%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "4.114", %%% date = "02 November 2023", %%% time = "07:28:45 MDT", %%% filename = "cryptography.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "https://www.math.utah.edu/~beebe", %%% checksum = "43735 29879 122963 1260134", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "bibliography; BibTeX; Blowfish; cipher; %%% Clipper; code breaking; cracking; %%% cryptanalysis; crypto; cryptobytes; %%% cryptography; cryptology; cryptosystem; data %%% encryption algorithm; decryption; DES; %%% Diffie; digital signature; encryption; %%% Hellmann; International Data Encryption %%% Algorithm (IDEA); Kahn; Kerberos; key escrow; %%% kleptography; PGP; Pretty Good Privacy; %%% Rivest; RSA; Schneier; Smart Card; %%% steganography; Twofish; Zimmermann", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is bibliography of publications on %%% cryptography and related subjects for the %%% years 1404--1989. Material for years %%% 1990--date appears in companion %%% bibliographies, cryptography1990.bib, %%% cryptography2000.bib, and so on, to reduce %%% the size of this bibliography. %%% %%% At version 3.29 of this file, the number of %%% entries exceeded 4000, so material for the %%% 1990s was moved into a new file, %%% cryptography1990.bib. %%% %%% The initial draft of this bibliography was %%% extracted using the bibsearch utility from %%% the large TeX User Group and BibNet Project %%% bibliography archives, available on the %%% Internet at %%% %%% ftp://ftp.math.utah.edu/pub/tex/bib %%% https://www.math.utah.edu/pub/tex/bib/index-table.html %%% %%% and %%% %%% ftp://ftp.math.utah.edu/pub/bibnet %%% https://www.math.utah.edu/pub/bibnet/index.html %%% %%% As of August 2017, these archives hold more %%% than 1,300,000 bibliographic entries in %%% BibTeX form. %%% %%% Those results were then augmented by entries %%% for books found in the University of %%% California Melvyl catalog, the Library of %%% Congress catalog, and the OCLC WorldCat %%% database, and by other publications found in %%% the Compendex database, the OCLC Contents1st, %%% Proceedings, and PapersFirst databases, and %%% the MathSciNet database. %%% %%% Counterpane Systems maintains a Web site at %%% %%% http://www.counterpane.com/ %%% http://www.counterpane.com/publish.html %%% %%% with a substantial number of their technical %%% reports and articles available in electronic %%% form. %%% %%% The International Association for Cryptologic %%% Research (IACR) is a ``non-profit scientific %%% organization whose primary purpose is to %%% further research in cryptology and related %%% fields''. It has a World-Wide Web site at %%% %%% http://www.iacr.org/index.html %%% %%% IACR publishes an email newsletter thrice %%% yearly. Back issues are available starting %%% with Volume 15, Number 1, Fall 1998 at the %%% above site. It also supports a distinguished %%% lecture series %%% %%% http://www.iacr.org/publications/dl/ %%% %%% and a preprint server %%% %%% http://www.iacr.org/publications/preprint.html %%% %%% The Cryptography and Security Group at the %%% Department of Computer Science and %%% Engineering of the University of California %%% at San Diego supports a World-Wide Web site, %%% called the Theory of Cryptography Library, at %%% %%% http://philby.ucsd.edu/cryptolib/ %%% %%% There is another site with cryptographic %%% miscellanea and news articles at %%% %%% http://cryptome.org/ %%% %%% There is an archive of the cryptography %%% mailing list at %%% %%% http://www.mail-archive.com/cryptography%40wasabisystems.com/ %%% %%% All of the cited references from all of the %%% articles in the online journal CryptoBytes %%% are also included, with referencedin key %%% values recording the source of citations. %%% %%% However, publications in the journals %%% %%% * Cryptography and Communications, %%% * Cryptologia, %%% * Designs, Codes, and Cryptography, %%% * Groups Complexity Cryptology, %%% * Journal of Cryptology, %%% * Journal of Discrete Mathematical %%% Sciences and Cryptography %%% %%% are generally excluded, unless they are %%% cross-referenced by other entries in this %%% bibliography, because they are covered in %%% separate companion bibliographies, %%% cryptologia.bib, designscodescryptogr.bib, %%% jcryptology.bib, and jdiscrmathscicrypto.bib. %%% %%% Historical note: Whitfield Diffie, Martin %%% E. Hellman, and Ralph Merkle are justly %%% credited with the first publicly-reported %%% discovery (in 1976--78) of public-key key %%% cryptography. However, three British %%% researchers, James Ellis, Clifford Cocks and %%% Malcolm Williamson independently discovered %%% it earlier (about 1975), but their work was %%% secret until its declassification in 1997. %%% See entries Ellis:1975:PKC, Diffie:1976:NDC, %%% Merkle:1978:HIS, Merkle:1978:SCI. I have not %%% yet been able to locate the declassified %%% reports. Two reports by Alan Turing on %%% cryptography (entries Turing:1941:APC and %%% Turing:1941:SR) were similarly closely-held %%% secrets, and were only declassified in 2012. %%% %%% At version 4.114, the year coverage looked %%% like this: %%% %%% 1404 ( 1) 1606 ( 3) 1808 ( 0) %%% 1418 ( 0) 1620 ( 1) 1822 ( 0) %%% 1419 ( 0) 1621 ( 3) 1823 ( 0) %%% 1425 ( 0) 1627 ( 1) 1829 ( 0) %%% 1431 ( 0) 1633 ( 1) 1835 ( 0) %%% 1439 ( 0) 1641 ( 1) 1843 ( 0) %%% 1442 ( 0) 1644 ( 2) 1846 ( 0) %%% 1459 ( 0) 1661 ( 0) 1863 ( 1) %%% 1460 ( 0) 1662 ( 0) 1864 ( 1) %%% 1464 ( 0) 1666 ( 1) 1868 ( 0) %%% 1469 ( 0) 1671 ( 0) 1873 ( 1) %%% 1470 ( 1) 1672 ( 0) 1874 ( 1) %%% 1474 ( 0) 1676 ( 1) 1878 ( 0) %%% 1479 ( 0) 1681 ( 0) 1883 ( 1) %%% 1481 ( 0) 1683 ( 0) 1885 ( 1) %%% 1486 ( 0) 1688 ( 0) 1890 ( 1) %%% 1488 ( 0) 1690 ( 0) 1892 ( 1) %%% 1490 ( 0) 1692 ( 1) 1894 ( 0) %%% 1494 ( 0) 1696 ( 0) 1898 ( 1) %%% 1496 ( 0) 1698 ( 0) 1900 ( 1) %%% 1498 ( 0) 1700 ( 0) 1902 ( 1) %%% 1500 ( 0) 1702 ( 0) 1904 ( 1) %%% 1508 ( 0) 1710 ( 0) 1912 ( 1) %%% 1510 ( 0) 1712 ( 0) 1914 ( 1) %%% 1511 ( 0) 1713 ( 0) 1915 ( 1) %%% 1515 ( 0) 1717 ( 0) 1919 ( 1) %%% 1516 ( 0) 1718 ( 0) 1920 ( 1) %%% 1517 ( 0) 1719 ( 0) 1921 ( 1) %%% 1518 ( 1) 1720 ( 0) 1922 ( 4) %%% 1519 ( 0) 1721 ( 0) 1923 ( 1) %%% 1520 ( 0) 1722 ( 0) 1924 ( 2) %%% 1521 ( 0) 1723 ( 0) 1925 ( 2) %%% 1522 ( 0) 1724 ( 0) 1926 ( 1) %%% 1523 ( 0) 1725 ( 0) 1927 ( 2) %%% 1524 ( 0) 1726 ( 0) 1928 ( 1) %%% 1525 ( 0) 1727 ( 0) 1929 ( 2) %%% 1527 ( 0) 1729 ( 0) 1931 ( 3) %%% 1528 ( 0) 1730 ( 0) 1932 ( 1) %%% 1529 ( 0) 1731 ( 0) 1933 ( 1) %%% 1531 ( 0) 1733 ( 0) 1935 ( 5) %%% 1532 ( 0) 1734 ( 0) 1936 ( 3) %%% 1534 ( 0) 1736 ( 0) 1938 ( 2) %%% 1535 ( 0) 1737 ( 0) 1939 ( 8) %%% 1536 ( 0) 1738 ( 0) 1940 ( 3) %%% 1537 ( 0) 1739 ( 1) 1941 ( 5) %%% 1538 ( 0) 1740 ( 0) 1942 ( 2) %%% 1539 ( 0) 1741 ( 0) 1943 ( 9) %%% 1540 ( 0) 1742 ( 0) 1944 ( 2) %%% 1541 ( 0) 1743 ( 0) 1945 ( 6) %%% 1542 ( 0) 1744 ( 0) 1946 ( 2) %%% 1543 ( 0) 1745 ( 0) 1947 ( 2) %%% 1544 ( 0) 1746 ( 0) 1948 ( 3) %%% 1545 ( 0) 1747 ( 0) 1949 ( 1) %%% 1547 ( 0) 1749 ( 0) 1951 ( 1) %%% 1548 ( 0) 1750 ( 0) 1952 ( 2) %%% 1549 ( 0) 1751 ( 0) 1953 ( 1) %%% 1550 ( 0) 1752 ( 0) 1954 ( 1) %%% 1551 ( 0) 1753 ( 0) 1955 ( 5) %%% 1552 ( 0) 1754 ( 0) 1956 ( 4) %%% 1553 ( 0) 1755 ( 0) 1957 ( 3) %%% 1554 ( 0) 1756 ( 0) 1958 ( 2) %%% 1555 ( 0) 1757 ( 0) 1959 ( 1) %%% 1556 ( 0) 1758 ( 0) 1960 ( 6) %%% 1557 ( 0) 1759 ( 0) 1961 ( 5) %%% 1559 ( 0) 1761 ( 0) 1963 ( 4) %%% 1560 ( 0) 1762 ( 0) 1964 ( 1) %%% 1561 ( 0) 1763 ( 0) 1965 ( 1) %%% 1562 ( 0) 1764 ( 0) 1966 ( 3) %%% 1563 ( 0) 1765 ( 0) 1967 ( 9) %%% 1564 ( 0) 1766 ( 0) 1968 ( 6) %%% 1565 ( 0) 1767 ( 0) 1969 ( 7) %%% 1566 ( 0) 1768 ( 0) 1970 ( 9) %%% 1567 ( 0) 1769 ( 0) 1971 ( 7) %%% 1568 ( 0) 1770 ( 0) 1972 ( 6) %%% 1569 ( 0) 1771 ( 0) 1973 ( 11) %%% 1570 ( 0) 1772 ( 0) 1974 ( 20) %%% 1571 ( 0) 1773 ( 0) 1975 ( 24) %%% 1572 ( 0) 1774 ( 0) 1976 ( 33) %%% 1573 ( 0) 1775 ( 0) 1977 ( 22) %%% 1574 ( 0) 1776 ( 0) 1978 ( 34) %%% 1575 ( 0) 1777 ( 0) 1979 ( 57) %%% 1576 ( 0) 1778 ( 0) 1980 ( 38) %%% 1577 ( 0) 1779 ( 0) 1981 ( 51) %%% 1578 ( 0) 1780 ( 0) 1982 ( 71) %%% 1579 ( 0) 1781 ( 0) 1983 ( 74) %%% 1580 ( 0) 1782 ( 0) 1984 ( 66) %%% 1581 ( 0) 1783 ( 0) 1985 ( 119) %%% 1582 ( 0) 1784 ( 0) 1986 ( 79) %%% 1583 ( 0) 1785 ( 0) 1987 ( 100) %%% 1584 ( 0) 1786 ( 0) 1988 ( 139) %%% 1585 ( 0) 1787 ( 0) 1989 ( 108) %%% 1586 ( 0) 1788 ( 0) 1990 ( 1) %%% 1587 ( 0) 1789 ( 0) 1991 ( 1) %%% 1588 ( 0) 1790 ( 0) 1992 ( 1) %%% 1589 ( 0) 1791 ( 0) 1993 ( 2) %%% 1592 ( 0) 1794 ( 0) 1996 ( 1) %%% 1593 ( 0) 1795 ( 0) 1997 ( 2) %%% 1594 ( 0) 1796 ( 0) 1998 ( 3) %%% 1595 ( 0) 1797 ( 0) 1999 ( 3) %%% 1596 ( 0) 1798 ( 0) 2000 ( 1) %%% 1597 ( 0) 1799 ( 0) 2001 ( 1) %%% 1598 ( 0) 1800 ( 0) 2002 ( 1) %%% 1605 ( 0) 1807 ( 0) 2009 ( 1) %%% 19xx ( 2) %%% %%% Article: 561 %%% Book: 306 %%% Booklet: 1 %%% InCollection: 31 %%% InProceedings: 142 %%% Manual: 19 %%% MastersThesis: 39 %%% Misc: 16 %%% Periodical: 3 %%% PhdThesis: 11 %%% Proceedings: 62 %%% TechReport: 66 %%% Unpublished: 3 %%% %%% Total entries: 1260 %%% %%% There is a hypertext bibliography of %%% classical cryptography at %%% %%% http://ourworld.compuserve.com/homepages/crypto/BIB1XX.HTM %%% %%% CIPHER, the Electronic Newsletter of the %%% Technical Committee on Security and Privacy, %%% A Technical Committee of the Computer Society %%% of the IEEE, is available on the World-Wide %%% Web at %%% %%% http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher %%% %%% with pointers to all back issues (1994--1998). %%% %%% ``CRYPTO-GRAM is a free monthly newsletter %%% providing summaries, analyses, insights, and %%% commentaries on cryptography and computer %%% security. To subscribe, visit %%% %%% http://www.counterpane.com/crypto-gram.html %%% %%% or send a blank message to %%% %%% crypto-gram-subscribe at chaparraltree.com %%% %%% Back issues are available on %%% %%% http://www.counterpane.com'' %%% %%% CRYPTO-GRAM is a good source of news of %%% recent developments in the field, and %%% contains many interesting essays on aspects %%% of cryptography. %%% %%% There is a Web site on steganography at %%% %%% http://www.cl.cam.ac.uk/~fapp2/steganography/ %%% %%% In this bibliography, entries are sorted %%% first by ascending year, and within each %%% year, alphabetically by author or editor, %%% and then, if necessary, by the 3-letter %%% abbreviation at the end of the BibTeX %%% citation tag, using the bibsort -byyear %%% utility. Year order has been chosen to %%% make it easier to identify the most recent %%% work. %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ====================================================================

@Preamble{ "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" # "\ifx \undefined \cprime \def \cprime {$\mathsurround=0pt '$}\fi" # "\ifx \undefined \Dbar \def \Dbar {\leavevmode\raise0.2ex\hbox{--}\kern-0.5emD} \fi" # "\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi" # "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi" # "\ifx \undefined \operatorname \def \operatorname #1{{\rm #1}}\fi" # "\hyphenation{ Aba-di Arch-ives Ding-yi for-ge-ry Go-pa-la-krish-nan Hi-de-ki Kraw-czyk Lands-verk Law-rence Leigh-ton Mich-ael Moell-er North-ridge para-digm para-digms Piep-rzyk Piv-e-teau Ram-kilde Re-tro-fit-ting Rich-ard Sho-stak Si-ro-mo-n-ey Ste-ph-en The-o-dore Tho-m-as Tzone-lih venge-ance Will-iam Ye-sh-i-va }" }

%%% ==================================================================== %%% Acknowledgement abbreviations:

@String{ack-bs= "Bruce Schneier, Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419, e-mail: \path|schneier@counterpane.com"} @String{ack-nhfb= "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|https://www.math.utah.edu/~beebe/|"} @String{ack-pb= "Preston Briggs, Tera Computer Company, 2815 Eastlake East, Seattle, WA 98102, USA, Tel: +1 206 325-0800, e-mail: \path|preston@tera.com|"}

%%% ==================================================================== %%% Institution abbreviations:

@String{inst-COUNTERPANE-INTERNET-SECURITY= "Counterpane Internet Security"} @String{inst-COUNTERPANE-INTERNET-SECURITY:adr= "3031 Tisch Way, Suite 100PE, San Jose, CA 95128, USA"} @String{inst-COUNTERPANE-LABS= "Counterpane Systems"} @String{inst-COUNTERPANE-LABS:adr= "101 East Minnehaha Parkway, Minneapolis, MN 55419"} @String{inst-COUNTERPANE-SYSTEMS= "Counterpane Systems"} @String{inst-COUNTERPANE-SYSTEMS:adr= "101 East Minnehaha Parkway, Minneapolis, MN 55419"}

%% Old address: %% String{inst-COUNTERPANE-SYSTEMS:adr = "Oak Park, IL, USA"}

@String{inst-CSU= "Colorado State University"} @String{inst-CSU:adr= "Fort Collins, CO, USA"} @String{inst-IBM-WATSON= "IBM T. J. Watson Research Center"} @String{inst-IBM-WATSON:adr= "Yorktown Heights, NY, USA"} @String{inst-KENT-STATE-UNIV= "Kent State University"} @String{inst-KENT-STATE-UNIV:adr= "Kent, OH, USA"} @String{inst-MIT-CS= "Massachusetts Institute of Technology, Computer Science Lab."} @String{inst-MIT:adr= "Cambridge, Massachusetts"} @String{inst-NORTHWESTERN-UNIVERSITY= "Northwestern University"} @String{inst-NORTHWESTERN-UNIVERSITY:adr= "Evanston, IL, USA"} @String{inst-SRC-IDA= "Supercomputing Research Center: IDA"} @String{inst-SRC-IDA:adr= "Lanham, MD, USA"} @String{inst-UC-BERKELEY-ICSI= "International Computer Science Institute"} @String{inst-UC-BERKELEY-ICSI:adr= "Berkeley, CA, USA"} @String{inst-UIUC-CSRD= "University of Illinois at Urbana-Champaign, Center for Supercomputing Research and Development"} @String{inst-UIUC-CSRD:adr= "Urbana, IL 61801, USA"} @String{inst-UTK= "University of Tennessee, Knoxville"} @String{inst-UTK:adr= "Knoxville, TN 37996, USA"}

%%% ==================================================================== %%% Journal abbreviations:

@String{j-ADV-ENG-SOFTWARE= "Advances in Engineering Software"} @String{j-ADV-IMAGING= "Advanced Imaging"} @String{j-ALGORITHMICA= "Algorithmica"} @String{j-AM-DOC= "American Documentation"} @String{j-AMBIX= "Ambix: Journal of the Society for the History of Alchemy and Chemistry"} @String{j-AMER-MATH-MONTHLY= "American Mathematical Monthly"} @String{j-AMER-STAT= "The American Statistician"} @String{j-ANN-BIOMED-ENG= "Annals of biomedical engineering"} @String{j-ANN-HIST-COMPUT= "Annals of the History of Computing"} @String{j-ANN-MATH= "Annals of Mathematics"} @String{j-ANNALS-MATH-STAT= "Ann. Math. Stat."} @String{j-APPL-ALGEBRA-ENG-COMMUN-COMPUT= "Applicable algebra in engineering, communication and computing"} @String{j-APPL-MATH-COMP= "Applied Mathematics and Computation"} @String{j-APPL-MATH-LETT= "Applied Mathematics Letters"} @String{j-APPL-NUM-MATH= "Applied Numerical Mathematics: Transactions of IMACS"} @String{j-APPL-STAT= "Applied Statistics"} @String{j-ATT-BELL-LAB-TECH-J= "ATT Bell Lab. tech. j"} @String{j-ATT-TECH-J= "AT\&T Technical Journal"} @String{j-BANK-SYST-TECHNOL= "Bank systems + technology"} @String{j-BELL-SYST-TECH-J= "The Bell System Technical Journal"} @String{j-BIT= "BIT"} @String{j-BT-TECH-J= "BT Technology Journal"} @String{j-BULL-AUSTRAL-MATH-SOC= "Bulletin of the Australian Mathematical Society"} @String{j-BYTE= "BYTE Magazine"} @String{j-C-PLUS-PLUS-REPORT= "C++ Report"} @String{j-CACM= "Communications of the Association for Computing Machinery"} @String{j-CCCUJ= "C/C++ Users Journal"} @String{j-CG-WORLD= "Computer Graphics World"} @String{j-CGF= "Com{\-}pu{\-}ter Graphics Forum"} @String{j-CGIP= "Computer Graphics and Image Processing"} @String{j-CHIN-J-COMPUTERS= "Chinese Journal of Computers = Chi suan chi hsueh pao"} @String{j-CISCO-WORLD= "Cisco World: The Independent Journal for Internetworking Professionals"} @String{j-COLLEGE-MATH-J= "College Mathematics Journal"} @String{j-COMP-ARCH-NEWS= "ACM SIGARCH Computer Architecture News"} @String{j-COMP-COMM-REV= "Computer Communications Review, ACM SIGCOMM"} @String{j-COMP-GRAPHICS= "Computer Graphics"} @String{j-COMP-J= "The Computer Journal"} @String{j-COMP-LANG-MAG= "Computer Language Magazine"} @String{j-COMP-LANGS= "Computer Languages"} @String{j-COMP-LAW-SECURITY-REP= "The Computer Law and Security Report"} @String{j-COMP-NET= "Computer Networks: The International Journal of Distributed Informatique"} @String{j-COMP-NET-AMSTERDAM= "Computer Networks (Amsterdam, Netherlands: 1999)"} @String{j-COMP-NET-ISDN= "Computer Networks and ISDN Systems"} @String{j-COMP-PHYSICS= "Computers in physics"} @String{j-COMP-STRUCTURES= "Computers and Structures"} @String{j-COMP-SURV= "ACM Computing Surveys"} @String{j-COMP-SYS= "Computing Systems"} @String{j-COMPLEX-SYSTEMS= "Complex Systems"} @String{j-COMPUT-COMPLEX= "Computational complexity"} @String{j-COMPUT-MATH-APPL= "Computers and Mathematics with Applications"} @String{j-COMPUT-METH-PROG-BIOMED= "Computer Methods and Programs in Biomedicine"} @String{j-COMPUT-PHYS= "Computers in Physics"} @String{j-COMPUT-SECUR= "Computers and Security"} @String{j-COMPUT-SECUR-J= "Computer Security Journal"} @String{j-COMPUT-SYST-ENG= "Computing systems in engineering: an international journal"} @String{j-COMPUT-SYST-SCI-ENG= "Computer Systems Science and Engineering"} @String{j-COMPUTER= "Computer"} @String{j-COMPUTERS-AND-GRAPHICS= "Computers and Graphics"} @String{j-COMPUTERWORLD= "Computerworld"} @String{j-COMPUTING= "Computing"}

%%%

@String{j-CONG-NUM= "Congressus Numerantium"} @String{j-CONN-LAW-REVIEW= "Connecticut Law Review"} @String{j-CRYPTOBYTES= "CryptoBytes"} @String{j-CRYPTOLOG= "Cryptolog"} @String{j-CRYPTOLOGIA= "Cryptologia"} @String{j-CUJ= "C Users Journal"} @String{j-CVGIP= "Computer Vision, Graphics, and Image Processing"} @String{j-CVGIP-GMIP= "Computer Vision, Graphics, and Image Processing. Graphical Models and Image Processing"} @String{j-DATAMATION= "Datamation"} @String{j-DDDU= "Dr. Dobb's Developer Update"} @String{j-DDJ= "Dr. Dobb's Journal of Software Tools"} @String{j-DEC-TECH-J= "Digital Technical Journal of Digital Equipment Corporation"} @String{j-DESIGN-NEWS= "Design news"} @String{j-DESIGNS-CODES-CRYPTOGR= "Designs, Codes, and Cryptography"} @String{j-DIALECTICA= "Dialectica: International Review of Philosophy of Knowledge"} @String{j-DISCRETE-APPL-MATH= "Discrete Applied Mathematics"} @String{j-DISCRETE-MATH-APPL= "Discrete Mathematics and Applications"} @String{j-ELECT-COMM-JAPAN-3-FUND-ELECT-SCI= "Electronics and communications in Japan. Part 3, Fundamental electronic science"} @String{j-ELECT-LETTERS= "Electronics Letters"} @String{j-ELECTRONIC-DESIGN= "Electronic Design"} @String{j-ELECTRONICS= "Electronics"} @String{j-EMBED-SYS-PROG= "Embedded Systems Programming"} @String{j-ENG-FRACTURE-MECH= "Engineering fracture mechanics"} @String{j-EPODD= "Electronic Pub\-lish\-ing\emdash{}Orig\-i\-na\-tion, Dissemination, and Design"} @String{j-ETT= "European Transactions on Telecommunications: ETT"} @String{j-EUR-J-OPER-RES= "European Journal of Operational Research"} @String{j-EUR-TRANS-TELECOMM= "European transactions on telecommunications and related technologies"} @String{j-EUUG-NEWSLETTER= "EUUG Newsletter"} @String{j-FED-REGIST= "Federal Register"} @String{j-FINANC-TECH-INT-BULL= "Financial Technology International Bulletin"} @String{j-FUT-GEN-COMP-SYS= "Future Generation Computer Systems"} @String{j-GRAPH-MODELS-IMAGE-PROC= "Graphical models and image processing: GMIP"} @String{j-HEWLETT-PACKARD-J= "Hew\-lett-Pack\-ard Journal: technical information from the laboratories of Hew\-lett-Pack\-ard Company"} @String{j-HIST-MATH= "Historia Mathematica"} @String{j-HONEYWELL-COMP-J= "Honeywell Computer Journal"} @String{j-IBM-JRD= "IBM Journal of Research and Development"} @String{j-IBM-SYS-J= "IBM Systems Journal"} @String{j-IEE-CONF-PUBL= "IEE conference publication"} @String{j-IEE-PROC-VIS-IMAGE-SIGNAL-PROCESS= "IEE proceedings. Vision, image, and signal processing"} @String{j-IEEE-ANN-HIST-COMPUT= "IEEE Annals of the History of Computing"} @String{j-IEEE-ASSP= "IEEE Trans. ASSP"} @String{j-IEEE-CGA= "IEEE Computer Graphics and Applications"} @String{j-IEEE-COMM-MAG= "IEEE Communications Magazine"} @String{j-IEEE-J-SEL-AREAS-COMMUN= "IEEE Journal on Selected Areas in Communications"} @String{j-IEEE-MICRO= "IEEE Micro"} @String{j-IEEE-MULTIMEDIA= "IEEE MultiMedia"} @String{j-IEEE-PAR-DIST-TECH= "IEEE parallel and distributed technology: systems and applications"} @String{j-IEEE-SOFTWARE= "IEEE Software"} @String{j-IEEE-SPECTRUM= "IEEE Spectrum"} @String{j-IEEE-TRANS-COMM= "IEEE Transactions on Communications"} @String{j-IEEE-TRANS-COMPUT= "IEEE Transactions on Computers"} @String{j-IEEE-TRANS-CONSUMER-ELECTRONICS= "IEEE Transactions on Consumer Electronics"} @String{j-IEEE-TRANS-IMAGE-PROCESS= "IEEE Transactions on Image Processing"} @String{j-IEEE-TRANS-INF-THEORY= "IEEE Transactions on Information Theory"} @String{j-IEEE-TRANS-NETWORKING= "IEEE\slash ACM Transactions on Networking"} @String{j-IEEE-TRANS-PAR-DIST-SYS= "IEEE Transactions on Parallel and Distributed Systems"} @String{j-IEEE-TRANS-PATT-ANAL-MACH-INTEL= "IEEE Transactions on Pattern Analysis and Machine Intelligence"} @String{j-IEEE-TRANS-PROF-COMM= "IEEE Transactions on Professional Communication"} @String{j-IEEE-TRANS-SOFTW-ENG= "IEEE Transactions on Software Engineering"} @String{j-IEICE-TRANS-FUND-ELECT= "IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences"} @String{j-IJQC= "International Journal of Quantum Chemistry"} @String{j-IJSAHPC= "The International Journal of Supercomputer Applications and High Performance Computing"} @String{j-IMAGE-VIS-COMPUT= "Image and Vision Computing"} @String{j-INF-COMM-TECH-LAW= "Information \& Communications Technology Law"} @String{j-INF-COMPUT= "Information and Computation"} @String{j-INF-CONTROL= "Information and Control"} @String{j-INF-SOC= "The Information Society"} @String{j-INFO-PROC-LETT= "Information Processing Letters"} @String{j-INFO-PROC-MAN= "Information Processing and Management"} @String{j-INFORMATIK-SPEKTRUM= "Informatik Spektrum"} @String{j-INFORMATION-WEEK= "Information Week"} @String{j-INFOWORLD= "InfoWorld"} @String{j-INT-J-BIFURC-CHAOS-APPL-SCI-ENG= "International journal of bifurcation and chaos in applied sciences and engineering"} @String{j-INT-J-COMPUT-INF-SCI= "International Journal of Computer and Information Sciences"} @String{j-INT-J-COMPUT-MATH= "International Journal of Computer Mathematics"} @String{j-INT-J-COMPUT-SYST-SCI-ENG= "International Journal of Computer Systems Science and Engineering"} @String{j-INT-J-ELECTRON= "International Journal of Electronics Theoretical \& Experimental"} @String{j-INT-J-SYST-SCI= "International Journal of Systems Science"} @String{j-INT-J-THEOR-PHYS= "International Journal of Theoretical Physics"} @String{j-INTELL-NATL-SECUR= "Intelligence and National Security"} @String{j-ISIS= "Isis"} @String{j-J-ACM= "Journal of the Association for Computing Machinery"} @String{j-J-ALG= "Journal of Algorithms"} @String{j-J-COMP-SCI-TECH= "Journal of computer science and technology"} @String{j-J-COMP-SECUR= "Journal of Computer Security"} @String{j-J-COMP-SYS-SCI= "Journal of Computer and System Sciences"} @String{j-J-CRYPTOLOGY= "Journal of Cryptology"} @String{j-J-DOC= "Journal of Documentation"} @String{j-J-ELECTRON-IMAGING= "Journal of Electronic Imaging"} @String{j-J-ENG-MECH= "Journal of Engineering Mechanics"} @String{j-J-MATH-PHYS= "Journal of Mathematical Physics"} @String{j-J-PAR-DIST-COMP= "Journal of Parallel and Distributed Computing"} @String{j-J-PHYS-E= "Journal of Physics. E: Scientific Instruments"} @String{j-J-RES-NATL-INST-STAND-TECHNOL= "Journal of research of the National Institute of Standards and Technology"} @String{j-J-SCI-IND-RES= "Journal of Scientific and Industrial Research"} @String{j-J-SIAM= "Journal of the Society for Industrial and Applied Mathematics"} @String{j-J-SUPERCOMPUTING= "The Journal of Supercomputing"} @String{j-J-SYMBOLIC-COMP= "Journal of Symbolic Computation"} @String{j-J-SYST-SOFTW= "The Journal of Systems and Software"} @String{j-J-UCS= "J.UCS: Journal of Universal Computer Science"} @String{j-J-VIS-COMP-ANIMATION= "The Journal of Visualization and Computer Animation"} @String{j-JAVAWORLD= "JavaWorld: IDG's magazine for the Java community"} @String{j-LECT-NOTES-COMP-SCI= "Lecture Notes in Computer Science"} @String{j-LINEAR-ALGEBRA-APPL= "Linear Algebra and its Applications"} @String{j-LINUX-J= "Linux Journal"} @String{j-LMS-J-COMPUT-MATH= "LMS Journal of Computation and Mathematics"} @String{j-LOGIN= ";login: the USENIX Association newsletter"} @String{j-MACUSER= "MacUser"} @String{j-MATH-COMP-EDU= "Mathematics and computer education"} @String{j-MATH-COMP-MODELLING= "Mathematical and computer modelling"} @String{j-MATH-COMPUT= "Mathematics of Computation"} @String{j-MATH-GAZ= "The Mathematical Gazette"} @String{j-MATH-MAG= "Mathematics Magazine"} @String{j-MATH-SEMESTERBER= "Mathematische Semesterberichte"} @String{j-MATH-SLOVACA= "Mathematica Slovaca"} @String{j-MATHEMATICA-J= "Mathematica Journal"} @String{j-MATHEMATIKA= "Mathematika"} @String{j-MICROELECT-RELIABILITY= "Microelectronics and Reliability"} @String{j-N-I-A-CR= "Newsletter of the International Association for Cryptologic Research"} @String{j-NAMS= "Notices of the American Mathematical Society"} @String{j-NORDIC-J-COMPUT= "Nordic Journal of Computing"} @String{j-NTT-R-D= "NTT R\&D"} @String{j-NUM-LIN-ALG-APPL= "Numerical linear algebra with applications"} @String{j-NUM-MATH= "Numerische Mathematik"} @String{j-NUMER-ALGORITHMS= "Numerical Algorithms"} @String{j-NY-TIMES= "New York Times"} @String{j-OBZORNIK-MAT-FIZ= "Dru{\\v{s}}tvo Matematikov, Fizikov in Astronomov SRS. Obzornik za Matematiko in Fiziko"} @String{j-OPEN-COMPUTING= "Open Computing"} @String{j-OPEN-SYSTEMS-TODAY= "Open Systems Today"} @String{j-OPER-SYS-REV= "Operating Systems Review"} @String{j-PARALLEL-ALGORITHMS-APPL= "Parallel Algorithms and Applications"} @String{j-PARALLEL-COMPUTING= "Parallel Computing"} @String{j-PARALLEL-PROCESS-LETT= "Parallel Processing Letters"} @String{j-PC-TECH= "PC Techniques"} @String{j-PERFORM-COMPUT= "Performance Computing"} @String{j-PHILIPS-J-RES= "Philips Journal of Research"} @String{j-PROC-ICASSP= "Proceedings of the International Conference on Acoustics, Speech, and Signal Processing"} @String{j-PROC-CAMBRIDGE-PHIL-SOC= "Proceedings of the Cambridge Philosophical Society. Mathematical and physical sciences"} @String{j-PROC-IEEE= "Proceedings of the IEEE"} @String{j-PROC-SPIE= "Proceedings of the SPIE --- The International Society for Optical Engineering"} @String{j-SCI-AMER= "Scientific American"} @String{j-SCI-AMER-INT-ED= "Scientific American [International Edition]"} @String{j-SCI-COMPUT-PROGRAM= "Science of Computer Programming"} @String{j-SCIENCE= "Science"} @String{j-SCIENCE-NEWS= "Science News (Washington, DC)"} @String{j-SIAM-J-ALG-DISC-METH= "SIAM Journal on Algebraic and Discrete Methods"} @String{j-SIAM-J-APPL-MATH= "SIAM Journal on Applied Mathematics"} @String{j-SIAM-J-COMPUT= "SIAM Journal on Computing"} @String{j-SIAM-J-DISCR-MATH= "SIAM Journal on Discrete Mathematics"} @String{j-SIAM-J-MAT-ANA-APPL= "SIAM Journal on Matrix Analysis and Applications"} @String{j-SIAM-J-NUMER-ANAL= "SIAM Journal on Numerical Analysis"} @String{j-SIAM-J-SCI-STAT-COMP= "SIAM Journal on Scientific and Statistical Computing"} @String{j-SIAM-REVIEW= "SIAM Review"} @String{j-SIG-PROC= "Signal Processing"} @String{j-SIGACT= "ACM SIGACT News"} @String{j-SIGADA-LETTERS= "ACM SIGADA Ada Letters"} @String{j-SIGCSE= "SIGCSE Bulletin (ACM Special Interest Group on Computer Science Education)"} @String{j-SIGMETRICS= "ACM SIGMETRICS Performance Evaluation Review"} @String{j-SIGMOD= "SIGMOD Record (ACM Special Interest Group on Management of Data)"} @String{j-SIGNUM= "ACM SIGNUM Newsletter"} @String{j-SIGPLAN= "ACM SIG{\-}PLAN Notices"} @String{j-SIGSAM= "SIGSAM Bulletin (ACM Special Interest Group on Symbolic and Algebraic Manipulation)"} @String{j-SIGSOFT= "ACM SIGSOFT Software Engineering Notes"} @String{j-SMITHSONIAN= "Smithsonian"} @String{j-SOUTHCON= "Southcon Conference Record"} @String{j-SPE= "Soft\-ware\emdash Prac\-tice and Experience"} @String{j-SUNSERVER= "SunServer"} @String{j-SUPER-REV= "Supercomputing Review"} @String{j-SUPERCOMPUTER= "Supercomputer"} @String{j-SUPERCOMPUTING-REVIEW= "Supercomputing Review"} @String{j-SYS-ADMIN= "Sys Admin: The Journal for UNIX Systems Administrators"} @String{j-SYS-COMP-JAPAN= "Systems and computers in Japan"} @String{j-TECH-COMMUN= "Technical Communication"} @String{j-TECH-CULTURE= "Technology and Culture"} @String{j-TELECOMMUNICATIONS-AMERICAS-ED= "Telecommunications (Americas Edition)"} @String{j-THEOR-COMP-SCI= "Theoretical Computer Science"} @String{j-TOCS= "ACM Transactions on Computer Systems"} @String{j-TODS= "ACM Transactions on Database Systems"} @String{j-TOIS= "ACM Transactions on Information Systems"} @String{j-TOMS= "ACM Transactions on Mathematical Software"} @String{j-TOOIS= "ACM Transactions on Office Information Systems"} @String{j-TOPLAS= "ACM Transactions on Programming Languages and Systems"} @String{j-TRANS-AM-NUCL-SOC= "Transactions of the American Nuclear Society"} @String{j-UNIX-DEVELOPER= "UNIX Developer"} @String{j-UNIX-WORLD= "UNIX/world"} @String{j-VISIBLE-LANGUAGE= "Visible Language"} @String{j-WEBSERVER= "WebServer Magazine: For Managers of World Wide Web Sites"} @String{j-WORD-WAYS= "Word Ways"} @String{j-X-RESOURCE= "{The X Resource}"}

%%% ==================================================================== %%% Organization abbreviations:

@String{org-GENERAL-ELECTRIC= "General Electric"} @String{org-GENERAL-ELECTRIC:adr= "Schenectady, NY, USA"}

%%% ==================================================================== %%% Publisher abbreviations:

@String{pub-A-K-PETERS= "A. K. Peters, Ltd."} @String{pub-A-K-PETERS:adr= "Wellesley, MA, USA"} @String{pub-ACADEMIC= "Academic Press"} @String{pub-ACADEMIC:adr= "New York, NY, USA"} @String{pub-ACM= "ACM Press"} @String{pub-ACM:adr= "New York, NY 10036, USA"} @String{pub-AEGEAN-PARK= "Aegean Park Press"} @String{pub-AEGEAN-PARK:adr= "Laguna Hills, CA, USA"} @String{pub-AFIPS= "AFIPS Press"} @String{pub-AFIPS:adr= "Montvale, NJ, USA"} @String{pub-AMS= "American Mathematical Society"} @String{pub-AMS:adr= "Providence, RI, USA"} @String{pub-ANSI= "American National Standards Institute"} @String{pub-ANSI:adr= "1430 Broadway, New York, NY 10018, USA"} @String{pub-AP-PROFESSIONAL= "AP Professional"} @String{pub-AP-PROFESSIONAL:adr= "Boston, MA, USA"} @String{pub-ARTECH= "Artech House Inc."} @String{pub-ARTECH:adr= "Norwood, MA, USA"} @String{pub-AW= "Ad{\-d}i{\-s}on-Wes{\-l}ey"} @String{pub-AW:adr= "Reading, MA, USA"} @String{pub-BIRKHAUSER= "Birkh{\"a}user Verlag"} @String{pub-BIRKHAUSER:adr= "Basel, Switzerland"} @String{pub-BLACKWELL-SCI= "Blackwell Scientific Publications"} @String{pub-BLACKWELL-SCI:adr= "Oxford, UK"} @String{pub-CAMBRIDGE= "Cambridge University Press"} @String{pub-CAMBRIDGE:adr= "Cambridge, UK"} @String{pub-CHAPMAN-HALL= "Chapman and Hall, Ltd."} @String{pub-CHAPMAN-HALL:adr= "London, UK"} @String{pub-CLARENDON= "Clarendon Press"} @String{pub-CLARENDON:adr= "Oxford, UK"} @String{pub-CRC= "CRC Press"} @String{pub-CRC:adr= "2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA"} @String{pub-CUP= "Cambridge University Press"} @String{pub-CUP:adr= "New York, NY, USA"} @String{pub-DEKKER= "Marcel Dekker, Inc."} @String{pub-DEKKER:adr= "New York, NY, USA"} @String{pub-DOUBLEDAY= "Doubleday"} @String{pub-DOUBLEDAY:adr= "New York, NY, USA"} @String{pub-DOVER= "Dover Publications, Inc."} @String{pub-DOVER:adr= "New York, NY, USA"} @String{pub-ELSEVIER= "Elsevier"} @String{pub-ELSEVIER:adr= "Amsterdam, The Netherlands"} @String{pub-ESP= "Elsevier Science Publishers"} @String{pub-ESP:adr= "Amsterdam, The Netherlands"} @String{pub-FREEMAN= "W.H. Freeman"} @String{pub-FREEMAN:adr= "San Francisco, CA, USA and New York, NY, USA"} @String{pub-GAUTHIER-VILLARS= "Gauthier-Villars"} @String{pub-GAUTHIER-VILLARS:adr= "Paris, France"} @String{pub-GORDON-BREACH= "Gordon and Breach"} @String{pub-GORDON-BREACH:adr= "Langhorne, PA, USA"} @String{pub-HARCOURT-BRACE-JOVANOVICH= "Harcourt, Brace, Jovanovich"} @String{pub-HARCOURT-BRACE-JOVANOVICH:adr= "San Diego, CA, USA"} @String{pub-HARPER-ROW= "Harper \& Row"} @String{pub-HARPER-ROW:adr= "New York, NY, USA"} @String{pub-HARTUNG-GORRE= "Hartung-Gorre Verlag"} @String{pub-HARTUNG-GORRE:adr= "Konstanz, Switzerland"} @String{pub-HAYDEN-BOOK= "Hayden Book Co."} @String{pub-HAYDEN-BOOK:adr= "Rochelle Park, NJ, USA"} @String{pub-HOLDEN-DAY= "Holden-Day"} @String{pub-HOLDEN-DAY:adr= "San Francisco, CA, USA"} @String{pub-HOUGHTON-MIFFLIN= "Houghton-Mifflin"} @String{pub-HOUGHTON-MIFFLIN:adr= "Boston, MA, USA"} @String{pub-IBM= "IBM Corporation"} @String{pub-IBM:adr= "San Jose, CA, USA"} @String{pub-IEE= "IEE"} @String{pub-IEE:adr= "London, UK"} @String{pub-IEEE= "IEEE Computer Society Press"} @String{pub-IEEE:adr= "1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA"} @String{pub-IMA= "Institute of Mathematics and its Applications"} @String{pub-IMA:adr= "Southend-on-Sea, UK"} @String{pub-IOS= "IOS Press"} @String{pub-IOS:adr= "Postal Drawer 10558, Burke, VA 2209-0558, USA"} @String{pub-ISO= "International Organization for Standardization"} @String{pub-ISO:adr= "Geneva, Switzerland"} @String{pub-JOHNS-HOPKINS= "The Johns Hopkins University Press"} @String{pub-JOHNS-HOPKINS:adr= "Baltimore, MD, USA"} @String{pub-JW= "John Wiley"} @String{pub-JW:adr= "New York, NY, USA"} @String{pub-KAP= "Kluwer Academic Publisher"} @String{pub-KAP:adr= "Norwell, MA, USA, and Dordrecht, The Netherlands"} @String{pub-KLUWER= "Kluwer Academic Publishers"} @String{pub-KLUWER:adr= "Dordrecht, The Netherlands"} @String{pub-KNOPF= "Alfred A. Knopf"} @String{pub-KNOPF:adr= "New York, NY, USA"} @String{pub-MACMILLAN= "MacMillan Publishing Company"} @String{pub-MACMILLAN:adr= "New York, NY, USA"} @String{pub-MANNING= "Manning Publications"} @String{pub-MANNING:adr= "Greenwich, CT, USA"} @String{pub-MASSON= "Masson Editeur"} @String{pub-MASSON:adr= "Masson, France"} @String{pub-MATH-ASSOC-AMER= "Mathematical Association of America"} @String{pub-MATH-ASSOC-AMER:adr= "Washington, DC, USA"} @String{pub-MCGRAW-HILL= "Mc{\-}Graw-Hill"} @String{pub-MCGRAW-HILL:adr= "New York, NY, USA"} @String{pub-MILLER-FREEMAN= "Miller Freeman Publications"} @String{pub-MILLER-FREEMAN:adr= "San Francisco, CA, USA"} @String{pub-MINDQ= "MindQ Publishing, Inc."} @String{pub-MINDQ:adr= "450 Springpark Place Ste. 1200, Herndon, VA 20170, USA, Tel: +1 703 708-9380"} @String{pub-MIT= "MIT Press"} @String{pub-MIT:adr= "Cambridge, MA, USA"} @String{pub-NAP= "National Academy Press"} @String{pub-NAP:adr= "Washington, DC, USA"} @String{pub-NAT-COMP-CENTRE= "National Computing Centre"} @String{pub-NAT-COMP-CENTRE:adr= "Manchester, UK"} @String{pub-NBS= "U.S. National Bureau of Standards"} @String{pub-NBS:adr= "Gaithersburg, MD, USA"} @String{pub-NIST= "National Institute for Standards and Technology"} @String{pub-NIST:adr= "Gaithersburg, MD 20899-8900, USA"} @String{pub-NORTH-HOLLAND= "North-Hol{\-}land"} @String{pub-NORTH-HOLLAND:adr= "Amsterdam, The Netherlands"} @String{pub-NORTON= "W. W. Norton \& Co."} @String{pub-NORTON:adr= "New York, NY, USA"} @String{pub-NTIS= "National Technical Information Service"} @String{pub-NTIS:adr= "Washington, DC, USA"} @String{pub-ORA= "O'Reilly \& {Associates, Inc.}"} @String{pub-ORA:adr= "103a Morris Street, Sebastopol, CA 95472, USA, Tel: +1 707 829 0515, and 90 Sherman Street, Cambridge, MA 02140, USA, Tel: +1 617 354 5800"} @String{pub-OXFORD= "Oxford University Press"} @String{pub-OXFORD:adr= "Walton Street, Oxford OX2 6DP, UK"} @String{pub-PEACHPIT= "Peachpit Press, Inc."} @String{pub-PEACHPIT:adr= "1085 Keith Avenue, Berkeley, CA 94708, USA"} @String{pub-PH= "Pren{\-}tice-Hall, Inc."} @String{pub-PH:adr= "Upper Saddle River, NJ 07458, USA"} @String{pub-PHPTR= "Pren{\-}tice-Hall PTR"} @String{pub-PHPTR:adr= "Upper Saddle River, NJ 07458, USA"} @String{pub-PLENUM= "Plenum Press"} @String{pub-PLENUM:adr= "New York, NY, USA; London, UK"} @String{pub-PRINCETON= "Princeton University Press"} @String{pub-PRINCETON:adr= "Princeton, NJ, USA"} @String{pub-PROJECT-GUTENBERG= "Project Gutenberg"} @String{pub-PROJECT-GUTENBERG:adr= "P.O. Box 2782, Champaign, IL 61825-2782, USA"} @String{pub-RANDOM= "Random House"} @String{pub-RANDOM:adr= "New York, NY, USA"} @String{pub-REIDEL= "D. Reidel"} @String{pub-REIDEL:adr= "Dordrecht, Boston, Lancaster, Tokyo"} @String{pub-RSA= "RSA Data Security, Inc."} @String{pub-RSA:adr= "Redwood City, CA, USA"} @String{pub-SAMS= "Howard W. Sams"} @String{pub-SAMS:adr= "Indianapolis, IN 46268, USA"} @String{pub-SIAM= "Society for Industrial and Applied Mathematics"} @String{pub-SIAM:adr= "Philadelphia, PA, USA"} @String{pub-SIMON-SCHUSTER= "Simon and Schuster"} @String{pub-SIMON-SCHUSTER:adr= "1230 Ave. of the Americas, New York, NY 10020, USA"} @String{pub-SPE= "Society of Petroleum Engineers"} @String{pub-SPE:adr= "Richardson, TX, USA"} @String{pub-SPIE= "Society of Photo-optical Instrumentation Engineers (SPIE)"} @String{pub-SPIE:adr= "Bellingham, WA, USA"} @String{pub-SRI= "SRI International"} @String{pub-SRI:adr= "333 Ravenswood Avenue, Menlo Park, CA 94025-3493, USA, Tel: +1 415 859 6387, FAX: +1 415 859-6028"} @String{pub-STATSCI= "StatSci, a Division of MathSoft, Inc."} @String{pub-STATSCI:adr= "Seattle, WA, USA"} @String{pub-SUN= "Sun Microsystems"} @String{pub-SUN:adr= "2550 Garcia Avenue, Mountain View, CA 94043, USA"} @String{pub-SV= "Spring{\-}er-Ver{\-}lag"} @String{pub-SV:adr= "Berlin, Germany~/ Heidelberg, Germany~/ London, UK~/ etc."} @String{pub-USC-ISI= "University of Southern California, Information Sciences Institute"} @String{pub-USC-ISI:adr= "Marina del Rey, CA, USA"} @String{pub-USENIX= "USENIX Association"} @String{pub-USENIX:adr= "Berkeley, CA, USA"} @String{pub-USGPO= "United States Government Printing Office"} @String{pub-USGPO:adr= "Washington, DC, USA"} @String{pub-UTILITAS-MATH= "Utilitas Mathematica Publishers"} @String{pub-UTILITAS-MATH:adr= "Winnipeg, Manitoba, Canada"} @String{pub-VENTANA= "Ventana Press"} @String{pub-VENTANA:adr= "Chapel Hill, NC, USA"} @String{pub-WESTVIEW= "Westview Press"} @String{pub-WESTVIEW:adr= "Boulder, CO, USA"} @String{pub-WILEY= "John Wiley and Sons, Inc."} @String{pub-WILEY:adr= "New York, NY, USA"} @String{pub-WORLD-SCI= "World Scientific Publishing Co."} @String{pub-WORLD-SCI:adr= "Singapore; Philadelphia, PA, USA; River Edge, NJ, USA"}

%%% ==================================================================== %%% Series abbreviations:

@String{ser-LNAI= "Lecture Notes in Artificial Intelligence"} @String{ser-LNCS= "Lecture Notes in Computer Science"} @String{ser-LNMATH= "Lecture Notes in Mathematics"} @String{ser-PROJECT-GUTENBERG= "Project Gutenberg"} @String{ser-SIGPLAN= "ACM SIG{\-}PLAN Notices"}

%%% ==================================================================== %%% Bibliography entries, sorted by year, and then by citation label:

