern technology tools for user authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "184--185",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900039",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1986:RE,
  author =       "Anonymous",
  title =        "Remember the {Enigma}!",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "288--289",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900489",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{ATT:1986:AUS,
  author =       "AT{\&T}",
  key =          "ATT",
  title =        "{AT\&T UNIX} System Readings and Applications",
  volume =       "II",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "xii + 324",
  year =         "1986",
  ISBN =         "0-13-939845-7",
  ISBN-13 =      "978-0-13-939845-2",
  LCCN =         "QA76.76.O63 U553 1986",
  bibdate =      "Sat Oct 28 08:25:58 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  xxnote =       "NB: special form AT{\&T} required to get correct
                 alpha-style labels.",
}

@Book{ATT:1986:AUSb,
  author =       "{AT\&T}",
  key =          "ATT",
  title =        "{AT\&T UNIX} System Readings and Applications",
  volume =       "II",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "xii + 324",
  year =         "1986",
  ISBN =         "0-13-939845-7",
  ISBN-13 =      "978-0-13-939845-2",
  LCCN =         "QA76.76.O63 U553 1986",
  bibdate =      "Sat Oct 28 08:25:58 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  xxnote =       "NB: special form {AT\&T} required to get correct
                 alpha-style labels.",
}

@Article{Benois:1986:CSE,
  author =       "Mich{\`e}le Benois and Jacques Sakarovitch",
  title =        "On the Complexity of Some Extended Word Problems
                 Defined by Cancellation Rules",
  journal =      j-INFO-PROC-LETT,
  volume =       "23",
  number =       "6",
  pages =        "281--287",
  day =          "3",
  month =        dec,
  year =         "1986",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68Q45 (03D03 03D15 03D40 20M05 68Q25)",
  MRnumber =     "88d:68046",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IMAG Grenoble, St. Martin d'Heres, Fr",
  classification = "721; 723; C4220 (Automata theory); C4240
                 (Programming and algorithm theory)",
  corpsource =   "IMAG Grenoble, St. Martin d'Heres, France",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "algorithm; algorithms; automata theory; automaton
                 recognising; cancellation rules; complexity bounds;
                 computational complexity; computer programming ---
                 Algorithms; cryptography; descendants; extended word
                 problems; Formal Languages; languages; public key
                 encryption; regular set; theory; Thue systems;
                 verification",
  pubcountry =   "Netherlands A02",
  subject =      "F.1.1 Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Automata \\ F.4.2
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Grammars and Other Rewriting Systems, Thue
                 systems",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Birnbaum:1986:VPS,
  author =       "Martha Birnbaum and Larry A. Cohen and Frank X.
                 Welsh",
  title =        "Voice password system for access security",
  journal =      j-ATT-TECH-J,
  volume =       "65",
  number =       "5",
  pages =        "68--74",
  month =        sep,
  year =         "1986",
  CODEN =        "ATJOEM",
  ISSN =         "2376-676X (print), 8756-2324 (electronic)",
  ISSN-L =       "8756-2324",
  bibdate =      "Fri Nov 12 13:09:16 2010",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "A voice password system for access security using
                 speaker verification technology has been designed for
                 use over dial-up telephone lines. The voice password
                 system (VPS) can provide secure access to telephone
                 networks, computers, rooms, and buildings. It also has
                 application in office automation systems, electronic
                 funds transfer, and 'Smart Cards' (interactive
                 computers embedded in credit-card-sized packages). As
                 increasing attention is focused on access security in
                 the public, private, and government sectors, the voice
                 password system can provide a timely solution to the
                 security dilemma. The VPS uses modes of communication
                 available to almost everyone (the human voice and the
                 telephone). A user calls the VPS, enters his or her
                 identification number (ID) by touch-tone telephone, and
                 then speaks a password. This is usually a phrase or
                 sentence of about seven syllables.",
  acknowledgement = ack-nhfb,
  fjournal =     "AT\&T Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  keywords =     "data processing --- security of data; telephone
                 interference",
  subject =      "access security; speaker verification technology;
                 Voice Password System (VPS)",
  topic =        "speech",
}

@Book{Boyd:1986:CPC,
  author =       "Waldo T. Boyd",
  title =        "Cryptology and the personal computer: with programming
                 in {Basic}",
  volume =       "47",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "157",
  year =         "1986",
  ISBN =         "0-89412-145-6 (hardcover), 0-89412-144-8 (paperback)",
  ISBN-13 =      "978-0-89412-145-6 (hardcover), 978-0-89412-144-9
                 (paperback)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic Series",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@InProceedings{Brickell:1986:CKC,
  author =       "Ernest F. Brickell",
  title =        "The cryptanalysis of knapsack cryptosystems",
  crossref =     "Ringeisen:1986:ADM",
  pages =        "3--23",
  year =         "1986",
  MRclass =      "94A60 (11T71 90C09)",
  MRnumber =     "90f:94026",
  MRreviewer =   "Harald Niederreiter",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brooke:1986:BRB,
  author =       "N. Michael Brooke",
  title =        "Book Review: {{\booktitle{Mr. Babbage's secret: the
                 tale of a Cypher --- and APL}}: O. I. Franksen.
                 Strandbergs Forlag, Denmark (1984). 320 pp. Dkr.
                 320.00. ISBN: 87-872-0086-4}",
  journal =      j-INFO-PROC-MAN,
  volume =       "22",
  number =       "1",
  pages =        "67--68",
  month =        "????",
  year =         "1986",
  CODEN =        "IPMADK",
  DOI =          "https://doi.org/10.1016/0306-4573(86)90018-X",
  ISSN =         "0306-4573 (print), 1873-5371 (electronic)",
  ISSN-L =       "0306-4573",
  bibdate =      "Mon Jan 14 21:51:21 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/030645738690018X",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing and Management",
}

@Article{Chang:1986:DKL,
  author =       "C. C. Chang",
  title =        "On the Design of a Key-Lock-Pair Mechanism in
                 Information Protection Systems",
  journal =      j-BIT,
  volume =       "26",
  number =       "4",
  pages =        "410--417",
  year =         "1986",
  CODEN =        "BITTEL, NBITAB",
  ISSN =         "0006-3835 (print), 1572-9125 (electronic)",
  ISSN-L =       "0006-3835",
  bibdate =      "Thu Nov 12 18:12:56 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "BIT (Nordisk tidskrift for informationsbehandling)",
  journal-URL =  "http://link.springer.com/journal/10543",
}

@Article{Chapman:1986:NFS,
  author =       "J. W. M. Chapman",
  title =        "No Final Solution: a Survey of the Cryptanalytical
                 Capabilities of {German} Military Agencies, 1926--35",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "13--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Article{Chaum:1986:CRN,
  author =       "David Chaum and Jan-Hendrik Evertse",
  booktitle =    "Advances in {cryptology---CRYPTO '85} (Santa Barbara,
                 Calif., 1985)",
  title =        "Cryptanalysis of {DES} with a reduced number of
                 rounds: sequences of linear factors in block ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "218",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "192--211",
  year =         "1986",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "88a:94023",
  MRreviewer =   "Albrecht Beutelspacher",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Chor:1986:TIP,
  author =       "Ben-Zion Chor",
  title =        "Two issues in public key cryptography: {RSA} bit
                 security and a new knapsack type system",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "78",
  year =         "1986",
  ISBN =         "0-262-03121-3",
  ISBN-13 =      "978-0-262-03121-9",
  LCCN =         "TK5102.5 .C4781 1986",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Originally presented as the author's thesis (doctoral
                 --- MIT, 1985)",
  series =       "ACM distinguished dissertations",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; telecommunication --- security
                 measures",
}

@Article{Ciarcia:1986:BHD,
  author =       "Steve Ciarcia",
  title =        "Build a Hardware Data Encryptor",
  journal =      j-BYTE,
  volume =       "11",
  number =       "??",
  pages =        "??--??",
  month =        "??",
  year =         "1986",
  CODEN =        "BYTEDJ",
  ISSN =         "0360-5280",
  ISSN-L =       "0360-5280",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "BYTE Magazine",
}

@Article{Coppersmith:1986:DL,
  author =       "Don Coppersmith and Andrew M. Odlyzko and Richard
                 Schroeppel",
  title =        "Discrete logarithms in {$ {\rm GF}(p) $}",
  journal =      j-ALGORITHMICA,
  volume =       "1",
  number =       "1",
  pages =        "1--15",
  year =         "1986",
  CODEN =        "ALGOEJ",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  MRclass =      "11T71 (11Y16)",
  MRnumber =     "MR833115 (87g:11167)",
  MRreviewer =   "Jacques Calmet",
  bibdate =      "Mon Jan 22 05:26:07 MST 2001",
  bibsource =    "dblp-journals-algorithmica.bib;
                 http://dblp.uni-trier.de/db/journals/algorithmica/algorithmica1.html#CoppersmithOS86;
                 https://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica. An International Journal in Computer
                 Science",
  journal-URL =  "http://link.springer.com/journal/453",
  oldlabel =     "CoppersmithOS86",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/algorithmica/CoppersmithOS86",
}

@Book{Courville:1986:MCC,
  author =       "Joseph B. Courville",
  title =        "Manual for cryptanalysis of the columnar double
                 transposition cipher: a study of cryptanalysis",
  publisher =    "J. B. Courville",
  address =      "10240 Virginia Ave, South Gate, CA, 90280, USA",
  pages =        "iv + 91",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@InProceedings{deJonge:1986:ASR,
  author =       "W. {de Jonge} and D. Chaum",
  title =        "Attacks on some {RSA} signatures",
  crossref =     "Williams:1986:ACC",
  pages =        "18--27",
  year =         "1986",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Kaliski:1995:SUR}.",
}

@Article{Denniston:1986:GCC,
  author =       "A. G. Denniston",
  title =        "The {Government Code and Cypher School} Between the
                 {Wars}",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "48--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@InProceedings{Desmedt:1986:CTA,
  author =       "Y. G. Desmedt and A. M. Odlyzko",
  title =        "A chosen text attack on the {RSA} cryptosystem and
                 some discrete logarithm schemes",
  crossref =     "Williams:1986:ACC",
  pages =        "516--522",
  year =         "1986",
  bibdate =      "Mon Jul 19 07:00:30 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.research.att.com/~amo/doc/arch/rsa.attack.pdf;
                 http://www.research.att.com/~amo/doc/arch/rsa.attack.ps;
                 http://www.research.att.com/~amo/doc/arch/rsa.attack.troff",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 7]{Kaliski:1995:SUR}.",
}

@Article{Erdem:1986:HCO,
  author =       "Hilmi Erdem",
  title =        "Host cryptographic operations: a software
                 implementation",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "344--346",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690057X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Faak:1986:SVH,
  author =       "Viiveke F{\aa}k",
  title =        "Software versus hardware encryption --- Is there any
                 difference today?",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "167--167",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901434",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Franksen:1986:SHM,
  author =       "O. I. Franksen",
  title =        "The secret hobby of {Mr. Babbage}",
  journal =      "Systems Anal. Modelling Simulation",
  volume =       "3",
  number =       "2",
  pages =        "183--194",
  year =         "1986",
  ISSN =         "0232-9298",
  MRclass =      "01A55 (94-03)",
  MRnumber =     "846173 (87h:01035)",
  MRreviewer =   "Garry J. Tee",
  bibdate =      "Tue Jan 15 11:49:13 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Systems Analysis Modelling Simulation. Journal of
                 Mathematical Modelling and Simulation in Systems
                 Analysis",
}

@Book{Gleason:1986:ECP,
  author =       "Andrew M. Gleason",
  title =        "Elementary course in probability for the
                 cryptanalyst",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "????",
  year =         "1986",
  ISBN =         "0-89412-098-0",
  ISBN-13 =      "978-0-89412-098-5",
  LCCN =         "????",
  bibdate =      "Wed May 11 23:23:17 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Goldreich:1986:HCR,
  author =       "Oded Goldreich and Shafi Goldwasser and Silvio
                 Micali",
  title =        "How to Construct Random Functions",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "792--807",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "A computational complexity measure of the randomness
                 of functions is introduced, and, assuming the existence
                 of one-way functions, a pseudo-random function
                 generator is presented.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/6503.html",
  abstract =     "A constructive theory of randomness for functions,
                 based on computational complexity, is developed, and a
                 pseudorandom function generator is presented. The
                 generator is a deterministic polynomial-time algorithm
                 that transforms pairs (g, r), where g is any one-way
                 function and r is a random k-bit string, to
                 polynomial-time computable functions that cannot be
                 distinguished from random functions by any
                 probabilistic polynomial-time algorithm that asks and
                 receives the value of a function at arguments of its
                 choice. The result has applications in cryptography,
                 random constructions, and complexity theory.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "MIT, Cambridge, MA, USA",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computational complexity; computer
                 metatheory; computer programming --- Algorithms;
                 cryptography; probability; pseudorandom function
                 generator; random functions; Random Processes;
                 security; theory",
  referencedin = "Referenced in \cite[Ref. 14]{Goldreich:1997:FMCb}.",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes. {\bf F.1.1}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Models of Computation. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Probabilistic computation. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Probabilistic algorithms (including Monte Carlo). {\bf
                 G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation.",
}

@Book{Hamming:1986:CIT,
  author =       "R. W. (Richard Wesley) Hamming",
  title =        "Coding and information theory",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  edition =      "Second",
  pages =        "xii + 259",
  year =         "1986",
  ISBN =         "0-13-139072-4",
  ISBN-13 =      "978-0-13-139072-0",
  LCCN =         "QA268 .H35 1986",
  bibdate =      "Fri Jun 24 21:02:55 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$36.95",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Information theory",
}

@Book{IEE:1986:CEC,
  author =       "{IEE}",
  title =        "Colloquium on {``Encryption for Cable and DBS'':
                 Wednesday, 19 February 1986}",
  volume =       "1986/24",
  publisher =    "Institution of Electrical Engineers",
  address =      "London, UK",
  pages =        "various",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Imai:1986:AMC,
  author =       "Hideki Imai and Tsutomu Matsumoto",
  booktitle =    "Algebraic algorithms and error correcting codes
                 (Grenoble, 1985)",
  title =        "Algebraic methods for constructing asymmetric
                 cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "229",
  pages =        "108--119",
  year =         "1986",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "88f:94031",
  MRreviewer =   "Willi Meier",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jeffery:1986:GCC,
  author =       "Keith Jeffery",
  title =        "The {Government Code and Cypher School}; {A}
                 Memorandum by {Lord Curzon}",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "454--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@MastersThesis{Jones:1986:DEB,
  author =       "John W. Jones",
  title =        "Data encryption based on the logarithm problem",
  type =         "Thesis ({M.A.Sc.})",
  publisher =    "National Library of Canada",
  school =       "University of Ottawa",
  address =      "Ottawa, ON, Canada",
  year =         "1986",
  ISBN =         "0-315-33330-8",
  ISBN-13 =      "978-0-315-33330-7",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "2 microfiches (103 fr.)",
  series =       "Canadian theses = Th{\`e}ses canadiennes",
  acknowledgement = ack-nhfb,
}

@Article{Jurgen:1986:SEI,
  author =       "R. K. Jurgen",
  title =        "The specialties: Experts identify the most outstanding
                 developments or the most difficult problems in their
                 fields",
  journal =      j-IEEE-SPECTRUM,
  volume =       "23",
  number =       "1",
  pages =        "86--87",
  month =        jan,
  year =         "1986",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1986.6370972",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Design automation; Electromagnetic
                 compatibility; Extraterrestrial measurements;
                 Reliability; Space vehicles; Standards",
}

@Article{Karger:1986:ADA,
  author =       "Paul A. Karger",
  title =        "Authentication and discretionary access control in
                 computer networks",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "4",
  pages =        "314--324",
  month =        dec,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900520",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Koopman:1986:OES,
  author =       "Raymond F. Koopman",
  title =        "The orders of equidistribution of subsequences of some
                 asymptotically random sequences",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "802--806",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6431.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  review =       "ACM CR 8704-0294",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics. {\bf F.2.1}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Numerical Algorithms and Problems. {\bf E.3}: Data,
                 DATA ENCRYPTION.",
}

@Book{Kranakis:1986:PC,
  author =       "Evangelos Kranakis",
  title =        "Primality and cryptography",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xv + 235",
  year =         "1986",
  ISBN =         "0-471-90934-3",
  ISBN-13 =      "978-0-471-90934-7",
  LCCN =         "TK5102.5 .K661 1986",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$38.00",
  series =       "Wiley-Teubner series in computer science",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; numbers, prime; telecommunication ---
                 security measures",
}

@InProceedings{Luby:1986:PRP,
  author =       "M. Luby and C. Rackoff",
  title =        "Pseudo-random permutation generators and cryptographic
                 composition",
  crossref =     "ACM:1986:PEA",
  pages =        "356--363",
  year =         "1986",
  bibdate =      "Wed Feb 20 18:33:46 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/12130/p356-luby/p356-luby.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/12130/p356-luby/",
  acknowledgement = ack-nhfb,
}

@Book{Mevis:1986:SCP,
  author =       "Howard Mevis and Janet Plant",
  title =        "Satellite communications: a practical guide to
                 satellite {TV} encryption with tips on installing
                 decoders, solving reception problems, and upgrading
                 {TVROs}",
  publisher =    "American Hospital Association, Media Center",
  address =      "Chicago, IL, USA",
  pages =        "25",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Telecommunications",
}

@InProceedings{Miller:1986:UEC,
  author =       "V. S. Miller",
  title =        "Uses of Elliptic Curves in Cryptography",
  crossref =     "Williams:1986:ACC",
  pages =        "417--426",
  year =         "1986",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 5]{Wiener:1998:PCP},
                 \cite[Ref. 7]{Handschuh:1998:SCC}.",
  xxnote =       "Check pages: one reference has 417--428??",
  xxtitle =      "Use of Elliptic Curves in Cryptography",
}

@Article{Milner-Barry:1986:ADL,
  author =       "P. S. Milner-Barry",
  title =        "{`Action This Day'}: The Letter from {Bletchley Park}
                 Cryptanalysts to the {Prime Minister}, {21 October
                 1941}",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "??--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Article{Mullender:1986:DCD,
  author =       "S. J. Mullender and A. S. Tanenbaum",
  title =        "The design of a capability-based distributed operating
                 system",
  journal =      j-COMP-J,
  volume =       "29",
  number =       "4",
  pages =        "289--299",
  month =        aug,
  year =         "1986",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "Compendex database; Distributed/amoeba.bib;
                 Distributed/clusters.bib;
                 https://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/;
                 Misc/IMMD_IV.bib",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/289.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/290.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/291.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/292.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/293.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/294.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/295.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/296.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/297.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/298.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/299.tif",
  abstract =     "Fifth-generation computer systems will use large
                 numbers of processors to achieve high performance. In
                 this paper a capability-based operating system designed
                 for this environment is discussed. Capability-based
                 operating systems have traditionally required large,
                 complex kernels to manage the use of capabilities. In
                 our proposal, capability management is done entirely by
                 user programs without giving up any of the protection
                 aspects normally associated with capabilities. The
                 basic idea is to use one-way functions and encryption
                 to protect sensitive information. Various aspects of
                 the proposed system are discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "Cent for Mathematics \& Computer Science, Amsterdam,
                 Neth",
  affiliationaddress = "Cent for Mathematics \& Computer Science,
                 Amsterdam, Neth",
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "722; 723",
  corpsource =   "Centre for Math. and Comput. Sci., Amsterdam,
                 Netherlands",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "(computers); Amoeba Capabilities; capability
                 management; capability-based distributed operating
                 systems; capability-based operating system; computer
                 networks --- Protocols; computer operating systems;
                 computer systems, digital --- Distributed;
                 cryptography; data protection; distributed; distributed
                 processing; encryption; fifth generation systems;
                 fifth-generation computers; information; operating
                 system; operating systems; sensitive; user programs",
  treatment =    "P Practical",
}

@Article{Muller:1986:CDS,
  author =       "Winfried B. M{\"u}ller and Rupert N{\"o}bauer",
  booktitle =    "Advances in {cryptology---EUROCRYPT '85} (Linz,
                 1985)",
  title =        "Cryptanalysis of the {Dickson}-scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "219",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "50--61",
  year =         "1986",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (11T71 11Y16)",
  MRnumber =     "851 582",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Niederreiter:1986:KTC,
  author =       "H. Niederreiter",
  title =        "Knapsack-type cryptosystems and algebraic coding
                 theory",
  journal =      "Problems Control Inform. Theory/Problemy Upravlen.
                 Teor. Inform.",
  volume =       "15",
  number =       "2",
  pages =        "159--166",
  year =         "1986",
  CODEN =        "PUTIAI",
  ISSN =         "0370-2529",
  MRclass =      "94A60 (11K55 11T71 94B05)",
  MRnumber =     "88a:94025",
  MRreviewer =   "Willi Meier",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Problems of Control and Information Theory. Problemy
                 Upravlenija i Teorii Informacii",
}

@Article{ONeil:1986:ETM,
  author =       "Patrick E. O'Neil",
  title =        "The {Escrow} Transactional Method",
  journal =      j-TODS,
  volume =       "11",
  number =       "4",
  pages =        "405--430",
  month =        dec,
  year =         "1986",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Sat Apr 14 10:34:48 MDT 2001",
  bibsource =    "Compendex database; Database/Graefe.bib;
                 Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1986-11-4/p405-o_neil/p405-o_neil.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1986-11-4/p405-o_neil/;
                 http://www.acm.org/pubs/toc/Abstracts/tods/7265.html",
  abstract =     "A method is presented for permitting record updates by
                 long-lived transactions without forbidding simultaneous
                 access by other users to records modified. Earlier
                 methods presented separately by Gawlick and Reuter are
                 comparable but concentrate on ``hot-spot'' situations,
                 where even short transactions cannot lock frequently
                 accessed fields without causing bottlenecks. The Escrow
                 Method offered here is designed to support nonblocking
                 record updates by transactions that are ``long lived''
                 and thus require long periods to complete.
                 Recoverability of intermediate results prior to commit
                 thus becomes a design goal, so that updates as of a
                 given time can be guaranteed against memory or media
                 failure while still retaining the prerogative to abort.
                 This guarantee basically completes phase one of a
                 two-phase commit, and several advantages result: (1) As
                 with Gawlick's and Reuter's methods, high-concurrency
                 items in the database will not act as a bottleneck; (2)
                 transaction commit of different updates can be
                 performed asynchronously, allowing natural distributed
                 transactions; indeed, distributed transactions in the
                 presence of delayed messages or occasional line
                 disconnection become feasible in a way that we argue
                 will tie up minimal resources for the purpose intended;
                 and (3) it becomes natural to allow for human
                 interaction in the middle of a transaction without loss
                 of concurrent access or any special difficulty for the
                 application programmer. The Escrow Method, like
                 Gawlick's Fast Path and Reuter's Method, requires the
                 database system to be an ``expert'' about the type of
                 transactional updates performed, most commonly updates
                 involving incremental changes to aggregate quantities.
                 However, the Escrow Method is extendable to other types
                 of updates.",
  acknowledgement = ack-nhfb,
  affiliation =  "Computer Corp of America, Cambridge, MA, USA",
  affiliationaddress = "Computer Corp of America, Cambridge, MA, USA",
  annote =       "For aggregate values (counts, sum) concurrency control
                 can use soft tolerances and keep them in escrow",
  classification = "723",
  fjournal =     "ACM Transactions on Database Systems",
  generalterms = "Algorithms; Design; Performance; Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "database systems; design; escrow transactional method;
                 long-lived transactions; multiuser environment, locking
                 quantities, not variables TODS, algorithms; nested
                 transactions; performance; theory; two-phase commit",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Concurrency. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Deadlocks. {\bf
                 H.2.2}: Information Systems, DATABASE MANAGEMENT,
                 Physical Design, Recovery and restart. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Distributed systems. {\bf H.2.4}: Information Systems,
                 DATABASE MANAGEMENT, Systems, Escrow. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Transaction processing.",
}

@InProceedings{Pfitzmann:1986:NUO,
  author =       "A. Pfitzmann and M. Waidner",
  title =        "Networks Without User Observability --- Design
                 Options",
  crossref =     "Pichler:1986:ACE",
  pages =        "????",
  year =         "1986",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1020.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Article{Pluimakers:1986:ACS,
  author =       "G. M. J. Pluimakers and J. van Leeuwen",
  title =        "Authentication: a concise survey",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "3",
  pages =        "243--250",
  month =        sep,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:28 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886900155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Power:1986:AHE,
  author =       "June M. Power and Steve R. Wilbur",
  title =        "Authentication in a heterogeneous environment",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "167--167",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901458",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@MastersThesis{Roy:1986:CBI,
  author =       "Marc Paul Roy",
  title =        "A {CMOS} bit-slice implementation of the {RSA} public
                 key encryption algorithm",
  type =         "Thesis ({M.Sc.(Eng.)})",
  publisher =    "National Library of Canada",
  school =       "Queen's University",
  address =      "Ottawa, ON, Canada",
  year =         "1986",
  ISBN =         "0-315-30418-9",
  ISBN-13 =      "978-0-315-30418-5",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "3 microfiches (210 fr.)",
  series =       "Canadian theses = Th{\`e}ses canadiennes",
  acknowledgement = ack-nhfb,
}

@Article{Rytter:1986:SCU,
  author =       "Wojciech Rytter",
  title =        "The Space Complexity of the Unique Decipherability
                 Problem",
  journal =      j-INFO-PROC-LETT,
  volume =       "23",
  number =       "1",
  pages =        "1--3",
  day =          "20",
  month =        jul,
  year =         "1986",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Salerno, Italy",
  classification = "723; C4210 (Formal logic); C4240 (Programming and
                 algorithm theory)",
  corpsource =   "Inst. of Inf., Warsaw Univ., Poland",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "algorithms; alphabet; code-set; codewords;
                 computational complexity; computer metatheory;
                 decomposition; formal languages; graph accessibility
                 problem; languages; nonunique decipherability; space
                 complexity; theory; unique decipherability problem;
                 uniquely decipherable; verification",
  pubcountry =   "Netherlands A01",
  subject =      "F.1.1 Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Automata \\ F.4.3
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Formal Languages, Algebraic language theory
                 \\ D.3.3 Software, PROGRAMMING LANGUAGES, Language
                 Constructs, Abstract data types",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Salomaa:1986:PCB,
  author =       "A. Salomaa and S. Yu",
  title =        "On a public-key cryptosystem based on iterated
                 morphisms and substitutions",
  journal =      j-THEOR-COMP-SCI,
  volume =       "48",
  number =       "2-3",
  pages =        "283--296",
  month =        "????",
  year =         "1986",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C1260 (Information theory); C4210
                 (Formal logic); C4290 (Other computer theory)",
  corpsource =   "Dept. of Math., Turku Univ., Finland",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "backward determinism; context-free languages;
                 cryptoanalysis; cryptography; DT0L system; growth;
                 iterated morphisms; L systems; mathematics; plaintext
                 blocksize; preprocessing; Salomaa-Welzl public-key
                 cryptosystem; substitutions",
  pubcountry =   "Netherlands A09",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Salomaa:1986:PKC,
  author =       "Arto Salomaa and Sheng Yu",
  title =        "On a public-key cryptosystem based on iterated
                 morphisms and substitutions",
  journal =      j-THEOR-COMP-SCI,
  volume =       "48",
  number =       "2-3",
  pages =        "283--296 (1987)",
  year =         "1986",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  MRclass =      "68Q99 (68P25 68Q45 94A60)",
  MRnumber =     "88j:68143",
  MRreviewer =   "J{\"u}rgen Dassow",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Sansom:1986:BRC,
  author =       "Robert Sansom",
  title =        "Book Review: {{\em Computer Security: A Global
                 Challenge --- Proceedings of the Second IFIP
                 International Conference on Computer Security,
                 IFIP\slash Sec'84, Toronto, Ontario, Canada, 10--12
                 September, 1984\/}: (Elsevier Science Publishing Co.
                 1984)}",
  journal =      j-OPER-SYS-REV,
  volume =       "20",
  number =       "3",
  pages =        "9--9",
  month =        jul,
  year =         "1986",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:45 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Scacchitti:1986:CT,
  author =       "Fred A. Scacchitti",
  title =        "The Cryptographer's Toolbox",
  journal =      j-DDJ,
  volume =       "11",
  number =       "5",
  pages =        "58--??",
  month =        may,
  year =         "1986",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Mon Sep 2 09:09:39 MDT 1996",
  bibsource =    "http://www.ddj.com/index/author/index.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Book{Schroeder:1986:NTS,
  author =       "M. R. (Manfred Robert) Schroeder",
  title =        "Number theory in science and communication: with
                 applications in cryptography, physics, digital
                 information, computing, and self-similarity",
  volume =       "7",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Second enlarged",
  pages =        "xix + 374",
  year =         "1986",
  ISBN =         "0-387-15800-6",
  ISBN-13 =      "978-0-387-15800-6",
  LCCN =         "QA241 .S3181 1986",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Springer series in information sciences",
  acknowledgement = ack-nhfb,
  keywords =     "number theory",
}

@Book{Sears:1986:SWK,
  author =       "Peter Sears",
  title =        "Secret writing: keys to the mysteries of reading and
                 writing",
  publisher =    "Teachers and Writers Collaborative",
  address =      "New York, NY, USA",
  pages =        "xv + 160",
  year =         "1986",
  ISBN =         "0-915924-86-2 (paperback)",
  ISBN-13 =      "978-0-915924-86-8 (paperback)",
  LCCN =         "Z 103.3 S4 1986 Resources for Teaching--2nd Floor",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Discusses secret writing, ciphers, and the processes
                 of creating and deciphering secret or difficult
                 languages. Includes thinking and writing exercises.",
  price =        "US\$9.95",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers --- juvenile literature; cryptography ---
                 juvenile literature; language and languages ---
                 juvenile literature",
}

@InProceedings{Shamir:1986:SPS,
  author =       "A. Shamir",
  title =        "The search for provably secure identification
                 schemes",
  crossref =     "Gleason:1987:PIC",
  volume =       "2",
  pages =        "1488--1495",
  year =         "1986",
  bibdate =      "Sun Mar 11 11:15:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  ZMnumber =     "Zbl 0685.94004",
  acknowledgement = ack-nhfb,
}

@PhdThesis{Sherman:1986:CVT,
  author =       "Alan T. Sherman",
  title =        "Cryptology and {VLSI} (a two-part dissertation). {I},
                 {II}, Detecting and exploiting algebraic weaknesses in
                 cryptosystems. Algorithms for placing modules on a
                 custom {VLSI} chip",
  type =         "Thesis ({Ph.D.})",
  number =       "MIT/LCS/TR-381",
  school =       "Laboratory for Computer Science, Massachusetts
                 Institute of Technology",
  address =      "Cambridge, MA, USA",
  pages =        "221",
  month =        oct,
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Supervised by Ronald Linn Rivest",
  acknowledgement = ack-nhfb,
  keywords =     "Algorithms; Cryptography --- Data processing;
                 Integrated circuits --- Very large scale integration",
}

@InCollection{Siromoney:1986:PKC,
  author =       "Rani Siromoney and Gift Siromoney",
  booktitle =    "Workshop on Mathematics of Computer Algorithms
                 (Madras, 1986)",
  title =        "A public key cryptosystem that defies cryptanalysis",
  volume =       "111",
  publisher =    "Inst. Math. Sci.",
  address =      "Madras",
  pages =        "D.3.17, 4",
  year =         "1986",
  MRclass =      "68P25",
  MRnumber =     "970 342",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "IMS Rep.",
}

@Article{Smillie:1986:RWA,
  author =       "K. W. Smillie and Ralph Erskine",
  title =        "Reviews: {W. Aspray, Should the Term Fifth Generation
                 Computers Be Banned?}; {C. A. Deavours and L. Kruh,
                 Machine Cryptography and Modern Cryptanalysis}; Capsule
                 Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "8",
  number =       "2",
  pages =        "199--200, 202, 204--205",
  month =        apr # "\slash " # jun,
  year =         "1986",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:23 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1986/pdf/a2199.pdf;
                 http://www.computer.org/annals/an1986/a2199abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Smith:1986:GCC,
  author =       "G. W. Smith and J. B. H. {Du Boulay}",
  title =        "The generation of cryptic crossword clues",
  journal =      j-COMP-J,
  volume =       "29",
  number =       "3",
  pages =        "282--284",
  month =        jun,
  year =         "1986",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Logica UK Ltd, London, Engl",
  affiliationaddress = "Logica UK Ltd, London, Engl",
  classcodes =   "C7820 (Humanities computing); C7830D (Computer
                 games)",
  classification = "723",
  corpsource =   "Logica UK Ltd., London, UK",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "clue insertion; compilation; computer programming;
                 computer software; crossword; crossword clue
                 generation; crossword compilation; cryptic clues;
                 cryptic crossword; entertainment; games of skill;
                 linguistics",
  treatment =    "P Practical",
}

@Article{Tao:1986:TVF,
  author =       "Ren Ji Tao and Shi Hua Chen",
  title =        "Two varieties of finite automaton public key
                 cryptosystem and digital signatures",
  journal =      j-J-COMP-SCI-TECH,
  volume =       "1",
  number =       "1",
  pages =        "9--18",
  year =         "1986",
  CODEN =        "JCTEEM",
  ISSN =         "1000-9000",
  ISSN-L =       "1000-9000",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "88e:68025",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Journal of Computer Science and Technology",
}

@Article{Thomas:1986:SDE,
  author =       "John A. Thomas",
  title =        "Survey of Data Encryption in {DOL}",
  journal =      j-DDJ,
  volume =       "11",
  number =       "6",
  pages =        "16--??",
  month =        jun,
  year =         "1986",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Mon Sep 2 09:09:39 MDT 1996",
  bibsource =    "http://www.ddj.com/index/author/index.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Valiant:1986:NED,
  author =       "L. G. Valiant and V. V. Vazirani",
  title =        "{NP} is as easy as detecting unique solutions",
  journal =      j-THEOR-COMP-SCI,
  volume =       "47",
  number =       "1",
  pages =        "85--93",
  month =        "????",
  year =         "1986",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
  acknowledgement = ack-nhfb,
  classification = "C4240 (Programming and algorithm theory)",
  corpsource =   "Aiken Comput. Lab., Harvard Univ., Cambridge, MA,
                 USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "computational complexity; cryptography; D/sup p/-hard
                 problems; NP-complete problem; NP-hard problems;
                 parity; randomized polynomial time reducibility; SAT;
                 unique solutions",
  pubcountry =   "Netherlands A07",
  treatment =    "T Theoretical or Mathematical",
}

@MastersThesis{Vandeberg:1986:ICS,
  author =       "Ronald D. Vandeberg",
  title =        "Implementation of a coprocessing system to support
                 data encryption",
  type =         "Thesis ({M.S. in Computer Science})",
  school =       "University of Wisconsin-Milwaukee",
  address =      "Milwaukee, WI, USA",
  pages =        "112",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Data protection",
}

@Article{vandenAssem:1986:CPA,
  author =       "R. van den Assem and W. J. van Elk",
  title =        "A chosen-plaintext attack on the {Microsoft BASIC}
                 protection",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "1",
  pages =        "36--45",
  month =        mar,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404886901161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanTilburg:1986:DBK,
  author =       "Johan van Tilburg and Dick E. Boekee",
  booktitle =    "Advances in {cryptology---CRYPTO '85} (Santa Barbara,
                 Calif., 1985)",
  title =        "Divergence bounds on key equivocation and error
                 probability in cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "218",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "489--513",
  year =         "1986",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "851 437",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Wang:1986:UEA,
  author =       "Yuedong Wang",
  title =        "Using encryption for authentication in local area
                 networks",
  publisher =    "????",
  address =      "????",
  pages =        "??",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Webster:1986:DB,
  author =       "A. F. Webster and Stafford E. Tavares",
  title =        "On the design of {S}-boxes",
  crossref =     "Williams:1986:ACC",
  pages =        "523--534",
  year =         "1986",
  bibdate =      "Wed May 13 15:56:46 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Welchman:1986:PBB,
  author =       "G. Welchman",
  title =        "From {Polish Bomba} to {British Bombe}. {The} Birth of
                 {Ultra}",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "71--110",
  month =        "????",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Sun Dec 01 10:02:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Article{Wiedemann:1986:QC,
  author =       "D. Wiedemann",
  title =        "Quantum cryptography",
  journal =      j-SIGACT,
  volume =       "18",
  number =       "2",
  pages =        "48--51",
  month =        sep # "\slash " # mar,
  year =         "1986--1987",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/24652.24654",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 08:21:23 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "An idea of Stephen Wiesner [1] is expanded to give a
                 method of public key distribution which is provably
                 secure under the principles of quantum mechanics. It
                 appears that this scheme could actually be implemented
                 in favorable environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Book{Williams:1986:CTU,
  author =       "John J. Williams",
  title =        "Cryptanalysis techniques: the ultimate decryption
                 manual",
  publisher =    "Consumertronics Co.",
  address =      "Alamogordo, NM, USA",
  pages =        "11 + 3 + 1",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers --- Data processing; Cryptography --- Data
                 processing.",
}

@InCollection{Williams:1986:PKE,
  author =       "H. C. Williams",
  booktitle =    "Advances in {cryptology---CRYPTO '85} (Santa Barbara,
                 Calif., 1985)",
  title =        "An {$ M^3 $} public-key encryption scheme",
  volume =       "218",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "358--368",
  year =         "1986",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "851 427",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
}

@Article{Worthington:1986:IDS,
  author =       "T. K. Worthington and J. J. Chainer and J. D. Willford
                 and S. C. Gunderson",
  title =        "{IBM} dynamic signature verification",
  journal =      j-COMPUT-SECUR,
  volume =       "5",
  number =       "2",
  pages =        "167--168",
  month =        jun,
  year =         "1986",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:27 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488690146X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Yao:1986:HGE,
  author =       "A. C. Yao",
  title =        "How to Generate and Exchange Secrets",
  crossref =     "IEEE:1986:ASF",
  pages =        "162--167",
  year =         "1986",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 29]{Goldreich:1997:FMCb}.",
}

@InCollection{Adleman:1987:PRD,
  author =       "Leonard Adleman",
  title =        "Pre-{RSA} Days: History and Lessons",
  crossref =     "Ashenhurst:1987:ATA",
  pages =        "??--??",
  year =         "1987",
  DOI =          "https://doi.org/10.1145/1283920.1961904",
  bibdate =      "Tue Jun 21 11:01:04 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "ACM Turing Award lecture.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Agnew:1987:RSC,
  author =       "G. B. Agnew",
  title =        "Random Sources for Cryptographic Systems",
  crossref =     "Chaum:1987:ACE",
  pages =        "77--81",
  year =         "1987",
  bibdate =      "Thu Feb 23 10:04:54 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ahituv:1987:PED,
  author =       "Niv Ahituv and Yeheskel Lapid and Seev Neumann",
  title =        "Processing encrypted data",
  journal =      j-CACM,
  volume =       "30",
  number =       "9",
  pages =        "777--780",
  month =        sep,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30404.html",
  acknowledgement = ack-nhfb,
  annote =       "Limit to operation is integer modular addition.",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "algorithms; security",
  review =       "ACM CR 8812-0933",
  subject =      "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption
                 standard (DES). {\bf E.3}: Data, DATA ENCRYPTION,
                 Public key cryptosystems.",
}