@Book{Simonetta:1404:LTC, author = "Cicco Simonetta", title = "{[Little} tract on cryptanalysis]", publisher = "????", address = "????", pages = "????", year = "1404", bibdate = "Sun Dec 24 09:39:18 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, remark = "Cited in \cite[page 25]{Callimahos:1992:HC}. Elsewhere in the journal (volume 12, number 5, May 1985, page 11), the year is given as 1471, the author as Sicco Simonetta, and the title as \booktitle{Regulae ad extrahendum litteras zifferatas sine exemplo. (Latin) [Rules for extracting an enciphered text: an example]}.", } @Book{Alberti:1470:TC, author = "Leon Battista Alberti", title = "Trattati in Cifra. ({Italian}) [{Treatises} in ciphers]", publisher = "????", address = "????", pages = "????", year = "1470", bibdate = "Sun Dec 24 09:37:07 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, author-dates = "Leon Battista Alberti (1404--1472)", language = "Italian", remark = "Cited in \cite[page 25]{Callimahos:1992:HC}.", remark = "Alberti is considered the father of Western cryptology, according to \cite[page 26]{Callimahos:1992:HC}.", } @Book{Trithemius:1518:PLS, author = "Johannes Trithemius", title = "Polygraphiae Libri Sex", publisher = "????", address = "????", pages = "????", year = "1518", bibdate = "Thu Feb 05 06:27:05 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, language = "Latin", remark = "This book is cited in a 4-Feb-2015 New York Times article ``Cracking Codes through the Centuries'' as the earliest printed book on cryptography. However, Callimahos \cite[page 25]{Callimahos:1992:HC} gives the year as 1531.", } @Book{Trithemius:1606:CGT, author = "Johannes Trithemius", title = "Clauis generalis triplex in libros steganographicos {Iohannis Trithemij} \ldots{}", publisher = "Iohannis Berneri", address = "Frankfurt, Germany", pages = "7 + 1", year = "1606", LCCN = "Z103.T84 S 1606", bibdate = "Wed Apr 14 06:33:41 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Ab ipso authore conscripta \ldots{} Darmbstadij: Excudebat Balthasar Hofmann, impensis Iohannis Berneri, bibliop. Francof., anno 1606.", acknowledgement = ack-nhfb, annote = "The Trithemius ciphers were finally solved in 1998 by J. Reeds \cite{Reeds:1998:SCB}.", } @Book{Trithemius:1606:CSI, author = "Johannes Trithemius", title = "Clauis {Steganographiae Ioannis Trithemij}, abbatis {Spanheimensis}, ad Serenissimum Principem Dn. {Philippum} \ldots{}", publisher = "Ioannem Bernerum", address = "Frankfurt, Germany", pages = "70", year = "1606", LCCN = "Z103.T84 S 1606", bibdate = "Wed Apr 14 06:14:52 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Venundatur apud Ioannem Bernerum, bibliopolam Francofurtensem, anno 1606.", acknowledgement = ack-nhfb, annote = "The Trithemius ciphers were finally solved in 1998 by J. Reeds \cite{Reeds:1998:SCB}.", } @Book{Trithemius:1606:SHE, author = "Johannes Trithemius", title = "Steganographia: hoc est, ars per occultam scripturam animi sui voluntatem absentibus aperiendi certa", publisher = "Matthiae Beckeri", address = "Frankfurt, Germany", pages = "8 + 180", year = "1606", LCCN = "Z103.T84 S 1606", bibdate = "Wed Apr 14 06:18:44 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Authore \ldots{} Ioanne Trithemio \ldots{}; praefixa est huic operi sua clauis, seu vera introductio ab ipso authore concinnata \ldots{} nunc vero in gratiam secretioris philosophiae studiosorum publici iuris facta. Francofurti. Ex officina typographica Matthiae Beckeri, sumptibus Ioannis Berneri, anno 1606.", acknowledgement = ack-nhfb, annote = "The Trithemius ciphers were finally solved in 1998 by J. Reeds \cite{Reeds:1998:SCB}.", } @Book{Schwenter:1620:SSN, author = "Daniel Schwenter", title = "{Steganologia \& steganographia nova: Geheime magische, naturliche Red vnd Schreibkunst, einem in der nahe vnd ferrne Alsbalden oder in gewiser Zeit, so woln in Schimpff als Ernst, etwas verborgens vnnd geheimes zu eroffnen durch Reden, Schreiben vnd mancherley Instrumenta: item wie verborgene Schrifften zu machen, auffzulosen, vnd mit sonderlichen Kunsten zu schreiben}", publisher = "Resene Gibronte Runeclus Hanedi", address = "N{\"u}rnberg, Germany", pages = "16 + 299 + 5", year = "1620", LCCN = "KK276 .E36 1575; Z103.5", bibdate = "Wed Apr 14 06:21:05 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Publication year uncertain. Publicirt vnd an Tag gegeben durch Resene Gibronte Runeclus Hanedi \ldots{} Nurnberg: Inn Verlegung Simon Halbmayers.", acknowledgement = ack-nhfb, annote = "Schwenter, Daniel, 1585--1636. The Trithemius ciphers were finally solved in 1998 by J. Reeds \cite{Reeds:1998:SCB}.", } @Book{Trithemius:1621:CGT, author = "Johannes Trithemius", title = "Clauis generalis triplex in libros steganographicos {Iohannis Trithemij} \ldots{}", publisher = "Balthasar Hofmann", address = "Darmstadt, Germany", pages = "7 + 1", year = "1621", LCCN = "Z103 .T84 1621", bibdate = "Wed Apr 14 06:07:51 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Ab ipso authore conscripta \ldots{} Darmbstadij. Excudebat Balthasar Hofmann, impensis Iohannis Berneri, bibliop. Francof., anno 1621.", acknowledgement = ack-nhfb, annote = "The Trithemius ciphers were finally solved in 1998 by J. Reeds \cite{Reeds:1998:SCB}.", } @Book{Trithemius:1621:CSI, author = "Johannes Trithemius", title = "Clauis Steganographiae {Ioannis Trithemij}, abbatis Spanheimensis, ad Serenissimum Principem Dn. {Philippum} \ldots{}", publisher = "Iohannem Bernerum", address = "Frankfurt, Germany", pages = "64", year = "1621", LCCN = "Z103 .T84 1621", bibdate = "Wed Apr 14 06:09:58 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Venundatur apud Iohannem Bernerum, bibliopolam Francofurtensem, anno 1621.", acknowledgement = ack-nhfb, annote = "The Trithemius ciphers were finally solved in 1998 by J. Reeds \cite{Reeds:1998:SCB}.", } @Book{Trithemius:1621:SHE, author = "Johannes Trithemius", title = "Steganographia: hoc est, ars per occultam scripturam animi sui voluntatem absentibus aperiendi certa", publisher = "Balthasaris Aulaeandri", address = "Darmstadt, Germany", pages = "8 + 152 + 2", year = "1621", LCCN = "Z103 .T84 1621", bibdate = "Wed Apr 14 06:04:51 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Authore \ldots{} Ioanne Trithemio \ldots{}; praefixa est huic operi sua clauis, seu vera introductio ab ipso authore concinnata \ldots{} nunc vero in gratiam secretioris philosophiae studiosorum publici iuris facta. Darmbstadij. Ex officina typographica Balthasaris Aulaeandri, sumptibus vero Ioannis Berneri, bibliop. Francof., anno 1621", acknowledgement = ack-nhfb, annote = "Trithemius, Johannes, 1462--1516. The Trithemius ciphers were finally solved in 1998 by J. Reeds \cite{Reeds:1998:SCB}.", } @Book{Puteanus:1627:EPC, author = "Erycius Puteanus", title = "{ErycI} Puteani Cryptographia Tassiana, sive, Clandestina scripti", publisher = "Typis Cornelii Coenesteynii", address = "Louvanii", pages = "18 + 2", year = "1627", LCCN = "Z103.5 .P88 1627", bibdate = "Mon Sep 13 07:01:38 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Schwenter:1633:SSA, author = "Daniel Schwenter", title = "{Steganologia \& [i.e. et] steganographia aucta: geheime, magische, naturliche Red vnnd Schreibkunst}", publisher = "Resene Gibronte Runeclusam Hunidem", address = "N{\"u}rnberg, Germany", pages = "24 + 370", year = "1633", LCCN = "Z103 .S38 1633", bibdate = "Wed Apr 14 06:28:21 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Auffs neue revidirt, an etlichen Orten corrigirt, \ldots{} augirt, vnd dann zum drittenmal in Truck verfertiget durch Janum Herculem de Sunde, sonst Resene Gibronte Runeclusam Hunidem \ldots{}. Nurnberg, In Verlegung Jeremiae Dumlers [between 1633 and 1636].", acknowledgement = ack-nhfb, annote = "The Trithemius ciphers were finally solved in 1998 by J. Reeds \cite{Reeds:1998:SCB}.", } @Book{Wilkins:1641:MSS, author = "John Wilkins", title = "{Mercury}, or the Secret and Swift Messenger", publisher = "????", address = "????", pages = "????", year = "1641", bibdate = "Thu Feb 05 06:32:55 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, remark = "This book is cited in a 4-Feb-2015 New York Times article ``Cracking Codes through the Centuries'' with the comments ``[the book] suggests writing with \the juice of glow-worms' to create messages that can be read only in the dark, or `glutinous moisture' --- milk or fat --- that the recipient can read only by scattering dust on the letters. Alphabets could be translated into musical notes or flowers.''", } @Book{duCarlet:1644:CCV, author = "Maistre Iean Robert {du Carlet}", title = "La cryptographie: contenant vne tres-subtile manier d'escrire secr{\`e}tement. ({French}) [{Cryptography}: containing a very subtle manner of secret writing]", publisher = "Imprimeur ordinaire du Roy et R. Aurelhe, Marchand libraire", address = "Paris, France", pages = "234 + 2", year = "1644", LCCN = "Z103.5 .D82 1644b", bibdate = "Mon Sep 13 06:54:53 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, language = "French", } @Book{Mersenne:1644:CPM, author = "Marin Mersenne", title = "Cogitata Physica-Mathematica \ldots{} [Tractatus de mensuris ponderibus atque nummis \ldots{} Hydraulica pneumatica; arsque navigandi. Harmonia theorica, practica. Et Mechanica phaenomena. Ballistica et acontismologia]", publisher = "Antonii Bertier", address = "Paris, France", pages = "[30], 40 [24], 41--370, [16], 96, [8], 138, [34] + 40", day = "1", month = apr, year = "1644", bibdate = "Sat Aug 23 10:04:54 2003", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Three volumes. This is the book that introduced the conjecture that numbers of the form $ M(n) = 2^n - 1 $ are prime for $ n = 2, 3, 5, 7, 13, 17, 19, 31, 67, 127, $ and $ 257 $, but could not test this claim. Euler showed in 1750 that $ M(31) $ is prime. Lucas showed in 1876 that $ M(127) $ is prime. Pervouchine showed in 1883 that $ M(61) $ is prime, finally disproving the Mersenne conjecture. Powers in the early 1900s showed that $ M(89) $ and $ M(107) $ are prime, both missed by Mersenne. By 1947, it was known that the correct list is $ 2, 3, 5, 7, 13, 17, 19, 31, 61, 89, 107 $, and $ 127 $, so Mersenne had five errors in his list: $ 67 $ and $ 257 $ should have been removed, and $ 61, 89 $, and $ 107 $ added. By late 2001, 39 Mersenne primes were known, the five largest having been found by massive distributed computing efforts through the Great Internet Mersenne Primes Search (GIMPS) project. The largest of these is $ M(13466917) $, a number containing 4,053,946 digits.", URL = "http://www.mersenne.org/prime.htm; http://www.mersenne.org/status.htm", acknowledgement = ack-nhfb, annote = "Peracta est haec impressio die 1. April. 1644.", keywords = "Marin Mersenne (1588--1648)", language = "Latin", tableofcontents = "I: De mensuris, ponderibus, & nummis Hebraicis, Graecis, & Romanis ad Gallica redactis. -- II: De hydraulico-pneumaticis phaenomenis. -- III: De arte nautica, sev histiodromia, & hydrostatica. -- IV: De musica theorica & practica. -- V: De mechanicis phaenomenis. -- VI: De ballisticis, sev acontismologicis phaenomenis", } @Book{Morland:1666:NMC, author = "Sir Samuel Morland", title = "A New Method of Cryptography", publisher = "????", address = "????", pages = "12", year = "1666", bibdate = "Tue Jul 05 14:50:30 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Microfilm in Folger Shakespeare Library, Washington, DC, USA.", acknowledgement = ack-nhfb, remark = "This book is cited in a 4-Feb-2015 New York Times article ``Cracking Codes through the Centuries'' with the comment ``His [Morland's] proposal for a cyclologic cryptographic machine, illustrated on the book's last page, relies on a series of cipher wheels that make it a close cousin to Sigaba and Enigma''.", } @Book{Heidel:1676:JTP, author = "Wolfgango Ernesto Heidel", title = "{Johannis Trithemii} primo Spanheimensis deinde {Divi Jacobi Peapolitani} abbatis {Steganographia}: quae hucusq[ue] a nemine intellecta sed passim ut supposititia, perniciosa, magica \& necromantica rejecta, elusa, damnata \& sententiam inquisitionis passa, nunc tandem vindicata, reserata et illustrata ubi post vindicias Trithemii clarissime explicantur conjurationes spirituum ex {Arabicis}, {Hebraicis}, {Chaldaicis} \& {Graecis} spirituum nominibus juxta quosdam conglobatae, aut secundum alios ex barbaris \& nihil significantibus verbis concinnatae: deinde solvuntur \& exhibentur artificia nova steganographica a {Trithemio} in literis ad {Arnoldum Bostium} \& {Polygraphia} promissa, in hunc diem a nemine capta, sed pro paradoxis \& impossibilibus habita \& summe desiderata", publisher = "Wormatiense, Moguntiae. Sumptibus Joannis Petri Zubrodt", address = "", pages = "8 + 394 (or 396) + 4", year = "1676", LCCN = "Z103 .T84 1676", bibdate = "Wed Apr 14 06:11:27 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Includes Heidel's life of Trithemius and his vindication of the Steganographia.", acknowledgement = ack-nhfb, annote = "The Trithemius ciphers were finally solved in 1998 by J. Reeds \cite{Reeds:1998:SCB}.", } @Book{Morrice:1692:EB, author = "Roger Morrice", title = "Entring Book", publisher = "????", address = "????", pages = "1500", year = "1692", bibdate = "Mon Sep 15 16:32:21 2003", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Three volumes.", URL = "http://www.hist.cam.ac.uk/seminars_events/events/roger-morrice.html; http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2003/08/29/ndiary29.xml", acknowledgement = ack-nhfb, remark = "From the Cambridge Web site: ``The Morrice Project exists to publish Roger Morrice's Entring Book, the most important unpublished record of British political and religious history of the second half of the seventeenth century. The fragile, three volume, 1500 page manuscript of Roger Morrice's Entring Book is in Dr Williams's Library, 14 Gordon Square, London, the pre-eminent research library of English Protestant Nonconformity. The Entring Book is 900,000 words long and covers the years 1677 to 1691.''\par From the Telegraph story of 29-Aug-2003: ``A remarkable million-word account of life in late 17th century England which is as vivid as Samuel Pepys's diary has been transcribed by experts after lying largely forgotten for more than three centuries.\par A specialist code-breaker was brought in to crack the shorthand that Roger Morrice, a Puritan minister turned political journalist, used in part of the diary to stop the King's agents reading it. \ldots{} \par Now the transcription has been completed and six volumes of Morrice's well-informed account of a turbulent period during which England was ruled by three different monarchs will be published in 2005.\par About 40,000 words of the diary were in code and the team, led by the Cambridge academic Dr Mark Goldie, brought in an expert in 17th century shorthand to reveal for the first time what Morrice had written.''", xxnote = "Exact publication year unknown; I set it to just after the years covered.", } @Book{Conradi:1739:CDS, author = "David Arnold Conradi", title = "Cryptographia denudata; sive, Ars deciferandi, quae occulte scripta sunt in quocunque linguarum genere, praecipue in {Germanica, Batava, Latina, Anglica, Gallica, Italica, Graeca}", publisher = "Apud P. Bonk", address = "Lugduni Batavorum", pages = "73", year = "1739", LCCN = "Z103 .C66", bibdate = "Mon Sep 13 07:04:09 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Kasiski:1863:GDG, author = "Friedrich Wilhelm Kasiski", title = "{Die Geheimschriften und die Dechiffrirkunst, Mit besonderer Ber{\"u}cksichtigung der deutschen und franz{\"o}sischen Sprache}. ({German}) [{Secret} writing and the art of deciphering, with special reference to the {German} and {French} languages]", publisher = "E. S. Mittler und Sohn", address = "Berlin, Germany", pages = "viii + 95 + 4", year = "1863", LCCN = "????", bibdate = "Sat May 16 11:30:41 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, remark = "This is the first published account of the breaking of the Vigen{\`e}re Cipher, although Charles Babbage accomplished that in 1854; Babbage's planned book on cryptography was never completed or published. See \cite{Singh:1999:CBE,Lewand:2010:PC} for more on Kasiski and Babbage's work.", } @Book{Colaco:1864:CRO, author = "F. N. Cola{\c{c}}o", title = "A cryptographia revelada, ou, Arte de traduzir e decifrar as escrituras obscuras, quaesquer que sejao os caracteres empregados. ({Portuguese}) [{Cryptography} revealed, or, the art of translating and deciphering obscure writings, whatever the characters employed]", publisher = "De Santos e Cia", address = "Pernambuco, Brazil", pages = "93", year = "1864", LCCN = "Z104 .C68 1846", bibdate = "Mon Sep 13 06:59:12 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, language = "Portuguese", xxnote = "Check year: Library of Congress has conflicting data: 1846 and 1864??", } @Book{S:1873:COD, author = "H. S.", title = "Cryptographie, ou, Divers syst{\`e}mes d'{\'e}crire secr{\`e}te sp{\'e}cialement pour l'usage des cartes postales: combinations alphab{\'e}tiques, correspondance chiffr{\'e}e, {\'e}criture par signes: divers proc{\'e}d{\'e}s pour la fabrication d'encres sympathiques", publisher = "G. Jousset", address = "Paris, France", pages = "8", year = "1873", LCCN = "Z104 .H16 1873", bibdate = "Mon Sep 13 06:51:31 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Jevons:1874:PS, author = "W. Stanley Jevons", title = "The Principles of Science", publisher = "????", address = "????", pages = "??--??", year = "1874", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 7]{Odlyzko:1995:FIF}.", } @Article{Kerckhoffs:1883:CMF, author = "Auguste Kerckhoffs (von Nieuwenhof)", title = "La Cryptographie Militaire. ({French}) [{Military} cryptography]", journal = "Journal des Sciences Militaires", volume = "IX", number = "??", pages = "5--38, 161--191", month = jan # "\slash " # feb, year = "1883", bibdate = "Thu May 16 08:07:14 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/kerckhoffs/la_cryptographie_militaire_i.htm https://www.petitcolas.net/kerckhoffs/; https://www.petitcolas.net/kerckhoffs/crypto_militaire_1_b.pdf; https://www.petitcolas.net/kerckhoffs/crypto_militaire_2.pdf", acknowledgement = ack-nhfb, annote = "Reproduced online at the indicated URL. This is one of the early papers that argues for publication of cryptographic algorithms, as discussed by Bruce Schneier in the CRYPTO-GRAM newsletter of 15-May-2002. Also discussed in \cite{Cohen:1987:IIP} in Chapter 2.1: ``A Short History of Cryptography'': Cohen writes: ``Kerckhoffs \ldots{} set forth six basic requirements of cryptography. We note that the easily remembered key is very amenable to attack, and that these rules, as all others, should be questioned before placing trust in them: \begin{itemize} \item ciphertext should be unbreakable in practice \item the cryptosystem should be convenient for the correspondents \item the key should be easily remembered and changeable \item the ciphertext should be transmissible by telegraph \item the cipher apparatus should be easily portable \item the cipher machine should be relatively easily to use \end{itemize} ''", language = "French", xxpages = "38--??", } @Book{Josse:1885:CSA, author = "H. (Henri) Joss{\'e}", title = "La cryptographie et ses applications {\`a} l'art militaire", publisher = "Libraire militaire de L. Baudoin", address = "Paris, France", pages = "103", year = "1885", LCCN = "Z104 .J67 1885", bibdate = "Thu May 16 08:13:44 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Perret:1890:RCS, author = "P.-M. Perret", title = "Les r{\`e}gles de {Cicco Simonetta} pour le d{\'e}chiffrement des {\'e}critures secr{\`e}tes (4 juillet 1474). ({French}) [The rules of {Cicco Simonetta} for decryption of secret writings ({4 July 1474})]", journal = "Biblioth{\`e}que de l{\'E}cole des chartes", volume = "51", pages = "516--525", year = "1890", ISSN = "0373-6237 (print), 1953-8138 (electronic)", ISSN-L = "0373-6237", bibdate = "Sun Dec 24 17:37:36 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.jstor.org/stable/43000437", acknowledgement = ack-nhfb, language = "French", xxDOI = "https://doi.org/10.2307/43000437", } @Article{Valerio:1892:C, author = "Paul Louis Eugene Valerio", title = "De la Cryptographie", journal = "Journal des Sciences militares, 9th series, Paris", volume = "??", number = "??", pages = "??--??", month = dec, year = "1892", bibdate = "Thu Oct 31 18:47:22 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Date cited as 9th series, Dec 1892--May 1895.", } @Book{Hulme:1898:CHP, author = "F. Edward (Frederick Edward) Hulme", title = "Cryptography; or, The history, principles, and practice of cipher-writing", publisher = "Ward, Lock and Co., Limited", address = "????", pages = "192", year = "1898", LCCN = "Z 104 H91", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "First edition. Galland, p. 94. Bound in yellow cloth; stamped in black. Library of the American Cryptogram Association (George C. Lamb Collection).", acknowledgement = ack-nhfb, keywords = "cryptography", } @Book{Walden:1900:ADB, author = "John William Henry Walden", title = "{August, Duke of Braunschweig-Luneburg}: The cryptomenytics and cryptography of {Gustavus Selenus}: in nine books: wherein is also contained a most clear elucidation of the {Steganographia}, a book at one time composed in magic and enigmatic form by {Johannes Trithemius}", publisher = "????", address = "????", year = "1900", LCCN = "Z103 .A95 1900", bibdate = "Wed Apr 14 06:24:45 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "August, Duke of Braunschweig-Luneburg 1579--1666. The Trithemius ciphers were finally solved in 1998 by J. Reeds \cite{Reeds:1998:SCB}.", } @Book{delaStelle:1902:TCF, author = "F{\'e}lix-Marie de la Stelle", title = "Trait{\'e} de cryptographie. ({French}) [{Treatise} on cryptography]", publisher = pub-GAUTHIER-VILLARS, address = pub-GAUTHIER-VILLARS:adr, pages = "????", year = "1902", bibdate = "Sun Dec 24 09:50:59 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, author-dates = "F{\'e}lix-Marie de la Stelle (or Delastelle) (1840--1902)", remark = "Cited in \cite[page 26]{Callimahos:1992:HC}.", } @Article{Guarini:1904:MTT, author = "Emile Guarini", title = "The {Malcotti} Telecryptograph for Telegraphing Upon Telephone Lines", journal = j-SCI-AMER, volume = "91", number = "12", pages = "193--194", day = "17", month = sep, year = "1904", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican09171904-193a", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Sat May 18 16:20:28 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sciam1900.bib", URL = "http://www.nature.com/scientificamerican/journal/v91/n12/pdf/scientificamerican09171904-193a.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", keywords = "cryptography; decryption; encryption", } @Article{Claudy:1912:TMS, author = "C. H. Claudy", title = "A Triple Mirror for Secret Signaling", journal = j-SCI-AMER, volume = "107", number = "17", pages = "346--346", day = "26", month = oct, year = "1912", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican10261912-346", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Sat May 18 16:15:12 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sciam1910.bib", URL = "http://www.nature.com/scientificamerican/journal/v107/n17/pdf/scientificamerican10261912-346.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @TechReport{Mauborgne:1914:APC, author = "Joseph O. Mauborgne", title = "An Advanced Problem in Cryptography and Solution", institution = "Army Service School's Press", address = "Ft. Leavenworth, KS, USA", pages = "21", year = "1914", bibdate = "Sun Dec 24 09:44:44 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, remark = "Solution of the Playfair Cipher, invented by Sir Charles Wheatstone, but named by Lord Lyon Playfair of the UK Foreign Office. WorldCat dates this as 1918.", } @Article{Edwards:1915:CCT, author = "E. C. Edwards", title = "Cipher Codes and their Uses", journal = j-SCI-AMER, volume = "113", number = "1", pages = "9--9", day = "3", month = jul, year = "1915", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican07031915-9", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Sat May 18 16:20:13 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sciam1910.bib", URL = "http://www.nature.com/scientificamerican/journal/v113/n1/pdf/scientificamerican07031915-9.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @Article{Honore:1919:STS, author = "F. Honore", title = "The Secret Telephone, Are Sound Waves ever Visible?", journal = j-SCI-AMER, volume = "121", number = "23", pages = "555--555", day = "6", month = dec, year = "1919", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican12061919-555", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Sat May 18 16:27:45 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sciam1910.bib", URL = "http://www.nature.com/scientificamerican/journal/v121/n23/pdf/scientificamerican12061919-555.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @Article{Meador:1920:KCE, author = "J. E. D. Meador", title = "Keeping the Camera on an Even Keel, Telephoning in Cipher", journal = j-SCI-AMER, volume = "123", number = "5", pages = "107--107", day = "31", month = jul, year = "1920", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican07311920-107a", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Sat May 18 16:11:40 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sciam1920.bib", URL = "http://www.nature.com/scientificamerican/journal/v123/n5/pdf/scientificamerican07311920-107a.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @Book{Arensberg:1921:CD, author = "Walter Arensberg", title = "The cryptography of {Dante}", publisher = pub-KNOPF, address = pub-KNOPF:adr, pages = "x + 494", year = "1921", LCCN = "PQ4406.A7", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "cryptography; Dante Alighieri, 1265--1321 --- symbolism; Dante Alighieri, 1265--1321 Divina Commedia", } @Article{Anonymous:1922:PUS, author = "Anonymous", title = "Practical Uses for the Spectroscope, Secret Radio Communication", journal = j-SCI-AMER, volume = "127", number = "4", pages = "259--259", month = oct, year = "1922", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican1022-259", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Sat May 18 16:13:39 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sciam1920.bib", URL = "http://www.nature.com/scientificamerican/journal/v127/n4/pdf/scientificamerican1022-259.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @Book{Arensberg:1922:CSP, author = "Walter Arensberg", title = "The cryptography of {Shakespeare}. Part one", publisher = "Howard Bowen", address = "Los Angeles, CA, USA", pages = "ix + 280", year = "1922", LCCN = "PR2944.A6", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "No more published. Source: Bequest of George Fabyan, 1940. DLC", acknowledgement = ack-nhfb, keywords = "Shakespeare, William, 1564-1616 --- authorship --- Baconian theory", } @Book{Budge:1922:RS, author = "Sir E. A. Wallis (Ernest Alfred Wallis) Budge", title = "The {Rosetta} Stone", publisher = "British Museum Press", address = "London, UK", pages = "8 + 1", year = "1922", LCCN = "PJ1531.R3 1913", bibdate = "Tue Dec 01 10:37:35 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprinted with revisions in 1935, 1950, and 1968.", acknowledgement = ack-nhfb, } @Book{Langie:1922:C, author = "Andr{\'e} Langie and James Cruickshank Henderson Macbeth", title = "Cryptography", publisher = "Constable and Company Limited", address = "London, UK", pages = "vii + 1 + 192", year = "1922", LCCN = "Z 104 L26dE", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Bibliography: p.158.", acknowledgement = ack-nhfb, keywords = "cryptography", } @Book{USASC:1923:EC, author = "{United States.Army.Signal Corps} and {George Fabyan Collection (Library of Congress)}", title = "Elements of cryptanalysis", number = "3", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "vii + 157", year = "1923", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Training pamphlet", acknowledgement = ack-nhfb, annote = "LC copy is item no. 717 of the George Fabyan Collection.", keywords = "Ciphers; Cryptography", } @Book{USWarDept:1924:EC, author = "{United States.War Dept}", title = "Elements of cryptanalysis", volume = "3", publisher = "Government Printing Office", address = "Washington, DC, USA", pages = "vii + 157", year = "1924", LCCN = "Z104 .U6", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Its training pamphlet", acknowledgement = ack-nhfb, keywords = "ciphers; cryptography", } @Book{USWD:1924:EC, author = "{United States.War Dept}", title = "Elements of cryptanalysis", number = "3", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "vii + 157", year = "1924", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Its Training pamphlet", acknowledgement = ack-nhfb, keywords = "Ciphers; Cryptography.", } @Book{Givierge:1925:CC, author = "Marcel Givierge", title = "Cours de cryptographie", publisher = "Berger-Levrault", address = "Paris, France", pages = "ix + 304", year = "1925", LCCN = "Z104 .G43", bibdate = "Sat Sep 25 10:58:57 2004", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, remark = "Cited in \cite{Shannon:1949:CTS}.", } @Book{Lange:1925:TC, author = "Andr{\'e} Lange and E. A. Soudart", title = "Trait{\'e} de cryptographie. ({French}) [{Treatise} on cryptography]", publisher = "Librairie F{\'e}lix Alcan", address = "Paris, France", pages = "xii + 366 + vi", year = "1925", LCCN = "Z104 .L26 1925", bibdate = "Sun Dec 24 17:46:24 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, language = "French", remark = "LC copy is item no. 411 of the George Fabyan Collection (Riverbank Laboratories, west of Chicago, IL, USA)", subject = "Cryptography; Cyphers; Signs and symbols", } @Article{Vernam:1926:CPT, author = "G. S. Vernam", title = "Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications", journal = "Journal American Institute of Electrical Engineers", volume = "{XLV}", number = "??", pages = "109--115", year = "1926", bibdate = "Sat Sep 25 11:06:06 2004", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, remark = "Cited in \cite{Shannon:1949:CTS}.", } @Article{Russell:1927:CMS, author = "Henry Norris Russell", title = "Cipher Messages of the Stars", journal = j-SCI-AMER, volume = "137", number = "2", pages = "118--119", month = aug, year = "1927", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican0827-118", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Sat May 18 16:15:38 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sciam1920.bib", URL = "http://www.nature.com/scientificamerican/journal/v137/n2/pdf/scientificamerican0827-118.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @Book{Tippett:1927:RSN, author = "L. H. C. (Leonard Henry Caleb) Tippett", title = "Random sampling numbers", volume = "15", publisher = pub-CAMBRIDGE, address = pub-CAMBRIDGE:adr, pages = "viii + xxvi", year = "1927", bibdate = "Sat Aug 23 08:23:19 2003", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprinted in 1952. Reprinted in 1959 with a foreword by Karl Pearson.", series = "Tracts for computers", acknowledgement = ack-nhfb, annote = "This may be the first known publication of tables of random numbers. I found an unsubstantiated claim that they were determined by taking the middle digits from area measurements of English churches. See also \cite{Rand:1955:MRD}.", } @Article{Sarton:1928:BRBn, author = "George Sarton", title = "Book Review: {{\booktitle{The Cipher of Roger Bacon}} by William Romaine Newbold; Roland Grubb Kent}", journal = j-ISIS, volume = "11", number = "1", pages = "141--145", month = sep, year = "1928", CODEN = "ISISA4", ISSN = "0021-1753 (print), 1545-6994 (electronic)", ISSN-L = "0021-1753", bibdate = "Tue Jul 30 21:57:51 MDT 2013", bibsource = "http://www.jstor.org/action/showPublication?journalCode=isis; http://www.jstor.org/stable/i302190; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/isis1920.bib", URL = "http://www.jstor.org/stable/224770", acknowledgement = ack-nhfb, fjournal = "Isis", journal-URL = "http://www.jstor.org/page/journal/isis/about.html", } @Book{Budge:1929:RSB, author = "Sir E. A. Wallis(Ernest Alfred Wallis) Budge", title = "The {Rosetta} Stone in the {British Museum}: the {Greek}, {Demotic} and {Hieroglyphic} texts of the decree inscribed on the {Rosetta} Stone conferring additional honours on {Ptolemy V. Epiphanes (203-181 B.C.) \ldots{}}", publisher = "British Museum Press", address = "London, UK", pages = "viii + 323", year = "1929", LCCN = "PJ1531 .R3 1929", bibdate = "Tue Dec 01 10:37:35 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprinted with revisions in 1929, 1935, 1950, and 1968.", acknowledgement = ack-nhfb, } @Article{Hill:1929:CAA, author = "Lester S. Hill", title = "Cryptography in an Algebraic Alphabet", journal = j-AMER-MATH-MONTHLY, volume = "36", number = "6", pages = "306--312", month = jun # "\slash " # jul, year = "1929", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", bibdate = "Mon Jun 28 12:39:12 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @Booklet{Gylden:1931:CEI, author = "Yves Gyld{\'e}n", title = "Chifferbyr{\aa}ernas Insatser i V{\"a}rldskriget Till Lands. ({Swedish}) [{Cipher} bureaus' operations in the {World War} on land]", address = "Stockholm, Sweden", year = "1931", bibdate = "Sun Dec 24 10:27:31 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", remark = "Cited in \cite[page 11]{Gylden:1933:CCB}.", } @Article{Hill:1931:CCL, author = "Lester S. Hill", title = "Concerning Certain Linear Transformation Apparatus of Cryptography", journal = j-AMER-MATH-MONTHLY, volume = "38", number = "3", pages = "135--154", month = mar, year = "1931", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", bibdate = "Mon Jun 28 12:36:10 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @Book{Yardley:1931:ABC, author = "Herbert O. Yardley", title = "The {American Black Chamber}", publisher = "Faber \& Faber Limited", address = "London, UK", pages = "x + 264 + 1", year = "1931", LCCN = "D639.S7 Y3 1931b", bibdate = "Wed Nov 15 14:21:04 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "The history and work of the Cryptographic bureau, officially known as section 8 of the Military intelligence division (MI-8).", acknowledgement = ack-nhfb, } @Book{Givierge:1932:CC, author = "Marcel Givierge", title = "Cours de cryptographie", publisher = "Berger-Levrault", address = "Paris, France", edition = "Deuxi{\`e}me", pages = "ix + 304", year = "1932", bibdate = "Sat Sep 25 10:58:57 2004", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Gylden:1933:CCB, author = "Yves Gyld{\'e}n", title = "The Contribution of the Cryptographic Bureaus in the {World War}", journal = "The Signal Corps Bulletin", number = "75--81", pages = "??--??", month = nov # "--" # dec, year = "1933--1934", bibdate = "Sun Dec 24 10:23:49 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://archive.org/download/cryptolog_96/cryptolog_96.pdf", acknowledgement = ack-nhfb, remark = "Small extract reprinted in \booktitle{Cryptolog}, volume 12, number 5, May 1985, page 11.", } @Book{Friedman:1935:ICA, author = "William F. (William Frederick) Friedman", title = "The index of coincidence and its applications in cryptanalysis: technical paper", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "87 + 3", year = "1935", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "At head of title: War Department, Office of the Chief Signal Officer, Washington. Register no. 200. The present paper was prepared in 1923. It is a revision of an earlier paper with the same title published in 1922 by the Riverbank Laboratories, Geneva, Ill.", author-dates = "1891--1969", keywords = "Ciphers; Cryptography.", } @Book{Friedman:1935:MCP, author = "William F. (William Frederick) Friedman", title = "Military cryptanalysis. Part 1, monoalphabetic substitution systems", number = "30", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "149", year = "1935", ISBN = "0-89412-044-1", ISBN-13 = "978-0-89412-044-2", LCCN = "Z103.5.F77 1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Four volumes.", series = "Cryptographic series", acknowledgement = ack-nhfb, annote = "On cover: With new added problems for the student. (p. 143--149) Reprint. Originally published: Washington, DC: U.S. G.P.O., between 1935 and 1945.", author-dates = "1891--1969", keywords = "Ciphers; Communications, Military; Cryptography", } @Book{Friedman:1935:PIS, author = "William F. (William Frederick) Friedman", title = "The principles of indirect symmetry of position in secondary alphabets and their application in the solution of polyalphabetic substitution ciphers: technical paper", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "????", year = "1935", bibdate = "Tue Dec 26 07:21:46 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, author-dates = "1891--1969", } @Book{Kullback:1935:SMC, author = "Solomon Kullback", title = "Statistical methods in cryptanalysis: technical paper", publisher = "War Dept., Office of the Chief Signal Officer: U.S. G.P.O.", address = "Washington, DC, USA", pages = "various", year = "1935", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Ciphers; Cryptography", } @Book{Rowlett:1935:FAP, author = "Frank B. Rowlett and William F. Friedman", title = "Further applications of the principles of indirect symmetry of position in secondary alphabets: technical paper", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "????", year = "1935", bibdate = "Tue Dec 26 07:23:00 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Gylden:1936:AMC, author = "Yves Gylden", title = "Analysis of model {C-36} cryptograph from the viewpoint of cryptanalysis", publisher = "A. B. Teknik co.", address = "Stockholm, Sweden", pages = "22", year = "1936", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Xeroxed on rectos only; unbound. Translated from the French into English. Library of the American Cryptogram Association (George C. Lamb Collection).", keywords = "Cryptography.", } @Book{Nanovic:1936:SWI, author = "John Leonard Nanovic", title = "Secret writing: an introduction to cryptograms, ciphers and codes", publisher = "D. Kemp and Co", address = "New York, NY, USA", pages = "x + 117 + 1", year = "1936", LCCN = "Z104 .N3", bibdate = "Wed Nov 25 14:23:25 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See also reprint \cite{Nanovic:1974:SWI}.", acknowledgement = ack-nhfb, keywords = "ciphers; cryptography", } @Book{Sacco:1936:MC, author = "Luigi Sacco", title = "Manuale di crittografia. ({Italian}) [{Manual} of cryptography]", publisher = "Tipografia Santa Barbara", address = "Roma, Italia", edition = "Second", pages = "viii + 247 + 8", year = "1936", bibdate = "Tue Dec 26 07:04:56 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, language = "Italian", } @Book{Gylden:1938:APV, author = "Yves Gylden", title = "Analysis from the point of view of cryptanalysis of ``cryptograph type {C-36},'' provided with six key wheels, 27 slide bars, the latter having movable projections, single or multiple", publisher = "A. B. Teknik co.", address = "Stockholm, Sweden", pages = "10", year = "1938", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Xeroxed on rectos only; unbound. Translated from the French into English. Library of the American Cryptogram Association (George C. Lamb Collection).", keywords = "Cryptography.", } @Book{Kullback:1938:SMC, author = "Solomon Kullback", title = "Statistical methods in cryptanalysis", publisher = "War Department, Office of the Chief Signal Officer", address = "Washington, DC, USA", edition = "Revised", pages = "194", year = "1938", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "At head of title: War Department, Office of the Chief Signal Officer, Washington. ``Confidential.'' ``Register no. 170.''", keywords = "Ciphers; Cryptography", remark = "From \cite{Anscombe:2003:QCC}: ``A bookseller description [of this book]: `This classic text provides various statistical tests: the Chi Test, which affords a quantitative measure of the degree of similarity between two distributions, and the Phi Test, which provides a quantitative measurement of the degree of non-randomness of a distribution. Text includes numerous tabulations of frequency data in other languages.'.''", } @TechReport{Anonymous:1939:ITM, author = "Anonymous", title = "Introductory talk to members of the {William and Mary College} cryptanalysis class", institution = "William and Mary College", address = "Williamsburg, VA, USA", pages = "7", year = "1939", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Reproduced from typescript.", } @Book{Baudouin:1939:ECF, author = "Roger Baudouin", title = "{{\'E}}l{\'e}ments de cryptographie. ({French}) [{Elements} of cryptography]", publisher = "A. Pedone", address = "Paris, France", pages = "336", year = "1939", bibdate = "Tue Dec 26 07:17:01 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, language = "French", } @Book{DAgapeyeff:1939:CC, author = "Alexander D'Agapeyeff", title = "Codes and ciphers", publisher = pub-OXFORD, address = pub-OXFORD:adr, pages = "160", year = "1939", LCCN = "Z104 .D3 1939", bibdate = "Sat Apr 20 12:19:43 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Friedman:1939:CAC, author = "William F. (William Frederick) Friedman", title = "The cryptanalyst accepts a challenge", publisher = "War Department, Office of the Chief Signal Officer", address = "Washington, DC, USA", pages = "24--36", year = "1939", LCCN = "????", bibdate = "Wed May 11 23:30:34 MDT 2011", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, author-dates = "1891--1969", remark = "An article analyzed from The Signal Corps bulletin, no. 103, January--March, 1939.", subject = "Cryptography; Ciphers; CHR 1939; PRO Mendelsohn, Charles J. (Charles Jastrow) (donor); PRO Mendelsohn, Esther Jastrow (donor)", } @Book{Friedman:1939:MC, author = "William F. (William Frederick) Friedman", title = "Military cryptanalysis", publisher = "New York Public Library", address = "New York, NY, USA", year = "1939", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "1 microfilm reel", acknowledgement = ack-nhfb, annote = "Titles and statements of authorship from label on container. First work originally published: Washington: U.S. G.P.O., 1939- 1943. 4 v. Vols. 1-2, 3rd ed. Vol. 3, 2nd ed. Second work originally published: Washington: U.S. G.P.O., 1942. v, 316 p.", author-dates = "1891--1969", keywords = "Cryptography.", } @Book{Gaines:1939:ECS, author = "Helen Fouche Gaines", title = "Elementary cryptanalysis: a study of ciphers and their solution", publisher = "American Photographic Publishing Co.", address = "Boston, MA, USA", pages = "vi + 230 + 1", year = "1939", LCCN = "Z104 .G3", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "First edition. Galland, p. 72. Inscribed by Gelett Burgess. Bound in gray cloth; stamped in red; top edges stained red. Library of the American Cryptogram Association (George C. Lamb Collection).", acknowledgement = ack-nhfb, keywords = "ciphers; cryptography", } @Book{Mendelsohn:1939:CC, author = "Charles Jastrow Mendelsohn", title = "{Cardan} on cryptography", publisher = "Yeshiva College", address = "New York, NY, USA", pages = "157--168", year = "1939", LCCN = "????", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprinted from Scripta mathematica, Vol. 6, No. 3, October, 1939. J. S. Galland, Bibliography of \ldots{} cryptology, 1945, p. 124.", acknowledgement = ack-nhfb, keywords = "Cardano, Girolamo, 1501--1576; cryptography", } @Book{Pratt:1939:SUS, author = "Fletcher Pratt", title = "Secret and urgent: the story of codes and ciphers", publisher = "Robert Hale", address = "London, UK", pages = "282", year = "1939", LCCN = "Z104 .P92 1939", bibdate = "Sat Apr 20 12:05:03 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, remark = "Reprinted in 1939 by the Bobbs-Merrill Company, New York, NY, USA, in 1942 by Blue Ribbon Books, Garden City, NY, USA, and in 1996 by Aegean Park Press, Laguna Hills, CA, USA.", tableofcontents = "1. Sermons in Stones \\ 2. The Element of Doubt \\ 3. Jargon \\ 4. Invention and Death \\ 5. Bacon or Shakespeare? \\ 6. Satellites of the Royal Sun \\ 7. Kings, Thieves and Diarists \\ 8. Failure \\ 9. The Revival \\ 10. Code \\ 11. The War of Cryptographers \\ 12. The Cryptographers' War", } @Book{Gaines:1940:ECS, author = "Helen Fouche Gaines", title = "Elementary cryptanalysis; a study of ciphers and their solution", publisher = pub-CHAPMAN-HALL, address = pub-CHAPMAN-HALL:adr, pages = "vi + 230 + 23", year = "1940", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Inscription by the author pasted in. Bound in gray cloth; stamped in red; top edges stained red. Dust jacket.", keywords = "Ciphers; Cryptography", } @Book{USASC:1940:CML, author = "{United States Army Signal Corps}", title = "Cryptanalyst's manual", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "????", year = "1940", LCCN = "Z104 .U33c", bibdate = "Wed May 11 23:30:34 MDT 2011", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, remark = "Prepared under the direction of the Chief Signal Officer.", subject = "cryptography", } @Book{Yardley:1940:SSA, author = "Herbert O. Yardley", title = "Secret service in {America}: The {American Black Chamber}", publisher = "Faber \& Faber Limited", address = "London, UK", pages = "x + 264 + 1", year = "1940", LCCN = "D639.S7 Y3 1940", bibdate = "Wed Nov 15 14:23:09 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "The history and work of the Cryptographic bureau, officially known as section 8 of the Military intelligence division (MI-8).", acknowledgement = ack-nhfb, } @Book{Friedman:1941:MCP, author = "William F. (William Frederick) Friedman", title = "Military cryptanalysis. Part {IV}, Transposition and fractionating systems", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "189", year = "1941", ISBN = "0-89412-198-7 (paperback), 0-89412-199-5 (library bound)", ISBN-13 = "978-0-89412-198-2 (paperback), 978-0-89412-199-9 (library bound)", LCCN = "Z103.5.F77 1992", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Cryptographic series; 61", acknowledgement = ack-nhfb, alttitle = "Transposition and fractionating series", annote = "Reprint of a U.S. military text, originally published in 1941. Declassified December 1992.", author-dates = "1891--1969", keywords = "Ciphers; Communications, Military; Cryptography", } @TechReport{Turing:1941:APC, author = "Alan M. Turing", title = "The Applications of Probability to Cryptography", type = "Report", institution = "GCHQ", address = "Cheltenham, UK", year = "1941", bibdate = "Wed Apr 25 10:25:22 2012", bibsource = "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Unclassified and released 23 April 2012. Date uncertain, but believed to be between April 1941 and April 1942.", URL = "http://www.gchq.gov.uk/Press/Pages/turing-papers-released.aspx; http://www.theregister.co.uk/2012/04/23/turing_papers_released/", acknowledgement = ack-nhfb, } @TechReport{Turing:1941:SR, author = "Alan M. Turing", title = "On Statistics of Repetitions", type = "Report", institution = "GCHQ", address = "Cheltenham, UK", year = "1941", bibdate = "Wed Apr 25 10:25:22 2012", bibsource = "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Unclassified and released 23 April 2012. Date uncertain, but believed to be between April 1941 and April 1942.", URL = "http://www.gchq.gov.uk/Press/Pages/turing-papers-released.aspx; http://www.theregister.co.uk/2012/04/23/turing_papers_released/", acknowledgement = ack-nhfb, } @Book{Volts:1941:BC, author = "James D. Volts and David Shulman", title = "Bibliography of cryptography", publisher = "U. S. Army", address = "Cincinnati, OH. USA", pages = "93", year = "1941", LCCN = "Z103.A1 V6 1941", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Typewritten (carbon copy) Three heavy leaves precede sections II-IV (not included in pagination). This copy was made especially for the United States Army from the original manuscript. Third copy: pencilled note on cover. Contents: pt.1. Cryptography; pt.2. Titles relating indirectly to cryptography; pt.3. Rejected titles; pt.4. Author index.", acknowledgement = ack-nhfb, keywords = "ciphers --- bibliography; cryptography --- bibliography", } @Book{Volts:1941:BCP, author = "James D. Volts", title = "Bibliography of cryptography: Part {I}: Cryptography", publisher = "U. S. Army", address = "Cincinnati, OH, USA", pages = "various", year = "1941", LCCN = "????", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Chronologically arranged, covering period 1518--1940, and indexed by authors.", acknowledgement = ack-nhfb, keywords = "cryptography --- bibliography", } @Book{Friedman:1942:MC, author = "William F. (William Frederick) Friedman", title = "Military cryptanalysis", publisher = pub-USGPO, address = pub-USGPO:adr, edition = "Third", pages = "various", year = "1942", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, alttitle = "Restricted", annote = "Each pt. has separate t.p. and numbering sequence. pt. 1. Monoalphabetic substitution systems --- pt. 2. Simple varities of polyalphabetic substitution systems --- pt. 3. Simpler varieties of aperiodic substitution systems --- pt. 4. Transportation and fractionating systems.", author-dates = "1891--1969", keywords = "Ciphers; Communications, Military; Cryptography", } @Book{USASC:1942:ACC, author = "{United States.Army.Signal Corps}", title = "Articles on cryptography and cryptanalysis", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "v + 316", year = "1942", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "At head of title: War Department. Office of the Chief Signal Officer, Washington. ``Reprinted from the Signal Corps Bulletin.''", keywords = "Cryptography.", } @Book{Gaines:1943:ECS, author = "Helen Fouche Gaines", title = "Elementary cryptanalysis: a study of ciphers and their solution", publisher = "American Photographic Publishing Co.", address = "Boston, MA, USA", pages = "vi + 230 + 1", year = "1943", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Fourth printing. Errata slip tipped in before Preface. Bound in gray cloth; stamped in red; top edges stained red. Library of the American Cryptogram Association (George C. Lamb Collection).", keywords = "Ciphers; Cryptography.", } @Book{Hitt:1943:MSM, author = "Parker Hitt", title = "Manual for the solution of military ciphers \ldots{} For use in {Donald D. Millikin}'s cryptography and cryptanalysis classes", publisher = "New York University Bookstore", address = "New York, NY, USA", pages = "viii + 101 + 22", year = "1943", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Reprint. Galland, p. 90. Bound in blue paper wrappers; printed in black. Library of the American Cryptogram Association (George C. Lamb Collection).", keywords = "Ciphers; Cryptography.", } @Book{Millikin:1943:ECCa, author = "Donald D. Millikin", title = "Elementary cryptography and cryptanalysis", volume = "56", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "vii + 132", year = "1943", ISBN = "0-89412-173-1 (soft cover), 0-89412-174-X (library bound)", ISBN-13 = "978-0-89412-173-9 (soft cover), 978-0-89412-174-6 (library bound)", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, annote = "``\ldots{} reproduction of a classic text written and used by Donald D. Millikin to introduce cryptography and cryptanalysis to college students at New York University in 1943.''", keywords = "Ciphers; Cryptography", } @Book{Millikin:1943:ECCb, author = "Donald D. Millikin", title = "Elementary cryptography and cryptanalysis", publisher = "New York University Bookstore", address = "New York, NY, USA", edition = "Second", pages = "vii + 132 + 1 + 28", year = "1943", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Reproduced from type-written copy", keywords = "Cryptography.", } @Book{Millikin:1943:ECCc, author = "Donald D. Millikin", title = "Elementary cryptography and cryptanalysis", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, edition = "Third", pages = "vii + 132", year = "1943", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Reproduced from type-written copy.", keywords = "Cryptography.", } @Book{Smith:1943:CSS, author = "Laurence Dwight Smith", title = "Cryptography, the science of secret writing", publisher = pub-NORTON, address = pub-NORTON:adr, pages = "164", year = "1943", LCCN = "Z104 .S5", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "ciphers; cryptography", } @Book{Wolfe:1943:FCCa, author = "Jack Martin Wolfe", title = "A first course in cryptanalysis", publisher = "Brooklyn college press", address = "Brooklyn, NY, USA", pages = "??", year = "1943", LCCN = "Z104 .W6 1943 v. 1-3 (1943)", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reproduced from type-written copy. Lesson 11 (44 numb) inserted after v. 2.", acknowledgement = ack-nhfb, keywords = "cryptography", } @Book{Wolfe:1943:FCCb, author = "Jack Martin Wolfe", title = "A first course in cryptanalysis", publisher = "University Press", address = "Ann Arbor, MI, USA", pages = "various", year = "1943", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Three volumes.", acknowledgement = ack-nhfb, annote = "Reproduced from type-written copy.", keywords = "Cryptography.", } @Book{Wolfe:1943:FCCc, author = "Jack Martin Wolfe", title = "A first course in cryptanalysis", publisher = "Brooklyn College Press", address = "Brooklyn, NY, USA", pages = "various", year = "1943", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Three volumes.", acknowledgement = ack-nhfb, annote = "Mimeographed on rectos only. Bound in printed paper wrappers. Library of the American Cryptogram Association (George C. Lamb Collection)", keywords = "Ciphers; Cryptography", } @Book{Gaines:1944:CSC, author = "Helen Fouche Gaines", title = "Cryptanalysis: a study of ciphers and their solution", publisher = pub-DOVER, address = pub-DOVER:adr, year = "1944", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Codigos (Ou Codificacao)", } @Book{Smith:1944:CSS, author = "Laurence Dwight Smith", title = "Cryptography: the science of secret writing", publisher = "G. Allen and Unwin", address = "London, UK", pages = "164", year = "1944", LCCN = "Z104.S5", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "ciphers; cryptography", } @TechReport{Alexander:1945:CHG, author = "C. H. O'D. Alexander", title = "Cryptologic History of the {German Naval Enigma}", type = "{GC\&CS} Report", number = "HW 25/7", institution = "British National Archives", address = "????", year = "1945", bibdate = "Thu Mar 06 16:07:17 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Galland:1945:HABa, author = "Joseph Stanislaus Galland", title = "An historical and analytical bibliography of the literature of cryptology", publisher = inst-NORTHWESTERN-UNIVERSITY, address = inst-NORTHWESTERN-UNIVERSITY:adr, pages = "viii + 11 + 209", year = "1945", LCCN = "Z103.A1 G3", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "``Works consulted and utilized'' in preface.", series = "Northwestern University studies in the humanities no. 10", acknowledgement = ack-nhfb, keywords = "cryptography --- bibliography", } @Book{Galland:1945:HABb, author = "Joseph Stanislaus Galland", title = "An historical and analytical bibliography of the literature of cryptology", number = "10", publisher = "AMS Press", address = "New York, NY, USA", pages = "viii + 209", year = "1945", ISBN = "0-404-50710-7", ISBN-13 = "978-0-404-50710-7", LCCN = "Z103.A1G3 1970", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Northwestern University humanities series; v. 10", acknowledgement = ack-nhfb, annote = "Bound in blue cloth; stamped in gold. Library of the American Cryptogram Association (George C. Lamb Collection). Master microform held by: UnM. Microfilm. Ann Arbor, Mich., University Microfilms International, 19--. 1 reel. 35 mm.", keywords = "Cryptography --- Bibliography.", } @Book{Galland:1945:HABc, author = "Joseph Stanislaus Galland", title = "An historical and analytical bibliography of the literature of cryptology", volume = "71", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "209", year = "1945", ISBN = "0-89412-252-5", ISBN-13 = "978-0-89412-252-1", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, alttitle = "Bibliography of the literature of cryptology", keywords = "Cryptography --- Bibliography.", } @TechReport{Good:1945:GRT, author = "I. Jack Good and Donald Michie and Geoffrey Timms", title = "General Report on {Tunny}", type = "{GC\&CS} report", number = "HW 25/4", institution = "British National Archives", address = "????", year = "1945", bibdate = "Thu Mar 06 16:13:00 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @TechReport{Shannon:1945:MTC, author = "Claude Shannon", title = "A Mathematical Theory of Cryptography", type = "Classified report", institution = "Bell Laboratories", address = "Murray Hill, NJ, USA", day = "1", month = sep, year = "1945", bibdate = "Mon Nov 04 18:32:51 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/bstj1940.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "In this paper, the binary-choice measure was called `alternative'; the term `bit' did not appear in print until \cite{Shannon:1948:MTCa}.", } @Book{Baudouin:1946:ECF, author = "Roger Baudouin", title = "{{\'E}}l{\'e}ments de cryptographie. ({French}) [{Elements} of cryptography]", publisher = "A. Pedone", address = "Paris, France", pages = "336", year = "1946", bibdate = "Tue Dec 26 07:17:01 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, language = "French", } @Article{Landers:1946:RPR, author = "A. W. Landers", title = "Recent Publications: Reviews: {{\em An Historical and Analytical Bibliography of the Literature of Cryptology}}, by {J. S. Galland}", journal = j-AMER-MATH-MONTHLY, volume = "53", number = "6", pages = "330--331", month = jun # "\slash " # jul, year = "1946", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", bibdate = "Mon Jun 28 12:38:13 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @Book{Bond:1947:FSC, author = "Raymond T. (Raymond Tostevin) Bond", title = "Famous stories of code and cipher", publisher = "Rinehart and Company", address = "New York; Toronto", pages = "xxvi + 342", year = "1947", LCCN = "PS648.C6 B65", bibdate = "Wed Nov 25 14:08:17 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprinted in 1965 by Collier Books.", acknowledgement = ack-nhfb, } @Book{Sacco:1947:MC, author = "Luigi Sacco", title = "Manuale di crittografia. ({Italian}) [{Manual} of cryptography]", publisher = "Istituto Polygrafico Dello Stato", address = "Roma, Italia", edition = "Third", pages = "xii + 374", year = "1947", bibdate = "Tue Dec 26 07:04:56 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, language = "Italian", } @Article{Shannon:1948:MTCa, author = "Claude Shannon", title = "A Mathematical Theory of Communication", journal = j-BELL-SYST-TECH-J, volume = "27", number = "3", pages = "379--423", month = jul, year = "1948", CODEN = "BSTJAN", ISSN = "0005-8580", bibdate = "Mon Nov 04 18:36:13 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "From the first page: ``If the base $2$ is used the resulting units may be called binary digits, or more briefly, {\em bits}, a word suggested by J. W. Tukey.''