@Article{Ahituv:1987:VAI,
  author =       "Niv Ahituv and Yeheskel Lapid and Seev Neumann",
  title =        "Verifying the authentication of an information system
                 user",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "152--157",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900861",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Anonymous:1987:EVE,
  author =       "Anonymous",
  title =        "{Enigma} variations: encryption, emc\slash rfi, emp:
                 1987 conference proceedings",
  publisher =    "Osprey Exhibitions",
  address =      "Watford, England",
  pages =        "v + 243",
  year =         "1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Congresses;
                 Cryptography --- Congresses; Data protection ---
                 Congresses.",
}

@Article{Anonymous:1987:HSE,
  author =       "Anonymous",
  title =        "High-speed encrypted storage\slash backup",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "370--373",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900034",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:MAU,
  author =       "Anonymous",
  title =        "Message authentication using the {RSA}",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "373--376",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900046",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1987:TWP,
  author =       "Anonymous",
  title =        "Technology watch --- Personal authentication devices",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "10--11",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Barrett:1987:IRS,
  author =       "Paul Barrett",
  title =        "Implementing the {Rivest}, {Shamir} and {Adleman}
                 public-key encryption algorithm on a standard digital
                 signal processor",
  crossref =     "Odlyzko:1987:ACC",
  pages =        "311--323",
  year =         "1987",
  MRclass =      "94A60",
  MRnumber =     "88i:94015",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 1]{Handschuh:1998:SCC}.",
}

@Article{Bracha:1987:ERR,
  author =       "Gabriel Bracha",
  title =        "An $ {O}(\log n) $ Expected Rounds Randomized
                 {Byzantine} Generals Protocol",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "910--920",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42229.html",
  abstract =     "Byzantine Generals protocols enable processes to
                 broadcast messages reliably in the presence of faulty
                 processes. These protocols are run in a system that
                 consists of n processes, t of which are faulty. The
                 protocols are conducted in synchronous rounds of
                 message exchange. It is shown that, in the absence of
                 eavesdropping, without using cryptography, for any
                 epsilon greater than 0 and t equals n/(3 plus epsilon),
                 there is a randomized protocol with O(log n) expected
                 number of rounds. If cryptographic methods are allowed,
                 then, for epsilon greater than 0 and t equals n/(2 plus
                 epsilon), there is a randomized protocol with O(log n)
                 expected number of rounds. This is an improvement on
                 the lower bound of t plus 1 rounds required for
                 deterministic protocols, and on a previous result of
                 t/log n expected number of rounds for randomized
                 noncryptographic protocols.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Cornell Univ, Ithaca, NY, USA",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer networks --- Protocols; computer
                 programming --- Algorithms; computer systems, digital;
                 consensus protocols; cryptography; Distributed;
                 distributed algorithms; parallel algorithms; randomized
                 Byzantine generals protocol; reliability; theory;
                 verification",
  subject =      "{\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
                 {\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.1.0}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, General, Parallel
                 algorithms. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Permutations and
                 combinations.",
}

@TechReport{Brassard:1987:IMC,
  author =       "Gilles Brassard",
  title =        "Introduction to modern cryptology",
  type =         "Publication",
  number =       "606",
  institution =  "Universit{\'e} de Montreal, D{\`e}partement
                 d'Informatique et de Recherche Op{\`e}rationnelle",
  address =      "Montr{\'e}al, Qu{\'e}bec, Canada",
  pages =        "56",
  year =         "1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Revised version, February 1987. Supported in part by
                 Canada NSERC.",
  keywords =     "Cryptography.",
}

@TechReport{Campbell:1987:MBC,
  author =       "Q. G. Campbell",
  title =        "Meteor burst communications protocols --- The history
                 and role of computing technology in radio communication
                 via meteor trails",
  type =         "Technical Report",
  number =       "246",
  institution =  "University of Newcastle upon Tyne",
  address =      "Newcastle upon Tyne, UK",
  pages =        "??--??",
  month =        nov,
  year =         "1987",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1007.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@InProceedings{Chaum:1987:DPD,
  author =       "David Chaum and Jan-Hendrik Everse and Jeroem van de
                 Graaf and Ren{\'e} Peralta",
  title =        "Demonstrating possession of a discrete logarithm
                 without revealing it",
  crossref =     "Odlyzko:1987:ACC",
  pages =        "200--212",
  year =         "1987",
  DOI =          "https://doi.org/10.1007/3-540-47721-7_14",
  bibdate =      "Sun Mar 11 11:11:23 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Cohen:1987:CCI,
  author =       "Fred Cohen",
  title =        "A cryptographic checksum for integrity protection",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "505--510",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900319",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Cohen:1987:IIP,
  author =       "Fred Cohen",
  title =        "Introductory Information Protection",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1987",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Thu May 16 08:16:54 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://all.net/books/ip/",
  acknowledgement = ack-nhfb,
  annote =       "Possibly unpublished: not found in University of
                 California MELVYL, U.S. Library of Congress, and
                 numerous European library catalogs. Available
                 electronically at the indicated URL.",
}

@MastersThesis{Cominsky:1987:CAP,
  author =       "Isabeth Cominsky",
  title =        "Cryptology: ancient problem modern solutions",
  type =         "Thesis ({M.S.})",
  school =       "State University of New York, College of Technology at
                 Utica/Rome",
  address =      "Utica/Rome, NY, USA",
  pages =        "iv + 91",
  year =         "1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Gives a basic background in cryptology, its current
                 techniques (algorithms), and examines security and
                 authentication. Examines relationship between
                 cryptology and computer science.",
  keywords =     "Ciphers; Cryptography",
}

@Article{Coppersmith:1987:C,
  author =       "D. Coppersmith",
  title =        "Cryptography",
  journal =      j-IBM-JRD,
  volume =       "31",
  number =       "2",
  pages =        "244--248",
  month =        mar,
  year =         "1987",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "88c:94019",
  bibdate =      "Tue Mar 25 14:26:59 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  abstract =     "This paper is concerned with two aspects of
                 cryptography in which the author has been working. One
                 is the Data Encryption Standard (DES), developed at IBM
                 and now in wide use for commercial cryptographic
                 applications. This is a `private key' system; the
                 communicants share a secret key, and the eavesdropper
                 will succeed if he can guess this key among its
                 quadrillions of possibilities. The other is the
                 Diffie--Hellman key exchange protocol, a typical
                 `public key' cryptographic system. Its security is
                 based on the difficulty of taking `discrete logarithms'
                 (reversing the process of exponentiation in a finite
                 field). We describe the system and some analytic
                 attacks against it.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Yorktown Heights, NY, USA",
  affiliationaddress = "IBM, Yorktown Heights, NY, USA",
  classcodes =   "C6130 (Data handling techniques)",
  classification = "723; 902",
  conference =   "Math and Comput",
  corpsource =   "IBM Thomas J. Watson Res. Center, Yorktown Heights,
                 NY, USA",
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
  journalabr =   "IBM J Res Dev",
  keywords =     "cryptography; data encryption standard; Data
                 Encryption Standard; Diffie--Hellman key exchange
                 protocol; discrete logarithms; eavesdropper;
                 exponentiation; IBM; private key; public key; secret
                 key; security; security of data; standards",
  meetingaddress = "Yorktown Heights, NY, USA",
  meetingdate =  "Dec 1985",
  meetingdate2 = "12/85",
  treatment =    "P Practical",
}

@Article{Crilly:1987:BPB,
  author =       "Tony Crilly and Shekhar Nandy",
  title =        "The Birthday Problem for Boys and Girls",
  journal =      j-MATH-GAZ,
  volume =       "71",
  number =       "455",
  pages =        "19--22",
  month =        mar,
  year =         "1987",
  CODEN =        "MAGAAS",
  ISSN =         "0025-5572",
  bibdate =      "Wed Oct 31 13:22:46 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://links.jstor.org/sici?sici=0025-5572%28198703%292%3A71%3A455%3C19%3ATBPFBA%3E2.0.CO%3B2-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematical Gazette",
  journal-URL =  "http://www.m-a.org.uk/jsp/index.jsp?lnk=620",
  keywords =     "Birthday Paradox",
  remark =       "The authors reexamine the Birthday Paradox in a
                 variant described as ``If the group consists of an
                 equal number of boys and girls, what should be the
                 corresponding minimum group size if we are interested
                 in a boy and a girl sharing a birthday?''\par The
                 answer is that at least one of the $r$ boys and one of
                 the $r$ girls will share a birthday is $ P(r) = 1 - (1
                 / 365)^{2r} \sum {k = 1r}(365 - k)^r {}^{365P}_k S(r,
                 k) $, where the $ S(r, k) $ is the Stirling numbers of
                 the second kind, and ${}^{365P}_k = 365 ! / (365 - k)!$
                 is the number of ways that $k$ specific subsets of
                 girls with birthdays in $k$ days can fall in the $ 365$
                 days.",
}

@Book{Deavours:1987:CPI,
  author =       "Cipher A. Deavours",
  title =        "Cryptanalytic programs for the {IBM PC}",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "44",
  year =         "1987",
  bibdate =      "Mon Nov 23 12:36:43 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.; IBM Personal Computer.",
}

@Book{Deavours:1987:CYT,
  editor =       "Cipher A. Deavours and David Kahn and Louis Kruh and
                 Greg Mellen",
  title =        "Cryptology yesterday, today, and tomorrow",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "xi + 519",
  year =         "1987",
  ISBN =         "0-89006-253-6",
  ISBN-13 =      "978-0-89006-253-1",
  LCCN =         "Z103.C76 1987",
  bibdate =      "Tue Dec 01 14:29:11 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "First volume of selected papers from issues of
                 Cryptologia.",
  price =        "US\$60.00",
  series =       "The Artech House communication and electronic defense
                 library",
  acknowledgement = ack-nhfb,
  annote =       "Continued by: Cryptology, machines, history, and
                 methods.",
  keywords =     "Ciphers; Cryptography",
}

@InProceedings{deJonge:1987:SVR,
  author =       "Wiebren {de Jonge} and David Chaum",
  title =        "Some variations on {RSA} signatures \& their
                 security",
  crossref =     "Odlyzko:1987:ACC",
  pages =        "49--59",
  year =         "1987",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "89b:94025",
  MRreviewer =   "Do Long Van",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Elvin:1987:CWW,
  author =       "Robert Scott Elvin",
  title =        "A cryptanalysis of the {World War II German Enigma}
                 cipher machine",
  type =         "Thesis ({M.Sc.C.S.})",
  publisher =    "National Library of Canada",
  school =       "University of New Brunswick",
  address =      "Ottawa, ON, Canada",
  year =         "1987",
  ISBN =         "0-315-39876-0",
  ISBN-13 =      "978-0-315-39876-4",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "2 microfiches (104 fr.)",
  series =       "Canadian theses = Th{\`e}ses canadiennes",
  acknowledgement = ack-nhfb,
}

@Article{Faak:1987:CMM,
  author =       "Viiveke F{\aa}k",
  title =        "Crypto management made manageable --- Demands on
                 crypto equipment design",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "36--40",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901234",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Feldman:1987:PSN,
  author =       "P. Feldman",
  title =        "A Practical Scheme for Non-Interactive Verifiable
                 Secret Sharing",
  crossref =     "IEEE:1987:ASF",
  pages =        "427--437",
  year =         "1987",
  bibdate =      "Thu Dec 03 07:01:52 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 15]{Gemmell:1997:ITC},
                 \cite[Ref. 13]{Canetti:1997:PSL}.",
}

@Article{Fernandez:1987:ACA,
  author =       "C. Fern{\'a}ndez and A. Vaquero and J. M. Troya and J.
                 M. S{\'a}nchez",
  title =        "Automating the computation of authenticators for
                 interbank telex messages",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "396--402",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900125",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ferris:1987:WBC,
  author =       "John Ferris",
  title =        "{Whitehall}'s {Black Chamber}: {British} Cryptology
                 and the {Government Code and Cypher School}, 1919--29",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "54--??",
  year =         "1987",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@InProceedings{Fiat:1987:HPY,
  author =       "A. Fiat and A. Shamir",
  title =        "How to prove yourself: Practical solutions to
                 identification and signature problems",
  crossref =     "Odlyzko:1987:ACC",
  pages =        "181--187",
  year =         "1987",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 5]{Handschuh:1998:SCC}.",
}

@Book{Friedman:1987:ICA,
  author =       "William F. (William Frederick) Friedman",
  title =        "The index of coincidence and its applications in
                 cryptanalysis",
  volume =       "49",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "95",
  year =         "1987",
  ISBN =         "0-89412-137-5 (soft cover), 0-89412-138-3 (library
                 bound)",
  ISBN-13 =      "978-0-89412-137-1 (soft cover), 978-0-89412-138-8
                 (library bound)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography; Probabilities.",
}

@Article{Galil:1987:PEA,
  author =       "Zvi Galil and Moti Yung",
  title =        "Partitioned encryption and achieving simultaneity by
                 partitioning",
  journal =      j-INFO-PROC-LETT,
  volume =       "26",
  number =       "2",
  pages =        "81--88",
  day =          "19",
  month =        oct,
  year =         "1987",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68M10 (68M15 68P25 68Q99)",
  MRnumber =     "88k:68014",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Columbia Univ, New York, NY, USA",
  classification = "723; C4240 (Programming and algorithm theory); C5620
                 (Computer networks and techniques)",
  corpsource =   "Dept. of Comput. Sci., Columbia Univ. New York, NY,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "computational complexity; computer systems, digital
                 --- Distributed; cryptographic protocols; cryptography;
                 distributed processing; fault tolerant computing;
                 fault-tolerant distributed computing; partitioned
                 encryption; partitioned secret sharing; probabilistic
                 encryption; probabilistic public-key encryption;
                 protocols; security; simultaneous broadcast;
                 standardization; theory; verification",
  pubcountry =   "Netherlands A06",
  subject =      "E.3 Data, DATA ENCRYPTION, Public key cryptosystems
                 \\
                 D.4.6 Software, OPERATING SYSTEMS, Security and
                 Protection, Cryptographic controls",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Girling:1987:CCL,
  author =       "C. G. Girling",
  title =        "Covert Channels in {LAN}'s",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "SE-13",
  number =       "2",
  pages =        "292--296",
  month =        feb,
  year =         "1987",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/TSE.1987.233153",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 08:07:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng1980.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1702208",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@InProceedings{Goldreich:1987:HPM,
  author =       "O. Goldreich and S. Micali and A. Wigderson",
  title =        "How to Play any Mental Game --- {A} Completeness
                 Theorem for Protocols with Honest Majority",
  crossref =     "ACM:1987:PNA",
  pages =        "218--229",
  year =         "1987",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 23]{Gemmell:1997:ITC},
                 \cite[Ref. 17]{Goldreich:1997:FMCb}, \cite[Ref.
                 19]{Canetti:1997:PSL}.",
}

@Article{Guan:1987:CAP,
  author =       "Puhua Guan",
  title =        "Cellular automaton public-key cryptosystem",
  journal =      j-COMPLEX-SYSTEMS,
  volume =       "1",
  number =       "1",
  pages =        "51--56",
  year =         "1987",
  ISSN =         "0891-2513",
  MRclass =      "94A60 (68P25 68Q80)",
  MRnumber =     "88j:94030",
  MRreviewer =   "Harriet Fell",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Complex Systems",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Haastad:1987:OWP,
  author =       "Johan H{\aa}stad",
  title =        "One-way permutations in {$ {\rm NC}^0 $}",
  journal =      j-INFO-PROC-LETT,
  volume =       "26",
  number =       "3",
  pages =        "153--155",
  day =          "23",
  month =        nov,
  year =         "1987",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68Q15 (68Q05)",
  MRnumber =     "89h:68051",
  MRreviewer =   "J. C. Lagarias",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "MIT, Cambridge, MA, USA",
  classification = "723; C4240 (Programming and algorithm theory)",
  corpsource =   "Lab. for Comput. Sci., MIT, Cambridge, MA, USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "computable; computational complexity; computer
                 systems, digital --- Parallel Processing; cryptography;
                 inverting permutations; NC/sup 0/ circuits; one-way
                 permutations; p-completeness; P-hard; parallel
                 algorithms; parallel computation; permutations; theory;
                 verification",
  pubcountry =   "Netherlands A07",
  subject =      "G.2.2 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory, Path and circuit problems \\ G.2.1
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Permutations and combinations \\ F.1.1
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Models of Computation, Bounded-action devices",
  treatment =    "T Theoretical or Mathematical",
  xxtitle =      "One-way permutations in ${NC}_0$",
}

@Article{Hammer:1987:EUH,
  author =       "Joseph Hammer and Dinesh G. Sarvate",
  title =        "Encryption using {Hungarian} rings",
  journal =      j-DISCRETE-APPL-MATH,
  volume =       "16",
  number =       "2",
  pages =        "151--155",
  year =         "1987",
  CODEN =        "DAMADU",
  ISSN =         "0166-218X",
  ISSN-L =       "0166-218X",
  MRclass =      "94B25 (05A05)",
  MRnumber =     "87k:94018",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Discrete Applied Mathematics. Combinatorial
                 Algorithms, Optimization and Computer Science",
}

@Article{Herzberg:1987:PPS,
  author =       "Amir Herzberg and Shlomit S. Pinter",
  title =        "Public Protection of Software",
  journal =      j-TOCS,
  volume =       "5",
  number =       "4",
  pages =        "371--393",
  month =        nov,
  year =         "1987",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 06:47:30 MST 1999",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tocs/1987-5-4/p371-herzberg/",
  abstract =     "One of the overwhelming problems that software
                 producers must contend with is the unauthorized use and
                 distribution of their products. Copyright laws
                 concerning software are rarely enforced, thereby
                 causing major losses to the software companies.
                 Technical means of protecting software from illegal
                 duplication are required, but the available means are
                 imperfect. We present protocols that enable software
                 protection, without causing substantial overhead in
                 distribution and maintenance. The protocols may be
                 implemented by a conventional cryptosystem, such as the
                 DES, or by a public key cryptosystem, such as the RSA.
                 Both implementations are proved to satisfy required
                 security criteria.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technion-Israel Inst of Technology, Isr",
  classification = "723",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  journalabr =   "ACM Trans Comput Syst",
  keywords =     "algorithms; computer software; cryptographic
                 protocols; cryptography; design; Protection; public key
                 cryptosystems; security; security protocols; single key
                 cryptosystems",
  subject =      "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
                 Protection, Cryptographic controls. {\bf K.5.1}
                 Computing Milieux, LEGAL ASPECTS OF COMPUTING,
                 Hardware/Software Protection. {\bf E.3} Data, DATA
                 ENCRYPTION, Public key cryptosystems. {\bf D.4.6}
                 Software, OPERATING SYSTEMS, Security and Protection.",
}

@Article{Highland:1987:CC,
  author =       "Harold Joseph Highland",
  title =        "Cipher cracking",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "205--205",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901015",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:DES,
  author =       "Harold Joseph Highland",
  title =        "Data encryption standard {II}?",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "195--196",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900952",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:EP,
  author =       "Harold Joseph Highland",
  title =        "Encryption package",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "199--202",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900988",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:HEM,
  author =       "Harold Joseph Highland",
  title =        "How to evaluate microcomputer encryption software and
                 hardware",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "3",
  pages =        "229--244",
  month =        jun,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:30 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1987:HSY,
  author =       "Harold Joseph Highland",
  title =        "How secure are your encryption keys?",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "99--100",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900757",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Hollis:1987:TCA,
  author =       "J. B. Hollis",
  title =        "A technique for communicating {AVL} traffic by
                 subliminal data signalling over a speech radio
                 channel",
  crossref =     "Muraszko:1987:CVR",
  pages =        "13/1--13/5",
  year =         "1987",
  bibdate =      "Mon Dec 28 13:17:10 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{IRD:1987:DTV,
  author =       "{International Resource Development, Inc.}",
  title =        "Data, text and voice encryption worldwide markets",
  type =         "Report",
  number =       "727",
  institution =  "International Resource Development",
  address =      "6 Prowitt St., Norwalk, CT 06855, USA",
  pages =        "vii + 197",
  month =        feb,
  year =         "1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography equipment industry; Market surveys.",
}

@InProceedings{Ito:1987:SSS,
  author =       "M. Ito and A. Saito and T. Nishizeki",
  title =        "Secret sharing schemes realizing general access
                 structures",
  crossref =     "IEEE:1987:IIG",
  pages =        "99--102",
  year =         "1987",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 25]{Gemmell:1997:ITC}.",
}

@Book{Jackson:1987:NTS,
  author =       "T. H. Jackson",
  title =        "From number theory to secret codes",
  publisher =    "Hilger",
  address =      "Bristol, UK",
  pages =        "vi + 86",
  year =         "1987",
  ISBN =         "0-85274-077-8 (paperback), 0-85274-078-6",
  ISBN-13 =      "978-0-85274-077-4 (paperback), 978-0-85274-078-1",
  LCCN =         "Z104 .J3 1987",
  bibdate =      "Sat Apr 20 12:24:59 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Jung:1987:IRC,
  author =       "Achim Jung",
  title =        "Implementing the {RSA} Cryptosystem",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "342--350",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Jan 25 17:38:12 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  abstract =     "Techniques for a software implementation of the RSA
                 cryptosystem are presented. They allow both space and
                 time requirements of the RSA scheme to be minimized. A
                 hash function to be used in connection with the
                 cryptosystem is presented; this function avoids
                 weaknesses of other hash functions published
                 previously. Performance results of several
                 implementations are given, which show that the RSA
                 algorithm is acceptably fast for a large number of
                 applications.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technische Hochschule Darmstadt, Darmstadt, West
                 Ger",
  classification = "723",
  fjournal =     "Computers and Security",
  journalabr =   "Comput Secur",
  keywords =     "computer programming --- Algorithms; computer
                 software; cryptography; cryptosystem; digital
                 signatures; hash functions; primality tests",
}

@InProceedings{Karger:1987:LDP,
  author =       "P. Karger",
  title =        "Limiting the damage potential of discretionary
                 {Trojan} horses",
  crossref =     "IEEE:1987:PIS",
  pages =        "32--37",
  year =         "1987",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 30]{Gemmell:1997:ITC}.",
}

@Article{Kawai:1987:LAI,
  author =       "Satoru Kawai",
  title =        "Local authentication in insecure environments",
  journal =      j-INFO-PROC-LETT,
  volume =       "25",
  number =       "3",
  pages =        "171--174",
  day =          "29",
  month =        may,
  year =         "1987",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Tokyo, Tokyo, Jpn",
  classification = "723; B6120B (Codes); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Inf. Sci., Tokyo Univ., Japan",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "codebreaking; cryptography; data processing ---
                 Security of Data; faking; insecure environments; local
                 authentication; local authentication mechanism; public
                 key cryptosystem; system information; theory; user
                 identifiers",
  pubcountry =   "Netherlands A07",
  subject =      "E.3 Data, DATA ENCRYPTION, Public key cryptosystems
                 \\
                 E.3 Data, DATA ENCRYPTION, Data encryption standard
                 (DES)",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Knuth:1987:CT,
  author =       "Donald E. Knuth",
  title =        "{$N$}-ciphered texts",
  journal =      j-WORD-WAYS,
  volume =       "20",
  number =       "??",
  pages =        "173--174, 191--192",
  year =         "1987",
  ISSN =         "0043-7980",
  bibdate =      "Sat Mar 23 15:46:24 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Word Ways",
}

@Book{Koblitz:1987:CNT,
  author =       "Neal Koblitz",
  title =        "A course in number theory and cryptography",
  volume =       "114",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "208",
  year =         "1987",
  ISBN =         "0-387-96576-9",
  ISBN-13 =      "978-0-387-96576-5",
  LCCN =         "QA241 .K6721 1987",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$29.80",
  series =       "Graduate texts in mathematics",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; number theory",
}

@Article{Koblitz:1987:ECC,
  author =       "Neal Koblitz",
  title =        "Elliptic Curve Cryptosystems",
  journal =      j-MATH-COMPUT,
  volume =       "48",
  number =       "177",
  pages =        "203--209",
  month =        jan,
  year =         "1987",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  MRclass =      "94A60 (11T71 11Y16 68P25)",
  MRnumber =     "88b:94017",
  MRreviewer =   "Harald Niederreiter",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcomp1980.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "B0250 (Combinatorial mathematics); B6120B (Codes);
                 C1160 (Combinatorial mathematics); C1260 (Information
                 theory)",
  corpsource =   "Dept. of Math., Washington Univ., Seattle, WA, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "cryptography; cryptosystems; cyclic; elliptic curve;
                 elliptic curves over finite fields; global point; group
                 theory; key cryptosystems; multiplicative group;
                 nonsmoothness; number theory; primitive points; public;
                 subgroup",
  referencedin = "Referenced in \cite[Ref. 3]{Wiener:1998:PCP}.",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Kuchlin:1987:PKE,
  author =       "W. K{\"u}chlin",
  title =        "Public key encryption",
  journal =      j-SIGSAM,
  volume =       "21",
  number =       "3",
  pages =        "69--73",
  month =        aug,
  year =         "1987",
  CODEN =        "SIGSBZ",
  ISSN =         "0163-5824 (print), 1557-9492 (electronic)",
  ISSN-L =       "0163-5824",
  bibdate =      "Fri Feb 8 18:26:59 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGSAM Bulletin",
  issue =        "81",
  keywords =     "theory",
  subject =      "E.3 Data, DATA ENCRYPTION, Public key cryptosystems",
}

@Book{Leary:1987:CSM,
  author =       "Penn Leary",
  title =        "The Cryptographic {Shakespeare}: a monograph wherein
                 the poems and plays attributed to {William Shakespeare}
                 are proven to contain the enciphered name of the
                 concealed author, {Francis Bacon}",
  publisher =    "Westchester House",
  address =      "Omaha, NE, USA",
  pages =        "272",
  year =         "1987",
  ISBN =         "0-9617917-0-5",
  ISBN-13 =      "978-0-9617917-0-4",
  LCCN =         "PR2944 .L38 1987",
  bibdate =      "Mon Nov 30 10:07:37 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lenstra:1987:FIE,
  author =       "H. W. {Lenstra, Jr.}",
  title =        "Factoring integers with elliptic curves",
  journal =      j-ANN-MATH,
  volume =       "126",
  number =       "3",
  pages =        "649--673",
  year =         "1987",
  CODEN =        "ANMAAH",
  ISSN =         "0003-486X (print), 1939-8980 (electronic)",
  ISSN-L =       "0003-486X",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.jstor.org/stable/1971363",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of Mathematics",
  referencedin = "Referenced in \cite[Ref. 15]{Kaliski:1995:SUR}.",
}

@Article{Litant:1987:BRC,
  author =       "Thomas F. Litant",
  title =        "Book Review: {{\em Computer Security: the Practical
                 Issues in a Troubled World}, (Elsevier Science
                 Publishers, Amsterdam 1985)}",
  journal =      j-OPER-SYS-REV,
  volume =       "21",
  number =       "1",
  pages =        "3--5",
  month =        jan,
  year =         "1987",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:35 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Luciano:1987:CCC,
  author =       "Dennis Luciano and Gordon Prichett",
  title =        "Cryptology: From {Caesar} Ciphers to Public-key
                 Cryptosystems",
  journal =      j-COLLEGE-MATH-J,
  volume =       "18",
  number =       "1",
  pages =        "2--17",
  month =        jan,
  year =         "1987",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/07468342.1987.11973000",
  ISSN =         "0746-8342 (print), 1931-1346 (electronic)",
  ISSN-L =       "0746-8342",
  MRclass =      "94A60 (00A08 11T71)",
  MRnumber =     "88e:94025",
  MRreviewer =   "E. F. Assmus, Jr.",
  bibdate =      "Thu Feb 14 09:50:26 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/collegemathj.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.tandfonline.com/doi/abs/10.1080/07468342.1987.11973000",
  acknowledgement = ack-nhfb,
  fjournal =     "College Mathematics Journal",
  journal-URL =  "https://maa.tandfonline.com/loi/ucmj20;
                 https://www.jstor.org/journal/collmathj",
  onlinedate =   "30 Jan 2018",
}

@Article{MacPherson:1987:CUN,
  author =       "B. Nelson MacPherson",
  title =        "The Compromise of {US Navy} Cryptanalysis After the
                 {Battle of Midway}",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "320--??",
  year =         "1987",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Book{Marayati:1987:AWA,
  author =       "Muhammad Marayati and Muhammad Hassan Tayyan and Yahya
                 Mir 'Alam",
  title =        "{'Ilm} al-ta'miyah wa-istikhraj al-mu'amma 'inda
                 {al-'Arab}",
  publisher =    "Majma' al-Lughah al-'Arabiyah bi-Dimashq",
  address =      "Damascus, Syria",
  pages =        "various",
  year =         "1987",
  LCCN =         "Z103.4.A65 M37 1987",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Abstract in English. Title on added t.p.: Origins of
                 Arab cryptography and cryptanalysis. Contents: al-juz'
                 1. Dirasat wa-tahqiq li-rasa'il al-Kindi wa-Ibn 'Adlan
                 wa-Ibn al-Durayhim.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- Arab countries --- history",
}

@Article{Maulucci:1987:HAC,
  author =       "Ruth A. Maulucci and J. A. N. Lee",
  title =        "Happenings: {The 25th Anniversary of Committee X3};
                 {The Code-Breaking Computers of 1944}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "9",
  number =       "3/4",
  pages =        "345--356",
  month =        jul # "\slash " # sep,
  year =         "1987",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:24 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1987/pdf/a3345.pdf;
                 http://www.computer.org/annals/an1987/a3345abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Meadows:1987:MSA,
  author =       "C. Meadows and D. Mutchler",
  title =        "Matching Secrets in the Absence of a Continuously
                 Available Trusted Authority",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "SE-13",
  number =       "2",
  pages =        "289--292",
  month =        feb,
  year =         "1987",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/TSE.1987.233152",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 08:07:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng1980.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1702207",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@Article{Micali:1987:NSP,
  author =       "Silvio Micali and Charles Rackoff and Bob Sloan",
  title =        "The notion of security for probabilistic cryptosystems
                 (extended abstract)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "263",
  pages =        "381--392",
  year =         "1987",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "907 101",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
  remark =       "Published in \cite{Odlyzko:1987:ACC}.",
}

@InProceedings{Millen:1987:CCC,
  author =       "Jonathan K. Millen",
  title =        "Covert Channel Capacity",
  crossref =     "IEEE:1987:PIS",
  pages =        "60--66",
  year =         "1987",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1016.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Misc{Mills:1987:RDP,
  author =       "D. L. Mills",
  title =        "{RFC 1004}: Distributed-protocol authentication
                 scheme",
  day =          "1",
  month =        apr,
  year =         "1987",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Status: EXPERIMENTAL.",
  URL =          "ftp://ftp.internic.net/rfc/rfc1004.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1004.txt",
  acknowledgement = ack-nhfb,
  format =       "TXT=21402 bytes",
  online =       "yes",
  status =       "EXPERIMENTAL",
}

@Article{Moore:1987:CSK,
  author =       "J. H. Moore and G. J. Simmons",
  title =        "Cycle Structure of the {DES} for Keys Having
                 Palindromic (or Antipalindromic) Sequences of Round
                 Keys",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "SE-13",
  number =       "2",
  pages =        "262--273",
  month =        feb,
  year =         "1987",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/TSE.1987.233150",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 08:07:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng1980.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1702205",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@Article{Needham:1987:AR,
  author =       "R. M. Needham and M. D. Schroeder",
  title =        "Authentication revisited",
  journal =      j-OPER-SYS-REV,
  volume =       "21",
  number =       "1",
  pages =        "7--7",
  month =        jan,
  year =         "1987",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:35 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@InProceedings{Odlyzko:1987:CCD,
  author =       "A. M. Odlyzko",
  title =        "On the complexity of computing discrete logarithms and
                 factoring integers",
  crossref =     "Cover:1987:OPC",
  pages =        "113--116",
  year =         "1987",
  bibdate =      "Mon Jul 19 06:55:53 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.research.att.com/~amo/doc/arch/factoring.logs.pdf;
                 http://www.research.att.com/~amo/doc/arch/factoring.logs.ps;
                 http://www.research.att.com/~amo/doc/arch/factoring.logs.troff",
  acknowledgement = ack-nhfb,
}

@InCollection{Orton:1987:VIP,
  author =       "G. A. Orton and M. P. Roy and P. A. Scott and L. E.
                 Peppard and S. E. Tavares",
  booktitle =    "Advances in {cryptology---CRYPTO '86} (Santa Barbara,
                 Calif., 1986)",
  title =        "{VLSI} implementation of public-key encryption
                 algorithms",
  volume =       "263",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "277--301",
  year =         "1987",
  MRclass =      "94A60",
  MRnumber =     "88k:94024",
  MRreviewer =   "Harald Niederreiter",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
}

@Article{Otway:1987:ETM,
  author =       "Dave Otway and Owen Rees",
  title =        "Efficient and timely mutual authentication",
  journal =      j-OPER-SYS-REV,
  volume =       "21",
  number =       "1",
  pages =        "8--10",
  month =        jan,
  year =         "1987",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:35 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Patterson:1987:MCC,
  author =       "Wayne Patterson",
  title =        "Mathematical cryptology for computer scientists and
                 mathematicians",
  publisher =    "Rowman and Littlefield",
  address =      "Totowa, NJ, USA",
  pages =        "xxii + 312",
  year =         "1987",
  ISBN =         "0-8476-7438-X",
  ISBN-13 =      "978-0-8476-7438-1",
  LCCN =         "Z103 .P351 1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$29.50",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Article{Pfitzmann:1987:NUO,
  author =       "Andreas Pfitzmann and Michael Waidner",
  title =        "Networks Without User Observability",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "2",
  pages =        "158--166",
  month =        apr,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Dec 28 14:30:59 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.semper.org/sirene/publ/PfWa_86anonyNetze.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Security",
}

@Article{Power:1987:AHE,
  author =       "June M. Power and Steve R. Wilbur",
  title =        "Authentication in a heterogeneous environment",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "1",
  pages =        "41--48",
  month =        feb,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887901246",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rao:1987:PKA,
  author =       "T. R. N. Rao and Kil-Hyun Nam",
  title =        "Private-key algebraic-coded cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "263",
  pages =        "35--48",
  year =         "1987",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "88j:94031",
  MRreviewer =   "Rudolf Lidl",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
  remark =       "Published in \cite{Odlyzko:1987:ACC}.",
}

@Misc{RFC0989,
  author =       "J. Linn",
  title =        "{RFC 989}: Privacy enhancement for {Internet}
                 electronic mail: Part {I}: Message encipherment and
                 authentication procedures",
  day =          "1",
  month =        feb,
  year =         "1987",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoleted by RFC1040, RFC1113 \cite{RFC1040,RFC1113}.
                 Status: UNKNOWN.",
  URL =          "ftp://ftp.internic.net/rfc/rfc1040.txt;
                 ftp://ftp.internic.net/rfc/rfc1113.txt;
                 ftp://ftp.internic.net/rfc/rfc989.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1040.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1113.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc989.txt",
  acknowledgement = ack-nhfb,
  format =       "TXT=63934 bytes",
  obsoletedby =  "Obsoleted by RFC1040, RFC1113
                 \cite{RFC1040,RFC1113}.",
  online =       "yes",
  status =       "UNKNOWN",
}

@Article{Rihaczek:1987:T,
  author =       "Karl Rihaczek",
  title =        "{Teletrust}",
  journal =      j-COMP-NET-ISDN,
  volume =       "13",
  number =       "3",
  pages =        "235--239",
  year =         "1987",
  CODEN =        "CNISE9",
  ISSN =         "0169-7552",
  ISSN-L =       "0169-7552",
  bibdate =      "Sat Sep 25 23:08:50 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "GMD, Darmstadt, West Ger",
  classification = "723",
  fjournal =     "Computer Networks and ISDN Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01697552",
  journalabr =   "Comput Networks ISDN Syst",
  keywords =     "computer networks; cryptography; data processing,
                 business --- Security of Data; electronic funds
                 transfer; teletrust",
}

@InCollection{Rivest:1987:EDR,
  author =       "Ronald L. Rivest",
  title =        "The Eary Days of {RSA}: History and Lessons",
  crossref =     "Ashenhurst:1987:ATA",
  pages =        "??--??",
  year =         "1987",
  DOI =          "https://doi.org/10.1145/1283920.1961920",
  bibdate =      "Tue Jun 21 11:01:04 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "ACM Turing Award lecture.",
  acknowledgement = ack-nhfb,
}

@InCollection{Shamir:1987:CSS,
  author =       "Adi Shamir",
  title =        "Cryptography: State of the science",
  crossref =     "Ashenhurst:1987:ATA",
  pages =        "??--??",
  year =         "1987",
  DOI =          "https://doi.org/10.1145/1283920.1961903",
  bibdate =      "Tue Jun 21 11:01:04 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "ACM Turing Award lecture.",
  acknowledgement = ack-nhfb,
}

@PhdThesis{Sherman:1987:CVT,
  author =       "Alan T. Sherman",
  title =        "Cryptology and {VLSI} (a two-part dissertation). {I},
                 {II}, Detecting and exploiting algebraic weaknesses in
                 cryptosystems. Algorithms for placing modules on a
                 custom {VLSI} chip",
  type =         "Thesis ({Ph.D.})",
  school =       "Department of Electrical Engineering and Computer
                 Science, Massachusetts Institute of Technology",
  address =      "Cambridge, MA, USA",
  pages =        "221",
  year =         "1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Supervised by Ronald Linn Rivest.",
  acknowledgement = ack-nhfb,
}

@Article{Silverman:1987:MPQ,
  author =       "Robert D. Silverman",
  title =        "The Multiple Polynomial Quadratic Sieve",
  journal =      j-MATH-COMPUT,
  volume =       "48",
  number =       "177",
  pages =        "329--339",
  month =        jan,
  year =         "1987",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  MRclass =      "11Y05",
  MRnumber =     "88c:11079",
  MRreviewer =   "Torleiv Kl{\o}ve",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcomp1980.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "C1160 (Combinatorial mathematics)",
  corpsource =   "MITRE Corp., Bedford, MA, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "algorithms; large-integer factoring; multiple
                 polynomial quadratic; number theory; parallel; parallel
                 algorithms; Pomerance quadratic sieve; sieve",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Smith:1987:AUW,
  author =       "Sidney L. Smith",
  title =        "Authenticating users by word association",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "6",
  pages =        "464--470",
  month =        dec,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900277",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spender:1987:ICU,
  author =       "J-C. Spender",
  title =        "Identifying computer users with authentication devices
                 (tokens)",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "5",
  pages =        "385--395",
  month =        oct,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:31 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404887900113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Stern:1987:SLC,
  author =       "J. Stern",
  title =        "Secret linear congruential generators are not
                 cryptographically secure",
  crossref =     "IEEE:1987:ASF",
  pages =        "421--426",
  year =         "1987",
  bibdate =      "Wed Dec 21 07:47:04 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
}

@Article{Stripp:1987:BJC,
  author =       "Alan J. Stripp",
  title =        "Breaking {Japanese} Codes",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "2",
  number =       "4",
  pages =        "135--??",
  year =         "1987",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Article{Subramanian:1987:DTP,
  author =       "K. G. Subramanian and Rani Siromoney and P. Jeyanthi
                 Abisha",
  title =        "A {D0L-T0L} public key cryptosystem",
  journal =      j-INFO-PROC-LETT,
  volume =       "26",
  number =       "2",
  pages =        "95--97",
  day =          "19",
  month =        oct,
  year =         "1987",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68P25 (68Q45)",
  MRnumber =     "89k:68036",
  MRreviewer =   "James W. Snively, Jr.",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "C4210 (Formal logic); C4240 (Programming and
                 algorithm theory); C6130 (Data handling techniques)",
  corpsource =   "Dept. of Math., Madras Christian Coll., India",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "algorithms; computational complexity; cryptography;
                 D0L; decryption; design; formal language; formal
                 languages; languages; NP-complete problem; public key
                 cryptosystem; T0L; theory; trapdoor information",
  pubcountry =   "Netherlands A08",
  subject =      "F.4.2 Theory of Computation, MATHEMATICAL LOGIC AND
                 FORMAL LANGUAGES, Grammars and Other Rewriting Systems,
                 Parallel rewriting systems \\ E.3 Data, DATA
                 ENCRYPTION, Public key cryptosystems",
  treatment =    "T Theoretical or Mathematical",
}