. This is the first known printed instance of the word `bit' with the meaning of binary digit.", acknowledgement = ack-nhfb, fjournal = "The Bell System Technical Journal", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/", } @Article{Shannon:1948:MTCb, author = "Claude Shannon", title = "A Mathematical Theory of Communication (continued)", journal = j-BELL-SYST-TECH-J, volume = "27", number = "4", pages = "623--656", month = oct, year = "1948", CODEN = "BSTJAN", ISSN = "0005-8580", bibdate = "Mon Nov 04 18:36:13 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "The Bell System Technical Journal", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/", } @Book{Zim:1948:CSW, author = "Herbert S. Zim", title = "Codes and secret writing", publisher = "William Morrow", address = "New York, NY, USA", pages = "vi + 154", year = "1948", LCCN = "Z104 .Z5", bibdate = "Wed Nov 25 14:13:48 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Children's book.", } @Article{Shannon:1949:CTS, author = "Claude Shannon", title = "Communication Theory of Secrecy Systems", journal = j-BELL-SYST-TECH-J, volume = "28", number = "4", pages = "656--715", month = "????", year = "1949", CODEN = "BSTJAN", ISSN = "0005-8580", bibdate = "Sat Sep 25 10:52:04 2004", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "A footnote on the initial page says: ``The material in this paper appeared in a confidential report, `A Mathematical Theory of Cryptography', dated Sept.~1, 1946, which has now been declassified.''.", URL = "http://en.wikipedia.org/wiki/Communication_Theory_of_Secrecy_Systems; http://www.cs.ucla.edu/~jkong/research/security/shannon1949.pdf", acknowledgement = ack-nhfb, fjournal = "The Bell System Technical Journal", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/", remark = "The Wikipedia entry credits this paper as the foundation of modern cryptography. Diffie and Hellman \cite[page 653]{Diffie:1976:NDC} remark: ``Shannon [this paper] showed that the one time pad systems, which had been in use since the late twenties [1920s] offered `perfect security' (a form of unconditional security).''", } @Book{Sacco:1951:MCF, author = "Luigi Sacco", title = "Manuel de cryptographie. ({French}) [{Manual} of cryptography]", publisher = "Payot", address = "Paris, France", pages = "????", year = "1951", bibdate = "Tue Dec 26 07:10:55 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, language = "French", remark = "French translation of third Italian edition.", } @Book{Andree:1952:C, author = "Richard Vernon Andree", title = "Cryptanalysis", publisher = "Yeshiva College", address = "New York, NY, USA", pages = "5--16", year = "1952", MRclass = "09.0X", MRnumber = "14,124d", bibdate = "Wed Nov 25 14:18:35 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprinted from Scripta mathematica, Vol. 28, No. 1. March, 1952.", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @Article{Porges:1952:MNC, author = "Arthur Porges", title = "Mathematical Notes: a Continued Fraction Cipher", journal = j-AMER-MATH-MONTHLY, volume = "59", number = "4", pages = "236--236", month = apr, year = "1952", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", bibdate = "Mon Jun 28 12:36:41 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @Book{deVries:1953:SMC, author = "M. {de Vries}", title = "Statistical methods in cryptanalysis", publisher = "Math. Centrum Amsterdam", address = "Amsterdam, The Netherlands", pages = "15", year = "1953", MRclass = "62.0X", MRnumber = "15,974d", MRreviewer = "H. Campaigne", bibdate = "Sat Oct 26 10:21:29 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Rapport ZW 1953-014", } @TechReport{Behrens:1954:EUP, author = "Carl E. Behrens", title = "Effects on {U-boat} performance of intelligence from decryption of {Allied} communication", type = "Technical report OEG study", number = "553", institution = "Distributed by NTIS", address = "Springfield, VA, USA", pages = "various", year = "1954", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "``Prepared by Operations Evaluation Group, Office of the Chief of Naval Operations\ldots{}Prepared for: Office of the Chief of Operations (Navy) 28 April 1954.'' On cover: ``distributed by Defense Technical Information Center''.", keywords = "Military intelligence; Military surveillance; Submarine boats --- World War, 1939-1945", } @Book{Friedman:1955:CLS, author = "William F. (William Frederick) Friedman and Elizebeth Friedman and Louis B. (Louis Booker) Wright", title = "The cryptologist looks at {Shakespeare}", publisher = "????", address = "????", pages = "????", year = "1955", LCCN = "????", bibdate = "Fri Dec 22 09:28:29 MST 2017", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Original typescript, awarded Folger literary prize, 1955.", acknowledgement = ack-nhfb, author-dates = "Elizebeth Smith Friedman (1892--1980); William Frederick Friedman (1891--1969)", remark = "Published 1957 as \booktitle{The Shakespearean ciphers examined}, in reduced form. Also: Copy of award from American Shakespeare Theatre and Academy, 1958; Letter from Mr. and Mrs. W. F. Friedman to Dr. Wright, June 9, 1959, with Dr. Wright's reply of June 12, 1959.", subject = "Shakespeare, William; Authorship; Manuscripts; Friedman, William F. (William Frederick); Correspondence; Friedman, Elizebeth; Wright, Louis B. (Louis Booker); Ciphers; Authorship; Ciphers", subject-dates = "William Shakespeare (1564--1616)", } @MastersThesis{Hoffer:1955:MAC, author = "Carol M. Hoffer", title = "On the mathematical approach to cryptanalysis", type = "Thesis", school = "University of South Dakota", address = "Vermillion, SD, USA", pages = "65", year = "1955", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @Book{Rand:1955:MRD, author = "{Rand Corporation}", title = "A Million Random Digits With 100,000 Normal Deviates", publisher = "Free Press", address = "Glencoe, IL, USA", pages = "xxv + 400 + 200", year = "1955", ISBN = "0-02-925790-5", ISBN-13 = "978-0-02-925790-6", LCCN = "QA276.5 .R3", bibdate = "Sat Aug 23 07:58:03 2003", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprinted in 1966 and 2001 \cite{Rand:2001:MRD}. See also \cite{Tippett:1927:RSN}.", acknowledgement = ack-nhfb, } @Book{Sawirudin:1955:PND, author = "Sawirudin", title = "Pegawai negeri dan {PGP} baru", publisher = "Badan Penerbitan Dewan Nasional SOBSI", address = "Djakarta", edition = "Cet. 1.", pages = "93", year = "1955", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Photocopy. [S.1.: s.n., 1958?].", keywords = "Indonesia --- Officials and employees --- Salaries, etc.", } @Book{Smith:1955:CSS, author = "Laurence Dwight Smith", title = "Cryptography; the science of secret writing", publisher = pub-DOVER, address = pub-DOVER:adr, pages = "164", year = "1955", LCCN = "Z104 .S6", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "``An unabridged republication of the first edition with corrections.''", acknowledgement = ack-nhfb, keywords = "ciphers; cryptography", } @Book{Epstein:1956:FBC, author = "Sam Epstein and Beryl Epstein", title = "The first book of codes and ciphers", publisher = "Franklin Watts", address = "New York, NY, USA", year = "1956", LCCN = "Z104 .E68", bibdate = "Wed Nov 25 14:12:11 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Pictures by Laszlo Roth", acknowledgement = ack-nhfb, annote = "Children's book.", } @Book{Friedman:1956:CCC, author = "William F. (William Frederick) Friedman", title = "Codes and ciphers (cryptology)", publisher = "Encyclopaedia Britannica", address = "Chicago, IL, USA", pages = "8", year = "1956", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Caption title. ``From Encyclopaedia Britannica, copyright 1956.'' Text in double columns.", author-dates = "1891--1969", keywords = "Ciphers; Cryptography; Cryptography --- Equipment and supplies; Cryptography --- History", } @Book{Gaines:1956:CSC, author = "Helen Fouch{\'e} Gaines", title = "Cryptanalysis: a study of ciphers and their solution", publisher = pub-DOVER, address = pub-DOVER:adr, pages = "237", year = "1956", ISBN = "0-486-20097-3", ISBN-13 = "978-0-486-20097-2", LCCN = "Z104 .G3 1956", MRclass = "99.0X", MRnumber = "19,519g", MRreviewer = "H. Campaigne", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Formerly published under the title: Elementary cryptanalysis.", acknowledgement = ack-nhfb, annote = "Unabridged and corrected edition of \ldots{} [the author's] Elementary cryptanalysis.", keywords = "Ciphers; Cryptography", } @Article{Seaton:1956:THS, author = "E. Seaton", title = "{Thomas Hariot}'s Secret Script", journal = j-AMBIX, volume = "5", number = "3--4", pages = "111--114", year = "1956", CODEN = "AMBXAO", DOI = "https://doi.org/10.1179/amb.1956.5.3-4.111", ISSN = "0002-6980 (print), 1745-8234 (electronic)", ISSN-L = "0002-6980", bibdate = "Wed Apr 25 21:08:25 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/ambix.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.tandfonline.com/doi/abs/10.1179/amb.1956.5.3-4.111", acknowledgement = ack-nhfb, ajournal = "Ambix", fjournal = "Ambix: Journal of the Society for the History of Alchemy and Chemistry", journal-URL = "http://www.tandfonline.com/loi/yamb20", onlinedate = "18 Jul 2013", } @Article{Davison:1957:SCG, author = "W. H. T. Davison and M. Gordon", title = "Sorting for chemical groups using {Gordon--Kendall--Davison} ciphers", journal = j-AM-DOC, volume = "8", number = "3", pages = "202--210", month = jul, year = "1957", CODEN = "AMDOA7", DOI = "https://doi.org/10.1002/asi.5090080305", ISSN = "0096-946X", ISSN-L = "0096-946X", bibdate = "Fri Sep 11 06:21:07 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/amdoc.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "American Documentation", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)2330-1643/", onlinedate = "19 Apr 2007", } @Book{Friedman:1957:SCE, author = "William F. (William Frederick) Friedman and Elizebeth S. (Elizebeth Smith) Friedman", title = "The {Shakespearean} Ciphers Examined: an analysis of cryptographic systems used as evidence that some author other than {William Shakespeare} wrote the plays commonly attributed to him", publisher = pub-CUP, address = pub-CUP:adr, pages = "4 + vii--xvi + 1 + 302 + 1", year = "1957", LCCN = "PR2937 .F7", bibdate = "Wed Nov 25 14:04:49 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, author-dates = "1891--1969", tableofcontents = "The great controversy \\ Cryptology as a science \\ Ignatius Donnelly and The great cryptogram \\ The cipher in the epitaph \\ Dr. Owen and his word cipher \\ A miscellany \\ Acrostics and anagrams \\ The long word and other anagrams \\ The string cipher of William Stone Booth \\ Walter Conrad Arensberg \\ The strange story of Dr. Cunningham and Maria Bauer \\ Odd numbers \\ The Bilateral Cipher and Elizabeth Wells Gallup \\ Mrs. Gallup and Colonel Fabyan \\ Elizabethan printing and its bearing on the Bilateral Cipher \\ A study of the Gallup decipherments \\ General Cartier and the Bilateral Cipher \\ The Bilateral Cipher: experiments and deductions \\ Conclusions", } @Book{Gleason:1957:ECP, author = "Andrew M. Gleason", title = "Elementary course in probability", publisher = "National Security Agency, Office of Research and Development, Mathematical Research Division", address = "Washington, DC, USA", edition = "Second", pages = "various", year = "1957", LCCN = "Z104 .G53 1957", bibdate = "Wed May 11 23:23:17 MDT 2011", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Revised by Walter F. Penney and Ronald E. Wyllys.", acknowledgement = ack-nhfb, subject = "cryptography; probabilities", } @InCollection{Gamow:1958:CAP, author = "George Gamow and Martynas Y{\c{c}}as", booktitle = "{Das Universum. Unser Bild vom Weltall}. ({German}) [{The Universe}. {Our} picture of the {Universe}]", title = "The cryptographic approach to the problem of protein synthesis", publisher = "????", address = "Wiesbaden, Germany", pages = "????", year = "1958", LCCN = "", bibdate = "Sat Jun 02 09:24:50 2012", bibsource = "https://www.math.utah.edu/pub/bibnet/authors/g/gamow-george.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Levine:1958:VMS, author = "Jack Levine", title = "Variable Matrix Substitution in Algebraic Cryptography", journal = j-AMER-MATH-MONTHLY, volume = "65", number = "3", pages = "170--179", month = mar, year = "1958", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", bibdate = "Mon Jun 28 12:38:55 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @Book{Bowers:1959:DSP, author = "William Maxwell Bowers", title = "Digraphic substitution: the {Playfair} cipher, the four square cipher", publisher = "American Cryptogram Association", address = "Greenfield, MA, USA", pages = "46", year = "1959", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Practical cryptanalysis; v. 1", acknowledgement = ack-nhfb, keywords = "Ciphers.", } @Book{Anonymous:1960:CNH, author = "Anonymous", title = "Cryptanalysis, a new horizon, by {Dr. Cryptogram} [pseudonym]", publisher = "American Cryptogram Association", address = "New York, NY, USA (??)", pages = "10 + 1 + 27", year = "1960", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "An address to the Annual Convention of the American Cryptogram Association, 1960. Printed by a spirit process on rectos only. In plastic binder. Library of the American Cryptogram Association (George C. Lamb Collection).", keywords = "Cryptography.", } @Book{Bowers:1960:BC, author = "William Maxwell Bowers", title = "The bifid cipher", publisher = "American Cryptogram Association", address = "Greenfield, MA, USA", pages = "48", year = "1960", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Practical cryptanalysis; v. 2", acknowledgement = ack-nhfb, keywords = "Ciphers.", } @Book{Bowers:1960:PC, author = "William Maxwell Bowers and William G. Bryan", title = "Practical cryptanalysis", publisher = "American Cryptogram Association", address = "Greenfield, MA, USA", pages = "??", year = "1960", LCCN = "Z103 .B6", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Bound in printed paper wrappers. Contents: v. 1. Digraphic substitution; the playfair cypher, the four square cypher.-- v. 2. The Bifid cipher. --- v. 3. The Trifid cipher.-- v. 4. Cryptographic ABC'S; Substitution and transposition ciphers, by William G. Bryan. --- v. 5. Cryptographic ABC's; periodic ciphers, miscellaneous, by William G. Bryan.", acknowledgement = ack-nhfb, keywords = "cryptography", } @Book{Bowers:1960:TC, author = "William Maxwell Bowers", title = "The trifid cipher", publisher = "American Cryptogram Association", address = "Greenfield, MA, USA", pages = "ix + 55", year = "1960", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Practical cryptanalysis; v. 3", acknowledgement = ack-nhfb, keywords = "Ciphers.", } @Article{Mandelbrot:1960:BRJa, author = "Beno{\^\i}t Mandelbrot", title = "Book Review: {John Chadwick, \booktitle{The Decipherment of Linear B} (1958) Cambridge University Press}", journal = j-INF-CONTROL, volume = "3", number = "1", pages = "95--96", month = mar, year = "1960", CODEN = "IFCNA4", DOI = "https://doi.org/10.1016/S0019-9958(60)90347-8", ISSN = "0019-9958 (print), 1878-2981 (electronic)", ISSN-L = "0019-9958", bibdate = "Sat Sep 8 16:48:41 MDT 2012", bibsource = "https://www.math.utah.edu/pub/bibnet/authors/m/mandelbrot-benoit.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.sciencedirect.com/science/article/pii/S0019995860903478", acknowledgement = ack-nhfb, fjournal = "Information and Control", } @Article{Pelta:1960:SP, author = "Harold N. Pelta", title = "Selfcipher: Programming", journal = j-CACM, volume = "3", number = "2", pages = "83--83", month = feb, year = "1960", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Fri Nov 25 18:19:25 MST 2005", bibsource = "http://dblp.uni-trier.de/db/journals/cacm/cacm3.html#Pelta60; http://www.acm.org/pubs/contents/journals/cacm/; https://www.math.utah.edu/pub/tex/bib/cacm1960.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", oldlabel = "Pelta60", XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Pelta60", } @Book{Barker:1961:CSC, author = "Wayne G. Barker", title = "Cryptanalysis of the single columnar transposition cipher", publisher = "C. E. Tuttle Co.", address = "Rutland, VT, USA", pages = "x + 1 + 140", year = "1961", LCCN = "Z103 Z32", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "First edition. Bound in tan cloth; stamped in black; red endpapers. Dust jacket. Library of The American Cryptogram Association (George C. Lamb Collection).", keywords = "Cryptography.", } @Article{Levine:1961:SAH, author = "Jack Levine", title = "Some Applications of High-Speed Computers to the Case $ n = 2 $ of Algebraic Cryptography", journal = j-MATH-COMPUT, volume = "15", number = "75", pages = "254--260", month = jul, year = "1961", CODEN = "MCMPAF", ISSN = "0025-5718 (print), 1088-6842 (electronic)", ISSN-L = "0025-5718", bibdate = "Tue Oct 13 08:06:19 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/mathcomp1960.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "Mathematics of Computation", journal-URL = "http://www.ams.org/mcom/", } @Article{Levine:1961:SECa, author = "Jack Levine", title = "Some Elementary Cryptanalysis of Algebraic Cryptography", journal = j-AMER-MATH-MONTHLY, volume = "68", number = "5", pages = "411--418", month = may, year = "1961", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", MRclass = "94.10", MRnumber = "23 \#B2111", bibdate = "Mon Jun 28 12:36:19 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @Book{Levine:1961:SECb, author = "Jack Levine", title = "Some elementary cryptanalysis of algebraic cryptography", publisher = "Mathematical Association of America", address = "Buffalo, NY, USA", pages = "411--418", year = "1961", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprint from American Mathematical Monthly, vol. 68, no. 5, May 1961.", acknowledgement = ack-nhfb, annote = "Bound in blue paper wrappers; printed in black. Library of the American Cryptogram Association (George C. Lamb Collection).", keywords = "Cryptography.", } @Book{Shulman:1961:GC, author = "David Shulman and Joseph Weintraub", title = "A glossary of cryptography", publisher = "Crypto Press", address = "New York, NY, USA", pages = "various", year = "1961", LCCN = "Z103 .S48", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Handbook of cryptography; section 1", acknowledgement = ack-nhfb, keywords = "cryptography --- terminology", } @Book{Friedman:1963:SLC, author = "William F. (William Frederick) Friedman", title = "Six lectures on cryptology", publisher = "????", address = "????", pages = "iii + 182", year = "1963", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "SRH-004.", author-dates = "1891--1969", keywords = "Ciphers; Cryptography", } @Book{Kahn:1963:PNU, author = "David Kahn", title = "Plaintext in the new unabridged: an examination of the definitions on cryptology in {Webster's Third New International Dictionary}", publisher = "Crypto Press", address = "New York, NY, USA", pages = "35", year = "1963", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography --- Terminology; language; Webster's third new international dictionary of the English", } @Book{Thompson:1963:SDE, author = "James Westfall Thompson and Saul Kussiel Padover", title = "Secret diplomacy; espionage and cryptography, 1500-1815", publisher = "F. Ungar Pub. Co", address = "New York, NY, USA", pages = "290", year = "1963", LCCN = "JX1648 .T5 1963", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "``Appendix: Cryptography'': p. 253--263. Bibliography: p. 265--282.", acknowledgement = ack-nhfb, keywords = "cryptography --- history; diplomacy --- history; Europe --- politics and government; secret service", } @Article{Zafiropulo:1963:RAD, author = "Jean Zafiropulo", title = "Le r{\^o}le de l'analogie dans le d{\'e}chiffrement de l'{\'e}criture myc{\'e}nienne lin{\'e}aire {B}. ({French}) [{The} role of analogy in deciphering {Mycenaean} linear script {B}]", journal = j-DIALECTICA, volume = "17", number = "4", pages = "307--327", month = dec, year = "1963", CODEN = "????", DOI = "https://doi.org/10.1111/j.1746-8361.1963.tb00466.x", ISSN = "0012-2017 (print), 1746-8361 (electronic)", ISSN-L = "0012-2017", bibdate = "Thu Jul 20 09:32:38 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/dialectica.bib", acknowledgement = ack-nhfb, fjournal = "Dialectica: International Review of Philosophy of Knowledge", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1746-8361", language = "French", } @Book{Laffin:1964:CCS, author = "John Laffin", title = "Codes and ciphers: secret writing through the ages", publisher = "Abelard-Schuman", address = "????", pages = "164", year = "1964", LCCN = "", bibdate = "Sat Apr 20 12:01:11 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Stout:1965:DRN, author = "Rex Stout", title = "The Doorbell Rang: a Nero Wolfe Novel", publisher = "????", address = "????", pages = "??", year = "1965", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 5]{Rivest:1998:CWC}.", } @Article{Kahn:1966:MC, author = "David Kahn", title = "Modern Cryptology", journal = j-SCI-AMER, volume = "215", number = "1", pages = "38--46", month = jul, year = "1966", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican0766-38", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Sat May 18 15:58:23 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sciam1960.bib", URL = "http://www.nature.com/scientificamerican/journal/v215/n1/pdf/scientificamerican0766-38.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", } @Book{Sinkov:1966:ECM, author = "Abraham Sinkov", title = "Elementary cryptanalysis: a mathematical approach", volume = "22", publisher = pub-MATH-ASSOC-AMER, address = pub-MATH-ASSOC-AMER:adr, pages = "ix + 222", year = "1966", ISBN = "0-88385-622-0", ISBN-13 = "978-0-88385-622-2", LCCN = "Z 104 S47 1980", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "With a supplement by Paul L. Irwin. Reissued in 1975 and 1980.", series = "New mathematical library", acknowledgement = ack-nhfb, keywords = "ciphers; cryptography", } @Book{Tuchman:1966:ZT, author = "Barbara W. Tuchman", title = "The {Zimmermann} telegram", publisher = pub-MACMILLAN, address = pub-MACMILLAN:adr, pages = "xii + 244", year = "1966", LCCN = "D511 .T77 1966", bibdate = "Wed Nov 25 13:57:39 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprint of original 1958 edition. Kahn \cite{Kahn:1996:CSS} describes this book as ``recount[ing] the political effects of the most important cryptogram solution in history''.", acknowledgement = ack-nhfb, } @Book{Bowers:1967:PC, author = "William Maxwell Bowers and William G. Bryan", title = "Practical cryptanalysis", publisher = "American Cryptogrm Association", address = "Greenfield, MA, USA", pages = "various", year = "1967", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Bound in printed paper wrappers. From the library of the American Cryptogram Association. (The George C. Lamb Collection.) V. I. Digraphic substitution, by Bowers.-- V. II. The Bifid cipher, by Bowers.-- V. III. The Trifid cipher.-- V. IV and V. ``Cryptographic ABC'S'' by William G. Bryan.", keywords = "Cryptography.", } @Article{Brillhart:1967:SFR, author = "John Brillhart and J. L. Selfridge", title = "Some Factorizations of $ 2^n \pm 1 $ and Related Results", journal = j-MATH-COMPUT, volume = "21", number = "97", pages = "87--96", month = jan, year = "1967", CODEN = "MCMPAF", ISSN = "0025-5718 (print), 1088-6842 (electronic)", ISSN-L = "0025-5718", bibdate = "Tue Oct 13 08:06:19 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "Mathematics of Computation", journal-URL = "http://www.ams.org/mcom/", } @Book{Bryan:1967:CA, author = "William G. Bryan", title = "Cryptographic {ABC}'s", publisher = "American Cryptogram Association", address = "Greenfield, MA, USA", year = "1967", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Practical cryptanalysis; v. 4, 5", acknowledgement = ack-nhfb, annote = "v. 1. Substitution and transposition ciphers.--v. 2. Periodic ciphers. Miscellaneous.", keywords = "Ciphers.", } @Book{Farago:1967:BSS, author = "Ladislas Farago", title = "The broken seal: the story of {Operation Magic} and the {Pearl Harbor} disaster", publisher = pub-RANDOM, address = pub-RANDOM:adr, pages = "439", year = "1967", LCCN = "D742.U5 F3", bibdate = "Thu Apr 29 18:01:53 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See also reprint \cite{Farago:1969:BSS}.", acknowledgement = ack-nhfb, } @Book{Golomb:1967:SRS, author = "S. Golomb", title = "Shift Register Sequences", publisher = pub-HOLDEN-DAY, address = pub-HOLDEN-DAY:adr, pages = "xiv + 224", year = "1967", LCCN = "QA267.5.S4 G6", bibdate = "Mon Nov 30 08:47:35 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Portions co-authored with Lloyd R. Welch, Richard M. Goldstein, and Alfred W. Hales.", acknowledgement = ack-nhfb, } @Book{Kahn:1967:CSSa, author = "David Kahn", title = "The codebreakers: the story of secret writing", publisher = pub-MACMILLAN, address = pub-MACMILLAN:adr, pages = "xvi + 1164", year = "1967", LCCN = "Z103 .K28", bibdate = "Tue Dec 01 08:31:37 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/index-table-c.html#cryptography", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1000.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Book{Kahn:1967:CSSb, author = "David Kahn", title = "The codebreakers: the story of secret writing", publisher = "Weidenfeld and Nicolson", address = "London, UK", pages = "xvi + 1164", year = "1967", LCCN = "Z103 .K28 1967", bibdate = "Tue Dec 01 08:35:10 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Kullback:1967:SMC, author = "Solomon Kullback", title = "Statistical methods in cryptanalysis", number = "14", publisher = "National Archives", address = "Washington, DC, USA", edition = "Revised", pages = "iii + 194", year = "1967", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Technical literature series monograph", acknowledgement = ack-nhfb, keywords = "Cryptography.", remark = "From \cite{Anscombe:2003:QCC}: ``A bookseller description [of this book]: `This classic text provides various statistical tests: the Chi Test, which affords a quantitative measure of the degree of similarity between two distributions, and the Phi Test, which provides a quantitative measurement of the degree of non-randomness of a distribution. Text includes numerous tabulations of frequency data in other languages.'.''", } @Book{Monge:1967:NMC, author = "Alf Monge and O. G. Landsverk", title = "Norse medieval cryptography in runic carvings", publisher = "Norseman Press", address = "Glendale, CA, USA", pages = "224", year = "1967", LCCN = "E105 .M65", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Includes bibliographies.", acknowledgement = ack-nhfb, keywords = "America --- discovery and exploration --- Norse; cryptography; runes", } @Article{Ayoub:1968:EEK, author = "F. Ayoub", title = "Erratum: Encryption with keyed random permutations", journal = j-ELECT-LETTERS, volume = "17", number = "??", pages = "??--??", month = feb, year = "1968", CODEN = "ELLEAK", DOI = "https://doi.org/10.1049/el:19810541", ISSN = "0013-5194 (print), 1350-911X (electronic)", ISSN-L = "0013-5194", bibdate = "Fri Dec 30 16:39:43 MST 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4246020", acknowledgement = ack-nhfb, book-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220", fjournal = "Electronics Letters", } @Article{Ayoub:1968:EKR, author = "F. Ayoub", title = "Encryption with keyed random permutations", journal = j-ELECT-LETTERS, volume = "17", number = "??", pages = "583--585", month = feb, year = "1968", CODEN = "ELLEAK", DOI = "https://doi.org/10.1049/el:19810411", ISSN = "0013-5194 (print), 1350-911X (electronic)", ISSN-L = "0013-5194", bibdate = "Fri Dec 30 16:39:40 MST 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4245887", acknowledgement = ack-nhfb, book-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220", fjournal = "Electronics Letters", } @Book{Sinkov:1968:ECMa, author = "Abraham Sinkov", title = "Elementary cryptanalysis: a mathematical approach", volume = "22", publisher = pub-RANDOM, address = pub-RANDOM:adr, pages = "ix + 189", year = "1968", LCCN = "QA11 .N5 v.22", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "New mathematical library", acknowledgement = ack-nhfb, keywords = "Ciphers; Cryptography", } @Book{Sinkov:1968:ECMb, author = "Abraham Sinkov", title = "Elementary cryptanalysis: a mathematical approach", volume = "22", publisher = pub-MATH-ASSOC-AMER, address = pub-MATH-ASSOC-AMER:adr, pages = "ix + 222", year = "1968", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "New mathematical library", acknowledgement = ack-nhfb, keywords = "Ciphers; Cryptography", } @Book{Wilkes:1968:TSCa, author = "M. V. (Maurice Vincent) Wilkes", title = "Time-sharing computer systems", volume = "5", publisher = "Macdonald and Co.", address = "London, UK", pages = "vii + 102", year = "1968", ISBN = "0-356-02426-1", ISBN-13 = "978-0-356-02426-4", LCCN = "QA76.5 .W523 1968b", bibdate = "Sun Mar 11 09:46:15 MDT 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", series = "Macdonald computer monographs", acknowledgement = ack-nhfb, remark = "According to \cite{Koblitz:1987:CNT}, this book describes a one-way function invented by Roger Needham for password encryption, a precursor to public-key cryptography.", subject = "Time-sharing computer systems", } @Book{Wilkes:1968:TSCb, author = "M. V. (Maurice Vincent) Wilkes", title = "Time-sharing computer systems", volume = "5", publisher = "American Elsevier Pub. Co.", address = "New York, NY, USA", pages = "102", year = "1968", LCCN = "QA76.5 .W523", bibdate = "Sun Mar 11 09:46:15 MDT 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", series = "Computer monograph series", acknowledgement = ack-nhfb, remark = "According to \cite{Koblitz:1987:CNT}, this book describes a one-way function invented by Roger Needham for password encryption, a precursor to public-key cryptography.", subject = "Time-sharing computer systems", } @Book{Farago:1969:BSS, author = "Ladislas Farago", title = "The broken seal: the story of {Operation Magic} and the {Pearl Harbor} disaster", publisher = "Mayflower", address = "London, UK", pages = "415", year = "1969", LCCN = "D742.U5 F3", bibdate = "Wed Nov 25 14:00:32 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprint of \cite{Farago:1967:BSS}.", acknowledgement = ack-nhfb, } @Book{Knuth:1969:SA, author = "Donald E. Knuth", title = "Seminumerical Algorithms", volume = "2", publisher = pub-AW, address = pub-AW:adr, pages = "xi + 624", year = "1969", ISBN = "0-201-03802-1", ISBN-13 = "978-0-201-03802-6", LCCN = "QA76.5 .K57", MRclass = "68.00 (65.00)", MRnumber = "44 \#3531", MRreviewer = "M. Muller", bibdate = "Wed Dec 15 15:47:38 1993", bibsource = "https://www.math.utah.edu/pub/tex/bib/benfords-law.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/fparith.bib; https://www.math.utah.edu/pub/tex/bib/master.bib", price = "US\$19.75", series = "The Art of Computer Programming", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 6]{Handschuh:1998:SCC}.", remark = "Benford's Law is discussed on pp. 219--229.", tableofcontents = "3: Random Numbers \\ 3.1. Introduction / 1 \\ 3.2. Generating Uniform Random Numbers / 9 \\ 3.2.1. The Linear Congruential Method / 9 \\ 3.2.1.1. Choice of modulus / 11 \\ 3.2.1.2. Choice of multiplier / 15 \\ 3.2.1.3. Potency / 21 \\ 3.2.2. Other Methods / 25 \\ 3.3. Statistical Tests / 34 \\ 3.3.1. General Test Procedures for Studying Random Data / 35 \\ 3.3.2. Empirical Tests / 54 \\ *3.3.3. Theoretical Tests / 69 \\ 3.3.4. The Spectral Test / 82 \\ 3.4. Other Types of Random Quantities / 100 \\ 3.4.1. Numerical Distributions / 101 \\ 3.4.2. Random Sampling and Shuffling / 121 \\ *3.5. What is a Random Sequence? / 127 \\ 3.6. Summary / 155 \\ 4: Arithmetic \\ 4.1. Positional Number Systems / 162 \\ 4.2. Floating-Point Arithmetic / 180 \\ 4.2.1. Single-Precision Calculations / 180 \\ 4.2.2. Accuracy of Floating-Point Arithmetic / 195 \\ *4.2.3. Double-Precision Calculations / 210 \\ 4.2.4. Statistical Distribution / 218 \\ 4.3. Multiple-Precision Arithmetic / 229 \\ 4.3.1. The Classical Algorithms / 229 \\ *4.3.2. Modular Arithmetic / 248 \\ *4.3.3. How Fast Can We Multiply? / 258 \\ 4.4. Radix Conversion / 280 \\ 4.5. Rational Arithmetic / 290 \\ 4.5.1. Fractions / 290 \\ 4.5.2. The Greatest Common Divisor / 293 \\ *4.5.3. Analysis of Euclid's Algorithm / 316 \\ 4.5.4. Factoring into Primes / 339 \\ 4.6. Polynomial Arithmetic / 360 \\ 4.6.1. Division of Polynomials / 363 \\ *4.6.2. Factorization of Polynomials / 381 \\ 4.6.3. Evaluation of Powers / 398 \\ 4.6.4. Evaluation of Polynomials / 422 \\ *4.7. Manipulation of Power Series / 444 \\ Answers to Exercises / 452 \\ Appendix A: MIX / 565 \\ 1. Description of MIX / 565 \\ 2. The MIX Assembly Language / 584 \\ Appendix B: Tables of Numerical Quantities / 596 \\ 1. Fundamental Constants (decimal) / 596 \\ 2. Fundamental Constants (octal) / 597 \\ 3. Harmonic Numbers, Bernoulli Numbers, Fibonacci Numbers / 598 \\ Appendix C: Index to Notations / 600 \\ Index and Glossary / 605", xxyear = "{\noopsort{1968c}}1969", } @Book{Knuth:1969:SNM, author = "Donald E. Knuth", title = "Semi\-nu\-mer\-i\-cal Algorithms", volume = "2", publisher = pub-AW, address = pub-AW:adr, pages = "xi + 624", year = "1969", ISBN = "0-201-03802-1", ISBN-13 = "978-0-201-03802-6", LCCN = "QA76.5 .K57", bibdate = "Wed Dec 15 15:47:38 1993", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See pages 248--250.", price = "US\$19.75", series = "The Art of Computer Programming", acknowledgement = ack-nhfb, } @Article{Leighton:1969:SCA, author = "Albert C. Leighton", title = "Secret Communication among the {Greeks} and {Romans}", journal = j-TECH-CULTURE, volume = "10", number = "2", pages = "139--154", month = apr, year = "1969", CODEN = "TECUA3", DOI = "https://doi.org/10.1353/tech.1969.a892350", ISSN = "0040-165X (print), 1097-3729 (electronic)", ISSN-L = "0040-165X", bibdate = "Sat Sep 30 08:23:14 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/techculture1960.bib", URL = "https://muse.jhu.edu/pub/1/article/892350/pdf", acknowledgement = ack-nhfb, ajournal = "Tech. Culture", fjournal = "Technology and Culture", journal-URL = "https://muse.jhu.edu/journal/194", } @Article{Schroeder:1969:IC, author = "M. R. Schroeder", title = "Images from computers", journal = j-IEEE-SPECTRUM, volume = "6", number = "3", pages = "66--78", month = mar, year = "1969", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1969.5214005", ISSN = "1939-9340", ISSN-L = "0018-9235", bibdate = "Wed Jan 15 11:58:06 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1960.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Application software; Brightness; Cryptography; Laboratories; Optical computing; Optical films; Optical materials; Optical signal processing; Spectrogram; Telephony", } @Article{VanTassel:1969:ACT, author = "Dennie {Van Tassel}", title = "Advanced Cryptographic Techniques for Computers", journal = j-CACM, volume = "12", number = "12", pages = "664--665", month = dec, year = "1969", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Mar 24 21:38:51 MST 1997", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; https://www.math.utah.edu/pub/tex/bib/cacm1960.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "Cryptographic techniques which can be used to maintain the confidentiality of information processed by computers are dealt with. Special emphasis is paid to the unique characteristics of computer files that make many cryptographic methods of little use. Relative security, costs, and preferred methods are included in this paper.", acknowledgement = ack-nhfb, classcodes = "C6130 (Data handling techniques)", corpsource = "San Jose State Coll., CA, USA", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "ciphers secrecy systems; codes; computational linguistics; confidential information processing; cryptanalysis; cryptographic; security of data; security systems", } @Book{Winterbotham:1969:SP, author = "F. W. (Frederick William) Winterbotham", title = "Secret and personal", publisher = "Kimber", address = "London, UK", pages = "192", year = "1969", ISBN = "0-7183-0321-0", ISBN-13 = "978-0-7183-0321-1", LCCN = "D810.S7 W48; D810.S7 W73", bibdate = "Fri May 13 08:14:55 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; melvyl.cdlib.org:210/CDL90", acknowledgement = ack-nhfb, author-dates = "1897--1990", subject = "World War, 1939--1945; Secret service; Great Britain", } @TechReport{Feistel:1970:CCD, author = "Horst Feistel", title = "Cryptographic coding for data-bank privacy", type = "Research Report", number = "RC-2827", institution = inst-IBM-WATSON, address = inst-IBM-WATSON:adr, day = "18", month = mar, year = "1970", bibdate = "Sat Jun 10 11:33:02 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Galland:1970:HAB, author = "Joseph Stanislaus Galland", title = "An historical and analytical bibliography of the literature of cryptology", number = "10", publisher = "AMS Press", address = "New York, NY, USA", pages = "viii + 209", year = "1970", ISBN = "0-404-50710-7", ISBN-13 = "978-0-404-50710-7", LCCN = "Z103.A1 G3 1970", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Northwestern University studies in the humanities", acknowledgement = ack-nhfb, keywords = "cryptography --- bibliography", } @Article{Gingerich:1970:BRB, author = "Owen Gingerich", title = "Book Review: {{\booktitle{The Codebreakers. The Story of Secret Writing}} by David Kahn}", journal = j-ISIS, volume = "61", number = "3", pages = "405--406", month = "Autumn", year = "1970", CODEN = "ISISA4", ISSN = "0021-1753 (print), 1545-6994 (electronic)", ISSN-L = "0021-1753", bibdate = "Tue Jul 30 21:28:42 MDT 2013", bibsource = "http://www.jstor.org/action/showPublication?journalCode=isis; http://www.jstor.org/stable/i302289; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/isis1970.bib", URL = "http://www.jstor.org/stable/229701", acknowledgement = ack-nhfb, fjournal = "Isis", journal-URL = "http://www.jstor.org/page/journal/isis/about.html", } @Book{Marsh:1970:CSS, author = "D. C. B. Marsh", title = "Cryptology as a senior seminar topic", publisher = "Mathematical Association of America", address = "Buffalo, NY, USA", pages = "761--764", year = "1970", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprint from American Mathematical Monthly, vol. 77, no. 7, August-September, 1970.", acknowledgement = ack-nhfb, annote = "Library of the American Cryptogram Association (George C. Lamb Collection).", keywords = "Cryptography.", } @Article{Marsh:1970:MEC, author = "D. C. B. Marsh", title = "Mathematical Education: Cryptology as a Senior Seminar Topic", journal = j-AMER-MATH-MONTHLY, volume = "77", number = "7", pages = "761--764", month = aug # "\slash " # sep, year = "1970", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", bibdate = "Mon Jun 28 12:36:02 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @Book{Stark:1970:INT, author = "Harold M. Stark", title = "An introduction to number theory", publisher = "Markham Publishing Company", address = "Chicago, IL, USA", pages = "x + 347", year = "1970", ISBN = "0-8410-1014-5", ISBN-13 = "978-0-8410-1014-7", LCCN = "QA241 .S72", bibdate = "Fri Jun 24 14:24:21 MDT 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", series = "Markham mathematics series", acknowledgement = ack-nhfb, subject = "Number theory", } @TechReport{Tuckerman:1970:SVV, author = "Bryant Tuckerman", title = "A study of the {Vigen{\'e}re--Vernam} single and multiple loop enciphering systems", type = "Research Report", number = "RC-2879", institution = inst-IBM-WATSON, address = inst-IBM-WATSON:adr, day = "14", month = may, year = "1970", bibdate = "Sat Jun 10 12:30:19 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Manual{USDOS:1970:BC, author = "{United States.Dept.of the Army}", title = "Basic cryptanalysis", type = "Field Manual", number = "FM 34-40-2", organization = pub-USGPO, address = pub-USGPO:adr, pages = "various", day = "13", month = sep, year = "1970", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, alttitle = "TM 32-220 20 August 1970.", keywords = "Cryptography --- Military aspects --- Handbooks, manuals, etc; Security systems --- Military aspects --- Handbooks, manuals, etc; United States. --- Army --- Handbooks, manuals, etc", } @Book{Wolfe:1970:SWC, author = "James Raymond Wolfe", title = "Secret writing: the craft of the cryptographer", publisher = pub-MCGRAW-HILL, address = pub-MCGRAW-HILL:adr, pages = "192", year = "1970", LCCN = "652.8 W", bibdate = "Wed Nov 25 14:23:25 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Explains the distinction between ciphers and codes and describes their past and present use in secret communications.", acknowledgement = ack-nhfb, annote = "High-school level book.", keywords = "ciphers; cryptography", } @Article{Campaigne:1971:REC, author = "H. H. Campaigne", title = "Reviews: {{\em Elementary Cryptanalysis --- A Mathematical Approach}}, by {Abraham Sinkov}", journal = j-AMER-MATH-MONTHLY, volume = "78", number = "4", pages = "423--423", month = apr, year = "1971", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", bibdate = "Mon Jun 28 12:36:19 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @Book{DAgapeyeff:1971:CC, author = "Alexander D'Agapeyeff", title = "Codes and ciphers", publisher = "Gryphon Books", address = "Ann Arbor, MI, USA", pages = "160", year = "1971", ISBN = "????", ISBN-13 = "????", LCCN = "Z103 .D35 1971", bibdate = "Sat Apr 20 13:40:57 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprint of \cite{DAgapeyeff:1939:CC}.", acknowledgement = ack-nhfb, } @Article{Girdansky:1971:DPC, author = "M. B. Girdansky", title = "Data privacy --- cryptology and the computer at {IBM Research},", journal = "IBM Research Reports", volume = "7", number = "4", pages = "12", year = "1971", bibdate = "Sat Jun 10 11:41:21 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Hammer:1971:SSC, author = "Carl Hammer", title = "Signature Simulation and Certain Cryptographic Codes", journal = j-CACM, volume = "14", number = "1", pages = "3--14", month = jan, year = "1971", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Mar 25 13:26:09 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm1970.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "Three cyphers allegedly authored by Thomas Jefferson Beale in 1822 have been the subject of intensive study for over 100 years. Generations of cryptanalysts have expended untold man-years, thus far without success, attempting tode code them; vast armies of fortune hunters and treasure seekers have devoted Herculean labors to digging up the rolling hills of Virginia trying to locate the promised bonanza. \par The history of pertinent activities would fill volumes, yet serious students of cryptography have always had nagging doubts about the cyphers' authenticity. It has been alleged that the ``known solution'' to Cypher Number Two: 115, 73, 24, 818, 37, 52, 49, \ldots{} (``I have deposited in the County of Bedford about four miles from Buford's in an excavation or vault \ldots{}'') with the aid of an unsanitized version of the Declaration of Independence was merely a superb, imaginative, and grandiose hoax perpetrated ages ago for whatever reasons. Modern computer technology could obviously perform signature analyses the process of encoding itself so as to yield new clues and deeper insights into their construction. For the benefit of the uninitiated, the encoding method used in the second cypher employs a specified document whose words are simply numbered consecutively, and first letters of these words are sought out at random to match the letters of these words are sought out at random to match the letters of the clear text or message. \par The sequence of numbers corresponding to these matches is then written down as the final code. While primitive, the process has the advantage of relative security until the source document becomes known; at that moment the cypher can be decoded even by second graders. The work now completed with the help of our UNIVAC 1108 includes numerous analytical studies of the Beale cyphers and various types of simulations. \par For example, we have turned the entire process of simulated encoding by various schemes over to the machine and analyzed the signatures of these synthetic codes; we have also encoded various messages by hand, using different texts and a variety of methods to obtain their signatures. These simulations provide convincing evidence that the signatures are both process and data dependent; they indicate also very strongly that Mr. Beale's cyphers are for real and that it is merely a matter of time before someone finds the correct source document and locates the right vault in the common-wealth of Virginia.", acknowledgement = ack-nhfb, classcodes = "B6120B (Codes); C6130 (Data handling techniques)", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "Beale Cyphers codes; codes; computer applications; computer signature simulation; cryptanalysis; cyphers; Declaration of Independence; decoding; encoding; Magna Carta; numerical cryptographic codes; pseudotext; results analysis; signature; simulation; Thomas Jefferson Beale; treasure site identification", treatment = "A Application", } @Book{Smith:1971:CSS, author = "Laurence Dwight Smith", title = "Cryptography, the science of secret writing", publisher = pub-DOVER, address = pub-DOVER:adr, pages = "164", year = "1971", ISBN = "0-486-20247-X", ISBN-13 = "978-0-486-20247-1", LCCN = "Z 104 S65c 1971", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "``This Dover edition, first published in 1955, is an unabridged and corrected republication of the work originally published by W. W. Norton and Company in 1943.'' ``Copyright renewed 1971.'' Bibliography: p. 156.", acknowledgement = ack-nhfb, keywords = "ciphers; cryptography", } @TechReport{Smith:1971:DLC, author = "J. L. Smith", title = "The design of {Lucifer}, a cryptographic device for data communications", type = "Research Report", number = "RC-3326", institution = inst-IBM-WATSON, address = inst-IBM-WATSON:adr, year = "1971", bibdate = "Sat Jun 10 12:23:30 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Vincent:1971:PAG, author = "C. H. Vincent", title = "Precautions for accuracy in the generation of truly random binary numbers", journal = j-J-PHYS-E, volume = "4", number = "11", pages = "825--828", year = "1971", CODEN = "JPSIAE", DOI = "https://doi.org/10.1088/0022-3735/5/6/521", ISSN = "0022-3735", bibdate = "Sat Nov 29 15:13:35 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See corrigendum \cite{Vincent:1972:CPA}.", URL = "http://stacks.iop.org/0022-3735/4/i=11/a=007", acknowledgement = ack-nhfb, fjournal = "Journal of Physics. E: Scientific instruments", journal-URL = "http://iopscience.iop.org/0022-3735/", } @Article{Beardsley:1972:YCI, author = "C. W. Beardsley", title = "Is your computer insecure?", journal = j-IEEE-SPECTRUM, volume = "9", number = "1", pages = "67--78", month = jan, year = "1972", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1972.5218476", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Mon Jan 20 06:41:24 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Communication system control; Computer crime; Computer errors; Computerized monitoring; Condition monitoring; Cryptography; Disaster management; Hardware; Process control; Remote monitoring", } @Article{Girdansky:1972:CCD, author = "M. B. Girdansky", title = "Cryptology, the computer and data privacy", journal = "Computers and Automation", volume = "21", number = "??", pages = "12--19", month = apr, year = "1972", bibdate = "Sat Jun 10 11:43:49 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Meyer:1972:PCC, author = "C. H. Meyer and W. L. Tuchman", title = "Pseudorandom codes can be cracked", journal = j-ELECTRONIC-DESIGN, volume = "20", number = "23", pages = "74--76", day = "9", month = nov, year = "1972", CODEN = "ELODAW", ISSN = "0013-4872 (print), 1944-9550 (electronic)", ISSN-L = "0013-4872", bibdate = "Sat Jun 10 12:07:32 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", acknowledgement = ack-nhfb, fjournal = "Electronic Design", } @Article{Smith:1972:EAC, author = "J. L. Smith and W. A. Notz and P. R. Osseck", title = "An experimental application of cryptography to a remotely accessed data system", journal = "Proceedings of the ACM 1972 Annual Conference", volume = "??", number = "??", pages = "282--297", month = "????", year = "1972", bibdate = "Sat Jun 10 12:27:33 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Vincent:1972:CPA, author = "C. H. Vincent", title = "Corrigendum: {Precautions for accuracy in the generation of truly random binary numbers}", journal = j-J-PHYS-E, volume = "5", number = "6", pages = "546--546", year = "1972", CODEN = "JPSIAE", ISSN = "0022-3735", bibdate = "Sat Nov 29 15:13:30 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", note = "See \cite{Vincent:1971:PAG}.", URL = "http://stacks.iop.org/0022-3735/5/i=6/a=521", acknowledgement = ack-nhfb, fjournal = "Journal of Physics. E: Scientific instruments", journal-URL = "http://iopscience.iop.org/0022-3735/", } @Book{Wilkes:1972:TSC, author = "M. V. (Maurice Vincent) Wilkes", title = "Time-sharing computer systems", volume = "5", publisher = "Macdonald and Co.", address = "London, UK", edition = "Second", pages = "ix + 149", year = "1972", ISBN = "0-444-19583-1 (Elsevier)", ISBN-13 = "978-0-444-19583-8 (Elsevier)", LCCN = "QA76.5 .W523 1972", bibdate = "Sun Mar 11 09:46:15 MDT 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", series = "Computer monographs", acknowledgement = ack-nhfb, remark = "According to \cite{Koblitz:1987:CNT}, this book describes a one-way function invented by Roger Needham for password encryption, a precursor to public-key cryptography.", subject = "Time-sharing computer systems", } @Book{Bertrand:1973:EOP, author = "Gustave Bertrand", title = "{Enigma}; ou, La plus grande {\'e}nigme de la guerre 1939--1945", publisher = "Plon", address = "Paris, France", pages = "295 + 2 + 16", year = "1973", LCCN = "????", bibdate = "Sun Dec 01 09:15:14 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, language = "French", } @Article{Chesson:1973:CC, author = "F. W. (Frederick William) Chesson", title = "Computers and cryptology", journal = j-DATAMATION, volume = "??", number = "??", pages = "62--77", month = jan, year = "1973", CODEN = "DTMNAT", ISSN = "0011-6963", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Datamation", } @Article{Feistel:1973:CCP, author = "Horst Feistel", title = "Cryptography and Computer Privacy", journal = j-SCI-AMER, volume = "228", number = "5", pages = "15--23", month = may, year = "1973", CODEN = "SCAMAC", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "Database/Wiederhold.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sciam.bib", acknowledgement = ack-nhfb, annote = "Survey of cryptography for data bases.", fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", keywords = "code security; computer privacy; cryptography", referencedin = "Referenced in \cite[Ref. 14]{Biham:1998:TA}.", } @Book{Futrelle:1973:BTM, author = "Jacques Futrelle", title = "Best ``{Thinking Machine}'' detective stories", publisher = pub-DOVER, address = pub-DOVER:adr, pages = "ix + 241", year = "1973", ISBN = "0-486-20537-1", ISBN-13 = "978-0-486-20537-3", LCCN = "PS3511.U98 B4", bibdate = "Mon Nov 4 07:46:57 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, contents = "The problem of cell 13.--The crystal gazer.--The scarlet thread.--The flaming phantom.--The problem of the stolen Rubens.--The missing necklace.--The phantom motor.--The brown coat.--His perfect alibi.--The lost radium.--Kidnapped Baby Blake, millionaire.--The fatal cipher.", keywords = "detective and mystery stories", } @Article{Geffe:1973:HPD, author = "P. Geffe", title = "How to protect data with ciphers that are really hard to break", journal = j-ELECTRONICS, volume = "46", number = "1", pages = "99--101", year = "1973", ISSN = "0883-4989", bibdate = "Mon Nov 30 08:58:36 1998", bibsource = "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "This cipher was later broken by \cite{Siegenthaler:1985:DCS}.", acknowledgement = ack-nhfb, fjournal = "Electronics", } @Book{Higenbottam:1973:CC, author = "Frank Higenbottam", title = "Codes and ciphers", publisher = "English Universities Press", address = "London, UK", pages = "180 (est.)", year = "1973", ISBN = "0-340-12493-8", ISBN-13 = "978-0-340-12493-2", LCCN = "????", bibdate = "Sat Apr 20 12:10:26 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Knuth:1973:FA, author = "Donald E. Knuth", title = "Fundamental Algorithms", volume = "1", publisher = pub-AW, address = pub-AW:adr, edition = "Second", pages = "xxi + 634", year = "1973", ISBN = "0-201-03809-9", ISBN-13 = "978-0-201-03809-5", LCCN = "QA76.6 .K641 1973", bibdate = "Wed Dec 15 10:36:21 1993", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/master.bib", series = "The Art of Computer Programming", acknowledgement = ack-nhfb, tableofcontents = "1: Basic Concepts / 1 \\ 1.1. Algorithms / 1 \\ 1.2. Mathematical Preliminaries / 10 \\ 1.2.1. Mathematical Induction / 11 \\ 1.2.2. Numbers, Powers, and Logarithms / 21 \\ 1.2.3. Sums and Products / 26 \\ 1.2.4. Integer Functions and Elementary Number Theory / 37 \\ 1.2.5. Permutations and Factorials / 44 \\ 1.2.6. Binomial Coefficients / 51 \\ 1.2.7. Harmonic Numbers / 73 \\ 1.2.8. Fibonacci Numbers / 78 \\ 1.2.9. Generating Functions / 86 \\ 1.2.10. Analysis of an Algorithm / 94 \\ *1.2.11. Asymptotic Representations / 104 \\ *1.2.11.1. The O-notation / 104 \\ *1.2.11.2. Euler's summation formula / 108 \\ *1.2.11.3. Some asymptotic calculations / 112 \\ 1.3. MIX / 120 \\ 1.3.1. Description of MIX / 120 \\ 1.3.2. The MIX Assembly Language / 141 \\ 1.3.3. Applications to Permutations / 160 \\ 1.4. Some Fundamental Programming Techniques / 182 \\ 1.4.1. Subroutines / 182 \\ 1.4.2. Coroutines / 190 \\ 1.4.3. Interpretive Routines / 197 \\ 1.4.3.1. A MIX simulator / 198 \\ 1.4.3.2. Trace routines / 208 \\ 1.4.4. Input and Output / 211 \\ 1.4.5. History and Bibliography / 225 \\ 2: Information Structures / 228 \\ 2.1. Introduction / 228 \\ 2.2 Linear Lists / 234 \\ 2.2.1. Stacks, Queues, and Deques / 234 \\ 2.2.2. Sequential Allocation / 240 \\ 2.2.3. Linked Allocation / 251 \\ 2.2.4. Circular Lists / 270 \\ 2.2.5. Doubly Linked Lists / 278 \\ 2.2.6. Arrays and Orthogonal Lists / 295 \\ 2.3. Trees / 305 \\ 2.3.1. Traversing Binary Trees / 315 \\ 2.3.2. Binary Tree Representation of Trees / 332 \\ 2.3.3. Other Representations of Trees / 347 \\ 2.3.4. Basic Mathematical Properties of Trees / 362 \\ 2.3.4.1. Free trees / 362 \\ *2.3.4.2. Oriented trees / 371 \\ *2.3.4.3. The ``infinity lemma'' / 381 \\ *2.3.4.4. Enumeration of trees / 385 \\ 2.3.4.5. Path length / 399 \\ *2.3.4.6. History and bibliography / 405 \\ 2.3.5. Lists and Garbage Collection / 406 \\ 2.4. Multilinked Structures / 423 \\ 2.5. Dynamic Storage Allocation / 435 \\ 2.6. History and Bibliography / 456 \\ Answers to Exercises / 465 \\ Appendix A: Index to Notations / 607 \\ Appendix B: Tables of Numerical Quantities \\ 1. Fundamental Constants (decimal) / 613 \\ 2. Fundamental Constants (octal) / 614 \\ 3. Harmonic Numbers, Bernoulli Numbers, Fibonacci Numbers / 615 \\ Index and Glossary / 617", } @Article{Lampson:1973:NCP, author = "Butler W. Lampson", title = "A Note on the Confinement Problem", journal = j-CACM, volume = "16", number = "10", pages = "613--615", month = oct, year = "1973", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Mar 25 13:26:09 MST 1997", bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1014.html", abstract = "This note explores the problem of confining a program during its execution so that it cannot transmit information to any other program except its caller. A set of examples attempts to stake out the boundaries of the problem. Necessary conditions for a solution are stated and informally justified.", acknowledgement = ack-nhfb, annote = "Prevention of privacy leaks between programs.", classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", classification = "723", corpsource = "Xerox Palo Alto Res. Center, CA, USA", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", journalabr = "Commun ACM", keywords = "computer systems programming; confinement; information hiding; leakage of data; operating systems (computers); privacy; proprietary program; protection; security; security of data; steganography", treatment = "P Practical", } @Article{Meyer:1973:DCC, author = "C. H. Meyer", title = "Design considerations for cryptography", journal = "AFIPS Conference Proceedings", volume = "42", number = "??", pages = "603--606", month = "????", year = "1973", bibdate = "Sat Jun 10 12:06:00 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Norman:1973:SWB, author = "Bruce Norman", title = "Secret warfare: the battle of codes and ciphers", publisher = "David and Charles", address = "Newton Abbot, UK", pages = "187", year = "1973", ISBN = "0-7153-6223-2", ISBN-13 = "978-0-7153-6223-5", LCCN = "Z103 .N67", bibdate = "Sat Apr 20 12:02:52 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Saltzer:1973:PCI, author = "Jerome H. Saltzer", title = "Protection and control of information sharing in {Multics}", journal = j-OPER-SYS-REV, volume = "7", number = "4", pages = "119--119", month = oct, year = "1973", CODEN = "OSRED8", DOI = "https://doi.org/10.1145/957195.808059", ISSN = "0163-5980 (print), 1943-586X (electronic)", ISSN-L = "0163-5980", bibdate = "Thu Feb 23 08:03:02 MST 2017", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/opersysrev.bib", abstract = "This paper describes the design of mechanisms to control sharing of information in the Multics system. Seven design principles help provide insight into the tradeoffs among different possible designs. The key mechanisms described include access control lists, hierarchical control of access specifications, identification and authentication of users, and primary memory protection. The paper ends with a discussion of several known weaknesses in the current protection mechanism design.", acknowledgement = ack-nhfb, fjournal = "ACM SIGOPS Operating Systems Review", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J597", } @Article{Bartek:1974:EDS, author = "Douglas J. Bartek", title = "Encryption for data security", journal = j-HONEYWELL-COMP-J, volume = "8", number = "2", pages = "86--89", month = "????", year = "1974", CODEN = "HNCJA3", ISSN = "0046-7847", bibdate = "Sat Jun 10 11:10:59 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Honeywell Computer Journal", } @Article{Borucki:1974:MNN, author = "L. J. Borucki and J. B. Diaz", title = "Mathematical Notes: a Note on Primes, with Arbitrary Initial or Terminal Decimal Ciphers, in {Dirichlet} Arithmetic Progressions", journal = j-AMER-MATH-MONTHLY, volume = "81", number = "9", pages = "1001--1002", month = nov, year = "1974", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", bibdate = "Mon Jun 28 12:37:41 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @Article{Evans:1974:UAS, author = "Arthur {Evans, Jr.} and William Kantrowitz and Edwin Weiss", title = "A User Authentication Scheme Not Requiring Secrecy in the Computer", journal = j-CACM, volume = "17", number = "8", pages = "437--442", month = aug, year = "1974", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Jan 22 06:38:18 MST 2001", bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; http://dblp.uni-trier.de/db/journals/cacm/cacm17.html#EvansKW74; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "In many computer operating systems a user authenticates himself by entering a secret password known solely to himself and the system. The system compares this password with one recorded in a Password Table which is available to only the authentication program. The integrity of the system depends on keeping the table secret. In this paper a password scheme is presented which does not require secrecy in the computer. All aspects of the system, including all relevant code and data bases, may be known by anyone attempting to intrude. The scheme is based on using a function H which the would-be intruder is unable to invert. This function is applied to the user's password and the result compared to a table entry, a match being interpreted as authentication of the user. The intruder may know all about H and have access to the table, but he can penetrate the system only if he can invert H to determine an input that produces a given output. This paper discusses issues surrounding selection of a suitable H.", acknowledgement = ack-nhfb, annote = "Password protection by irreversible transformation", classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", classification = "722; 723", corpsource = "MIT, Lexington, MA, USA", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", journalabr = "Commun ACM", keywords = "authentication; computer operating systems; cryptology; engineering problems; human; invert; one way encryption; operating system security; operating systems (computers); password scheme; security; security of data; user authentication scheme", oldlabel = "EvansKW74", treatment = "A Application; T Theoretical or Mathematical", XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/EvansKW74", } @Misc{Feistel:1974:BCC, author = "Horst Feistel", title = "Block cipher cryptographic system", howpublished = "{U.S.} Patent No. 3,798,359.", day = "19", month = mar, year = "1974", bibdate = "Sat Jun 10 11:35:48 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Friedman:1974:ETR, author = "Theodore D. Friedman and Lance J. Hoffman", title = "Execution Time Requirements for Encipherment Programs", journal = j-CACM, volume = "17", number = "8", pages = "445--449", month = aug, year = "1974", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Mar 25 13:26:09 MST 1997", bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; https://www.math.utah.edu/pub/tex/bib/cacm1970.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See letter \cite{McCarthy:1975:AFP}.", abstract = "The time taken to decipher 20,000 words of data by four additive methods on a Control Data 6400 computer was measured using assembly language and Fortran routines. Standard deviations were computed for 100 runs by each method, and from this the range of error at the 95 percent confidence level was calculated. The time required for selecting and fetching the plaintext data and for storing the ciphertext was separately measured (the ``null transformation''), and was then compared with the times required by each enciphering method. The enciphering processes required at least four times as much cpu time when programmed in Fortran.", acknowledgement = ack-nhfb, classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", classification = "723", corpsource = "Univ. California, Berkeley, CA, USA", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", journalabr = "Commun ACM", keywords = "additive ciphers; assembly language; cpu; cryptography; cryptology; data processing; double key encipherment; enciphering time coefficient; encipherment programs; errors; execution time; experiments; Fortran; null; one word key; operating systems (computers); privacy transformations; protection; pseudo random key; security; security of data; time; transformation", treatment = "A Application; T Theoretical or Mathematical; X Experimental", } @Article{Gelb:1974:RWD, author = "I. J. Gelb", title = "Records, Writing, and Decipherment", journal = j-VISIBLE-LANGUAGE, volume = "VIII", number = "4", pages = "293--318", month = "Autumn", year = "1974", CODEN = "VSLGAO", ISSN = "0022-2224 (print), 2691-5529 (electronic)", ISSN-L = "0022-2224", bibdate = "Tue Feb 9 08:33:00 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/visible-language.bib", URL = "https://s3-us-west-2.amazonaws.com/visiblelanguage/pdf/V8N4_1974_E.pdf", abstract = "Written records together with material remains derived from excavations form the main bases for our understanding of past civilizations and their underlying language systems. There is no systematic treatment of written records, and little attention has been paid to the interrelationship between ancient writing and language. Full systems of writing express language at two levels --- morphological and phonetic --- which give rise to three basic writing systems types --- logo-syllabic, syllabic, and alphabetic. Four categories of decipherment --- based on our relative knowledge of the writing system and the language --- are discussed: known writing/known language; unknown writing/known language; known writing/unknown language; and unknown writing/unknown language. From a cryptanalytic point of view there are two general decipherment methods: (1) utilization of external information to determine probable contents (e.g., bilingual texts,) and (2) internal information from an analysis of the text itself (structure and typology). The assumption of the underlying language is critical for deciphering procedures and provides the test of successful decipherment.", acknowledgement = ack-nhfb, ajournal = "Visible Lang.", fjournal = "Visible Language", journal-URL = "https://journals.uc.edu/index.php/vl", old-journal-url = "http://visiblelanguage.herokuapp.com/", } @TechReport{Grossman:1974:GTR, author = "E. Grossman", title = "Group theoretic remarks on cryptographic systems based on two types of addition", type = "Research Report", number = "RC-4742", institution = inst-IBM-WATSON, address = inst-IBM-WATSON:adr, day = "26", month = feb, year = "1974", bibdate = "Sat Jun 10 11:46:57 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Haugen:1974:RSS, author = "Einar Haugen", title = "The Rune Stones of {Spirit Pond, Maine}", journal = j-VISIBLE-LANGUAGE, volume = "VIII", number = "1", pages = "33--64", month = "Winter", year = "1974", CODEN = "VSLGAO", ISSN = "0022-2224 (print), 2691-5529 (electronic)", ISSN-L = "0022-2224", bibdate = "Tue Feb 9 08:33:00 MST 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/visible-language.bib", URL = "https://s3-us-west-2.amazonaws.com/visiblelanguage/pdf/V8N1_1974_E.pdf", abstract = "The author reports on his official investigation of the inscription on three rune stones discovered in 1971 by Walter J. Elliott near Spirit Pond, Maine (USA). In determining the authenticity of the stones as Viking Age artifacts, three steps were involved: (1) transcription of the runes, (2) transliteration into the Latin alphabet, and (3) interpretation of the meaning of the inscriptions. The relationship of runes (as alphabetic symbols) to the history of Scandinavian languages is outlined; special problems of these inscriptions are discussed: (1) the runes are not those used in the eleventh or later centuries, (2) spelling and the use of ``runic'' numerals are inconsistent with runic and scribal practice, (3) the grammatical form is unrecognizable as Old Norse, (4) peculiarities relate directly to the Kensington Stone inscription in Minnesota. Conclusion: the inscriptions could not have been carved by Scandinavian Vikings in the Middle Ages, and probably date since 1932.", acknowledgement = ack-nhfb, ajournal = "Visible Lang.", fjournal = "Visible Language", old-journal-URL = "http://visiblelanguage.herokuapp.com/", journal-URL = "https://journals.uc.edu/index.php/vl", } @Book{Kahn:1974:C, author = "David Kahn", title = "The Codebreakers", publisher = "Weidenfeld and Nicolson", address = "London, UK", edition = "Abridged", pages = "xvi + 576", year = "1974", ISBN = "0-02-560460-0, 0-297-76785-2", ISBN-13 = "978-0-02-560460-5, 978-0-297-76785-5", LCCN = "Z103 .K28 1974", bibdate = "Thu Jul 23 17:02:35 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/master.bib", abstract = "The first comprehensive history of secret communication from ancient times to the threshold of outer space.", acknowledgement = ack-nhfb, subject = "Cryptography; History; Ciphers; Cryptographie; Histoire; Ciphers; Cryptography; Codierung; Geheimschrift; Geschichte; Informationstheorie; Kryptologie; Cryptographers; Informationstheorie; Geheimschrift; Geschichte; Codierung; Kryptologie", tableofcontents = "A few words \\ One day of MAGIC \\ The pageant of cryptology \\ The first 3,000 years \\ The rise of the West \\ On the origin of a species \\ The era of the black chambers \\ The contribution of the dilettantes \\ Crises of the Union \\ The professor, the soldier, and the man on Devil's Island \\ Room 40 \\ A war of intercepts \\ Two Americans \\ Secrecy for sale \\ Duel in the ether: the Axis \\ Duel in the ether: neutrals and Allies \\ Censors, scramblers, and spies \\ The scrutable orientals \\ PYCCKAR KPNNTONOTNR \\ N.S.A. \\ Sideshows \\ The anatomy of cryptology \\ Heterogeneous impulses \\ Rumrunners, businessmen, and makers of non-secret codes \\ Ciphers in the past tense \\ The pathology of cryptology \\ Paracryptology \\ Ancestral voices \\ Messages from outer space", } @Book{Nanovic:1974:SWI, author = "Nanovic, John L. (John Leonard)", title = "Secret writing: an introduction to cryptograms, ciphers, and codes", publisher = pub-DOVER, address = pub-DOVER:adr, pages = "x + 117", year = "1974", ISBN = "0-486-23062-7", ISBN-13 = "978-0-486-23062-7", LCCN = "Z104.N35 1974", bibdate = "Wed Nov 25 14:23:25 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprint of the 1936 edition \cite{Nanovic:1936:SWI}.", acknowledgement = ack-nhfb, keywords = "ciphers; cryptograms; cryptography", } @Article{Pollard:1974:TFP, author = "J. Pollard", title = "Theorems on factorization and primality testing", journal = j-PROC-CAMBRIDGE-PHIL-SOC, volume = "76", pages = "521--528", year = "1974", CODEN = "PCPSA4", ISSN = "0008-1981", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Proceedings of the Cambridge Philosophical Society. Mathematical and physical sciences", referencedin = "Referenced in \cite[Ref. 18]{Kaliski:1995:SUR}.", } @Article{Purdy:1974:HSL, author = "George B. Purdy", title = "A High Security Log-in Procedure", journal = j-CACM, volume = "17", number = "8", pages = "442--445", month = aug, year = "1974", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/361082.361089", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Mar 25 13:26:09 MST 1997", bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; https://www.math.utah.edu/pub/tex/bib/cacm1970.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://dl.acm.org/doi/10.1145/361082.361089", abstract = "The protection of time sharing systems from unauthorized users is often achieved by the use of passwords. By using one-way ciphers to code the passwords, the risks involved with storing the passwords in the computer can be avoided. The selection of a suitable one-way cipher is discussed. It is suggested that for this purpose polynomials over a prime modulus are superior to one-way ciphers derived from Shannon codes.", acknowledgement = ack-nhfb, annote = "Password protection by irreversible cryptographic transformation", classcodes = "C6130 (Data handling techniques); C6150J (Operating systems)", classification = "722; 723", corpsource = "Univ. Illinois, Urbana-Champaign, IL, USA", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", journalabr = "Commun ACM", keywords = "code; computer operating systems; cryptography; data processing --- Security of Data; one way ciphers; operating systems; operating systems (computers); passwords; security; security of data; time sharing systems", treatment = "A Application; T Theoretical or Mathematical", } @Manual{Richards:1974:SWP, author = "Sheila R. Richards", title = "Secret writing in the public records: {Henry VIII--George II}", publisher = "H.M.S.O.", address = "London", pages = "x + 173 + 4 plates", year = "1974", ISBN = "0-11-440054-7", ISBN-13 = "978-0-11-440054-5", LCCN = "DA310 .G681 1974", bibdate = "Wed Nov 25 14:23:25 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Contains one hundred documents, all but one of which are written wholly or partially in cipher and are now deciphered and printed in full for the first time. Includes letters in French or Italian, with a summary in English.", price = "UK\pounds4.50", acknowledgement = ack-nhfb, keywords = "Great Britain --- history --- 18th Century --- sources; Great Britain --- history --- stuarts, 1603--1714 --- sources; Great Britain --- history --- Tudors, 1485--1603 --- sources", } @TechReport{Rivest:1974:AAR, author = "Ronald L. Rivest", title = "Analysis of Associative Retrieval Algorithms", type = "Technical Report", number = "TR.54", institution = "Institut de la Recherche en Informatique et Automatique, now Institut National de Recherche en Informatique et Automatique (INRIA)", address = "Domaine de Voluceau --- Rocquencourt --- B.P. 105, 78153 Le Chesnay Cedex, France", pages = "??", month = feb, year = "1974", bibdate = "Thu Jul 21 09:32:07 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", note = "Also published in/as: Stanford CSD report 74-415. Also published in/as: SIAM Journal for Computing, Springer-Verlag (Heidelberg, FRG and New York NY, USA)-Verlag, 1976, with mod. title.", acknowledgement = ack-nhfb, annote = "Combinatorial hashing for retrieval.", } @InProceedings{Rivest:1974:HCA, author = "R. L. Rivest", title = "On hash-coding algorithms for partial-match retrieval", crossref = "IEEE:1974:ASS", pages = "95--103", year = "1974", bibdate = "Mon Jul 18 10:06:22 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", acknowledgement = ack-nhfb, } @Misc{Smith:1974:RBC, author = "J. L. Smith", title = "Recirculating block cipher cryptographic system", howpublished = "{U.S.} Patent No. 3,796,830", day = "12", month = mar, year = "1974", bibdate = "Sat Jun 10 12:25:23 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Misc{Thomas:1974:RPS, author = "R. Thomas", title = "{RFC 644}: On the problem of signature authentication for network mail", day = "22", month = jul, year = "1974", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Status: UNKNOWN. Not online.", URL = "ftp://ftp.internic.net/rfc/rfc644.txt; ftp://ftp.math.utah.edu/pub/rfc/rfc644.txt", acknowledgement = ack-nhfb, online = "no", status = "UNKNOWN", } @Book{Winterbotham:1974:US, author = "F. W. (Frederick William) Winterbotham", title = "The {Ultra} secret", publisher = "Weidenfeld and Nicolson", address = "London, UK", pages = "xiii + 199", year = "1974", ISBN = "0-297-76832-8", ISBN-13 = "978-0-297-76832-6", LCCN = "D810.C88 W56", bibdate = "Fri May 13 08:14:55 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; melvyl.cdlib.org:210/CDL90", acknowledgement = ack-nhfb, subject = "Winterbotham, F. W; (Frederick William); World War, 1939--1945; Cryptography; Secret service; Great Britain; Personal narratives, British; Enigma cipher system", subject-dates = "1897--1990", } @Book{Winterbotham:1974:USF, author = "F. W. (Frederick William) Winterbotham", title = "The {Ultra} secret: the first account of the most astounding cryptanalysis coup of {World War II} --- how the {British} broke the {German} code and read most of the signals between {Hitler} and his generals throughout the war", publisher = pub-HARPER-ROW, address = pub-HARPER-ROW:adr, pages = "xiii + 199", year = "1974", ISBN = "0-06-014678-8", ISBN-13 = "978-0-06-014678-8", LCCN = "D810.C95 W73 1974", bibdate = "Fri May 13 06:39:10 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; melvyl.cdlib.org:210/CDL90", acknowledgement = ack-nhfb, author-dates = "1897--1990", subject = "Winterbotham, F. W; (Frederick William); World War, 1939-1945; Cryptography; Secret service; Great Britain; Personal narratives, English", } @Book{Barker:1975:CSS, author = "Wayne G. Barker", title = "Cryptanalysis of the simple substitution cipher with word divisions using non-pattern word lists", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "20 + 108", year = "1975", ISBN = "????", ISBN-13 = "????", LCCN = "Z103 .B3", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, annote = "Bound in gray paper wrappers; printed in black and gray. The George C. Lamb Collection.", keywords = "ciphers; Ciphers; Cryptography; cryptography", } @InProceedings{Bayer:1975:EST, author = "Rudolf Bayer and J. K. Metzger", title = "On the Encipherment of Search Trees and Random Access Files", crossref = "Kerr:1975:PIC", pages = "452--452", year = "1975", bibdate = "Fri Jan 12 07:50:25 MST 2001", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; http://www.vldb.org/dblp/db/conf/vldb/vldb75.html", URL = "http://www.vldb.org/dblp/db/conf/vldb/BayerM75.html", acknowledgement = ack-nhfb, authorurl = "http://www.vldb.org/dblp/db/indices/a-tree/b/Bayer:Rudolf.html; http://www.vldb.org/dblp/db/indices/a-tree/m/Metzger:J=_K=.html", } @MastersThesis{Blatman:1975:MMC, author = "Peter Blatman", title = "Method of modern cryptanalysis: research project", type = "Thesis ({M.S. in Electrical Engineering})", school = "Department of Electrical Engineering and Computer Sciences, University of California, Berkeley", address = "Berkeley, CA, USA", pages = "various", month = jun, year = "1975", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "computer sciences --- dissertations; dissertations, academic --- UCB --- Electrical Engineering --- 1971--1980; University of California, Berkeley. Dept. of Electrical Engineering and Computer Sciences", } @TechReport{Branstad:1975:DGI, author = "D. K. Branstad", title = "Draft guidelines for implementing and using the {NBS Data Encryption Standard}", type = "Report", number = "??", institution = pub-NBS, address = pub-NBS:adr, day = "10", month = nov, year = "1975", bibdate = "Sat Jun 10 11:12:28 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @InProceedings{Branstad:1975:EPC, author = "D. K. Branstad", editor = "????", booktitle = "{Fourth Data Communications Symposium, 7--9 October 1975, Quebec City, Canada}", title = "Encryption protection in computer data communications,", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "??--??", year = "1975", bibdate = "Sat Jun 10 11:14:36 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Brillhart:1975:NPC, author = "John Brillhart and D. H. Lehmer and J. L. Selfridge", title = "New primality criteria and factorizations of $ 2^m \pm 1 $", journal = j-MATH-COMPUT, volume = "29", number = "130", pages = "620--647", month = apr, year = "1975", CODEN = "MCMPAF", ISSN = "0025-5718 (print), 1088-6842 (electronic)", ISSN-L = "0025-5718", bibdate = "Tue Oct 13 08:06:19 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, classcodes = "B0210 (Algebra); C1110 (Algebra)", corpsource = "Dept. Math., Univ. Arizona, Tucson, AZ, USA", fjournal = "Mathematics of Computation", journal-URL = "http://www.ams.org/mcom/", keywords = "divisibility properties; factorizations; Fermat's theorem; hyperbola; Lucas sequences; Mersenne numbers; number theory; primality criteria; search bound", referencedin = "Referenced in \cite[Ref. 2]{Silverman:1997:FGR}.", treatment = "T Theoretical or Mathematical", } @Book{Brown:1975:BL, author = "Anthony Cave Brown", title = "Bodyguard of lies", publisher = pub-HARPER-ROW, address = pub-HARPER-ROW:adr, pages = "x + 947 + 8", year = "1975", ISBN = "0-06-010551-8", ISBN-13 = "978-0-06-010551-8", LCCN = "D810.S7 C36 1975", bibdate = "Mon Aug 25 16:20:50 MDT 2014", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "Examines Allied intelligence and counter-intelligence operations during World War II, describing the cipher machine used to break German codes and the tactics, ruses, and deception employed to ensure the successful invasion of Normandy.", acknowledgement = ack-nhfb, subject = "World War, 1939--1945; Secret service; Secret service.", tableofcontents = "Part 1. The origins of special means 1938--1942. Ultra \\ Coventry \\ Special means operational \\ Part 2. The roots of conspiracy 1934--1943 \\ Canaris \\ The schwarze Kapelle \\ Friend or foe \\ The plot begins \\ The outbreak of war \\ Conspiracy at the Vatican \\ The Venlo incident \\ ``Adroit intrigue'' \\ Canaris at work \\ The assassination of Heydrich \\ Operation flash \\ Part 3. High strategy and low tactics 1943 \\ Casablanca \\ The battle of the Atlantic \\ The LCS and plan Jael \\ Mincemeat \\ Quebec \\ The Schwarze Kappelle, 1943 \\ Starkey \\ Prosper \\ The intelligence attack \\ Teheran \\ Cicero \\ Part 4. Cover and deception \\ January to June 1944. Eisenhower, supreme commander \\ The German supreme command \\ Bodyguard \\ The Balkans \\ Fortitude north \\ Fortitude south \\ Nuremberg \\ Aerial stratagems \\ Security \\ The wireless game \\ The French labyrinth \\ Canaris's last throw \\ Vendetta \\ The eve of D-day \\ Part 5. Normandy to nemesis \\ June 6 to August 20, 1944. D-day \\ The deceptions of D-day \\ Sword and stratagem \\ The French revolt \\ Rommel \\ The V1 \\ Goodwood \\ July 20, 1944 \\ The breakout \\ Gotterdammerung", } @Article{Coppersmith:1975:GCA, author = "Don Coppersmith and Edna Grossman", title = "Generators for Certain Alternating Groups with Applications to Cryptography", journal = j-SIAM-J-APPL-MATH, volume = "29", number = "4", pages = "624--627", month = dec, year = "1975", CODEN = "SMJMAP", ISSN = "0036-1399 (print), 1095-712X (electronic)", ISSN-L = "0036-1399", bibdate = "Thu Oct 15 18:16:06 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/siamjapplmath.bib; JSTOR database", acknowledgement = ack-nhfb, classification = "B0210 (Algebra); C1110 (Algebra); C6130 (Data handling techniques)", corpsource = "Dept. of Math. Sci., IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", fjournal = "SIAM Journal on Applied Mathematics", journal-URL = "http://epubs.siam.org/siap", keywords = "alternating groups; block ciphers; computer encipherment of data; cryptography; data handling; group theory; permutations; security; security of data; subgroups", treatment = "A Application; T Theoretical or Mathematical", } @TechReport{Diffie:1975:PRN, author = "Whitfield Diffie", title = "Preliminary remarks on the {National Bureau of Standards} proposed standard encryption algorithm for computer data protection", type = "Unpublished report", institution = "Stanford University", address = "Stanford, CA, USA", month = may, year = "1975", bibdate = "Sat Jun 10 11:20:54 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Misc{Ellis:1975:PKC, author = "James Ellis and Clifford Cocks and Malcolm Williamson", title = "Public-key Cryptography", howpublished = "Classified reports (titles uncertain) at Government Communications Headquarters (GCHQ), Cheltenham, UK.", year = "1975", bibdate = "Wed Apr 25 10:41:58 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Work declassified in 1997. Awarded the 100th IEEE Milestone Award for the first discovery (albeit long secret) of public-key cryptography.", URL = "http://www.gchq.gov.uk/Press/Pages/100th-IEEE-milestone-award.aspx", acknowledgement = ack-nhfb, } @Article{Feistel:1975:SCT, author = "H. Feistel and W. A. Notz and J. L. Smith", title = "Some cryptographic techniques for machine-to-machine data communications", journal = j-PROC-IEEE, volume = "63", number = "??", pages = "1545--1534", year = "1975", CODEN = "IEEPAD", DOI = "https://doi.org/10.1109/PROC.1975.10005", ISSN = "0018-9219 (print), 1558-2256 (electronic)", ISSN-L = "0018-9219", bibdate = "Sat Jun 10 11:37:11 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://ieeexplore.ieee.org/document/1451934", abstract = "Some of the threats to the integrity of multiuser teleprocessing systems and to the data they contain can be countered by the use of cryptography. Stream-generator ciphers are not ideally suited for such an application, thus the use of block ciphers, which have the beneficial property of a strong nonlinear intersymbol dependence, is suggested. This property provides the means for automatic error detection for verifying the authenticity of terminal operators, and for ensuring message integrity. An experimental demonstration system has been constructed to illustrate protection features that can be provided for real applications.", acknowledgement = ack-nhfb, fjournal = "Proceedings of the IEEE", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5", } @Book{Hardy:1975:ITN, author = "Godfrey H. Hardy and Edward M. Wright", title = "An Introduction to the Theory of Numbers", publisher = pub-CLARENDON, address = pub-CLARENDON:adr, edition = "Fourth", pages = "421", year = "1975", ISBN = "0-19-853310-7 (invalid checksum??)", ISBN-13 = "978-0-19-853310-8", LCCN = "????", bibdate = "Fri Jun 24 12:32:14 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Jones:1975:ESP, author = "Anita K. Jones and Richard J. Lipton", title = "The enforcement of security policies for computation", journal = j-OPER-SYS-REV, volume = "9", number = "5", pages = "197--206", month = nov, year = "1975", CODEN = "OSRED8", ISSN = "0163-5980", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:57 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Article{McCarthy:1975:AFP, author = "John McCarthy", title = "{ACM Forum}: {Proposed} Criterion for a Cipher to be Probable-Word-Proof", journal = j-CACM, volume = "18", number = "2", pages = "131--132", month = feb, year = "1975", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Jul 26 10:24:13 2001", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See \cite{Friedman:1974:ETR}.", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{NBS:1975:EAC, author = "{NBS}", title = "Encryption algorithm for computer data protection: requests for comments", journal = j-FED-REGIST, volume = "40", number = "??", pages = "12134--??", day = "17", month = mar, year = "1975", CODEN = "FEREAC", ISSN = "0097-6326", ISSN-L = "0097-6326", bibdate = "Sat Jun 10 12:09:27 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, ajournal = "Fed. regist. (Vienna, VA)", fjournal = "Federal Register", journal-URL = "https://www.archives.gov/federal-register", xxISSN = "1097-7651", } @Article{NBS:1975:NPF, author = "{NBS}", title = "Notice of a Proposed Federal Information Processing {Data Encryption Standard}", journal = j-FED-REGIST, volume = "40", number = "??", pages = "12607--??", day = "12", month = aug, year = "1975", CODEN = "FEREAC", ISSN = "0097-6326", ISSN-L = "0097-6326", bibdate = "Sat Jun 10 12:18:37 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Federal Register", journal-URL = "https://www.archives.gov/federal-register", } @PhdThesis{Neat:1975:NCC, author = "Charlie Edmund Neat", title = "A new computer cryptography: the Expanded Character Set {(ECS)} cipher", school = "Engineering, University of California, Los Angeles", address = "Los Angeles, CA, USA", pages = "xxi + 203", year = "1975", LCCN = "????", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "ciphers; computers --- access control; dissertations, academic --- UCLA --- engineering; electronic data processing --- security measures", } @TechReport{Pless:1975:ESC, author = "Vera Pless", title = "Encryption schemes for computer confidentially [sic]", type = "MAC technical memorandum", number = "63", institution = "Massachusetts Institute of Technology, Project MAC", address = "Cambridge, MA, USA", pages = "19", year = "1975", LCCN = "QA76.9.A25 P55", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Research done under ARPA Order no.2095, ONR Contract no. N00014-70-A-0362-0006 and IBM Contract 82280.", acknowledgement = ack-nhfb, annote = "Research supported by the Advanced Research Projects Agency under ARPA Order No. 2095 monitored by ONR Contract No. N00014-70-A-0362-0006, and in part by IBM Contract 82280. 18-19.", keywords = "Computers; electronic data processing departments; security measures", } @Book{Rohwer:1975:GIM, author = "Jurgen Rohwer", title = "{Geleitzugschlachten im Marz 1943: F{\"u}hrungsprobleme im H{\"o}hepunkt der Schlacht im Atlantik}. ({German}) [{Convoy} in {March 1943}: implementation problems in the climax of the {Battle of the Atlantic}]", publisher = "Motorbuch", address = "Stuttgart, Germany", pages = "356", year = "1975", ISBN = "3-87943-383-6", ISBN-13 = "978-3-87943-383-4", LCCN = "????", bibdate = "Tue Aug 26 07:20:00 MDT 2014", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See also English translation \cite{Rohwer:1977:CCB}.", acknowledgement = ack-nhfb, language = "German", } @Article{Schroeder:1975:ESK, author = "Michael D. Schroeder", title = "Engineering a security kernel for {Multics}", journal = j-OPER-SYS-REV, volume = "9", number = "5", pages = "25--32", month = nov, year = "1975", CODEN = "OSRED8", ISSN = "0163-5980", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:57 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Book{Wilkes:1975:TSC, author = "M. V. (Maurice Vincent) Wilkes", title = "Time-sharing computer systems", publisher = "Macdonald and Jane's", address = "London, UK", edition = "Third", pages = "ii + 166", year = "1975", ISBN = "0-444-19525-4 (American Elsevier)", ISBN-13 = "978-0-444-19525-8 (American Elsevier)", LCCN = "QA76.53 .W54 1975", bibdate = "Sun Mar 11 09:46:15 MDT 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", series = "Computer monographs", acknowledgement = ack-nhfb, remark = "According to \cite{Koblitz:1987:CNT}, this book describes a one-way function invented by Roger Needham for password encryption, a precursor to public-key cryptography. Fragment on page 148 seems to be the location.", subject = "Time-sharing computer systems", } @Book{Winterbotham:1975:US, author = "F. W. (Frederick William) Winterbotham", title = "The {Ultra} secret", publisher = "Dell", address = "New York, NY, USA", pages = "286", year = "1975", ISBN = "????", ISBN-13 = "????", LCCN = "D810.C88 W56 1976", bibdate = "Fri May 13 08:14:55 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; melvyl.cdlib.org:210/CDL90", acknowledgement = ack-nhfb, author-dates = "1897--1990", } @MastersThesis{Worth:1975:CMA, author = "Vivian I. Worth", title = "Cryptology: mathematical applications", type = "Thesis ({M.S.})", school = "Central Missouri State University", address = "Warrensburg, MO, USA", pages = "iv + 63", year = "1975", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @Book{Anonymous:1976:CCA, author = "Anonymous", title = "Cryptography and cryptanalysis articles", volume = "5", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "v + 144", year = "1976", ISBN = "0-89412-003-4", ISBN-13 = "978-0-89412-003-9", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, keywords = "Ciphers; Cryptography", } @Article{Bayer:1976:EST, author = "R. Bayer and J. K. Metzger", title = "On the Encipherment of Search Trees and Random Access Files", journal = j-TODS, volume = "1", number = "1", pages = "37--52", month = mar, year = "1976", CODEN = "ATDSD3", ISSN = "0362-5915 (print), 1557-4644 (electronic)", ISSN-L = "0362-5915", bibdate = "Sat Apr 14 10:34:48 MDT 2001", bibsource = "Database/Wiederhold.bib; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Also published in \cite[p.~508--510]{Kerr:1975:PIC}.", URL = "http://www.acm.org/pubs/articles/journals/tods/1976-1-1/p37-bayer/p37-bayer.pdf; http://www.acm.org/pubs/citations/journals/tods/1976-1-1/p37-bayer/", abstract = "The securing of information in indexed, random access files by means of privacy transformations must be considered as a problem distinct from that for sequential files. Not only must processing overhead due to encrypting be considered, but also threats to encipherment arising from updating and the file structure itself must be countered. A general encipherment scheme is proposed for files maintained in a paged structure in secondary storage. This is applied to the encipherment of indexes organized as $B$-trees; a $B$-tree is a particular type of multiway search tree. Threats to the encipherment of $B$-trees, especially relating to updating, are examined, and countermeasures are proposed for each. In addition, the effect of encipherment on file access and update, on paging mechanisms, and on files related to the enciphered index are discussed. Many of the concepts presented may be readily transferred to other forms of multiway index trees and to binary search trees.", acknowledgement = ack-nhfb, annote = "Trees versus hashing as his 1974 IFIP paper?", fjournal = "ACM Transactions on Database Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J777", keywords = "", subject = "Software --- Operating Systems --- Security and Protection (D.4.6): {\bf Access controls}; Software --- Operating Systems --- Security and Protection (D.4.6): {\bf Cryptographic controls}", } @Article{Bright:1976:CUM, author = "H. S. Bright and R. L. Enison", editor = "????", title = "Cryptography using modular software elements", journal = "AFIPS Conference Proceedings", volume = "45", number = "??", pages = "113--123", month = "????", year = "1976", bibdate = "Sat Jun 10 11:17:44 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Budge:1976:RSB, author = "Sir E. A. Wallis (Ernest Alfred Wallis) Budge", title = "The {Rosetta} stone in the {British Museum}: the {Greek}, demotic, and hieroglyphic texts of the decree inscribed on the {Rosetta} stone conferring additional honours on {Ptolemy V Epiphanes (203-181 B.C.)} with {English} translations and a short history of the decipherment of the {Egyptian} hieroglyphs, and an appendix containing translations of the stelae of {San (Tanis)} and {Tall al-Maskhutah}", publisher = "AMS Press", address = "New York, NY, USA", pages = "325 + 22", year = "1976", ISBN = "0-404-11362-1", ISBN-13 = "978-0-404-11362-9", LCCN = "PJ1531.R5 B8 1976", bibdate = "Tue Dec 01 10:45:33 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Casson:1976:SAD, author = "Lionel Casson", title = "{{\booktitle{The Story of Archaeological Decipherment, from Egyptian Hieroglyphs to Linear B}} by Maurice Pope} (review)", journal = j-TECH-CULTURE, volume = "17", number = "3", pages = "530--531", month = jul, year = "1976", CODEN = "TECUA3", ISSN = "0040-165X (print), 1097-3729 (electronic)", ISSN-L = "0040-165X", bibdate = "Sat Sep 30 08:23:32 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/techculture1970.bib", URL = "https://muse.jhu.edu/pub/1/article/891767/pdf", acknowledgement = ack-nhfb, ajournal = "Tech. Culture", fjournal = "Technology and Culture", journal-URL = "https://muse.jhu.edu/journal/194", } @TechReport{CPI:1976:CMS, author = "{Computation Planning Incorporated}", title = "{Cryptopak}: modular subroutine library for cryptographic transformation", type = "Report", institution = "Computation Planning Incorporated", address = "Bethesda, MD, USA", year = "1976", bibdate = "Sat Jun 10 11:19:06 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Diffie:1976:CPD, author = "Whitfield Diffie and Martin E. Hellman", title = "A critique of the proposed {Data Encryption Standard}", journal = j-CACM, volume = "19", number = "3", pages = "164--165", month = mar, year = "1976", DOI = "https://doi.org/10.1145/360018.360031", bibdate = "Sat Jun 10 11:27:35 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm1970.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://dl.acm.org/doi/pdf/10.1145/360018.360031", abstract = "[From the first paragraph: ``Motivated by the growing need for cryptographic protection of computerized data, the National Bureau of Standards has proposed a data encryption standard. The purpose of such a standard is to foster compatibility among users and to ensure that the algorithm used is of high quality. We believe that the proposed standard fails to meet these criteria in its current form and should be modified prior to its adoption.''", acknowledgement = ack-nhfb, } @Article{Diffie:1976:NDC, author = "Whitfield Diffie and Martin E. Hellman", title = "New Directions in Cryptography", journal = j-IEEE-TRANS-INF-THEORY, volume = "IT-22", number = "6", pages = "644--654", month = nov, year = "1976", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1976.1055638", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://ee.stanford.edu/~hellman/publications/24.pdf", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Information Theory", referencedin = "Referenced in \cite[Ref. 8]{Kaliski:1995:SUR}, \cite[Ref. 8]{Goldreich:1997:FMCb}, \cite[Ref. 1]{Wiener:1998:PCP}, \cite[Ref. 3]{Handschuh:1998:SCC}, \cite[Ref. 2]{Haber:1995:HDD}.", remark = "This important paper, the first public description of public-key cryptography (see also \cite{Merkle:1978:SCI,Ellis:1975:PKC}), begins with the prescient statement ``We stand today on the brink of a revolution in cryptography.'' and ends with ``Thomas Jefferson, a cryptographic amateur, invented a system which was still in use in World War II [2, pp. 192--195], while the most noted cryptographic system of the twentieth century, the rotor machine, was invented simultaneously by four separate people, all amateurs [2, pp. 415, 420, 422--424]. We hope this will inspire others to work in this fascinating area in which participation has been discouraged in the recent past by a nearly total government monopoly.'' Their reference [2] is \cite{Kahn:1967:CSSa}.", } @InProceedings{Diffie:1976:PKC, author = "Whitfield Diffie and Martin E. Hellman", editor = "{IEEE}", booktitle = "{IEEE International Symposium on Information Theory, June 21--24, 1976, Ronneby, Sweden}", title = "Public key cryptography", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "??--??", year = "1976", bibdate = "Sat Jun 10 11:30:52 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Friedman:1976:AMC, author = "William F. (William Frederick) Friedman", title = "Advanced military cryptography", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "113", year = "1976", ISBN = "0-89412-011-5", ISBN-13 = "978-0-89412-011-4", LCCN = "????", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Continuation of Elementary military cryptography, Aegean Park Press, 1976.", series = "A Cryptographic series", acknowledgement = ack-nhfb, author-dates = "1891--1969", keywords = "ciphers; cryptography", } @Book{Friedman:1976:CCA, author = "William F. (William Frederick) Friedman", title = "Cryptography and cryptanalysis articles", volume = "5--6", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "??", year = "1976", LCCN = "Z103 .C79 1976", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, author-dates = "1891--1969", keywords = "ciphers --- addresses, essays, lectures; cryptography --- addresses, essays, lectures; Cryptography.", } @Book{Friedman:1976:CEC, author = "William F. (William Frederick) Friedman", title = "The classic elements of cryptanalysis: with new added problems for the solver", volume = "3", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "????", year = "1976", ISBN = "0-89412-002-6", ISBN-13 = "978-0-89412-002-2", bibdate = "Tue Dec 26 07:31:03 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Friedman:1976:EC, author = "William F. (William Frederick) Friedman", title = "Elements of cryptanalysis", volume = "3", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "172", year = "1976", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, author-dates = "1891--1969", keywords = "Ciphers; Cryptography", } @Book{Friedman:1976:EMC, author = "William Frederick Friedman", title = "Elementary military cryptography", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "86", year = "1976", ISBN = "0-89412-010-7", ISBN-13 = "978-0-89412-010-7", LCCN = "Z104 .F8740 1976", bibdate = "Fri Feb 16 11:46:14 2001", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "On cover: Formerly Special text no. 165 (1935)", series = "A Cryptographic series", acknowledgement = ack-nhfb, author-dates = "1891--1969", keywords = "ciphers; cryptography", } @Book{Friedman:1976:ZTJ, author = "William F. (William Frederick) Friedman and Charles Jastrow Mendelsohn", title = "The {Zimmermann} telegram of {January 16, 1917}, and its cryptographic background", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "33", year = "1976", ISBN = "0-89412-009-3", ISBN-13 = "978-0-89412-009-1", LCCN = "D511 .F683 1976", bibdate = "Sat Nov 18 12:53:52 MST 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, author-dates = "William Frederick Friedman (1891--1969)", keywords = "World War, 1914--1918 -- causes; Zimmermann, Arthur, 1864--1940", } @Article{Griffiths:1976:AMR, author = "Patricia P. Griffiths and Bradford W. Wade", title = "An Authorization Mechanism for a Relational Database System", journal = j-TODS, volume = "1", number = "3", pages = "242--255", month = sep, year = "1976", CODEN = "ATDSD3", ISSN = "0362-5915 (print), 1557-4644 (electronic)", ISSN-L = "0362-5915", bibdate = "Sat Apr 14 10:34:48 MDT 2001", bibsource = "Database/Wiederhold.bib; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/tods.bib", URL = "http://www.acm.org/pubs/articles/journals/tods/1976-1-3/p242-griffiths/p242-griffiths.pdf; http://www.acm.org/pubs/citations/journals/tods/1976-1-3/p242-griffiths/", abstract = "A multiuser database system must selectively permit users to share data, while retaining the ability to restrict data access. There must be a mechanism to provide protection and security, permitting information to be accessed only by properly authorized users. Further, when tables or restricted views of tables are created and destroyed dynamically, the granting, authentication, and revocation of authorization to use them must also be dynamic. Each of these issues and their solutions in the context of the relational database management system System R are discussed. \par When a database user creates a table, he is fully and solely authorized to perform upon it actions such as read, insert, update, and delete. He may explicitly grant to any other user any or all of his privileges on the table. In addition he may specify that that user is authorized to further grant these privileges to still other users. The result is a directed graph of granted privileges originating from the table creator.\par At some later time a user A may revoke some or all of the privileges which he previously granted to another user B. This action usually revokes the entire subgraph of the grants originating from A's grant to B. It may be, however, that B will still possess the revoked privileges by means of a grant from another user C, and therefore some or all of B's grants should not be revoked. This problem is discussed in detail, and an algorithm for detecting exactly which of B's grants should be revoked is presented.", acknowledgement = ack-nhfb, annote = "Defines a dynamic authorization mechanism. A database user can grant or revoke privileges (such as to read, insert, or delete) on a file that he has created. Furthermore, he can authorize others to grant these same privileges. The database management system keeps track of a directed graph, emanating from the creator of granted privileges.", fjournal = "ACM Transactions on Database Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J777", keywords = "access control; authorization; data dependent authorization; database systems; privacy; protection in databases; revocation of authorization; security", subject = "Information Systems --- Database Management --- Systems (H.2.4): {\bf Relational databases}; Information Systems --- Database Management --- Systems (H.2.4); Information Systems --- Database Management --- General (H.2.0): {\bf Security, integrity, and protection**}", } @Article{Guillen:1976:AC, author = "M. Guillen", title = "Automated cryptography", journal = j-SCIENCE-NEWS, volume = "110", number = "12", pages = "188--190", day = "18", month = sep, year = "1976", CODEN = "SCNEBK", ISSN = "0036-8423 (print), 1943-0930 (electronic)", ISSN-L = "0036-8423", bibdate = "Sat Jun 10 11:48:26 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Science News (Washington, DC)", journal-URL = "http://www.jstor.org/journals/00368423.html; http://www.sciencenews.org/view/archives; http://www3.interscience.wiley.com/journal/122396840/home", } @InProceedings{Guy:1976:HFN, author = "R. K. Guy", title = "How to factor a number", crossref = "Hartnell:1976:PFM", pages = "49--89", year = "1976", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 6]{Odlyzko:1995:FIF}.", } @Article{Harrison:1976:POS, author = "Michael A. Harrison and Walter L. Ruzzo and Jeffrey D. Ullman", title = "Protection in Operating Systems", journal = j-CACM, volume = "19", number = "8", pages = "461--471", month = aug, year = "1976", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", MRclass = "68A99", MRnumber = "54 14474", MRreviewer = "George I. Davida", bibdate = "Tue Mar 25 13:26:09 MST 1997", bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "A model of protection mechanisms in computing systems is presented and its appropriateness is argued. The ``safety'' problem for protection systems under this model is to determine in a given situation whether a subject can acquire a particular right to an object. In restricted cases, it can be shown that this problem is decidable; i.e., there is an algorithm to determine whether a system in a particular configuration is safe. In general, and under surprisingly weak assumptions, it cannot be decided if a situation is safe. Various implications of this fact are discussed.", acknowledgement = ack-nhfb, classcodes = "C4210 (Formal logic); C4220 (Automata theory); C6150J (Operating systems)", classification = "721; 723", corpsource = "Univ. of California, Berkeley, CA, USA", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", journalabr = "Commun ACM", keywords = "(computers); automata theory --- Turing Machines; computability and decidability; computer operating systems --- Design; computer security; data processing; decidability; operating systems; protection; protection systems; security model; security of data; Turing machine; Turing machines", ort = "ordner sicherheit", treatment = "P Practical; T Theoretical or Mathematical", } @TechReport{Hellman:1976:SPN, author = "M. E. Hellman", title = "Statement to participants at {NBS} workshop on cryptography in support of computer security", type = "Unpublished memorandum", institution = "????", address = "????", day = "21", month = sep, year = "1976", bibdate = "Sat Jun 10 11:50:49 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Kahn:1976:TC, author = "David Kahn", title = "Tapping computers", journal = j-NY-TIMES, volume = "??", number = "??", pages = "??--??", day = "3", month = apr, year = "1976", CODEN = "NYTIAO", ISSN = "0362-4331 (print), 1542-667X, 1553-8095", ISSN-L = "0362-4331", bibdate = "Sat Jun 10 11:53:12 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "New York Times", journal-URL = "http://www.nytimes.com/", } @Book{Kullback:1976:SMC, author = "Solomon Kullback", title = "Statistical methods in cryptanalysis", volume = "4", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, edition = "Revised", pages = "v + 206", year = "1976", LCCN = "Z104 .K84", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, keywords = "Ciphers; Cryptography; cryptography --- statistical methods", } @TechReport{Lexar:1976:END, author = "{Lexar Corporation}", title = "An evaluation of the {NBS Data Encryption Standard}", type = "Unpublished report", institution = "Lexar Corporation", address = "11611 San Vicente Boulevard, Los Angeles, CA, USA", year = "1976", bibdate = "Sat Jun 10 12:04:12 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Macalister:1976:SLI, author = "Robert Alexander Stewart Macalister and John Sampson", title = "The secret languages of {Ireland}: {Ogham}, {Hisperic}, {Bearlagair na Saer}, {Bog-Latin}, and cryptography, with special reference to the origin and nature of the {Shelta} language; partly based upon collections and manuscripts of the late {John Sampson}; with an {English}-jargon vocabulary", publisher = "APA-Philo Press", address = "Amsterdam, The Netherlands", pages = "x + 284", year = "1976", ISBN = "90-6022-276-8", ISBN-13 = "978-90-6022-276-8", LCCN = "PM9001 .M2 1976", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprint of the 1937 ed. published by the Cambridge University Press, Cambridge, England.", acknowledgement = ack-nhfb, keywords = "cant; Druids and Druidism; Irish language --- history; Irish language --- writing; Shelta", } @MastersThesis{Marion:1976:ANB, author = "Bruce Phillip Marion", title = "Analysis of {National Bureau of Standards Data Encryption Algorithm}", type = "Thesis ({Engineer})", school = "Department of Electrical Engineering, Stanford University", address = "Stanford, CA, USA", pages = "v + 46", year = "1976", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cipher and telegraph codes --- Data processing; Electronic data processing departments --- Security measures", } @Article{Miller:1976:RHT, author = "G. L. Miller", title = "{Reimann}'s hypothesis and tests for primality", journal = j-J-COMP-SYS-SCI, volume = "13", pages = "300--317", year = "1976", CODEN = "JCSSBM", ISSN = "0022-0000 (print), 1090-2724 (electronic)", ISSN-L = "0022-0000", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Computer and System Sciences", journal-URL = "http://www.sciencedirect.com/science/journal/00220000", referencedin = "Referenced in \cite[Ref. 16]{Kaliski:1995:SUR}.", } @MastersThesis{Mitchell:1976:EAD, author = "James Melvin Mitchell", title = "Encryption algorithm for data security based on a polyalphabetic substitution scheme and a pseudo-random number generator", type = "Thesis ({M.S.})", school = "University of Tennessee, Knoxville", address = "Knoxville, TN, USA", pages = "v + 83", year = "1976", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @TechReport{NBS:1976:NWC, author = "{NBS}", title = "The {NBS} workshop on cryptography in support of computer security", type = "Unpublished memorandum", institution = pub-NBS, address = pub-NBS:adr, month = sep, year = "1976", bibdate = "Sat Jun 10 12:20:11 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Sambur:1976:SEM, author = "M. R. Sambur and N. S. Jayant", title = "Speech Encryption by Manipulations of {LPC} Parameters", journal = j-BELL-SYST-TECH-J, volume = "55", number = "9", pages = "1373--1388", month = nov, year = "1976", CODEN = "BSTJAN", ISSN = "0005-8580", bibdate = "Tue Nov 9 11:15:56 MST 2010", bibsource = "http://bstj.bell-labs.com/oldfiles/year.1976/BSTJ.1976.5509.html; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://bstj.bell-labs.com/BSTJ/images/Vol55/bstj55-9-1373.pdf", acknowledgement = ack-nhfb, fjournal = "The Bell System Technical Journal", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/", } @Book{Shulman:1976:ABC, author = "David Shulman", title = "An annotated bibliography of cryptography", volume = "37", publisher = "Garland Pub.", address = "New York, NY, USA", pages = "388", year = "1976", ISBN = "0-8240-9974-5", ISBN-13 = "978-0-8240-9974-9", LCCN = "Z103.A1 S58", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Garland reference library of the humanities", acknowledgement = ack-nhfb, keywords = "cryptography --- bibliography", } @Book{Stevenson:1976:MCI, author = "William Stevenson", title = "A man called {Intrepid}: the secret war", publisher = pub-HARCOURT-BRACE-JOVANOVICH, address = pub-HARCOURT-BRACE-JOVANOVICH:adr, pages = "xxv + 486 + 16", year = "1976", ISBN = "0-15-156795-6", ISBN-13 = "978-0-15-156795-9", LCCN = "D810.S8 S85", bibdate = "Mon Aug 25 16:25:51 MDT 2014", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "Stephenson, whose code name was Intrepid, tells how he established a worldwide intelligence network to combat Nazism.", acknowledgement = ack-nhfb, author-dates = "1924--2013", keywords = "Bombe; cryptography; Ultra", subject = "Stephenson, William Samuel; Stephenson, William Samuel; World War, 1939--1945; Secret service; Secret service", subject-dates = "1896--1989", tableofcontents = "Point of departure: a foreword by Intrepid \\ A break in the silence: a historical note by Charles Howard Ellis \\ Significant dates \\ In time of peace \\ Fight on \\ Impeachable offenses \\ Cry, ``havoc!'' \\ An original and sinister touch \\ The end of the beginning \\ Epilogue: A view from another island \\ Valediction", } @Article{Yasaki:1976:EAK, author = "E. K. Yasaki", title = "Encryption algorithm: key size is the thing", journal = j-DATAMATION, volume = "22", number = "3", pages = "164--166", month = mar, year = "1976", CODEN = "DTMNAT", ISSN = "0011-6963", bibdate = "Sat Jun 10 12:33:05 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Datamation", } @Book{Barker:1977:CHC, author = "Wayne G. Barker", title = "Cryptanalysis of the {Hagelin} cryptograph", volume = "17", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "xi + 223", year = "1977", ISBN = "0-89412-022-0", ISBN-13 = "978-0-89412-022-0", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, annote = "Claimed in \cite{} to be the main published work on the Hagelin M-209 machine.", keywords = "ciphers; Ciphers; Cryptography; cryptography", } @Book{Bell:1977:IVU, author = "Ernest L. Bell", title = "An initial view of {Ultra} as an {American} weapon", publisher = "T S U Press", address = "Keene, NH, USA", pages = "iii + 110", year = "1977", LCCN = "D810.C88 B45", bibdate = "Mon May 08 07:14:10 2006", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, xxISBN = "none", } @Book{Clark:1977:MWBa, author = "Ronald William Clark", title = "The man who broke {Purple}: the life of {Colonel William F. Friedman}, who deciphered the {Japanese} code in {World War II}", publisher = "Little, Brown", address = "Boston, MA, USA", pages = "ix + 271", year = "1977", ISBN = "0-316-14595-5", ISBN-13 = "978-0-316-14595-4", LCCN = "UB290 .C58 1977", bibdate = "Thu Mar 29 18:43:38 MDT 2007", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Friedman, William F (William Frederick); Cryptographers; United States; Biography", subject-dates = "1891--1969", } @Book{Clark:1977:MWBb, author = "Ronald William Clark", title = "The man who broke {Purple}: the life of the world's greatest cryptologist, {Colonel William F. Friedman}", publisher = "Weidenfeld and Nicolson", address = "London, UK", pages = "xi + 212 + 4", year = "1977", ISBN = "0-297-77279-1", ISBN-13 = "978-0-297-77279-8", LCCN = "UB290 .C58 1977b", bibdate = "Thu Mar 29 18:43:38 MDT 2007", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "Friedman, William F (William Frederick); Cryptographers; United States; Biography", subject-dates = "1891--1969", } @Article{Diffie:1977:ECN, author = "Whitfield Diffie and Martin E. Hellman", title = "Exhaustive Cryptanalysis of the {NBS Data Encryption Standard}", journal = j-COMPUTER, volume = "10", number = "6", pages = "74--84", month = jun, year = "1977", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib; https://www.math.utah.edu/pub/tex/bib/computer.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "The article deals with data encryption standard adopted by the National Bureau of Standards, providing a basic argument concerning the standard's inadequate level of security. Cost-effective ways are recommended to avoid the problem.", acknowledgement = ack-nhfb, classification = "722; 902", fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", journalabr = "Computer", keywords = "cryptanalysis; data processing; standards", referencedin = "Referenced in \cite[Ref. 12]{Biham:1998:TA}.", } @Article{Feiertag:1977:PMS, author = "R. J. Feiertag and K. N. Levitt and L. Robinson", title = "Proving multilevel security of a system design", journal = j-OPER-SYS-REV, volume = "11", number = "5", pages = "57--65", month = nov, year = "1977", CODEN = "OSRED8", ISSN = "0163-5980", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:57 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Article{Filby:1977:TPT, author = "P. William Filby", title = "Teaching {Purple} to Talk Saved Thousands", journal = "Baltimore Sun", volume = "??", number = "??", pages = "??--??", day = "16", month = oct, year = "1977", bibdate = "Sun Dec 24 08:50:19 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Review of \booktitle{The Man Who Broke Purple}, by Ronald Clark.", acknowledgement = ack-nhfb, } @Manual{Gait:1977:VCH, author = "Jason Gait", title = "Validating the correctness of hardware implementations of the {NBS Data Encryption Standard}", volume = "500-20", organization = pub-NBS, address = pub-NBS:adr, pages = "iv + 40", month = nov, year = "1977", CODEN = "XNBSAV", LCCN = "T1.U52 no.500-20", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "NBS special publication, computer science and technology", acknowledgement = ack-nhfb, govtdocnumber = "0 13.10:500-20", keywords = "computers --- access control --- code words; Computers --- Access control --- Passwords; computers --- access control --- passwords; Computers --- Testing; computers --- testing; Data encryption (Computer science); data encryption (computer science); Monte Carlo method", } @Article{Gardner:1977:MGN, author = "Martin Gardner", title = "Mathematical Games: A new kind of cipher that would take millions of years to break", journal = j-SCI-AMER, volume = "237", number = "2", pages = "120--124", month = aug, year = "1977", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican0877-120", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Wed May 22 12:01:13 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sciam1970.bib", URL = "http://www.nature.com/scientificamerican/journal/v237/n2/pdf/scientificamerican0877-120.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", referencedin = "Referenced in \cite[Ref. 5]{Odlyzko:1995:FIF}, \cite[Ref. 2]{Anonymous:1996:RF}.", remark = "This article introduced public-key cryptography to a wide audience.", } @Article{Kak:1977:SEU, author = "S. C. Kak and N. S. Jayant", title = "On Speech Encryption Using Waveform Scrambling", journal = j-BELL-SYST-TECH-J, volume = "56", number = "5", pages = "781--808", month = may # "--" # jun, year = "1977", CODEN = "BSTJAN", ISSN = "0005-8580", bibdate = "Tue Nov 9 11:15:56 MST 2010", bibsource = "http://bstj.bell-labs.com/oldfiles/year.1977/BSTJ.1977.5605.html; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://bstj.bell-labs.com/BSTJ/images/Vol56/bstj56-5-781.pdf", acknowledgement = ack-nhfb, fjournal = "The Bell System Technical Journal", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/", } @Book{Katzan:1977:SDE, author = "Harry {Katzan, Jr.