@InCollection{Thompson:1987:RTT,
  author =       "Ken Thompson",
  title =        "Reflections on trusting trust",
  crossref =     "Ashenhurst:1987:ATA",
  pages =        "??--??",
  year =         "1987",
  DOI =          "https://doi.org/10.1145/1283920.1283940",
  bibdate =      "Tue Jun 21 11:01:04 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "ACM Turing Award lecture.",
  acknowledgement = ack-nhfb,
}

@Book{USGAOPEMD:1987:PDD,
  author =       "{United States.General Accounting Office.Program
                 Evaluation and Methodology Division}",
  title =        "Privacy data: the {Data Encryption Standard} provides
                 valuable protection",
  publisher =    "The Division",
  address =      "Washington, DC, USA",
  pages =        "80",
  year =         "1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Transfer paper - Program Evaluation and Methodology
                 Division; 8 Transfer paper (United States. General
                 Accounting Office. Program Evaluation and Methodology
                 Division); 8",
  acknowledgement = ack-nhfb,
  annote =       "Cover title. ``March 1987.''",
  keywords =     "Data protection.",
}

@Article{VanHeurck:1987:TNS,
  author =       "Philippe {Van Heurck}",
  title =        "{TRASEX}: national security system for {EFTs} in
                 {Belgium}",
  journal =      j-COMP-NET-ISDN,
  volume =       "14",
  number =       "2--5",
  pages =        "389--395",
  year =         "1987",
  CODEN =        "CNISE9",
  ISSN =         "0169-7552",
  ISSN-L =       "0169-7552",
  bibdate =      "Sat Sep 25 23:08:50 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Cent for Interbank Research in Informatics",
  affiliationaddress = "Brussels, Belg",
  classification = "718; 723",
  fjournal =     "Computer Networks and ISDN Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01697552",
  journalabr =   "Comput Networks ISDN Syst",
  keywords =     "Authentication; Computer Programming--Algorithms;
                 Cryptography; Data Transmission; Electronic Funds
                 Transfer; Key Management; Message Authentication
                 Algorithm; Smart Card; Trasec",
}

@MastersThesis{Waber:1987:VEC,
  author =       "John James Waber",
  title =        "Voice encryption for cellular telephones",
  type =         "Thesis ({M.S.})",
  school =       "University of Colorado",
  address =      "Boulder, CO, USA",
  pages =        "x + 124",
  year =         "1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "[120]-124.",
  keywords =     "Cellular radio; Eavesdropping; Privacy, Right of ---
                 United States; Radiotelephone",
}

@TechReport{Wheeler:1987:BE,
  author =       "David Wheeler",
  title =        "Block encryption",
  type =         "Technical report",
  number =       "120",
  institution =  "Computer Laboratory, University of Cambridge",
  address =      "Cambridge, Cambridgeshire, UK",
  pages =        "4",
  year =         "1987",
  LCCN =         "QA76.9.A25W48 1987",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control; cryptography;
                 Cryptography.",
}

@Article{Wichmann:1987:NAR,
  author =       "B. A. Wichmann",
  title =        "Note on {Algorithm 121}: {RSA} key calculation in
                 {Ada}",
  journal =      j-COMP-J,
  volume =       "30",
  number =       "3",
  pages =        "276--276",
  month =        jun,
  year =         "1987",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Oct 06 17:31:18 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_30/Issue_03/",
  note =         "See \cite{Hunter:1985:ARK}.",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_30/Issue_03/tiff/276.tif",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Wortmann:1987:BRB,
  author =       "J. C. Wortmann",
  title =        "Book Review: {{\booktitle{Mr. Babbage's secret: The
                 tale of a Cypher --- and APL}}: Strandberg,
                 Birker{\o}d, (Denmark) 1984, 319 pages}",
  journal =      j-EUR-J-OPER-RES,
  volume =       "29",
  number =       "2",
  pages =        "216",
  month =        may,
  year =         "1987",
  CODEN =        "EJORDT",
  ISSN =         "0377-2217 (print), 1872-6860 (electronic)",
  ISSN-L =       "0377-2217",
  bibdate =      "Mon Jan 14 21:51:21 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0221787901184",
  acknowledgement = ack-nhfb,
  fjournal =     "European Journal of Operational Research",
}

@Article{Zorpette:1987:BEC,
  author =       "Glenn Zorpette",
  title =        "Breaking the enemy's code: {British} intelligence
                 deciphered {Germany}'s top-secret military
                 communications with {Colossus}, an early vacuum-tube
                 computer",
  journal =      j-IEEE-SPECTRUM,
  volume =       "24",
  number =       "9",
  pages =        "47--51",
  month =        sep,
  year =         "1987",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1987.6448935",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Allied cryptanalysis; British high-speed programmable
                 machine; cipher machines; Ciphers; codecs; Colossus;
                 Computers; cryptography; decoding; Educational
                 institutions; German Enigma encryption machine;
                 Heating; Rotors; Wheels; World War II",
}

@Article{Adams:1988:SRC,
  author =       "Carlisle M. Adams and Henk Meijer",
  booktitle =    "Advances in {cryptology---CRYPTO '87} (Santa Barbara,
                 {CA, 1987)}",
  title =        "Security-related comments regarding {McEliece}'s
                 public-key cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "293",
  pages =        "224--228",
  year =         "1988",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (94B05)",
  MRnumber =     "956 653",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Agnew:1988:RSC,
  author =       "G. B. Agnew",
  title =        "Random Sources for Cryptographic Systems",
  crossref =     "Chaum:1987:ACE",
  pages =        "77--81",
  year =         "1988",
  bibdate =      "Thu Feb 23 10:04:54 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
}

@Article{Alexi:1988:RRF,
  author =       "Werner Alexi and Benny Z. Chor and Oded Goldreich and
                 Claus-P. Schnorr",
  title =        "{RSA} and {Rabin} Functions: Certain Parts are as Hard
                 as the Whole",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "194--209",
  month =        apr,
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "11Y11 (11T71 11Y16 68P25 68Q15 94A60)",
  MRnumber =     "89j:11120",
  MRreviewer =   "Melvin M. Sweet",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  referencedin = "Referenced in \cite[Ref. 1]{Johnson:1996:AEE},
                 \cite[Ref. 1]{Kaliski:1995:SUR}.",
}

@Article{Anonymous:1988:BRCb,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Computer viruses --- a
                 secret threat}}: Rudiger Dierstein}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "215--215",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903537",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CCJb,
  author =       "Anonymous",
  title =        "Cryptography and cryptosystems. {January
                 1987--December 1987} (citations from the {INSPEC:
                 Information Services for the Physics and Engineering
                 Communities} database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "518--518",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902593",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:CCJc,
  author =       "Anonymous",
  title =        "Cryptography and cryptosystems. {January 1970--October
                 1987}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "519--519",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902738",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DEK,
  author =       "Anonymous",
  title =        "Data encryption is key to safe file transmission:
                 {{\em Lawrence E. Hughes}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "221--221",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903926",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DESa,
  author =       "Anonymous",
  title =        "{Data Encryption Standard. January 1975--January 1988
                 (citations from the INSPEC: Information Services for
                 the Physics and Engineering Communications Database)}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "511--511",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:DESb,
  author =       "Anonymous",
  title =        "Data encryption standard. {1975--January 1987}
                 (citations from the {INSPEC: Information Services for
                 the Physics and Engineering Communities} Database)",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "511--511",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:ERH,
  author =       "Anonymous",
  title =        "Errata: {Reviews: Hartree: Calculating Machines:
                 Recent and Prospective Developments and Their Impact on
                 Mathematical Physics and Calculating Instruments and
                 Machines, 10(1) 93}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "10",
  number =       "3",
  pages =        "234--234",
  month =        jul # "\slash " # sep,
  year =         "1988",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:13 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/annhistcomput.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Aspray:1988:RCD}.",
  URL =          "http://dlib.computer.org/an/books/an1988/pdf/a3234.pdf;
                 http://www.computer.org/annals/an1988/a3234abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Anonymous:1988:PED,
  author =       "Anonymous",
  title =        "Processing encrypted data: {Niv Ahituv, Yeheskel
                 Lapid, and Seev Neumann}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "103--103",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890524X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1988:RIA,
  author =       "Anonymous",
  title =        "Remote identification and authentication of computer
                 resource users: {{\em {Ken} Weiss}}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "2",
  pages =        "214--214",
  month =        apr,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:33 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888903495",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{ANSI:1988:FIE,
  author =       "{American National Standards Institute} and {American
                 Bankers Association.Secretariat}",
  title =        "Financial institution encryption of wholesale
                 financial messages: {X9}.23",
  publisher =    "American Bankers Association",
  address =      "Washington, DC, USA",
  pages =        "vii + 28",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "``ANSI X9.23-1988'' ``Approved May 16, l988''
                 ``Developed by the Accredited Standards Committee on
                 Financial Services, X9, operating under the procedures
                 of the American National Standards Institute.",
  keywords =     "Financial institutions --- Standards.",
}

@Article{Aspray:1988:RCD,
  author =       "William Aspray and Maurice V. Wilkes and Albert C.
                 Lewis and Greg Mellen and Harold Chucker and Robert V.
                 D. Campbell and Wendy Wilkins and G. J. Tee and Ernest
                 Braun and Arthur L. Norberg",
  title =        "Reviews: {Carpenter and Doran (eds.): A. M. Turing's
                 ACE Report of 1946 and Other Papers}; {Masani (ed.):
                 Norbert Wiener: Collected Works with Commentaries};
                 {Kozaczuk: Enigma: How the German Machine Cipher Was
                 Broken and How It Was Read by the Allies in World War
                 Two}; {Worthy: William C. Norris: Portrait of a
                 Maverick}; {Harvard Computation Laboratory: A Manual of
                 Operation for the Automatic Sequence Controlled
                 Calculator}; {Proceedings of a Symposium on Large-Scale
                 Digital Calculating Machinery}; {Gardner: The Mind's
                 New Science: A History of the Cognitive Revolution};
                 {Hartree: Calculating Machines: Recent and Prospective
                 Developments and Their Impact on Mathematical Physics
                 and Calculating Instruments and Machines}; {McLean and
                 Rowland: The Inmos Saga}; {Pennings and Buifendam
                 (eds.): New Technology as Organizational Innovation:
                 The Development and Diffusion of Microelectronics};
                 Other Literature",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "10",
  number =       "1",
  pages =        "80--97",
  month =        jan # "\slash " # mar,
  year =         "1988",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:12 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See minor erratum \cite{Anonymous:1988:ERH}: Hartree
                 as a mathematical physicist, not a physical chemist.",
  URL =          "http://dlib.computer.org/an/books/an1988/pdf/a1080.pdf;
                 http://www.computer.org/annals/an1988/a1080abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Bach:1988:HGF,
  author =       "Eric Bach",
  title =        "How to generate factored random numbers",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "179--193",
  month =        "????",
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "11Y16 (11Y11 68Q25)",
  MRnumber =     "89e:11082",
  MRreviewer =   "Claus-Peter Schnorr",
  bibdate =      "Thu Apr 09 08:30:16 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@InProceedings{Barker:1988:ECT,
  author =       "W. C. Barker and P. Cochrane and M. Branstad",
  title =        "Embedding cryptography into a {Trusted Mach} system",
  crossref =     "IEEE:1988:FAC",
  pages =        "379--383",
  year =         "1988",
  bibdate =      "Sun Sep 29 06:28:50 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/mach.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Trusted Inf. Syst. Inc., Glenwood, MD, USA",
  classification = "B6210L (Computer communications); B7930 (Military
                 communications); C5620 (Computer networks and
                 techniques); C6130 (Data handling techniques); C6150J
                 (Operating systems)",
  keywords =     "Embedded cryptorelated functions; Embedded network
                 security prototype; Embedding cryptography; Management
                 secure data network systems; Protocols; TCP/IP; TIS
                 prototype; Transport control protocol/internet
                 protocol; Trusted Information Systems; Trusted Mach
                 operating system; Unclassified cryptography",
  thesaurus =    "Computer networks; Cryptography; Data communication
                 systems; Network operating systems; Protocols",
}

@Book{Beckett:1988:IC,
  author =       "Brian Beckett",
  title =        "Introduction to cryptology",
  publisher =    pub-BLACKWELL-SCI,
  address =      pub-BLACKWELL-SCI:adr,
  pages =        "xiv + 344",
  year =         "1988",
  ISBN =         "0-632-01836-4 (paperback), 0-632-02243-4 (hardcover)",
  ISBN-13 =      "978-0-632-01836-9 (paperback), 978-0-632-02243-4
                 (hardcover)",
  LCCN =         "QA76.9.A25 B431 1988",
  bibdate =      "Thu Apr 29 18:01:20 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Beckett:1997:ICP}.",
  price =        "UK\pounds14.95 (paperback), UK\pounds35.00
                 (hardcover)",
  series =       "Professional and industrial computing series",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; data protection",
}

@InProceedings{Ben-Or:1988:CTN,
  author =       "M. Ben-Or and S. Goldwasser and A. Wigderson",
  title =        "Completeness Theorems for Noncryptographic
                 Fault-Tolerant Distributed Computations",
  crossref =     "ACM:1988:PTA",
  pages =        "1--10",
  year =         "1988",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 2]{Canetti:1997:PSL}.",
}

@InProceedings{Ben-Or:1988:MIP,
  author =       "M. Ben-Or and S. Goldwasser and J. Kilian and A.
                 Wigderson",
  title =        "Multi-Prover Interactive Proofs: How to Remove
                 Intractability",
  crossref =     "ACM:1988:PTA",
  pages =        "113--131",
  year =         "1988",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 5]{Goldreich:1997:FMCb}.",
}

@Article{Bennett:1988:AEA,
  author =       "John Bennett",
  title =        "Analysis of the encryption algorithm used in the
                 {WordPerfect} word processing program",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "105--105",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "chttps://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905366",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bennett:1988:PAP,
  author =       "Charles H. Bennett and Gilles Brassard and Jean-Marc
                 Robert",
  title =        "Privacy amplification by public discussion",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "210--229",
  month =        "????",
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "94A40 (94A13 94A60)",
  MRnumber =     "89c:94028",
  MRreviewer =   "Thomas Beth",
  bibdate =      "Thu Apr 09 08:30:16 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Betts:1988:ESG,
  author =       "Mitch Betts",
  title =        "Encryption standard to get reprieve",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "106--106",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905470",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@TechReport{Bishop:1988:AFDa,
  author =       "Matt Bishop",
  title =        "An application of a fast {Data Encryption Standard}
                 implementation",
  type =         "Technical report",
  number =       "PCS-TR 88-138",
  institution =  "Department of Mathematics and Computer Science,
                 Dartmouth College",
  address =      "Hanover, NH, USA",
  pages =        "25",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computer science.",
}

@InProceedings{Bishop:1988:AFDb,
  author =       "Matt Bishop",
  title =        "An Application of a Fast Data Encryption Standard
                 Implementation",
  crossref =     "USENIX:1988:CSSb",
  volume =       "1",
  number =       "3",
  pages =        "221--254",
  month =        "Summer",
  year =         "1988",
  bibdate =      "Fri Oct 18 07:24:24 MDT 1996",
  bibsource =    "ftp://ftp.uu.net/library/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Dartmouth College",
}

@Article{Bishop:1988:AFDc,
  author =       "Matt Bishop",
  title =        "An Application of a Fast {Data Encryption Standard}
                 Implementation",
  journal =      j-COMP-SYS,
  volume =       "1",
  number =       "3",
  pages =        "221--254",
  month =        "Summer",
  year =         "1988",
  CODEN =        "CMSYE2",
  ISSN =         "0895-6340",
  bibdate =      "Fri Sep 13 09:01:18 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsys.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Dartmouth Coll., NH, USA",
  classification = "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  fjournal =     "Computing Systems",
  keywords =     "Fast Data Encryption Standard implementation;
                 Security; UNIX password encryption",
  thesaurus =    "Cryptography; Standards; Unix",
}

@TechReport{Bishop:1988:FEP,
  author =       "Matt Bishop",
  title =        "The fast encryption package",
  institution =  "Research Institute for Advanced Computer Science",
  address =      "Moffett Field, CA, USA",
  pages =        "various",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "RIACS memorandum 88.3, NASA contractor report NASA
                 CR-185397",
  acknowledgement = ack-nhfb,
  annote =       "Distributed to depository libraries in microfiche.
                 Microfiche. [Washington, DC?: National Aeronautics and
                 Space Administration], 1989. 1 microfiche.",
  govtdocnumber = "NAS 1.26:185397 830-H-14 (MF)",
  keywords =     "Computers --- Access control --- Passwords.",
}

@Article{Bishop:COMPSYS-1-3-221,
  author =       "Matt Bishop",
  title =        "An Application of a Fast Data Encryption Standard
                 Implementation",
  journal =      j-COMP-SYS,
  volume =       "1",
  number =       "3",
  pages =        "221--254",
  month =        "Summer",
  year =         "1988",
  CODEN =        "CMSYE2",
  ISSN =         "0895-6340",
  bibdate =      "Fri Sep 13 09:01:18 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Dartmouth Coll., NH, USA",
  classification = "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  fjournal =     "Computing Systems",
  keywords =     "Fast Data Encryption Standard implementation;
                 Security; UNIX password encryption",
  thesaurus =    "Cryptography; Standards; Unix",
}

@Article{Blakley:1988:CBA,
  author =       "G. R. Blakley and William Rundell",
  booktitle =    "Advances in {cryptology---CRYPTO '87} (Santa Barbara,
                 {CA, 1987)}",
  title =        "Cryptosystems based on an analog of heat flow",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "293",
  pages =        "306--329",
  year =         "1988",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (35K70 35R25 35R30 68P25)",
  MRnumber =     "89i:94028",
  MRreviewer =   "Gottfried Anger",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Blum:1988:NIZ,
  author =       "Manuel Blum and Paul Feldman and Silvio Micali",
  title =        "Non-interactive zero-knowledge and its applications",
  crossref =     "ACM:1988:PTA",
  pages =        "103--112",
  year =         "1988",
  DOI =          "https://doi.org/10.1145/62212.62222",
  bibdate =      "Sun Mar 11 11:08:22 2012",
  bibdate =      "Wed Feb 20 18:33:47 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/stoc1980.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/62212/p103-blum/p103-blum.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/62212/p103-blum/",
  acknowledgement = ack-nhfb,
}

@Book{Boyd:1988:CCB,
  author =       "Waldo T. Boyd",
  title =        "Computer cryptology: beyond decoder rings",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "xv + 268",
  year =         "1988",
  ISBN =         "0-13-166133-7 (paperback)",
  ISBN-13 =      "978-0-13-166133-2 (paperback)",
  LCCN =         "Z103 .B65 1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$21.95",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers --- Data processing; ciphers --- data
                 processing; cryptography --- data processing;
                 Cryptography --- Data processing; Data processing ---
                 Applications of cryptology",
}

@Book{Brassard:1988:MCT,
  author =       "Gilles Brassard",
  title =        "Modern cryptology: a tutorial",
  volume =       "325",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "vi + 107",
  year =         "1988",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "0-387-96842-3",
  ISBN-13 =      "978-0-387-96842-1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "Z103 .B721 1988",
  bibdate =      "Wed Feb 14 06:00:56 MST 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t0325.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=325",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control; cryptography; data
                 transmission systems --- security measures",
}

@InCollection{Brickell:1988:CKC,
  author =       "Ernest F. Brickell",
  booktitle =    "Applications of discrete mathematics (Clemson, {SC,
                 1986)}",
  title =        "The cryptanalysis of knapsack cryptosystems",
  publisher =    pub-SIAM,
  address =      pub-SIAM:adr,
  pages =        "3--23",
  year =         "1988",
  MRclass =      "94A60 (11T71 90C09)",
  MRnumber =     "90f:94026",
  MRreviewer =   "Harald Niederreiter",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Brickell:1988:CSR,
  author =       "Ernest F. Brickell and Andrew M. Odlyzko",
  title =        "Cryptanalysis: a Survey of Recent Results",
  journal =      j-PROC-IEEE,
  volume =       "76",
  number =       "5",
  pages =        "578--593",
  month =        may,
  year =         "1988",
  CODEN =        "IEEPAD",
  DOI =          "https://doi.org/10.1109/5.4443",
  ISSN =         "0018-9219 (print), 1558-2256 (electronic)",
  ISSN-L =       "0018-9219",
  bibdate =      "Sun Mar 11 10:50:52 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "In spite of the progress in computational complexity,
                 it is still true that cryptosystems are tested by
                 subjecting them to cryptanalytic attacks by experts.
                 Most of the cryptosystems that have been publicly
                 proposed in the last decade have been broken. This
                 paper outlines a selection of the attacks that have
                 been used and explains some of the basic tools
                 available to cryptanalyst. Attacks on knapsack
                 cryptosystems, congruential generators, and a variety
                 of two key secrecy and signature schemes are discussed.
                 There is also a brief discussion of the status of the
                 security of cryptosystems for which there is no known
                 feasible attack, such as the RSA, discrete
                 exponentiation, and DES cryptosystems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the IEEE",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5",
  keywords =     "code breaking; congruential generators; cryptanalytic
                 attacks; cryptosystem testing; data security; DES
                 system; discrete exponentiation; knapsack
                 cryptosystems; RSA system; signature schemes; two key
                 secrecy scheme",
}

@Article{Buchholz:1988:CQDc,
  author =       "Werner Buchholz and Maurice V. Wilkes and Alfred W.
                 {Van Sinderen} and C. J. {Fern, Jr.} and W. L. van der
                 Poel",
  title =        "Comments, Queries, and Debate: {Babbage} and the
                 {Colossus}; {Babbage} and {Bowditch}; {Two Early
                 European Computers}; {Early Dutch Computer}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "10",
  number =       "3",
  pages =        "218--221",
  month =        jul # "\slash " # sep,
  year =         "1988",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:13 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1988/pdf/a3218.pdf;
                 http://www.computer.org/annals/an1988/a3218abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Burnham:1988:DES,
  author =       "B. Burnham",
  title =        "{DES} (Data Encryption Standard) cryptographic
                 services designed for the {DOE} wide band
                 communications network",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "510--510",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890212X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@MastersThesis{Cammack:1988:MDE,
  author =       "William Ervin Cammack",
  title =        "Methods of data encryption and a random polygraphic
                 cipher algorithm for {ASCII} files",
  type =         "Thesis",
  school =       "University of Southern Mississippi",
  address =      "Hattiesburg, MS, USA",
  pages =        "vi + 108",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Data protection --- Computer programs; Machine ciphers
                 --- Design and construction.",
}

@Article{Carroll:1988:ACP,
  author =       "John M. Carroll and Lynda Robbins",
  title =        "The automated cryptananysis of polyalphabetic
                 ciphers",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "104--104",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905354",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@TechReport{Carroll:1988:CC,
  author =       "John M. Carroll and Lynda E. Robbins",
  title =        "Computer cryptanalysis",
  type =         "Report",
  number =       "223",
  institution =  "Department of Computer Science, University of Western
                 Ontario",
  address =      "London, UK",
  pages =        "55",
  year =         "1988",
  ISBN =         "0-7714-1070-0",
  ISBN-13 =      "978-0-7714-1070-3",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InCollection{Chan:1988:IEC,
  author =       "Yeng Kit Chan and Rudolf Lidl",
  booktitle =    "Contributions to general algebra, 6",
  title =        "On implementing elliptic curve cryptosystems",
  publisher =    "H{\"o}lder-Pichler-Tempsky",
  address =      "Vienna",
  pages =        "155--166",
  year =         "1988",
  MRclass =      "94A60 (11T71 14G15)",
  MRnumber =     "91k:94027",
  MRreviewer =   "Kaisa Nyberg",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@InProceedings{Chaum:1988:MUS,
  author =       "D. Chaum and C. Crepeau and I. Damg{\aa}rd",
  title =        "Multiparty Unconditionally Secure Protocols",
  crossref =     "ACM:1988:PTA",
  pages =        "11--19",
  year =         "1988",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Canetti:1997:PSL}.",
}

@Article{Chor:1988:KTP,
  author =       "Benny Chor and Ronald L. Rivest",
  title =        "A knapsack-type public key cryptosystem based on
                 arithmetic in finite fields",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-34",
  number =       "5, part 1",
  pages =        "901--909",
  year =         "1988",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/18.21214",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "89k:94043",
  MRreviewer =   "Min Qiang Huang",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Chor:1988:UBS,
  author =       "Benny Chor and Oded Goldreich",
  title =        "Unbiased bits from sources of weak randomness and
                 probabilistic communication complexity",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "230--261",
  month =        "????",
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68Q25",
  MRnumber =     "89e:68044",
  MRreviewer =   "Claus-Peter Schnorr",
  bibdate =      "Thu Apr 09 08:30:16 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Book{Christoffersson:1988:CUH,
  author =       "Per Christoffersson and Viiveke Fak",
  title =        "Crypto users' handbook: a guide for implementors of
                 cryptographic protection in computer systems",
  publisher =    pub-ELSEVIER,
  address =      pub-ELSEVIER:adr,
  pages =        "vii + 93",
  year =         "1988",
  ISBN =         "0-444-70484-1",
  ISBN-13 =      "978-0-444-70484-9",
  LCCN =         "QA76.9.A25 C821 1988",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography",
}

@Article{Christoffersson:1988:MAE,
  author =       "Per Christoffersson",
  title =        "Message authentication and encryption combined",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "65--71",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888905056",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Deavours:1988:BPS,
  author =       "Cipher A. Deavours",
  title =        "Breakthrough '32: the {Polish} solution of the
                 Enigma",
  volume =       "51",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "v + 85",
  year =         "1988",
  ISBN =         "0-89412-152-9 (paperback)",
  ISBN-13 =      "978-0-89412-152-4 (paperback)",
  LCCN =         "????",
  bibdate =      "Mon Nov 23 12:36:43 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "BASIC (Computer program language); Cryptography --
                 Data processing.; Machine ciphers -- Data processing.",
}

@MastersThesis{Demirdogen:1988:FDM,
  author =       "A. Caner Demirdogen",
  title =        "Flaw detection methods based on digital signature
                 analysis for rotating machinery quality control",
  type =         "Thesis ({M.S.})",
  school =       "Tennessee Technological University",
  address =      "Cookeville, TN, USA",
  pages =        "xii + 189",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Machinery --- Quality control; Mechanics, Analytic;
                 Vibration",
}

@Article{denBoer:1988:CF,
  author =       "Bert den Boer",
  booktitle =    "Advances in {cryptology---EUROCRYPT '88} (Davos,
                 1988)",
  title =        "Cryptanalysis of {F.E.A.L}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "330",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "293--299",
  year =         "1988",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "90f:94025",
  MRreviewer =   "Shimshon Berkovits",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Desmedt:1988:SGC,
  author =       "Y. Desmedt",
  title =        "Society and group-oriented cryptography: a new
                 concept",
  crossref =     "Pomerance:1988:ACC",
  pages =        "120--127",
  year =         "1988",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 8]{Gemmell:1997:ITC}.",
}

@MastersThesis{Dieringer:1988:TAE,
  author =       "Jeffrey A. Dieringer",
  title =        "Tools for analog encryption",
  type =         "Thesis ({M.S. in Computer Science})",
  school =       "University of Wisconsin-Milwaukee",
  address =      "Milwaukee, WI, USA",
  pages =        "vi + 93",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Bibliography: leaf 34.",
  keywords =     "Computers --- Access control; Cryptography.",
}

@Article{Diffie:1988:FTY,
  author =       "Whitfield Diffie",
  title =        "The First Ten Years of Public-Key Cryptography",
  journal =      j-PROC-IEEE,
  volume =       "76",
  pages =        "560--576",
  year =         "1988",
  CODEN =        "IEEPAD",
  ISSN =         "0018-9219",
  ISSN-L =       "0018-9219",
  bibdate =      "Thu Jan 21 14:30:23 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Garfinkel \cite[378]{Garfinkel:1995:PPGa} calls this a
                 ``tour-de-force history of public key cryptography,
                 with revealing commentaries''.",
  fjournal =     "Proceedings of the IEEE",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5",
}

@MastersThesis{Falk:1988:DST,
  author =       "Adam Falk",
  title =        "{DBMS} security through encryption",
  type =         "Thesis ({M.S.})",
  school =       "San Francisco State University",
  address =      "San Francisco, CA, USA",
  pages =        "xii + 295",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Data base management.",
}

@Article{Frieze:1988:RTI,
  author =       "Alan M. Frieze and Johan H{\aa}stad and Ravi Kannan
                 and Jeffrey C. Lagarias and Adi Shamir",
  title =        "Reconstructing truncated integer variables satisfying
                 linear congruences",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "262--280",
  month =        "????",
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "11Y16 (11T71 94A60)",
  MRnumber =     "89d:11115",
  MRreviewer =   "Harald Niederreiter",
  bibdate =      "Thu Apr 09 08:30:16 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Gaglione:1988:ITP,
  author =       "A. M. Gaglione",
  title =        "Information theory and public key cryptosystems",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "511--511",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gaglione:1988:SCT,
  author =       "A. M. Gaglione",
  title =        "Some complexity theory for cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "519--519",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902714",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@MastersThesis{Gamble:1988:IDL,
  author =       "Robert Oscar Gamble",
  title =        "Investigation of discrete logarithmic encryption
                 algorithms",
  type =         "Thesis ({M.S.})",
  school =       "University of South Carolina",
  address =      "Columbia, SC, USA",
  pages =        "ii + 50",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Algorithms.",
}

@InProceedings{Girault:1988:GBA,
  author =       "Marc Girault and Robert Cohen and Mireille Campana",
  title =        "A generalized birthday attack",
  crossref =     "Gunther:1988:ACE",
  pages =        "129--156",
  year =         "1988",
  MRclass =      "94A60",
  MRnumber =     "90f:94029",
  MRreviewer =   "Shimshon Berkovits",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Goldwasser:1988:DSS,
  author =       "Shafi Goldwasser and Silvio Micali and Ronald L.
                 Rivest",
  title =        "A Digital Signature Scheme Secure Against Adaptive
                 Chosen-Message Attacks",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "281--308",
  month =        apr,
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "89e:94009",
  MRreviewer =   "Harald Niederreiter",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  referencedin = "Referenced in \cite[Ref. 20]{Goldreich:1997:FMCb}.",
}

@Article{Grollmann:1988:CMP,
  author =       "Joachim Grollmann and Alan L. Selman",
  title =        "Complexity measures for public-key cryptosystems",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "309--335",
  month =        "????",
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68Q15 (11T71 68P25 94A60)",
  MRnumber =     "89h:68050",
  MRreviewer =   "J. C. Lagarias",
  bibdate =      "Thu Apr 09 08:30:16 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@InProceedings{Gunther:1988:ASG,
  author =       "C. Gunther",
  title =        "Alternating Step Generators Controlled by {de Bruijn}
                 Sequences",
  crossref =     "Chaum:1988:ACE",
  pages =        "5--14",
  year =         "1988",
  bibdate =      "Mon Nov 30 09:01:14 1998",
  bibsource =    "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Haastad:1988:SSM,
  author =       "Johan H{\aa}stad",
  title =        "Solving simultaneous modular equations of low degree",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "336--341",
  month =        apr,
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68Q25 (11T71 11Y16 68P25 94A60)",
  MRnumber =     "89e:68049",
  MRreviewer =   "Eric Bach",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  referencedin = "Referenced in \cite[Ref. 6]{Johnson:1996:AEE},
                 \cite[Ref. 12]{Kaliski:1995:SUR}.",
}

@Article{He:1988:SDK,
  author =       "Jing Min He and Kai Cheng Lu",
  title =        "The security and design of knapsack public key
                 cryptosystems",
  journal =      "J. Tsinghua Univ.",
  volume =       "28",
  number =       "1",
  pages =        "89--97",
  year =         "1988",
  CODEN =        "QDXKE8",
  ISSN =         "1000-0054",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "89m:94011",
  MRreviewer =   "Zhao Zhi Zhang",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Journal of Tsinghua University. Science and
                 Technology. Qinghua Daxue Xuebao. Ziran Kexue Ban",
}

@Article{Highland:1988:EAE,
  author =       "Harold Joseph Highland",
  title =        "Encryption, attacks and ethics",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "5--6",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904890",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:PEM,
  author =       "Esther H. Highland",
  title =        "Picking encryption method is no time for secrets:
                 {Harold Joseph Highland, Government Computer News,
                 April 29, 1988, p. 39}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "431--431",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906360",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:RRC,
  author =       "Esther H. Highland",
  title =        "A redundancy reducing cipher: {Peter Wayner,
                 Cryptologia, April 1988, pp. 107--112}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "431--432",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906414",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:SIT,
  author =       "Harold Joseph Highland",
  title =        "Secretdisk {II} --- transparent automatic encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "27--34",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888904981",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:TSC,
  author =       "Esther H. Highland",
  title =        "Top secret --- Concepts and implementation",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "329--329",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888901034",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1988:TSV,
  author =       "Esther H. Highland",
  title =        "Top secret, and vulnerable: {John Markoff, The New
                 York Times, April 25, 1988, pp. D1, D4}",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "4",
  pages =        "430--430",
  month =        aug,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888906311",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hogan:1988:PIS,
  author =       "Carole B. Hogan",
  title =        "Protection imperfect: the security of some computing
                 environments",
  journal =      j-OPER-SYS-REV,
  volume =       "22",
  number =       "3",
  pages =        "7--27",
  month =        jul,
  year =         "1988",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:46 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See note \cite{Wells:1988:NAI}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Huang:1988:APE,
  author =       "Min Qiang Huang",
  title =        "An attack to {Pless}' encryption scheme",
  journal =      "Kexue Tongbao (English Ed.)",
  volume =       "33",
  number =       "11",
  pages =        "885--889",
  year =         "1988",
  ISSN =         "0250-7862",
  MRclass =      "94A60",
  MRnumber =     "89k:94045",
  MRreviewer =   "Zhao Zhi Zhang",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Chinese Academy of Science. Kexue Tongbao (Science
                 Bulletin). A Monthly Journal of Science. English
                 Edition",
}

@Article{Huang:1988:SWP,
  author =       "Yue Jiang Huang and Fred Cohen",
  title =        "Some weak points of one fast cryptographic checksum
                 algorithm and its improvement",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "503--505",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InCollection{Hule:1988:RCW,
  author =       "Harald Hule and Winfried B. M{\"u}ller",
  booktitle =    "Contributions to general algebra, 6",
  title =        "On the {RSA}-cryptosystem with wrong keys",
  publisher =    "H{\"o}lder-Pichler-Tempsky",
  address =      "Vienna",
  pages =        "103--109",
  year =         "1988",
  MRclass =      "94A60",
  MRnumber =     "91h:94026",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Huthnance:1988:UPP,
  author =       "E. Dennis Huthnance and Joe Warndof",
  title =        "On using primes for public key encryption systems",
  journal =      j-APPL-MATH-LETT,
  volume =       "1",
  number =       "3",
  pages =        "225--227",
  year =         "1988",
  CODEN =        "AMLEEL",
  ISSN =         "0893-9659",
  ISSN-L =       "0893-9659",
  MRclass =      "94A60 (11T71 68P25)",
  MRnumber =     "89k:94046",
  MRreviewer =   "Eric Bach",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics Letters. An International Journal
                 of Rapid Publication",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08939659",
}

@TechReport{IRD:1988:DTV,
  author =       "{International Resource Development, Inc.}",
  title =        "Data, text and voice encryption worldwide markets",
  type =         "Report",
  number =       "754",
  institution =  "International Resource Development",
  address =      "New Canaan, Conn., U.S.A. (21 Locust Ave., New Canaan
                 06840)",
  pages =        "viii + 285",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "``December 1988.''",
  keywords =     "Cryptography equipment industry; Market surveys.",
}

@Periodical{JCryptology:1988:JCJ,
  key =          "Journal of cryptology",
  title =        "Journal of cryptology: the journal of the
                 {International Association for Cryptologic Research}",
  publisher =    "Springer International",
  address =      "New York, NY, USA",
  pages =        "various",
  year =         "1988",
  CODEN =        "JOCREQ",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Appears three times a year.",
  URL =          "http://link.springer.de/link/service/journals/00145/index.htm",
  acknowledgement = ack-nhfb,
  alttitle =     "Journal of cryptology",
  keywords =     "Cryptography --- Periodicals.",
}

@Article{Jung:1988:IRC,
  author =       "A. Jung",
  title =        "Implementing the {RSA} cryptosystem",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "510--511",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kannan:1988:PFN,
  author =       "R. Kannan and A. K. Lenstra and L. Lov{\'a}sz",
  title =        "Polynomial factorization and nonrandomness of bits of
                 algebraic and some transcendental numbers",
  journal =      j-MATH-COMPUT,
  volume =       "50",
  number =       "181",
  pages =        "235--250",
  month =        jan,
  year =         "1988",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  MRclass =      "68Q20 (11A51 11A63 11J99 11Y16 68Q25)",
  MRnumber =     "89j:68061",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcomp1980.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "B0210 (Algebra); B0250 (Combinatorial mathematics);
                 B6120B (Codes); C1110 (Algebra); C1160 (Combinatorial
                 mathematics); C1260 (Information theory); C4240
                 (Programming and algorithm theory)",
  corpsource =   "Dept. of Comput. Sci., Carnegie-Mellon Univ.,
                 Pittsburg, PA, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "algebraic numbers; binary expansions; computational
                 complexity; cryptography; nonrandomness; number theory;
                 polynomial factorisation; polynomial time algorithms;
                 polynomials; random number generation; secure
                 pseudorandom sequences; transcendental numbers",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Karp:1988:SDN,
  author =       "Bennett C. Karp and L. Kirk Barker and Larry D.
                 Nelson",
  title =        "The {Secure Data Network System}",
  journal =      j-ATT-TECH-J,
  volume =       "67",
  number =       "3",
  pages =        "19--27",
  month =        may,
  year =         "1988",
  CODEN =        "ATJOEM",
  ISSN =         "2376-676X (print), 8756-2324 (electronic)",
  ISSN-L =       "8756-2324",
  bibdate =      "Fri Nov 12 13:09:16 2010",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/bstj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Providing security for data communications is quite
                 complex, especially in contrast to traditional security
                 systems for voice communications. The Secure Data
                 Network Systems (SDNS), a joint program of the U. S.
                 government and telecommunications and computer industry
                 representatives, is developing security standards for
                 data networking. The SDNS program is incorporating
                 security into the Open Systems Interconnection (OSI)
                 framework to ensure interoperability and compatibility
                 of equipment and services. SDNS functionality will be
                 built into or added onto communications equipment such
                 as personal computers, workstations, and host
                 computers, and will provide security services such as
                 confidentiality, integrity, authentication, access
                 control, and sender nonrepudiation. Both real-time and
                 store-and-forward communications will be supported.",
  acknowledgement = ack-nhfb,
  fjournal =     "AT\&T Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  keywords =     "computer networks; data communication systems;
                 security of data; standards",
  subject =      "access control; data networking; Open Systems
                 Interconnection (OSI); Secure Data Network System
                 (SDNS); security services; security standards",
  topic =        "data processing",
}

@TechReport{Kemp:1988:EEF,
  author =       "Elizabeth A. Kemp",
  title =        "Encryption in electronic funds transfer applications",
  type =         "Massey computer science report",
  number =       "88/2",
  institution =  "Computer Science Department, Massey University",
  address =      "Palmerston North, NZ",
  pages =        "16",
  month =        dec,
  year =         "1988",
  ISSN =         "0112-630X",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "To protect the data sent through financial networks,
                 encryption and message authentication are essential.
                 Both the PIN and the transaction details are at risk in
                 ATM and EFTPOS systems. The Data Encryption Algorithm
                 can be used to encrypt PINs and generate a message
                 authentication code that can be verified by the
                 receiving party. Since the same key is required for
                 both encryption and decryption, there is the problem of
                 distributing it safely to both ends of the
                 communication line. This difficulty can be resolved
                 either by using public key cryptography or by
                 implementing the Transaction Key scheme proposed in
                 Australia.",
  acknowledgement = ack-nhfb,
  keywords =     "Automated tellers; Electronic data processing
                 departments --- Security measures; Identification
                 numbers, Personal.",
}

@InProceedings{Kilian:1988:FCO,
  author =       "Joe Kilian",
  title =        "Founding cryptography on oblivious transfer",
  crossref =     "ACM:1988:PTA",
  pages =        "20--31",
  year =         "1988",
  bibdate =      "Wed Feb 20 18:33:47 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/62212/p20-kilian/p20-kilian.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/62212/p20-kilian/",
  acknowledgement = ack-nhfb,
}

@Article{Kurosawa:1988:CSP,
  author =       "K. Kurosawa and K. Matsu",
  title =        "Cryptographically secure pseudorandom sequence
                 generator based on reciprocal number cryptosystem",
  journal =      j-ELECT-LETTERS,
  volume =       "24",
  number =       "1",
  pages =        "16--17",
  day =          "7",
  month =        jan,
  year =         "1988",
  CODEN =        "ELLEAK",
  DOI =          "https://doi.org/10.1049/el:19880011",
  ISSN =         "0013-5194 (print), 1350-911X (electronic)",
  ISSN-L =       "0013-5194",
  bibdate =      "Fri Dec 30 16:39:46 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8134",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220",
  fjournal =     "Electronics Letters",
}

@Article{Lagarias:1988:UEP,
  author =       "Jeffrey C. Lagarias and James A. Reeds",
  title =        "Unique extrapolation of polynomial recurrences",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "342--362",
  month =        "????",
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "11B37 (11T71 11Y16 94A60)",
  MRnumber =     "89c:11025",
  MRreviewer =   "Harald Niederreiter",
  bibdate =      "Thu Apr 09 08:30:16 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Lee:1988:OSM,
  author =       "P. J. Lee and E. F. Brickell",
  booktitle =    "Advances in {cryptology---EUROCRYPT '88} (Davos,
                 1988)",
  title =        "An observation on the security of {McEliece}'s
                 public-key cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "330",
  pages =        "275--280",
  year =         "1988",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94B05 (94A60)",
  MRnumber =     "994 669",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lioen:1988:OMA,
  author =       "W. Lioen and H. {te Riele} and D. Winter",
  title =        "Optimization of the {MPQS-factoring} algorithm on the
                 {Cyber 205} and the {NEC SX-2}",
  journal =      j-SUPERCOMPUTER,
  volume =       "5",
  number =       "4",
  pages =        "42--50",
  month =        jul,
  year =         "1988",
  CODEN =        "SPCOEL",
  ISSN =         "0168-7875",
  bibdate =      "Wed Mar 18 08:37:01 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/supercom.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Centre for Math. and Comput. Sci., Amsterdam,
                 Netherlands",
  classification = "C1180 (Optimisation techniques)",
  corpsource =   "Centre for Math. and Comput. Sci., Amsterdam,
                 Netherlands",
  fjournal =     "Supercomputer",
  keywords =     "CDC Cyber 205; cryptography; FORTRAN listings; large
                 integer factorisation; MPQS-factoring algorithm;
                 multiple polynomial version; NEC SX-2; optimisation;
                 parallel algorithms; quadratic sieve algorithm",
  pubcountry =   "Netherlands",
  treatment =    "P Practical",
}

@Article{Lioen:1988:OMF,
  author =       "W. Lioen and H. {te Riele} and D. Winter",
  title =        "Optimization of the {MPQS-factoring} algorithm on the
                 {Cyber 205} and the {NEC SX-2}",
  journal =      j-SUPERCOMPUTER,
  volume =       "5",
  number =       "4",
  pages =        "42--50",
  month =        jul,
  year =         "1988",
  CODEN =        "SPCOEL",
  ISSN =         "0168-7875",
  bibdate =      "Wed Mar 18 08:37:01 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/fortran2.bib;
                 https://www.math.utah.edu/pub/tex/bib/supercom.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Centre for Math. and Comput. Sci., Amsterdam,
                 Netherlands",
  classification = "C1180 (Optimisation techniques)",
  corpsource =   "Centre for Math. and Comput. Sci., Amsterdam,
                 Netherlands",
  fjournal =     "Supercomputer",
  keywords =     "CDC Cyber 205; cryptography; FORTRAN listings; large
                 integer factorisation; MPQS-factoring algorithm;
                 multiple polynomial version; NEC SX-2; optimisation;
                 parallel algorithms; quadratic sieve algorithm",
  pubcountry =   "Netherlands",
  treatment =    "P Practical",
}

@Article{Long:1988:DLH,
  author =       "Douglas L. Long and Avi Wigderson",
  title =        "The discrete logarithm hides $ {O}({\rm log} \, n) $
                 bits",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "363--372",
  month =        "????",
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68P25 (68Q30)",
  MRnumber =     "89e:68026",
  MRreviewer =   "Evangelos Kranakis",
  bibdate =      "Thu Apr 09 08:30:16 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Luby:1988:HCP,
  author =       "Michael Luby and Charles Rackoff",
  title =        "How to construct pseudorandom permutations from
                 pseudorandom functions",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "373--386",
  month =        "????",
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68P25 (65C10 68Q15 68Q25 94A60)",
  MRnumber =     "89i:68025",
  bibdate =      "Thu Apr 09 08:30:16 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@InProceedings{Matsumoto:1988:PQP,
  author =       "Tsutomu Matsumoto and Hideki Imai",
  title =        "Public quadratic polynomial-tuples for efficient
                 signature-verification and message encryption",
  crossref =     "Gunther:1988:ACE",
  pages =        "419--453",
  year =         "1988",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "90d:94008",
  MRreviewer =   "Harriet Fell",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Congresses;
                 Cryptography --- Congresses.",
}

@InProceedings{Merkle:1988:DSB,
  author =       "Ralph C. Merkle",
  editor =       "Carl Pomerance",
  booktitle =    "Advances in Cryptology --- {CRYPTO '87}",
  title =        "A Digital Signature Based on a Conventional Encryption
                 Function",
  volume =       "293",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "369--378",
  year =         "1988",
  DOI =          "https://doi.org/10.1007/3-540-48184-2_32",
  ISBN =         "3-540-48184-2",
  ISBN-13 =      "978-3-540-48184-3",
  bibdate =      "Tue Jan 23 11:16:45 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       ser-LNCS,
  abstract =     "A new digital signature based only on a conventional
                 encryption function (such as DES) is described which is
                 as secure as the underlying encryption function --- the
                 security does not depend on the difficulty of factoring
                 and the high computational costs of modular arithmetic
                 are avoided. The signature system can sign an unlimited
                 number of messages, and the signature size increases
                 logarithmically as a function of the number of messages
                 signed. Signature size in a `typical' system might
                 range from a few hundred bytes to a few kilobytes, and
                 generation of a signature might require a few hundred
                 to a few thousand computations of the underlying
                 conventional encryption function.",
  acknowledgement = ack-nhfb,
}

@Article{Micali:1988:NSP,
  author =       "Silvio Micali and Charles Rackoff and Bob Sloan",
  title =        "The notion of security for probabilistic
                 cryptosystems",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "412--426",
  month =        "????",
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "94A60 (68P25 68Q99)",
  MRnumber =     "89k:94051",
  MRreviewer =   "Do Long Van",
  bibdate =      "Thu Apr 09 08:30:16 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Michener:1988:TSK,
  author =       "John R. Michener",
  title =        "A tool for secret key cryptography",
  journal =      j-DDJ,
  volume =       "13",
  number =       "8",
  pages =        "50--52, 55, 96",
  month =        aug,
  year =         "1988",
  CODEN =        "DDJOEB",
  ISSN =         "0888-3076",
  bibdate =      "Tue Sep 10 09:30:19 MDT 1996",
  bibsource =    "http://www.ddj.com/index/author/index.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
  acknowledgement = ack-nhfb,
  classification = "C0310D (Installation management); C6110 (Systems
                 analysis and programming); C6130 (Data handling
                 techniques)",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  keywords =     "C program; Commercial software packages;
                 Cryptanalysis; Cryptographic algorithm; Cryptographic
                 secret key system; Data compaction; Generalized rotor
                 operator technique; Proprietary algorithms; Secret key
                 cryptographic systems; Sophisticated statistical
                 tools",
  thesaurus =    "C listings; Cryptography; Data handling; DP
                 management; Programming",
}

@TechReport{Morain:1988:IGP,
  author =       "F. Morain",
  title =        "Implementation of the {Goldwasser-Killian-Atkin}
                 Primality Testing Algorithm",
  institution =  "Institut de la Recherche en Informatique et
                 Automatique, now Institut National de Recherche en
                 Informatique et Automatique (INRIA)",
  address =      "Domaine de Voluceau, Rocquencourt, B.P. 105, 78153 Le
                 Chesnay Cedex, France",
  pages =        "??",
  year =         "1988",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Project ALGO, INRIA.",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 8]{Silverman:1997:FGR}.",
}

@Article{Muftic:1988:SMC,
  author =       "Sead Muftic",
  title =        "Security Mechanisms for Computer Networks. Current
                 Results of the {CEC COST-11 ter} Project",
  journal =      j-COMP-NET-ISDN,
  volume =       "15",
  number =       "1",
  pages =        "67--71",
  year =         "1988",
  CODEN =        "CNISE9",
  ISSN =         "0169-7552",
  ISSN-L =       "0169-7552",
  bibdate =      "Sat Sep 25 23:08:50 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Iris-Energoinvest, Sarajevo, Yugosl",
  classification = "723",
  fjournal =     "Computer Networks and ISDN Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01697552",
  journalabr =   "Comput Networks ISDN Syst",
  keywords =     "access control; computer networks; COST-11 ter
                 project; cryptography; data processing --- Security of
                 Data; security mechanisms",
}

@Article{Mullin:1988:ONB,
  author =       "R. C. Mullin and I. M. Onyszchuk and S. A. Vanstone
                 and R. M. Wilson",
  title =        "Optimal normal bases in {$ \mathrm {GF}(p^n) $}",
  journal =      j-DISCRETE-APPL-MATH,
  volume =       "22",
  number =       "2",
  pages =        "149--161",
  year =         "1988--1989",
  CODEN =        "DAMADU",
  ISSN =         "0166-218X",
  ISSN-L =       "0166-218X",
  bibdate =      "Fri Jun 24 21:13:00 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Discrete Applied Mathematics",
}

@Article{Nakamura:1988:DRM,
  author =       "Yasuhiro Nakamura and Kineo Matsui",
  title =        "Dual reduction method of random keys for encryption by
                 graph transformation",
  journal =      "Mem. Nat. Defense Acad.",
  volume =       "28",
  number =       "1",
  pages =        "39--51",
  year =         "1988",
  CODEN =        "MDPCAW",
  ISSN =         "0388-4112",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "91a:68054",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Memoirs of the National Defense Academy. Mathematics,
                 Physics, Chemistry and Engineering",
}

@InCollection{Nemetz:1988:RLS,
  author =       "T. Nemetz and J. Ureczky",
  booktitle =    "Probability theory and mathematical statistics with
                 applications (Visegr{\'a}d, 1985)",
  title =        "A random linear secret-key encryption",
  publisher =    pub-REIDEL,
  address =      pub-REIDEL:adr,
  pages =        "171--180",
  year =         "1988",
  MRclass =      "94B05 (94A60)",
  MRnumber =     "89e:94013",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
}

@InProceedings{Neuman:1988:AUE,
  author =       "B. Clifford Neuman and Jennifer G. Steiner",
  title =        "Authentication of Unknown Entities on an Insecure
                 Network of Untrusted Workstations",
  crossref =     "USENIX:1988:PFU",
  pages =        "10--11",
  day =          "29--30",
  month =        aug,
  year =         "1988",
  bibdate =      "Fri Oct 18 07:24:24 MDT 1996",
  bibsource =    "ftp://ftp.uu.net/library/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Abstract only.",
  acknowledgement = ack-nhfb,
  affiliation =  "Massachusetts Institute of Technology",
}

@Article{Niederreiter:1988:SNC,
  author =       "Harald Niederreiter",
  title =        "Some new cryptosystems based on feedback shift
                 register sequences",
  journal =      "Math. J. Okayama Univ.",
  volume =       "30",
  pages =        "121--149",
  year =         "1988",
  CODEN =        "MJOKAP",
  ISSN =         "0030-1566",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "90a:94039",
  MRreviewer =   "Wende Chen",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Mathematical Journal of Okayama University",
}

@Article{Nobauer:1988:CPK,
  author =       "Rupert N{\"o}bauer",
  title =        "Cryptanalysis of a public-key cryptosystem based on
                 {Dickson}-polynomials",
  journal =      j-MATH-SLOVACA,
  volume =       "38",
  number =       "4",
  pages =        "309--323",
  year =         "1988",
  CODEN =        "MASLDM",
  ISSN =         "0139-9918",
  ISSN-L =       "0139-9918",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "90c:94024",
  MRreviewer =   "Hans K. Kaiser",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematica Slovaca",
  xxISSN =       "0025-5173",
}

@Article{Okamoto:1988:DMS,
  author =       "Tatsuaki Okamoto",
  title =        "A Digital Multisignature Scheme using Bijective
                 Public-Key Cryptosystems",
  journal =      j-TOCS,
  volume =       "6",
  number =       "4",
  pages =        "432--441",
  month =        nov,
  year =         "1988",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 06:47:30 MST 1999",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tocs/1988-6-4/p432-okamoto/",
  abstract =     "A new digital multisignature scheme using bijective
                 public-key cryptosystems that overcomes the problems of
                 previous signature schemes used for multisignatures is
                 proposed. The principal features of this scheme are (1)
                 the length of a multisignature message is nearly
                 equivalent to that for a single signature message; (2)
                 by using a one-way hash function, multisignature
                 generation and verification are processed in an
                 efficient manner; (3) the order of signing is not
                 restricted; and (4) this scheme can be constructed on
                 any bijective public-key cryptosystem as well as the
                 RSA scheme. In addition, it is shown that the new
                 scheme is considered as safe as the public-key
                 cryptosystem used in this new scheme. Some variations
                 based on the scheme are also presented.",
  acknowledgement = ack-nhfb,
  affiliation =  "NTT",
  affiliationaddress = "Yokosuka, Jpn",
  classification = "723",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  journalabr =   "ACM Trans Comput Syst",
  keywords =     "Bijective Public-Key Cryptosystems; Computer-Based
                 Message Systems; Cryptography; Digital Multisignature
                 Scheme; Electronic Mail; One-Way Hash Function;
                 security",
  subject =      "{\bf E.3} Data, DATA ENCRYPTION, Public key
                 cryptosystems.",
}

@Article{OShea:1988:CDU,
  author =       "G. O'Shea",
  title =        "Controlling the dependency of user access control
                 mechanisms on correctness of user identification",
  journal =      j-COMP-J,
  volume =       "31",
  number =       "6",
  pages =        "503--509",
  month =        dec,
  year =         "1988",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  classification = "723; C6130 (Data handling techniques)",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "Authentication Mechanisms; Biometric Authentication;
                 Cryptography; Data Structures; identity verification;
                 Identity verification, Data Processing; Password
                 Techniques; security of data; user access control; User
                 Access Control; User access control; user
                 identification; User Identification; User
                 identification; user identity; User identity",
  thesaurus =    "Security of data",
  treatment =    "P Practical",
}

@Article{Perry:1988:EBG,
  author =       "Tekla S. Perry",
  title =        "Electronic banking goes to market",
  journal =      j-IEEE-SPECTRUM,
  volume =       "25",
  number =       "2",
  pages =        "46--49",
  month =        feb,
  year =         "1988",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/6.4510",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Asynchronous transfer mode; bank; Banking; banking;
                 cashless society; Consumer electronics; Cryptography;
                 Europe; Filling; gas stations; Hardware;
                 Microcomputers; point of sale systems; POS debit
                 systems; POS fees; restaurants; retailer; Smart cards;
                 stores; switching company; Telephony",
}

@Article{Pomerance:1988:PAF,
  author =       "Carl Pomerance and J. W. Smith and Randy Tuler",
  title =        "A pipeline architecture for factoring large integers
                 with the quadratic sieve algorithm",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "387--403",
  month =        "????",
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "11Y05 (11A51 11Y16 68M05 94A60)",
  MRnumber =     "89f:11168",
  MRreviewer =   "Sun Qi",
  bibdate =      "Thu Apr 09 08:30:16 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  referencedin = "Referenced in \cite[Ref. 13]{Odlyzko:1995:FIF}.",
}

@Article{Qin:1988:RSS,
  author =       "Bin Qin and Howard A. Sholl and Reda A. Ammar",
  title =        "{RTS}: a System to Simulate the Real Time Cost
                 Behaviour of Parallel Computations",
  journal =      j-SPE,
  volume =       "18",
  number =       "10",
  pages =        "967--985",
  month =        oct,
  year =         "1988",
  CODEN =        "SPEXBL",
  ISSN =         "0038-0644 (print), 1097-024X (electronic)",
  ISSN-L =       "0038-0644",
  bibdate =      "Sat May 31 13:36:16 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/spe.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Software---Practice and Experience",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X",
}

@InProceedings{Raleigh:1988:CDP,
  author =       "T. M. Raleigh and R. W. Underwood",
  title =        "{CRACK}: a Distributed Password Advisor",
  crossref =     "USENIX:1988:USWa",
  institution =  "Bellcore",
  pages =        "12--13",
  year =         "1988",
  bibdate =      "Wed Aug 13 10:48:45 MDT 1997",
  bibsource =    "ftp://ftp.uu.net/library/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix1980.bib;
                 http://www.usenix.org/cgi-bin/sortbib.pl?-sA",
  note =         "Abstract only.",
  acknowledgement = ack-nhfb,
  affiliation =  "Bellcore",
}

@Article{Reif:1988:EPP,
  author =       "J. H. Reif and J. D. Tygar",
  title =        "Efficient parallel pseudorandom number generation",
  journal =      j-SIAM-J-COMPUT,
  volume =       "17",
  number =       "2",
  pages =        "404--411",
  month =        "????",
  year =         "1988",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68Q25 (65C10 68Q10)",
  MRnumber =     "89k:68072",
  bibdate =      "Thu Apr 09 08:30:16 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  note =         "Special issue on cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Misc{RFC1040,
  author =       "J. Linn",
  title =        "{RFC 1040}: Privacy enhancement for {Internet}
                 electronic mail: Part {I}: Message encipherment and
                 authentication procedures",
  day =          "1",
  month =        jan,
  year =         "1988",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoleted by RFC1113 \cite{RFC1113}. Obsoletes RFC0989
                 \cite{RFC0989}. Status: UNKNOWN.",
  URL =          "ftp://ftp.internic.net/rfc/rfc1040.txt;
                 ftp://ftp.internic.net/rfc/rfc1113.txt;
                 ftp://ftp.internic.net/rfc/rfc989.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1040.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1113.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc989.txt",
  acknowledgement = ack-nhfb,
  format =       "TXT=76276 bytes",
  obsoletedby =  "Obsoleted by RFC1113 \cite{RFC1113}.",
  obsoletes =    "Obsoletes RFC0989 \cite{RFC0989}.",
  online =       "yes",
  status =       "UNKNOWN",
}

@Article{Salomaa:1988:PKC,
  author =       "Arto Salomaa",
  title =        "A public-key cryptosystem based on language theory",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "1",
  pages =        "83--87",
  month =        feb,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:32 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488890507X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sandhu:1988:CIT,
  author =       "Ravinderpal S. Sandhu",
  title =        "Cryptographic implementation of a tree hierarchy for
                 access control",
  journal =      j-INFO-PROC-LETT,
  volume =       "27",
  number =       "2",
  pages =        "95--98",
  day =          "29",
  month =        feb,
  year =         "1988",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Ohio State Univ, Columbus, OH, USA",
  classification = "723; 921; C4240 (Programming and algorithm theory);
                 C6130 (Data handling techniques)",
  corpsource =   "Dept. of Comput. and Inf. Sci., Ohio State Univ.,
                 Columbus, OH, USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "access control; cryptographic key; cryptography;
                 cryptosystems; design; mathematical techniques ---
                 Trees; one-way function; privileged security class;
                 rooted tree; security; theory; tree hierarchy; trees
                 (mathematics)",
  pubcountry =   "Netherlands A08",
  subject =      "D.4.6 Software, OPERATING SYSTEMS, Security and
                 Protection, Access controls \\ D.4.6 Software,
                 OPERATING SYSTEMS, Security and Protection,
                 Cryptographic controls \\ E.3 Data, DATA ENCRYPTION",
  treatment =    "T Theoretical or Mathematical",
}

@InProceedings{Sedlak:1988:RCP,
  author =       "H. Sedlak",
  title =        "The {RSA} cryptographic Processor: The First High
                 Speed One-Chip Solution",
  crossref =     "Pomerance:1988:ACC",
  pages =        "95--105",
  year =         "1988",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 14]{Handschuh:1998:SCC}.",
}

@Article{Sharp:1988:DCO,
  author =       "R. L. Sharp",
  title =        "Design of a certifiable one-way data-flow device",
  journal =      j-ATT-TECH-J,
  volume =       "67",
  number =       "3",
  pages =        "44--52",
  month =        may,
  year =         "1988",
  CODEN =        "ATJOEM",
  ISSN =         "2376-676X (print), 8756-2324 (electronic)",
  ISSN-L =       "8756-2324",
  bibdate =      "Fri Nov 12 13:09:16 2010",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/bstj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Describes a possible design for a device that would
                 allow two hosts or networks of different security
                 sensitivities (for example, top secret and secret) to
                 be connected so that information can move from the
                 low-sensitivity system to the high-sensitivity system.
                 The primary challenge was to allow return protocol
                 messages from the high-sensitivity system while not
                 permitting an unacceptable covert channel. Covert
                 channels, as they relate to intersystem communication,
                 are described to give a better idea of the problem.",
  acknowledgement = ack-nhfb,
  fjournal =     "AT\&T Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  keywords =     "data communication equipment; protocols; security of
                 data",
  subject =      "covert channels; certifiable one-way data-flow device;
                 security sensitivities; top secret; secret;
                 low-sensitivity system; high-sensitivity system; return
                 protocol messages; intersystem communication",
}

@Article{Sherman:1988:CVV,
  author =       "A. T. Sherman",
  title =        "Cryptology and {VLSI (Very Large Scale Integration)}.
                 {I}. {Detecting} and exploiting algebraic weaknesses in
                 cryptosystems. {II}. {Algorithms} for placing modules
                 on a custom {VLSI} chip",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "5",
  pages =        "512--512",
  month =        oct,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888902234",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Simmons:1988:SSC,
  author =       "G. J. Simmons",
  title =        "Special section on cryptology",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "533--627",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  in =           "Institute of Electrical and Electronics Engineers.
                 Proceedings of the IEEE. v. 76, no. 5 0018-9219
                 (OCoLC)1753228 (DLC) 86645263 (DLC)sn 80000610",
}

@InCollection{Siromoney:1988:CPL,
  author =       "R. Siromoney and K. G. Subramanian and Jeyanthi
                 Abisha",
  booktitle =    "Syntactic and structural pattern recognition
                 (Barcelona and Sitges, 1986)",
  title =        "Cryptosystems for picture languages",
  volume =       "45",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "315--332",
  year =         "1988",
  MRclass =      "68P25 (68Q45)",
  MRnumber =     "1 012 152",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "NATO Adv. Sci. Inst. Ser. F Comput. Systems Sci.",
}

@InProceedings{Steiner:1988:KAS,
  author =       "Jennifer G. Steiner and Clifford Neuman and Jeffrey I.
                 Schiller",
  title =        "{Kerberos}: An Authentication Service for Open Network
                 Systems",
  crossref =     "USENIX:1988:UCPb",
  pages =        "191--202",
  month =        "Winter",
  year =         "1988",
  bibdate =      "Fri Oct 18 07:24:24 MDT 1996",
  bibsource =    "ftp://ftp.uu.net/library/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/usenix1980.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "MIT Project Athena",
}

@Article{Stevens:1988:CPR,
  author =       "A. Stevens",
  title =        "{C} programming: off and running \ldots{}",
  journal =      j-DDJ,
  volume =       "13",
  number =       "8",
  pages =        "98, 101--102, 104, 106--107, 109--110, 113",
  month =        aug,
  year =         "1988",
  CODEN =        "DDJOEB",
  ISSN =         "0888-3076",
  bibdate =      "Tue Sep 10 09:30:19 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
  acknowledgement = ack-nhfb,
  classification = "C6110 (Systems analysis and programming); C6130
                 (Data handling techniques); C6140D (High level
                 languages)",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  keywords =     "Braces; C constructs; C language preprocessors; C
                 programming practices; Code indenting; Decryption
                 program",
  thesaurus =    "C language; C listings; Cryptography; Programming",
}

@Misc{SuperMacSoftware:1988:SDE,
  author =       "{SuperMac Software}",
  title =        "{Sentinel Data} encryption utility",
  publisher =    "SuperMac Software",
  address =      "Mountain View, CA, USA",
  edition =      "Version 2.",
  pages =        "various",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Title from disk label. Includes Disklock Utility.
                 Summary: Sentinel offers a variety of methods to
                 encrypt data in documents. System requirements:
                 Macintosh 512K Enhanced, Plus, SE and II; 3.5-inch or
                 hard disk; Macintosh System Software. Macintosh.",
  keywords =     "Encryption.",
}

@Article{Terry:1988:MSV,
  author =       "Douglas B. Terry and Daniel C. Swinehart",
  title =        "Managing Stored Voice in the {Etherphone} System",
  journal =      j-TOCS,
  volume =       "6",
  number =       "1",
  pages =        "3--27",
  month =        feb,
  year =         "1988",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 06:47:30 MST 1999",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tocs/1988-6-1/p3-terry/",
  abstract =     "The voice manager in the Etherphone system provides
                 facilities for recording, editing, and playing stored
                 voice in a distributed personal-computing environment.
                 To facilitate sharing, the voice manager stores voice
                 on a special voice file server that is accessible via
                 the local internet. Operations for editing a passage of
                 recorded voice simply build persistent data structures
                 to represent the edited voice. These data structures,
                 implementing an abstraction called voice ropes, are
                 stored in a server database and consist of lists of
                 intervals within voice files. Clients refer to voice
                 ropes solely by reference. Interests, additional
                 persistent data structures maintained by the server,
                 provide a sort of directory service for managing the
                 voice ropes that have been created as well as a
                 reliable reference-counting mechanism, permitting the
                 garbage collection of voice ropes that are no longer
                 needed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "XEROX Palo Alto Research Cent, Palo Alto, CA,
                 USA",
  classification = "718; 723",
  conference =   "1987 ACM\slash SIGOPS Symposium on Operating Systems
                 Principles.",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  keywords =     "computer networks; computer operating systems;
                 computer systems, digital --- Distributed; data
                 processing --- Data Structures; design; digital
                 communication systems; electronic mail; Etherphone
                 system; management; performance; security; voice
                 editing; voice file server; voice manager; Voice/Data
                 Integrated Services",
  sponsor =      "ACM, Special Interest Group on Operating Systems, New
                 York, NY, USA",
  subject =      "{\bf H.4.3} Information Systems, INFORMATION SYSTEMS
                 APPLICATIONS, Communications Applications. {\bf D.4.2}
                 Software, OPERATING SYSTEMS, Storage Management,
                 Allocation/deallocation strategies. {\bf D.4.2}
                 Software, OPERATING SYSTEMS, Storage Management,
                 Storage hierarchies. {\bf D.4.3} Software, OPERATING
                 SYSTEMS, File Systems Management. {\bf D.4.6} Software,
                 OPERATING SYSTEMS, Security and Protection, Access
                 controls. {\bf D.4.6} Software, OPERATING SYSTEMS,
                 Security and Protection, Cryptographic controls. {\bf
                 E.2} Data, DATA STORAGE REPRESENTATIONS. {\bf H.2.8}
                 Information Systems, DATABASE MANAGEMENT, Database
                 Applications. {\bf H.4.3} Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Communications
                 Applications, Electronic mail. {\bf C.2.4} Computer
                 Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
                 Distributed Systems.",
}

@Article{Tsujii:1988:PKC,
  author =       "Shigeo Tsujii and Toshiya Itoh and Atsushi Fujioka and
                 Kaoru Kurosawa and Tsutomu Matsumoto",
  title =        "A public-key cryptosystem based on the difficulty of
                 solving a system of nonlinear equations",
  journal =      j-SYS-COMP-JAPAN,
  volume =       "19",
  number =       "2",
  pages =        "10--18",
  year =         "1988",
  CODEN =        "SCJAEP",
  ISSN =         "0882-1666",
  ISSN-L =       "0882-1666",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "89g:94026",
  MRreviewer =   "Zhen Fu Cao",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Systems and Computers in Japan",
}

@TechReport{USDA:1988:CED,
  author =       "{United States.Dept.of the Army}",
  title =        "Cryptographic equipment destroyer, incendiary,
                 {TH1\slash TH4}, {M1A1}, {M1A2}, and {M2A1}: ammunition
                 surveillance procedures",
  type =         "Department of the Army supply bulletin",
  number =       "SB 742-1375-94-801",
  institution =  "Dept. of the Army, Headquarters",
  address =      "Washington, DC, USA (??)",
  pages =        "various",
  day =          "6",
  month =        apr,
  year =         "1988",
  LCCN =         "D 101.15:742-1375-94-801 Govt Pubs",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Supersedes SB 742-1375-94-3, 21 March 1974",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography -- United States -- equipment and
                 supplies -- handbooks,; demolition, military --
                 handbooks, manuals, etc; manuals, etc; United States.
                 army -- handbooks, manuals, etc",
}

@Book{USNBS:1988:DES,
  author =       "{United States.National Bureau of Standards}",
  title =        "{Data Encryption Standard}",
  number =       "46-1",
  publisher =    pub-NTIS,
  address =      pub-NTIS:adr,
  pages =        "16",
  year =         "1988",
  LCCN =         "JK468.A8 A31 no.46 1988",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Category: ADP operations; subcategory: computer
                 security. Supersedes FIPS PUB 46, 1977 January 15.
                 Shipping list no.: 88-367-P. Reaffirmed 1988 January
                 22.",
  series =       "Federal Information Processing Standards publication",
  acknowledgement = ack-nhfb,
  annote =       "Cover title. Category: ADP operations; subcategory:
                 computer security. ``Supersedes FIPS PUB 46, 1977
                 January 15.'' Shipping list no.: 88-367-P. ``Reaffirmed
                 1988 January 22.''",
  govtdocnumber = "C 13.52:46-1 248-D",
  keywords =     "Electronic data processing departments --- Security
                 measures",
}

@Article{Vallee:1988:HBO,
  author =       "Brigitte Vall{\'e}e and Marc Girault and Philippe
                 Toffin",
  booktitle =    "Advances in {cryptology---EUROCRYPT '88} (Davos,
                 1988)",
  title =        "How to break {Okamoto}'s cryptosystem by reducing
                 lattice bases",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "330",
  pages =        "281--291",
  year =         "1988",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (11H55 11T71)",
  MRnumber =     "90f:94035",
  MRreviewer =   "Rudolf Lidl",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{VanderBank:1988:CFM,
  author =       "Dirk {Van der Bank} and Edwin Anderssen",
  title =        "Cryptographic figures of merit",
  journal =      j-COMPUT-SECUR,
  volume =       "7",
  number =       "3",
  pages =        "299--303",
  month =        jun,
  year =         "1988",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404888900363",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{vanTilborg:1988:IC,
  author =       "Henk C. A. {van Tilborg}",
  title =        "An introduction to cryptology",
  volume =       "SECS 52",
  publisher =    pub-KLUWER,
  address =      pub-KLUWER:adr,
  pages =        "x + 170",
  year =         "1988",
  ISBN =         "0-89838-271-8",
  ISBN-13 =      "978-0-89838-271-6",
  LCCN =         "Z103 .T541 1988",
  bibdate =      "Mon Oct 16 11:21:00 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$45.00",
  series =       "The Kluwer international series in engineering and
                 computer science; Communications and information
                 theory",
  acknowledgement = ack-nhfb,
  annote =       "[159]-164.",
  keywords =     "Cryptographie; Cryptographie --- Informatique;
                 Cryptography; Cryptography --- Data processing;
                 Cryptology",
}

@Article{Vassiliadis:1988:PEA,
  author =       "Stamatis Vassiliadis and Michael Putrino and Eric M.
                 Schwarz",
  title =        "Parallel Encrypted Array Multipliers",
  journal =      j-IBM-JRD,
  volume =       "32",
  number =       "4",
  pages =        "536--551",
  month =        jul,
  year =         "1988",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Tue Mar 25 14:26:59 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  abstract =     "An algorithm for direct two's-complement and
                 sign-magnitude parallel multiplication is described.
                 The partial product matrix representing the
                 multiplication is converted to an equivalent matrix by
                 encryption. Its reduction, producing the final result,
                 needs no specialized adders and can be added with any
                 parallel array addition technique. It contains no
                 negative terms and no extra `correction' rows; in
                 addition, it produces the multiplication with fewer
                 than the minimal number of rows required for a direct
                 multiplication process.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Syst. Products Div.",
  affiliationaddress = "IBM, Endicott, NY, USA",
  classcodes =   "C5230 (Digital arithmetic methods)",
  classification = "721; 723; 921; C5230 (Digital arithmetic methods)",
  corpsource =   "IBM, Syst. Products Div., Endicott, NY, USA",
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
  journalabr =   "IBM J Res Dev",
  keywords =     "computer metatheory; computers, digital; cryptography;
                 digital arithmetic; direct multiplication; Direct
                 two's-complement; direct two's-complement; encrypted
                 array; Encryption; encryption; equivalent matrix;
                 Equivalent matrix; mathematical techniques --- Matrix
                 Algebra; matrix algebra; multiplication; Multiplying
                 Circuits; parallel array addition; Parallel array
                 addition technique; parallel array addition technique;
                 parallel multiplication; partial product matrix;
                 Partial product matrix; product matrix; sign-magnitude
                 parallel; Sign-magnitude parallel multiplication;
                 two's-complement",
  thesaurus =    "Cryptography; Digital arithmetic; Matrix algebra",
  treatment =    "P Practical",
}

@Article{Webb:1988:NPK,
  author =       "W. A. Webb",
  title =        "A nonlinear public key cryptosystem",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "15",
  number =       "2",
  pages =        "81--84",
  year =         "1988",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94A60",
  MRnumber =     "940 071",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
}

@Article{Weiss:1988:BOP,
  author =       "Eric A. Weiss",
  title =        "Biographies: Oh, Pioneers!",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "10",
  number =       "4",
  pages =        "348--361",
  month =        oct # "\slash " # dec,
  year =         "1988",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:13 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1988/pdf/a4348.pdf;
                 http://www.computer.org/annals/an1988/a4348abs.htm",
  acknowledgement = ack-nhfb,
  annote =       "This paper contains a brief summary of the
                 contributions of 261 individuals to the development of
                 computing.",
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
  keywords =     "A. Porter; Aard van Wijngaarden; Adin D. Falkoff; Alan
                 J. Perlis; Alan Kay; Alan M. Turing; Allen Newell;
                 Allen W. M. Coombes; Alonzo Church; Alston Scott
                 Householder; Amedee Mannheim; Andrei P. Ershov; Andrew
                 Donald Booth; Andrew Fluegelman; Arnold A. Cohen;
                 Arthur C. Clarke; Arthur Lee Samuel; Arthur Walter
                 Burks; Arturo Rosenblueth; Augusta Ada King (nee
                 Gordon); B. M. Derfee; Blaise Pascal; Bob O. Evans;
                 Brian Havens; Brian Josephson; Brian Randell; Bruce G.
                 Oldfield; C. Gordon Bell; C. J. Date; C. Sheldon
                 Roberts; Carl Adam Petri; Carver Mead; Charles A.
                 Phillips; Charles Antony Richard Hoare; Charles
                 Babbage; Charles Bachman; Charles Xavier Thomas (Thomas
                 de Colmar); Christopher S. Strachey; Clair D. Lake;
                 Claude Elwood Shannon; Clifford E. Berry; Cuthbert C.
                 Hurd; D. W. Davies; Dana Scott; Daniel Delbert
                 McCracken; David J. Wheeler; David Packard; David
                 Sarnoff; Dennis M. Ritchie; Derrick Henry Lehmer;
                 Dionysius Lardner; Donald Ervin Knuth; Donald Lewis
                 Shell; Donald Michie; Donn B. Parker; Dorr E. Felt;
                 Douglas R. Hartree; E. H. Lennaerts; E. T. Irons; Earl
                 R. Larson; Edgar F. Codd; Edmund C. Berkeley; Edsger W.
                 Dijkstra; Edward E. Feigenbaum; Edward Joseph
                 McCluskey; Edward L. (Ted) Glaser; Emil L. Post; Ernest
                 R. Moore; Erwin Tomash; Eugene Kleiner; Fairchild Eight
                 (Julius Blank, Victor H. Grinich, Jean A. Hoerni,
                 Eugene Kleiner, Jay T. Last, Gordon E. Moore, Robert N.
                 Noyce, and C. Sheldon Roberts); Fernando J.
                 Corbat{\'o}; Fletcher Jones; Frances Elizabeth (Betty)
                 Snyder Holberton; Francis Joseph Murray; Frank E.
                 Hamilton; Frank Gray; Frank Rosenblatt; Frederic
                 Calland Williams; Frederick P. Brooks, Jr.; Friedrich
                 L. Bauer; G. B. Grant; G. Truman Hunter; Gene M.
                 Amdahl; Georg and Edvard Scheub; George Bernard
                 Dantzig; George Boole; George Elmer Forsythe; George H.
                 Philbrick; George Robert Stibitz; Gerald M. Weinberg;
                 Gerard Salton; Gordon E. Moore; Gottfried Wilhelm
                 Leibniz; Grace Murray Hopper; Harlan D. Mills; Harlan
                 L. Herrick; Harold Chestnut; Harry Douglas Huskey;
                 Harry H. Goode; Heinz Rutishauser; Helmut Schreyer;
                 Henry Briggs; Henry P. Babbage; Herbert A. Simon;
                 Herbert Leo Gelernter; Herbert R. J. Grosch; Herbert S.
                 Bright; Herman Heine Goldstine; Herman Hollerith;
                 Herman Lukoff; Howard Bromberg; Howard Hathaway Aiken;
                 I. J. Good; Irven Travis; Isaac L. Auerbach; Ivan
                 Edward Sutherland; J. Daniel Cougar; J. Presper Eckert,
                 Jr.; Jack St. Clair Kilby; Jack Tramiel; Jackson
                 Granholm [``kludge'']; James Hardy Wilkinson; James M.
                 Henry; James William Cooley; Jan Aleksander Rajchman;
                 Jay T. Last; Jay W. Forrester; Jean A. Hoerni; Jean E.
                 Sammet; Jeffrey Chuan Chu; Jerrier A. Haddad; Jim
                 Pommerene; John Bardeen; John Burns; John C. McPherson;
                 John Clifford Shaw; John Diebold; John George Kemeny;
                 John Grist Brainerd; John H. Curtiss; John McCarthy;
                 John Napier; John Powers; John R. Pierce; John Todd;
                 John Vincent Atanasoff; John von Neumann; John Warner
                 Backus; John Weber Carr, III; John Wilder Tukey; John
                 William Mauchly; Johnathan Swift; Joseph Carl Robnett
                 Licklider; Joseph Chedaker; Joseph Clement; Joseph
                 Frederick Traub; Joseph Marie Jacquard; Joseph
                 Weizenbaum; Jules I. Schwartz; Julian Bigelow; Julius
                 Blank; Karl Karlstrom; Ken Thompson; Kenneth Eugene
                 Iverson; Kenneth H. Olsen; Konrad Zuse; L. F. Meabrea;
                 Lejaren A. Hiller; Leonardo of Pisa a.k.a. Fibonacci;
                 Leonardo Torres y Quevedo; Leslie John Comrie; Lord
                 Kelvin (William Thomson); Louis Couffignal; Lynn
                 Conway; L{\'e}on Boll{\'e}e; Marian Rejewski; Marvin L.
                 Minsky; Maurice Howard Halstead; Maurice V. Wilkes; Max
                 Palevsky; Maxwell H. A. Newman; Michael O. Rabin;
                 Michael Woodger; Mina Rees; Mitchell D. Kapor; Mohammed
                 ibn Musa Al-Khowarizmi; Morton Michael Astrahan;
                 Nathaniel Rochester; Nicholas Constantine Metropolis;
                 Niklaus Wirth; Noam Chomsky; Nolan Bushnell; Norbert
                 Wiener; Oliver G. Selfridge; Orrin Edison Taulbee; Paul
                 Allen; Percy Ludgate; Perry O. Crawford; Peter Naur;
                 Ralph E. Gomory; Richard Clippinger; Richard Courant;
                 Richard Ernest Bellman; Richard J. Canning; Richard M.
                 Bloch; Richard P. Feynman; Richard Snyder; Richard V.
                 D. Campbell; Richard Wesley Hamming; Robert H. Dennard;
                 Robert N. Noyce; Robert R. Everett; Robert S. Barton;
                 Robert Sarnoff; Robert W. Bemer; Robert W. Floyd; Roy
                 Nutt; S. B. Williams; Samuel H. Caldwell; Samuel
                 Morland; Samuel N. Alexander; Saul Rosen; Seymour
                 Papert; Seymour R. Cray; Sidney Fernbach; Stanley Gill;
                 Stephen A. Cook; Stephen Frank Baldwin; Stephen
                 Wozniak; Steven Jobs; T. Vincent Learson; Thomas Eugene
                 Kurtz; Thomas H. Flowers; Thomas J. Watson, Jr.; Thomas
                 J. Watson, Sr.; Thomas Kite Sharpless; Tom Kilburn;
                 Vannevar E Bush; Victor H. Grinich; Vladimar Zworykin;
                 W. J. Deerhake; W. Renwick; W. T. Odhner; Wallace J,
                 Eckert; Walter Pitts; Warren Sturgis McCulloch; Warren
                 Weaver; Wassily Leontieff; Watson Davis; Werner
                 Buchholz; Wilhelm Schikard; William C. Norris; William
                 F. McClelland; William Gates; William Hewlett; William
                 Leybourn; William Orchard-Hays; William Oughtred;
                 William P. Heising; William Seward Burroughs",
  remark =       "Norbert Wiener appears incorrectly as Norbert Weiner
                 in this article.",
}