}", title = "The Standard Data Encryption Algorithm", publisher = "Petrocelli Books", address = "New York, NY, USA", pages = "viii + 134", year = "1977", ISBN = "0-89433-016-0", ISBN-13 = "978-0-89433-016-2", LCCN = "QA76.9 .A25K37", bibdate = "Wed Sep 28 08:01:24 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Computer security --- Passwords; Data encryption (Computer science)", } @Article{Kolata:1977:NCC, author = "Gina Bari Kolata", title = "News and Comment: Computer Encryption and the {National Security Agency} Connection", journal = j-SCIENCE, volume = "197", number = "4302", pages = "438--440", day = "29", month = jul, year = "1977", CODEN = "SCIEAS", DOI = "https://doi.org/10.1126/science.197.4302.438", ISSN = "0036-8075 (print), 1095-9203 (electronic)", ISSN-L = "0036-8075", bibdate = "Sun Dec 24 09:02:13 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://science.sciencemag.org/content/197/4302/438/", acknowledgement = ack-nhfb, fjournal = "Science", journal-URL = "http://www.sciencemag.org/archive/", remark = "This article discusses the view that the US National Bureau of Standards (NBS) Data Encryption Standard (DES) was possibly designed to allow a back door for the US National Security Agency (NSA), or that the NSA would have sufficient computer resources to break DES, which has only a 56-bit encryption key.", } @Manual{NBS:1977:DES, author = "{National Bureau of Standards}", title = "Data Encryption Standard", volume = "46", organization = "U. S. Department of Commerce", address = "Washington, DC, USA", pages = "18", month = jan, year = "1977", LCCN = "JK468.A8 A31 no.46", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Federal information processing standards publication", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 21]{Biham:1998:TA}.", xxISBN = "none", } @Book{Pierce:1977:SSP, author = "Clayton C. Pierce", title = "Secret and secure: privacy, cryptography, and secure communication", publisher = "Pierce", address = "Ventura, CA, USA", pages = "iv + 84", year = "1977", LCCN = "Z103.P531", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "ciphers; cryptography", } @Article{Pless:1977:ESC, author = "Vera S. Pless", title = "Encryption schemes for computer confidentiality", journal = j-IEEE-TRANS-COMPUT, volume = "C-26", number = "11", pages = "1133--1136", year = "1977", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/TC.1977.1674759", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", MRclass = "94A10", MRnumber = "57 \#5410", MRreviewer = "A. T. Amin", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @InProceedings{Rabin:1977:DS, author = "M. O. Rabin", editor = "Richard A. DeMillo and others", booktitle = "Foundations of Secure Computation: Papers presented at a 3 day workshop held at Georgia Institute of Technology, Atlanta, October 1977", title = "Digitalized Signatures", publisher = pub-ACADEMIC, address = pub-ACADEMIC:adr, pages = "x + 404", year = "1977", ISBN = "0-12-210350-5", ISBN-13 = "978-0-12-210350-6", LCCN = "QA76.9.A25 F66", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 26]{Goldreich:1997:FMCb}.", } @Article{Rejewski:1977:ATP, author = "Marian Rejewski", title = "An application of the theory of permutations in breaking the {Enigma} cipher", journal = "Applications of Mathematicae, Polish Academy of Sciences", volume = "16", number = "??", pages = "543--559", month = "????", year = "1977", bibdate = "Sun Dec 01 09:58:13 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Rohwer:1977:CCB, author = "J{\"u}rgen Rohwer", title = "The critical convoy battles of {March 1943}: the battle for {HX.229\slash SC122}", publisher = "Naval Institute Press", address = "Annapolis, MD, USA", pages = "256 + 32", year = "1977", ISBN = "0-87021-818-2", ISBN-13 = "978-0-87021-818-7", LCCN = "D770 .R59313", bibdate = "Tue Aug 26 07:10:39 MDT 2014", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Revised English translation by Derek Masters of the German original \cite{Rohwer:1975:GIM}.", acknowledgement = ack-nhfb, remark = "According to \cite[Chapter 10]{Good:1979:EWC}, this book contains some discussion of cryptanalysis. I have been unable to locate a table of contents for this book.", subject = "World War, 1939--1945; Campaigns; Atlantic Ocean; Naval operations; Submarine; Naval operations, German; Naval convoys; History; 20th century; Military campaigns.; Military operations, Naval; German.; Submarine.; Naval convoys.", } @Book{Sacco:1977:MC, author = "Luigi Sacco", title = "Manual of cryptography", volume = "14", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "x + 193", year = "1977", ISBN = "0-89412-016-6", ISBN-13 = "978-0-89412-016-9", LCCN = "Z104 .S313 1977", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Translation of: Manuale di crittografia. Bibliography: p. viii.", series = "A Cryptographic series", acknowledgement = ack-nhfb, keywords = "ciphers; cryptography", } @Book{Sinnott:1977:CTC, author = "Robert Sinnott", title = "A catalogue of titles on chess, checkers, and cryptology in the library of the {United States Military Academy, West Point, New York}", publisher = "????", address = "Norwell, MA, USA", pages = "35", year = "1977", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Photostatic copy, partly of typescript, partly of printed matter.", keywords = "Checkers --- Bibliography --- Catalogs; Chess --- Bibliography --- Catalogs; Cryptography --- Bibliography --- Catalogs.", } @Book{USNBS:1977:DES, author = "{United States.National Bureau of Standards}", title = "{Data Encryption Standard}", volume = "46", publisher = pub-NBS, address = pub-NBS:adr, pages = "18", year = "1977", LCCN = "JK468.A8 A31 no.46", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Federal Information Processing Standards publication", acknowledgement = ack-nhfb, annote = "Cover title.", keywords = "Computers --- Access control --- Standards.", } @Article{Anonymous:1978:NPAd, author = "Anonymous", title = "New product applications: Single-board bipolar microcomputer emulates any mini- or microcomputer", journal = j-IEEE-SPECTRUM, volume = "15", number = "4", pages = "68--73", month = apr, year = "1978", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1978.6367674", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Mon Jan 20 06:41:24 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Band pass filters; Companies; Cryptography; Microcomputers; Microprocessors; Modems", } @Book{Anonymous:1978:ODA, author = "Anonymous", title = "The origin and development of the {Army Security Agency}, 1917--1947", volume = "16", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "51", year = "1978", ISBN = "0-89412-025-5", ISBN-13 = "978-0-89412-025-1", LCCN = "UB290 .O75 1978", bibdate = "Mon Sep 13 06:43:57 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A cryptographic series", acknowledgement = ack-nhfb, } @TechReport{Chaum:1978:ICP, author = "D. L. Chaum and R. S. Fabry", title = "Implementing capability-based protection using encryption", type = "Technical Report", number = "UCB/ERL M78/46", institution = "University of California, Berkeley", address = "Berkeley, CA, USA", edition = "July 17, 1978", pages = "i + 9", year = "1978", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "This work was partially supported by the National Science Foundation Center.", keywords = "Computer networks --- Access control; Computers --- Access control; Cryptography", } @Article{Christiansen:1978:SL, author = "D. Christiansen", title = "Spectral lines", journal = j-IEEE-SPECTRUM, volume = "15", number = "1", pages = "23--23", month = jan, year = "1978", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1978.6369376", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Mon Jan 20 06:41:24 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Cryptography; Graphics; IEEE publications; Libraries; Materials; Microprocessors; Organizations", } @Article{Ehrsam:1978:CKM, author = "William F. Ehrsam and Stephen M. Matyas and Carl H. Meyer and Walter L. Tuchman", title = "A Cryptographic Key Management Scheme for Implementing the {Data Encryption Standard}", journal = j-IBM-SYS-J, volume = "17", number = "2", pages = "106--125", year = "1978", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Wed Jan 08 16:35:07 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", abstract = "Data being transmitted through a communications network can be protected by cryptography. In a data processing environment, cryptography is implemented by an algorithm which utilizes a secret key, or sequence of bits. Any key-controlled cryptographic algorithm, such as the Data Encryption Standard, requires a protocol for the management of its cryptographic keys. The complexity of the key management protocol ultimately depends on the level of functional capability provided by the cryptographic system. This paper discusses a possible key management scheme that provides the support necessary to protect communications between individual end users (end-to-end encryption) and that also can be used to protect data stored or transported on removable media.", acknowledgement = ack-nhfb, classification = "723", fjournal = "IBM Systems Journal", journalabr = "IBM Syst J", keywords = "data processing", } @Article{Filby:1978:BRM, author = "P. William Filby", title = "Book Review: {{\booktitle{The Man Who Broke Purple}}, by Ronald Clark, 271 pages, Little, Brown}", journal = j-CRYPTOLOG, volume = "5", number = "1", pages = "13--14", month = jan, year = "1978", ISSN = "0740-7602", ISSN-L = "0740-7602", bibdate = "Sun Dec 24 08:50:19 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprint of \cite{Filby:1977:TPT}.", URL = "https://archive.org/download/cryptolog_38/cryptolog_38.pdf", acknowledgement = ack-nhfb, } @MastersThesis{Funk:1978:DUS, author = "Mark Robert Funk", title = "A digital ultrasound system for data collection, imaging, and tissue signature analysis", type = "Thesis ({M.S.})", school = "Department of Electrical Engineering, Michigan State University", address = "East Lansing, MI 48824, USA", pages = "vii + 141", year = "1978", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Tissues --- Analysis; Ultrasonics in biology --- Automation; Ultrasonics in biology.", } @Article{Gaines:1978:SSP, author = "R. Stockton Gaines and Norman Z. Shapiro", title = "Some security principles and their application to computer security", journal = j-OPER-SYS-REV, volume = "12", number = "3", pages = "19--28", month = jul, year = "1978", CODEN = "OSRED8", ISSN = "0163-5980", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:44 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Article{Gait:1978:EEP, author = "Jason Gait", title = "Easy entry: the password encryption problem", journal = j-OPER-SYS-REV, volume = "12", number = "3", pages = "54--60", month = jul, year = "1978", CODEN = "OSRED8", ISSN = "0163-5980", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:44 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Book{Givierge:1978:CC, author = "Marcel Givierge", title = "Course in cryptography", volume = "19", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "164", year = "1978", ISBN = "0-89412-028-X", ISBN-13 = "978-0-89412-028-2", LCCN = "", bibdate = "Sat Sep 25 11:01:24 2004", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "English translation of \cite{Givierge:1932:CC}", series = "A cryptographic series", acknowledgement = ack-nhfb, } @Article{Herlestam:1978:CRS, author = "Tore Herlestam", title = "Critical remarks on some public-key cryptosystems", journal = j-BIT, volume = "18", number = "4", pages = "493--496", month = dec, year = "1978", CODEN = "NBITAB", DOI = "https://doi.org/10.1007/BF01932028", ISSN = "0006-3835 (print), 1572-9125 (electronic)", ISSN-L = "0006-3835", MRclass = "94B99", MRnumber = "80b:94033", MRreviewer = "M. C. Cheng", bibdate = "Wed Jan 4 18:52:15 MST 2006", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=18&issue=4; https://www.math.utah.edu/pub/tex/bib/bit.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=18&issue=4&spage=493", fjournal = "BIT; Nordisk Tidskrift for Informationsbehandling (BIT)", journal-URL = "http://link.springer.com/journal/10543", } @Book{Jones:1978:MSW, author = "Reginald V. Jones", title = "Most secret war: [{British} scientific intelligence, 1939--1945]", publisher = "Hamilton", address = "London, UK", pages = "xx + 556 + 16", year = "1978", ISBN = "0-241-89746-7", ISBN-13 = "978-0-241-89746-1", LCCN = "????", bibdate = "Mon Aug 25 16:47:40 MDT 2014", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, author-dates = "1911--", subject = "Geheimdienst; Spionage; Weltkrieg (1939--1945); Geschichte; Gro{\ss}britannien; Jones, R. V (Reginald Victor); World War, 1939--1945; Secret service; Great Britain; Personal narratives, British; Technology; Scientists; England; Biography; Service des renseignements militaires; Guerre mondiale, 1939--1945; Service secret; Grande-Bretagne; Tweede Wereldoorlog; Geheime Diensten; Natuurwetenschappen; Technische wetenschappen; Scientists; Secret service; Technology; History; George VI, 1936--1952", } @Book{Jones:1978:WWB, author = "R. V. (Reginald Victor) Jones", title = "The Wizard War: {British} Scientific Intelligence, 1939--1945", publisher = "Coward, McCann and Geoghegan", address = "New York, NY, USA", pages = "xx + 556 + 16", year = "1978", ISBN = "0-698-10896-5", ISBN-13 = "978-0-698-10896-7", LCCN = "D810.C88 J66 1978", bibdate = "Thu Aug 9 14:32:26 MDT 2012", bibsource = "https://www.math.utah.edu/pub/bibnet/authors/b/bohr-niels.bib; https://www.math.utah.edu/pub/bibnet/authors/h/heisenberg-werner.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/master.bib; z3950.loc.gov:7090/Voyager", URL = "https://en.wikipedia.org/wiki/Reginald_Victor_Jones", acknowledgement = ack-nhfb, author-dates = "Reginald Victor Jones (29 September 1911--17 December 1997)", remark = "This is an excellent memoir by the World War II head of British Air Intelligence. It has extensive coverage of the development and use of radar and signal-homing on both sides of the War. The author had substantial influence in the intelligence services because he had authority for direct contact with Prime Minister Winston Churchill, when the need arose. Chapter 48 describes extensive meetings between the author and Niels Bohr, and his son Aage Bohr. Chapters 44--46 discuss the Nazi flying bombs and rockets developed, and tested in Baltic Ocean flights, by the Werner von Braun team at Peenemuende on the north German coast, and how successful the British were at eliminating many of them before the attacks were successful. The book also has shorter commentary on the 1945--1946 internment at Farm Hall (just outside Cambridge, UK) of ten German atomic scientists, and the fact that all of their conversations were secretly recorded, transcribed, and translated from German to English. The book was written more than 15 years before the expiry of the fifty-year period mandated by the British Official Secrets Act that finally allowed the release of the transcripts of the recordings, but nevertheless appears to be quite accurate about what was learned from them. After the war, the author had several opportunities to meet with high-ranking officers from the war-time German military, and to learn how much each side of the conflict knew of the other's activities.", subject = "Geheimdienst; Spionage; Weltkrieg (1939--1945); Geschichte; Gro{\ss}britannien; Jones, R. V (Reginald Victor); World War, 1939--1945; Secret service; Great Britain; Personal narratives, British; Technology; Scientists; England; Biography; Service des renseignements militaires; Guerre mondiale, 1939--1945; Service secret; Grande-Bretagne; Tweede Wereldoorlog; Geheime Diensten; Natuurwetenschappen; Technische wetenschappen; Scientists; Secret service; Technology; History; George VI, 1936--1952", tableofcontents = "Illustrations / ix \\ Foreword by the Vicomtesse de Clarens / xiii \\ Acknowledgements / xv \\ Introduction / xvii \\ Part 1 \\ 1: The men who went first / 3 \\ 2: Friends and rivals / 13 \\ 3: The Clarendon laboratory 1936--1938 / 21 \\ 4: Inferior red 1936--1938 / 34 \\ 5: Exile / 45 \\ 6: The day before war broke out / 53 \\ 7: The secret weapon / 57 \\ 8: The Oslo report / 67 \\ 9: A plan for intelligence / 72 \\ 10: The phoney war / 78 \\ 11: The crooked leg / 92 \\ 12: Reflections / 106 \\ 13: The fortunes of major Wintle / 111 \\ 14: The fifth column / 114 \\ 15: The Edda revived / 120 \\ 16: Knickebein Jammed --- and photographed / 127 \\ 17: The X-apparatus / 135 \\ 18: Coventry / 146 \\ 19: Target no. 54 / 154 \\ 20: The atrocious crime / 161 \\ 21: Wotan's other eye / 172 \\ 22: Retrospect and prospect / 179 \\ Part 2 \\ 23: Freya / 189 \\ 24: Beams on the wane / 203 \\ 25: `Jay' / 215 \\ 26: W{\"u}rzburg / 223 \\ 27: The Bruneval raid / 233 \\ 28: The Baedeker beams / 250 \\ 29: El Hatto / 254 \\ 30: Pineapple / 260 \\ 31: The Kammhuber line / 264 \\ 32: Lichtenstein / 280 \\ 33: Window / 287 \\ 34: Hamburg / 300 \\ 35: Heavy water / 306 \\ 36: Revelations from the Secret Service / 310 \\ 37: Full stretch / 318 \\ 38: Peenem{\"u}nde / 332 \\ 39: FZG 76 / 349 \\ 40: The Americans convinced / 376 \\ 41: Flames: problems of bomber command / 381 \\ 42: The Baby Blitz / 396 \\ 43: D-Day / 400 \\ 44: V-1 / 413 \\ 45: V-2 / 430 \\ 46: V-3 / 462 \\ 47: Bomber triumph / 465 \\ 48: Nuclear energy / 472 \\ 49: A.D.I. (science) overseas / 484 \\ 50: The year of madness / 492 \\ 51: German generals and staff colleges / 499 \\ 52: Swords into ploughshares, bombs into saucers / 507 \\ 53: Exeunt / 514 \\ Epilogue / 523 \\ Notes / 535 \\ Glossary / 539 \\ Index / 543", } @InCollection{Kam:1978:SDS, author = "John B. Kam and George I. Davida", booktitle = "Foundations of secure computation (Workshop, Georgia Inst. Tech., Atlanta, Ga., 1977)", title = "A structured design of substitution-permutation encryption network", publisher = pub-ACADEMIC, address = pub-ACADEMIC:adr, pages = "95--113", year = "1978", MRclass = "68B15 (68H05 94A99 94B15)", MRnumber = "80b:68031", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", } @Article{Lennon:1978:CAI, author = "Richard E. Lennon", title = "Cryptography Architecture for Information Security", journal = j-IBM-SYS-J, volume = "17", number = "2", pages = "138--150", year = "1978", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Wed Jan 08 16:35:07 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", abstract = "Information being transferred from point to point over a public communications carrier or stored on portable media can be protected, by the use of cryptography, from accidental or intentional disclosure. Control functions are required to ensure synchronization of the process. In a communications environment, the control functions become logically part of the network architecture. IBM's Systems Network Architecture (SNA) has been extended to allow the use of cryptography when sensitive information is being processed. Architectural similarities for the file environment are discussed.", acknowledgement = ack-nhfb, classification = "723", fjournal = "IBM Systems Journal", journalabr = "IBM Syst J", keywords = "computer networks; data processing", } @Book{Lewin:1978:UGW, author = "Ronald Lewin", title = "{Ultra} goes to war: the first account of {World War II}'s greatest secret based on official documents", publisher = pub-MCGRAW-HILL, address = pub-MCGRAW-HILL:adr, pages = "397 + 6", year = "1978", ISBN = "0-07-037453-8", ISBN-13 = "978-0-07-037453-9", LCCN = "D810.S7 L43 1978; D810.S7L43", bibdate = "Fri May 13 08:13:27 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; melvyl.cdlib.org:210/CDL90", price = "US\$12.95", acknowledgement = ack-nhfb, subject = "World War, 1939-1945; Secret service; Great Britain", } @Article{Matyas:1978:GDI, author = "Stephen M. Matyas and Carl H. Meyer", title = "Generation, Distribution, and Installation of Cryptographic Keys", journal = j-IBM-SYS-J, volume = "17", number = "2", pages = "126--137", year = "1978", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Wed Jan 08 16:35:07 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", abstract = "A key controlled cryptographic system requires a mechanism for the safe and secure generation, distribution, and installation of its cryptographic keys. Possible key generation, distribution, and installation procedures are discussed for the key management scheme presented in an accompanying paper.", acknowledgement = ack-nhfb, classification = "723", fjournal = "IBM Systems Journal", journalabr = "IBM Syst J", keywords = "data processing", } @Article{Merkle:1978:HIS, author = "Ralph Merkle and Martin E. Hellman", title = "Hiding Information and Signatures in Trap Door Knapsacks", journal = j-IEEE-TRANS-INF-THEORY, volume = "24", number = "5", pages = "525--530", year = "1978", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1978.1055927", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", bibdate = "Thu Jan 21 14:42:38 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Information Theory", } @Article{Merkle:1978:SCI, author = "Ralph C. Merkle", title = "Secure Communications Over Insecure Channels", journal = j-CACM, volume = "21", number = "4", pages = "294--299", month = apr, year = "1978", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Mar 25 13:26:09 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cacm1970.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "According to traditional conceptions of cryptographic security, it is necessary to transmit a key, by secret means, before encrypted messages can be sent securely. This paper shows that it is possible to select a key over open communications channels in such a fashion that communications security can be maintained. A method is described which forces any enemy to expend an amount of work which increases as the square of the work required of the two communicants to select the key. The method provides a logically new kind of protection against the passive eaves dropper. It suggests that further research on this topic will be highly rewarding, both in a theoretical and a practical sense.", acknowledgement = ack-nhfb, annote = "This article was originally submitted August 1975; was the publication delay due to U.S. Government security reviews?", classcodes = "C5600 (Data communication equipment and techniques); C6130 (Data handling techniques)", classification = "723", corpsource = "Dept. of Electrical Engng. and Computer Sci., Univ. of California, Berkeley, CA, USA", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", journalabr = "Commun ACM", keywords = "communications channels; communications security; computer network security; cryptographic security; cryptography; cryptology; data communication systems; data processing; insecure channels; key distribution; open; passive eavesdropper; passive eavesdropping; protection; public key cryptosystem; Security; security of data; wiretap", treatment = "T Theoretical or Mathematical", } @TechReport{Needham:1978:UEAa, author = "R. M. (Roger Michael) Needham and Michael D. Schroeder", title = "Using encryption for authentication in large networks of computers", number = "CSL-78-4", institution = "Xerox Palo Alto Research Center", address = "Palo Alto, CA, USA", pages = "??", year = "1978", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprinted June 1982.", acknowledgement = ack-nhfb, } @Article{Needham:1978:UEAb, author = "Roger M. Needham and Michael D. Schroeder", title = "Using Encryption for Authentication in Large Networks of Computers", journal = j-CACM, volume = "21", number = "12", pages = "993--999", month = dec, year = "1978", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Jan 22 07:07:33 MST 2001", bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; http://dblp.uni-trier.de/db/journals/cacm/cacm21.html#NeedhamS78; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.", acknowledgement = ack-nhfb, classcodes = "C5620 (Computer networks and techniques); C6130 (Data handling techniques)", classification = "723", corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", journalabr = "Commun ACM", keywords = "authenticated communication; computer networks; data processing --- Security of Data; document integrity; encryption; guarantee; protocols; public key encryption algorithms; security of data; signature verification", oldlabel = "NeedhamS78", treatment = "P Practical", XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/NeedhamS78", } @Article{Nilsson:1978:OST, author = "Arne Nilsson and Rolf Blom and Harald Wesemeyer and S. Hellstrom", title = "On overflow systems in telephone networks: general service times in the secondary group", journal = "Ericsson technics", volume = "34", number = "2", publisher = "Telefonaktiebolaget L. M. Ericsson", address = "Stockholm, Sweden", pages = "48--128", year = "1978", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Caption title.", keywords = "Computer networks; Computers --- Access control; Electrets; Encryption methods in data networks; Telephone systems", } @Book{Oakley:1978:RPC, author = "Howard T. Oakley", title = "The {Riverbank} publications on cryptology", publisher = "????", address = "Washington, DC, USA", pages = "324--330", year = "1978", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography; Fabyan, George, --- 1867-1936; Friedman, William F. --- (William Frederick), --- 1891-1969; Publication (Riverbank Laboratories); Riverbank Laboratories. --- Dept. of Ciphers", } @Article{Payne:1978:OEN, author = "W. H. Payne and K. L. McMillen", title = "Orderly Enumeration of Nonsingular Binary Matrices Applied to Text Encryption", journal = j-CACM, volume = "21", number = "4", pages = "259--263", month = apr, year = "1978", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", MRclass = "68C05", MRnumber = "80h:68031", MRreviewer = "P. E. O'Neil", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", abstract = "Nonsingular binary matrices of order N, i.e., nonsingular over the field left brace 0,1 right brace, and an initial segment of the natural numbers are placed in one-to-one correspondence. Each natural number corresponds to two intermediate vectors. These vectors are mapped into a nonsingular binary matrix. Examples of complete enumeration of all 2 multiplied by 2 and 3 multiplied by 3 nonsingular binary matrices were produced by mapping the intermediate vectors to the matrices. The mapping has application to the Vernam encipherment method using pseudorandom number sequences. A bit string formed from bytes of text of a data encryption key can be used as a representation of a natural number. This natural number is transformed to a nonsingular binary matrix. Key leverage is obtained by using the matrix as a ``seed'' in a shift register sequence pseudorandom number generator.", acknowledgement = ack-nhfb, classcodes = "C4140 (Linear algebra); C6130 (Data handling techniques)", classification = "723", corpsource = "Washington State Univ., Pullman, WA, USA", fjournal = "Communications of the Association for Computing Machinery", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", journalabr = "Commun ACM", keywords = "binary sequences; bit string; computer programming; data encryption key; encoding; enumeration; mapped; matrix algebra; natural number; nonsingular binary matrices; pseudorandom number; sequences; text editing; text encryption; Vernam encipherment method", oldlabel = "PayneM78", treatment = "A Application; T Theoretical or Mathematical", XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/PayneM78", } @Article{Pohlig:1978:IAC, author = "S. C. Pohlig and M. E. Hellman", title = "An improved algorithm for computing logarithms over {$ {\rm GF}(p) $} and its cryptographic significance", journal = j-IEEE-TRANS-INF-THEORY, volume = "24", number = "1", pages = "106--111", month = "????", year = "1978", CODEN = "IETTAW", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", bibdate = "Thu Sep 22 18:53:42 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Information Theory", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=18", } @Article{Pollard:1978:MCM, author = "J. M. Pollard", title = "{Monte Carlo} Methods for Index Computation $ (\bmod p) $", journal = j-MATH-COMPUT, volume = "32", number = "143", pages = "918--924", month = jul, year = "1978", CODEN = "MCMPAF", ISSN = "0025-5718 (print), 1088-6842 (electronic)", ISSN-L = "0025-5718", bibdate = "Mon Jul 19 08:06:24 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, classcodes = "C1140G (Monte Carlo methods)", corpsource = "Math. Dept., Plessey Telecommunications Res., Maidenhead, UK", fjournal = "Mathematics of Computation", journal-URL = "http://www.ams.org/mcom/", keywords = "factorisation of; index computation; integers; Monte Carlo methods", referencedin = "Referenced in \cite[Ref. 7]{Wiener:1998:PCP} and \cite[Ref. 8]{Escott:1999:AEC}.", treatment = "T Theoretical or Mathematical", } @Unpublished{Reeds:1978:HCM, author = "J. Reeds and D. Ritchie and R. Morris", title = "The {Hagelin} Cypher Machine ({M-209}): Cryptanalysis from Ciphertext Alone", year = "1978", bibdate = "Thu Apr 29 18:08:31 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Submitted to the journal Cryptologia, but never published. For the story behind the suppression of publication, see \cite{Ritchie:19xx:DCW}. Internal technical memoranda TM 78-1271-10, TM 78-1273-2.", acknowledgement = ack-nhfb, } @Article{Rivest:1978:MOD, author = "Ronald L. Rivest and Adi Shamir and Leonard M. Adleman", title = "A Method for Obtaining Digital Signatures and Public Key Cryptosystems", journal = j-CACM, volume = "21", number = "2", pages = "120--126", month = feb, year = "1978", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", MRclass = "94A05", MRnumber = "83m:94003", MRreviewer = "J. L. Selfridge", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib; ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib; ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib; https://www.math.utah.edu/pub/tex/bib/cacm1970.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "The basics of trap-door functions and the famous RSA public key cryptosystem are presented in this paper.", abstract = "An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. (2) A message can be ``signed'' using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature.", acknowledgement = ack-nhfb, classcodes = "C6130 (Data handling techniques)", classification = "723", corpsource = "Dept. of Math., MIT, Cambridge, MA, USA", fjournal = "Communications of the Association for Computing Machinery", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", journalabr = "Commun ACM", keywords = "computer programming; cryptography; cryptosystems; data handling; data processing --- Security of Data; decryption key; digital signatures; encryption key; number theory; operating protection; RSA; security; security of data", referencedin = "Referenced in \cite[Ref. 12]{Handschuh:1998:SCC}, \cite[Ref. 21]{Kaliski:1995:SUR}, \cite[Ref. 5]{Haber:1995:HDD}, \cite[Ref. 8]{Wiener:1998:PCP}, \cite[Ref. 27]{Goldreich:1997:FMCb}.", treatment = "T Theoretical or Mathematical", } @Article{Saltzer:1978:DS, author = "Jerome H. Saltzer", title = "On digital signatures", journal = j-OPER-SYS-REV, volume = "12", number = "2", pages = "12--14", month = apr, year = "1978", CODEN = "OSRED8", ISSN = "0163-5980", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:39 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Book{Stark:1978:INT, author = "Harold M. Stark", title = "An introduction to number theory", publisher = pub-MIT, address = pub-MIT:adr, pages = "x + 347", year = "1978", ISBN = "0-262-69060-8", ISBN-13 = "978-0-262-69060-7", LCCN = "QA241 .S72 1978", bibdate = "Fri Jun 24 14:19:16 MDT 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, remark = "Originally published in \cite{Stark:1970:INT}.", subject = "Number theory", xxnote = "Some library catalogs give year as 1981.", } @Manual{USCSC:1978:CSD, author = "{United States.Civil Service Commission}", title = "Computer security and the {Data Encryption Standard}: proceedings of the {Conference on Computer Security and the Data Encryption Standard held at the National Bureau of Standards in Gaithersburg, Maryland, on February 15, 1977}", number = "500-27", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "viii + 125", year = "1978", LCCN = "T1.U52 no.500- 27", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "NBS special publication. Computer science and technology", acknowledgement = ack-nhfb, keywords = "computer security --- passwords; data encryption (computer science)", } @Book{USCSSC:1978:USN, author = "{United States.Congress.Senate.Select Committee on Intelligence}", title = "Unclassified summary --- involvement of {NSA} in the development of the {Data Encryption Standard}: staff report of the {Senate Select Committee on Intelligence, United States Senate}", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "ii + 4", month = apr, year = "1978", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "At head of title: 95th Congress, 2d session. Committee print.", keywords = "Cryptography; Data encryption (Computer science); United States. --- National Security Agency", } @Book{Winterbotham:1978:NC, author = "F. W. (Frederick William) Winterbotham", title = "The {Nazi} connection", publisher = pub-HARPER-ROW, address = pub-HARPER-ROW:adr, pages = "222", year = "1978", ISBN = "0-06-014686-9", ISBN-13 = "978-0-06-014686-3", LCCN = "D810.S8 .W538 1978", bibdate = "Fri May 13 08:14:55 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; melvyl.cdlib.org:210/CDL90", acknowledgement = ack-nhfb, author-dates = "1897--1990", subject = "Winterbotham, F. W; (Frederick William); World War, 1939-1945; Secret service; Great Britain; Spies; Biography; Germany; Personal narratives, British", subject-dates = "1897--1990", } @InProceedings{Adleman:1979:SAD, author = "L. M. Adleman", title = "A subexponential algorithm for the discrete logarithm", crossref = "IEEE:1979:ASF", pages = "55--60", year = "1979", DOI = "https://doi.org/10.1109/SFCS.1979.2", bibdate = "Sun Mar 11 10:27:21 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @PhdThesis{Andelman:1979:MLE, author = "Dov Andelman", title = "Maximum likelihood estimation applied to cryptanalysis", type = "Thesis ({Ph.D.})", school = "Stanford University", address = "Stanford, CA, USA", pages = "viii + 167", year = "1979", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography; Estimation theory; Maxima and minima.", } @Article{Anonymous:1979:SSA, author = "Anonymous", title = "{SB}. {Security Agency} denies tampering with {DES}", journal = j-IEEE-SPECTRUM, volume = "16", number = "7", pages = "39--39", month = jul, year = "1979", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1979.6368158", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Mon Jan 20 06:41:24 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Educational institutions; Electrical engineering; Encryption; National security; Public key", } @Book{Barker:1979:CEC, author = "Wayne G. Barker", title = "Cryptanalysis of an enciphered code problem: where an ``additive'' method of encipherment has been used", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "vii + 174", year = "1979", ISBN = "0-89412-037-9", ISBN-13 = "978-0-89412-037-4", LCCN = "Z103 .B333", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, keywords = "Ciphers; Cryptography", } @Book{Barker:1979:HCCa, editor = "Wayne G. Barker", title = "The history of codes and ciphers in the {United States} during {World War I}", volume = "20", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "263", year = "1979", ISBN = "0-89412-031-X", ISBN-13 = "978-0-89412-031-2", LCCN = "D639.C75 H57 1979", bibdate = "Mon Sep 13 06:32:02 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, } @Book{Barker:1979:HCCb, editor = "Wayne G. Barker", title = "The history of codes and ciphers in the {United States} during the period between the {World Wars}", volume = "22, 54", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "various", year = "1979", ISBN = "0-89412-039-5 (part 1), 0-89412-165-0 (part 2)", ISBN-13 = "978-0-89412-039-8 (part 1), 978-0-89412-165-4 (part 2)", LCCN = "UB290 .H47 1979", bibdate = "Mon Sep 13 06:37:57 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Two volumes. This book was written about 1946 by the Historical Section of the Army Security Agency", series = "A Cryptographic series", acknowledgement = ack-nhfb, } @Article{Blakley:1979:RSA, author = "G. R. Blakley and I. Borosh", title = "{Rivest--Shamir--Adleman} public key cryptosystems do not always conceal messages", journal = j-COMPUT-MATH-APPL, volume = "5", number = "3", pages = "169--178", year = "1979", CODEN = "CMAPDK", ISSN = "0898-1221 (print), 1873-7668 (electronic)", ISSN-L = "0898-1221", MRclass = "94B99 (10A25 94A24)", MRnumber = "81e:94026", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/sigcse.bib", fjournal = "Computers \& Mathematics with Applications. An International Journal", remark = "This paper points out that the some keys in the RSA may fail to encrypt: instead, they produce an output ciphertext that is identical to the input plaintext. See also \cite{Smith:1979:UFM,Bergmann:2009:DKR}", } @InProceedings{Blakley:1979:SCK, author = "G. R. Blakley", title = "Safeguarding cryptographic keys", crossref = "Merwin:1979:NCC", pages = "313--317", year = "1979", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL}, \cite[Ref. 2]{Gemmell:1997:ITC}.", xxauthor = "R. Blakley", } @Article{Branstad:1979:VHD, author = "D. Branstad", title = "{V}. `{Hellman}'s data does not support his conclusion'", journal = j-IEEE-SPECTRUM, volume = "16", number = "7", pages = "41--41", month = jul, year = "1979", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1979.6368161", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Mon Jan 20 06:41:24 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib", abstract = "Neither the information obtained by the National Bureau of Standards nor the discussions in Prof. Martin Hellman's paper support his conclusion that the Data Encryption Standard will likely be ``totally insecure within ten years.'", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Algorithm design and analysis; Educational institutions; Encryption; National security; Standards", } @Article{Bright:1979:QRN, author = "Herbert S. Bright and Richard L. Enison", title = "Quasi-Random Number Sequences from a Long-Period {TLP} Generator with Remarks on Application to Cryptography", journal = j-COMP-SURV, volume = "11", number = "4", pages = "357--370", month = dec, year = "1979", CODEN = "CMSVAN", ISSN = "0010-4892", ISSN-L = "0360-0300", bibdate = "Mon Sep 19 21:17:11 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/compsurv.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM Computing Surveys", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204", } @MastersThesis{Chaum:1979:UEM, author = "David Chaum", title = "Untraceable electronic mail, return addresses, and digital pseudonyms", type = "Thesis ({M.S. in Computer Science})", school = "University of California, Berkeley", address = "Berkeley, CA, USA", month = jun, year = "1979", bibdate = "Mon Dec 28 13:41:04 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Culik:1979:SIS, author = "K. {Culik, II} and H. A. Maurer", title = "Secure Information Storage and Retrieval Using New Results in Cryptography", journal = j-INFO-PROC-LETT, volume = "8", number = "4", pages = "181--186", day = "30", month = apr, year = "1979", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "68B15 (68H05)", MRnumber = "80h:68010", MRreviewer = "James W. Snively, Jr.", bibdate = "Tue Nov 17 10:49:43 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/infoproc.bib", acknowledgement = ack-nhfb, classification = "723; C6130 (Data handling techniques)", corpsource = "Dept. of Computer Sci., Univ. of Waterloo, Waterloo, Ont., Canada", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "cryptography; data processing --- Security of Data; encoding; information retrieval; information retrieval systems; information storage; information systems; security of data", } @Article{Davida:1979:IHS, author = "G. I. Davida", title = "{III}. `{Hellman}'s scheme breaks {DES} in its basic form'", journal = j-IEEE-SPECTRUM, volume = "16", number = "7", pages = "39--39", month = jul, year = "1979", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1979.6368159", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Mon Jan 20 06:41:24 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Educational institutions; Electrical engineering; Encryption; National security; Public key", } @Article{Denning:1979:EOS, author = "Peter J. Denning", title = "Editor's Overview --- Special Section on Data Encryption", journal = j-COMP-SURV, volume = "11", number = "4", pages = "283--283", month = dec, year = "1979", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/356789.356791", ISSN = "0010-4892", ISSN-L = "0360-0300", bibdate = "Thu Jun 19 09:25:45 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/surveys/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM Computing Surveys", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204", } @Article{Denning:1979:SPC, author = "Dorothy E. Denning", title = "Secure Personal Computing in an Insecure Network", journal = j-CACM, volume = "22", number = "8", pages = "476--482", month = aug, year = "1979", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", MRclass = "68A05 (68B15 94A99)", MRnumber = "80d:68010", bibdate = "Mon Jan 22 06:35:06 MST 2001", bibsource = "http://dblp.uni-trier.de/db/journals/cacm/cacm22.html#Denning79; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classcodes = "C6130 (Data handling techniques)", corpsource = "Computer Sci. Dept., Purdue Univ., West Lafayette, IN, USA", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "communication links; confidential data; confidential files; encoding; encryption; insecure network; secure personal computing; security of data", oldlabel = "Denning79", treatment = "P Practical", XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Denning79", } @TechReport{Dreher:1979:PSC, author = "Felix F. Dreher", title = "Privacy and security in computer based systems using encryption", type = "Pittsburg State University. School of Business monograph series", number = "7", institution = "Pittsburg State University. Gladys A. Kelce School of Business and Economics.", address = "Pittsburg, KS, USA", pages = "8", year = "1979", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Cover title.", keywords = "Computers --- Access control; Electronic data processing departments --- Security measures", } @Book{Garey:1979:CIG, author = "Michael R. Garey and David S. Johnson", title = "Computers and Intractability: a Guide to the Theory of {NP}-Completeness", publisher = pub-FREEMAN, address = pub-FREEMAN:adr, pages = "x + 338", year = "1979", ISBN = "0-7167-1045-5, 0-7167-1044-7", ISBN-13 = "978-0-7167-1045-5, 978-0-7167-1044-8", bibdate = "Sun Mar 11 10:56:42 2012", bibsource = "https://www.math.utah.edu/pub/bibnet/subjects/acc-stab-num-alg.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Garlinski:1979:IEW, author = "J{\'o}zef Garli{\'n}ski", title = "Intercept: the {Enigma} war", publisher = "J. M. Dent", address = "London, UK", pages = "xx + 219 + 8", year = "1979", ISBN = "0-460-04337-4", ISBN-13 = "978-0-460-04337-3", LCCN = "D810.C88 G37", bibdate = "Tue Sep 4 07:56:36 MDT 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, subject = "World War, 1939-1945; Cryptography", } @Article{Gligor:1979:OMA, author = "V. D. Gligor and B. G. Lindsay", title = "Object Migration and Authentication", journal = j-IEEE-TRANS-SOFTW-ENG, volume = "SE-5", number = "6", pages = "607--611", month = nov # "\slash " # dec, year = "1979", CODEN = "IESEDJ", DOI = "https://doi.org/10.1109/TSE.1979.230196", ISSN = "0098-5589 (print), 1939-3520 (electronic)", ISSN-L = "0098-5589", bibdate = "Thu Feb 1 08:07:37 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng1970.bib", URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1702677", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Software Engineering", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32", } @Article{Good:1979:EWC, author = "I. J. Good", title = "Early Work on Computers at {Bletchley}", journal = j-ANN-HIST-COMPUT, volume = "1", number = "1", pages = "38--48", month = jul # "\slash " # sep, year = "1979", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 1 15:29:16 MST 2002", bibsource = "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib; https://www.math.utah.edu/pub/tex/bib/annhistcomput.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://dlib.computer.org/an/books/an1979/pdf/a1038.pdf; http://www.computer.org/annals/an1979/a1038abs.htm", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", keywords = "Bletchley; Bombe; chessplayers as cryptanalysts; Colossus; cryptanalysis; Enigma; Geheimschreiber; Government Code and Cypher School; history of computers; Turing; Ultra", } @Book{Hardy:1979:ITN, author = "G. H. (Godfrey Harold) Hardy and Edward Maitland Wright", title = "An introduction to the theory of numbers", publisher = pub-CLARENDON, address = pub-CLARENDON:adr, edition = "Fifth", pages = "xvi + 426", year = "1979", ISBN = "0-19-853170-2, 0-19-853171-0 (paperback)", ISBN-13 = "978-0-19-853170-8, 978-0-19-853171-5 (paperback)", LCCN = "QA241 .H28 1979", bibdate = "Fri Jun 24 12:34:44 MDT 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, author-dates = "1877--1947", subject = "Number theory", } @Article{Hellman:1979:MPK, author = "Martin E. Hellman", title = "The Mathematics of Public-Key Cryptography", journal = j-SCI-AMER, volume = "241", number = "2", pages = "146--157 (Intl. ed. 130--139)", month = aug, year = "1979", CODEN = "SCAMAC", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Tue May 19 18:01:43 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classification = "B6120B (Codes); C6130 (Data handling techniques); C6160 (Database management systems (DBMS))", fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", keywords = "computer privacy; cryptography; electronic communications; encoding; encryption; knapsack problem; mathematics; P-NP problem; public key cryptography; public-key cryptosystem; random numbers; security of data; trap-door one-way functions", treatment = "T Theoretical or Mathematical", } @Article{Hellman:1979:WTI, author = "M. E. Hellman", title = "{I}. `{DES} will be totally insecure within ten years'", journal = j-IEEE-SPECTRUM, volume = "16", number = "7", pages = "32--40", month = jul, year = "1979", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1979.6368157", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Mon Jan 20 06:41:24 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Algorithm design and analysis; Computers; Encryption; Standards", } @Manual{Hinsley:1979:BISa, author = "F. H. (Francis Harry) Hinsley and E. E. Thomas", title = "{British} intelligence in the {Second World War}: its influence on strategy and operations", publisher = "H.M. Stationery Office", address = "London, UK", pages = "various", year = "1979", ISBN = "0-11-630933-4 (vol. 1)", ISBN-13 = "978-0-11-630933-4 (vol. 1)", LCCN = "D810.S7 H49 1979b v.1-2 (1979--1981)", bibdate = "Mon Nov 4 07:46:57 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Vol. 3, pt. 2 has additional author C. A. G. Simkins.", price = "UK\pounds10.00 (vol. 1)", series = "History of the Second World War", acknowledgement = ack-nhfb, keywords = "Great Britain --- history --- George VI, 1936--1952; World War, 1939--1945 --- secret service --- Great Britain", } @Book{Hinsley:1979:BISb, author = "F. H. (Francis Harry) Hinsley and Michael Eliot Howard", title = "{British} intelligence in the {Second World War}: its influence on strategy and operations", publisher = pub-CUP, address = pub-CUP:adr, pages = "various", year = "1979", ISBN = "0-521-22940-5 (vol. 1)", ISBN-13 = "978-0-521-22940-1 (vol. 1)", LCCN = "D810.S7 H47 1979b", bibdate = "Mon Nov 4 07:46:57 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Vols. 3-4 in series: History of the Second World War. Vol. 4 has subtitle: Security and counter-intelligence; Vol. 5 has subtitle: Strategic deception.", acknowledgement = ack-nhfb, contents = "v. 1-3. Its influence on strategy and operations --- v. 5. Strategic deception", keywords = "World War, 1939--1945; World War, 1939--1945 --- secret service --- Great Britain", } @Book{IRD:1979:DVE, author = "{International Resource Development, Inc.}", title = "Data and voice encryption", publisher = "International Resource Development", address = "New Canaan, CT, USA", pages = "iv + 124", year = "1979", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography equipment industry --- United States; Market surveys --- United States.", } @Article{Kahn:1979:CGP, author = "David Kahn", title = "Cryptology goes public", journal = "Foreign affairs (Council on Foreign Relations)", volume = "58", number = "1", publisher = "Council on Foreign Relations", address = "New York, NY, USA", pages = "141--159", month = "Fall", year = "1979", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Caption title. Detached from Foreign affairs, v. 58, no. 1, fall 1979.", keywords = "Ciphers; Cryptography", } @Article{Kam:1979:SDS, author = "John B. Kam and George I. Davida", title = "Structured design of substitution-permutation encryption networks", journal = j-IEEE-TRANS-COMPUT, volume = "28", number = "10", pages = "747--753", year = "1979", CODEN = "ITCOB4", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", MRclass = "68B15 (68H05)", MRnumber = "80h:68013", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", fjournal = "Institute of Electrical and Electronics Engineers. Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @Article{Knoble:1979:AEO, author = "H. D. Knoble", title = "{Algorithm 536}: An Efficient One-Way Enciphering Algorithm [{Z}]", journal = j-TOMS, volume = "5", number = "1", pages = "108--111", month = mar, year = "1979", CODEN = "ACMSCU", DOI = "https://doi.org/10.1145/355815.355823", ISSN = "0098-3500 (print), 1557-7295 (electronic)", ISSN-L = "0098-3500", bibdate = "Sat Aug 27 23:58:53 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM Transactions on Mathematical Software", journal-URL = "http://portal.acm.org/toc.cfm?idx=J782", } @Article{Knoble:1979:EOW, author = "H. D. Knoble and C. {Forney, Jr.} and F. S. Bader", title = "An Efficient One-Way Enciphering Algorithm", journal = j-TOMS, volume = "5", number = "1", pages = "97--107", month = mar, year = "1979", CODEN = "ACMSCU", DOI = "https://doi.org/10.1145/355815.355822", ISSN = "0098-3500 (print), 1557-7295 (electronic)", ISSN-L = "0098-3500", bibdate = "Sat Aug 27 23:13:25 1994", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM Transactions on Mathematical Software", journal-URL = "http://portal.acm.org/toc.cfm?idx=J782", } @Article{Leighton:1979:BRA, author = "Albert C. Leighton", title = "Book Review: {{\booktitle{An annotated bibliography of cryptography}}: By David Shulman. Garland Reference Library of the Humanities, Vol. 37 New York\slash London (Garland Publishing Inc.). 1976. xvi + 372 pp. illus. \$35.00}", journal = j-HIST-MATH, volume = "6", number = "2", pages = "213--218", month = may, year = "1979", CODEN = "HIMADS", ISSN = "0315-0860 (print), 1090-249X (electronic)", ISSN-L = "0315-0860", bibdate = "Wed Jun 26 06:17:09 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/histmath.bib", URL = "http://www.sciencedirect.com/science/article/pii/0315086079900934", acknowledgement = ack-nhfb, fjournal = "Historia Mathematica", journal-URL = "http://www.sciencedirect.com/science/journal/03150860/", } @Article{Leighton:1979:BRB, author = "Albert C. Leighton", title = "Book Review: {{\booktitle{An annotated bibliography of cryptography}}: By David Shulman. Garland Reference Library of the Humanities, Vol. 37 New York\slash London (Garland Publishing Inc.). 1976. xvi + 372 pp. illus. \$35.00}", journal = j-HIST-MATH, volume = "6", number = "2", pages = "213--218", month = may, year = "1979", CODEN = "HIMADS", ISSN = "0315-0860 (print), 1090-249X (electronic)", ISSN-L = "0315-0860", bibdate = "Wed Jun 26 06:17:09 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/histmath.bib", URL = "http://www.sciencedirect.com/science/article/pii/0315086079900934", acknowledgement = ack-nhfb, fjournal = "Historia Mathematica", journal-URL = "http://www.sciencedirect.com/science/journal/03150860", } @Article{Lempel:1979:CT, author = "Abraham Lempel", title = "Cryptology in Transition", journal = j-COMP-SURV, volume = "11", number = "4", pages = "285--303", month = dec, year = "1979", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/356789.356792", ISSN = "0010-4892", ISSN-L = "0360-0300", bibdate = "Thu Jun 19 09:25:45 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/surveys/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM Computing Surveys", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204", } @Article{Lu:1979:EGC, author = "Shyue Ching Lu", title = "The existence of good cryptosystems for key rates greater than the message redundancy", journal = j-IEEE-TRANS-INF-THEORY, volume = "25", number = "4", pages = "475--477", year = "1979", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1979.1056061", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", MRclass = "94B99", MRnumber = "80g:94069a", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "IEEE Transactions on Information Theory", } @MastersThesis{Ma:1979:RAD, author = "Robert Ma", title = "Review and analysis of the {Data Encryption Standard}", type = "Master of Science, Plan II.", school = "Department of Electrical Engineering and Computer Sciences, University of California, Berkeley", address = "Berkeley, CA, USA", pages = "70", year = "1979", LCCN = "TK7 .U5 1979:1:M-N", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Matyas:1979:DSO, author = "Stephen M. Matyas", title = "Digital Signatures --- an Overview", journal = j-COMP-NET, volume = "3", number = "2", pages = "87--94", month = apr, year = "1979", CODEN = "CNETDP", ISSN = "0376-5075", ISSN-L = "0376-5075", bibdate = "Sat Sep 25 18:04:41 MDT 1999", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, affiliation = "IBM, Kingston, NY", classification = "723", fjournal = "Computer Networks", journalabr = "Comput Networks", keywords = "data processing; digital signatures", } @Article{Peleg:1979:BSC, author = "Shmuel Peleg and Azriel Rosenfeld", title = "Breaking Substitution Ciphers Using a Relaxation Algorithm", journal = j-CACM, volume = "22", number = "11", pages = "598--605", month = nov, year = "1979", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Jan 22 07:12:05 MST 2001", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib; http://dblp.uni-trier.de/db/journals/cacm/cacm22.html#PelegR79; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classcodes = "C1230 (Artificial intelligence)", corpsource = "Univ. of Maryland, College Park, MD, USA", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "artificial intelligence; computer security; cryptography; decoding; joint letter probabilities; letters; plaintext; relaxation; relaxation algorithm; substitution ciphers; updating scheme", oldlabel = "PelegR79", ort = "ordner sicherheit", treatment = "T Theoretical or Mathematical", XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/PelegR79", } @Article{Popek:1979:ESC, author = "Gerald J. Popek and Charles S. Kline", title = "Encryption and Secure Computer Networks", journal = j-COMP-SURV, volume = "11", number = "4", pages = "331--356", month = dec, year = "1979", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/356789.356794", ISSN = "0010-4892", ISSN-L = "0360-0300", bibdate = "Thu Jun 19 09:25:45 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/surveys/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM Computing Surveys", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204", } @InCollection{Reeds:1979:CMC, author = "James Reeds", booktitle = "Information linkage between applied mathematics and industry (Proc. First Annual Workshop, Naval Postgraduate School, Monterey, Calif., 1978)", title = "Cracking a multiplicative congruential encryption algorithm", publisher = pub-ACADEMIC, address = pub-ACADEMIC:adr, pages = "467--472", year = "1979", MRclass = "94B99 (65C10)", MRnumber = "80h:94040", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", } @Article{Rivest:1979:CRC, author = "Ronald L. Rivest", title = "Critical remarks on: {``Critical remarks on some public-key cryptosystems'' [BIT {\bf 18}(4), 1978, pp. 493--496; MR 80b:94033 ] by Tore Herlestam}", journal = j-BIT, volume = "19", number = "2", pages = "274--275", month = jun, year = "1979", CODEN = "NBITAB", DOI = "https://doi.org/10.1007/BF01930859", ISSN = "0006-3835 (print), 1572-9125 (electronic)", ISSN-L = "0006-3835", MRclass = "94B99 (68B99)", MRnumber = "80m:94070", MRreviewer = "M. C. Cheng", bibdate = "Wed Jan 4 18:52:16 MST 2006", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=19&issue=2; https://www.math.utah.edu/pub/tex/bib/bit.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See \cite{Herlestam:1978:CRS}.", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=19&issue=2&spage=274", acknowledgement = ack-nhfb, fjournal = "BIT; Nordisk Tidskrift for Informationsbehandling (BIT)", journal-URL = "http://link.springer.com/journal/10543", } @Article{Rubin:1979:DSC, author = "F. Rubin", title = "Decrypting a Stream Cipher Based on {J}--{K} Flip-Flops", journal = j-IEEE-TRANS-COMPUT, volume = "C-28", number = "7", pages = "483--487", month = jul, year = "1979", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/TC.1979.1675392", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", bibdate = "Mon Jul 11 06:49:39 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranscomput1970.bib", URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1675392", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @Article{Shamir:1979:HSS, author = "Adi Shamir", title = "How to Share a Secret", journal = j-CACM, volume = "22", number = "11", pages = "612--613", month = nov, year = "1979", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", MRclass = "94B99 (68E99)", MRnumber = "80g:94070", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib; https://www.math.utah.edu/pub/tex/bib/cacm1970.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "protection against loss of keys by dividing the data into pieces.", classcodes = "C6130 (Data handling techniques)", corpsource = "MIT, Cambridge, MA, USA", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "computer security; cryptographic systems; cryptography; encoding; key management; robust key management schemes; security breaches; security of data", ort = "ordner sicherheit", referencedin = "Referenced in \cite[Ref. 38]{Gemmell:1997:ITC}, \cite[Ref. 26]{Canetti:1997:PSL}.", treatment = "P Practical; T Theoretical or Mathematical", } @InProceedings{Simmons:1979:CCA, author = "Gustavus J. Simmons", booktitle = "Proceedings of the Eighth Manitoba Conference on Numerical Mathematics and Computing (Univ. Manitoba, Winnipeg, Man., 1978)", title = "Computational complexity and asymmetric encryption", publisher = pub-UTILITAS-MATH, address = pub-UTILITAS-MATH:adr, pages = "65--93", year = "1979", MRclass = "68B15 (68C25 94B99)", MRnumber = "80h:68017", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", series = "Congress. Numer., XXII", } @InProceedings{Simmons:1979:HID, author = "G. J. Simmons", editor = "{IEEE}", booktitle = "{IEEE} {EASCON '79}, Washington, {DC, 1979}", title = "How to Insure that Data Acquired to Verify Treaty Compliance are Trustworthy", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "661--662", year = "1979", ISBN = "????", ISBN-13 = "????", LCCN = "????", bibdate = "Thu Jan 21 14:46:12 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Simmons:1979:SAE, author = "Gustavus J. Simmons", title = "Symmetric and Asymmetric Encryption", journal = j-COMP-SURV, volume = "11", number = "4", pages = "305--330", month = dec, year = "1979", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/356789.356793", ISSN = "0010-4892", ISSN-L = "0360-0300", bibdate = "Thu Jun 19 09:25:45 MDT 2008", bibsource = "http://www.acm.org/pubs/contents/journals/surveys/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM Computing Surveys", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204", } @Article{Smith:1979:UFM, author = "Donald R. Smith and James T. Palmer", title = "Universal fixed messages and the {Rivest--Shamir--Adleman} cryptosystem", journal = j-MATHEMATIKA, volume = "26", number = "1", pages = "44--52", year = "1979", CODEN = "MTKAAB", ISSN = "0025-5793", MRclass = "94B99", MRnumber = "80m:94071", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib; https://www.math.utah.edu/pub/tex/bib/sigcse.bib", fjournal = "Mathematika. A Journal of Pure and Applied Mathematics", remark = "This paper points out that the some keys in the RSA may fail to encrypt: instead, they produce an output ciphertext that is identical to the input plaintext. See also \cite{Blakley:1979:RSA,Bergmann:2009:DKR}", } @Article{Snyder:1979:IUC, author = "Samuel S. Snyder", title = "Influence of {U.S. Cryptologic Organizations} on the digital computer industry", journal = j-J-SYST-SOFTW, volume = "1", number = "1", pages = "87--102", month = "????", year = "1979", CODEN = "JSSODM", ISSN = "0164-1212", ISSN-L = "0164-1212", bibdate = "Wed Sep 8 07:38:41 MDT 2010", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; http://www.sciencedirect.com/science/journal/01641212", acknowledgement = ack-nhfb, fjournal = "The Journal of systems and software", journal-URL = "http://www.sciencedirect.com/science/journal/01641212", } @Article{Tuchman:1979:HPN, author = "W. Tuchman", title = "{Hellman} presents no shortcut solutions to {DES}", journal = j-IEEE-SPECTRUM, volume = "16", number = "7", pages = "40--41", month = jul, year = "1979", CODEN = "IEESAM", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", referencedin = "Referenced in \cite[Ref. 25]{Biham:1998:TA}.", } @Article{Tuchman:1979:IHP, author = "W. Tuchman", title = "{IV}. `{Hellman} presents no shortcut solutions to the {DES}'", journal = j-IEEE-SPECTRUM, volume = "16", number = "7", pages = "40--41", month = jul, year = "1979", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1979.6368160", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Mon Jan 20 06:41:24 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Algorithm design and analysis; Computers; Educational institutions; Encryption; Standards", } @TechReport{USNA:1979:CS, author = "{United States.National Archives and Records Service}", title = "Cryptology studies", type = "Records of the National Security Agency", number = "RG457", institution = "National Archives of the United States", address = "Washington, DC, USA", pages = "??", year = "1979", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "reel 1. Studies SRH002-007.