@Article{Wells:1988:NAI,
  author =       "Codie Wells",
  title =        "A Note on {``Protection Imperfect''}",
  journal =      j-OPER-SYS-REV,
  volume =       "22",
  number =       "4",
  pages =        "35--35",
  month =        oct,
  year =         "1988",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:51 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Hogan:1988:PIS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Welsh:1988:CC,
  author =       "Dominic Welsh",
  title =        "Codes and cryptography",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "ix + 257",
  year =         "1988",
  ISBN =         "0-19-853288-1 (hardcover), 0-19-853287-3 (paperback)",
  ISBN-13 =      "978-0-19-853288-0 (hardcover), 978-0-19-853287-3
                 (paperback)",
  LCCN =         "Z103 .W461 1988",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "UK\pounds30.00, US\$60.00 (hardcover), UK\pounds15.00
                 (paperback)",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Article{Adams:1989:SRC,
  author =       "Carlisle M. Adams and Henk Meijer",
  title =        "Security-related comments regarding {McEliece}'s
                 public-key cryptosystem",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-35",
  number =       "2",
  pages =        "454--455",
  year =         "1989",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/18.32140",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60",
  MRnumber =     "999 658",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Anonymous:1989:SZS,
  author =       "Anonymous",
  title =        "The safety zone (security products for
                 microcomputers)",
  journal =      j-BYTE,
  volume =       "14",
  number =       "6",
  pages =        "290--291",
  month =        jun,
  year =         "1989",
  CODEN =        "BYTEDJ",
  ISSN =         "0360-5280",
  ISSN-L =       "0360-5280",
  bibdate =      "Thu Sep 12 17:54:09 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "C5590 (Other peripheral equipment); C6130 (Data
                 handling techniques)",
  fjournal =     "BYTE Magazine",
  keywords =     "Access control; Add on boards; Audit trails; Boot
                 protection; DOS compatibility; Encryption; Macintosh
                 compatibility; Passwork protection; Security features;
                 Software packages; Virus protection",
  thesaurus =    "Add-on boards; Apple computers; Computer peripheral
                 equipment; IBM computers; Personal computing; Security
                 of data; Software packages",
}

@InProceedings{Bar-Ilan:1989:NFC,
  author =       "J. Bar-Ilan and D. Beaver",
  title =        "Non-Cryptographic Fault-Tolerant Computing in a
                 Constant Number of Rounds",
  crossref =     "ACM:1989:PEA",
  pages =        "201--209",
  year =         "1989",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 1]{Canetti:1997:PSL}.",
}

@Article{Bateman:1989:NMC,
  author =       "P. T. Bateman and J. L. Selfridge and S. S. {Wagstaff,
                 Jr.}",
  title =        "The new {Mersenne} conjecture",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "96",
  number =       "2",
  pages =        "125--128",
  month =        feb,
  year =         "1989",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  MRclass =      "11A51 (11Y11)",
  MRnumber =     "90c:11009",
  MRreviewer =   "Neville Robbins",
  bibdate =      "Wed Dec 3 17:17:33 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See letter to the editor \cite{Mullin:1989:LEN}. The
                 authors state: {\sc New Mersenne Conjecture}. {\em If
                 two of the following statements about an odd positive
                 integer $p$ are true, then the third one is also true.
                 (a) $ p = 2^k \pm 1 $ or $ p = 4^k \pm 3 $. (b) $ M_p (
                 = 2^p - 1) $ is prime. (c) $ (2^p + 1) / 3 $ is
                 prime.}",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@InCollection{Beale:1989:EUR,
  author =       "M. Beale and M. F. Monaghan",
  booktitle =    "Cryptography and coding (Cirencester, 1986)",
  title =        "Encryption using random {Boolean} functions",
  volume =       "20",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "219--230",
  year =         "1989",
  MRclass =      "94A60",
  MRnumber =     "1 030 555",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  series =       "Inst. Math. Appl. Conf. Ser. New Ser.",
}

@Article{Bennett:1989:EQC,
  author =       "C. H. Bennett and G. Brassard",
  title =        "Experimental quantum cryptography: the dawn of a new
                 era for quantum cryptography: the experimental
                 prototype is working",
  journal =      j-SIGACT,
  volume =       "20",
  number =       "4",
  pages =        "78--80",
  month =        nov,
  year =         "1989",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/74074.74087",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 09:45:50 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Book{Bennett:1989:UMS,
  author =       "Ralph Francis Bennett",
  title =        "{Ultra} and {Mediterranean} strategy 1941--1945",
  publisher =    "H. Hamilton",
  address =      "London, UK",
  pages =        "496",
  year =         "1989",
  ISBN =         "0-241-12687-8",
  ISBN-13 =      "978-0-241-12687-5",
  LCCN =         "D766 .B46x 1989b",
  bibdate =      "Mon May 8 07:06:05 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Campaigns; Mediterranean
                 Region; Secret service; Great Britain; Cryptography",
}

@Manual{Bishop:1989:FEP,
  author =       "Matt Bishop",
  title =        "The fast encryption package",
  number =       "185397",
  publisher =    "Research Institute for Advanced Computer Science",
  address =      "Moffett Field, CA, USA",
  pages =        "??",
  year =         "1989",
  LCCN =         "NAS 1.26:185397 Govt Pubs",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Microfiche.",
  series =       "NASA-CR",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- passwords",
}

@InProceedings{Bishop:1989:USS,
  author =       "M. Bishop",
  title =        "{UNIX} security in a supercomputing environment",
  crossref =     "ACM:1989:PSN",
  pages =        "693--698",
  year =         "1989",
  bibdate =      "Wed Apr 15 19:32:44 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  corpsource =   "Dept. of Math. and Comput. Sci., Dartmouth Coll.,
                 Hanover, NH, USA",
  keywords =     "access control lists; integrity mechanisms; parallel
                 processing; security of data; supercomputing
                 environment; system administration functions; Unix;
                 UNIX security; user authentication; working
                 prototypes",
  sponsororg =   "ACM; IEEE",
  treatment =    "P Practical",
}

@Article{Blanchard:1989:CSS,
  author =       "F. Blanchard",
  title =        "Certain sofic systems engendered codes",
  journal =      j-THEOR-COMP-SCI,
  volume =       "68",
  number =       "3",
  pages =        "253--265",
  day =          "12",
  month =        nov,
  year =         "1989",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C1160 (Combinatorial mathematics);
                 C4210 (Formal logic)",
  corpsource =   "Lab. de Probabilit{\'e}s, Paris 6 Univ., France",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "circular codes; codes; concatenation; encoding; finite
                 deciphering delay; first return code; local codes;
                 rational code; right-resolving cover; set theory; sofic
                 system; state space; unique splitting",
  language =     "French",
  pubcountry =   "Netherlands",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Boyar:1989:ISPa,
  author =       "Joan Boyar",
  title =        "Inferring Sequences Produced by Pseudo-Random Number
                 Generators",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "1",
  pages =        "129--141",
  month =        jan,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/59305.html;
                 http://www.imada.sdu.dk/~joan/",
  abstract =     "In this paper, efficient algorithms are given for
                 inferring sequences produced by pseudo-random number
                 generators of a certain form. Using this general
                 method, specific examples of generators having this
                 form, the linear congruential method, linear
                 congruences with $n$ terms in the recurrence, and
                 quadratic congruences are shown to be cryptographically
                 insecure.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Chicago, IL, USA",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Computer Programming --- Algorithms;
                 Cryptography; cryptography; inductive inference; linear
                 congruential method; Mathematical Statistics;
                 Pseudorandom Number Generators; Random Number
                 Generation; security; Sequence Inferring Algorithms;
                 Theory of Computation",
  remark =       "Early publications, including 1983 Berkeley Ph.D.
                 dissertation, as Joan B. Plumstead.",
  subject =      "{\bf E.3}: Data, DATA ENCRYPTION. {\bf F.2.1}: Theory
                 of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
                 COMPLEXITY, Numerical Algorithms and Problems. {\bf
                 G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation.",
}

@Article{Boyar:1989:ISPb,
  author =       "Joan Boyar",
  title =        "Inferring sequences produced by a linear congruential
                 generator missing low-order bits",
  journal =      j-J-CRYPTOLOGY,
  volume =       "1",
  number =       "3",
  pages =        "177--184",
  month =        "????",
  year =         "1989",
  CODEN =        "JOCREQ",
  DOI =          "https://doi.org/10.1007/BF02252875",
  ISSN =         "0933-2790 (print), 1432-1378 (electronic)",
  ISSN-L =       "0933-2790",
  MRclass =      "94A60 (11B50 11T71 11Y16 65C10)",
  MRnumber =     "1007218 (90g:94012)",
  MRreviewer =   "Min Qiang Huang",
  bibdate =      "Wed Dec 21 07:59:46 2011",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Chicago",
  affiliationaddress = "Chicago, IL, USA",
  classification = "723; 922",
  fjournal =     "Journal of Cryptology",
  journal-URL =  "http://link.springer.com/journal/145",
  journalabr =   "J Cryptol",
  keywords =     "Computer Programming--Algorithms; Cryptography; Linear
                 Congruential Method; Mathematical Statistics--Random
                 Number Generation; Pseudorandom Number Generators",
}

@Article{Brassard:1989:CCa,
  author =       "Gilles Brassard",
  title =        "Cryptology column",
  journal =      j-SIGACT,
  volume =       "20",
  number =       "3",
  pages =        "15--19",
  month =        jul,
  year =         "1989",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/70642.70643",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 09:45:50 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Brassard:1989:CCb,
  author =       "G. Brassard",
  title =        "Cryptology --- column 2",
  journal =      j-SIGACT,
  volume =       "20",
  number =       "4",
  pages =        "13--13",
  month =        nov,
  year =         "1989",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/74074.74075",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 09:45:50 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@TechReport{Burrows:1989:LAa,
  author =       "Michael Burrows and Martin Abadi and Roger Needham",
  title =        "A Logic of Authentication",
  number =       "39",
  institution =  "Digital Equipment Corporation, Systems Research
                 Centre",
  pages =        "48",
  day =          "28",
  month =        feb,
  year =         "1989",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  abstract =     "Questions of belief are essential in analyzing
                 protocols for authentication in distributed computing
                 systems. In this paper we motivate, set out, and
                 exemplify a logic specifically designed for this
                 analysis; we show how various protocols differ subtly
                 with respect to the required initial assumptions of the
                 participants and their final beliefs. Our formalism has
                 enabled us to isolate and express these differences
                 with a precision that was not previously possible. It
                 has drawn attention to features of protocols of which
                 we and their authors were previously unaware, and
                 allowed us to suggest improvements to the protocols.
                 The reasoning about some protocols has been
                 mechanically verified. This paper starts with an
                 informal account of the problem, goes on to explain the
                 formalism to be used, and gives examples of its
                 application to protocols from the literature, both with
                 conventional shared-key cryptography and with
                 public-key cryptography. Some of the examples are
                 chosen because of their practical importance, while
                 others serve to illustrate subtle points of the logic
                 and to explain how we use it. We discuss extensions of
                 the logic motivated by actual practice -- for example,
                 in order to account for the use of hash functions in
                 signatures. The final sections contain a formal
                 semantics of the logic and some conclusions.",
  acknowledgement = ack-nhfb,
}

@Article{Burrows:1989:LAb,
  author =       "M. Burrows and M. Abadi and R. Needham",
  title =        "A logic of authentication",
  journal =      j-OPER-SYS-REV,
  volume =       "23",
  number =       "5",
  pages =        "1--13",
  month =        dec,
  year =         "1989",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 12:47:29 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Callimahos:1989:TAZ,
  author =       "Lambros D. Callimahos",
  title =        "Traffic Analysis and the {Zendian} Problem: an
                 exercise in communications intelligence operations",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "256",
  year =         "1989",
  ISBN =         "0-89412-162-6, 0-89412-161-8 (paperback)",
  ISBN-13 =      "978-0-89412-162-3, 978-0-89412-161-6 (paperback)",
  LCCN =         "????",
  bibdate =      "Tue Dec 01 11:01:51 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chor:1989:SCT,
  author =       "Benny Chor and Michael Merritt and David B. Shmoys",
  title =        "Simple Constant-Time Consensus Protocols in Realistic
                 Failure Models",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "3",
  pages =        "591--614",
  month =        jul,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Distributed/CCR.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "{\bf Review: Computing Reviews}, June 1990.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/65956.html",
  abstract =     "Using simple protocols, it is shown how to achieve
                 consensus in constant expected time, within a variety
                 of fail-stop and omission failure models.
                 Significantly, the strongest models considered are
                 completely asynchronous. All of the results are based
                 on distributively flipping a coin, which is usable by a
                 significant majority of the processors. Finally, a
                 nearly matching lower bound is also given for
                 randomized protocols for consensus.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Haifa, Isr",
  classification = "722; 723",
  fjournal =     "Journal of the Association for Computing Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "agreement problem; algorithms; Computer Systems,
                 Digital; consensus problem; Consensus Protocols;
                 cryptography; Distributed; Distributed Computing;
                 Distributed Systems; Failure Analysis; Failure Models;
                 fault tolerance; Lower Bounds; performance; Randomized
                 Protocols; reliability; security; theory",
  subject =      "{\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
                 {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.",
}

@PhdThesis{Chuang:1989:NES,
  author =       "Ta-Fu Chuang",
  title =        "Non-homomorphic encryption schemes and properties of
                 {Chinese} remainder theorem",
  type =         "Thesis ({Ph.D.} in Engineering)",
  school =       "University of Wisconsin-Milwaukee",
  address =      "Milwaukee, WI, USA",
  pages =        "vi + 58",
  year =         "1989",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Data protection.",
}

@Article{Ciminiera:1989:AMM,
  author =       "L. Ciminiera and A. Valenzano",
  title =        "Authentication mechanisms in microprocessor-based
                 local area networks",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "15",
  number =       "5",
  pages =        "654--658",
  month =        may,
  year =         "1989",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/32.24716",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 08:07:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng1980.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=24716",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@TechReport{Coppersmith:1989:AID,
  author =       "D. Coppersmith",
  title =        "Analysis of {ISO/CCITT} Document {X}.509 Annex {D}",
  type =         "Internal Memo.",
  institution =  "IBM T. J. Watson Center",
  address =      "Yorktown Heights, NY, USA",
  pages =        "??",
  day =          "11",
  month =        jun,
  year =         "1989",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 5]{Kaliski:1995:SUR}.",
}

@Book{Deavours:1989:CMH,
  editor =       "Cipher A. Deavours and David Kahn and others",
  title =        "Cryptology: machines, history, \& methods",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "x + 508",
  year =         "1989",
  ISBN =         "0-89006-399-0",
  ISBN-13 =      "978-0-89006-399-6",
  LCCN =         "Z103 .C75 1989",
  bibdate =      "Sat Nov 21 11:43:43 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Second volume of selected papers from issues of
                 Cryptologia.",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; ciphers; cryptography; Cryptography;
                 Cryptology",
}

@Book{Denning:1989:EET,
  author =       "Dorothy Elizabeth Robling Denning and William E.
                 {Baugh, Jr.}",
  title =        "Encryption and evolving technologies: tools of
                 organized crime and terrorism",
  publisher =    "National Strategy Information Center",
  address =      "Washington, DC, USA",
  pages =        "ii + 52",
  year =         "1989",
  ISSN =         "1093-7269",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "US Working Group on Organized Crime monograph series",
  acknowledgement = ack-nhfb,
  keywords =     "Computer crimes --- United States; Data encryption
                 (Computer science); Terrorism.",
}

@Article{Dror:1989:SCG,
  author =       "Asael Dror",
  title =        "Secret Codes (any good data security system must rely
                 on encryption)",
  journal =      j-BYTE,
  volume =       "14",
  number =       "6",
  pages =        "267--270",
  month =        jun,
  year =         "1989",
  CODEN =        "BYTEDJ",
  ISSN =         "0360-5280",
  ISSN-L =       "0360-5280",
  bibdate =      "Thu Sep 12 17:54:09 MDT 1996",
  bibsource =    "/usr/local/src/bib/bibliography/Misc/security.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/byte1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Wisdom Software, San Francisco, CA, USA",
  classification = "B6120B (Codes); C0230 (Economic, social and
                 political aspects); C6130 (Data handling techniques)",
  fjournal =     "BYTE Magazine",
  keywords =     "Analytical cryptoanalysis; Authenticity; Code
                 breaking; Conventional cryptosystems; Data security
                 system; Date Encryption; Digital signature; Encryption;
                 Public key cryptosystem; Public key encryption; RSA
                 public key system; Statistical cryptoanalysis",
  thesaurus =    "Cryptography",
}

@Article{Er:1989:NAG,
  author =       "M. C. Er",
  title =        "A new algorithm for generating binary trees using
                 rotations",
  journal =      j-COMP-J,
  volume =       "32",
  number =       "5",
  pages =        "470--473",
  month =        oct,
  year =         "1989",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  MRclass =      "68P05 (68R10)",
  MRnumber =     "1 018 458",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_05/",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_05/tiff/470.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_05/tiff/471.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_05/tiff/472.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_05/tiff/473.tif",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Comput. Sci., Western Australia Univ.,
                 Nedlands, WA, Australia",
  classcodes =   "C4240 (Programming and algorithm theory); C1160
                 (Combinatorial mathematics)",
  classification = "C1160 (Combinatorial mathematics); C4240
                 (Programming and algorithm theory)",
  corpsource =   "Dept. of Comput. Sci., Western Australia Univ.,
                 Nedlands, WA, Australia",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "admissible; algorithm theory; codewords; Codewords;
                 cryptography; generation binary trees; Generation
                 binary trees; rotational; Rotational admissible;
                 rotations; Rotations; trees (mathematics); Zerling
                 algorithms",
  thesaurus =    "Algorithm theory; Cryptography; Trees [mathematics]",
  treatment =    "P Practical",
}

@Article{Fitzgerald:1989:QIP,
  author =       "K. Fitzgerald",
  title =        "The quest for intruder-proof computer systems",
  journal =      j-IEEE-SPECTRUM,
  volume =       "26",
  number =       "8",
  pages =        "22--26",
  month =        aug,
  year =         "1989",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/6.30775",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "ARPAnet; computer break-ins; computer security;
                 Computer security; Computer worms; Cryptography;
                 cryptography; Data security; encryption; fingerprint
                 readers; Fingerprint recognition; Home computing;
                 Information security; Internet; intruder-proof computer
                 systems; Military computing; research computer network;
                 security of data; Smart cards; smart cards; US military
                 information",
}

@InProceedings{Flajolet:1989:RMS,
  author =       "Philippe Flajolet and Andrew M. Odlyzko",
  editor =       "Jean-Jacques Quisquater and Joos Vandewalle",
  booktitle =    "{EUROCRYPT 1989: Advances in Cryptology --- EUROCRYPT
                 '89: Proceedings of the Workshop on the Theory and
                 Application of Cryptographic Techniques}",
  title =        "Random mapping statistics",
  volume =       "434",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "329--354",
  year =         "1989",
  DOI =          "https://doi.org/10.1007/3-540-46885-4_34",
  bibdate =      "Fri Jul 29 07:49:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       ser-LNCS,
  abstract =     "Random mappings from a finite set into itself are
                 either a heuristic or an exact model for a variety of
                 applications in random number generation, computational
                 number theory, cryptography, and the analysis of
                 algorithms at large. This paper introduces a general
                 framework in which the analysis of about twenty
                 characteristic parameters of random mappings is carried
                 out: These parameters are studied systematically
                 through the use of generating functions and singularity
                 analysis. In particular, an open problem of Knuth is
                 solved, namely that of finding the expected diameter of
                 a random mapping. The same approach is applicable to a
                 larger class of discrete combinatorial models and
                 possibilities of automated analysis using symbolic
                 manipulation systems (``computer algebra'') are also
                 briefly discussed.",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/3-540-46885-4",
  xxDOI =        "https://doi.org/10.5555/111563.111596",
}

@MastersThesis{Frankel:1989:TIC,
  author =       "Yair Frankel",
  title =        "Two issues in cryptology: algebraic analysis of {DES}
                 and a shared public key system",
  type =         "Thesis ({M.S. in Computer Science})",
  school =       "University of Wisconsin-Milwaukee",
  address =      "Milwaukee, WI, USA",
  pages =        "ix + 32",
  year =         "1989",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control; Cryptography",
}

@Book{Gaj:1989:GCM,
  author =       "Kris Gaj",
  title =        "{German} Cipher Machine {Enigma} --- Methods of
                 Breaking",
  publisher =    "Wydawnictwa Komunikacji i Lacznosci",
  address =      "Warszawa, Poland",
  pages =        "????",
  year =         "1989",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Sun Dec 01 09:28:04 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "Polish",
}

@InProceedings{Goldreich:1989:HCP,
  author =       "O. Goldreich and L. A. Levin",
  title =        "A hard-core predicate for all one-way functions",
  crossref =     "ACM:1989:PTF",
  pages =        "25--32",
  year =         "1989",
  bibdate =      "Wed Feb 20 18:33:47 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/73007/p25-goldreich/p25-goldreich.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/73007/p25-goldreich/",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Article{Goldwasser:1989:KCI,
  author =       "Shafi Goldwasser and Silvio Micali and Charles
                 Rackoff",
  title =        "The Knowledge Complexity of Interactive Proof
                 Systems",
  journal =      j-SIAM-J-COMPUT,
  volume =       "18",
  number =       "1",
  pages =        "186--208",
  month =        feb,
  year =         "1989",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68T15 (03F07 68Q15 94A60)",
  MRnumber =     "90f:68157",
  MRreviewer =   "Robert M. Baer",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  abstract =     "Usually, a proof of a theorem contains more knowledge
                 than the mere fact that the theorem is true. For
                 instance, to prove that a graph is Hamiltonian it
                 suffices to exhibit a Hamiltonian tour in it; however,
                 this seems to contain more knowledge than the single
                 bit Hamiltonian\slash non-Hamiltonian. In this paper a
                 computational complexity theory of the `knowledge'
                 contained in a proof is developed. Zero-knowledge
                 proofs are defined as those proofs that convey no
                 additional knowledge other than the correctness of the
                 proposition in question. Examples of zero-knowledge
                 proof systems are given for the languages of quadratic
                 residuosity and quadratic nonresiduosity. These are the
                 first examples of zero-knowledge proofs for languages
                 not known to be efficiently recognizable.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Cambridge, MA, USA",
  classification = "721; 722; 723",
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  journalabr =   "SIAM J Comput",
  keywords =     "Artificial Intelligence --- Applications; Automata
                 Theory; Complexity of Algorithms; Computer Systems,
                 Digital --- Interactive Operation; Cryptography;
                 Interactive Proof Systems; Theorem Proving",
  referencedin = "Referenced in \cite[Ref. 19]{Goldreich:1997:FMCb}.",
}

@Article{Gong:1989:SCB,
  author =       "Li Gong",
  title =        "On security in capability-based systems",
  journal =      j-OPER-SYS-REV,
  volume =       "23",
  number =       "2",
  pages =        "56--60",
  month =        apr,
  year =         "1989",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:40 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Hardjono:1989:TCB,
  author =       "Thomas Hardjono and Jennifer Seberry",
  title =        "Towards the cryptanalysis of {Bahasa Indonesia} and
                 {Malaysia}",
  volume =       "2",
  publisher =    "Centre for Commuter Security Research",
  address =      "Canberra, Australia",
  pages =        "vi + 148",
  year =         "1989",
  ISBN =         "0-7317-0091-0",
  ISBN-13 =      "978-0-7317-0091-2",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "CCSR Tutorial Series in Computer Security",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Article{Harn:1989:PAU,
  author =       "L. Harn and D. Huang and C. S. Laih",
  title =        "Password authentication using public-key
                 cryptography",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "18",
  number =       "12",
  pages =        "1001--1017",
  month =        "????",
  year =         "1989",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 19:01:14 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/089812218990028X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@MastersThesis{Hersch:1989:DSA,
  author =       "Jeffrey Stuart Hersch",
  title =        "Digital signature analysis of radar reflections for
                 the assessment of concrete bridge deck deterioration",
  type =         "Thesis ({M.S.})",
  school =       "Massachusetts Institute of Technology, Department of
                 Civil Engineering",
  address =      "Cambridge, MA, USA",
  pages =        "165",
  year =         "1989",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Supervised by Kenneth R. Maser and Alexander Slocum.",
  acknowledgement = ack-nhfb,
}

@Article{Highland:1989:SDI,
  author =       "Harold Joseph Highland",
  title =        "Secret disk {II} --- administrator",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "7",
  pages =        "563--568",
  month =        nov,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404889900485",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Impagliazzo:1989:ECS,
  author =       "Russell Impagliazzo and Moni Naor",
  title =        "Efficient cryptographic schemes provably as secure as
                 subset sum",
  crossref =     "IEEE:1989:ASF",
  pages =        "236--241",
  year =         "1989",
  ISBN =         "0-8186-1982-1",
  ISBN-13 =      "978-0-8186-1982-3",
  LCCN =         "QA 76 S979 1989",
  bibdate =      "Tue May 12 09:49:52 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  abstract =     "Very efficient constructions, based on the
                 intractability of the subset sum problem for certain
                 dimensions, are shown for a pseudorandom generator and
                 for a universal one-way hash function. (Pseudorandom
                 generators can be used for private key encryption, and
                 universal one-way hash functions for signature
                 schemes). The increase in efficiency in the
                 construction is due to the fact that many bits can be
                 generated\slash hashed with one application of the
                 assumed one-way function. All the constructions can be
                 implemented in NC using an optimal number of
                 processors.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California, Berkeley, CA, USA",
  classification = "723",
  keywords =     "Cryptography; Hash Functions; Private Key Encryption;
                 Pseudorandom Generators; Signature Schemes; Subset Sum
                 Security; Universal One Way Rash Functions",
}

@InProceedings{Impagliazzo:1989:LPC,
  author =       "R. Impagliazzo and S. Rudich",
  title =        "Limits on the Provable Consequences of One-Way
                 Permutations",
  crossref =     "ACM:1989:PTF",
  pages =        "44--61",
  year =         "1989",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 21]{Goldreich:1997:FMCb}.",
}

@InProceedings{Impagliazzo:1989:OWF,
  author =       "R. Impagliazzo and M. Luby",
  title =        "One-way functions are essential for complexity based
                 cryptography",
  crossref =     "IEEE:1989:ASF",
  pages =        "230--235",
  year =         "1989",
  bibdate =      "Thu Apr 5 06:13:40 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Johnson:1989:BDC,
  author =       "Michael Paul Johnson",
  title =        "Beyond {DES}: data compression and the {MPJ}
                 encryption algorithm",
  type =         "Thesis ({M.S.})",
  school =       "University of Colorado at Colorado Springs",
  address =      "Colorado Springs, CO, USA",
  pages =        "viii + 127",
  year =         "1989",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Security measures; Cryptography;
                 Electronic digital computers --- Security measures.",
}

@Article{Kari:1989:CBP,
  author =       "Jarkko Kari",
  booktitle =    "Machines, languages, and complexity (Smolenice,
                 1988)",
  title =        "A cryptosystem based on propositional logic",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "381",
  pages =        "210--219",
  year =         "1989",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "68Q15 (03B05 03D15 68P25)",
  MRnumber =     "91d:68038",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kari:1989:OCP,
  author =       "Jarkko Kari",
  title =        "Observations concerning a public-key cryptosystem
                 based on iterated morphisms",
  journal =      j-THEOR-COMP-SCI,
  volume =       "66",
  number =       "1",
  pages =        "45--53",
  day =          "2",
  month =        aug,
  year =         "1989",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  MRclass =      "68Q45 (68P25)",
  MRnumber =     "91a:68163",
  MRreviewer =   "Rani Siromoney",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C6130 (Data handling techniques)",
  corpsource =   "Dept. of Math., Turku Univ., Finland",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "cryptography; cryptotext; decryption key; iterated
                 morphisms; NP-hard problem; plaintext; public-key
                 cryptosystem; substitutions",
  pubcountry =   "Netherlands",
  treatment =    "P Practical",
}

@InProceedings{Kearns:1989:CLL,
  author =       "M. Kearns and L. G. Valiant",
  title =        "Cryptographic limitations on learning {Boolean}
                 formulae and finite automata",
  crossref =     "ACM:1989:PTF",
  pages =        "433--444",
  year =         "1989",
  bibdate =      "Wed Feb 20 18:33:47 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/73007/p433-kearns/p433-kearns.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/73007/p433-kearns/",
  acknowledgement = ack-nhfb,
}

@TechReport{Kemmerer:1989:AEP,
  author =       "Richard A. Kemmerer",
  title =        "Analyzing encryption protocols using formal
                 verification techniques",
  type =         "Technical report",
  number =       "TRCS 89-4",
  institution =  "Department of Computer Science, College of
                 Engineering, University of California, Santa Barbara",
  address =      "Santa Barbara, CA, USA",
  pages =        "23",
  year =         "1989",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "``This report will appear in IEEE Journal on Selected
                 Areas in Communication.'' ``February 1989.'' Abstract:
                 ``This paper presents an approach to analyzing
                 encryption protocols using machine aided formal
                 verification techniques. The properties that the
                 protocol should preserve are expressed as state
                 invariants and the theorems that must be proved to
                 guarantee that the cryptographic facility satisfies the
                 invariants are automatically generated by the
                 verification system.'' A formal specification of an
                 example system is presented, and several weaknesses
                 that were revealed by attempting to formally verify and
                 test the specification are discussed.``",
  keywords =     "Computer programs --- Verification.",
}

@Article{Kerr:1989:SNM,
  author =       "S. Kerr",
  title =        "A secret no more (security and encryption)",
  journal =      j-DATAMATION,
  volume =       "35",
  number =       "13",
  pages =        "53--55",
  month =        jul,
  year =         "1989",
  CODEN =        "DTMNAT",
  ISSN =         "0011-6963",
  bibdate =      "Sat Sep 14 12:10:21 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C0230 (Economic, social and
                 political aspects); C0310D (Installation management)",
  fjournal =     "Datamation",
  keywords =     "Commercial COMSEC Endorsement Program; Corporate
                 security; Data Encryption Standard; DES; National
                 Security Agency; Viruses",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "DP management; Security of data",
}

@Article{Kim:1989:PRP,
  author =       "Su Hee Kim and Carl Pomerance",
  title =        "The probability that a random probable prime is
                 composite",
  journal =      j-MATH-COMPUT,
  volume =       "53",
  number =       "188",
  pages =        "721--741",
  month =        oct,
  year =         "1989",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  MRclass =      "11Y11 (11A51)",
  MRnumber =     "90e:11190",
  MRreviewer =   "Samuel S. Wagstaff, Jr.",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "C1160 (Combinatorial mathematics); C1140Z (Other and
                 miscellaneous)",
  corpsource =   "Dept. of Comp. Sci., Univ. of Southern Univ.,
                 Columbia, SC, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "composite number; Erd{\H{o}}s; explicit inequalities;
                 number theory; probability; random odd number; random
                 probable prime",
  referencedin = "Referenced in \cite[Ref. 5]{Silverman:1997:FGR}.",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Klein:1989:STR,
  author =       "Shmuel T. Klein and Abraham Bookstein and Scott
                 Deerwester",
  title =        "Storing Text Retrieval Systems on {CD-ROM}.
                 Compression and Encryption Considerations",
  journal =      j-TOIS,
  volume =       "7",
  number =       "3",
  pages =        "230--245",
  month =        jul,
  year =         "1989",
  CODEN =        "ATISET",
  ISSN =         "1046-8188",
  ISSN-L =       "0734-2047",
  bibdate =      "Sat Jan 16 19:04:41 MST 1999",
  bibsource =    "Compendex database;
                 http://www.acm.org/pubs/tois/toc.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Special Issue on Research and Development in
                 Information Retrieval.",
  URL =          "http://www.acm.org:80",
  abstract =     "The emergence of the CD-ROM as a storage medium for
                 full-text databases raises the question of the maximum
                 size database that can be contained by this medium. As
                 an example, the problem of storing the Tr{\'e}sor de la
                 Langue Fran{\c{c}}aise on a CD-ROM is examined.
                 Pertinent approaches to compression of the various
                 files are reviewed, and the compression of the text is
                 related to the problem of data encryption:
                 Specifically, it is shown that, under simple models of
                 text generation, Huffman encoding produces a bit-string
                 indistinguishable from a representation of coin
                 flips.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of Chicago",
  affiliationaddress = "Chicago, IL, USA",
  classification = "723; 741; 903",
  conference =   "SIGIR Conference on Research and Development in
                 Information Retrieval",
  fjournal =     "ACM Transactions on Information Systems",
  journalabr =   "ACM Trans Inf Syst",
  keywords =     "cd-rom; Cryptography; Data Encryption; Data Storage,
                 Optical; Full-Text Storage; Huffman Coding; Information
                 Retrieval Systems --- Database Systems; Information
                 Theory --- Data Compression; Storage Devices; Text
                 Retrieval Systems",
  meetingaddress = "Cambridge, MA, USA",
  meetingdate =  "Jun 1989",
  meetingdate2 = "06/89",
  wwwtitle =     "String Text Retrieval Systems on {CD-ROM}: Compression
                 and Encryption Considerations",
}

@Article{Kochanski:1989:HSI,
  author =       "Martin Kochanski",
  title =        "How safe is it? (computer security)",
  journal =      j-BYTE,
  volume =       "14",
  number =       "6",
  pages =        "257--264",
  month =        jun,
  year =         "1989",
  CODEN =        "BYTEDJ",
  ISSN =         "0360-5280",
  ISSN-L =       "0360-5280",
  bibdate =      "Thu Sep 12 17:54:09 MDT 1996",
  bibsource =    "/usr/local/src/bib/bibliography/Misc/security.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Bus. Simulations Ltd., London, UK",
  classification = "C0230 (Economic, social and political aspects);
                 C0310D (Installation management); C6130 (Data handling
                 techniques)",
  fjournal =     "BYTE Magazine",
  keywords =     "Access control; Appropriate security; Computer
                 networks; Computer security; Encryption methods;
                 Microcomputers; Network security; Passwords; Security
                 measures; Standards; Transparent encryption;
                 Validation",
  thesaurus =    "Computer networks; Microcomputer applications;
                 Security of data; Standards",
}

@Article{Konheim:1989:RMC,
  author =       "Alan G. Konheim",
  title =        "Reviews: {{\em Mathematical Cryptology for Computer
                 Scientists and Mathematicians}}, by {Wayne Patterson};
                 {{\em A Course in Number Theory and Cryptography}}, by
                 {Neal Koblitz}",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "96",
  number =       "4",
  pages =        "374--375",
  month =        apr,
  year =         "1989",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:39:24 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@TechReport{Kordes:1989:UMC,
  author =       "F. L. G. Kordes and J. J. Schuurman",
  title =        "The use of {MEBAS} in creating a simulation
                 environment for compression and encryption",
  type =         "Report",
  number =       "NLR TP 89130 U",
  institution =  "National Lucht-en Ruimtevaartlaboratorium",
  address =      "Amsterdam, The Netherlands",
  pages =        "69",
  year =         "1989",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Cover title.",
  keywords =     "Algorithms --- Testing; Computer simulation ---
                 Testing; Data compression (Computer science)",
}

@Article{Laih:1989:NTS,
  author =       "Chi Sung Laih and Jau Yien Lee and Lein Harn",
  title =        "A new threshold scheme and its application in
                 designing the conference key distribution
                 cryptosystem",
  journal =      j-INFO-PROC-LETT,
  volume =       "32",
  number =       "3",
  pages =        "95--99",
  day =          "24",
  month =        aug,
  year =         "1989",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68P25",
  MRnumber =     "1 013 918",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Natl Chen Kung Univ",
  affiliationaddress = "Tainan, Taiwan",
  classification = "718; 723; B6120B (Codes)",
  corpsource =   "Dept. of Electr. Eng., Nat. Chen Kung Univ., Tainan,
                 Taiwan",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "abnegation incidents; betrayal incidents; conference
                 key distribution cryptosystem; cross-product;
                 Cryptography; cryptography; Data Processing ---
                 Security of Data; Data Processing--Security of Data;
                 multiple users; N-dimensional vector space; property
                 protection; single-system master key; Threshold Scheme;
                 threshold scheme",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Landau:1989:SSC,
  author =       "Charles R. Landau",
  title =        "Security in a secure capability-based system",
  journal =      j-OPER-SYS-REV,
  volume =       "23",
  number =       "4",
  pages =        "2--4",
  month =        oct,
  year =         "1989",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:51 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Leclerc:1989:CRM,
  author =       "Matthias Leclerc",
  title =        "{Chinesische Reste und moderne Kryptographie}.
                 {(German) [Chinese remainders and modern
                 cryptography]}",
  journal =      j-MATH-SEMESTERBER,
  volume =       "36",
  number =       "2",
  pages =        "257--267",
  year =         "1989",
  CODEN =        "????",
  ISSN =         "0720-728X",
  ISSN-L =       "0720-728X",
  MRclass =      "11Y16 (11T71 94A60)",
  MRnumber =     "91d:11163",
  MRreviewer =   "Albrecht Beutelspacher",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematische Semesterberichte",
  language =     "German",
}

@InProceedings{Lee:1989:WBL,
  author =       "T. Paul Lee and R. E. Barkley",
  title =        "A Watermark-based Lazy Buddy System for Kernel Memory
                 Allocation",
  crossref =     "USENIX:1989:UCPb",
  institution =  "AT\&T Bell Laboratories",
  pages =        "1--13",
  month =        "Summer",
  year =         "1989",
  bibdate =      "Wed Aug 13 10:48:45 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.usenix.org/cgi-bin/sortbib.pl?-sA",
  acknowledgement = ack-nhfb,
}

@InProceedings{Lee:1989:WLB,
  author =       "T. Paul Lee and R. E. Barkley",
  title =        "A Watermark-based Lazy Buddy System for Kernel Memory
                 Allocation",
  crossref =     "USENIX:1989:PSU",
  pages =        "1--13",
  month =        "Summer",
  year =         "1989",
  bibdate =      "Tue Feb 20 15:42:13 MST 1996",
  bibsource =    "ftp://ftp.uu.net/library/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "AT\&T Bell Laboratories",
}

@Article{Lu:1989:SCI,
  author =       "W. P. Lu and M. K. Sundareshan",
  title =        "Secure Communication in {Internet} Environments: a
                 Hierarchical Key Management Scheme for {End-to-End}
                 Encryption",
  journal =      j-IEEE-TRANS-COMM,
  volume =       "37",
  number =       "10",
  pages =        "1014--1023",
  day =          "1",
  month =        oct,
  year =         "1989",
  CODEN =        "IECMBT",
  DOI =          "https://doi.org/10.1109/26.41153",
  ISSN =         "0090-6778 (print), 1558-0857 (electronic)",
  ISSN-L =       "0090-6778",
  bibdate =      "Tue Jun 18 10:48:45 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 UnCover library database",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Communications",
}

@Article{Mastrovito:1989:VDM,
  author =       "E. D. Mastrovito",
  title =        "{VLSI} designs for multiplication over finite fields
                 {$ \mathrm {GF}(2^m) $}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "357",
  pages =        "397--309",
  year =         "1989",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Jun 24 21:09:00 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Mendelsohn:1989:CWI,
  editor =       "John Mendelsohn",
  title =        "Covert warfare: intelligence, counterintelligence, and
                 military deception during the {World War II} era",
  publisher =    "Garland",
  address =      "New York, NY, USA",
  pages =        "????",
  year =         "1989",
  ISBN =         "0-8240-7950-7 (vol. 1)",
  ISBN-13 =      "978-0-8240-7950-5 (vol. 1)",
  LCCN =         "D810.S7 C66 1989",
  bibdate =      "Mon May 8 07:05:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$60.00",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Secret service; Sources",
}

@Article{Merkle:1989:CDS,
  author =       "Ralph C. Merkle",
  title =        "A Certified Digital Signature",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "435",
  pages =        "218--238",
  year =         "1989",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/0-387-34805-0_21",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 31 16:04:37 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://link.springer.com/chapter/10.1007/0-387-34805-0_21",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  journal-URL =  "http://link.springer.com/bookseries/558",
  remark =       "Proceedings of the 9th Annual International Cryptology
                 Conference (CRYPTO 89).",
}

@Article{Mitchell:1989:MDS,
  author =       "C. Mitchell",
  title =        "Multi-destination secure electronic mail",
  journal =      j-COMP-J,
  volume =       "32",
  number =       "1",
  pages =        "13--15",
  month =        feb,
  year =         "1989",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/32.1.13",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Dec 4 14:48:26 MST 2012",
  bibsource =    "Compendex database; Distributed/CCR.bib;
                 http://comjnl.oxfordjournals.org/content/32/1.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/",
  URL =          "http://comjnl.oxfordjournals.org/content/32/1/13.full.pdf+html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/tiff/13.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/tiff/14.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/tiff/15.tif",
  abstract =     "Electronic mail messages are often sent to more than
                 one destination; this gives rise to problems when
                 security is required. A recent draft for a standard for
                 securing electronic mail messages suggests a novel
                 mechanism for solving the problem. Unfortunately, as
                 shown herein, the solution is flawed and can allow the
                 construction of fake messages which will pass the
                 authenticity tests. [{\it Ed. Note}: This article
                 describes problems in RFC 989 which are believed to
                 have been fixed by RFC 1040]",
  acknowledgement = ack-nhfb,
  affiliation =  "Hewlett--Packard Labs.",
  affiliationaddress = "Bristol, Engl",
  classcodes =   "B6210G (Electronic mail); C6130 (Data handling
                 techniques)",
  classification = "723; 902; B6210G (Electronic mail); C6130 (Data
                 handling techniques)",
  corpsource =   "Hewlett--Packard Labs., Bristol, UK",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "authenticity tests; Authenticity tests; Cryptography;
                 electronic mail; Electronic Mail; fake; Fake messages;
                 messages; multidestination mail; Multidestination
                 Message Authentication, Multidestination mail; secure
                 electronic mail; Secure Electronic Mail; Secure
                 electronic mail; security of data; standards;
                 Standards",
  thesaurus =    "Electronic mail; Security of data; Standards",
  treatment =    "P Practical",
}

@Article{Mitchell:1989:RHF,
  author =       "Chris Mitchell and Dave Rush and Michael Walker",
  title =        "A Remark on Hash Functions for Message
                 Authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "8",
  number =       "1",
  pages =        "55--58",
  day =          "1",
  month =        feb,
  year =         "1989",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Jan 25 17:38:12 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib; UnCover
                 library database",
  abstract =     "This paper considers the use of hash functions for
                 message authentication. It is shown that a proposed
                 method for using hash functions does not provide a
                 secure non-repudiation service.",
  acknowledgement = ack-nhfb,
  affiliation =  "Hewlett--Packard Ltd",
  affiliationaddress = "Bristol, Engl",
  classification = "723",
  fjournal =     "Computers and Security",
  journalabr =   "Comput Secur",
  keywords =     "Computer Networks --- Protection; Cryptography; Hash
                 Functions; Message Authentication",
}

@Book{Mulligan:1989:UMA,
  editor =       "Timothy Mulligan",
  title =        "{ULTRA}, {MAGIC}, and the {Allies}",
  volume =       "1",
  publisher =    "Garland",
  address =      "New York, NY, USA",
  pages =        "(various)",
  year =         "1989",
  ISBN =         "0-8240-7950-7",
  ISBN-13 =      "978-0-8240-7950-5",
  LCCN =         "D810.S7 C66 1989 vol. 1; D810.C88",
  bibdate =      "Mon May 8 07:05:46 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$60.00",
  series =       "Covert warfare",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Cryptography; Sources; Secret
                 service; Great Britain; United States",
}

@Article{Mullin:1989:LEN,
  author =       "Albert A. Mullin",
  title =        "Letter to the editor: {``The new Mersenne conjecture''
                 [Amer. Math. Monthly {\bf 96} (1989), no. 2, 125--128,
                 MR 90c:11009] by P. T. Bateman, J. L. Selfridge and S.
                 S. Wagstaff, Jr}",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "96",
  number =       "6",
  pages =        "511--511",
  month =        "????",
  year =         "1989",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  MRclass =      "11A51 (11Y11)",
  MRnumber =     "90f:11008",
  MRreviewer =   "Neville Robbins",
  bibdate =      "Wed Dec 3 17:17:33 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Bateman:1989:NMC}. Conjectures that ``$ M_n
                 ( = 2^n - 1) $ is the product of two distinct primes
                 only if $n$ is either a prime $p$ or the square of a
                 prime $q$, in which case precisely one prime factor of
                 $ M_n $ is Mersenne, vis. $ M_q $.''",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@TechReport{Naik:1989:CDS,
  author =       "Varsha Naik",
  title =        "Cryptology in data security environment: what should
                 be the new trend?",
  institution =  "????",
  address =      "????",
  pages =        "63",
  year =         "1989",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Typescript.",
  keywords =     "Cryptography; Data protection; Electronic data
                 processing departments --- Security measures",
}

@InProceedings{Naor:1989:UOH,
  author =       "Moni Naor and Moti Yung",
  title =        "Universal one-way hash functions and their
                 cryptographic applications",
  crossref =     "ACM:1989:PTF",
  pages =        "33--43",
  year =         "1989",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  abstract =     "We define a Universal One-Way Hash Function family, a
                 new primitive which enables the compression of elements
                 in the function domain. The main property of this
                 primitive is that given an element x in the domain, it
                 is computationally hard to find a different domain
                 element which collides with x. We prove constructively
                 that universal one-way hash functions exist if any 1-1
                 one-way functions exist. Among the various applications
                 of the primitive is a One-Way based Secure Digital
                 Signature Scheme, a system which is based on the
                 existence of any 1-1 One-Way Functions and is secure
                 against the most general attack known. Previously, all
                 provably secure signature schemes were based on the
                 stronger mathematical assumption that trapdoor one-way
                 functions exist.",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California",
  affiliationaddress = "Berkeley, CA, USA",
  classification = "723",
  conference =   "Proceedings of the Twenty First Annual ACM Symposium
                 on Theory of Computing",
  conferenceyear = "1989",
  keywords =     "Computer Metatheory; Cryptography; Digital Signatures;
                 Hash Functions; One Way Functions",
  meetingabr =   "Proc Twenty First Annu ACM Symp Theory Comput",
  meetingaddress = "Seattle, WA, USA",
  meetingdate =  "May 15--17 1989",
  meetingdate2 = "05/15--17/89",
  referencedin = "Referenced in \cite[Ref. 25]{Goldreich:1997:FMCb}.",
  sponsor =      "ACM, Special Interest Group for Automata and
                 Computability Theory; SC New York, NY, USA; IEEE,
                 Computer Soc, Los Alamitos, CA, USA",
  xxtitle =      "Universal One-Way Hash Functions and their
                 Cryptographic Application",
}

@InProceedings{Naor:1989:UOW,
  author =       "M. Naor and M. Yung",
  title =        "Universal one-way hash functions and their
                 cryptographic applications",
  crossref =     "ACM:1989:PTF",
  pages =        "33--43",
  year =         "1989",
  bibdate =      "Wed Feb 20 18:33:47 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/73007/p33-naor/p33-naor.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/73007/p33-naor/",
  acknowledgement = ack-nhfb,
}

@TechReport{Nissan:1989:AIM,
  author =       "Ephraim Nissan",
  title =        "Artificial intelligence for a metatheory of
                 interpretation. ({A} knowledge-analysis of {Bernardini
                 Marzolla}'s {Indoglottal} interpretation of {Etruscan}:
                 For a metamodel of interpretation)",
  number =       "Report, 133 p. (available from the author)",
  institution =  "CMS, Univ. of Greenwich, Woolwich, London, UK",
  year =         "1989",
  bibsource =    "ftp://ftp.math.utah.edu/pub/bibnet/authors/e/ephraim-nissan.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  keywords =     "Prakrit hypothesis formation decipher theory formation
                 scientific discourse cultural dynamics Pre-Roman Italy
                 blackboard opportunistic reasoning",
}

@MastersThesis{Norris-Saucedo:1989:DAD,
  author =       "Steven Joseph Norris-Saucedo",
  title =        "Development and application of data encryption using a
                 data shuffling technique",
  type =         "Thesis ({M.S.})",
  school =       "Department of Electrical Engineering, University of
                 Colorado at Denver",
  address =      "Denver, CO, USA",
  pages =        "vii + 94",
  year =         "1989",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Bibliography: leaf 47.",
  keywords =     "Computers --- Access control; Cryptography; Data
                 transmission systems --- Security measures",
}

@Book{Pfleeger:1989:SC,
  author =       "Charles P. Pfleeger",
  title =        "Security in computing",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "xxi + 538",
  year =         "1989",
  ISBN =         "0-13-798943-1",
  ISBN-13 =      "978-0-13-798943-0",
  LCCN =         "QA76.9.A25 P45 1989",
  bibdate =      "Thu Dec 14 18:03:54 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Data protection; Privacy, Right
                 of",
}

@Article{Ponting:1989:TCB,
  author =       "Bob Ponting",
  title =        "Three Companies Break {Adobe} Encryption Scheme",
  journal =      j-INFOWORLD,
  volume =       "11",
  number =       "9",
  pages =        "8--8",
  day =          "2",
  month =        feb,
  year =         "1989",
  CODEN =        "INWODU",
  ISSN =         "0199-6649",
  ISSN-L =       "0199-6649",
  bibdate =      "Thu Feb 11 10:41:08 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/font.bib",
  URL =          "https://books.google.com/books?id=IToEAAAAMBAJ&pg=PT7",
  abstract =     "The technology to produce and render outline fonts in
                 Adobe PostScript's encrypted format is now available
                 from at least three sources, all of which claim to have
                 broken the encoding scheme independently.",
  acknowledgement = ack-nhfb,
  fjournal =     "InfoWorld",
}

@Article{Popentiu:1989:SRK,
  author =       "Fl. Popen{\c{t}}iu",
  title =        "A survey of recent knapsack cryptosystems",
  journal =      "Bul. Inst. Politehn. Bucure{\c{s}}ti Ser. Electron.",
  volume =       "51",
  pages =        "83--90",
  year =         "1989",
  MRclass =      "94A60 (90C09)",
  MRnumber =     "91d:94014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Buletinul Institutului Politehnic Bucure{\c{s}}ti.
                 Seria Electronic{\v{a}}",
}

@TechReport{Posch:1989:AEA,
  author =       "K. C. Posch and R. Posch",
  title =        "Approaching encryption at {ISDN} speed using partial
                 parallel modulus multiplication",
  type =         "IIG report",
  number =       "276",
  institution =  "Institutes for Information Processing Graz",
  address =      "Graz, Austria",
  pages =        "9",
  month =        nov,
  year =         "1989",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Public key systems using modulus arithmetic are quite
                 safe mechanisms for a variety of cryptographic
                 applications. Their main problem is the very long
                 integer arithmetic. In cryptosystems usually
                 serial-parallel multiplication is employed.
                 Serial-parallel multiplication slows down the
                 encryption to the order of k, where k is log[subscript
                 2]n, and n is the modulus. The approach presented in
                 this paper demonstrates a method of using parallel
                 multiplication schemes at the order of log(k) in
                 combination with incomplete modulus reduction. This
                 method calls for redundant number representations. With
                 this background, the problem of designing a quasi
                 optimal scheme fitting into a defined chip area is
                 elaborated. The two methods, the partial parallel
                 multiplication in redundant number representations and
                 incomplete modulus reduction at fully completed
                 multiplication steps only, seem to allow for RSA
                 encryption at ISDN speed and higher.",
  acknowledgement = ack-nhfb,
  keywords =     "Integrated circuits --- Very large scale integration;
                 Parallel processing (Electronic computers)",
}

@InProceedings{Preneel:1989:CHB,
  author =       "Bart Preneel and Antoon Bosselaers and Rene Govaerts
                 and Joos Vandewalle",
  booktitle =    "Proceedings 1989 International Carnahan Conference on
                 Security Technology (Oct 3--5 1989: Zurich,
                 Switzerland)",
  title =        "Collision-free hashfunctions based on blockcipher
                 algorithms",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "203--210",
  year =         "1989",
  bibdate =      "Sat Jan 25 17:38:12 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "IEEE catalog number 89CH2774-8.",
  abstract =     "The use of collision-free hash functions in signature
                 and message authentication schemes is addressed.
                 Applications of hash functions are described, and an
                 overview of proposed hash functions is given. Methods
                 of attack on hash functions are examined, and the
                 properties a hash function must satisfy to be useful
                 for cryptographic applications are set forth. A fast
                 and secure proposal is made for a $ 2 n $-bit
                 collision-free hash function based on an $n$-bit
                 encryption algorithm. In case of the DES (Data
                 Encryption Standard) the length of the results is 128
                 bits, which suffices to thwart a birthday attack.",
  acknowledgement = ack-nhfb,
  affiliation =  "Katholieke Univ Leuven, Lab ESAT, Heverlee, Belg",
  classification = "718; 723",
  conference =   "Proceedings: 1989 International Carnahan Conference on
                 Security Technology",
  conferenceyear = "1989",
  keywords =     "Cryptographic Protocols; Cryptography --- Design; Data
                 Compression; Data Transmission --- Security Systems;
                 Encryption Algorithm; Hash Functions; Information
                 Theory; Message Authentication; Signature
                 Verification",
  meetingabr =   "Proc 1989 Int Carnahan Conf Secur",
  meetingaddress = "Zurich, Switzerland",
  meetingdate =  "Oct 3--5 1989",
  meetingdate2 = "10/3--5/1989",
  publisherinfo = "IEEE Service Center",
  sponsor =      "Schweizerischer Electrotechnischer Verein (SEV),
                 Switzerland",
}

@Article{Press:1989:CRC,
  author =       "William H. Press and Saul A. Teukolsky",
  title =        "Cyclic Redundancy Checks For Data Integrity Or
                 Identity",
  journal =      j-COMPUT-PHYS,
  volume =       "3",
  number =       "4",
  pages =        "88--??",
  month =        jul,
  year =         "1989",
  CODEN =        "CPHYE2",
  DOI =          "https://doi.org/10.1063/1.4822859",
  ISSN =         "0894-1866 (print), 1558-4208 (electronic)",
  ISSN-L =       "0894-1866",
  bibdate =      "Wed Apr 10 08:45:19 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computphys.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://aip.scitation.org/doi/10.1063/1.4822859",
  acknowledgement = ack-nhfb,
  ajournal =     "Comput. Phys",
  fjournal =     "Computers in Physics",
  journal-URL =  "https://aip.scitation.org/journal/cip",
}

@InProceedings{Quisquater:1989:BHF,
  author =       "J. J. Quisquater and M. Girault",
  title =        "$ 2 n $-Bit Hash-Functions Using $n$-Bit Symmetric
                 Block Cipher Algorithms",
  crossref =     "Quisquater:1989:ACE",
  pages =        "??",
  year =         "1989",
  bibdate =      "Sat Jul 16 17:49:05 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Rabin:1989:EDI,
  author =       "Michael O. Rabin",
  title =        "Efficient Dispersal of Information for Security, Load
                 Balancing, and Fault Tolerance",
  journal =      j-J-ACM,
  volume =       "36",
  number =       "2",
  pages =        "335--348",
  month =        apr,
  year =         "1989",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/62050.html",
  abstract =     "An information dispersal algorithm (IDA) is developed
                 that breaks a file F of length L $=$ \$VBAR@F\$VBAR
                 into n pieces F${}_i$, 1 $ l e q $ i $ l e q $ n, each
                 of length \$VBAR@F${}_i$ \$VBAR $=$ L/m, so that all m
                 pieces suffice for reconstructing F. Dispersal and
                 reconstruction are computationally efficient. The sum
                 of the lengths \$VBAR@F${}_i$ \$VBAR is (n/m)\$DOT@L.
                 Since n/m can be chosen to be close to 1, the IDA is
                 space efficient. IDA has numerous applications to
                 secure and reliable storage of information in computer
                 networks and even on single disks, to fault-tolerant
                 and efficient transmission of information in networks,
                 and to communications between processors in parallel
                 computers. For the latter problem provably
                 time-efficient and highly fault-tolerant routing on the
                 n-cube is achieved, using just constant size buffers.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Cambridge, MA, USA",
  classification = "722; 723",
  fjournal =     "Journal of the Association for Computing Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; Codes, Symbolic --- Encoding; Computer
                 Fault Tolerance; Computer Programming --- Algorithms;
                 Computer Security; Computer Systems, Digital; design;
                 Distributed; Distributed Computing; fault tolerance;
                 Information Dispersal Algorithm; Load Balancing;
                 parallel computers; performance; reliability; routing
                 of data; security; storage of data; theory;
                 Verification",
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Security and
                 protection. {\bf E.4}: Data, CODING AND INFORMATION
                 THEORY. {\bf E.3}: Data, DATA ENCRYPTION. {\bf D.4.3}:
                 Software, OPERATING SYSTEMS, File Systems Management,
                 Distributed file systems. {\bf D.4.5}: Software,
                 OPERATING SYSTEMS, Reliability, Fault-tolerance. {\bf
                 D.4.6}: Software, OPERATING SYSTEMS, Security and
                 Protection. {\bf C.2.4}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems, Routing and layout.",
}

@InProceedings{Rabin:1989:VSS,
  author =       "T. Rabin and M. Ben-Or",
  title =        "Verifiable secret sharing and multiparty protocols
                 with honest majority",
  crossref =     "ACM:1989:PEA",
  pages =        "73--85",
  year =         "1989",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 37]{Gemmell:1997:ITC}.",
}

@Article{Rao:1989:PKA,
  author =       "T. R. N. Rao and Kil-Hyun Nam",
  title =        "Private-key algebraic-code encryptions",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-35",
  number =       "4",
  pages =        "829--833",
  year =         "1989",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/18.32159",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60 (11T71 94B05)",
  MRnumber =     "91b:94041",
  MRreviewer =   "Eric Bach",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "IEEE Transactions on Information Theory",
}

@Misc{RFC1113,
  author =       "J. Linn",
  title =        "{RFC 1113}: Privacy enhancement for {Internet}
                 electronic mail: Part {I} --- message encipherment and
                 authentication procedures",
  day =          "1",
  month =        aug,
  year =         "1989",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoleted by RFC1421 \cite{RFC1421}. Obsoletes
                 RFC0989, RFC1040 \cite{RFC0989,RFC1040}. Status:
                 HISTORIC.",
  URL =          "ftp://ftp.internic.net/rfc/rfc1040.txt;
                 ftp://ftp.internic.net/rfc/rfc1113.txt;
                 ftp://ftp.internic.net/rfc/rfc1421.txt;
                 ftp://ftp.internic.net/rfc/rfc989.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1040.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1113.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1421.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc989.txt",
  acknowledgement = ack-nhfb,
  format =       "TXT=89293 bytes",
  obsoletedby =  "Obsoleted by RFC1421 \cite{RFC1421}.",
  obsoletes =    "Obsoletes RFC0989, RFC1040 \cite{RFC0989,RFC1040}.",
  online =       "yes",
  status =       "HISTORIC",
}

@Article{Saks:1989:RNP,
  author =       "Michael Saks",
  title =        "A robust noncryptographic protocol for collective coin
                 flipping",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "2",
  number =       "2",
  pages =        "240--244",
  month =        may,
  year =         "1989",
  CODEN =        "SJDMEC",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  MRclass =      "90D15 (05A99 90C39 90D42)",
  MRnumber =     "90g:90210",
  MRreviewer =   "J. C. Hwang",
  bibdate =      "Thu Apr 9 15:09:27 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjdiscrmath.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
}

@Article{Satyanarayanan:1989:ISL,
  author =       "M. Satyanarayanan",
  title =        "Integrating Security in a Large Distributed System",
  journal =      j-TOCS,
  volume =       "7",
  number =       "3",
  pages =        "247--280",
  month =        aug,
  year =         "1989",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 06:47:30 MST 1999",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tocs/1989-7-3/p247-satyanarayanan/",
  abstract =     "Andrew is a distributed computing environment that is
                 a synthesis of the personal computing and timesharing
                 paradigms. When mature, it is expected to encompass
                 over 5,000 workstations spanning the Carnegie Mellon
                 University campus. This paper examines the security
                 issues that arise in such an environment and describes
                 the mechanisms that have been developed to address
                 them. These mechanisms include the logical and physical
                 separation of servers and clients, support for secure
                 communication at the remote procedure call level, a
                 distributed authentication service, a file-protection
                 scheme that combines access lists with UNIX mode bits,
                 and the use of encryption as a basic building block.
                 The paper also discusses the assumptions underlying
                 security in Andrew and analyzes the vulnerability of
                 the system. Usage experience reveals that resource
                 control, particularly of workstation CPU cycles, is
                 more important than originally anticipated and that the
                 mechanisms available to address this issue are
                 rudimentary.",
  acknowledgement = ack-nhfb,
  affiliation =  "Carnegie Mellon Univ",
  affiliationaddress = "Pittsburgh, PA, USA",
  classification = "722; 723",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  journalabr =   "ACM Trans Comput Syst",
  keywords =     "algorithms; Andrew Distributed Computing Environment;
                 Computer Security; Computer Systems, Digital;
                 Computers, Personal; Cryptography; design; Distributed;
                 security; Time Sharing",
  subject =      "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
                 Protection. {\bf C.0} Computer Systems Organization,
                 GENERAL, Andrew. {\bf D.4.3} Software, OPERATING
                 SYSTEMS, File Systems Management, Distributed file
                 systems. {\bf C.2.4} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
                 {\bf E.3} Data, DATA ENCRYPTION, Data encryption
                 standard (DES)**.",
}

@MastersThesis{Saunders:1989:IDE,
  author =       "Barry Ferguson Saunders",
  title =        "Insection and decryption: {Edgar Poe}'s {{\em The gold
                 bug}} and the diagnostic gaze",
  type =         "Thesis ({M.A.})",
  school =       "University of North Carolina at Chapel Hill",
  address =      "Chapel Hill, NC, USA",
  pages =        "x + 116",
  year =         "1989",
  bibdate =      "Mon Jul 19 08:48:51 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Poe, Edgar Allen, --- 1809-1849. --- Gold bug.",
}

@Book{Seberry:1989:CIC,
  author =       "Jennifer Seberry and Josef Pieprzyk",
  title =        "Cryptography: an introduction to computer security",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "viii + 375",
  year =         "1989",
  ISBN =         "0-13-194986-1",
  ISBN-13 =      "978-0-13-194986-7",
  LCCN =         "QA76.9.A25 S371 1989",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Prentice Hall advances in computer science series",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography",
}

@Article{Seeley:1989:PCG,
  author =       "Donn Seeley",
  title =        "Password cracking: a game of wits",
  journal =      j-CACM,
  volume =       "32",
  number =       "6",
  pages =        "700--703",
  month =        jun,
  year =         "1989",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/63529.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "algorithms; security",
  review =       "ACM CR 9006-0478",
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Security and
                 protection. {\bf D.4.6}: Software, OPERATING SYSTEMS,
                 Security and Protection, Cryptographic controls. {\bf
                 K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Social Issues, Abuse and crime involving computers.",
}

@Article{Shawe-Taylor:1989:BRB,
  author =       "John Shawe-Taylor",
  title =        "Book Review: {{\booktitle{Cryptography: an
                 introduction to computer security}}, by Jennifer
                 Seberry and Josef Pieprzyk. Prentice-Hall
                 International, Hemel Hempstead, United Kingdom, 1988,
                 Price \pounds 17.95 (paperback), ISBN 0-7248-0274-6}",
  journal =      j-SCI-COMPUT-PROGRAM,
  volume =       "12",
  number =       "3",
  pages =        "259--260",
  month =        sep,
  year =         "1989",
  CODEN =        "SCPGD4",
  ISSN =         "0167-6423 (print), 1872-7964 (electronic)",
  ISSN-L =       "0167-6423",
  bibdate =      "Tue Dec 3 07:20:49 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/scicomputprogram.bib;
                 http://www.sciencedirect.com/science/journal/01676423",
  URL =          "http://www.sciencedirect.com/science/article/pii/0167642389900063",
  acknowledgement = ack-nhfb,
  fjournal =     "Science of Computer Programming",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01676423",
}

@TechReport{Shepherd:1989:CSS,
  author =       "S. J. Shepherd and P. W. Sanders",
  title =        "A Comprehensive Security Service - Functional
                 Specification",
  type =         "IBM Internal Document",
  institution =  "IBM (United Kingdom Laboratories)",
  address =      "Hursley Park, Winchester, UK",
  month =        may,
  year =         "1989",
  bibdate =      "Mon Nov 30 07:01:52 1998",
  bibsource =    "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Stephenson:1989:PPM,
  author =       "Peter Stephenson",
  title =        "Personal and private (microcomputer security)",
  journal =      j-BYTE,
  volume =       "14",
  number =       "6",
  pages =        "285--288",
  month =        jun,
  year =         "1989",
  CODEN =        "BYTEDJ",
  ISSN =         "0360-5280",
  ISSN-L =       "0360-5280",
  bibdate =      "Thu Sep 12 17:54:09 MDT 1996",
  bibsource =    "/usr/local/src/bib/bibliography/Misc/security.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "C0230 (Economic, social and political aspects);
                 C0310D (Installation management); C6130 (Data handling
                 techniques)",
  fjournal =     "BYTE Magazine",
  keywords =     "Add-in board; Comspec II; Electronic file cabinet;
                 File Encrypt; Immune system; MailSafe; SecretDisk II;
                 Security program; Viral contamination; Watchdog",
  thesaurus =    "Personal computing; Security of data",
}

@Book{Stoll:1989:CET,
  author =       "Clifford Stoll",
  title =        "The Cuckoo's Egg: Tracking a Spy Through the Maze of
                 Computer Espionage",
  publisher =    pub-DOUBLEDAY,
  address =      pub-DOUBLEDAY:adr,
  pages =        "vi + 326",
  year =         "1989",
  ISBN =         "0-385-24946-2, 0-307-81942-6 (e-book), 0-7434-1145-5,
                 0-7434-1146-3, 1-299-04734-3",
  ISBN-13 =      "978-0-385-24946-1, 978-0-307-81942-0 (e-book),
                 978-0-7434-1145-5, 978-0-7434-1146-2,
                 978-1-299-04734-1",
  LCCN =         "UB271.R92 H477 1989; UB271.R92 H4771 1989; UB271.R92
                 S47 1989",
  bibdate =      "Thu Apr 1 15:18:18 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/internet.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib;
                 melvyl.cdlib.org:210/CDL90",
  price =        "US\$18.95",
  URL =          "http://vxer.org/lib/pdf/The%20Cuckoo%27s%20Egg.pdf",
  abstract =     "This is the true story of how a systems manager at
                 Lawrence Berkeley Lab singlehandedly tracked down and
                 helped capture a computer hacker who had been breaking
                 into U.S. computer systems and stealing sensitive
                 military and security information.",
  acknowledgement = ack-nhfb,
  remark =       "A fascinating real story on computer espionage. A good
                 alternative to this is \cite{Hafner:1991:COH}.",
  subject =      "Stoll, Clifford; Hess, Marcus; espionage, Soviet;
                 United States; Germany; Hannover; defense information,
                 classified; databases; computer crimes",
}

@Book{Stripp:1989:CFE,
  author =       "Alan Stripp",
  title =        "Codebreaker in the {Far East}",
  publisher =    "F. Cass",
  address =      "London, England",
  pages =        "xiv + 204",
  year =         "1989",
  ISBN =         "0-7146-3363-1",
  ISBN-13 =      "978-0-7146-3363-3",
  LCCN =         "D810.C88 S76 1989",
  bibdate =      "Thu Mar 24 03:58:30 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Cass series--studies in intelligence",
  acknowledgement = ack-nhfb,
  subject =      "Stripp, Alan, ; World War, 1939--1945; Cryptography;
                 World War, 1939--1945; Personal narratives, English;
                 World War, 1939--1945; Campaigns; Burma",
  subject-dates = "1924--",
}

@Article{Sun:1989:TKE,
  author =       "Qi Sun and Rong Xiao",
  title =        "Two kinds of elliptic curves over {$ F_q $} used to
                 set up cryptosystems",
  journal =      "Sichuan Daxue Xuebao",
  volume =       "26",
  number =       "1",
  pages =        "39--43",
  year =         "1989",
  CODEN =        "SCTHAO",
  ISSN =         "0490-6756",
  MRclass =      "11T71 (11D25 14G15 94A60)",
  MRnumber =     "90m:11199",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Journal of Sichuan University. Natural Science
                 Edition. Sichuan Daxue Xuebao. Ziran Kexue Ban",
}

@Article{Tsudik:1989:DAI,
  author =       "G. Tsudik",
  title =        "Datagram Authentication in {Internet} Gateways:
                 Implications of Fragmentation and Dynamic Routing",
  journal =      j-IEEE-J-SEL-AREAS-COMMUN,
  volume =       "7",
  number =       "4",
  pages =        "499--??",
  day =          "1",
  month =        may,
  year =         "1989",
  CODEN =        "ISACEM",
  ISSN =         "0733-8716",
  ISSN-L =       "0733-8716",
  bibdate =      "Tue Jun 18 10:48:45 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 UnCover library database",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Journal on Selected Areas in Communications",
}

@Manual{USDOA:1989:BC,
  author =       "{United States.Dept.of the Army} and {United States
                 Army Intelligence School}",
  title =        "Basic cryptanalysis",
  organization = "United States Army Intelligence School",
  address =      "Fort Devens, Ma.",
  edition =      "Coordinating draft.",
  pages =        "various",
  year =         "1989",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "FM; 34-40-2 United States. Dept. of the Army. Field
                 manual; 34-40-2",
  acknowledgement = ack-nhfb,
  annote =       "``31 March 1989'' Cover title.",
  keywords =     "Cryptography --- Military aspects --- Handbooks,
                 manuals, etc; Security systems --- Military aspects ---
                 Handbooks, manuals, etc; United States. --- Army ---
                 Handbooks, manuals, etc",
}

@InProceedings{Vallee:1989:HGR,
  author =       "Brigitte Vall{\'e}e and Marc Girault and Philippe
                 Toffin",
  title =        "How to guess $l$ th roots modulo $n$ by reducing
                 lattice bases",
  crossref =     "Mora:1989:AAA",
  pages =        "427--442",
  year =         "1989",
  MRclass =      "11Y16 (11H06 68P25)",
  MRnumber =     "90k:11168",
  MRreviewer =   "Istv{\'a}n Ga{\'a}l",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Watler:1989:VAC,
  author =       "Miguel Watler",
  title =        "{VLSI} architectures and circuits for {RSA}
                 encryption",
  type =         "Thesis ({M.Sc.})",
  publisher =    "National Library of Canada",
  school =       "Queen's University",
  address =      "Ottawa, ON, Canada",
  pages =        "137",
  year =         "1989",
  ISBN =         "0-315-53412-5",
  ISBN-13 =      "978-0-315-53412-4",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Canadian theses = Th{\`e}ses canadiennes",
  acknowledgement = ack-nhfb,
}

@Book{Welsh:1989:CC,
  author =       "Dominic Welsh",
  title =        "Codes and cryptography",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "ix + 257",
  year =         "1989",
  ISBN =         "0-19-853287-3 (paperback)",
  ISBN-13 =      "978-0-19-853287-3 (paperback)",
  LCCN =         "Z 103 W46 1989",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted with corrections.",
  series =       "Oxford science publications",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Winterbotham:1989:US,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Ultra} spy",
  publisher =    "Macmillan",
  address =      "London, UK",
  pages =        "258 + 8",
  year =         "1989",
  ISBN =         "0-333-51425-4",
  ISBN-13 =      "978-0-333-51425-2",
  LCCN =         "UB271.G72 W564 1989",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  price =        "US\$12.95",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
  subject =      "Intelligence officers; Great Britain; Biography;
                 Espionage, British; History; 20th century; World War,
                 1939-1945; Cryptography; Personal narratives, British;
                 Winterbotham, F. W; (Frederick William)",
}

@Book{Wrixon:1989:CCS,
  author =       "Fred B. Wrixon",
  title =        "Codes, ciphers, and secret language",
  publisher =    "Harrap",
  address =      "London, UK",
  pages =        "266",
  year =         "1989",
  ISBN =         "0-245-54880-7",
  ISBN-13 =      "978-0-245-54880-2",
  LCCN =         "Z103 .W77 1989b",
  bibdate =      "Sat Apr 20 11:59:26 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Yu:1989:DEB,
  author =       "K. W. Yu and T. L. Yu",
  title =        "Data encryption based upon time reversal
                 transformations",
  journal =      j-COMP-J,
  volume =       "32",
  number =       "3",
  pages =        "241--245",
  month =        jun,
  year =         "1989",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Appl. Sci., Hong Kong Polytech., Hong Kong",
  classcodes =   "B6120B (Codes); C6130 (Data handling techniques)",
  classification = "B6120B (Codes); C6130 (Data handling techniques)",
  corpsource =   "Dept. of Appl. Sci., Hong Kong Polytech., Hong Kong",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "computer network; Computer network; confidential data;
                 Confidential data; conservative system; Conservative
                 system; cryptography; data encryption model; Data
                 encryption model; dynamics; Dynamics; incomprehensible
                 form; Incomprehensible form; iterations; Iterations;
                 iterative methods; mechanical system; Mechanical
                 system; second order equations; Second order equations;
                 time reversal; Time reversal transformations;
                 transformations",
  thesaurus =    "Cryptography; Iterative methods",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Abraham:1991:TSS,
  author =       "D. G. Abraham and G. M. Dolan and G. P. Double and J.
                 V. Stevens",
  title =        "{Transaction Security System}",
  journal =      j-IBM-SYS-J,
  volume =       "30",
  number =       "2",
  pages =        "206--229",
  year =         "1991",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Tue Mar 19 17:38:46 1996",
  bibsource =    "https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Misc/ibmsysj.bib;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Theory/cryptography.bib;
                 https://www.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Theory/CRYPTOGRAPHY/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib;
                 https://www.math.utah.edu/pub/tex/bib/rexx.bib",
  note =         "See erratum \cite{Anonymous:1991:ESS}.",
  abstract =     "Components of previous security systems were designed
                 independently from one another and were often difficult
                 to integrate. Described is the recently available IBM
                 transaction security system. It implements the common
                 cryptographic architecture and offers a comprehensive
                 set of security products that allow users to implement
                 end-to-end secure systems with IBM components. The
                 system includes a mainframe host-attached network
                 security processor, high-performance encryption
                 adapters for the IBM personal computer and Personal
                 System/2. Micro Channel, an RS-232 attached security
                 interface unit, and a credit-card size state-of-the-art
                 personal security card containing a high-performance
                 microprocessor. The application programming interface
                 provides common programming in the host and the
                 workstation and supports all of the systems application
                 architecture languages except REXX and RPG.
                 Applications may be written to run on multiple virtual
                 storage (MVS) and PC DOS operating systems.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM Services Sector Div., Charlotte, NC, USA",
  classification = "C6130 (Data handling techniques)",
  fjournal =     "IBM Systems Journal",
  keywords =     "Application programming interface; Common
                 cryptographic architecture; Encryption adapters;
                 End-to-end secure systems; IBM transaction security
                 system; Multiple virtual storage; PC DOS operating
                 systems; REXX; RPG; RS-232 attached security interface
                 unit; Security products; Systems application
                 architecture languages; Transaction security system",
  language =     "English",
  pubcountry =   "USA",
  thesaurus =    "Security of data; Transaction processing",
}