--reel 2. Studies SRM026, SRM028-037.-- reel 3. Studies SRH-001, SRH-038.", keywords = "Ciphers; Cryptography; World War, 1939-1945 --- Cryptography.", } @Book{USNSG:1979:IRW, author = "{United States.Naval Security Group}", title = "Intelligence reports on the war in the {Atlantic}, 1942--1945: the account of the war in the {Atlantic} from {Dec. 1942} to {May 1945} as seen through and influenced by decryption of {German} naval radio traffic: [guide]", publisher = "Michael Glazier", address = "Wilmington, DE, USA", pages = "6", year = "1979", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Microfilm (positive). v. 1. Allied communication intelligence and the battle of the Atlantic.--v.2. U-boat operations.--v. 3. German naval communications intelligence.--v. 4. Technical intelligence from Allied C.I. Released by the Department of the Navy, Naval Security Group Command Headquarters. v. 1. Allied communication intelligence and the battle of the Atlantic.--v.2. U-boat operations.--v. 3. German naval communications intelligence.--v. 4. Technical intelligence from Allied C.I.", keywords = "Cipher and telegraph codes; Germany. --- Kriegsmarine --- Communication systems; World War, 1939--1945 --- Atlantic Ocean; World War, 1939--1945 --- Communications, Military; World War, 1939--1945 --- Cryptography; World War, 1939--1945 --- Naval operations, American; World War, 1939--1945 --- Naval operations, German; World War, 1939-1945 --- Atlantic Ocean", } @Book{Weber:1979:USD, author = "Ralph Edward Weber", title = "{United States} Diplomatic Codes and Ciphers, 1775--1938", publisher = "Precedent Publishing", address = "Chicago, IL, USA", pages = "xviii + 633", year = "1979", ISBN = "0-913750-20-4", ISBN-13 = "978-0-913750-20-9", LCCN = "Z103 .W4", bibdate = "Tue Dec 01 10:53:24 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", price = "US\$49.95", acknowledgement = ack-nhfb, } @Article{Williams:1979:CAA, author = "P. W. Williams and D. Woodhead", title = "Computer assisted analysis of cryptic crosswords", journal = j-COMP-J, volume = "22", number = "1", pages = "67--70", month = feb, year = "1979", CODEN = "CMPJA6", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Tue Mar 25 13:51:56 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/compj1970.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classcodes = "C7830D (Computer games)", corpsource = "Computation Dept., Univ. of Manchester, Manchester, UK", fjournal = "The Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", keywords = "BNF type definition; computer analysis program; cryptic crosswords; games of skill; language LACROSS; personal computing", treatment = "A Application; P Practical", } @Article{Williams:1979:SRC, author = "H. C. Williams and B. Schmid", title = "Some remarks concerning the {M.I.T.} public-key cryptosystem", journal = j-BIT, volume = "19", number = "4", pages = "525--538", month = dec, year = "1979", CODEN = "BITTEL, NBITAB", DOI = "https://doi.org/10.1007/BF01931269", ISSN = "0006-3835 (print), 1572-9125 (electronic)", ISSN-L = "0006-3835", MRclass = "94B99", MRnumber = "80m:94072", bibdate = "Wed Jan 4 18:52:16 MST 2006", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=19&issue=4; https://www.math.utah.edu/pub/tex/bib/bit.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=19&issue=4&spage=525", acknowledgement = ack-nhfb, fjournal = "BIT; Nordisk Tidskrift for Informationsbehandling (BIT)", journal-URL = "http://link.springer.com/journal/10543", referencedin = "Referenced in \cite[Ref. 25]{Kaliski:1995:SUR}.", } @Manual{Zeidler:1979:DDE, author = "Howard M. Zeidler", title = "Digital data encryption", organization = pub-SRI, address = pub-SRI:adr, pages = "20", year = "1979", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Guidelines - SRI International, Business Intelligence Program; no. 1044 Guidelines (Business Intelligence Program (SRI International)); no. 1044", acknowledgement = ack-nhfb, annote = "Cover title.", keywords = "Computers --- Access control --- Passwords; Data encryption (Computer science)", } @PhdThesis{Andelman:1980:MLE, author = "Dov Andelman", title = "Maximum likelihood estimation applied to cryptanalysis", type = "Thesis ({Ph.D.})", school = "Department of Electrical Engineering, Stanford University", address = "Stanford, CA, USA", pages = "viii + 167", year = "1980", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography; Maxima and minima.", } @TechReport{Anonymous:1980:ACS, author = "Anonymous", title = "An Assessment of civil sector uses of digital data encryption", number = "", institution = "Department of Engineering and Public Policy, Department of Social Sciences and School of Urban and Public Affairs, Carnegie-Mellon University", address = "Pittsburgh, PA, USA", pages = "128", month = nov, year = "1980", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Draft version produced in April 1980, final revised version produced November 1980.", keywords = "Computers --- Access control; Digital communications; Electronic data processing departments --- Security measures.", } @Book{Bennett:1980:UWN, author = "Ralph Francis Bennett", title = "{Ultra} in the {West}: the {Normandy} campaign, 1944--45", publisher = "Scribner", address = "New York, NY, USA", pages = "xvi + 336", year = "1980", ISBN = "0-684-16704-2", ISBN-13 = "978-0-684-16704-6", LCCN = "D756.5.N6 B44 1980", bibdate = "Mon May 8 07:06:44 MDT 2006", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", price = "US\$17.50", acknowledgement = ack-nhfb, subject = "World War, 1939--1945; Campaigns; France; Normandy; Cryptography; Secret Service; Great Britain; Normandy (France); History", } @Article{Berstis:1980:SPD, author = "Viktors Berstis", title = "Security and protection of data in the {IBM System\slash 38}", journal = j-COMP-ARCH-NEWS, volume = "8", number = "3", pages = "245--252", year = "1980", CODEN = "CANED2", ISSN = "0163-5964 (print), 1943-5851 (electronic)", ISSN-L = "0163-5964", bibdate = "Fri May 12 16:54:57 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGARCH Computer Architecture News", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J89", } @Article{Book:1980:UDC, author = "R. V. Book and Sai Choi Kwan", title = "On Uniquely Decipherable Codes with Two Codewords", journal = j-IEEE-TRANS-COMPUT, volume = "C-29", number = "4", pages = "324--325", month = apr, year = "1980", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/TC.1980.1675571", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", bibdate = "Sun Jul 10 19:15:25 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib", URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1675571", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @Book{Calvocoressi:1980:TSU, author = "Peter Calvocoressi", title = "Top secret ultra", publisher = "Pantheon Books", address = "New York, NY, USA", pages = "132", year = "1980", ISBN = "0-394-51154-9", ISBN-13 = "978-0-394-51154-2", LCCN = "D810.C88C34 1980", bibdate = "Tue Dec 01 08:23:32 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Misc{Diffie:1980:CAM, author = "B. W. Diffie and M. E. Hellman and R. C. Merkle", title = "Cryptographic Apparatus and Method", howpublished = "US Patent No. 4,200,770A.", day = "29", month = apr, year = "1980", bibdate = "Sat Nov 29 13:44:46 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Patent filed 6 September 1977.", URL = "https://www.google.com/patents/US4200770", abstract = "A cryptographic system transmits a computationally secure cryptogram over an insecure communication channel without prearrangement of a cipher key. A secure cipher key is generated by the conversers from transformations of exchanged transformed signals. The conversers each possess a secret signal and exchange an initial transformation of the secret signal with the other converser. The received transformation of the other converser's secret signal is again transformed with the receiving converser's secret signal to generate a secure cipher key. The transformations use non-secret operations that are easily performed but extremely difficult to invert. It is infeasible for an eavesdropper to invert the initial transformation to obtain either conversers' secret signal, or duplicate the latter transformation to obtain the secure cipher key.", acknowledgement = ack-nhfb, } @Article{Estell:1980:BW, author = "Robert G. Estell", title = "Benchmarks and watermarks", journal = j-SIGMETRICS, volume = "9", number = "3", pages = "39--44", month = "Fall", year = "1980", CODEN = "????", DOI = "https://doi.org/10.1145/1041883.1041885", ISSN = "0163-5999 (print), 1557-9484 (electronic)", ISSN-L = "0163-5999", bibdate = "Thu Jun 26 10:55:53 MDT 2008", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "Historically, benchmark tests have been one of several ways to size a computer system, and measure its performance. Today, it is more important to test the System Software than the machine hardware. (Thus the term `watermark' (as on bond paper) for software tests.) Watermarks of software suffer the same limitations and risks as benchmarks of hardware: e.a., they should be supplemented with simulations, models, and other analysis and design tools of our trade. Perhaps most significantly, watermarks, like benchmarks, can be biased by their creators.", acknowledgement = ack-nhfb, fjournal = "ACM SIGMETRICS Performance Evaluation Review", journal-URL = "http://portal.acm.org/toc.cfm?id=J618", } @TechReport{Gait:1980:CST, author = "Jason Gait", title = "Computer science and technology: maintenance testing for the {Data Encryption Standard}", type = "United States. National Bureau of Standards Special publication", number = "500-61", institution = pub-NBS, address = pub-NBS:adr, pages = "25", year = "1980", ISSN = "0083-1883", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Manual{Gait:1980:MTD, author = "Jason Gait", title = "Maintenance testing for the {Data Encryption Standard}", volume = "500-61", number = "500-61", organization = pub-NBS, address = pub-NBS:adr, pages = "iii + 25", month = aug, year = "1980", CODEN = "XNBSAV", LCCN = "T1.U52 no.500-61", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "NBS special publication Computer science and technology", acknowledgement = ack-nhfb, govtdocnumber = "C 13.10:500-61 247", keywords = "computers --- access control; Computers --- Access control --- Passwords; cryptography --- data processing; Cryptography --- Data processing; Data encryption (Computer science); Electronic data processing departments --- Security measures; electronic data processing departments --- security measures; Monte Carlo method", } @Manual{Gait:1980:VCH, author = "Jason Gait", title = "Validating the correctness of hardware implementations of the {NBS Data Encryption Standard}", number = "500-20", organization = pub-USGPO, address = pub-USGPO:adr, pages = "iv + 40", year = "1980", LCCN = "C 13.10:500-20/2 Government Information U.S.", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", price = "US\$2.25 (paperback)", series = "NBS special publication. Computer science and technology", acknowledgement = ack-nhfb, keywords = "Computers --- Access control --- Code words; computers --- access control --- code words; computers --- testing; Computers --- Testing; Data encryption (Computer science); data encryption (computer science); Monte Carlo method", } @Book{Garlinski:1980:EW, author = "J{\'o}zef Garli{\'n}ski", title = "The {Enigma} war", publisher = "Scribner", address = "New York, NY, USA", pages = "xx + 219 + 8", year = "1980", ISBN = "0-684-15866-3", ISBN-13 = "978-0-684-15866-2", LCCN = "D810.S7 G32 1980", bibdate = "Tue Sep 4 06:00:21 MDT 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", price = "US\$14.95", acknowledgement = ack-nhfb, remark = "Original British edition \cite{Garlinski:1979:IEW}.", subject = "World War, 1939-1945; Secret service; Cryptography", } @Article{Goethals:1980:CAL, author = "J.-M. Goethals and C. Couvreur", title = "A cryptanalytic attack on the {Lu-Lee} public-key cryptosystem", journal = j-PHILIPS-J-RES, volume = "35", number = "4-5", pages = "301--306", year = "1980", CODEN = "PHJRD9", ISSN = "0165-5817", ISSN-L = "0165-5817", MRclass = "94A99", MRnumber = "82b:94018", MRreviewer = "Tai Yang Hwang", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Philips Journal of Research", } @Article{Gudes:1980:DCB, author = "E. Gudes", title = "The Design of a Cryptography Based Secure File System", journal = j-IEEE-TRANS-SOFTW-ENG, volume = "SE-6", number = "5", pages = "411--420", month = sep # "\slash " # oct, year = "1980", CODEN = "IESEDJ", DOI = "https://doi.org/10.1109/TSE.1980.230489", ISSN = "0098-5589 (print), 1939-3520 (electronic)", ISSN-L = "0098-5589", bibdate = "Thu Feb 1 08:07:37 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng1980.bib", URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1702757", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Software Engineering", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32", } @Book{Hamming:1980:CIT, author = "R. W. (Richard Wesley) Hamming", title = "Coding and information theory", publisher = pub-PH, address = pub-PH:adr, pages = "xii + 239", year = "1980", ISBN = "0-13-139139-9", ISBN-13 = "978-0-13-139139-0", LCCN = "QA268 .H35 1980", bibdate = "Fri Jun 24 21:02:55 MDT 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", price = "US\$19.95", acknowledgement = ack-nhfb, subject = "Coding theory; Information theory", } @MastersThesis{Hood:1980:EFS, author = "William Chester Hood", title = "Encryption as a file security measure in large operating systems", type = "Thesis ({M.S.})", school = "University of Tennessee, Knoxville", address = "Knoxville, TN, USA", pages = "iv + 116", year = "1980", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "[103]-112.", keywords = "Computers --- Access control.", } @TechReport{Knuth:1980:DLC, author = "Donald E. Knuth", title = "Deciphering a linear congruential encryption", type = "Report", number = "024800", institution = "Department of Computer Science, Stanford University", address = "Stanford, CA, USA", year = "1980", bibdate = "Wed Feb 22 13:51:32 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", acknowledgement = ack-nhfb, remark = "Published in \cite{Knuth:1985:DLC}.", } @Article{Konheim:1980:ICP, author = "Alan G. Konheim and Marian H. Mack and Robert K. McNeill and Bryant Tuckerman and Gerald Waldbaum", title = "The {IPS} Cryptographic Programs", journal = j-IBM-SYS-J, volume = "19", number = "2", pages = "253--283", year = "1980", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Wed Jan 08 16:35:07 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib", abstract = "Cryptographic methods of data protection have taken on new importance as computers have become faster and as strong cryptographic algorithms, such as the Data Encryption Standard (DES), have become available. But a standard encipherment technique is only the first step in applying cryptography in a computing center. This paper discusses the Information Protection System (IPS), a set of cryptographic application programs designed to use the DES algorithm in a working computing center. In designing IPS, several important augmentations of DES were formulated.", acknowledgement = ack-nhfb, classification = "723", fjournal = "IBM Systems Journal", journalabr = "IBM Syst J", keywords = "data processing; information protection system", } @Article{Leiss:1980:NSS, author = "E. Leiss", title = "A note on a signature system based on probabilistic logic", journal = j-INFO-PROC-LETT, volume = "11", number = "2", pages = "110--113", day = "??", month = oct, year = "1980", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classification = "C4210 (Formal logic); C6130 (Data handling techniques)", corpsource = "Dept. of Computer Sci., Univ. of Houston, Houston, TX, USA", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", keywords = "data privacy; digitalised signature system; probabilistic logic; requirements", treatment = "A Application", } @Article{Lu:1980:AEG, author = "Shyue Ching Lu", title = "Addition to: {``The existence of good cryptosystems for key rates greater than the message redundancy'' [IEEE Trans. Inform. Theory {\bf 25} (1979), no. 4, 475--477;\ MR 80g:94069]}", journal = j-IEEE-TRANS-INF-THEORY, volume = "26", number = "1", pages = "129--129", year = "1980", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1980.1056129", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", MRclass = "94B99", MRnumber = "80g:94069b", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "IEEE Transactions on Information Theory", } @Article{Luccio:1980:CMC, author = "F. Luccio and S. Mazzone", title = "A cryptosystem for multiple communication", journal = j-INFO-PROC-LETT, volume = "10", number = "4--5", pages = "180--183", day = "5", month = jul, year = "1980", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Tue Nov 17 10:49:43 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See notes \cite{Meijer:1981:NCM,Hellman:1981:ACA}.", acknowledgement = ack-nhfb, classification = "723; B6120B (Codes); B6210L (Computer communications); C5620 (Computer networks and techniques); C6130 (Data handling techniques)", corpsource = "Univ. of Pisa, Pisa, Italy", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "authentication; computer networks; cryptosystem; cryptosystems; data transmission; encoding; multiple communication; security of data", treatment = "P Practical", } @InProceedings{Merkle:1980:PPK, author = "R. C. Merkle", title = "Protocols for public key cryptosystems", crossref = "IEEE:1980:PSS", pages = "??--??", year = "1980", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 22]{Goldreich:1997:FMCb}.", } @Manual{NBS:1980:MO, author = "{National Bureau of Standards}", title = "{DES} Modes of Operation", volume = "81", organization = "U. S. Department of Commerce", address = "Washington, DC, USA", pages = "16", month = dec, year = "1980", LCCN = "C 13.52:81", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Federal information processing standards publication", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 22]{Biham:1998:TA}.", xxISBN = "none", } @Book{Pearcey:1980:EDS, author = "T. (Trevor) Pearcey", title = "Encryption in data systems and communication", publisher = "Caulfield Institute of Technology. Computer Abuse Research and Bureau (CITCARB)", address = "Caulfield, Victoria, Australia", pages = "99", year = "1980", ISBN = "0-909176-14-0", ISBN-13 = "978-0-909176-14-3", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Cover title. At head of title: Caulfield Institute of Technology. CITCARB. [1]-10.", keywords = "Cryptography; Data transmission systems --- Security measures", } @Article{Pomerance:1980:P, author = "Carl Pomerance and J. L. Selfridge and Samuel S. {Wagstaff, Jr.}", title = "The Pseudoprimes to $ 25 \cdot 10^9 $", journal = j-MATH-COMPUT, volume = "35", number = "151", pages = "1003--1026", month = jul, year = "1980", CODEN = "MCMPAF", ISSN = "0025-5718 (print), 1088-6842 (electronic)", ISSN-L = "0025-5718", MRclass = "10A40 (10-04 10A25)", MRnumber = "82g:10030", bibdate = "Tue Oct 13 08:06:19 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, classcodes = "B0210 (Algebra); C1110 (Algebra)", corpsource = "Dept. of Math., Univ. of Illinois, Urbana, IL, USA", fjournal = "Mathematics of Computation", journal-URL = "http://www.ams.org/mcom/", keywords = "Carmichael numbers; counting function; Lucas sequences; mathematical analysis; primality; pseudoprimes", referencedin = "Referenced in \cite[Ref. 9]{Silverman:1997:FGR}.", treatment = "T Theoretical or Mathematical", } @Book{Pritchard:1980:DE, author = "John Arthur Thomas (John A. T.) Pritchard", title = "Data encryption", publisher = pub-NAT-COMP-CENTRE, address = pub-NAT-COMP-CENTRE:adr, pages = "126 (or 118??)", year = "1980", ISBN = "0-85012-253-8", ISBN-13 = "978-0-85012-253-4", LCCN = "QA76.9.A25 P7", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "and bibliographies.", keywords = "Computers --- Access control --- Passwords.", } @Book{Pronzini:1980:MCC, author = "Bill Pronzini", title = "Mummy!: a chrestomathy of crypt-ology", publisher = "Arbor House", address = "New York, NY, USA", pages = "xii + 273", year = "1980", ISBN = "0-87795-271-X", ISBN-13 = "978-0-87795-271-8", LCCN = "PN 6120.95 M77 M86 1980", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Contents: Doyle, A.C. Lot no. 249.--Poe, E.A. Some words with a mummy.--Benson, E.F. Monkeys.--Wollheim, D.A. Bones.--Williams, T. The vengeance of Nitocris.--Gautier, T. The mummy's foot.--Bloch, R. The eyes of the mummy.--Powell, T. Charlie.--Hoch, E.D. The weekend magus.--Lansdale, J.R. The princess.--Mayhar, A. The eagle-claw rattle.--Grant, C.L. The other room.--Malzberg, B.N. Revelation in seven stages.--Bibliography.", price = "US\$10.95", acknowledgement = ack-nhfb, keywords = "mummies --- fiction", } @Article{Rivest:1980:DSC, author = "R. L. Rivest", title = "A description of a single-chip implementation of the {RSA} cipher", journal = "Lambda: the magazine of {VLSI} design", volume = "1", number = "3", pages = "14--18", month = "Fourth Quarter", year = "1980", CODEN = "VDESDP", ISSN = "0273-8414", ISSN-L = "0273-8414", bibdate = "Thu Aug 21 06:25:34 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Shulman:1980:BRB, author = "David Shulman", title = "Book Review: {{\booktitle{United States diplomatic codes and ciphers 1775--1938}}: By Ralph E. Weber. Chicago. xviii + 633 pp. Illus. \$49.95}", journal = j-HIST-MATH, volume = "7", number = "4", pages = "452--454", month = nov, year = "1980", CODEN = "HIMADS", ISSN = "0315-0860 (print), 1090-249X (electronic)", ISSN-L = "0315-0860", bibdate = "Wed Jun 26 06:17:21 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/histmath.bib", URL = "http://www.sciencedirect.com/science/article/pii/0315086080900142", acknowledgement = ack-nhfb, fjournal = "Historia Mathematica", journal-URL = "http://www.sciencedirect.com/science/journal/03150860", } @Article{Shulman:1980:BRU, author = "David Shulman", title = "Book Review: {{\booktitle{United States diplomatic codes and ciphers 1775--1938}}: By Ralph E. Weber. Chicago. xviii + 633 pp. Illus. \$49.95}", journal = j-HIST-MATH, volume = "7", number = "4", pages = "452--454", month = nov, year = "1980", CODEN = "HIMADS", ISSN = "0315-0860 (print), 1090-249X (electronic)", ISSN-L = "0315-0860", bibdate = "Wed Jun 26 06:17:21 MDT 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/histmath.bib", URL = "http://www.sciencedirect.com/science/article/pii/0315086080900142", acknowledgement = ack-nhfb, fjournal = "Historia Mathematica", journal-URL = "http://www.sciencedirect.com/science/journal/03150860/", } @Article{Snyder:1980:CAP, author = "Samuel S. Snyder", title = "Computer Advances Pioneered by Cryptologic Organizations", journal = j-ANN-HIST-COMPUT, volume = "2", number = "1", pages = "60--70", month = jan # "\slash " # mar, year = "1980", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 1 15:29:17 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://dlib.computer.org/an/books/an1980/pdf/a1060.pdf; http://www.computer.org/annals/an1980/a1060abs.htm", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @MastersThesis{Sorkis:1980:USM, author = "Michael Sorkis", title = "Use of statistically matched codes in a data encryption system", type = "Thesis ({M.S.})", school = "Southern Illinois University at Carbondale", address = "Carbondale, IL, USA", pages = "v + 91", year = "1980", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @Book{USWD:1980:EC, author = "{United States.War Dept} and {United States.Adjutant-General's Office}", title = "Elements of cryptanalysis", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "165", year = "1980", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Training pamphlet; no. 3 War Dept document; no. 117 Training pamphlet (United States. War Dept.); no. 3. Document (United States. War Dept.); no. 117", acknowledgement = ack-nhfb, annote = "Photocopy.", keywords = "Ciphers; Cryptography.", } @Article{Voukalis:1980:DFC, author = "D. C. Voukalis", title = "The distance factor in cryptosystems", journal = j-INT-J-ELECTRON, volume = "49", number = "1", pages = "73--75", year = "1980", CODEN = "IJELA2", ISSN = "0020-7217", ISSN-L = "0020-7217", MRclass = "94B99", MRnumber = "82k:94021", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "International Journal of Electronics", } @Article{Voukalis:1980:GSE, author = "D. C. Voukalis", title = "A good solution of the encryption problem using matrix code, distance factor and {PN} sequences", journal = "Internat. J. Electron.", volume = "48", number = "3", pages = "271--274", year = "1980", CODEN = "IJELA2", ISSN = "0020-7217", MRclass = "94A99", MRnumber = "82b:94020", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", fjournal = "International Journal of Electronics", } @MastersThesis{Wells:1980:ADB, author = "David L. Wells", title = "Achieving data base protection through the use of subkey encryption", type = "Thesis ({Doctor of Engineering})", school = "University of Wisconsin-Milwaukee", address = "Milwaukee, WI, USA", pages = "131", year = "1980", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Electronic data processing departments --- Security measures.", } @Article{Williams:1980:MRP, author = "H. C. Williams", title = "A modification of the {RSA} public-key encryption procedure", journal = j-IEEE-TRANS-INF-THEORY, volume = "26", number = "6", pages = "726--729", year = "1980", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1980.1056264", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", MRclass = "94B99 (10A25)", MRnumber = "81k:94041", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", fjournal = "IEEE Transactions on Information Theory", } @Article{ACE:1981:RPC, author = "{American Council on Education}", title = "Report of the {Public Cryptography Study Group}", journal = j-CACM, volume = "24", number = "7", pages = "435--450", month = jul, year = "1981", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jan 28 14:37:22 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See the opposing view in \cite{Davida:1981:CAR}.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @TechReport{Ahlswede:1981:BCG, author = "R. Ahlswede and G. Dueck", title = "Bad codes are good ciphers", type = "Report", institution = "Universit{\"a}t Bielefeld", address = "Bielefeld, Germany", year = "1981", bibdate = "Sat Apr 20 12:15:46 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Submitted in Nov. 1980 to the proceedings of the International Colloquium on Information Theory, to be held at Budapest in August 1981.", acknowledgement = ack-nhfb, } @Article{Anonymous:1981:CHP, author = "Anonymous", title = "Corrections: {How Polish Mathematicians Deciphered the Enigma, 3(3) 232}, {Reviews: H. H. Goldstine: A History of Numerical Analysis, 3(3) 293}", journal = j-ANN-HIST-COMPUT, volume = "3", number = "4", pages = "407--407", month = oct # "\slash " # dec, year = "1981", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 01 10:35:25 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See \cite{Rejewski:1981:HPM,Salzer:1981:RHH}.", URL = "http://dlib.computer.org/an/books/an1981/pdf/a4400.pdf", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @Book{Anonymous:1981:GIU, author = "Anonymous", title = "Guidelines for implementing and using the {NBS} Data Encryption Standard", volume = "74", publisher = pub-NBS, address = pub-NBS:adr, pages = "39", year = "1981", ISSN = "0083-1816", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "United States. National Bureau of Standards. Federal information processing standards publication, FIPS PUB", acknowledgement = ack-nhfb, } @Article{Asmuth:1981:EAC, author = "C. A. Asmuth and G. R. Blakley", title = "An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems", journal = j-COMPUT-MATH-APPL, volume = "7", number = "6", pages = "447--450", year = "1981", CODEN = "CMAPDK", ISSN = "0898-1221 (print), 1873-7668 (electronic)", ISSN-L = "0898-1221", MRclass = "94B99 (68C05)", MRnumber = "83d:94020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Computers \& Mathematics with Applications. An International Journal", } @Article{Ayoub:1981:EKR, author = "F. Ayoub", title = "Encryption with keyed random permutations", journal = j-ELECT-LETTERS, volume = "17", number = "17", pages = "583--585", year = "1981", CODEN = "ELLEAK", ISSN = "0013-5194", ISSN-L = "0013-5194", MRclass = "94B25 (05A05)", MRnumber = "82h:94023", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", fjournal = "Electronics Letters", } @Article{Baum:1981:RPC, author = "Werner A. Baum and David H. Brandin and R. Creighton Buck and George I. Davida and George Handelman and Martin E. Hellman and Ira Michael Heyman and Wilfred Kaplan and Daniel C. Schwartz", title = "Report of the {Public Cryptography Study Group}, prepared for {American Council on Education, One Dupont Circle, Washington, DC 20036, February 7, 1981}", journal = j-CACM, volume = "24", number = "7", pages = "435--445", month = jul, year = "1981", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jan 28 14:37:22 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See the opposing view in \cite{Davida:1981:CAR}.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Book{Beesly:1981:CIW, author = "Patrick Beesly", title = "Cryptanalysis and its influence on the war at sea 1914--1918", publisher = "U.S. Naval Academy", address = "Annapolis, MD, USA", pages = "13", year = "1981", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Xerox copy.", xxnote = "Check publisher??", } @Article{Booth:1981:ASU, author = "K. S. Booth", title = "Authentication of Signatures Using Public Key Encryption", journal = j-CACM, volume = "24", number = "11", pages = "772--774", month = nov, year = "1981", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Sep 22 11:36:41 1994", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "One of Needham and Schroeder's proposed signature authentication protocols is shown to fail when there is a possibility of compromised keys: this invalidates one of the applications of their technique. A more elaborate mechanism is proposed which does not require a network clock, but does require a third party to the transaction. The latter approach is shown to be reliable in a fairly strong sence.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Brassard:1981:TLT, author = "Gilles Brassard", title = "A time-luck tradeoff in relativized cryptography", journal = j-J-COMP-SYS-SCI, volume = "22", number = "3", pages = "280--311", month = jun, year = "1981", CODEN = "JCSSBM", ISSN = "0022-0000 (print), 1090-2724 (electronic)", ISSN-L = "0022-0000", bibdate = "Tue Jan 29 15:25:44 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib", URL = "http://www.sciencedirect.com/science/article/pii/0022000081900349", acknowledgement = ack-nhfb, fjournal = "Journal of Computer and System Sciences", journal-URL = "http://www.sciencedirect.com/science/journal/00220000", } @Book{Brownell:1981:ODN, author = "George A. Brownell", title = "The origin and development of the {National Security Agency}", volume = "35", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "x + 98", year = "1981", ISBN = "0-89412-054-9", ISBN-13 = "978-0-89412-054-1", LCCN = "UB290 .B76 1981", bibdate = "Mon Sep 13 06:41:04 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Edited by Wayne G. Barker. Originally published as report of the Ad hoc Committee to Study the Communications Intelligence Activities of the United States, George A. Brownell, chairman.", series = "A cryptographic series", acknowledgement = ack-nhfb, } @Article{Burchard:1981:NNF, author = "Hank Burchard", title = "News and Notices: {Finerman and Lee Receive ACM Awards}; Summer Positions at {Digital Computer Museum}; {CBI Fellowship 1982--1983}; {GMD} Activities in the History of Computing; Request for Articles; {Edwards} Speaks at {Digital Computer Museum}; Exhibit of Cipher Machines", journal = j-ANN-HIST-COMPUT, volume = "3", number = "4", pages = "410--413", month = oct # "\slash " # dec, year = "1981", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 1 15:29:18 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://dlib.computer.org/an/books/an1981/pdf/a4410.pdf", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @Book{CBEMA:1981:ANS, author = "{Computer and Business Equipment Manufacturers Association} and {American National Standards Institute}", title = "{American National Standard Data Encryption Algorithm}", publisher = pub-ANSI, address = pub-ANSI:adr, pages = "16", day = "30", month = dec, year = "1981", LCCN = "????", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "ANSI X3.92-1981.", acknowledgement = ack-nhfb, keywords = "coding theory --- standards --- United States; computers --- access control --- standards --- United States; data protection --- standards --- United States", } @Article{Chaum:1981:UEM, author = "D. Chaum", title = "Untraceable electronic mail, return addresses, and digital pseudonyms", journal = j-CACM, volume = "24", number = "2", pages = "84--88", month = feb, year = "1981", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1019.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "information hiding; steganography", } @Book{Clark:1981:ECC, author = "George C. {Clark, Jr.} and J. Bibb Cain", title = "Error-correction coding for digital communications", publisher = pub-PLENUM, address = pub-PLENUM:adr, pages = "xii + 422", year = "1981", ISBN = "0-306-40615-2", ISBN-13 = "978-0-306-40615-7", LCCN = "TK5102.5 .C52", bibdate = "Mon Nov 30 08:53:48 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Periodical{Crypto:1981:ACP, author = "CRYPTO", title = "Advances in cryptology: proceedings of {CRYPTO}", publisher = pub-PLENUM, address = pub-PLENUM:adr, pages = "various", year = "1981", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Volumes for 1984 to 1989 were published in the Springer-Verlag Lecture Notes in Computer Science series.", acknowledgement = ack-nhfb, keywords = "Computers --- Access control --- Congresses; Cryptography --- Congresses.", } @Article{Davida:1981:CAR, author = "George I. Davida", title = "The Case Against Restraints on Non-Governmental Research in Cryptography", journal = j-CACM, volume = "24", number = "7", pages = "445--450", month = jul, year = "1981", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Tue Jan 28 14:39:33 1997", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; https://www.math.utah.edu/pub/tex/bib/cacm1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "This is an opposing view published with \cite{ACE:1981:RPC}.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Davida:1981:DES, author = "George I. Davida and David L. Wells and John B. Kam", title = "A Database Encryption System with Subkeys", journal = j-TODS, volume = "6", number = "2", pages = "312--328", month = jun, year = "1981", CODEN = "ATDSD3", ISSN = "0362-5915 (print), 1557-4644 (electronic)", ISSN-L = "0362-5915", MRclass = "68B15", MRnumber = "82f:68020", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "Compendex database; Database/Wiederhold.bib; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", URL = "http://www.acm.org/pubs/articles/journals/tods/1981-6-2/p312-davida/p312-davida.pdf; http://www.acm.org/pubs/citations/journals/tods/1981-6-2/p312-davida/", abstract = "A new cryptosystem that is suitable for database encryption is presented. The system has the important property of having subkeys that allow the encryption and decryption of fields within a record. The system is based on the Chinese Remainder Theorem.", acknowledgement = ack-nhfb, annote = "Subkeys allow the encryption and decryption of fields within a record. The system is based on the Chinese Remainder Theorem.", classification = "723", fjournal = "Association for Computing Machinery. Transactions on Database Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J777", keywords = "codes, symbolic; data base systems; data security; databases; decryption; encryption; subkeys", subject = "Data --- Data Encryption (E.3)", } @Article{Denning:1981:MKG, author = "Dorothy E. Denning and Fred B. Schneider", title = "Master keys for group sharing", journal = j-INFO-PROC-LETT, volume = "12", number = "1", pages = "23--25", day = "13", month = feb, year = "1981", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "94B99", MRnumber = "82d:94046", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See also note \cite{Brouwer:1982:NMK}.", acknowledgement = ack-nhfb, classification = "B6120B (Codes)", corpsource = "Computer Sci. Dept., Purdue Univ., W. Lafayette, IN, USA", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", keywords = "Diffie and Hellman's public-key distribution scheme; encoding; group sharing; master key; Shamir's threshold scheme", treatment = "T Theoretical or Mathematical", } @Article{Denning:1981:MMK, author = "D. E. Denning and H. Meijer and F. B. Schneider", title = "More on master keys for group sharing", journal = j-INFO-PROC-LETT, volume = "13", number = "3", pages = "125--126", day = "13", month = dec, year = "1981", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classification = "B6120B (Codes); C0230 (Economic, social and political aspects of computing); C6130 (Data handling techniques)", corpsource = "Computer Sci. Dept., Purdue Univ., West Lafayette, IN, USA", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", keywords = "cryptography; encryption; group sharing; master keys", treatment = "P Practical", } @Article{Denning:1981:SRR, author = "Peter J. Denning and David H. Brandin", title = "Special Report: Report of the {Public Cryptography Study Group}", journal = j-CACM, volume = "24", number = "7", pages = "434--434", month = jul, year = "1981", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Sat Feb 01 07:47:27 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Gifford:1981:CSI, author = "David K. Gifford", title = "Cryptographic sealing for information secrecy and authentication", journal = j-OPER-SYS-REV, volume = "15", number = "5", pages = "123--124", month = dec, year = "1981", CODEN = "OSRED8", ISSN = "0163-5980", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:53 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Article{Hellman:1981:ACA, author = "M. E. Hellman", title = "Another cryptanalytic attack on {``A cryptosystem for multiple communication''} {[Inform. Process. Lett. {\bf 10}(4--5), 5 July 1980, pp. 180--183]}", journal = j-INFO-PROC-LETT, volume = "12", number = "4", pages = "182--183", day = "13", month = aug, year = "1981", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See \cite{Luccio:1980:CMC,Meijer:1981:NCM}.", acknowledgement = ack-nhfb, classification = "B6120B (Codes)", corpsource = "Dept. of Electrical Engng., Stanford Univ., Stanford, CA, USA", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", keywords = "authentification; cryptography; cryptosystem; data communication systems; multiple communication; plain text attack; security; text attack", treatment = "T Theoretical or Mathematical", } @Article{Henry:1981:BJB, author = "P. S. Henry", title = "{B.S.T.J.} Briefs: Fast Decryption Algorithm for the Knapsack Cryptographic System", journal = j-BELL-SYST-TECH-J, volume = "60", number = "5", pages = "767--773", month = may # "--" # jun, year = "1981", CODEN = "BSTJAN", ISSN = "0005-8580", bibdate = "Tue Nov 9 11:15:56 MST 2010", bibsource = "http://bstj.bell-labs.com/oldfiles/year.1981/BSTJ.1981.6005.html; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://bstj.bell-labs.com/BSTJ/images/Vol60/bstj60-5-767.pdf", acknowledgement = ack-nhfb, fjournal = "The Bell System Technical Journal", journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/", } @TechReport{Hershey:1981:DLP, author = "J. E. (John E.) Hershey", title = "The discrete logarithm public cryptographic system", type = "NTIA report", number = "81-81, PB82-130097", institution = "U.S. Dept. of Commerce, National Telecommunications and Information Administration", address = "Washington, DC, USA (??)", pages = "iv + 40", month = sep, year = "1981", LCCN = "C 60.10: 81-81 Govt Pub", bibdate = "Sat Nov 18 12:53:52 MST 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "cryptography; finite fields (algebra)", } @TechReport{IDC:1981:DE, author = "{International Data Corporation}", title = "Data encryption", type = "Research memorandum", number = "IDC \#ISPS-M81-10.", institution = "International Data Corporation", address = "Framingham, MA, USA", pages = "30", month = oct, year = "1981", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Ingemarsson:1981:UAS, author = "Ingemar Ingemarsson and C. K. Wong", title = "Use Authentication Scheme for Shared Data Based on a Trap-Door One-Way Function", journal = j-INFO-PROC-LETT, volume = "12", number = "2", pages = "63--67", month = apr, year = "1981", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Jan 29 09:23:05 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classification = "723", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "data base systems", } @TechReport{IRD:1981:DTV, author = "{International Resource Development, Inc.}", title = "Data, text, and voice encryption equipment", type = "Report", number = "183", institution = "IRD", address = "30 High St., Norwalk, CT 06851, USA", pages = "vi + 154", year = "1981", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography equipment industry; Cryptography equipment industry --- United States; Market surveys --- United States.", } @TechReport{Juenemann:1981:DES, author = "Robert R. Juenemann", title = "The {Data Encryption Standard} vs. Exhaustive Search", type = "Report", institution = "Satellite Business Systems", address = "McLean, VA, USA", day = "5", month = feb, year = "1981", bibdate = "Fri May 21 14:57:54 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Konheim:1981:CP, author = "Alan G. Konheim", title = "Cryptography, a primer", publisher = pub-WILEY, address = pub-WILEY:adr, pages = "xiv + 432", year = "1981", ISBN = "0-471-08132-9", ISBN-13 = "978-0-471-08132-6", LCCN = "Z103 .K66 1981", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "A Wiley-interscience publication", acknowledgement = ack-nhfb, keywords = "computer security; cryptography; telecommunication --- security measures", } @Article{Lamport:1981:TNP, author = "Leslie Lamport", title = "Technical Note: Password Authentication with Insecure Communication", journal = j-CACM, volume = "24", number = "11", pages = "770--772", month = nov, year = "1981", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Jan 22 06:57:19 MST 2001", bibsource = "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Lamport81; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", oldlabel = "Lamport81", XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Lamport81", } @Book{Lange:1981:TC, author = "Andr{\'e} Lange and E. A. Soudart", title = "Treatise on cryptography", volume = "36", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "xvi + 168", year = "1981", ISBN = "0-89412-055-7 (paperback)", ISBN-13 = "978-0-89412-055-8 (paperback)", LCCN = "Z104.L2613 1981", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Translation of: Traite de cryptographie / par Andr{\'e} Lange et E.-A. Soudart. ``Plus many problems in French for the solver''", series = "A Cryptographic series", acknowledgement = ack-nhfb, keywords = "cryptography", } @Book{Langie:1981:CSS, author = "Andre Langie", title = "Cryptography: a study on secret writings", volume = "38", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "vii + 192", year = "1981", ISBN = "0-89412-061-1", ISBN-13 = "978-0-89412-061-9", LCCN = "Z104 .L28 1981", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Translation of: De la cryptographie. Reprint of an unspecified previous ed. Bibliography: p. 158.", series = "A Cryptographic series", acknowledgement = ack-nhfb, keywords = "cryptography", } @Book{Lauer:1981:CSC, author = "Rudolph F. Lauer", title = "Computer simulation of classical substitution cryptographic systems", volume = "32", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "xi + 111", year = "1981", ISBN = "0-89412-050-6", ISBN-13 = "978-0-89412-050-3", LCCN = "Z104 .L38 1981", bibdate = "Sat Nov 18 12:53:52 MST 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, keywords = "basic (computer program language); cryptography; cryptography -- computer programs; electronic data processing -- cryptography", } @Article{Lieberherr:1981:UCD, author = "K. Lieberherr", title = "Uniform complexity and digital signatures", journal = j-THEOR-COMP-SCI, volume = "16", number = "1", pages = "99--110", month = oct, year = "1981", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Sat Nov 22 13:36:07 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/tcs1980.bib", acknowledgement = ack-nhfb, classification = "C4240 (Programming and algorithm theory)", corpsource = "Dept. of Electrical Engng. and Computer Sci., Princeton Univ., Princeton, NJ, USA", fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", keywords = "computational complexity; digital signatures; security of data; signature checking; signature production; uniform complexity", pubcountry = "Netherlands", treatment = "T Theoretical or Mathematical", } @Article{McEliece:1981:SSR, author = "R. J. McEliece and D. V. Sarwate", title = "On sharing secrets and {Reed--Solomon} codes", journal = j-CACM, volume = "24", number = "9", pages = "583--584", month = sep, year = "1981", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", MRclass = "94B35", MRnumber = "82h:94024", bibdate = "Tue Dec 26 13:35:07 1995", bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @TechReport{Meijer:1981:DSS, author = "Henk Meijer and Selim G. Akl", title = "Digital signature schemes", type = "Technical report", number = "81-120", institution = "Department of Computing and Information Science, Queen's University", address = "Kingston, ON, Canada", pages = "10", year = "1981", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Meijer:1981:NCM, author = "H. Meijer", title = "A note on {``A cryptosystem for multiple communication''} {[Inform. Process. Lett. {\bf 10}(4--5), 5 July 1980, pp. 180--183]}", journal = j-INFO-PROC-LETT, volume = "12", number = "4", pages = "179--181", day = "13", month = aug, year = "1981", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See \cite{Luccio:1980:CMC,Hellman:1981:ACA}.", acknowledgement = ack-nhfb, classification = "B6120B (Codes)", corpsource = "Dept. of Math. and Statistics, Queen's Univ., Kingston, Ont., Canada", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", keywords = "cryptography; cryptosystem; cyphertext; data communication systems; multiple communication; node; plain-text attack; secret messages; security", treatment = "T Theoretical or Mathematical", } @Article{Merkle:1981:SME, author = "Ralph C. Merkle and Martin E. Hellman", title = "On the Security of Multiple Encryption", journal = j-CACM, volume = "24", number = "7", pages = "465--467", month = jul, year = "1981", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", MRclass = "68K05 (94A24 94B99)", MRnumber = "82f:68103", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib; https://www.math.utah.edu/pub/tex/bib/cacm1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", acknowledgement = ack-nhfb, fjournal = "Communications of the Association for Computing Machinery", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", referencedin = "Referenced in \cite[Ref. 20]{Biham:1998:TA}.", } @MastersThesis{Mulherin:1981:FDE, author = "Michael Hugh Mulherin", title = "A file data encryption system using {Galois} fields", volume = "52731", type = "Thesis ({M.Sc.Cs.})", publisher = "National Library of Canada", school = "University of New Brunswick", address = "Ottawa, ON, Canada", pages = "174", year = "1981", ISBN = "0-315-04837-9", ISBN-13 = "978-0-315-04837-9", ISSN = "0227-3845", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "2 microfiche(s) (174 fr.)", series = "Canadian theses on microfiche = Th{\`e}ses canadiennes sur microfiche", acknowledgement = ack-nhfb, } @Article{Muller:1981:SRP, author = "Winfried B. M{\"u}ller and Wilfried N{\"o}bauer", title = "Some remarks on public-key cryptosystems", journal = "Studia Sci. Math. Hungar.", volume = "16", number = "1-2", pages = "71--76", year = "1981", CODEN = "SSMHAX", ISSN = "0081-6906", MRclass = "94A60 (11T71)", MRnumber = "85e:94018", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Studia Scientiarum Mathematicarum Hungarica. A Quarterly of the Hungarian Academy of Sciences", } @Book{OConnell:1981:CDE, author = "Richard O'Connell", title = "Crypto-ease: a data encryption dictionary", publisher = "Atlantis Editions", address = "Philadelphia, PA, USA", pages = "33", year = "1981", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Computers --- Access control --- Dictionaries; Dictionaries; Electronic data processing departments --- Security measures", } @TechReport{Rabin:1981:HES, author = "Michael O. Rabin", title = "How to exchange secrets by oblivious transfer", type = "Technical Report", number = "TR-81", institution = "Aiken Computation Laboratory, Harvard University", address = "Cambridge, MA, USA", year = "1981", bibdate = "Sun Mar 11 11:14:25 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://eprint.iacr.org/2005/187.pdf", acknowledgement = ack-nhfb, } @Article{Rejewski:1981:HPM, author = "Marian Rejewski", title = "How {Polish} Mathematicians Deciphered the {Enigma}", journal = j-ANN-HIST-COMPUT, volume = "3", number = "3", pages = "213--234", month = jul # "\slash " # sep, year = "1981", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 1 15:29:18 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Afterwords by Cipher A. Deavours and I. J. Good. This article was entitled ``Jak matematycy polscy rozszyfrowz Enigmg{\c{e}}'' in the Annals of the Polish Mathematical Society, Series II, Wiadomo{\'s}ci Matematyczne, Volume 23, 1980, 1-28, translated by Joan Stepenske. See minor correction \cite{Anonymous:1981:CHP}.", URL = "http://dlib.computer.org/an/books/an1981/pdf/a3213.pdf; http://www.computer.org/annals/an1981/a3213abs.htm", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @Article{Salzer:1981:RHH, author = "Herbert E. Salzer and Eric A. Weiss and Henry S. Tropp and Jane Smith and Robert W. Rector", title = "Reviews: {H. H. Goldstine: A History of Numerical Analysis}; {Electronics: An Age of Innovation}; {J. A. N. Lee: Banquet Anecdotes and Conference Excerpts}; {R. L. Wexelblat: History of Programming Languages}: Capsule Reviews", journal = j-ANN-HIST-COMPUT, volume = "3", number = "3", pages = "289--302", month = jul # "\slash " # sep, year = "1981", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 1 15:29:18 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See minor correction \cite{Anonymous:1981:CHP}.", URL = "http://dlib.computer.org/an/books/an1981/pdf/a3289.pdf; http://www.computer.org/annals/an1981/a3289abs.htm", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @MastersThesis{Seshadri:1981:KPP, author = "Raghavan Seshadri", title = "Knapsack problems in public key encryption systems", type = "Thesis ({M.S.})", school = "University of Oklahoma", address = "Norman, OK, USA", pages = "vii + 99", year = "1981", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @InProceedings{Sidhu:1981:APG, author = "Deepinder P. Sidhu", title = "Authentication Protocols for General Communication Channels", crossref = "IEEE:1981:CLC", pages = "30--40", year = "1981", bibdate = "Sat Sep 25 20:21:07 MDT 1999", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, affiliation = "Brookhaven Natl Lab, Upton, NY,USA", classification = "723; 731", conference = "6th Conference on Local Computer Networks", conflocation = "Minneapolis, MN, USA", journalabr = "Conf Local Comput Networks", keywords = "authentication protocols; communication channels; completeness; computer networks; deadlock freeness; encryption; fifo channels; liveness; non-fifo channels; public-key encryption", meetingaddress = "Minneapolis, MN, USA", sponsor = "Univ of Minn, Comput Cent, Minneapolis, USA; IEEE, Twin Cities Chapter, USA; IEEE Comput Soc Tech Comm on Comput Commun, Los Alamitos, Calif, USA", } @Article{Smith:1981:VEP, author = "Michael K. Smith and Ann E. Siebert and Benedetto L. DiVito and Donald I. Good", title = "A verified encrypted packet interface", journal = j-SIGSOFT, volume = "6", number = "3", pages = "13--16", month = jul, year = "1981", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/1010832.1010838", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:11:35 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sigsoft1980.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Book{USNBS:1981:GIU, author = "{United States.National Bureau of Standards}", title = "Guidelines for implementing and using the {NBS Data Encryption Standard}: category: {ADP} operations, subcategory: computer security", publisher = pub-NBS, address = pub-NBS:adr, pages = "39", day = "1", month = apr, year = "1981", CODEN = "FIPPAT", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "FIPS Pub; 74", acknowledgement = ack-nhfb, keywords = "Computer networks --- Security measures --- Standards; Computers --- Access control --- Standards; Electronic data processing departments --- Security measures; Standards", } @Article{Wegman:1981:NHF, author = "Mark N. Wegman and J. Lawrence Carter", title = "New Hash Functions and Their Use in Authentication and Set Equality", journal = j-J-COMP-SYS-SCI, volume = "22", number = "3", pages = "265--279", month = jun, year = "1981", CODEN = "JCSSBM", ISSN = "0022-0000", ISSN-L = "0022-0000", bibdate = "Sat Jan 25 17:38:12 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", abstract = "In this paper we exhibit several new classes of hash functions with certain desirable properties, and introduce two novel applications for hashing which make use of these functions. One class contains a small number of functions, yet is almost universal2. If the functions hash n-bit long names into m-bit indices, then specifying a member of the class requires only O((m + log2 log2(n)) g log2(n)) bits as compared to O(n) bits for earlier techniques. For long names, this is about a factor of m larger than the lower bound of $ m + \log_2 n \log_2 m $ bits. An application of this class is a provably secure authentication technique for sending messages over insecure lines. A second class of functions satisfies a much stronger property than universal2. We present the application of testing sets for equality. The authentication technique allows the receiver to be certain that a message is genuine. An ``enemy'' even one with infinite computer resources cannot forge or modify a message without detection. The set equality technique allows operations including ``add member to set,'' ``delete member from set,'' and ``test two sets for equality'' to be performed in expected constant time and with less than a specified probability of error.", acknowledgement = ack-nhfb, classification = "723", fjournal = "Journal of Computer and System Sciences", journal-URL = "http://www.sciencedirect.com/science/journal/00220000", journalabr = "J Comput Syst Sci", keywords = "computer metatheory; cryptography; hash functions", } @Article{Anonymous:1982:BRCa, author = "Anonymous", title = "Book Review: {{\booktitle{Cryptography: a primer}}: Alan G. Konheim: New York: John Wiley and Sons, 1981. xiv + 432 pp. \$34.95}", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "84--84", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488290030X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Book{Anonymous:1982:CC, author = "Anonymous", title = "A course in cryptanalysis", volume = "33, 34", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, year = "1982", ISBN = "0-89412-052-2 (vol. 1), 0-89412-053-0 (vol. 2)", ISBN-13 = "978-0-89412-052-7 (vol. 1), 978-0-89412-053-4 (vol. 2)", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Cryptographic series", acknowledgement = ack-nhfb, annote = "Originally published in 1942. Revised and enlarged. v. 1. Explanatory text and short exercises; v. 2. Figures and cipher texts.", keywords = "Cryptography.", } @Misc{Anonymous:1982:ESS, author = "Anonymous", title = "Encryption scrambling the satellite signal for security", publisher = "Instant Replay", address = "Arlington, VA, USA", year = "1982", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "1 sound cassette (75 min.)", acknowledgement = ack-nhfb, annote = "At head of title: ``Space communications in the 80's.'' Presented at the Seventh Annual Conference of the Public Service Satellite Consortium, October 19-22, 1982, Washington, DC", keywords = "Telecommunication.", } @Article{Anonymous:1982:NNPa, author = "Anonymous", title = "News and Notices: {Pioneer Award Established by Computer Society}; {Undergraduate Paper Competition in Cryptology}", journal = j-ANN-HIST-COMPUT, volume = "4", number = "2", pages = "184--184", month = apr # "\slash " # jun, year = "1982", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 1 15:29:19 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://dlib.computer.org/an/books/an1982/pdf/a2184.pdf; http://www.computer.org/annals/an1982/a2184abs.htm", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @Book{Bamford:1982:PPR, author = "James Bamford", title = "The puzzle palace: a report on {America}'s most secret agency", publisher = pub-HOUGHTON-MIFFLIN, address = pub-HOUGHTON-MIFFLIN:adr, pages = "465", year = "1982", ISBN = "0-395-31286-8", ISBN-13 = "978-0-395-31286-5", LCCN = "KF7683.N32 B3", bibdate = "Thu Jan 21 14:10:29 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "United States National Security Agency", } @Article{Bauer:1982:KVM, author = "Friedrich L. Bauer", title = "{Kryptologie --- Verfahren und Maximen}. ({German}) [{Cryptology} --- procedures and maxims]", journal = j-INFORMATIK-SPEKTRUM, volume = "5", number = "??", pages = "74--81", month = "????", year = "1982", CODEN = "INSKDW", ISSN = "0170-6012 (print), 1432-122X (electronic)", ISSN-L = "0170-6012", MRclass = "94A99 94-01", bibdate = "Fri Aug 21 15:10:11 MDT 2020", bibsource = "https://www.math.utah.edu/pub/bibnet/authors/b/bauer-friedrich-ludwig.