@Article{Callimahos:1992:HC,
  author =       "Lambros D. Callimahos",
  title =        "A History of Cryptology",
  journal =      j-CRYPTOLOG,
  volume =       "19",
  number =       "3",
  pages =        "23--35",
  month =        jun,
  year =         "1992",
  ISSN =         "0740-7602",
  ISSN-L =       "0740-7602",
  bibdate =      "Sun Dec 24 09:26:32 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://archive.org/download/cryptolog_125/cryptolog_125.pdf",
  acknowledgement = ack-nhfb,
}

@Misc{RFC1421,
  author =       "J. Linn",
  title =        "{RFC 1421}: Privacy Enhancement for {Internet}
                 Electronic Mail: Part {I}: Message Encryption and
                 Authentication Procedures",
  month =        feb,
  year =         "1993",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoletes RFC1113 \cite{RFC1113}. Status: PROPOSED
                 STANDARD.",
  URL =          "ftp://ftp.internic.net/rfc/rfc1113.txt;
                 ftp://ftp.internic.net/rfc/rfc1421.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1113.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1421.txt",
  acknowledgement = ack-nhfb,
  format =       "TXT=103894 bytes",
  obsoletes =    "Obsoletes RFC1113 \cite{RFC1113}.",
  online =       "yes",
  status =       "PROPOSED STANDARD",
}

@Misc{StJohns:1993:RIP,
  author =       "M. {St. Johns}",
  title =        "{RFC 1413}: Identification Protocol",
  month =        jan,
  year =         "1993",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoletes RFC0931 \cite{StJohns:1985:RAS}. Status:
                 PROPOSED STANDARD.",
  URL =          "ftp://ftp.internic.net/rfc/rfc1413.txt;
                 ftp://ftp.internic.net/rfc/rfc931.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1413.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  format =       "TXT=16291 bytes",
  obsoletes =    "Obsoletes RFC0931 \cite{StJohns:1985:RAS}.",
  online =       "yes",
  status =       "PROPOSED STANDARD",
}

@Book{Kahn:1996:CSS,
  author =       "David Kahn",
  title =        "The codebreakers: the story of secret writing",
  publisher =    "Scribner",
  address =      "New York, NY, USA",
  edition =      "Revised",
  pages =        "xviii + 1181",
  year =         "1996",
  ISBN =         "0-684-83130-9",
  ISBN-13 =      "978-0-684-83130-5",
  LCCN =         "Z103 .K28 1996",
  bibdate =      "Thu Apr 29 18:02:15 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  note =         "See \cite{Tuchman:1966:ZT}.",
  acknowledgement = ack-nhfb,
}

@Book{Beckett:1997:ICP,
  author =       "Brian Beckett",
  title =        "Introduction to cryptolology and {PC} security",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "viii + 356",
  year =         "1997",
  ISBN =         "0-07-709235-X (hardback)",
  ISBN-13 =      "978-0-07-709235-1 (hardback)",
  LCCN =         "QA76.9.A25 B43 1997",
  bibdate =      "Thu Oct 31 17:34:21 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Updated edition of {\em Introduction to cryptology\/}
                 \cite{Beckett:1988:IC}.",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; data protection",
}

@Article{Schneier:1997:RAS,
  author =       "Bruce Schneier and John Kelsey",
  title =        "Remote Auditing of Software Outputs Using a Trusted
                 Coprocessor",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "13",
  number =       "1",
  pages =        "9--18",
  day =          "20",
  month =        jun,
  year =         "1997",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Feb 27 12:41:17 MST 2002",
  bibsource =    "ftp://ftp.ira.uka.de/bibliography/Theory/cryptography.bib;
                 ftp://ftp.ira.uka.de/bibliography/Theory/CRYPTOGRAPHY/cryptography.bib;
                 http://www.elsevier.com/locate/issn/0167739X;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.counterpane.com/remote_auditing.html;
                 http://www.elsevier.com/gej-ng/10/19/19/28/17/17/abstract.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
  remark =       "Smart Cards.",
}

@Article{Alexandre:1998:JBP,
  author =       "Thomas J. Alexandre",
  title =        "A {Java}-based platform for intellectual property
                 protection on the {World Wide Web}",
  journal =      j-COMP-NET-ISDN,
  volume =       "30",
  number =       "1--7",
  pages =        "591--593",
  day =          "1",
  month =        apr,
  year =         "1998",
  CODEN =        "CNISE9",
  ISSN =         "0169-7552 (print), 1879-2324 (electronic)",
  ISSN-L =       "0169-7552",
  bibdate =      "Fri Sep 24 20:22:05 MDT 1999",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.elsevier.com/cgi-bin/cas/tree/store/cna/cas_free/browse/browse.cgi?year=1998&volume=30&issue=1-7;
                 https://www.math.utah.edu/pub/tex/bib/compnetisdn.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/072101.html;
                 http://www.elsevier.com/cas/tree/store/comnet/sub/1998/30/1-7/1863.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks and ISDN Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01697552",
  keywords =     "information hiding; steganography",
}

@Article{Even:1998:FVA,
  author =       "S. Even",
  title =        "Four value-adding algorithms",
  journal =      j-IEEE-SPECTRUM,
  volume =       "35",
  number =       "5",
  pages =        "33--38",
  month =        may,
  year =         "1998",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/6.669974",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Thu Jan 16 07:37:23 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography1990.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Code standards; cryptography; data compression; EFT
                 based systems; electronic wallet; Encoding; encryption;
                 Fiat-Shamir ID protocol; Huffman codes; Internet;
                 Jacobian matrices; Lempel--Ziv solution; magnetic
                 cards; Modems; proof of identification; protocols;
                 randomised algorithms; value-adding algorithms",
}

@Article{Plimmer:1998:MIW,
  author =       "Beryl Plimmer",
  title =        "Machines invented for {WW II} code breaking",
  journal =      j-SIGCSE,
  volume =       "30",
  number =       "4",
  pages =        "37--40",
  month =        dec,
  year =         "1998",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/306286.306309",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 16:56:35 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse.bib",
  abstract =     "In 1944 a computer was commissioned at Bletchley Park
                 in England. This computer was designed specifically to
                 find the settings used by German cipher machines to
                 encrypt messages, which it did very effectively. Before
                 ``Colossus'' the Polish and British military had
                 developed mechanical machines to aid with cryptography.
                 All of this work was top secret and only with the
                 recent release of documents has the true significance
                 of these machines and the people who created them been
                 appreciated.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
}

@InProceedings{deRaadt:1999:COO,
  author =       "Theo de Raadt and Niklas Hallqvist and Artur Grabowski
                 and Angelos D. Keromytis and Niels Provos",
  title =        "Cryptography in {OpenBSD}: An Overview",
  crossref =     "USENIX:1999:UAT",
  pages =        "93--101",
  year =         "1999",
  bibdate =      "Thu Feb 24 11:35:57 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.openbsd.org/papers/crypt-paper.ps",
  acknowledgement = ack-nhfb,
  keywords =     "/dev/arandom; /dev/random; /dev/srandom; /dev/urandom;
                 arc4random(); bcrypt(); IPsec; MD5; nonrepeating random
                 numbers; S/KEY one-time password system; SHA1; SSL",
}

@TechReport{Turing:1999:TTE,
  author =       "Alan Turing",
  title =        "{Turing}'s Treatise on {Enigma}",
  institution =  "CERN",
  address =      "Geneva, Switzerland",
  year =         "1999",
  bibdate =      "Mon Aug 30 18:03:48 1999",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This document is retyped from the original (undated??)
                 Turing typescript by the editors Ralph Erskine, Philip
                 Marks and Frode Weierud. Chapters 1, 2, and 6 (of 8)
                 are available; the remainder are in preparation.",
  URL =          "http://home.cern.ch/~frode/crypto/Turing/index.html",
  acknowledgement = ack-nhfb,
}

@Unpublished{Rejewski:19xx:EMH,
  author =       "Marian Rejewski",
  title =        "{Enigma} (1930--40). Method and history of solving the
                 {German} machine cipher",
  year =         "19xx",
  bibdate =      "Sun Dec 01 09:59:56 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Unpublished manuscript in Polish",
  acknowledgement = ack-nhfb,
  language =     "Polish",
}

@Unpublished{Ritchie:19xx:DCW,
  author =       "Dennis M. Ritchie",
  title =        "Dabbling in the Cryptographic World --- {A} Story",
  year =         "19xx",
  bibdate =      "Thu Apr 29 18:06:00 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This undated note describes the interesting history
                 behind the non-publication of a paper
                 \cite{Reeds:1978:HCM} on the Hagelin cypher machine
                 (M-209), submitted to the journal Cryptologia, because
                 of shadowy suggestions of a ``retired gentleman from
                 Virginia''.",
  URL =          "http://www.cs.bell-labs.com/~dmr/crypt.html",
  acknowledgement = ack-nhfb,
}

@Article{Ellison:2000:PSK,
  author =       "Carl Ellison and Chris Hall and Randy Milbert and
                 Bruce Schneier",
  title =        "Protecting Secret Keys with Personal Entropy",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "16",
  number =       "4",
  pages =        "311--318",
  month =        feb,
  year =         "2000",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Feb 27 12:41:19 MST 2002",
  bibsource =    "ftp://ftp.ira.uka.de/bibliography/Misc/security.2.bib;
                 ftp://ftp.ira.uka.de/bibliography/Theory/cryptography.bib;
                 ftp://ftp.ira.uka.de/bibliography/Theory/CRYPTOGRAPHY/cryptography.bib;
                 http://www.elsevier.com/locate/issn/0167739X;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.counterpane.com/personal-entropy.pdf;
                 http://www.elsevier.com/gej-ng/10/19/19/41/27/26/abstract.html",
  abstract-1 =   "Conventional encryption technology often requires
                 users to protect a secret key by selecting a password
                 or passphrase. While a good passphrase will only be
                 known to the user, it also has the flaw that it must be
                 remembered exactly in order to recover the secret key.
                 As time passes, the ability to remember the passphrase
                 fades and the user may eventually lose access to the
                 secret key. We propose a scheme whereby a user can
                 protect a secret key using the ``personal entropy'' in
                 his own life, by encrypting the passphrase using the
                 answers to several personal questions. We designed the
                 scheme so the user can forget answers to a subset of
                 the questions and still recover the secret key, while
                 an attacker must learn the answer to a large subset of
                 the questions in order to recover the secret key.",
  abstract-2 =   "Split a secret using standard (not with cheater
                 detection!) (n,t) threshold secret-sharing and encrypt
                 them with multiple passwords. Main (only?) advantage
                 over a system using a passphrase of length t
                 (threshold) is that the system inhibits some
                 fault-tolerance against forgetting (at most n-t)
                 password. To make the set of password manageable they
                 use a set of hints (e.g., general questions). [However
                 they didn't explore how much this constrains the
                 dictionaries or how independent passwords will be]. The
                 system was proposed in 1996 and has been implemented.
                 See also \cite{BleNgu2000} for some attacks.",
  acknowledgement = ack-nhfb,
  added-at =     "Wed Oct 6 12:24:48 1999",
  added-by =     "sti",
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Book{Rand:2001:MRD,
  author =       "{Rand Corporation}",
  title =        "A Million Random Digits With 100,000 Normal Deviates",
  publisher =    "Rand Corporation",
  address =      "Santa Monica, CA, USA",
  pages =        "xxv + 400 + 200",
  year =         "2001",
  ISBN =         "0-8330-3047-7",
  ISBN-13 =      "978-0-8330-3047-4",
  LCCN =         "QA276.25 .M55 2001",
  bibdate =      "Sat Aug 23 07:58:03 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also \cite{Rand:1955:MRD}.",
  acknowledgement = ack-nhfb,
}

@Article{Mori:2002:CSD,
  author =       "G. Mori and F. Paterno and C. Santoro",
  title =        "{CTTE}: support for developing and analyzing task
                 models for interactive system design",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "28",
  number =       "8",
  pages =        "797--813",
  month =        aug,
  year =         "2002",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/TSE.2002.1027801",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 11:00:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2000.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1027801",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@Article{Bergmann:2009:DKR,
  author =       "Seth D. Bergmann",
  title =        "Degenerate keys for {RSA} encryption",
  journal =      j-SIGCSE,
  volume =       "41",
  number =       "2",
  pages =        "95--98",
  month =        jun,
  year =         "2009",
  CODEN =        "SIGSD3",
  DOI =          "https://doi.org/10.1145/1595453.1595483",
  ISSN =         "0097-8418 (print), 2331-3927 (electronic)",
  ISSN-L =       "0097-8418",
  bibdate =      "Sat Nov 17 15:44:23 MST 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse.bib",
  abstract =     "Some keys for the RSA public key cryptosystem fail to
                 encrypt all possible plaintext messages. A necessary
                 and sufficient condition for these degenerate keys is
                 given. The probability of choosing such a key, when
                 choosing keys at random, is presented. The impact of
                 degenerate keys in an academic setting is discussed.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGCSE Bulletin (ACM Special Interest Group on
                 Computer Science Education)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J688",
  remark =       "This paper points out that the some keys in the RSA
                 may fail to encrypt: instead, they produce an output
                 ciphertext that is identical to the input plaintext.
                 See also \cite{Blakley:1979:RSA,Smith:1979:UFM}",
}

%%% ====================================================================
%%% Cross-referenced entries must come last:
@Proceedings{IEEE:1974:ASS,
  editor =       "{IEEE}",
  booktitle =    "15th Annual Symposium on Switching and Automata
                 Theory, October 14--16, 1974, the University of New
                 Orleans",
  title =        "15th Annual Symposium on Switching and Automata
                 Theory, October 14--16, 1974, the University of New
                 Orleans",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "v + 211",
  year =         "1974",
  bibdate =      "Fri Sep 16 12:07:41 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Session I: --- A Two-dimensional Generating System
                 Modeling Growth By Binary Cell Division --- on the
                 Power of Multiplication in Random Access Machines ---
                 the Equivalence Problem For Regular Expressions Over
                 One Letter in Elementary --- P-complete Problems and
                 Approximate Solutions --- Approximate Algorithms For
                 the Traveling Salesperson Problem Session II: ---
                 Relationships Between Monadic Recursion Schemes and
                 Deterministic Context-free Languages --- Recursive
                 Schemes, Algebraic Trees and Deterministic Languages
                 --- Initial Algebra Semantics --- Axiomatic Equivalence
                 of Programs With Structured Variables --- Janov Schemas
                 Augmented By A Pushdown Memory Session III: --- on
                 Hash-coding Algorithms For Partial-match Retrieval ---
                 Bounds on the Complexity of the Longest Common
                 Subsequence Problem --- Bounds on Selection Networks
                 --- on the Computational Complexity of Finding the
                 Maxima of A Set of Vectors --- on Self-organizing
                 Sequential Search Heuristics --- Operations on Sparse
                 Relations and Efficient Algorithms For Grammar Problems
                 Session IV: --- Minimization of Fanout in Switching
                 Networks --- Combinatorial Complexity of Some Monotone
                 Functions --- on Boolean Functions Having Maximal
                 Number of Subfunction Classes --- A Comparative Study
                 of Models of Parallel Computation --- the Recursive
                 Equivalence of the Reachability Problem and the
                 Liveness Problem Session V: --- Non-complex Sequences:
                 Characterization and Examples --- Two-way Deterministic
                 Pushdown Automata Languages and Some Open Problems in
                 the Theory of Computation --- `natural' Properties of
                 Flowchart Complexity Measures --- Skeletal Lr Parsing
                 --- Characterization of Context-free Grammatical
                 Families.",
  descriptor =   "Deterministische Sprache, Funktion, Grammatik,
                 Komplexitaet, Kontextfreie Sprache, Monotone Funktion,
                 P-complete, Parallelverarbeitung, Parser,
                 Rekursionsschema, Semantik, Sprache,
                 Travelling-salesman, Zellteilung",
}

@Proceedings{Kerr:1975:PIC,
  editor =       "Douglas S. Kerr",
  booktitle =    "Proceedings of the International Conference on Very
                 Large Data Bases, Framingham, {MA}, {USA}, September
                 22--24, 1975",
  title =        "Proceedings of the International Conference on Very
                 Large Data Bases, Framingham, {MA}, {USA}, September
                 22--24, 1975",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "viii + 592",
  year =         "1975",
  ISBN =         "????",
  ISBN-13 =      "????",
  ISSN =         "0278-2596",
  LCCN =         "QA76.9.D3 I55 1975",
  bibdate =      "Tue Nov 05 09:31:50 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$15.00",
  acknowledgement = ack-nhfb,
}

@Proceedings{Hartnell:1976:PFM,
  editor =       "B. L. Hartnell and H. C. Williams",
  booktitle =    "Proceedings of the Fifth Manitoba Conference on
                 Numerical Mathematics, October 1--4, 1975",
  title =        "Proceedings of the Fifth Manitoba Conference on
                 Numerical Mathematics, October 1--4, 1975",
  volume =       "16",
  publisher =    "Utilitas Mathematica Publishers",
  address =      "Winnipeg, MN, Canada",
  pages =        "",
  year =         "1976",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Congressus Numerantium",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Odlyzko:1995:FIF}.",
}

@Proceedings{Branstad:1977:RWC,
  editor =       "Dennis K. Branstad and Jason Gait and Stuart Katzke",
  booktitle =    "Report of the Workshop on Cryptography in Support of
                 Computer Security, held at the {National Bureau of
                 Standards, September 21--22, 1976}",
  title =        "Report of the Workshop on Cryptography in Support of
                 Computer Security, held at the {National Bureau of
                 Standards, September 21--22, 1976}",
  publisher =    pub-NBS,
  address =      pub-NBS:adr,
  pages =        "iv + 52",
  year =         "1977",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "``NBSIR 77-1291.'' ``Workshop was organized to obtain
                 expert opinions on \ldots{} the proposed Data
                 Encryption Standard.'' Photocopy. Springfield, Va.:
                 National Technical Information Service, U.S. Dept of
                 Commerce. --- iv, 57 p; 28 cm. ``PB-271 744.''",
  keywords =     "Computers --- Access control --- Congresses;
                 Cryptography --- Congresses.",
}

@Proceedings{Anonymous:1978:CSD,
  editor =       "Anonymous",
  booktitle =    "Computer security and the {Data Encryption Standard}:
                 proceedings of the Conference on Computer Security and
                 the Data Encryption Standard held at the National
                 Bureau of Standards in Gaithersburg, Maryland, on
                 February 15, 1977",
  title =        "Computer security and the {Data Encryption Standard}:
                 proceedings of the Conference on Computer Security and
                 the Data Encryption Standard held at the National
                 Bureau of Standards in Gaithersburg, Maryland, on
                 February 15, 1977",
  volume =       "500-27",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "viii + 125",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "NBS special publication, computer science and
                 technology",
  acknowledgement = ack-nhfb,
  annote =       "Microfiche. Springfield, Va.: National Technical
                 Information Services, 1978. 2 microfiches; 11 x 15 cm.
                 (PB-277 695)",
  keywords =     "Computers --- Access control --- Passwords.",
}

@Proceedings{IEEE:1979:ASF,
  editor =       "{IEEE}",
  booktitle =    "20th Annual Symposium on Foundations of Computer
                 Science: Oct. 29--31, 1979, San Juan, Puerto Rico",
  title =        "20th Annual Symposium on Foundations of Computer
                 Science: Oct. 29--31, 1979, San Juan, Puerto Rico",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "vii + 431",
  year =         "1979",
  CODEN =        "ASFPDV",
  ISBN =         "????",
  ISBN-13 =      "????",
  ISSN =         "0272-5428",
  LCCN =         "QA267 .S95 1979; TK7885.A1 S92 1979",
  bibdate =      "Thu Dec 3 07:11:18 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "algorithms --- congresses; computational complexity
                 --- congresses; electronic data processing ---
                 congresses; electronic digital computers ---
                 programming --- congresses; machine theory ---
                 congresses",
}

@Proceedings{Merwin:1979:NCC,
  editor =       "Richard E. Merwin and Jacqueline T. Zanca and Merlin.
                 Smith",
  booktitle =    "1979 National Computer Conference: June 4--7, 1979,
                 New York, New York",
  title =        "1979 National Computer Conference: June 4--7, 1979,
                 New York, New York",
  volume =       "48",
  publisher =    pub-AFIPS,
  address =      pub-AFIPS:adr,
  pages =        "1095",
  year =         "1979",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AFIPS Conference proceedings",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL}.",
}

@Proceedings{IEEE:1980:PSS,
  editor =       "{IEEE}",
  booktitle =    "Proceedings of the 1980 Symposium on Security and
                 Privacy, April 14--16, 1980 Oakland, California",
  title =        "Proceedings of the 1980 Symposium on Security and
                 Privacy, April 14--16, 1980 Oakland, California",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "viii + 167",
  year =         "1980",
  LCCN =         "QA76.9.A25S95 1980",
  bibdate =      "Tue Nov 24 06:54:24 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 22]{Goldreich:1997:FMCb}.",
  xxISBN =       "none",
}

@Proceedings{IEEE:1981:CLC,
  editor =       "{IEEE}",
  booktitle =    "6th Conference on Local Computer Networks, Hilton Inn,
                 Minneapolis, Minnesota, October 12--14, 1981",
  title =        "6th Conference on Local Computer Networks, Hilton Inn,
                 Minneapolis, Minnesota, October 12--14, 1981",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "v + 111",
  year =         "1981",
  CODEN =        "CLCPDN",
  LCCN =         "TK 5105.5 C66 1981",
  bibdate =      "Sat Sep 25 20:21:07 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "IEEE catalog no. 81CH1690-7.",
  acknowledgement = ack-nhfb,
  classification = "723",
  conference =   "6th Conference on Local Computer Networks",
  conflocation = "Minneapolis, MN, USA",
  journalabr =   "Conf Local Comput Networks",
  keywords =     "computer networks; control; distributed computer
                 systems; local networks; network architecture; network
                 design; performance; protocols; simulation",
  meetingaddress = "Minneapolis, MN, USA",
  pagecount =    "111",
  sponsor =      "Univ of Minn, Comput Cent, Minneapolis, USA; IEEE,
                 Twin Cities Chapter, USA; IEEE Comput Soc Tech Comm on
                 Comput Commun, Los Alamitos, Calif, USA",
  xxISBN =       "none",
}

@Proceedings{ACM:1982:PFA,
  editor =       "{ACM}",
  booktitle =    "Proceedings of the fourteenth annual {ACM} Symposium
                 on Theory of Computing, San Francisco, California, May
                 5--7, 1982",
  title =        "Proceedings of the fourteenth annual {ACM} Symposium
                 on Theory of Computing, San Francisco, California, May
                 5--7, 1982",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "v + 408",
  year =         "1982",
  ISBN =         "0-89791-070-2",
  ISBN-13 =      "978-0-89791-070-5",
  LCCN =         "QA75.5 .A14 1982",
  bibdate =      "Thu Dec 3 07:11:18 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "ACM order no. 508820.",
  acknowledgement = ack-nhfb,
  keywords =     "computational complexity --- congresses; programming
                 (electronic computers) --- congresses",
}

@Proceedings{Ciampi:1982:EVS,
  editor =       "Constantino Ciampi and A. A. Martino",
  booktitle =    "Edited versions of selected papers from the
                 International Conference on {``Logic}, Informatics,
                 Law,'' Florence, Italy, April 6--10, 1981",
  title =        "Edited versions of selected papers from the
                 International Conference on {``Logic}, Informatics,
                 Law,'' Florence, Italy, April 6--10, 1981",
  publisher =    pub-ESP,
  address =      pub-ESP:adr,
  pages =        "various",
  year =         "1982",
  ISBN =         "0-444-86413-X (set), 0-444-86414-8 (vol. 1),
                 0-444-86415-6 (vol. 2)",
  ISBN-13 =      "978-0-444-86413-0 (set), 978-0-444-86414-7 (vol. 1),
                 978-0-444-86415-4 (vol. 2)",
  LCCN =         "K662.I4 I58",
  bibdate =      "Wed May 22 10:09:08 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Two volumes. Vol. 1: Artificial intelligence and legal
                 information systems. Vol. 2: Deontic logic,
                 computational linguistics, and legal information
                 systems.",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:1982:ASF,
  editor =       "{IEEE}",
  key =          "IEEE-FOCS'82",
  booktitle =    "23rd annual Symposium on Foundations of Computer
                 Science, November 3--5, 1982, Chicago, Illinois",
  title =        "23rd annual Symposium on Foundations of Computer
                 Science, November 3--5, 1982, Chicago, Illinois",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "vii + 387",
  year =         "1982",
  CODEN =        "ASFPDV",
  ISBN =         "????",
  ISBN-13 =      "????",
  ISSN =         "0272-5428",
  LCCN =         "QA76.6 .S95 1982",
  bibdate =      "Thu Dec 3 07:11:18 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "IEEE catalog no. 82CH1806-9. IEEE Computer Society
                 order no. 440.",
  acknowledgement = ack-nhfb,
  keywords =     "electronic data processing --- congresses; electronic
                 digital computers --- programming --- congresses;
                 machine theory --- congresses",
}

@Proceedings{IEEE:1982:CFP,
  editor =       "IEEE",
  booktitle =    "{COMPCON Fall '82: Proceedings of the 25th
                 International Conference of the Institute of Electrical
                 and Electronics Engineers Computer Society, Capitol
                 Hilton Hotel, Washington, DC, 1982}",
  title =        "{COMPCON Fall '82: Proceedings of the 25th
                 International Conference of the Institute of Electrical
                 and Electronics Engineers Computer Society, Capitol
                 Hilton Hotel, Washington, DC, 1982}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xix + 727",
  year =         "1982",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "QA76.5 I578 1982",
  bibdate =      "Sun Mar 11 09:59:44 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "IEEE catalog no. 82CH1796-2.",
  acknowledgement = ack-nhfb,
}

@Book{Randell:1982:ODC,
  editor =       "Brian Randell",
  booktitle =    "The Origins of Digital Computers: Selected Papers",
  title =        "The Origins of Digital Computers: Selected Papers",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Third",
  pages =        "xvi + 580",
  year =         "1982",
  ISBN =         "0-387-11319-3, 3-540-11319-3",
  ISBN-13 =      "978-0-387-11319-7, 978-3-540-11319-5",
  LCCN =         "TK7885.A5 O741 1982",
  bibdate =      "Sun Nov 03 08:28:47 2002",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/b/babbage-charles.bib;
                 https://www.math.utah.edu/pub/bibnet/authors/v/von-neumann-john.bib;
                 https://www.math.utah.edu/pub/tex/bib/annhistcomput.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcw.bib",
  series =       "Texts and monographs in computer science",
  acknowledgement = ack-nhfb,
  remark =       "See also other editions
                 \cite{Randell:1973:ODC,Randell:1975:ODC}.",
  tableofcontents = "Chapter I: Introduction / 1 \par

                 Chapter II: Analytical Engines / 9 \\
                 2.1. On the Mathematical Powers of the Calculating
                 Engine / C. Babbage (1837) / 19 \\
                 2.2. Report of the Committee \ldots{} appointed to
                 consider the advisability and to estimate the expense
                 of constructing Mr. Babbage's Analytical Machine, and
                 of printing tables by its means / C. W. Merrifield
                 (1879) / 55 \\
                 2.3. Babbage's Analytical Engine / H. P. Babbage (1910)
                 / 67 \\
                 2.4. On a Proposed Analytical Machine / P. E. Ludgate
                 (1909) / 73 \\
                 2.5. Essays on Automatics -- Its Definition --
                 Theoretical Extent of its Applications / L. Torres Y
                 Quevedo 1914 / 89 \\
                 2.6. Electromechanical Calculating Machine / L. Torres
                 y Quevedo (1920) / 109 \\
                 2.7. Scheme of Assembly of a Machine Suitable for the
                 Calculations of Celestial Mechanics / L. Couffignal
                 (1938) / 121 \par

                 Chapter III: Tabulating Machines / 127 \\
                 3.1. An Electric Tabulating System / H. Hollerith
                 (1889) / 133 \\
                 3.2. Calculating Machines: Their Principles and
                 Evolution / L. Couffignal (1933) / 145 \\
                 3.3. The Automatic Calculator IPM / H.-J. Dreyer and A.
                 Walther (1946) / 155 \par

                 Chapter IV: Zuse and Schreyer / 159 \\
                 4.1. Method for Automatic Execution of Calculations
                 with the aid of Computers / K. Zuse 1936 / 163 \\
                 4.2. Technical Computing Machines / H. Schreyer (1939)
                 / 171 \\
                 4.3. The Outline of a Computer Development from
                 Mechanics to Electronics / K. Zuse 1962 / 175
                 \par

                 Chapter V: Aiken and IBM / 191 \\
                 5.1. Proposed Automatic Calculating Machine / H. H.
                 Aiken (1937) / 195 \\
                 5.2. The Automatic Sequence Controlled Calculator / H.
                 H. Aiken and G. M. Hopper (1946) / 203 \\
                 5.3. Electrons and Computation / W. J. Eckert (1948) /
                 223 \\
                 5.4. The IBM Card-Programmed Electronic Calculator / J.
                 W. Sheldon and L. Tatum (1951) / 233 \par

                 Chapter VI: Bell Telephone Laboratories / 241 \\
                 6.1. Computer / G. R. Stibitz (1940) / 247 \\
                 6.2. The Relay Interpolator / O. Cesareo (1946) / 253
                 \\
                 6.3. The Ballistic Computer / J. Juley (1947) / 257 \\
                 6.4. A Bell Telephone Laboratories' Computing Machine /
                 F. L. Alt (1948) / 263 \par

                 Chapter VII: The Advent of Electronic Computers / 293
                 \\
                 7.1. Binary Calculation / E. W. Phillips (1936) / 303
                 \\
                 7.2. Computing Machine for the Solution of Large
                 Systems of Linear Algebraic Equations / J. V. Atanasoff
                 (1940) / 315 \\
                 7.3. Arithmetical Machine / V. Bush (1940) / 337 \\
                 7.4. Report on Electronic Predictors for Anti-Aircraft
                 Fire Control / J. A. Rajchman et al. (1942) / 345 \\
                 7.5. Colossus: Godfather of the Computer / B. Randell
                 (1977) / 349 \\
                 7.6. The Use of High Speed Vacuum Tube Devices for
                 Calculating / J. W. Mauchly (1942) / 355 \\
                 7.7. The Electronic Numerical Integrator and Computer.
                 (ENIAC) / H. H. Goldstine and A. Goldstine (1946) / 359
                 \par

                 Chapter VIII: Stored Program Electronic Computers / 375
                 \\
                 8.1. First Draft of a Report on the EDVAC / J. von
                 Neumann (1945) / 383 \\
                 8.2. Preparation of Problems for EDVAC-type Machines /
                 J. W. Mauchly (1947) / 393 \\
                 8.3. Preliminary Discussion of the Logical Design of an
                 Electronic Computing Instrument / A. W. Burks et al.
                 (1946) / 399 \\
                 8.4. Electronic Digital Computers / F. C. Williams and
                 T. Kilburn (1948) / 415 \\
                 8.5. The EDSAC / M. V. Wilkes and W. Renwick (1949) /
                 417 \\
                 8.6. The EDSAC Demonstration / B. H. Worsley (1949) /
                 423 \par

                 Bibliography / 431 \\
                 Index to Bibliography / 545 \\
                 Subject Index / 563",
}

@Proceedings{Rudolph:1982:HTI,
  editor =       "James G. Rudolph",
  booktitle =    "{High technology in the information industry: digest
                 of papers\slash Compcon spring 82, February 22--25;
                 twenty-fourth IEEE computer society international
                 conference, Jack Tar Hotel, San Francisco,
                 California}",
  title =        "{High technology in the information industry: digest
                 of papers\slash Compcon spring 82, February 22--25;
                 twenty-fourth IEEE computer society international
                 conference, Jack Tar Hotel, San Francisco,
                 California}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  bookpages =    "xvi + 418",
  pages =        "xvi + 418",
  year =         "1982",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "TK7885.A1 C53 1982",
  bibdate =      "Sun Mar 11 10:01:46 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "IEEE catalog number 82CH1739-2.",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:1983:PFA,
  editor =       "{ACM}",
  booktitle =    "Proceedings of the fifteenth annual {ACM} Symposium on
                 Theory of Computing, Boston, Massachusetts, April
                 25--27, 1983",
  title =        "Proceedings of the fifteenth annual {ACM} Symposium on
                 Theory of Computing, Boston, Massachusetts, April
                 25--27, 1983",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "v + 487",
  year =         "1983",
  ISBN =         "0-89791-099-0",
  ISBN-13 =      "978-0-89791-099-6",
  LCCN =         "QA75.5.A14 1983",
  bibdate =      "Thu Dec 3 07:11:18 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "ACM order no. 508830.",
  acknowledgement = ack-nhfb,
  annote =       "Sponsored by the ACM Special Interest Group for
                 Automata and Computability Theory.",
  keywords =     "computational complexity --- congresses; electronic
                 digital computers --- programming --- congresses",
}

@Proceedings{Beth:1983:CPW,
  editor =       "Thomas Beth",
  booktitle =    "Cryptography: proceedings of the Workshop on
                 Cryptography, Burg Feuerstein, Germany, March 29--April
                 2, 1982",
  title =        "Cryptography: proceedings of the Workshop on
                 Cryptography, Burg Feuerstein, Germany, March 29--April
                 2, 1982",
  volume =       "149",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 402",
  year =         "1983",
  CODEN =        "LNCSD9",
  ISBN =         "0-387-11993-0 (paperback)",
  ISBN-13 =      "978-0-387-11993-9 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "Z102.5 .C78 1983",
  bibdate =      "Fri Apr 12 07:14:48 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  price =        "DM43.00",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- congresses",
}

@Proceedings{Chaum:1983:ACP,
  editor =       "David Chaum and Ronald L. Rivest and Alan T. Sherman",
  booktitle =    "Advances in Cryptology: proceedings of {CRYPTO 82}",
  title =        "Advances in Cryptology: proceedings of {CRYPTO 82}",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  bookpages =    "xv + 331",
  pages =        "xv + 331",
  year =         "1983",
  DOI =          "https://doi.org/10.1007/978-1-4757-0602-4",
  ISBN =         "1-4757-0604-9 (print), 1-4757-0602-2",
  ISBN-13 =      "978-1-4757-0604-8 (print), 978-1-4757-0602-4",
  LCCN =         "QA76.9.A25 C79 1982",
  bibdate =      "Fri Dec 1 10:07:52 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  tableofcontents = "Algorithms and Theory \\
                 Fast Computation of Discrete Logarithms in GF (q) \\
                 Some Remarks on the Herlestam--Johannesson Algorithm
                 for Computing Logarithms over GF(2p) \\
                 A Public-Key Cryptosystem Based on the Matrix Cover
                 NP-Complete Problem \\
                 Infinite Structures in Information Theory \\
                 A Fast Modular Multiplication Algorithm with
                 Application to Two Key Cryptography \\
                 Comparison of Two Pseudo-Random Number Generators \\
                 On Computationally Secure Authentication Tags Requiring
                 Short Secret Shared Keys \\
                 Modes of Operation \\
                 Some Regular Properties of the `Data Encryption
                 Standard' Algorithm \\
                 The Average Cycle Size of the Key Stream in Output
                 Feedback Encipherment \\
                 Analysis of Certain Aspects of Output Feedback Mode \\
                 Drainage and the DES Summary \\
                 Security of a Keystream Cipher with Secret Initial
                 Value \\
                 Using Data Uncertainty to Increase the
                 Crypto-Complexity of Simple Private Key Enciphering
                 Schemes \\
                 Randomized Encryption Techniques \\
                 Protocols and Transaction Security \\
                 On the Security of Multi-Party Protocols in Distributed
                 Systems \\
                 On the Security of Ping-Pong Protocols \\
                 The Use of Public-Key Cryptography for Signing Checks
                 \\
                 Blind Signatures for Untraceable Payments \\
                 A Randomized Protocol for Signing Contracts \\
                 On Signatures and Authentication \\
                 Applications \\
                 Cryptographic Protection of Personal Data Cards \\
                 Non-Public Key Distribution \\
                 Cryptographic Solution to a Multilevel Security Problem
                 \\
                 Local Network Cryptosystem Architecture: Access Control
                 \\
                 Implementing an Electronic Notary Public \\
                 Quantum Cryptography, or Unforgeable Subway Tokens \\
                 Special Session on Cryptanalysis \\
                 A Polynomial Time Algorithm for Breaking the Basic
                 Merkle--Hellman Cryptosystem \\
                 A Preliminary Report on the Cryptanalysis of
                 Merkle--Hellman Knapsack Cryptosystems \\
                 On Breaking the Iterated Merkle--Hellman Public-Key
                 Cryptosystem \\
                 Rump Session: Impromptu Talks by Conference Attendees
                 \\
                 Long Key Variants of DES \\
                 On the Security of Multi-Party Ping-Pong Protocols \\
                 Inferring a Sequence Generated by a Linear Congruence
                 \\
                 Key Reconstruction \\
                 Nondeterministic Cryptography \\
                 A Short Report on the RSA Chip",
}

@Proceedings{Feak:1983:SIS,
  editor =       "Viiveke F{\^e}ak",
  booktitle =    "{Security, IFIP/Sec'83: proceedings of the First
                 Security Conference, Stockholm, Sweden, 16--19 May
                 1983}",
  title =        "{Security, IFIP/Sec'83: proceedings of the First
                 Security Conference, Stockholm, Sweden, 16--19 May
                 1983}",
  publisher =    pub-NORTH-HOLLAND,
  address =      pub-NORTH-HOLLAND:adr,
  pages =        "xxxvi + 328",
  year =         "1983",
  ISBN =         "0-444-86669-8 (Elsevier)",
  ISBN-13 =      "978-0-444-86669-1 (Elsevier)",
  LCCN =         "QA76.9.A25 S4 1983",
  bibdate =      "Sat Aug 26 16:08:38 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  meetingname =  "Security Conference (1st: 1983: Stockholm, Sweden)",
  remark =       "Organized by Swedish Society for Information
                 Processing (SSI) under the auspices of the
                 International Federation for Information Processing
                 (IFIP).",
  subject =      "Computer security; Congresses; Electronic data
                 processing departments; Security measures",
}

@Proceedings{IEEE:1983:PSS,
  editor =       "{IEEE}",
  booktitle =    "Proceedings of the 1983 Symposium on Security and
                 Privacy, April 25--27, 1983, Oakland, California",
  title =        "Proceedings of the 1983 Symposium on Security and
                 Privacy, April 25--27, 1983, Oakland, California",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "viii + 163",
  year =         "1983",
  ISBN =         "0-8186-0467-0 (paperback), 0-8186-4467-2 (microfiche),
                 0-8186-8467-4 (hardcover)",
  ISBN-13 =      "978-0-8186-0467-6 (paperback), 978-0-8186-4467-2
                 (microfiche), 978-0-8186-8467-8 (hardcover)",
  LCCN =         "QA76.9.A25 S95 1983",
  bibdate =      "Mon Dec 28 07:28:19 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Eigenthaler:1984:CGA,
  editor =       "G. Eigenthaler and H. K. Kaiser and W. B. M{\"u}ller
                 and W. N{\"o}bauer.",
  booktitle =    "Contributions to general algebra, 3. Proceedings of
                 the Vienna conference held in Vienna, June 21--24,
                 1984",
  title =        "Contributions to general algebra, 3. Proceedings of
                 the Vienna conference held in Vienna, June 21--24,
                 1984",
  publisher =    "H{\"o}lder-Pichler-Tempsky",
  address =      "Vienna, Austria",
  pages =        "415",
  year =         "1984",
  ISBN =         "3-209-00591-5, 3-519-02762-3",
  ISBN-13 =      "978-3-209-00591-5, 978-3-519-02762-1",
  LCCN =         "????",
  bibdate =      "Tue Feb 9 14:44:52 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:1984:ASF,
  editor =       "{IEEE}",
  booktitle =    "25th annual Symposium on Foundations of Computer
                 Science, October 24--26, 1984, Singer Island, Florida",
  title =        "25th annual Symposium on Foundations of Computer
                 Science, October 24--26, 1984, Singer Island, Florida",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xii + 518",
  year =         "1984",
  CODEN =        "ASFPDV",
  ISBN =         "0-8186-8591-3, 0-8186-0591-X (paperback),
                 0-8186-4591-1 (microfiche)",
  ISBN-13 =      "978-0-8186-8591-0, 978-0-8186-0591-8 (paperback),
                 978-0-8186-4591-4 (microfiche)",
  ISSN =         "0272-5428",
  LCCN =         "QA 76 S979 1984",
  bibdate =      "Thu Dec 3 07:11:18 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "IEEE catalog no. 84CH2085-9.",
  acknowledgement = ack-nhfb,
  keywords =     "electronic data processing --- congresses; electronic
                 digital computers --- programming --- congresses;
                 machine theory --- congresses",
}