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", ZMnumber = "0488.94019", acknowledgement = ack-nhfb, author-dates = "Friedrich (``Fritz'') Ludwig Bauer (10 June 1924--26 March 2015)", fjournal = "Informatik Spektrum", journal-URL = "http://link.springer.com/journal/287", keywords = "code systems; cryptology; encryption; survey of classical cryptographic methods", language = "German", zmid = "03769510", } @MastersThesis{Becker:1982:EDE, author = "Michael S. Becker", title = "An exercise with the {Data Encryption Standard}", type = "Master of Science, Plan II", school = "Department of Electrical Engineering and Computer Sciences, University of California, Berkeley", address = "Berkeley, CA, USA", pages = "56", year = "1982", LCCN = "TK7 .U5 1982:2:B-C", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Beker:1982:CSP, author = "Henry Beker and F. C. (Frederick Charles) Piper", title = "Cipher systems: the protection of communications", publisher = pub-WILEY, address = pub-WILEY:adr, pages = "427", year = "1982", ISBN = "0-471-89192-4", ISBN-13 = "978-0-471-89192-5", LCCN = "Z104 .B39 1982", bibdate = "Sun Nov 20 19:54:09 MST 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", acknowledgement = ack-nhfb, remark = "According to the introduction to Fred Piper's 2005 Turing Lecture (Computer Journal 48(2), 145--156, March 2005, this is one of the first books published on the protection of communications.", subject = "Ciphers; Cryptography", } @InProceedings{Blum:1982:CFT, author = "Manuel Blum", title = "Coin Flipping by Telephone --- a Protocol for Solving Impossible Problems", crossref = "Rudolph:1982:HTI", pages = "133--137", year = "1982", bibdate = "Sun Mar 11 10:10:54 2012", bibsource = "DBLP; http://dblp.uni-trier.de/db/conf/compcon/compcon1982.html#Blum82; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, remark = "See published article \cite{Blum:1983:CFT}.", } @InProceedings{Blum:1982:HGC, author = "Manuel Blum and Silvio Micali", title = "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits", crossref = "IEEE:1982:ASF", pages = "112--117", year = "1982", DOI = "https://doi.org/10.1109/SFCS.1982.72", bibdate = "Wed Dec 21 06:47:00 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/focs1980.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", acknowledgement = ack-nhfb, xxpages = "464--479", } @Book{Bosworth:1982:CCC, author = "Bruce Bosworth", title = "Codes, ciphers, and computers: an introduction to information security", publisher = pub-HAYDEN-BOOK, address = pub-HAYDEN-BOOK:adr, pages = "259", year = "1982", ISBN = "0-8104-5149-2", ISBN-13 = "978-0-8104-5149-0", LCCN = "Z103.B58 1982", bibdate = "Sat Apr 20 11:51:26 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Branstad:1982:ISS, author = "Dennis K. Branstad and Miles E. Smid", title = "Integrity and security standards based on cryptography", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "255--260", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488290044X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Brouwer:1982:NMK, author = "Andries E. Brouwer and Peter {van Emde Boas}", title = "A note on: {``Master keys for group sharing'' [Inform. Process. Lett. {\bf 12} (1981), no. 1, 23--25; MR 82d:94046] by D. E. Denning and F. B. Schneider}", journal = j-INFO-PROC-LETT, volume = "14", number = "1", pages = "12--14", day = "27", month = mar, year = "1982", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "94B99", MRnumber = "83h:94019", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See \cite{Denning:1981:MKG}.", acknowledgement = ack-nhfb, classification = "C6130 (Data handling techniques)", corpsource = "Dept. of Pure Math., Math. Centre, Amsterdam, Netherlands", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", keywords = "cryptography; group keys; group sharing; master keys", treatment = "P Practical", } @Article{Buck:1982:PCS, author = "R. Creighton Buck", title = "The public cryptography study group", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "249--254", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900438", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @InProceedings{DeMillo:1982:CP, author = "Richard A. DeMillo and Nancy A. Lynch and Michael J. Merritt", title = "Cryptographic protocols", crossref = "ACM:1982:PFA", pages = "383--400", year = "1982", bibdate = "Wed Feb 20 18:33:45 MST 2002", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Denning:1982:CDS, author = "Dorothy Elizabeth Robling Denning", title = "Cryptography and data security", publisher = pub-AW, address = pub-AW:adr, pages = "xiii + 400", year = "1982", ISBN = "0-201-10150-5", ISBN-13 = "978-0-201-10150-8", LCCN = "QA76.9.A25 .D46 1982", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", price = "US\$22.95", acknowledgement = ack-nhfb, keywords = "computers --- access control; cryptography; data protection", } @Article{Diffie:1982:CTF, author = "Whitfield Diffie", title = "Cryptographic technology: fifteen year forecast", journal = j-SIGACT, volume = "14", number = "4", pages = "38--57", month = "Fall--Winter", year = "1982", CODEN = "SIGNDM", DOI = "https://doi.org/10.1145/1008902.1008903", ISSN = "0163-5700 (print), 1943-5827 (electronic)", ISSN-L = "0163-5700", bibdate = "Wed Mar 21 08:21:21 MDT 2012", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sigact.bib", abstract = "This paper examines the forces driving public development of cryptography today and projects the course of the field over the next fifteen years with attention to the possible influence of government regulation. This paper was prepared, under contractual arrangements to CRC Systems, in support of the Commerce Department (National Telecommunications and Information Administration, Special Projects Office) response to a White House Office of Science and Technology Policy request that the secretaries of the Departments of Commerce and Defense propose a national policy on cryptography.", acknowledgement = ack-nhfb, fjournal = "ACM SIGACT News", journal-URL = "http://dl.acm.org/citation.cfm?id=J697", } @InCollection{Diffie:1982:CVP, author = "Whitfield Diffie", booktitle = "Secure communications and asymmetric cryptosystems", title = "Conventional versus public key cryptosystems", volume = "69", publisher = "Westview", address = "Boulder, CO", pages = "41--72", year = "1982", MRclass = "94A05", MRnumber = "668 720", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "AAAS Sel. Sympos. Ser.", } @Article{Ecker:1982:MGE, author = "A. Ecker", title = "{{\"U}ber die mathematischen Grundlagen einiger Chiffrierverfahren}. ({German}) [{On} the mathematical foundations of some cryptosystems]", journal = j-COMPUTING, volume = "29", number = "4", pages = "277--287", year = "1982", CODEN = "CMPTA2", ISSN = "0010-485X (print), 1436-5057 (electronic)", ISSN-L = "0010-485X", MRclass = "94B99 (10A10 20A05)", MRnumber = "84d:94023", MRreviewer = "J. H. van Lint", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Computing. Archiv f{\"u}r Informatik und Numerik", journal-URL = "http://link.springer.com/journal/607", language = "German", } @Article{Feynman:1982:SPC, author = "Richard P. Feynman", title = "Simulating physics with computers", journal = j-INT-J-THEOR-PHYS, volume = "21", number = "6--7", pages = "467--488", year = "1982", CODEN = "IJTPBM", DOI = "https://doi.org/10.1007/BF02650179", ISSN = "0020-7748", ISSN-L = "0020-7748", MRclass = "68J99", MRnumber = "658311", bibdate = "Sat Apr 9 15:46:55 2011", bibsource = "ftp://ftp.math.utah.edu/pub/bibnet/authors/f/feynman-richard-p.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Physics of computation, Part II (Dedham, Mass., 1981)", acknowledgement = ack-nhfb, fjournal = "International Journal of Theoretical Physics", journal-URL = "http://link.springer.com/journal/10773", remark = "This paper contains an early proposal for quantum cryptography.", xxvolume = "B2", } @Book{Foster:1982:CM, author = "Caxton C. Foster", title = "Cryptanalysis for microcomputers", publisher = pub-HAYDEN-BOOK, address = pub-HAYDEN-BOOK:adr, pages = "333", year = "1982", ISBN = "0-8104-5174-3 (paperback)", ISBN-13 = "978-0-8104-5174-2 (paperback)", LCCN = "Z103.F67 1982", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", price = "US\$14.95", acknowledgement = ack-nhfb, keywords = "Ciphers --- Data processing; Cryptography --- Data processing; Microcomputers.", } @Article{Gabriel:1982:VPI, author = "Richard Gabriel", title = "{Verschl{\"u}sselungsabbildungen mit Pseudo-Inversen, Zufallsgeneratoren und T{\"a}felungen}. ({German}) [{Encryption} mapping with pseudoinverses, random generators and tilings]", journal = "Kybernetika (Prague)", volume = "18", number = "6", pages = "485--504", year = "1982", CODEN = "KYBNAI", ISSN = "0023-5954", MRclass = "94A60 (68P25)", MRnumber = "85a:94023", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", fjournal = "Kybernetika", language = "German", } @Manual{Gersho:1982:ACR, author = "Allen Gersho", title = "Advances in cryptography: a report on {CRYPTO} 81", number = "82-04", publisher = "Department of Electrical and Computer Engineering, University of California, Santa Barbara", address = "Santa Barbara, CA, USA", pages = "viii + 156", year = "1982", LCCN = "QA76.9.A25 I14 1981", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "``Sponsored by the Data and Computer Communications Committees of the IEEE Communications Society with the cooperation of the Dept. of Electrical and Computer Engineering, University of California, Santa Barbara.'' --- Verso of t.p. ``August 20, 1982.'' Includes bibliographies.", series = "ECE report", acknowledgement = ack-nhfb, keywords = "computers --- access control --- congresses; cryptography --- congresses", } @Article{Gifford:1982:CSI, author = "D. K. Gifford and A. K. Jones", title = "Cryptographic Sealing for Information Security and Authentication", journal = j-CACM, volume = "25", number = "4", pages = "274--286", month = apr, year = "1982", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib; ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib; https://www.math.utah.edu/pub/tex/bib/cacm1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "A new protection mechanism is described that provides general primitives for protection and authentication. The mechanism is based on the idea of sealing an object with a key. Sealed objects are self-authenticating, and in the absence of an appropriate set of keys, only provide information about the size of their contents. New keys can be freely created at any time, and keys can also be derived from existing keys with operators that include Key-And and Key-Or. This flexibility allows the protection mechanism to implement common protection mechanisms such as capabilities, access control lists, and information flow control. The mechanism is enforced with a synthesis of conventional cryptography, public-key cryptography, and a threshold scheme.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "CACM protection operating cryptography", } @InProceedings{Gilmour-Bryson:1982:CDT, author = "A. Gilmour-Bryson", title = "Coding of the depositions of the {Templars}", crossref = "Ciampi:1982:EVS", pages = "451--467", year = "1982", bibdate = "Sat Feb 17 14:59:04 1996", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "From {\em Computing Reviews\/}: ``The article reports on the progress of an historical study using a computer for statistical analysis. The subject of the study is a mass of trial depositions of the Knights Templar. The purpose of the project is to find statistical regularities in the large amount of testimony and to create a model for similar studies. The Order of the Knights Templar, founded around 1100, was the first Christian military order. After the Crusades, in the early fourteenth century, 127 articles of accusation were brought against the order, including charges of idolatry, sacrilege, and sodomy. The data being studied are the responses of 900 men to each of 127 accusations. The article details the accusations and the way in which the responses are being coded. The statistical package SAS (Statistical Analysis System) will be used. Examples of the results to be sought are: tallies of guilty/innocent responses, tallies of offenses committed versus seen versus heard about, and correlations between, for example, age and other responses. Depositions that differ markedly from the average response will be identified.''", acknowledgement = ack-nhfb, keywords = "human factors; legal aspects", review = "ACM CR 40531", subject = "E.4 Data, CODING AND INFORMATION THEORY, Nonsecret encoding schemes \\ G.3 Mathematics of Computing, PROBABILITY AND STATISTICS, Statistical computing \\ J.1 Computer Applications, ADMINISTRATIVE DATA PROCESSING, Law J Computer Applications, SOCIAL AND BEHAVIORAL SCIENCES", } @InProceedings{Goldwasser:1982:PEH, author = "Shafi Goldwasser and Silvio Micali", title = "Probabilistic encryption \& how to play mental poker keeping secret all partial information", crossref = "ACM:1982:PFA", pages = "365--377", year = "1982", bibdate = "Wed Feb 20 18:33:45 MST 2002", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Golomb:1982:SRS, author = "S. Golomb", title = "Shift Register Sequences", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, edition = "Revised", pages = "xvi + 247", year = "1982", ISBN = "0-89412-048-4", ISBN-13 = "978-0-89412-048-0", LCCN = "QA267.5.S4 G6 1982", bibdate = "Mon Nov 30 08:47:35 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Portions co-authored with Lloyd R. Welch, Richard M. Goldstein, and Alfred W. Hales.", acknowledgement = ack-nhfb, } @Article{Gray:1982:ICT, author = "P. E. Gray", title = "Information control {I}: Technology transfer at issue: The academic viewpoint: Educators believe efforts to limit transfer of knowledge at the university level are likely to weaken the {U.S.} lead in innovation", journal = j-IEEE-SPECTRUM, volume = "19", number = "5", pages = "64--68", month = may, year = "1982", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1982.6366886", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Jan 18 16:51:45 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1980.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "Cryptography; Educational institutions; Government; Laboratories; National security; Very high speed integrated circuits", } @Article{Grover:1982:CP, author = "Derrick Grover", title = "Cryptography: a Primer", journal = j-COMP-J, volume = "25", number = "3", pages = "400c-400", month = aug, year = "1982", CODEN = "CMPJA6", DOI = "https://doi.org/10.1093/comjnl/25.3.400-c", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Tue Dec 4 14:48:13 MST 2012", bibsource = "http://comjnl.oxfordjournals.org/content/25/3.toc; https://www.math.utah.edu/pub/tex/bib/compj1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://comjnl.oxfordjournals.org/content/25/3/400-c.full.pdf+html", acknowledgement = ack-nhfb, fjournal = "The Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", } @Article{Guillou:1982:CT, author = "L. C. Guillou and B. Lorig", title = "Cryptography and teleinformatics", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "27--33", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900220", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Henry:1982:FDA, author = "Paul S. Henry", title = "Fast decryption algorithm for the knapsack cipher", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "80--83", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900293", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Holland:1982:GSA, author = "Edward R. Holland and James L. Robertson", title = "{GUEST} --- a Signature Analysis Based Test System for {ECL} Logic", journal = j-HEWLETT-PACKARD-J, volume = "33", number = "3", pages = "26--29", month = mar, year = "1982", CODEN = "HPJOAX", ISSN = "0018-1153", bibdate = "Tue Mar 25 14:12:15 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/hpj.bib", abstract = "A special printed circuit board tester is developed, the Gemini Universal ECL Signature Test (GUEST) system, that can apply a signature analysis based tests to the emitter coupled logic (ECL). The tester functions at real-time clock rates up to 25 MHz and generates test vectors algorithmically in real time by hardware for a given unit-under-test (UUT). The hardware test vector generation is illustrated and described, including go\slash no go testing, fault backtracking, and feedback loop breaking. A UUT test file is created and verified for the accuracy of test generation.", acknowledgement = ack-nhfb, classcodes = "B1265B (Logic circuits); B7210B (Automatic test and measurement systems); C5210 (Logic design methods)", classification = "713; 721", fjournal = "Hewlett-Packard Journal: technical information from the laboratories of Hewlett-Packard Company", journalabr = "Hewlett Packard J", keywords = "automatic test equipment; ECL logic; Gemini Universal ECL Signature; GUEST; HP 3000; logic circuits, emitter coupled; logic testing; printed circuits; Series 64 boards; signature analysis; test system; Test system; tester; unit-under-test (UUT)", treatment = "P Practical", } @InCollection{Hoogendoorn:1982:SPK, author = "P. J. Hoogendoorn", booktitle = "Computational methods in number theory, {Part I}", title = "On a secure public-key cryptosystem", volume = "154", publisher = "Math. Centrum", address = "Amsterdam", pages = "159--168", year = "1982", MRclass = "68P25 (94A60)", MRnumber = "85b:68014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Math. Centre Tracts", } @Article{Kahn:1982:GLC, author = "David Kahn", title = "The grand lines of cryptology's development", journal = j-COMPUT-SECUR, volume = "1", number = "3", pages = "245--248", month = nov, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900426", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Kasami:1982:KMS, author = "Tadao Kasami and Saburo Yamamura and Kenichi Mori", title = "A key management scheme for end-to-end encryption and a formal verification of its security", journal = "Systems-Comput.-Controls", volume = "13", number = "3", pages = "59--69 (1983)", year = "1982", CODEN = "SYCCBB", ISSN = "0096-8765", MRclass = "94B99", MRnumber = "84i:94045", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", fjournal = "Systems-Computers-Controls. The Transactions of the Institute of Electronics and Communication Engineers of Japan", } @Article{Koyama:1982:CUM, author = "Kenji Koyama", title = "A cryptosystem using the master key for multi-address communication", journal = "Systems-Comput.-Controls", volume = "13", number = "5", pages = "36--46 (1983)", year = "1982", CODEN = "SYCCBB", ISSN = "0096-8765", MRclass = "94A60 (68P25)", MRnumber = "85f:94014", MRreviewer = "James W. Snively, Jr.", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Systems-Computers-Controls. The Transactions of the Institute of Electronics and Communication Engineers of Japan", } @Article{Koyama:1982:MKR, author = "Kenji Koyama", title = "A master key for the {RSA} public-key cryptosystem", journal = "Systems-Comput.-Controls", volume = "13", number = "1", pages = "63--70 (1983)", year = "1982", CODEN = "SYCCBB", ISSN = "0096-8765", MRclass = "68P25 (94A60)", MRnumber = "85a:68044", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Systems-Computers-Controls. The Transactions of the Institute of Electronics and Communication Engineers of Japan", } @Article{Lamport:1982:BGP, author = "Leslie Lamport and Robert Shostak and Marshall Pease", title = "The {Byzantine} Generals Problem", journal = j-TOPLAS, volume = "4", number = "3", pages = "382--401", month = jul, year = "1982", CODEN = "ATPSDT", ISSN = "0164-0925 (print), 1558-4593 (electronic)", ISSN-L = "0164-0925", bibdate = "Sat Oct 17 12:24:31 1998", bibsource = "Compiler/bevan.bib; Compiler/Compiler.Lins.bib; Compiler/TOPLAS.bib; Database/dbase.bib; ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/jamstatassoc.bib; https://www.math.utah.edu/pub/tex/bib/toplas.bib", note = "They proved that Byzantine agreement cannot be reached unless fewer than one-third of the processes are faulty. This result assumes that authentication, i.e., the crypting of messages to make them unforgeable, is not used. With unforgeable messages, they show that the problem is solvable for any $ n \geq t > 0 $, where $n$ is the total number of processes and $t$ is the number of faulty processes.", abstract = "Reliable computer systems must handle malfunctioning components that give conflicting information to different parts of the system. This situation can be expressed abstractly in terms of a group of generals of the Byzantine army camped with their troops around an enemy city. Communicating only by messenger, the generals must agree upon a common battle plan. However, one or more of them may be traitors who will try and confuse the others. The problem is to find an algorithm to ensure that the loyal generals will reach agreement. It is shown that, using only oral messages, this problem is solvable if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals. With unforgeable written messages, the problem is solvable for any number of generals and possible traitors. Applications of the solutions to reliable computer systems are then discussed.", acknowledgement = ack-nhfb # " and " # ack-pb, checked = "19940302", fjournal = "ACM Transactions on Programming Languages and Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J783", keywords = "fault tolerance; interactive consistency; network communications; network operating systems; reliability", source = "Dept. Library", } @Book{Lewin:1982:AMC, author = "Ronald Lewin", title = "The {American} magic: codes, ciphers, and the defeat of {Japan}", publisher = "Farrar Straus Giroux", address = "New York, NY, USA", pages = "xv + 332", year = "1982", ISBN = "0-374-10417-4", ISBN-13 = "978-0-374-10417-7", LCCN = "D810.C88 .L48", bibdate = "Sat Apr 20 12:07:03 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Matsumoto:1982:DTL, author = "Tsutomu Matsumoto and Tomoko Okada and Hideki Imai", title = "Directly transformed link encryption", journal = "Systems-Comput.-Controls", volume = "13", number = "6", pages = "36--44 (1983)", year = "1982", CODEN = "SYCCBB", ISSN = "0096-8765", MRclass = "68P25 (94A60)", MRnumber = "85a:68045", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", fjournal = "Systems-Computers-Controls. The Transactions of the Institute of Electronics and Communication Engineers of Japan", } @InCollection{Merkle:1982:PPK, author = "Ralph C. Merkle", booktitle = "Secure communications and asymmetric cryptosystems", title = "Protocols for public key cryptosystems", volume = "69", publisher = "Westview", address = "Boulder, CO", pages = "73--104", year = "1982", MRclass = "94A05", MRnumber = "668 721", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "AAAS Sel. Sympos. Ser.", } @Book{Merkle:1982:SAP, author = "Ralph C. (Ralph Charles) Merkle", title = "Secrecy, authentication, and public key systems", volume = "18", publisher = "UMI Research Press", address = "Ann Arbor, MI, USA", pages = "104", year = "1982", ISBN = "0-8357-1384-9", ISBN-13 = "978-0-8357-1384-9", LCCN = "QA76.9.A25 M47 1982", bibdate = "Thu Jan 21 14:22:11 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Revision of the author's thesis ({Ph.D.}---Stanford University, 1979).", series = "Computer science. Systems programming", acknowledgement = ack-nhfb, } @Book{Meyer:1982:CND, author = "Carl H. Meyer and Stephen M. Matyas", title = "Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems", publisher = pub-WILEY, address = pub-WILEY:adr, pages = "xxi + 755", year = "1982", ISBN = "0-471-04892-5", ISBN-13 = "978-0-471-04892-3", LCCN = "Z103 .M55", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", price = "US\$39.95", acknowledgement = ack-nhfb, keywords = "cryptography --- handbooks, manuals, etc", } @InProceedings{Plumstead:1982:ISG, author = "Joan Boyar Plumstead", title = "Inferring a sequence generated by a linear congruence", crossref = "IEEE:1982:ASF", pages = "153--159", year = "1982", bibdate = "Wed Jun 22 18:26:09 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "Suppose it is known that $ \{ X_0, X_1, \ldots {}, X_n \} $ is produced by a pseudo-random number generator of the form $ X_{i + 1} = a X_i + b \bmod m $, but $a$, $b$, and $m$ are unknown. Can one efficiently predict the remainder of the sequence with knowledge of only a few elements from that sequence? This question is answered in the affirmative and an algorithm is given.", acknowledgement = ack-nhfb, keywords = "algorithm design and analysis; computer science; cryptography; data analysis; error correction; inference algorithms; power generation; random number generation; sections; tiles", } @InCollection{Randell:1982:CGC, author = "Brian Randell", title = "{Colossus}: Godfather of the Computer (1977)", crossref = "Randell:1982:ODC", pages = "349--354", year = "1982", bibdate = "Sun Nov 03 08:36:11 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Rhodes-Burke:1982:RSA, author = "Robert Rhodes-Burke", title = "Retrofitting for Signature Analysis Simplified", journal = j-HEWLETT-PACKARD-J, volume = "33", number = "1", pages = "9--16", month = jan, year = "1982", CODEN = "HPJOAX", ISSN = "0018-1153", bibdate = "Tue Mar 25 14:12:15 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/hpj.bib", abstract = "Four versions of Microprocessor Exerciser are introduced that make it possible to apply signature analysis trouble-shooting techniques to microprocessor-based products not originally designed for signal analysis methods, by providing preprogrammed external stimulus routines and monitoring circuits. Model 5001A for 6800-microprocessor is illustrated and its operating modes are described.", acknowledgement = ack-nhfb, classcodes = "C5130 (Microprocessor chips); C5210 (Logic design methods)", classification = "722; 723", corpsource = "Hewlett--Packard Co., Palo Alto, CA, USA", fjournal = "Hewlett-Packard Journal: technical information from the laboratories of Hewlett-Packard Company", journalabr = "Hewlett Packard J", keywords = "5001A; computers, microprocessor; external; fault location; Hewlett--Packard; logic testing; microprocessor chips; microprocessor exerciser; microprocessor-based systems; signature analysis; stimulus routines; troubleshooting; troubleshooting techniques", treatment = "P Practical", } @InCollection{Rivest:1982:MOD, author = "Ronald Rivest and Adi Shamir and Leonard M. Adleman", booktitle = "Secure communications and asymmetric cryptosystems", title = "A method for obtaining digital signatures and public key cryptosystems", volume = "69", publisher = "Westview", address = "Boulder, CO", pages = "217--239", year = "1982", MRclass = "94A05", MRnumber = "668 726", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "AAAS Sel. Sympos. Ser.", } @PhdThesis{Schaumuller-Bichl:1982:ADE, author = "Ingrid Schaumuller-Bichl", title = "{Zur Analyse des Data Encryption: Standard und Synthese verwandter Chiffriersysteme}", volume = "40", school = "Johannes Kepler-Universit{\"a}t Linz", address = "Linz, Austria", pages = "168", year = "1982", ISBN = "3-85369-521-3", ISBN-13 = "978-3-85369-521-0", LCCN = "QA76.9.A25S33 1982", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Summary in English. Published by VWGO, Wien, Austria.", series = "Dissertationen der Johannes Kepler-Universit{\"a}t Linz", acknowledgement = ack-nhfb, keywords = "Computers --- Access control --- Passwords; Data encryption (Computer science)", } @InCollection{Shamir:1982:PTA, author = "Adi Shamir", booktitle = "23rd annual symposium on foundations of computer science (Chicago, Ill., 1982)", title = "A polynomial time algorithm for breaking the basic {Merkle--Hellman} cryptosystem", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "145--152", year = "1982", MRclass = "68P25", MRnumber = "780 392", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", } @Book{Shumaker:1982:RCJ, author = "Wayne Shumaker", title = "Renaissance curiosa: {John Dee}'s conversations with angels, {Girolamo Cardano}'s horoscope of {Christ}, {Johannes Trithemius} and cryptography, {George Dalgarno}'s Universal language", volume = "8", publisher = "Center for Medieval and Early Renaissance Studies", address = "Binghamton, NY, USA", pages = "207", year = "1982", ISBN = "0-86698-014-8", ISBN-13 = "978-0-86698-014-2", LCCN = "CB361 .S494 1982", bibdate = "Mon Jul 19 08:47:18 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Intended audience: Renaissance specialists, linguistics, students of occultism, and historians of science.", series = "Medieval and Renaissance texts and studies", acknowledgement = ack-nhfb, annote = "The Trithemius ciphers were finally solved in 1998 by J. Reeds \cite{Reeds:1998:SCB}.", keywords = "Cardano, Girolamo, 1501--1576; Dalgarno, George, 1626?--1687 ars signorum; Dee, John, 1527--1608 true and faithful relation of what passed for many; renaissance --- sources; Trithemius, Johannes, 1462--1516 steganographia; yeers between Dr. John Dee \ldots{} and some spirits", } @InCollection{Simmons:1982:SAE, author = "Gustavus J. Simmons", booktitle = "Secure communications and asymmetric cryptosystems", title = "Symmetric and asymmetric encryption", volume = "69", publisher = pub-WESTVIEW, address = pub-WESTVIEW:adr, pages = "241--298", year = "1982", MRclass = "94A05", MRnumber = "668 727", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", series = "AAAS Sel. Sympos. Ser.", } @Book{Simmons:1982:SCA, editor = "Gustavus J. Simmons", title = "Secure communications and asymmetric cryptosystems", volume = "69", publisher = "Westview Press", address = "Boulder, CO", pages = "x + 338", year = "1982", ISBN = "0-86531-338-5", ISBN-13 = "978-0-86531-338-5", MRclass = "94-06", MRnumber = "85i:94001", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "AAAS Selected Symposia Series", } @Manual{USDA:1982:SMM, author = "{United States.Dept.of the Army}", title = "Soldier's manual: {MOS 32G}: fixed cryptographic equipment repairer, skill levels 1 and 2", number = "FM 11-32G1/2", organization = "Dept. of the Army, Headquarters", address = "Washington, DC, USA (??)", pages = "various", month = may, year = "1982", LCCN = "D 101.20:11-32 G 1/2 Govt Pubs", bibdate = "Sat Nov 18 12:53:52 MST 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "communications, military -- handbooks, manuals, etc.; United States. Army -- communications systems -- maintenance and repair -- handbooks, manuals, etc; United States. Army -- handbooks, manuals, etc", } @Manual{USDA:1982:TGM, author = "{United States.Dept.of the Army}", title = "Trainer's guide: {MOS 32G}: fixed cryptographic equipment repairer", number = "FM 11-32G/TG", organization = "Dept. of the Army, Headquarters", address = "Washington, DC, USA (??)", pages = "35", day = "14", month = may, year = "1982", LCCN = "D 101.20:11-32 G/TG Govt Pubs", bibdate = "Sat Nov 18 12:53:52 MST 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "communications, military -- handbooks, manuals, etc; United States. Army -- communications systems -- maintenance and repair -- handbooks, manuals, etc; United States. Army -- handbooks, manuals, etc", } @Manual{USGSA:1982:TGS, author = "{United States.General Services Administration}", title = "Telecommunications: general security requirements for equipment using the {Data Encryption Standard}", organization = "General Services Administration", address = "Washington, DC, USA", pages = "12", day = "14", month = apr, year = "1982", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Federal Standard 1027.", acknowledgement = ack-nhfb, } @Book{Warren:1982:BTC, author = "Alexander Z. Warren", title = "{Basic-plus} through cryptanalysis; an introduction to structured programming", publisher = "????", address = "????", pages = "100", year = "1982", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Privately printed", acknowledgement = ack-nhfb, keywords = "BASIC-PLUS (Computer program language); Phillips Academy --- Faculty", } @Book{Welchman:1982:HSS, author = "Gordon Welchman", title = "The {Hut Six} story: breaking the {Enigma} codes", publisher = pub-MCGRAW-HILL, address = pub-MCGRAW-HILL:adr, pages = "ix + 326", year = "1982", ISBN = "0-07-069180-0", ISBN-13 = "978-0-07-069180-3", LCCN = "D810.C88 W44", bibdate = "Mon Nov 4 07:46:57 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Welchman, Gordon; World War, 1939--1945 --- cryptography; World War, 1939--1945 --- personal narratives, British; World War, 1939--1945 --- secret service --- Great Britain", } @TechReport{Wells:1982:USE, author = "David L. Wells", title = "The use of subkey encryption to counter traffic analysis in communications networks", type = "Technical report", number = "CSE 8201", institution = "Department of Computer Science and Engineering, Southern Methodist University", address = "Dallas, TX, USA", pages = "24", month = feb, year = "1982", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Supported by the National Science Foundation under grant no. MCS 8107479.", keywords = "Computer networks.", } @Article{Wilkes:1982:MRJ, author = "Maurice V. Wilkes and I. J. Good", title = "Meetings in Retrospect: {J. G. Brainerd on the ENIAC}; {A Report on T. H. Flowers's Lecture on Colossus}", journal = j-ANN-HIST-COMPUT, volume = "4", number = "1", pages = "53--59", month = jan # "\slash " # mar, year = "1982", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 1 15:29:19 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://dlib.computer.org/an/books/an1982/pdf/a1053.pdf; http://www.computer.org/annals/an1982/a1053abs.htm", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @Article{Willett:1982:CON, author = "Michael Willett", title = "Cryptography old and new", journal = j-COMPUT-SECUR, volume = "1", number = "2", pages = "177--186", month = jun, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:07 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900104", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Willett:1982:TPK, author = "Michael Willett", title = "A tutorial on public key cryptography", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "72--79", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404882900281", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @InCollection{Williams:1982:CHP, author = "Hugh C. Williams", booktitle = "Secure communications and asymmetric cryptosystems", title = "Computationally ``hard'' problems as a source for cryptosystems", volume = "69", publisher = "Westview", address = "Boulder, CO", pages = "11--39", year = "1982", MRclass = "94A05", MRnumber = "668 719", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "AAAS Sel. Sympos. Ser.", } @Article{Wood:1982:FAC, author = "Charles Cresson Wood", title = "Future applications of cryptography", journal = j-COMPUT-SECUR, volume = "1", number = "1", pages = "65--71", month = jan, year = "1982", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:06 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488290027X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @InProceedings{Yao:1982:PSC, author = "A. Yao", title = "Protocols for Secure Computation", crossref = "IEEE:1982:ASF", pages = "160--164", year = "1982", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 27]{Canetti:1997:PSL}.", } @InProceedings{Yao:1982:TAT, author = "A. C. Yao", title = "Theory and Application of Trapdoor Functions", crossref = "IEEE:1982:ASF", pages = "80--91", year = "1982", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 28]{Goldreich:1997:FMCb}.", } @InProceedings{Adleman:1983:BGK, author = "Leonard M. Adleman", title = "On breaking generalized knapsack public key cryptosystems", crossref = "ACM:1983:PFA", pages = "402--412", year = "1983", bibdate = "Thu Feb 21 06:51:34 MST 2002", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Misc{Adleman:1983:CCS, author = "L. M. Adleman and R. L. Rivest and A. Shamir", title = "Cryptographic Communications System and Method", howpublished = "US Patent No. 4,405,829.", day = "20", month = sep, year = "1983", bibdate = "Sat Nov 29 13:42:30 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Patent filed 14 September 1977.", URL = "https://www.google.com/patents/US4405829", abstract = "A cryptographic communications system and method. The system includes a communications channel coupled to at least one terminal having an encoding device and to at least one terminal having a decoding device. A message-to-be-transferred is enciphered to ciphertext at the encoding terminal by first encoding the message as a number $M$ in a predetermined set, and then raising that number to a first predetermined power (associated with the intended receiver) and finally computing the remainder, or residue, $C$, when the exponentiated number is divided by the product of two predetermined prime numbers (associated with the intended receiver). The residue $C$ is the ciphertext. The ciphertext is deciphered to the original message at the decoding terminal in a similar manner by raising the ciphertext to a second predetermined power (associated with the intended receiver), and then computing the residue, $ M'$, when the exponentiated ciphertext is divided by the product of the two predetermined prime numbers associated with the intended receiver. The residue $ M'$ corresponds to the original encoded message $M$.", acknowledgement = ack-nhfb, } @Article{Akl:1983:CSP, author = "Selim G. Akl and Peter D. Taylor", title = "Cryptographic Solution to a Problem of Access Control in a Hierarchy", journal = j-TOCS, volume = "1", number = "3", pages = "239--248", month = aug, year = "1983", CODEN = "ACSYEC", ISSN = "0734-2071 (print), 1557-7333 (electronic)", ISSN-L = "0734-2071", bibdate = "Thu Jan 14 11:18:40 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM Transactions on Computer Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774", } @Article{Akritas:1983:CEA, author = "A. G. Akritas and S. S. Iyengar and A. A. Rampuria", title = "Computationally efficient algorithms for a one-time pad scheme", journal = j-INT-J-COMPUT-INF-SCI, volume = "12", number = "4", pages = "285--316", month = aug, year = "1983", CODEN = "IJCIAH", ISSN = "0091-7036", MRclass = "68P25 (94A99)", MRnumber = "741 781", bibdate = "Sat Apr 26 14:03:16 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib", acknowledgement = ack-nhfb, classification = "C6130 (Data handling techniques)", corpsource = "Dept. of Computer Sci., Univ. of Kansas, Lawrence, KS, USA", fjournal = "International Journal of Computer and Information Sciences", keywords = "chi-square method; ciphers security; cryptography; data processing; one-time pad scheme", treatment = "T Theoretical or Mathematical", } @Article{Alpern:1983:KEU, author = "B. Alpern and F. B. Schneider", title = "Key exchange using keyless cryptography", journal = j-INFO-PROC-LETT, volume = "16", number = "2", pages = "79--81", day = "26", month = feb, year = "1983", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classification = "B6120B (Codes); B6210L (Computer communications); C5620 (Computer networks and techniques); C6130 (Data handling techniques)", corpsource = "Dept. of Computer Sci., Cornell Univ., Ithaca, NY, USA", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", keywords = "computer network; computer networks; cryptography; keyless cryptography; protocols; secret keys", treatment = "P Practical; T Theoretical or Mathematical", } @Book{ANSI:1983:ANS, author = "{American National Standards Institute}", title = "{American National Standard} for information systems: data encryption algorithm: modes of operation", publisher = pub-ANSI, address = pub-ANSI:adr, pages = "??", year = "1983", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Ayoub:1983:DCE, author = "F. Ayoub", title = "The design of complete encryption networks using cryptographically equivalent permutations", journal = j-COMPUT-SECUR, volume = "2", number = "3", pages = "261--267", month = nov, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:22 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488390010X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Bauer:1983:KDP, author = "R. K. Bauer and T. A. Berson and R. J. Feiertag", title = "A Key Distribution Protocol Using Event Markers", journal = j-TOCS, volume = "1", number = "3", pages = "249--255", month = aug, year = "1983", CODEN = "ACSYEC", ISSN = "0734-2071 (print), 1557-7333 (electronic)", ISSN-L = "0734-2071", bibdate = "Thu Jan 14 11:57:59 1999", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM Transactions on Computer Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774", } @InProceedings{Ben-Or:1983:CSS, author = "Michael Ben-Or and Benny Chor and Adi Shamir", title = "On the cryptographic security of single {RSA} bits", crossref = "ACM:1983:PFA", pages = "421--430", year = "1983", bibdate = "Thu Feb 21 06:51:34 MST 2002", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Book{Bertrand:1983:EGE, author = "Gustave Bertrand", title = "{Enigma}, or, The greatest enigma of the 1939--1945 war", publisher = "????", address = "????", pages = "vi + 415", year = "1983", LCCN = "????", bibdate = "Sun Dec 01 09:15:14 2013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "English translation by Russell Babcock Holmes of \cite{Bertrand:1973:EOP}.", acknowledgement = ack-nhfb, } @Book{Blahut:1983:TPE, author = "Richard E. Blahut", title = "Theory and Practice of Error Control Coding", publisher = pub-AW, address = pub-AW:adr, pages = "xi + 500", year = "1983", ISBN = "0-201-10102-5", ISBN-13 = "978-0-201-10102-7", LCCN = "QA268 .B54 1983", bibdate = "Mon Nov 30 08:52:10 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Blum:1983:CFT, author = "Manuel Blum", title = "Coin Flipping by Telephone --- a Protocol for Solving Impossible Problems", journal = j-SIGACT, volume = "15", number = "1", pages = "23--27", month = jan, year = "1983", CODEN = "SIGNDM", DOI = "https://doi.org/10.1145/1008908.1008911", ISSN = "0163-5700 (print), 1943-5827 (electronic)", ISSN-L = "0163-5700", bibdate = "Sun Mar 11 11:37:49 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sigact.bib", abstract = "Alice and Bob want to flip a coin by telephone. (They have just divorced, live in different cities, want to decide who gets the car.) Bob would not like to tell Alice HEADS and hear Alice (at the other end of the line) say ``Here goes \ldots{} I'm flipping the coin\ldots{}. You lost!'' Coin-flipping in the SPECIAL way done here has a serious purpose. Indeed, it should prove an INDISPENSABLE TOOL of the protocol designer. Whenever a protocol requires one of two adversaries, say Alice, to pick a sequence of bits at random, and whenever it serves Alice's interests best NOT to pick her sequence of bits at random, then coin-flipping (Bob flipping coins to Alice) as defined here achieves the desired goal: (1) It GUARANTEES to Bob that Alice will pick her sequence of bits at random. Her bit is 1 if Bob flips heads to her, 0 otherwise. (2) It GUARANTEES to Alice that Bob will not know WHAT sequence of bits he flipped to her. Coin-flipping has already proved useful in solving a number of problems once thought impossible: mental poker, certified mail, and exchange of secrets. It will certainly prove a useful tool in solving other problems as well.", acknowledgement = ack-nhfb, fjournal = "ACM SIGACT News", journal-URL = "http://dl.acm.org/citation.cfm?id=J697", } @Article{Blum:1983:HES, author = "Manuel Blum", title = "How to Exchange (Secret) Keys", journal = j-TOCS, volume = "1", number = "2", pages = "175--193", month = may, year = "1983", CODEN = "ACSYEC", ISSN = "0734-2071 (print), 1557-7333 (electronic)", ISSN-L = "0734-2071", bibdate = "Thu Jan 14 11:57:59 1999", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.security.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Previously published in ACM STOC '83 proceedings, pages 440--447.", acknowledgement = ack-nhfb, fjournal = "ACM Transactions on Computer Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774", } @InProceedings{Brickell:1983:EAA, author = "E. F. Brickell and J. C. Lagarias and A. M. Odlyzko", title = "Evaluation of the {Adleman} attack on multiply iterated knapsack cryptosystems", crossref = "Chaum:1983:ACP", pages = "39--42", year = "1983", bibdate = "Thu Apr 04 10:06:34 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Brickell:1983:SRK, author = "Ernest F. Brickell and Gustavus J. Simmons", title = "A status report on knapsack based public key cryptosystems", journal = j-CONG-NUM, volume = "37", pages = "3--72", year = "1983", ISSN = "0384-9864", MRclass = "94A60 (11T71)", MRnumber = "85f:94013", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Congressus Numerantium. A Conference Journal on Numerical Themes", } @Article{Bromley:1983:RFM, author = "Allan G. Bromley and Martin Campbell-Kelly and K. W. Smillie and Eric A. Weiss and Saul Rosen and Cipher A. Deavours", title = "Reviews: {O. I. Franksen: Mr. Babbage, the Difference Engine, and the Problem of Notation: An Account of the Origin of Recursiveness and Conditionals in Computer Programming}; {H. Lukoff: from Dits to Bits}; {I. Asimov: Asimov's Biographical Encyclopedia of Science and Technology}; {J. Futrelle: Thinking Machine}; {R. M. Hord: The Illiac IV}; {C. H. Meyer and S. M. Matyas: Cryptography}; {T. J. Peters and R. H. Waterman: In Search of Excellence}; {J. W. Stokes: 70 Years of Radio Tubes and Valves}; {G. Welchman: The Hut Six Story}; Capsule Reviews", journal = j-ANN-HIST-COMPUT, volume = "5", number = "4", pages = "411--427", month = oct # "\slash " # dec, year = "1983", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Mon Nov 04 09:22:16 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://dlib.computer.org/an/books/an1983/pdf/a4411.pdf; http://www.computer.org/annals/an1983/a4411abs.htm", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @TechReport{CBEMA:1983:ANSa, author = "{Computer and Business Equipment Manufacturers Association} and {American National Standards Institute}", title = "{American National Standard for Information Systems}: Data Link Encryption", type = "????", number = "ANSI X3.105-1983", institution = pub-ANSI, address = pub-ANSI:adr, pages = "20", day = "16", month = may, year = "1983", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Computer interfaces --- Standards; Programming languages (Electronic computers) --- Standards", } @TechReport{CBEMA:1983:ANSb, author = "{Computer and Business Equipment Manufacturers Association} and {American National Standards Institute}", title = "{American National Standard for Information Systems}: {Data Encryption Algorithm} --- Modes of Operation", type = "????", number = "ANSI X3.106-1983", institution = pub-ANSI, address = pub-ANSI:adr, pages = "16", day = "16", month = may, year = "1983", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Computer interfaces --- Standards; Programming languages (Electronic computers) --- Standards", } @Article{Cesarini:1983:ACC, author = "F. Cesarini and G. Soda", title = "An algorithm to construct a compact {$B$}-tree in case of ordered keys", journal = j-INFO-PROC-LETT, volume = "17", number = "1", pages = "13--16", day = "19", month = jul, year = "1983", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classification = "723; C1160 (Combinatorial mathematics); C1260 (Information theory)", corpsource = "Istituto di Informatica e Sistemistica, Univ. of Florence, Florence, Italy", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "compact B-tree; computer programming; construction algorithm; cryptography; data processing --- Data Structures; ordered keys; overflow movings; trees (mathematics)", treatment = "T Theoretical or Mathematical", } @Article{Chandler:1983:IMC, author = "W. W. Chandler", title = "The Installation and Maintenance of {Colossus}", journal = j-ANN-HIST-COMPUT, volume = "5", number = "3", pages = "260--262", month = jul # "\slash " # sep, year = "1983", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 1 15:29:20 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://dlib.computer.org/an/books/an1983/pdf/a3260.pdf; http://www.computer.org/annals/an1983/a3260abs.htm", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @InProceedings{Chaum:1983:BSU, author = "D. Chaum", editor = "????", booktitle = "{Advances in Cryptology, Proceedings of CRYPTO 82}", title = "Blind signatures for untraceable payments", publisher = pub-PLENUM, address = pub-PLENUM:adr, pages = "199--203", year = "1983", bibdate = "Thu Sep 22 18:48:28 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Coombs:1983:MC, author = "Allen W. M. Coombs", title = "The Making of {Colossus}", journal = j-ANN-HIST-COMPUT, volume = "5", number = "3", pages = "253--259", month = jul # "\slash " # sep, year = "1983", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 1 15:29:20 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://dlib.computer.org/an/books/an1983/pdf/a3253.pdf; http://www.computer.org/annals/an1983/a3253abs.htm", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", } @Book{DeMillo:1983:ACC, author = "Richard A. DeMillo and others", title = "Applied cryptology, cryptographic protocols, and computer security models", volume = "29", publisher = pub-AMS, address = pub-AMS:adr, pages = "xi + 192", year = "1983", ISBN = "0-8218-0041-8", ISBN-13 = "978-0-8218-0041-6", ISSN = "0160-7634", LCCN = "QA1 .A56 v.29 1981", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Expanded version of notes prepared for the AMS short course entitled Cryptology in revolution, mathematics and models, held in San Francisco, CA, Jan. 5--6, 1981, by Richard A. DeMillo and others.", series = "Proceedings of symposia in applied mathematics. AMS short course lecture notes", acknowledgement = ack-nhfb, keywords = "computers --- access control; cryptography", } @Article{DeMillo:1983:PDS, author = "R. DeMillo and M. Merritt", title = "Protocols for Data Security", journal = j-COMPUTER, volume = "16", number = "2", pages = "39--50", month = feb, year = "1983", CODEN = "CPTRB4", ISSN = "0018-9162 (print), 1558-0814 (electronic)", ISSN-L = "0018-9162", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1004.html", acknowledgement = ack-nhfb, fjournal = "Computer", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2", keywords = "information hiding; steganography", } @Article{Dolev:1983:AAB, author = "D. Dolev and H. R. Strong", title = "Authenticated Algorithms for {Byzantine} Agreement", journal = j-SIAM-J-COMPUT, volume = "12", number = "4", pages = "656--666", month = "????", year = "1983", CODEN = "SMJCAT", ISSN = "0097-5397 (print), 1095-7111 (electronic)", ISSN-L = "0097-5397", MRclass = "68M10", MRnumber = "85a:68004", bibdate = "Mon Nov 29 10:59:59 MST 2010", bibsource = "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/12/4; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "SIAM Journal on Computing", journal-URL = "http://epubs.siam.org/sicomp", } @Article{Ecker:1983:FSR, author = "A. Ecker", booktitle = "Cryptography (Burg Feuerstein, 1982)", title = "Finite semigroups and the {RSA}-cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "149", pages = "353--369", year = "1983", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A99 (20M35)", MRnumber = "84k:94019", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Lecture Notes in Computer Science", } @Article{Flowers:1983:DC, author = "Thomas H. Flowers", title = "The Design of {Colossus}", journal = j-ANN-HIST-COMPUT, volume = "5", number = "3", pages = "239--253", month = jul # "\slash " # sep, year = "1983", CODEN = "AHCOE5", ISSN = "0164-1239", bibdate = "Fri Nov 1 15:29:20 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Foreword by Howard Campaigne.", URL = "http://dlib.computer.org/an/books/an1983/pdf/a3239.pdf; http://www.computer.org/annals/an1983/a3239abs.htm", acknowledgement = ack-nhfb, fjournal = "Annals of the History of Computing", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650", xxpages = "239--252", } @MastersThesis{Gullichsen:1983:BHS, author = "Eric Alexander Gullichsen", title = "Bidirectional heuristic search and spectral {S}-box simplification for the cryptanalysis of the {NBS Data Encryption Standard}", volume = "64919", type = "Thesis ({M.Sc.})", publisher = "National Library of Canada", school = "University of British Columbia", address = "Ottawa, ON, Canada", year = "1983", ISBN = "0-315-17010-7", ISBN-13 = "978-0-315-17010-0", ISSN = "0227-3845", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "3 microfiches (265 fr.)", series = "Canadian theses on microfiche = Th{\`e}ses canadiennes sur microfiche", acknowledgement = ack-nhfb, } @Article{Highland:1983:BRCb, author = "Harold Joseph Highland", title = "Book Review: {{\booktitle{Codes, ciphers and computers: an introduction to information security}}: Bruce Bosworth: Rochelle Park NJ: Hayden Book Company, Inc., 1982. viii + 259 pp., \$13.95}", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "83--84", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488390041X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Book{Hodges:1983:ATE, author = "Andrew Hodges", title = "{Alan Turing}: the enigma", publisher = pub-SIMON-SCHUSTER, address = pub-SIMON-SCHUSTER:adr, pages = "587", year = "1983", ISBN = "0-671-49207-1, 0-09-152130-0 (Burnett Books)", ISBN-13 = "978-0-671-49207-6, 978-0-09-152130-1 (Burnett Books)", LCCN = "QA29.T8 H63 1983", bibdate = "Thu Jan 21 14:17:53 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Hunter:1983:ERA, author = "D. G. N. Hunter and A. R. McKenzie", title = "Experiments with Relaxation Algorithms for Breaking Simple Substitution Ciphers", journal = j-COMP-J, volume = "26", number = "1", pages = "68--71", month = feb, year = "1983", CODEN = "CMPJA6", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", bibdate = "Tue Mar 25 13:51:56 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/compj1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classcodes = "C7890 (Other special applications of computing)", classification = "723", fjournal = "The Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", keywords = "algorithms; cipher breaking; computer programming; cryptography; decoding; relaxation; relaxation theory; substitution ciphers; word boundaries", treatment = "P Practical", } @Article{Israel:1983:AOS, author = "J. E. Israel and T. A. Linden", title = "Authentication in Office System Internetworks", journal = j-TOOIS, volume = "1", number = "3", pages = "193--210", month = jul, year = "1983", CODEN = "ATOSDO", ISSN = "0734-2047", ISSN-L = "0734-2047", bibdate = "Sat Jan 16 16:21:56 MST 1999", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib; http://liinwww.ira.uka.de/bibliography/Database/Graefe.html; http://www.acm.org/pubs/tois/toc.html; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.acm.org:80", abstract = "In a distributed office system, authentication data (such as password) must be managed in such a way that users and machines from different organizations can easily authenticate themselves to each other. The authentication facility must be secure, but user convenience, decentralized administration, and a capability for smooth, long-term evolution are also important. In addition, the authentication arrangements must not permit failures at a single node to cause systemwide down time. The design used in the Xerox 8000 Series products is described. This design anticipates applications in an open-network architecture where there are nodes from diverse sources and one node does not trust authentication checking done by other nodes. Furthermore, in some offices encryption will be required to authenticate data transmissions despite hostile intruders on the network. Requirements and design constraints when applying encryption for authentication in office systems are discussed. It is suggested that protocol standards for use in office systems should allow unencrypted authentication as well as two options for encrypted authentication. Issues that will arise as an office system evolves to deal with increasingly sophisticated threats from users of the system are described.", acknowledgement = ack-nhfb, fjournal = "ACM Transactions on Office Information Systems", keywords = "Authentication; Computer-communication networks; Data encryption; Data encryption standard (DES); Decentralized systems; Distributed systems; Ethernet; General; Heterogeneous systems; Information systems applications; Internetworks; Network architecture and design; Network communications; Network protocols; Office automation; Open architecture; Protocol architecture; Security; Security and protection; Standardization", } @Book{Kahn:1983:KCS, author = "David Kahn", title = "{Kahn} on codes: secrets of the new cryptology", publisher = pub-MACMILLAN, address = pub-MACMILLAN:adr, pages = "viii + 343", year = "1983", ISBN = "0-02-560640-9", ISBN-13 = "978-0-02-560640-1", LCCN = "Z103 .K29 1983", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography.", } @Article{Kak:1983:EMP, author = "Subhash C. Kak", title = "Exponentiation modulo a polynomial for data security", journal = j-INT-J-COMPUT-INF-SCI, volume = "12", number = "5", pages = "337--346", month = oct, year = "1983", CODEN = "IJCIAH", ISSN = "0091-7036", MRclass = "68P25 (94A60)", MRnumber = "85f:68023", bibdate = "Sat Apr 26 14:03:16 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib", acknowledgement = ack-nhfb, classification = "C6130 (Data handling techniques)", corpsource = "Dept. of Electrical and Computer Engng., Louisiana State Univ., Baton Rouge, LA, USA", fjournal = "International Journal of Computer and Information Sciences", keywords = "cryptography; data security; encryption; exponential modulo; public-key cryptosystem; RSA algorithm; security of data", treatment = "P Practical", } @Book{Koscielny:1983:PRD, author = "Czeslaw Koscielny", title = "Programowa realizacja dzialan w cialach skonczonych do zastosowan w technice kodowania korekcyjnego i kryptografii", volume = "61. 11", publisher = "Wydawn. Politechniki Wroclawskiej", address = "Wroclaw, Poland", pages = "115", year = "1983", ISBN = "????", ISBN-13 = "????", ISSN = "0324-9786", LCCN = "QA76.9.A251 K6 1983", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Title on p. [2] of cover: A software approach to computing in finite fields with applications to error-correcting coding technique and cryptography. Summary in English and Russian; legends and table of contents also in English. Bibliography: p. 109--110.", price = "zl93.00", series = "Prace naukowe Instytutu Cybernetyki Technicznej Politechniki Wroclawskiej; Seria Monografie", acknowledgement = ack-nhfb, keywords = "computer security; error-correcting codes (information theory)", } @Article{Koyama:1983:MKR, author = "Kenji Koyama", title = "A master key for the {Rabin}'s public-key cryptosystem", journal = "Systems-Comput.