@Proceedings{ACM:1985:PSA,
  editor =       "{ACM}",
  booktitle =    "Proceedings of the seventeenth annual {ACM} Symposium
                 on Theory of Computing, Providence, Rhode Island, May
                 6--8, 1985",
  title =        "Proceedings of the seventeenth annual {ACM} Symposium
                 on Theory of Computing, Providence, Rhode Island, May
                 6--8, 1985",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "vi + 484",
  year =         "1985",
  ISBN =         "0-89791-151-2 (paperback)",
  ISBN-13 =      "978-0-89791-151-1 (paperback)",
  LCCN =         "QA 76.6 A13 1985",
  bibdate =      "Thu Dec 3 07:11:18 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "ACM order no. 508850.",
  acknowledgement = ack-nhfb,
  keywords =     "computational complexity --- congresses; electronic
                 digital computers --- programming --- congresses",
}

@Proceedings{Apostolico:1985:CAW,
  editor =       "Alberto Apostolico and Zvi Galil",
  booktitle =    "Combinatorial algorithms on words (Maratea, Italy,
                 June 18--22, 1984)",
  title =        "Combinatorial algorithms on words (Maratea, Italy,
                 June 18--22, 1984)",
  volume =       "12",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 361",
  year =         "1985",
  ISBN =         "0-387-15227-X",
  ISBN-13 =      "978-0-387-15227-1",
  LCCN =         "QA164 .N35 1984",
  bibdate =      "Tue Feb 9 14:47:04 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "{NATO} Adv. Sci. Inst. Ser. {F}: Comput. Systems
                 Sci.",
  acknowledgement = ack-nhfb,
}

@Proceedings{Beth:1985:ACP,
  editor =       "Thomas Beth and N. Cot and I. Ingemarsson",
  booktitle =    "{Advances in cryptology: proceedings of EUROCRYPT 84,
                 a Workshop on the Theory and Application of
                 Cryptographic Techniques, Paris, France, April 9--11,
                 1984}",
  title =        "{Advances in cryptology: proceedings of EUROCRYPT 84,
                 a Workshop on the Theory and Application of
                 Cryptographic Techniques, Paris, France, April 9--11,
                 1984}",
  volume =       "209",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "vii + 489",
  year =         "1985",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "0-387-16076-0 (USA)",
  ISBN-13 =      "978-0-387-16076-4 (USA)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 E951 1984",
  bibdate =      "Fri Apr 12 07:14:49 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-l#lncs;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  note =         "Held at the University of Paris, Sorbonne.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t0209.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=209",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses; data transmission systems
                 --- security measures --- congresses; information
                 hiding; steganography",
}

@Proceedings{Blakley:1985:ACP,
  editor =       "George Robert Blakley and David Chaum",
  booktitle =    "{Advances in Cryptology: Proceedings of CRYPTO 84}",
  title =        "{Advances in Cryptology: Proceedings of CRYPTO 84}",
  volume =       "196",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 491",
  year =         "1985",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/3-540-39568-7",
  ISBN =         "0-387-15658-5; 3-540-39568-7",
  ISBN-13 =      "978-0-387-15658-3; 978-3-540-39568-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 C791 1984; QA267.A1 L43 no.196",
  bibdate =      "Thu Feb 23 08:39:06 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "CRYPTO 84: a Workshop on the Theory and Application of
                 Cryptographic Techniques, held at the University of
                 California, Santa Barbara, August 19--22, 1984,
                 sponsored by the International Association for
                 Cryptologic Research.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t0196.htm;
                 http://www.springerlink.com/content/cemajg0qmeev/;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=196",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses",
  referencedin = "Referenced in \cite[Ref. 6]{Goldreich:1997:FMCb}.",
}

@Proceedings{IEEE:1985:FOC,
  editor =       "IEEE",
  key =          "IEEE-FOCS'85",
  booktitle =    "26th annual Symposium on Foundations of Computer
                 Science, October 21--23, 1985, Portland, {OR}",
  title =        "26th annual Symposium on Foundations of Computer
                 Science, October 21--23, 1985, Portland, {OR}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xii + 552",
  year =         "1985",
  ISBN =         "0-8186-0644-4 (paperback), 0-8186-4644-6 (microfiche),
                 0-8186-8644-8 (hardcover)",
  ISBN-13 =      "978-0-8186-0644-1 (paperback), 978-0-8186-4644-7
                 (microfiche), 978-0-8186-8644-3 (hardcover)",
  LCCN =         "QA 76 S979 1985",
  bibdate =      "Sat Sep 17 10:24:15 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Gemmell:1997:ITC},
                 \cite[Ref. 7]{Canetti:1997:PSL}.",
}

@Proceedings{ACM:1986:PEA,
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the Eighteenth annual ACM Symposium on
                 Theory of Computing, Berkeley, California, May 28--30,
                 1986}",
  title =        "{Proceedings of the Eighteenth annual ACM Symposium on
                 Theory of Computing, Berkeley, California, May 28--30,
                 1986}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  bookpages =    "v + 461",
  pages =        "v + 461",
  year =         "1986",
  ISBN =         "0-89791-193-8",
  ISBN-13 =      "978-0-89791-193-1",
  LCCN =         "QA 76.6 A13 1986",
  bibdate =      "Thu Dec 3 07:11:18 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "ACM order number 508860.",
  acknowledgement = ack-nhfb,
  keywords =     "computational complexity --- congresses; programming
                 (electronic computers) --- congresses",
}

@Proceedings{IEEE:1986:ASF,
  editor =       "IEEE",
  key =          "IEEE-FOCS'86",
  booktitle =    "27th annual Symposium on Foundations of Computer
                 Science, October 27--29, 1986, Toronto, {ON}, Canada",
  title =        "27th annual Symposium on Foundations of Computer
                 Science, October 27--29, 1986, Toronto, {ON}, Canada",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xiv + 517",
  year =         "1986",
  ISBN =         "0-8186-0740-8 (paperback), 0-8186-4740-X (microfiche),
                 0-8186-8740-1 (casebound)",
  ISBN-13 =      "978-0-8186-0740-0 (paperback), 978-0-8186-4740-6
                 (microfiche), 978-0-8186-8740-2 (casebound)",
  LCCN =         "QA 76 S979 1986; TK7885.A1 S92 1986",
  bibdate =      "Thu Dec 03 06:55:33 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Pichler:1986:ACE,
  editor =       "Franz Pichler",
  booktitle =    "Advances in cryptology: Eurocrypt 85: proceedings of a
                 workshop on the theory and application of cryptographic
                 techniques, Linz, Austria, April, 1985",
  title =        "Advances in cryptology: Eurocrypt 85: proceedings of a
                 workshop on the theory and application of cryptographic
                 techniques, Linz, Austria, April, 1985",
  volume =       "219",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 280",
  year =         "1986",
  CODEN =        "LNCSD9",
  ISBN =         "0-387-16468-5 (USA)",
  ISBN-13 =      "978-0-387-16468-7 (USA)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 E961 1985",
  bibdate =      "Fri Apr 12 07:27:14 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-l#lncs;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  note =         "``The workshop was sponsored by International
                 Association for Cryptologic Research \ldots{} [et
                 al.]''--T.p. verso.",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses; data transmission systems
                 --- security measures --- congresses; information
                 hiding; steganography",
}

@Proceedings{Ringeisen:1986:ADM,
  editor =       "Richard D. Ringeisen and Fred S. Roberts",
  booktitle =    "Applications of discrete mathematics. Proceedings of
                 the Third {SIAM} Conference on Discrete Mathematics
                 held at Clemson University, Clemson, South Carolina,
                 May 14--16, 1986",
  title =        "Applications of discrete mathematics. Proceedings of
                 the Third {SIAM} Conference on Discrete Mathematics
                 held at Clemson University, Clemson, South Carolina,
                 May 14--16, 1986",
  publisher =    pub-SIAM,
  address =      pub-SIAM:adr,
  pages =        "x + 230",
  year =         "1986",
  ISBN =         "0-89871-219-X",
  ISBN-13 =      "978-0-89871-219-3",
  LCCN =         "QA76.9.M35C65 1986",
  MRclass =      "00A11",
  MRnumber =     "89f:00021",
  bibdate =      "Tue Feb 9 14:38:03 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Williams:1986:ACC,
  editor =       "Hugh C. Williams",
  booktitle =    "{Advances in cryptology --- CRYPTO '85: proceedings:
                 August 18--22, 1985}",
  title =        "{Advances in cryptology --- CRYPTO '85: proceedings:
                 August 18--22, 1985}",
  volume =       "218",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 548",
  year =         "1986",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "0-387-16463-4 (paperback)",
  ISBN-13 =      "978-0-387-16463-2 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  LCCN =         "QA76.9.A25 C791 1985; QA267.A1 L43 no.218",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t0218.htm;
                 http://www.springerlink.com/content/978-0-387-16463-2;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=218",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses; data transmission systems --- security
                 measures --- congresses",
  referencedin = "Referenced in \cite[Ref. 7]{Handschuh:1998:SCC},
                 \cite[Ref. 5]{Wiener:1998:PCP}.",
}

@Proceedings{ACM:1987:PNA,
  editor =       "ACM",
  booktitle =    "Proceedings of the nineteenth annual {ACM} Symposium
                 on Theory of Computing, New York City, May 25--27,
                 1987",
  title =        "Proceedings of the nineteenth annual {ACM} Symposium
                 on Theory of Computing, New York City, May 25--27,
                 1987",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "viii + 471",
  year =         "1987",
  ISBN =         "0-89791-221-7",
  ISBN-13 =      "978-0-89791-221-1",
  LCCN =         "QA 76.6 A13 1987",
  bibdate =      "Tue Nov 24 12:00:26 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 23]{Gemmell:1997:ITC}.",
}

@Book{Ashenhurst:1987:ATA,
  editor =       "Robert L. Ashenhurst",
  booktitle =    "{ACM Turing Award Lectures}: the first twenty years,
                 1966--1985",
  title =        "{ACM Turing Award Lectures}: the first twenty years,
                 1966--1985",
  publisher =    pub-ACM # " and " # pub-AW,
  address =      pub-ACM:adr # " and " # pub-AW:adr,
  pages =        "xviii + 483",
  year =         "1987",
  ISBN =         "0-201-07794-9",
  ISBN-13 =      "978-0-201-07794-0",
  LCCN =         "QA76.24 .A33 1987",
  bibdate =      "Tue Jun 21 11:01:04 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "ACM Press anthology series",
  acknowledgement = ack-nhfb,
  subject =      "Electronic data processing; Computers",
  tableofcontents = "The synthesis of algorithmic systems / Alan J.
                 Perlis \\
                 Computers then and now / Maurice V. Wilkes \\
                 One man's view of computer science / R. W. Hamming \\
                 Form and content in computer science / Marvin Minsky
                 \\
                 Some comments from a numerical analyst / J. H.
                 Wilkinson \\
                 Generality in artificial intelligence / John McCarthy
                 \\
                 The humble programmer / Edsger W. Dijkstra \\
                 The programmer as navigator / Charles W. Bachman \\
                 Computer programming as an art / Donald E. Knuth \\
                 Computer science as empirical inquiry: symbols and
                 search / Allen Newell and Herbert A. Simon \\
                 Complexity of computations / Michael O. Rabin \\
                 Logic and programming languages / Dana S. Scott \\
                 Can programming be liberated from the von Neumann
                 style?: a functional style and its algebra of programs
                 / John Backus \\
                 The paradigms of programming / Robert W. Floyd \\
                 Notation as a tool of thought / Kenneth E. Iverson \\
                 The emperor's old clothes / Charles Antony Richard
                 Hoare \\
                 Relational database: a practical foundation for
                 productivity / E. F. Codd \\
                 An overview of computational complexity / Stephen A.
                 Cook \\
                 Reflections on software research / Dennis M. Ritchie
                 \\
                 Reflections on trusting trust / Ken Thompson \\
                 From programming language design to computer
                 construction / Niklaus Wirth \\
                 Combinatorics, complexity, and randomness / Richard M.
                 Karp \\
                 Algorithm design / Robert E. Tarjan \\
                 Computer science: the emergence of a discipline / John
                 E. Hopcroft \\
                 The search for performance in scientific processors /
                 John Cocke \\
                 Micropipelines / Ivan E. Sutherland \\
                 On building systems that will fail / Fernando J.
                 Corbat{\'o} \\
                 Elements of interaction / Robin Milner \\
                 Turing Award Lecture: it's time to reconsider time /
                 Richard Edwin Stearns \\
                 Turing Award Lecture: on computational complexity and
                 the nature of computer science / Juris Hartmanis \\
                 How the `what' becomes the `how' / Edward A. Feigenbaum
                 \\
                 To dream the possible dream / Raj Reddy \\
                 The Eary Days of RSA: History and Lessons / Ronald L.
                 Rivest \\
                 Pre-RSA Days: History and Lessons / Leonard Adleman \\
                 Cryptography: State of the science / Adi Shamir \\
                 Turing Award Lecture / Alan Kay \\
                 Assessing the Internet: Lessons Learned, Strategies for
                 Evolution, and Future Possibilities / Vinton Cerf,
                 Robert E. Kahn \\
                 Computing vs. Human Thinking / Peter Naur \\
                 Compiling for Performance: A Personal Tour / Frances
                 Allen \\
                 Model checking: my 27-year quest to overcome the state
                 explosion problem / Edmund M. Clarke \\
                 Model checking: A Personal Perspective / E. Allen
                 Emerson \\
                 The Quest for Correctness Beyond Verification / Joseph
                 Sifakis \\
                 The Power of Abstraction / Barbara Liskov \\
                 Improving the Future by Examining the Past / Charles P.
                 Thacker",
}

@Proceedings{Chaum:1987:ACE,
  editor =       "David Chaum and Wyn L. Price",
  booktitle =    "Advances in Cryptology--{EUROCRYPT} '87: Workshop on
                 the Theory and Application of Cryptographic Techniques,
                 Amsterdam, The Netherlands, April 13--15, 1987:
                 Proceedings",
  title =        "Advances in Cryptology--{EUROCRYPT} '87: Workshop on
                 the Theory and Application of Cryptographic Techniques,
                 Amsterdam, The Netherlands, April 13--15, 1987:
                 Proceedings",
  volume =       "304",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "iii + 314",
  year =         "1987",
  ISBN =         "0-387-19102-X (New York), 3-540-19102-X (Berlin)",
  ISBN-13 =      "978-0-387-19102-7 (New York), 978-3-540-19102-5
                 (Berlin)",
  LCCN =         "QA76.9.A25 E963 1987",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  descriptor =   "Authentifizierung, Hash-funktionen, Kryptologie,
                 Public Key, Symmetrische Chiffren",
}

@Proceedings{Cover:1987:OPC,
  editor =       "Thomas M. Cover and B. Gopinath",
  booktitle =    "Open Problems in Communication and Computation",
  title =        "Open Problems in Communication and Computation",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 236",
  year =         "1987",
  ISBN =         "0-387-96621-8",
  ISBN-13 =      "978-0-387-96621-2",
  LCCN =         "TK5102.5 .O243 1987",
  bibdate =      "Mon Jul 19 06:56:57 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$25.00",
  acknowledgement = ack-nhfb,
}

@Proceedings{Gleason:1987:PIC,
  editor =       "Andrew M. Gleason",
  booktitle =    "Proceedings of the International Congress of
                 Mathematicians, 1986: August 3--11, 1986, Berkeley",
  title =        "Proceedings of the International Congress of
                 Mathematicians, 1986: August 3--11, 1986, Berkeley",
  publisher =    pub-AMS,
  address =      pub-AMS:adr,
  pages =        "various",
  year =         "1987",
  ISBN =         "0-8218-0110-4",
  ISBN-13 =      "978-0-8218-0110-9",
  LCCN =         "QA1 .I8 1986 v. 1-2",
  bibdate =      "Mon Sep 09 09:12:20 1996",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/b/brandt-achi.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Two volumes",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:1987:ASF,
  editor =       "{IEEE}",
  key =          "IEEE-FOCS'87",
  booktitle =    "28th annual Symposium on Foundations of Computer
                 Science, October 12--14, 1987, Los Angeles, {CA}",
  title =        "28th annual Symposium on Foundations of Computer
                 Science, October 12--14, 1987, Los Angeles, {CA}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xiv + 498",
  year =         "1987",
  ISBN =         "0-8186-0807-2, 0-8186-4807-4 (fiche), 0-8186-8807-6
                 (case)",
  ISBN-13 =      "978-0-8186-0807-0, 978-0-8186-4807-6 (fiche),
                 978-0-8186-8807-2 (case)",
  LCCN =         "QA 76 S979 1987",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 15]{Gemmell:1997:ITC}",
}

@Proceedings{IEEE:1987:IIG,
  editor =       "IEEE",
  booktitle =    "{IEEE\slash} {IEICE} Global Telecommunications
                 Conference: conference record, Nov. 15--18, 1987,
                 Tokyo, Japan {[GLOBECOM} Tokyo '87]",
  title =        "{IEEE}\slash {IEICE} Global Telecommunications
                 Conference: conference record, Nov. 15--18, 1987,
                 Tokyo, Japan [{GLOBECOM} Tokyo '87]",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "various",
  year =         "1987",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes. IEEE catalog no. 87CH2520-5.",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 25]{Gemmell:1997:ITC}.",
}

@Proceedings{IEEE:1987:PIS,
  editor =       "IEEE",
  booktitle =    "Proceedings / 1987 {IEEE} Symposium on Security and
                 Privacy, April 27--29, 1987, Oakland, California",
  title =        "Proceedings / 1987 {IEEE} Symposium on Security and
                 Privacy, April 27--29, 1987, Oakland, California",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "vi + 243",
  year =         "1987",
  ISBN =         "0-8186-8771-1 (hardback), 0-8186-0771-8 (paperback),
                 0-8186-4771-X (microfiche)",
  ISBN-13 =      "978-0-8186-8771-6 (hardback), 978-0-8186-0771-4
                 (paperback), 978-0-8186-4771-0 (microfiche)",
  LCCN =         "QA 76.9 A25 I43 1987",
  bibdate =      "Mon Dec 28 07:30:46 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "IEEE catalog number 87CH2416-6. Computer Society Order
                 Number 771.",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 30]{Gemmell:1997:ITC}.",
}

@Proceedings{Muraszko:1987:CVR,
  editor =       "J. T. Muraszko",
  booktitle =    "Colloquium on Vehicle Route Guidance, Navigation and
                 Location Systems (Wednesday, 11 February 1987: London,
                 England)",
  title =        "Colloquium on Vehicle Route Guidance, Navigation and
                 Location Systems (Wednesday, 11 February 1987: London,
                 England)",
  publisher =    pub-IEE,
  address =      pub-IEE:adr,
  pages =        "26",
  year =         "1987",
  LCCN =         "TE228 .C66 1987",
  bibdate =      "Mon Dec 28 13:17:41 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Digest no.: 1987/21.",
  acknowledgement = ack-nhfb,
  xxISBN =       "none",
}

@Proceedings{Odlyzko:1987:ACC,
  editor =       "Andrew Michael Odlyzko",
  booktitle =    "Advances in cryptology: {CRYPTO '86}: proceedings",
  title =        "Advances in cryptology: {CRYPTO '86}: proceedings",
  volume =       "263",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 487",
  year =         "1987",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "3-540-18047-8, 0-387-18047-8",
  ISBN-13 =      "978-3-540-18047-0, 978-0-387-18047-2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 C791 1986",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  note =         "Conference held at the University of California, Santa
                 Barbara, Aug. 11--15, 1986.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t0263.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=263",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses",
  referencedin = "Referenced in \cite[Ref. 1]{Handschuh:1998:SCC},
                 \cite[Ref. 5]{Handschuh:1998:SCC}.",
}

@Proceedings{ACM:1988:PTA,
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the twentieth annual ACM Symposium on
                 Theory of Computing, Chicago, Illinois, May 2--4,
                 1988}",
  title =        "{Proceedings of the twentieth annual ACM Symposium on
                 Theory of Computing, Chicago, Illinois, May 2--4,
                 1988}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "viii + 553",
  year =         "1988",
  ISBN =         "0-89791-264-0",
  ISBN-13 =      "978-0-89791-264-8",
  LCCN =         "QA 76.6 A13 1988",
  bibdate =      "Thu Dec 3 07:11:18 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/stoc1980.bib",
  note =         "ACM order no. 508880.",
  acknowledgement = ack-nhfb,
  keywords =     "computational complexity --- congresses",
}

@Proceedings{Anonymous:1988:EVE,
  editor =       "Anonymous",
  booktitle =    "{Enigma} variations: encryption, {EMC\slash RFI},
                 {EMP}: 1988 conference proceedings",
  title =        "{Enigma} variations: encryption, {EMC\slash RFI},
                 {EMP}: 1988 conference proceedings",
  publisher =    "Osprey Exhibitions",
  address =      "Watford, England",
  pages =        "various",
  year =         "1988",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Congresses;
                 Cryptography --- Congresses; Data protection ---
                 Congresses.",
}

@Proceedings{Chaum:1988:ACE,
  editor =       "David Chaum and Wyn L. Price",
  booktitle =    "Advances in cryptology --- {EUROCRYPT} '87: Workshop
                 on the Theory and Application of Cryptographic
                 Techniques, Amsterdam, The Netherlands, April 13--15,
                 1987: proceedings",
  title =        "Advances in cryptology --- {EUROCRYPT} '87: Workshop
                 on the Theory and Application of Cryptographic
                 Techniques, Amsterdam, The Netherlands, April 13--15,
                 1987: proceedings",
  volume =       "304",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "vii + 309",
  year =         "1988",
  CODEN =        "LNCSD9",
  ISBN =         "0-387-19102-X (New York), 3-540-19102-X (Berlin)",
  ISBN-13 =      "978-0-387-19102-7 (New York), 978-3-540-19102-5
                 (Berlin)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 E9631 1987; QA267.A1 L43 no.304",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  note =         "Sponsored by the International Association for
                 Crytologic Research.",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  descriptor =   "Authentifizierung, Hash-funktionen, Kryptologie,
                 Public Key, Symmetrische Chiffren",
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses",
}

@Book{Galil:1988:SIC,
  editor =       "Zvi Galil",
  booktitle =    "Special issue on cryptography",
  title =        "Special issue on cryptography",
  volume =       "17(2)",
  publisher =    pub-SIAM,
  address =      pub-SIAM:adr,
  pages =        "i--viii, 179--426",
  year =         "1988",
  MRclass =      "68-06 (68P25)",
  MRnumber =     "88k:68002",
  bibdate =      "Tue Feb 9 14:42:43 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       j-SIAM-J-COMPUT,
  acknowledgement = ack-nhfb,
}

@Proceedings{Gunther:1988:ACE,
  editor =       "Christoph G. Gunther",
  booktitle =    "Advances in cryptology --- {EUROCRYPT} '88: Workshop
                 on the Theory and Application of Cryptographic
                 Techniques, Davos, Switzerland, May 25--27, 1988:
                 proceedings",
  title =        "Advances in cryptology --- {EUROCRYPT} '88: Workshop
                 on the Theory and Application of Cryptographic
                 Techniques, Davos, Switzerland, May 25--27, 1988:
                 proceedings",
  volume =       "330",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 467",
  year =         "1988",
  CODEN =        "LNCSD9",
  ISBN =         "0-387-50251-3",
  ISBN-13 =      "978-0-387-50251-9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA267.A1 L43 no.330; QA76.9.A25 E9641 1988",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  note =         "Sponsored by the International Association for
                 Cryptologic Research.",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses",
}

@Proceedings{IEEE:1988:FAC,
  editor =       "{IEEE}",
  booktitle =    "Fourth Aerospace Computer Security Applications
                 Conference, Orlando, {FL}, {USA}, December 12--16,
                 1988",
  title =        "Fourth Aerospace Computer Security Applications
                 Conference, Orlando, {FL}, {USA}, December 12--16,
                 1988",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xii + 440",
  year =         "1988",
  ISBN =         "0-8186-0895-1",
  ISBN-13 =      "978-0-8186-0895-7",
  LCCN =         "TL787 .A471 1988; QA76.9.A25 A39 1988",
  bibdate =      "Sun Sep 29 06:28:50 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "IEEE catalog number 88CH2629-5. IEEE Computer Society
                 order number 895.",
  acknowledgement = ack-nhfb,
  confsponsor =  "IEEE; ASIS",
}

@Proceedings{Pomerance:1988:ACC,
  editor =       "Carl Pomerance",
  booktitle =    "Advances in cryptology --- {CRYPTO '87}: proceedings",
  title =        "Advances in cryptology --- {CRYPTO '87}: proceedings",
  volume =       "293",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 460",
  year =         "1988",
  CODEN =        "LNCSD9",
  DOI =          "????",
  ISBN =         "0-387-18796-0",
  ISBN-13 =      "978-0-387-18796-9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA76.9.A25 C791 1987; QA267.A1 L43 no.293",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  note =         "CRYPTO '87, a Conference on the Theory and
                 Applications of Cryptographic Techniques, held at the
                 University of California, Santa Barbara \ldots{} August
                 16--20, 1987.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t0293.htm;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=293",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- congresses; cryptography ---
                 congresses; data transmission systems --- security
                 measures --- congresses",
  referencedin = "Referenced in \cite[Ref. 8]{Gemmell:1997:ITC},
                 \cite[Ref. 14]{Handschuh:1998:SCC}.",
}

@Proceedings{USENIX:1988:CSSb,
  editor =       "{USENIX} Association",
  booktitle =    "Computing Systems, Summer, 1988",
  title =        "Computing Systems, Summer, 1988",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  month =        "Summer",
  year =         "1988",
  bibdate =      "Fri Oct 18 07:24:24 MDT 1996",
  bibsource =    "ftp://ftp.uu.net/library/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{USENIX:1988:PFU,
  editor =       "{USENIX Association}",
  booktitle =    "Proceedings of the (First) {USENIX} Security Workshop,
                 August 29--30, 1988, Portland, {OR}, {USA}",
  title =        "Proceedings of the (First) {USENIX} Security Workshop,
                 August 29--30, 1988, Portland, {OR}, {USA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "various",
  year =         "1988",
  LCCN =         "QA76.8.U65 U55 1988(1)-1990(2)//",
  bibdate =      "Sun Feb 18 09:01:05 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{USENIX:1988:UCPb,
  editor =       "{USENIX Association}",
  booktitle =    "{USENIX} Conference Proceedings (Dallas, {TX},
                 {USA)}",
  title =        "{USENIX} Conference Proceedings (Dallas, {TX},
                 {USA})",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "????",
  month =        "Winter",
  year =         "1988",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Tue Feb 20 15:42:13 MST 1996",
  bibsource =    "ftp://ftp.uu.net/library/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{USENIX:1988:USWa,
  editor =       "{USENIX}",
  booktitle =    "{UNIX} Security Workshop Proceedings, August 29--30,
                 1988. Portland, {OR}",
  title =        "{UNIX} Security Workshop Proceedings, August 29--30,
                 1988. Portland, {OR}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  year =         "1988",
  LCCN =         "QA76.8.U65 U55 1988(1)-1990(2)//",
  bibdate =      "Wed Aug 13 10:48:45 MDT 1997",
  bibsource =    "ftp://ftp.uu.net/library/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  location =     "Portland, OR",
}

@Proceedings{ACM:1989:PEA,
  editor =       "{ACM}",
  booktitle =    "Proceedings of the Eighth Annual {ACM} Symposium on
                 Principles of Distributed Computing: Edmonton, Alberta,
                 Canada, August 14--16, 1989",
  title =        "Proceedings of the Eighth Annual {ACM} Symposium on
                 Principles of Distributed Computing: Edmonton, Alberta,
                 Canada, August 14--16, 1989",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "vi + 356",
  year =         "1989",
  ISBN =         "0-89791-326-4",
  ISBN-13 =      "978-0-89791-326-3",
  LCCN =         "QA 76.9 D5 A26 1989",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 1]{Canetti:1997:PSL},
                 \cite[Ref. 37]{Gemmell:1997:ITC}.",
  xxbooktitle =  "Proceedings of the 21st annual Symposium on the Theory
                 of Computing",
  xxtitle =      "Proceedings of the 21st annual Symposium on the Theory
                 of Computing",
}

@Proceedings{ACM:1989:PSN,
  editor =       "{ACM}",
  booktitle =    "Proceedings, Supercomputing '89: November 13--17,
                 1989, Reno, Nevada",
  title =        "Proceedings, Supercomputing '89: November 13--17,
                 1989, Reno, Nevada",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xviii + 849",
  year =         "1989",
  ISBN =         "0-89791-341-8",
  ISBN-13 =      "978-0-89791-341-6",
  LCCN =         "QA 76.5 S87 1989",
  bibdate =      "Wed Aug 28 06:48:31 MDT 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 University of California MELVYL catalog.",
  note =         "IEEE 89CH2802-7.",
  acknowledgement = ack-nhfb,
  annote =       "89CM2802-7. ACM Order Number 415892. IEEE 89CH2802-7.
                 IEEE Computer Society Order Number 2021.",
  classification = "A0130C (Conference proceedings); A0270
                 (Computational techniques); A0500 (Statistical physics
                 and thermodynamics); A4700 (Fluid dynamics); B0100
                 (General electrical engineering topics); B0290
                 (Numerical analysis); B1130B (Computer-aided circuit
                 analysis and design); C4100 (Numerical analysis); C4240
                 (Programming and algorithm theory); C5440
                 (Multiprocessor systems and techniques); C5470
                 (Performance evaluation and testing); C6110B (Software
                 engineering techniques); C6150J (Operating systems);
                 C7000 (Computer applications)",
  keywords =     "benchmarking; computer applications; parallel
                 algorithms; parallel processing; performance
                 evaluation; performance measurements; performance
                 tools; pipeline processing; software environments;
                 supercomputer architectures; supercomputers ---
                 congresses; technology integration; vector algorithms",
}

@Proceedings{ACM:1989:PTF,
  key =          "ACM-TOC'89",
  booktitle =    "Proceedings of the Twenty First Annual {ACM} Symposium
                 on Theory of Computing: Seattle, Washington, May
                 15--17, 1989",
  title =        "Proceedings of the Twenty First Annual {ACM} Symposium
                 on Theory of Computing: Seattle, Washington, May
                 15--17, 1989",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "viii + 600",
  year =         "1989",
  ISBN =         "0-89791-307-8",
  ISBN-13 =      "978-0-89791-307-2",
  LCCN =         "QA 76.6 A13 1989",
  bibdate =      "Sat Sep 17 10:25:00 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Beker:1989:CC,
  editor =       "Henry Beker and F. C. Piper",
  booktitle =    "Cryptography and coding",
  title =        "Cryptography and coding",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "x + 297",
  year =         "1989",
  ISBN =         "0-19-853623-2",
  ISBN-13 =      "978-0-19-853623-9",
  LCCN =         "QA268.C74 1989",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "Held in December 1986. ``Based on the proceedings of a
                 conference organized by the Institute of Mathematics
                 and its Applications on cryptography and coding, held
                 at the Royal Agricultural College, Cirencester on
                 15th-17th December 1986.''",
  price =        "UK\pounds35.00, US\$52.00",
  series =       "The Institute of Mathematics and Its Applications
                 conference series; new ser., 20",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory --- congresses; cryptography ---
                 congresses",
}

@Proceedings{Chaum:1989:SCF,
  editor =       "David Chaum and Ingrid Schaumuller-Bichl",
  booktitle =    "Smart card 2000: the future of {IC} cards: proceedings
                 of the {IFIP} {WG 11.6} International Conference on
                 Smart Card 2000--the Future of {IC} Cards, Laxenburg,
                 Austria, 19--20 October 1987",
  title =        "Smart card 2000: the future of {IC} cards: proceedings
                 of the {IFIP} {WG} 11.6 International Conference on
                 Smart Card 2000--the Future of {IC} Cards, Laxenburg,
                 Austria, 19--20 October 1987",
  publisher =    pub-NORTH-HOLLAND,
  address =      pub-NORTH-HOLLAND:adr,
  pages =        "xi + 218",
  year =         "1989",
  ISBN =         "0-444-70545-7",
  ISBN-13 =      "978-0-444-70545-7",
  LCCN =         "TK7895.S62 I35 1987",
  bibdate =      "Mon Jul 19 07:11:32 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:1989:ASF,
  editor =       "{IEEE}",
  key =          "IEEE-FOCS'89",
  booktitle =    "30th annual Symposium on Foundations of Computer
                 Science, October 30--November 1, 1989, Research
                 Triangle Park, {NC}",
  title =        "30th annual Symposium on Foundations of Computer
                 Science, October 30--November 1, 1989, Research
                 Triangle Park, {NC}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xvii + 632",
  year =         "1989",
  CODEN =        "ASFPDV",
  ISBN =         "0-8186-1982-1 (casebound), 0-8186-5982-3
                 (microfiche)",
  ISBN-13 =      "978-0-8186-1982-3 (casebound), 978-0-8186-5982-9
                 (microfiche)",
  ISSN =         "0272-5428",
  LCCN =         "QA 76 S979 1989",
  bibdate =      "Thu Dec 03 07:02:59 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "IEEE catalog number 89CH2808-4.",
  acknowledgement = ack-nhfb,
  sponsor =      "IEEE Technical Committee on Mathematical Foundations
                 of Computing; Academic Press Inc; Addison-Wesley
                 Publishing Co; AT\&T Bell Lab; Bell Communications
                 Research; et al",
}

@Proceedings{Mora:1989:AAA,
  editor =       "Teo Mora",
  booktitle =    "Applied algebra, algebraic algorithms, and
                 error-correcting codes: 6th international conference,
                 {AAECC-6}, Rome, Italy, July 4--8, 1988: proceedings",
  title =        "Applied algebra, algebraic algorithms, and
                 error-correcting codes: 6th international conference,
                 {AAECC-6}, Rome, Italy, July 4--8, 1988: proceedings",
  volume =       "357",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "ix + 480",
  year =         "1989",
  CODEN =        "LNCSD9",
  ISBN =         "0-387-51083-4",
  ISBN-13 =      "978-0-387-51083-5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "QA268 .A35 1988",
  bibdate =      "Fri Apr 12 07:31:04 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$36.00 (USA)",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  keywords =     "algebra --- data processing --- congresses; computer
                 algorithms --- congresses; error-correcting codes
                 (information theory) --- congresses",
}

@Proceedings{Quisquater:1989:ACE,
  editor =       "Jean-Jacques Quisquater and Joos Vandewalle",
  booktitle =    "Advances in Cryptology--{EUROCRYPT} '89: Workshop on
                 the Theory and Application of Cryptographic Techniques,
                 Houthalen, Belgium, April 10--13, 1989: Proceedings",
  title =        "Advances in Cryptology--{EUROCRYPT} '89: Workshop on
                 the Theory and Application of Cryptographic Techniques,
                 Houthalen, Belgium, April 10--13, 1989: Proceedings",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 710",
  year =         "1989",
  ISBN =         "0-387-53433-4 (New York), 3-540-53433-4 (Berlin)",
  ISBN-13 =      "978-0-387-53433-6 (New York), 978-3-540-53433-4
                 (Berlin)",
  LCCN =         "QA76.9.A25 E964 1989",
  bibdate =      "Sat Sep 17 10:25:03 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "DM98.00",
  acknowledgement = ack-nhfb,
}

@Proceedings{USENIX:1989:PSU,
  editor =       "{USENIX Association}",
  booktitle =    "Proceedings of the Summer 1989 {USENIX} Conference:
                 June 12 --- June 16, 1989, Baltimore, Maryland {USA}",
  title =        "Proceedings of the Summer 1989 {USENIX} Conference:
                 June 12 --- June 16, 1989, Baltimore, Maryland {USA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "ix + 286",
  year =         "1989",
  LCCN =         "QA 76.76 O63 U83 1989",
  bibdate =      "Sun Feb 18 07:46:09 MST 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computer networks --- Congresses.; Operating systems
                 (Computers) --- Congresses; Programming (Electronic
                 computers) --- Congresses; UNIX (Computer operating
                 system) --- Congresses",
}

@Proceedings{USENIX:1989:UCPb,
  editor =       "{USENIX}",
  booktitle =    "{USENIX} Conference Proceedings, Summer, 1989.
                 Baltimore, {MD}",
  title =        "{USENIX} Conference Proceedings, Summer, 1989.
                 Baltimore, {MD}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  month =        "Summer",
  year =         "1989",
  bibdate =      "Wed Aug 13 10:48:45 MDT 1997",
  bibsource =    "ftp://ftp.uu.net/library/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  location =     "Baltimore, MD",
}

@Proceedings{Brassard:1990:ACC,
  editor =       "Gilles Brassard",
  booktitle =    "{Advances in cryptology: CRYPTO '89: proceedings}",
  title =        "{Advances in cryptology: CRYPTO '89: proceedings}",
  volume =       "435",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 634",
  year =         "1990",
  CODEN =        "LNCSD9",
  ISBN =         "0-387-97317-6, 3-540-97317-6",
  ISBN-13 =      "978-0-387-97317-3, 978-3-540-97317-1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  LCCN =         "QA76.9.A25 C79 1989",
  bibdate =      "Tue Mar 18 11:09:00 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  note =         "Conference held Aug. 20--24, 1989 at the University of
                 California, Santa Barbara.",
  series =       ser-LNCS,
  URL =          "http://link.springer-ny.com/link/service/series/0558/tocs/t0435.htm;
                 http://www.springerlink.com/content/978-0-387-97317-3;
                 http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=435",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses",
  remark =       "The conference was held at the University of
                 California, Santa Barbara, August 20--24, 1989.",
}

@Proceedings{USENIX:1999:UAT,
  editor =       "{USENIX}",
  booktitle =    "Usenix Annual Technical Conference. June 6--11, 1999.
                 Monterey, California, {USA}",
  title =        "Usenix Annual Technical Conference. June 6--11, 1999.
                 Monterey, California, {USA}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  bookpages =    "ix + 322",
  pages =        "ix + 322",
  year =         "1999",
  ISBN =         "1-880446-33-2",
  ISBN-13 =      "978-1-880446-33-1",
  LCCN =         "A76.8.U65 U843 1999",
  bibdate =      "Thu Feb 24 11:34:22 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://db.usenix.org/publications/library/proceedings/usenix99",
  acknowledgement = ack-nhfb,
  xxLCCN =       "????",
}