-Controls", volume = "14", number = "6", pages = "49--57 (1984)", year = "1983", CODEN = "SYCCBB", ISSN = "0096-8765", MRclass = "94A60 (68P20)", MRnumber = "86j:94049", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Systems-Computers-Controls. The Transactions of the Institute of Electronics and Communication Engineers of Japan", } @InCollection{Lakshmivarahan:1983:APK, author = "S. Lakshmivarahan", booktitle = "Advances in computers, Vol. 22", title = "Algorithms for public key cryptosystems: theory and application", volume = "22", publisher = pub-ACADEMIC, address = pub-ACADEMIC:adr, pages = "45--108", year = "1983", MRclass = "94A60", MRnumber = "86f:94027", MRreviewer = "M. R{\u{a}}duic{\u{a}}", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Adv. in Comput.", } @Book{Levine:1983:USC, author = "Jack Levine", title = "{United States} cryptographic patents, 1861--1981", publisher = "Cryptologia", address = "Terre Haute, IN, USA", pages = "69", year = "1983", ISBN = "0-9610560-0-2", ISBN-13 = "978-0-9610560-0-1", LCCN = "T223.Z1 .L48", bibdate = "Sat Nov 18 12:53:52 MST 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "cryptography; patents", } @Article{Lomet:1983:HPU, author = "David B. Lomet", title = "A high performance, universal, key associative access method", journal = j-SIGMOD, volume = "13", number = "4", pages = "120--133", month = may, year = "1983", CODEN = "SRECD8", ISSN = "0163-5808 (print), 1943-5835 (electronic)", ISSN-L = "0163-5808", bibdate = "Sat Mar 6 07:33:53 MST 2004", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGMOD Record", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J689", } @InProceedings{Massey:1983:LFC, author = "J. L. Massey", editor = "Edward C. van der Meulen", booktitle = "{Proceedings of the Fourth Symposium on Information Theory in the Benelux: held at the Brembergcentrum, Haasrode, Belgium, May 26--27, 1983}", title = "Logarithms in finite cycle groups -- cryptographic issues", publisher = pub-IEEE, address = pub-IEEE:adr, pages = "17--25", year = "1983", ISBN = "90-334-0690-X", ISBN-13 = "978-90-334-0690-4", LCCN = "Q350 S988 1983", bibdate = "Sun Mar 11 10:44:22 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @PhdThesis{Meijer:1983:CCC, author = "Henk Meijer", title = "Cryptology computational complexity and applications", volume = "65915", type = "Thesis ({Ph.D.})", publisher = "National Library of Canada", school = "Queen's University", address = "Ottawa, ON, Canada", year = "1983", ISBN = "0-315-18006-4", ISBN-13 = "978-0-315-18006-2", ISSN = "0227-3845", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "2 microfiches (179 fr.)", series = "Canadian theses on microfiche = Th{\`e}ses canadiennes sur microfiche", acknowledgement = ack-nhfb, } @Article{Moler:1983:SVA, author = "Cleve Moler and Donald Morrison", title = "Singular Value Analysis of Cryptograms", journal = j-AMER-MATH-MONTHLY, volume = "90", number = "2", pages = "78--87", month = feb, year = "1983", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", bibdate = "Mon Jun 28 12:37:03 MDT 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; JSTOR database", acknowledgement = ack-nhfb, fjournal = "American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @Article{Morrison:1983:SEA, author = "D. R. Morrison", title = "Subtractive encryptors: alternatives to the {DES}", journal = j-SIGACT, volume = "15", number = "1", pages = "67--77", month = "Winter--Spring", year = "1983", CODEN = "SIGNDM", DOI = "https://doi.org/10.1145/1008908.1008919", ISSN = "0163-5700 (print), 1943-5827 (electronic)", ISSN-L = "0163-5700", bibdate = "Wed Mar 21 08:21:21 MDT 2012", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/sigact.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGACT News", journal-URL = "http://dl.acm.org/citation.cfm?id=J697", } @Article{Muller-Schloer:1983:MBC, author = "C. M{\"u}ller-Schloer", title = "A microprocessor-based cryptoprocessor", journal = j-IEEE-MICRO, volume = "3", number = "5", pages = "5--15", month = sep # "\slash " # oct, year = "1983", CODEN = "IEMIDZ", DOI = "https://doi.org/10.1109/MM.1983.291160", ISSN = "0272-1732 (print), 1937-4143 (electronic)", ISSN-L = "0272-1732", bibdate = "Mon Apr 7 14:32:46 MDT 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib", acknowledgement = ack-nhfb, classcodes = "B6210L (Computer communications); C5250 (Microcomputer techniques); C5620 (Computer networks and techniques)", classification = "723", corpsource = "Siemens AG, Munich, West Germany", fjournal = "IEEE Micro", journal-URL = "http://www.computer.org/csdl/mags/mi/index.html", journalabr = "IEEE Micro", keywords = "computers; computers, microprocessor --- Applications; crypto processor; cryptography; cryptoprocessor; data communication systems; data encryption standard; data privacy; data processing; electronic envelope; electronic mail; hardware; host-computer application programmer; hybrid system; IEEE 796 module; IEEE-796-bus-compatible 8086 single-board computer; microcomputers; microprocessor-based; RSA public-key; satellite computers; security communication system; software interface; special purpose; system; user interface", treatment = "P Practical", } @PhdThesis{Plumstead:1983:ISP, author = "Joan Boyar Plumstead", title = "Inferring Sequences Produced by Pseudo-Random Number Generators", type = "{Ph.D.} Dissertation", school = "Department of Computer Science, University of California, Berkeley", address = "Berkeley, CA, USA", pages = "ii + 56", month = jun, year = "1983", bibdate = "Wed Jun 22 18:14:45 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", abstract = "To solve the problem of inferring sequences produced by pseudo-random number generators of a particular form, one must present an efficient inference method which, from knowledge of some of the numbers in a sequence, predicts the remainder of the sequence. Pseudo-random number generators of the following forms are considered: (1) Linear congruential method, $ X(, i + 1) = a X(, i) + b \bmod m $. (2) Linear congruences with $n$ terms in the recurrence, for fixed $n$, $ X(, i) = a(, 1) X(, i - 1) + a(, 2) X(, i - 2) + (.)(.)(.) + a(, n) X(, i - n) + a(, n + 1) \bmod m $. (3) Quadratic congruences, $ X(, i + 1) = a X(, i)('2) + b X(, i) + c \bmod m $. In each case, it is assumed that the coefficients and the modulus are unknown. It is also assumed that whenever an incorrect prediction occurs, the correct value is revealed before the next prediction is made. Sequences of the first type can be predicted with no more than $ 2 + \log (, 2) m $ errors, sequences of the second type with no more than $ 2 + n('2) \log (, 2) n m $ errors, and sequences of the third type with no more than $ 4 + 3 \log (, 2)m $ errors. All of the inference methods presented are efficient. This shows that pseudo-random number generators in any of these forms are cryptographically insecure.", acknowledgement = ack-nhfb, } @Book{Price:1983:ABR, author = "W. L. Price", title = "Annotated bibliography of recent publications on data security and cryptography", volume = "35/83", publisher = "National Physical Laboratory", address = "Teddington, Middlesex, UK", edition = "Sixth", pages = "ii + 29", year = "1983", LCCN = "Z103.A1 P74 1983a", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprinted by permission of the Controller of Her Britannic Majesty's Stationery Office. ``PB84-169168.'' Photocopy. Springfield, VA: National Technical Information Service, [1983?]. 28 cm.", series = "NPL-DITC", acknowledgement = ack-nhfb, keywords = "cryptography --- bibliography; data protection --- bibliography", } @Article{Rivest:1983:MOD, author = "R. L. Rivest and A. Shamir and L. Adleman", title = "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", journal = j-CACM, volume = "26", number = "1", pages = "96--99", month = jan, year = "1983", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Thu Sep 22 11:37:34 1994", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib; https://www.math.utah.edu/pub/tex/bib/cacm1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be ``signed'' using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in ``electronic mail'' and ``electronic funds transfer'' systems. A message is encrypted by representing it as a number $M$, raising $M$ to a publicly specified power $e$, and then taking the remainder when the result is divided by the publicly specified product, $n$, of two large secret prime numbers $p$ and $q$. Decryption is similar; only a different, secret, power $d$ is used, where $ e * d = = 1 (\mbox {mod}(p - 1)*(q - 1)) $. The security of the system rests in part on the difficulty of factoring the published divisor, n.", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @TechReport{Rivest:1983:RET, author = "Ronald L. Rivest and Alan T. Sherman", title = "Randomized encryption techniques", type = "Technical report", number = "MIT/LCS/TM-234", institution = "Massachusetts Institute of Technology, Laboratory for Computer Science", address = "Cambridge, MA, USA", pages = "20", year = "1983", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Schell:1983:SPA, author = "K. J. Schell", title = "Security Printers Application of Lasers", journal = "Proceedings of SPIE --- The International Society for Optical Engineering", volume = "396", pages = "131--140", year = "1983", CODEN = "PSISDG", ISBN = "0-89252-431-6", ISBN-13 = "978-0-89252-431-0", ISSN = "0277-786X (print), 1996-756X (electronic)", LCCN = "TA1673 .A38 1983", bibdate = "Mon May 11 18:28:54 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "Industrial application of lasers in the graphic industry is increasing. Examples are typesetting, color separation and laser dot generating, laser printing, laser gravure, laser plate making, etc. Application of laser technology in the area of security printers had a rather slow start but is speeding up rapidly. Encoding credit cards by laser and holography are examples of the application of lasers in this field. We summarize known industrial applications of lasers in the graphic industries and report about the applications of lasers in the detection of a coded watermark. A step repeat holographic laser camera for the production of holograms in dichromatic gelatine is described.", acknowledgement = ack-nhfb, affiliation = "Joh. Enschede \& Sons, Security Printers, Haarlem, Neth", affiliationaddress = "Joh. Enschede \& Sons, Security Printers, Haarlem, Neth", classification = "722; 743; 744; 745", conference = "Advances in Laser Scanning and Recording.", journalabr = "Proceedings of SPIE - The International Society for Optical Engineering", keywords = "coded watermark reacting; graphic industry laser applications; graphic methods; holographic step and repeat camera; Laser Applications; laser printing; reflection holography; security printers' laser applications; typesetting", meetingaddress = "Geneva, Switz", sponsor = "SPIE, Bellingham, WA, USA", } @Article{Schobi:1983:FAT, author = "P. Sch{\"o}bi and J. L. Massey", booktitle = "Cryptography (Burg Feuerstein, 1982)", title = "Fast authentication in a trapdoor-knapsack public key cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "149", pages = "289--306", year = "1983", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94B99", MRnumber = "84i:94047", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Lecture Notes in Computer Science", } @Article{Shamir:1983:ECT, author = "Adi Shamir", title = "Embedding Cryptographic Trapdoors in Arbitrary Knapsack Systems", journal = j-INFO-PROC-LETT, volume = "17", number = "2", pages = "77--79", day = "24", month = aug, year = "1983", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "94A60", MRnumber = "85e:94019", MRreviewer = "Tai Yang Hwang", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/infoproc.bib", acknowledgement = ack-nhfb, classification = "723; C1260 (Information theory); C1290Z (Other applications of systems theory); C6130 (Data handling techniques)", corpsource = "Dept. of Appl. Maths., Weizmann Inst. of Sci., Rehovot, Israel", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "arbitrary knapsack systems; cryptographic trapdoors; cryptography; information theory; modular multiplications; operations research; public-key cryptography", treatment = "P Practical; T Theoretical or Mathematical", } @Article{Shamir:1983:GCS, author = "Adi Shamir", title = "On the Generation of Cryptographically Strong Pseudorandom Sequences", journal = j-TOCS, volume = "1", number = "1", pages = "38--44", month = feb, year = "1983", CODEN = "ACSYEC", ISSN = "0734-2071 (print), 1557-7333 (electronic)", ISSN-L = "0734-2071", bibdate = "Thu Jan 14 11:57:59 1999", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM Transactions on Computer Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774", keywords = "TOCS", } @Article{Sicherman:1983:AQR, author = "George L. Sicherman and Wiebren {De Jonge} and Reind P. {Van De Riet}", title = "Answering Queries without Revealing Secrets", journal = j-TODS, volume = "8", number = "1", pages = "41--59", month = mar, year = "1983", CODEN = "ATDSD3", ISSN = "0362-5915 (print), 1557-4644 (electronic)", ISSN-L = "0362-5915", bibdate = "Sat Apr 14 10:34:48 MDT 2001", bibsource = "Compendex database; Database/Graefe.bib; Database/Wiederhold.bib; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/tods.bib; Misc/is.bib", note = "Also published in/as: reprinted in deJonge thesis, Jun. 1985.", URL = "http://www.acm.org/pubs/articles/journals/tods/1983-8-1/p41-sicherman/p41-sicherman.pdf; http://www.acm.org/pubs/citations/journals/tods/1983-8-1/p41-sicherman/", abstract = "Question-answering systems must often keep certain information secret. This can be accomplished, for example, by sometimes refusing to answer a query. Here the danger of revealing a secret by refusing to answer a query is investigated. First several criteria that can be used to decide whether or not to answer a query are developed. First several criteria that can be used to decide whether or not to answer a query are developed. Then it is shown which of these criteria are safe if the questioner knows nothing at all about what is kept secret. Furthermore, it is proved that one of these criteria is safe even if the user of the system knows which information is to be kept secret.", acknowledgement = ack-nhfb, acmcrnumber = "8404-296", classification = "723", fjournal = "ACM Transactions on Database Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J777", keywords = "database systems, statistical security TODS; keeping secrets; refusal to answer; strategy", subject = "Information Systems --- Models and Principles --- Systems and Information Theory (H.1.1): {\bf Value of information}; Information Systems --- Models and Principles --- User/Machine Systems (H.1.2); Information Systems --- Information Storage and Retrieval --- Systems and Software (H.3.4): {\bf Current awareness systems (selective dissemination of information--SDI)**}; Information Systems --- Information Storage and Retrieval --- Systems and Software (H.3.4): {\bf Question-answering (fact retrieval) systems**}; Computing Methodologies --- Artificial Intelligence --- Deduction and Theorem Proving (I.2.3): {\bf Answer/reason extraction}", } @MastersThesis{Sieminski:1983:SBB, author = "Gregory C. Sieminski", title = "The search for a balance between scientific freedom and national security: a case study of cryptology", type = "Thesis ({M.S.})", school = "Defense Intelligence College", address = "Washington, DC, USA", pages = "v + 73", month = nov, year = "1983", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography; Intellectual freedom; National security --- United States", } @Article{Silverman:1983:RVS, author = "Jonathan M. Silverman", title = "Reflections on the verification of the security of an operating system kernel", journal = j-OPER-SYS-REV, volume = "17", number = "5", pages = "143--154", month = oct, year = "1983", CODEN = "OSRED8", ISSN = "0163-5980", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:54 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @InProceedings{Simmons:1983:PPS, author = "G. J. Simmons", title = "The Prisoners' Problem and the Subliminal Channel", crossref = "Chaum:1983:ACP", pages = "51--67", year = "1983", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1001.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Smith:1983:HCR, author = "J. W. Smith and S. S. {Wagstaff, Jr.}", booktitle = "Proceedings of the fourteenth Southeastern conference on combinatorics, graph theory and computing (Boca Raton, Fla., 1983)", title = "How to crack an {RSA} cryptosystem", journal = j-CONG-NUM, volume = "40", pages = "367--373", year = "1983", ISSN = "0384-9864", MRclass = "94A60", MRnumber = "86d:94020", MRreviewer = "S. Guia{\c{s}}u", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Congressus Numerantium. A Conference Journal on Numerical Themes", } @Article{Smith:1983:PKC, author = "John Smith", title = "Public Key Cryptography: An Introduction to a Powerful Cryptographic System for Use on Microcomputers", journal = j-BYTE, volume = "7", number = "??", pages = "198--218", month = Jan, year = "1983", CODEN = "BYTEDJ", ISSN = "0360-5280", ISSN-L = "0360-5280", bibsource = "/usr/local/src/bib/bibliography/Misc/security.1.bib; /usr/local/src/bib/bibliography/Theory/ProbAlgs.bib; https://www.math.utah.edu/pub/tex/bib/byte1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "This is a simple exposition of public key cryptography.", acknowledgement = ack-nhfb, fjournal = "BYTE Magazine", keywords = "algorithms; computer security; cryptography; RSA", ort = "Ordner Sicherheit", } @TechReport{USGSA:1983:ISR, author = "{United States.General Services Administration} and {National Communications System (U.S.). Office of Technology and Standards} and {National Institute of Standards and Technology (U. S.)}", title = "Interoperability and security requirements for use of the {Data Encryption Standard} in the physical layer of data communications", institution = "General Services Administration, Office of Information Resources Management", address = "Washington, DC, USA", pages = "4", day = "3", month = aug, year = "1983", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Federal standard 1026. Federal information processing standards publication, FIPS PUB 139", acknowledgement = ack-nhfb, keywords = "Computers --- Access control --- Standards.", } @Periodical{USNBS:1983:FPD, author = "{United States.National Bureau of Standards}", title = "{FIPS} Pub 46: {Data Encryption Standard}. {FIPS} publication change notice", publisher = "U.S. Department of Commerce, National Bureau of Standards", address = "Washinton, DC, USA", pages = "various", year = "1983", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Electronic data processing departments --- Security measures; Standards", } @Book{USWD:1983:EC, author = "{United States.War Dept} and {United States.Adjutant-General's Office}", title = "Elements of cryptanalysis", publisher = pub-USGPO, address = pub-USGPO:adr, pages = "165", year = "1983", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "United States. War Dept. Training pamphlet no. 3. War Dept document no. 117", acknowledgement = ack-nhfb, annote = "Master microform held by: UnM. OP 66639. Microfilm. Ann Arbor, Mich.: University Microfilms International, 19--. 1 reel; 35 mm.", keywords = "Ciphers; Cryptography.", } @Article{Voydock:1983:SMH, author = "Victor L. Voydock and Stephen T. Kent", title = "Security Mechanisms in High-Level Network Protocols", journal = j-COMP-SURV, volume = "15", number = "2", pages = "135--171", month = jun, year = "1983", CODEN = "CMSVAN", DOI = "https://doi.org/10.1145/356909.356913", ISSN = "0360-0300 (print), 1557-7341 (electronic)", ISSN-L = "0360-0300", bibdate = "Thu Jun 19 09:32:27 MDT 2008", bibsource = "Compendex database; ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib; http://www.acm.org/pubs/contents/journals/surveys/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "The implications of adding security mechanisms to high-level network protocols operating in an open-system environment are analyzed. First the threats to security that may arise in such an environment are described, and then a set of goals for communications security measures is established. This is followed by a brief description of the two basic approaches to communications security, link-oriented measures and end-to-end measures, which concludes that end-to-end measures are more appropriate in an open-system environment. Next, relevant properties of data encryption --- the fundamental technique on which all communications security mechanisms are based --- are discussed. The remainder of the paper describes how end-to-end measures can be used to achieve each of the security goals previously established.", acknowledgement = ack-nhfb, classification = "723", fjournal = "ACM Computing Surveys", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204", keywords = "security os networks, computer networks", } @InProceedings{Wagner:1983:F, author = "Neal R. Wagner", title = "Fingerprinting", crossref = "IEEE:1983:PSS", pages = "18--22", year = "1983", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1030.html", acknowledgement = ack-nhfb, keywords = "information hiding; steganography", } @Article{Weingarten:1983:CCP, author = "F. Weingarten", title = "Controlling cryptographic publication", journal = j-COMPUT-SECUR, volume = "2", number = "1", pages = "41--48", month = jan, year = "1983", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:21 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404883900330", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Willett:1983:TKS, author = "Michael Willett", title = "Trapdoor Knapsacks without Superincreasing Structure", journal = j-INFO-PROC-LETT, volume = "17", number = "1", pages = "7--11", day = "19", month = jul, year = "1983", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "94A60 (68P20)", MRnumber = "85e:94020", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classification = "723; C0230 (Economic, social and political aspects of computing); C1260 (Information theory); C1290 (Applications of systems theory)", corpsource = "Dept. of Math., Univ. of North Carolina, Greensboro, NC, USA", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "computer programming; cryptography; information theory; knapsacks; Merkle--Hellman public-key schemes; operations research; polynomial-time algorithm; superincreasing structure; trapdoor", treatment = "T Theoretical or Mathematical", } @Article{Williams:1983:PAP, author = "M. H. Williams", title = "The problem of absolute privacy", journal = j-INFO-PROC-LETT, volume = "17", number = "3", pages = "169--171", day = "5", month = oct, year = "1983", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classification = "723; C6150J (Operating systems)", corpsource = "Computer Sci. Dept., Heriot-Watt Univ., Edinburgh, UK", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "computer operating systems; data privacy; data processing --- Security of Data; data security; file protection; operating systems (computers); security of data", treatment = "G General Review; P Practical", } @InProceedings{Winternitz:1983:POW, author = "Robert S. Winternitz", title = "Producing a One-Way Hash Function from {DES}", crossref = "Chaum:1983:ACP", pages = "203--207", year = "1983", bibdate = "Thu Oct 31 18:48:13 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", acknowledgement = ack-nhfb, } @Book{Wolfe:1983:FCC, author = "Jack Martin Wolfe", title = "A first course in cryptanalysis [!]", publisher = "Brooklyn College Press", address = "Brooklyn", pages = "various", year = "1983", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Three volumes.", acknowledgement = ack-nhfb, annote = "Reproduced from type-written copy. Mimeographed on rectos only. Bound in printed paper wrappers. Library of the American Cryptogram Association (George C. Lamb Collection) Master microform held by: UnM. Microfilm. Ann Arbor, Mich., University Microfilms International, 19--. reels. 35 mm.", keywords = "Ciphers; Cryptography", } @Book{Yardley:1983:CBC, author = "Herbert O. Yardley", title = "The {Chinese Black Chamber}: an adventure in espionage", publisher = pub-HOUGHTON-MIFFLIN, address = pub-HOUGHTON-MIFFLIN:adr, pages = "xxiv + 225", year = "1983", ISBN = "0-395-34648-7", ISBN-13 = "978-0-395-34648-8", LCCN = "DS777.533.S65 Y37 1983", bibdate = "Tue Dec 01 10:58:49 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Chinese title: Chung-kuo hei shih.", price = "US\$13.95", acknowledgement = ack-nhfb, } @InProceedings{Alexi:1984:RRB, author = "W. Alexi and B. Chor and O. Goldreich and C. P. Schnorr", title = "{RSA\slash Rabin} Bits are {$ 1 / 2 + 1 \mbox {Poly} (\log N) $} Secure", crossref = "IEEE:1984:ASF", pages = "449--457", year = "1984", bibdate = "Thu Apr 5 06:13:39 MDT 2001", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Anonymous:1984:BRP, author = "Anonymous", title = "Book Review: {{\booktitle{The puzzle palace: a report on NSA, America's most secret agency}}: James Bamford: Boston: Houghton Mifflin Company, 1982, 465 pages. \$16.95}", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "57--57", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900300", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Book{Anonymous:1984:ESC, author = "Anonymous", title = "{EDP} security: communications, database, end user, encryption: advanced security concepts", number = "3", publisher = "FTP", address = "Port Jefferson Station, NY, USA", pages = "various", year = "1984", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "FTP technical library EDP security", acknowledgement = ack-nhfb, } @Article{Apostolico:1984:PMM, author = "A. Apostolico and R. Giancarlo", title = "Pattern matching machine implementation of a fast test for unique decipherability", journal = j-INFO-PROC-LETT, volume = "18", number = "3", pages = "155--158", day = "30", month = mar, year = "1984", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classification = "B6140C (Optical information, image and video signal processing); C1160 (Combinatorial mathematics); C1250 (Pattern recognition); C1260 (Information theory)", corpsource = "ISI, Univ. of Salerno, Salerno, Italy", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", keywords = "codes; fast implementation; graph theory; pattern matching machine; pattern recognition; Sardinas- Patterson-Even test; unique decipherability", treatment = "N New Development; T Theoretical or Mathematical", } @Book{Barker:1984:CSG, author = "Wayne G. Barker", title = "Cryptanalysis of shift-register generated stream cipher systems", volume = "39", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, pages = "ix + 247", year = "1984", ISBN = "0-89412-062-X", ISBN-13 = "978-0-89412-062-6", LCCN = "Z 104 B37 1984", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, annote = "Spine title: Cryptanalysis --- stream cipher systems.", keywords = "Ciphers; Cryptography", } @Article{Blum:1984:HGC, author = "Manuel Blum and Silvio Micali", title = "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits", journal = j-SIAM-J-COMPUT, volume = "13", number = "4", pages = "850--864", month = "????", year = "1984", CODEN = "SMJCAT", ISSN = "0097-5397 (print), 1095-7111 (electronic)", ISSN-L = "0097-5397", MRclass = "68P25 (65C10 68Q20)", MRnumber = "86a:68021", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib", acknowledgement = ack-nhfb, fjournal = "SIAM Journal on Computing", journal-URL = "http://epubs.siam.org/sicomp", referencedin = "Referenced in \cite[Ref. 7]{Goldreich:1997:FMCb}.", } @InProceedings{Blum:1984:IUC, author = "Manuel Blum", title = "Independent Unbiased Coin Flips from a Correlated Biased Source: a Finite State {Markov} Chain", crossref = "IEEE:1984:ASF", pages = "425--433", year = "1984", bibdate = "Thu Feb 02 17:24:58 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Boyer:1984:PCR, author = "Robert S. Boyer and J. Strother Moore", title = "Proof checking the {RSA} public key encryption algorithm", journal = j-AMER-MATH-MONTHLY, volume = "91", number = "3", pages = "181--189", year = "1984", CODEN = "AMMYAE", ISSN = "0002-9890 (print), 1930-0972 (electronic)", ISSN-L = "0002-9890", MRclass = "68P25 (68T15 94A60)", MRnumber = "85k:68024", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/amermathmonthly1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", acknowledgement = ack-nhfb, fjournal = "The American Mathematical Monthly", journal-URL = "https://www.jstor.org/journals/00029890.htm", } @InCollection{Brickell:1984:EAA, author = "E. F. Brickell and J. C. Lagarias and A. M. Odlyzko", booktitle = "Advances in cryptology (Santa Barbara, Calif., 1983)", title = "Evaluation of the {Adleman} attack on multiply iterated knapsack cryptosystems (abstract)", publisher = "Plenum", address = "New York", pages = "39--42", year = "1984", MRclass = "94A60 (11T71)", MRnumber = "799 719", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", } @Article{Burton:1984:RPKa, author = "Charles E. Burton", title = "{RSA}: a Public Key Cryptography System Part {I}", journal = j-DDJ, volume = "9", number = "3", pages = "16--??", month = mar, year = "1984", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Thu Jan 9 09:35:43 MST 1997", bibsource = "Compendex database; http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib; https://www.math.utah.edu/pub/tex/bib/fortran2.bib", acknowledgement = ack-nhfb, classification = "723; 921", fjournal = "Dr. Dobb's Journal of Software Tools", journalabr = "Dr Dobb's J", keywords = "computer programming --- Algorithms; computer programming languages --- Fortran; computer programs; computers, microprocessor --- Applications; cryptography; modulo arithmetic; multi precision arithmetic; public key system (PKS); Rational Fortran (RATFOR)", pagecount = "22p between p 16 and 43", } @Article{Burton:1984:RPKb, author = "Charles E. Burton", title = "{RSA}: a Public Key Cryptography System Part {II}", journal = j-DDJ, volume = "9", number = "4", pages = "32--??", month = apr, year = "1984", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Thu Jan 9 09:35:43 MST 1997", bibsource = "Compendex database; http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib", acknowledgement = ack-nhfb, classification = "723", fjournal = "Dr. Dobb's Journal of Software Tools", journalabr = "Dr Dobb's J", keywords = "computer programs; data processing; public key cryptography", pagecount = "20p between p 32 and 59", } @Article{Coppersmith:1984:FEL, author = "D. Coppersmith", title = "Fast evaluations of logarithms in fields of characteristic two", journal = j-IEEE-TRANS-INF-THEORY, volume = "IT-30", number = "4", pages = "587--594", month = "????", year = "1984", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1984.1056941", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", bibdate = "Sun Mar 11 10:29:59 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Information Theory", } @Article{Denning:1984:DSR, author = "Dorothy E. Denning", title = "Digital Signatures with {RSA} and Other Public-Key Cryptosystems", journal = j-CACM, volume = "27", number = "4", pages = "388--392", month = apr, year = "1984", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", MRclass = "68P25", MRnumber = "784 134", bibdate = "Tue Dec 26 13:35:07 1995", bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Communications of the Association for Computing Machinery", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @InCollection{Denning:1984:FEA, author = "Dorothy E. Denning", booktitle = "Advances in cryptology (Santa Barbara, Calif., 1983)", title = "Field encryption and authentication", publisher = pub-PLENUM, address = pub-PLENUM:adr, pages = "231--247", year = "1984", MRclass = "94A60", MRnumber = "86j:94044", MRreviewer = "Evangelos Kranakis", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", } @Article{Fisher:1984:CCS, author = "Warren W. Fisher", title = "Cryptography for computer security: Making the decision", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "229--233", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900440", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Book{Franksen:1984:MBS, author = "Ole Immanuel Franksen", title = "{Mr. Babbage}'s secret: the tale of a cypher and {APL}", publisher = "Strandberg", address = "Birkerod, Denmark", pages = "319", year = "1984", ISBN = "87-87200-86-4", ISBN-13 = "978-87-87200-86-8", LCCN = "Z103.B2 F72 1984", bibdate = "Mon Nov 4 07:46:57 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "APL (computer program language); Babbage, Charles, 1791--1871; ciphers --- history; cryptographers --- Great Britain --- biography; cryptography --- history", } @Article{Frederickson:1984:PRT, author = "P. Frederickson and R. Hiromoto and T. L. Jordan and B. Smith and T. Warnock", title = "Pseudo-random trees in {Monte Carlo}", journal = j-PARALLEL-COMPUTING, volume = "1", number = "2", pages = "175--180", month = dec, year = "1984", CODEN = "PACOEJ", ISSN = "0167-8191 (print), 1872-7336 (electronic)", ISSN-L = "0167-8191", bibdate = "Mon Apr 14 11:08:33 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/parallelcomputing.bib", acknowledgement = ack-nhfb, classification = "C1140G (Monte Carlo methods); C7300 (Natural sciences computing); C7400 (Engineering computing)", corpsource = "Los Alamos Nat. Lab., Los Alamos, NM, USA", fjournal = "Parallel Computing", journal-URL = "http://www.sciencedirect.com/science/journal/01678191/", keywords = "digital simulation; Lehmer pseudorandom number generator; MIMD architecture; Monte Carlo methods; Monte Carlo simulations; parallel; parallel computers; processing; pseudorandom trees; random number generation; reproducibility; SIMD architecture; supercomputer; trees (mathematics)", treatment = "P Practical", } @Article{Goldwasser:1984:PE, author = "Shafi Goldwasser and Silvio Micali", title = "Probabilistic Encryption", journal = j-J-COMP-SYS-SCI, volume = "28", number = "2", pages = "270--299", year = "1984", CODEN = "JCSSBM", ISSN = "0022-0000", ISSN-L = "0022-0000", MRclass = "94A60 (11T71 68P25 68Q25)", MRnumber = "86j:94047", MRreviewer = "J. C. Lagarias", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", note = "See also preliminary version in 14th STOC, 1982.", acknowledgement = ack-nhfb, fjournal = "Journal of Computer and System Sciences", journal-URL = "http://www.sciencedirect.com/science/journal/00220000", referencedin = "Referenced in \cite[Ref. 18]{Goldreich:1997:FMCb}.", } @PhdThesis{Goldwasser:1984:PET, author = "Shafrira Goldwasser", title = "Probabilistic encryption: theory and applications", type = "Thesis ({Ph. D. in Computer Science})", school = "Department of Computer Science, University of California, Berkeley", address = "Berkeley, CA, USA", pages = "iv + 63", month = dec, year = "1984", LCCN = "T7.6 .G628", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Photocopy. Ann Arbor, Mich.: University Microfilms International, 1986. 22 cm.", keywords = "Computers --- Access control; Cryptography; dissertations; dissertations, academic --- UCB --- computer science --- 1981--1990; University of California, Berkeley. Computer Science Division", } @InProceedings{Grollmann:1984:CMP, author = "J. Grollmann and A. L. Selman", title = "Complexity Measures for Public-Key Cryptosystems", crossref = "IEEE:1984:ASF", pages = "495--503", year = "1984", bibdate = "Thu Apr 5 06:13:39 MDT 2001", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @MastersThesis{Grundler:1984:DEH, author = "Edward James Grundler", title = "A data encryption hardware software package", type = "Project ({M.S.})", school = "California State University, Sacramento", address = "Sacramento, CA, USA", pages = "vii + 81", year = "1984", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Electronic data processing departments --- Security measures.", } @Article{Haddon:1984:BRS, author = "Bruce K. Haddon", title = "Book review of ``{Security, IFIP\slash Sec'83: proceedings of the first security conference'' North-Holland Publishing Co. 1983}", journal = j-OPER-SYS-REV, volume = "18", number = "3", pages = "14--14", month = jul, year = "1984", CODEN = "OSRED8", ISSN = "0163-5980", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:45 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See \cite{Feak:1983:SIS}.", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Article{Haskett:1984:PAU, author = "James A. Haskett", title = "Pass-Algorithms: a User Validation Scheme Based on Knowledge of Secret Algorithms", journal = j-CACM, volume = "27", number = "8", pages = "777--781", year = "1984", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Jan 22 06:48:51 MST 2001", bibsource = "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Haskett84; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "cryptography", oldlabel = "Haskett84", XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Haskett84", } @TechReport{IRD:1984:DTV, author = "{International Resource Development, Inc.}", title = "Data, text, and voice encryption equipment", type = "Report", number = "630", institution = "International Resource Development", address = "6 Prowitt St., Norwalk, CT 06855, USA", pages = "vi + 184", year = "1984", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography equipment industry --- United States; Market surveys --- United States.", } @InCollection{Jurgensen:1984:SRI, author = "H. J{\"u}rgensen and D. E. Matthews", booktitle = "Advances in cryptology (Santa Barbara, Calif., 1983)", title = "Some results on the information theoretic analysis of cryptosystems", publisher = "Plenum", address = "New York", pages = "303--356", year = "1984", MRclass = "94A60 (68Q25 94A17)", MRnumber = "87b:94038", MRreviewer = "James W. Snively, Jr.", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", } @Article{Kahn:1984:COS, author = "D. Kahn", title = "Cryptology and the origins of spread spectrum", journal = j-IEEE-SPECTRUM, volume = "21", number = "9", pages = "70--80", month = sep, year = "1984", CODEN = "IEESAM", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1009.html", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", keywords = "information hiding; steganography", } @Article{Kak:1984:MPK, author = "S. C. Kak", title = "On the method of puzzles for key distribution", journal = j-INT-J-COMPUT-INF-SCI, volume = "13", number = "2", pages = "103--109", month = apr, year = "1984", CODEN = "IJCIAH", ISSN = "0091-7036", bibdate = "Sat Apr 26 12:20:22 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib", acknowledgement = ack-nhfb, classification = "B6120B (Codes); C6130 (Data handling techniques)", corpsource = "Dept. of Electr. and Comput. Eng., Louisiana State Univ., Baton Rouge, LA, USA", fjournal = "International Journal of Computer and Information Sciences", keywords = "codes; cryptography; key distribution; nested puzzles method; public channel; puzzles; work advantage", treatment = "P Practical", } @MastersThesis{Kaliski:1984:AWA, author = "Burton Stephen {Kaliski, Jr.}", title = "Analysis of {Wyner}'s analog encryption scheme", type = "Thesis ({B.S.})", school = "Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology", address = "Cambridge, MA, USA", pages = "97", year = "1984", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Supervised by Ronald L. Rivest.", acknowledgement = ack-nhfb, } @Article{Kothari:1984:CMW, author = "S. Kothari and S. Lakshmivarahan", title = "On the concealability of messages by the {Williams} public-key encryption scheme", journal = j-COMPUT-MATH-APPL, volume = "10", number = "1", pages = "15--24", year = "1984", CODEN = "CMAPDK", ISSN = "0898-1221 (print), 1873-7668 (electronic)", ISSN-L = "0898-1221", MRclass = "94A60", MRnumber = "85e:94017", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", fjournal = "Computers \& Mathematics with Applications. An International Journal", } @Book{Kozaczuk:1984:EHGa, author = "W{\l}adys{\l}aw Kozaczuk", title = "{Enigma}: how the {German} machine cipher was broken, and how it was read by the {Allies} in {World War Two}", publisher = "Arms and Armour", address = "London, UK", pages = "xiv + 348", year = "1984", ISBN = "0-85368-640-8", ISBN-13 = "978-0-85368-640-8", LCCN = "D810.C88 K6813 1984b", bibdate = "Mon Nov 4 07:46:57 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Translation of: W kregu Enigmy.", acknowledgement = ack-nhfb, keywords = "World War, 1939--1945 --- cryptography", } @Book{Kozaczuk:1984:EHGb, author = "W{\l}adys{\l}aw Kozaczuk", title = "{Enigma}: How the {German} Machine Cipher Was Broken, and How It Was Read by the {Allies} in {World War Two}", publisher = "University Publications of America", address = "Frederick, MD, USA", pages = "xiv + 348", year = "1984", ISBN = "0-89093-547-5", ISBN-13 = "978-0-89093-547-7", LCCN = "D810.C88 K6813 1984", bibdate = "Mon Nov 4 07:46:57 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Edited and translated by Christopher Kasparek, from the original Polish edition, {\em W kr{\c{e}}gu Enigma}, Ksi{\c{a}}{\d{z}}ka i Wiedza, Warsaw, 1979.", price = "US\$24.00", series = "Foreign intelligence book series", acknowledgement = ack-nhfb, keywords = "machine ciphers; World War, 1939--1945 --- cryptography", } @Article{Krause:1984:DEI, author = "Lothar Krause", title = "Data encryption in {ISO}, the International Organization for Standardization", journal = j-COMPUT-SECUR, volume = "3", number = "3", pages = "234--236", month = aug, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:24 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900452", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @InCollection{Lagarias:1984:KPK, author = "J. C. Lagarias", booktitle = "Advances in cryptology (Santa Barbara, Calif., 1983)", title = "Knapsack public key cryptosystems and {Diophantine} approximation (extended abstract)", publisher = "Plenum", address = "New York", pages = "3--23", year = "1984", MRclass = "94A60 (11T71)", MRnumber = "86j:94050", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", } @Article{Lagarias:1984:PAS, author = "J. C. Lagarias", booktitle = "Automata, languages and programming (Antwerp, 1984)", title = "Performance analysis of {Shamir}'s attack on the basic {Merkle--Hellman} knapsack cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "172", pages = "312--323", year = "1984", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "68P25", MRnumber = "784 259", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Lecture Notes in Computer Science", } @Article{Landwehr:1984:SMM, author = "Carl E. Landwehr and Constance L. Heitmeyer and John McLean", title = "A Security Model for Military Message System", journal = j-TOCS, volume = "2", number = "3", pages = "198--222", month = aug, year = "1984", CODEN = "ACSYEC", ISSN = "0734-2071 (print), 1557-7333 (electronic)", ISSN-L = "0734-2071", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold/1984.bib; ftp://ftp.ira.uka.de/pub/bibliography/Misc/bibsec.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM Transactions on Computer Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774", } @InCollection{Lidl:1984:PPR, author = "Rudolf Lidl and Winfried B. M{\"u}ller", booktitle = "Advances in cryptology (Santa Barbara, Calif., 1983)", title = "Permutation polynomials in {RSA}-cryptosystems", publisher = "Plenum", address = "New York", pages = "293--301", year = "1984", MRclass = "94A60 (11T06)", MRnumber = "86i:94040", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", } @Article{Mullin:1984:NMP, author = "Albert A. Mullin", title = "A note on the mathematics of public-key cryptosystems", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "45--47", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900269", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @TechReport{NCSOTS:1984:ISR, author = "{National Communications System (U.S.). Office of Technology and Standards}", title = "Interoperability and security requirements for use of the {Data Encryption Standard} in the physical layer of data communications", type = "Federal standard", number = "1026", institution = "General Services Administration, Office of Information Resources Management", address = "Washington, DC, USA", pages = "various", day = "3", month = aug, year = "1984", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, govtdocnumber = "GS 2.8/3:1026 563", keywords = "Cryptography --- Standards --- United States; Government information --- Standards --- United States", } @InProceedings{Nobauer:1984:CRS, author = "Rupert N{\"o}bauer", title = "Cryptanalysis of the {R{\'e}dei}-scheme", crossref = "Eigenthaler:1984:CGA", pages = "255--264", year = "1984", MRclass = "94A60 (11T71)", MRnumber = "87b:94040", bibdate = "Tue Feb 9 11:14:49 MST 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Odlyzko:1984:CAM, author = "Andrew M. Odlyzko", title = "Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on {Shamir}'s fast signature scheme", journal = j-IEEE-TRANS-INF-THEORY, volume = "IT-30", number = "4", pages = "594--601", year = "1984", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1984.1056942", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", MRclass = "94A60 (68P20)", MRnumber = "86i:94041", MRreviewer = "Tai Yang Hwang", bibdate = "Mon Jul 19 07:08:40 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.research.att.com/~amo/doc/arch/knapsack.attacks.pdf; http://www.research.att.com/~amo/doc/arch/knapsack.attacks.ps; http://www.research.att.com/~amo/doc/arch/knapsack.attacks.troff", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Information Theory", xxtitle = "Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on {Shamir's} signature scheme", } @Article{Oldehoeft:1984:SSU, author = "Arthur E. Oldehoeft and Robert McDonald", title = "A software scheme for user-controlled file encryption", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "35--41", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900245", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Ozarow:1984:WTC, author = "Lawrence H. Ozarow and Aaron D. Wyner", title = "Wire-tap channel {II}", journal = j-ATT-BELL-LAB-TECH-J, volume = "63", number = "10 part 1", pages = "2135--2157", year = "1984", CODEN = "ABLJER", ISSN = "0748-612X (print), 2376-7162 (electronic)", ISSN-L = "0748-612X", bibdate = "Fri Nov 12 09:17:39 2010", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "In this paper we study a communication system in which an unauthorized intruder is able to intercept a subset of the transmitted symbols, and it is desired to maximize the intruder's uncertainty about the data without the use of an encryption key (either public or private).", acknowledgement = ack-nhfb, fjournal = "AT\&T Bell Laboratories Technical Journal", keywords = "computers --- data communication systems", subject = "conditional entropy; intruder's uncertainty; unauthorized intruder; wire-tap channel", topic = "data processing", } @Article{Porter:1984:CNS, author = "Sig Porter", title = "Cryptology and number sequences: Pseudorandom, random, and perfectly random", journal = j-COMPUT-SECUR, volume = "3", number = "1", pages = "43--44", month = feb, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404884900257", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Article{Rao:1984:JEE, author = "T. R. N. Rao", title = "Joint encryption and error correction schemes", journal = j-COMP-ARCH-NEWS, volume = "12", number = "3", pages = "240--241", month = jun, year = "1984", CODEN = "CANED2", ISSN = "0163-5964 (print), 1943-5851 (electronic)", ISSN-L = "0163-5964", bibdate = "Fri May 12 09:40:54 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGARCH Computer Architecture News", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J89", } @Article{Reeds:1984:FSU, author = "James A. Reeds and Peter J. Weinberger", title = "File Security and the {UNIX} System {\tt crypt} Command", journal = j-ATT-BELL-LAB-TECH-J, volume = "63", number = "8 part 2", pages = "1673--1683", month = oct, year = "1984", CODEN = "ABLJER", ISSN = "0748-612X (print), 2376-7162 (electronic)", ISSN-L = "0748-612X", bibdate = "Fri Nov 12 09:17:39 2010", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Reprinted in \cite[pp.~93--103]{ATT:1986:AUS}.", abstract = "Sufficiently large files encrypted with the UNIX system {\tt crypt} command can be deciphered in a few hours by algebraic techniques and human interaction. We outline such a decryption method and show it to be applicable to a proposed strengthened algorithm as well. We also discuss the role of encryption in file security.", acknowledgement = ack-nhfb, fjournal = "AT\&T Bell Laboratories Technical Journal", keywords = "computer systems, digital", subject = "crypt command; encryption; file security; UNIX system", topic = "data processing", } @Article{Rivest:1984:HEE, author = "Ronald L. Rivest and Adi Shamir", title = "How to Expose an Eavesdropper", journal = j-CACM, volume = "27", number = "4", pages = "393--395", month = apr, year = "1984", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Mon Jan 27 13:18:33 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", } @Article{Routh:1984:PAA, author = "Richard LeRoy Routh", title = "A proposal for an architectural approach which apparently solves all known software-based internal computer security problems", journal = j-OPER-SYS-REV, volume = "18", number = "3", pages = "31--39", month = jul, year = "1984", CODEN = "OSRED8", ISSN = "0163-5980", ISSN-L = "0163-5980", bibdate = "Sat Aug 26 08:55:45 MDT 2006", bibsource = "http://portal.acm.org/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Operating Systems Review", } @Article{Saltzer:1984:EEA, author = "J. H. Saltzer and D. P. Reed and D. D. Clark", key = "Saltzer et al.", title = "End-to-End Arguments in System Design", journal = j-TOCS, volume = "2", number = "4", pages = "277--288", month = nov, year = "1984", CODEN = "ACSYEC", ISSN = "0734-2071 (print), 1557-7333 (electronic)", ISSN-L = "0734-2071", bibdate = "Wed Mar 6 11:12:06 1985", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib; ftp://ftp.ira.uka.de/pub/bibliography/Misc/digital.library.bib; ftp://ftp.ira.uka.de/pub/bibliography/Os/os.bib; ftp://ftp.ira.uka.de/pub/bibliography/SE/dependability.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "This paper presents a design principle that helps guide placement of functions among the modules of a distributed computer system. The principle, called the end-to-end argument, suggests that functions placed at low levels of a system may be redundant or of little value when compared with the cost of providing them at that low level. Examples discussed in the paper include bit-error recovery, security using encryption, duplicate message suppression, recovery from system crashes, and delivery acknowledgement. Low-level mechanisms to support these functions are justified only as performed enhancements.", acknowledgement = ack-nhfb, comments = "Argues that you should put functionality at the higher app layers, rather than at low layers. Includes a security example", entered-by = "Andreas Paepcke", fjournal = "ACM Transactions on Computer Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774", keywords = "data communication; design; design principles; protocol design; TOCS", } @Book{Schroeder:1984:NTS, author = "M. R. (Manfred Robert) Schroeder", title = "Number theory in science and communication: with applications in cryptography, physics, biology, digital information, and computing", volume = "7", publisher = pub-SV, address = pub-SV:adr, pages = "xvi + 324", year = "1984", ISBN = "0-387-12164-1", ISBN-13 = "978-0-387-12164-2", LCCN = "QA241 .S318 1984", bibdate = "Sat Oct 17 16:25:07 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Springer series in information sciences", acknowledgement = ack-nhfb, keywords = "number theory", } @Article{Shamir:1984:CCV, author = "A. Shamir and C. P. Schnorr", title = "Cryptanalysis of Certain Variants of {Rabin}'s Signature Scheme", journal = j-INFO-PROC-LETT, volume = "19", number = "3", pages = "113--115", day = "19", month = oct, year = "1984", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "68P25 (94A60)", MRnumber = "86e:68029", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/infoproc.bib", acknowledgement = ack-nhfb, classification = "723; C6130 (Data handling techniques)", corpsource = "Dept. of Appl. Math., Weizmann Inst. of Sci., Rehovot, Israel", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "cleartext attacks; cryptanalysis; cryptography; digital signatures; natural perturbation techniques; protect; Rabin's signature scheme", treatment = "T Theoretical or Mathematical", } @Article{Shamir:1984:PTA, author = "Adi Shamir", title = "A polynomial-time algorithm for breaking the basic {Merkle--Hellman} cryptosystem", journal = j-IEEE-TRANS-INF-THEORY, volume = "30", number = "5", pages = "699--704", year = "1984", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1984.1056964", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", MRclass = "94A60", MRnumber = "86m:94032", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "IEEE Transactions on Information Theory", } @Article{Siegenthaler:1984:CIN, author = "T. Siegenthaler", title = "Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications", journal = j-IEEE-TRANS-INF-THEORY, volume = "IT-30", number = "5", pages = "776--780", year = "1984", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1984.1056949", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", bibdate = "Mon Nov 30 09:02:43 1998", bibsource = "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Information Theory", } @Article{Simmons:1984:HID, author = "G. J. Simmons", title = "How to Insure that Data Acquired to Verify Treaty Compliance are Trustworthy", journal = j-PROC-IEEE, volume = "76", number = "5", pages = "621--627", month = may, year = "1984", CODEN = "IEEPAD", ISSN = "0018-9219", ISSN-L = "0018-9219", bibdate = "Sat Dec 26 17:01:46 1998", bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1003.html", acknowledgement = ack-nhfb, fjournal = "Proceedings of the IEEE", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5", keywords = "information hiding; steganography", } @Article{Sorkin:1984:MCC, author = "Arthur Sorkin and C. James Buchanan", title = "Measurement of cryptographic capability protection algorithms", journal = j-COMPUT-SECUR, volume = "3", number = "2", pages = "101--116", month = may, year = "1984", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:23 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/016740488490052X", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @Misc{StJohns:1984:RAS, author = "M. {St. Johns}", title = "{RFC 912}: Authentication service", day = "1", month = sep, year = "1984", bibdate = "Thu Oct 16 09:34:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}. Status: UNKNOWN.", URL = "ftp://ftp.internic.net/rfc/rfc912.txt; ftp://ftp.internic.net/rfc/rfc931.txt; ftp://ftp.math.utah.edu/pub/rfc/rfc912.txt; ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, format = "TXT=4544 bytes", obsoletedby = "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}.", online = "yes", status = "UNKNOWN", } @Article{Summers:1984:OCS, author = "R. C. Summers", title = "An Overview of Computer Security", journal = j-IBM-SYS-J, volume = "23", number = "4", pages = "309--325", year = "1984", CODEN = "IBMSA7", ISSN = "0018-8670", bibdate = "Wed Jan 08 16:35:07 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", abstract = "Presented is an overview of computer security, including concepts, techniques, and measures relating to the protection of computing systems and the information they maintain against deliberate or accidental threats. Motivations for security measures are discussed. Security strategies are considered. Actions and events that threaten security are described, along with technical problems that can prevent the computer from adequately dealing with threats. Security models are surveyed. Specific technical and administrative measures for promoting security are described. Among the technical measures discussed are design of secure systems, hardware and operating systems, identification of users, encryption, and access control packages. Administrative measures include personnel, physical security of the computing system, and auditing.", acknowledgement = ack-nhfb, affiliation = "IBM, Los Angeles Scientific Cent, Los Angeles, CA, USA", affiliationaddress = "IBM, Los Angeles Scientific Cent, Los Angeles, CA, USA", classification = "723; 731", fjournal = "IBM Systems Journal", journalabr = "IBM Syst J", keywords = "data processing; encryption; process control --- Computer Applications; security measures; security model; Security of Data; security threat sources", } @Article{Thersites:1984:IKE, author = "Joan Thersites and John A. Thomas", title = "An Infinite Key Encryption System", journal = j-DDJ, volume = "9", number = "8", pages = "44--??", month = aug, year = "1984", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Mon Sep 2 09:09:39 MDT 1996", bibsource = "http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "Dr. Dobb's Journal of Software Tools", xxnote = "??Check author order??", } @Article{Thomas:1984:IKE, author = "John A. Thomas and Joan Thersites", title = "Infinite Key Encryption System", journal = j-DDJ, volume = "9", number = "8", pages = "44--??", month = aug, year = "1984", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Thu Jan 9 09:35:43 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib", acknowledgement = ack-nhfb, classification = "723", fjournal = "Dr. Dobb's Journal of Software Tools", journalabr = "Dr Dobb's J", keywords = "codes, symbolic; computer programs; computers, microcomputer; cryptography; data processing; file encryption; infinite key encryption system; program code; Security of Data", pagecount = "35p between p 44 and 85", } @Article{Thompson:1984:RTT, author = "Ken Thompson", title = "Reflections on Trusting Trust", journal = j-CACM, volume = "27", number = "8", pages = "761--763", month = aug, year = "1984", CODEN = "CACMA2", DOI = "https://doi.org/10.1145/358198.358210", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib; http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cacm1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1028.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "information hiding; security; steganography; unix", remark = "This is part two of the 1983 Turing Award Lecture.", } @Book{TI:1984:TTU, author = "{Texas Instruments Inc}.", title = "{TMS7500 TMS75C00} user's guide, data encryption device: 8-bit microcomputer family", publisher = "Texas Instruments", address = "Dallas, TX, USA", pages = "various", year = "1984", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "SPNU004", keywords = "Microcomputers; TMS7500 (Computer).", } @Manual{USGSAOIRM:1984:ISR, author = "{United States.General Services Administration.Office of Information Resources Management}", title = "Interoperability and security requirements for use of the {Data Encryption Standard} in the physical layer of data communications", number = "1026", publisher = "General Services Administration", address = "Office of Information Resources Management", pages = "various", year = "1984", LCCN = "GS 2.8/3:1026 Govt Pubs", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Cover title. ``August 3, 1983.'' ``FSC TELE.''", series = "Federal standard", acknowledgement = ack-nhfb, keywords = "cryptography --- standards --- United States; government information --- standards --- United States", } @Article{Voydock:1984:SMT, author = "Victor L. Voydock and Stephen T. Kent", title = "Security Mechanisms in a Transport Layer Protocol", journal = j-COMP-NET, volume = "8", number = "5--6", pages = "433--449", month = oct # "\slash " # dec, year = "1984", CODEN = "CNETDP", ISSN = "0376-5075", ISSN-L = "0376-5075", bibdate = "Sat Sep 25 20:21:07 MDT 1999", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, affiliation = "Microcom Inc, Norwood, MA, USA", classification = "723; 902", fjournal = "Computer Networks", journalabr = "Comput Networks", keywords = "Communication Systems; computer architecture --- Standards; computer networks; computers --- Data; data encryption standard; data processing --- Security of Data; Protocols; security; transport layer protocol", } @InProceedings{Wah:1984:RAM, author = "P. K. S. Wah and M. Z. Wang", editor = "{IEEE}", booktitle = "{1984 International Zurich Seminar on Digital Communications: applications of source coding, channel coding and secrecy coding: March 6--8, 1984, Z{\"u}rich, Switzerland, Swiss Federal Institute of Technology: proceedings}", title = "Realization and application of the {Massey--Omura} lock", publisher = pub-IEEE, address = pub-IEEE:adr, bookpages = "xi + 201", pages = "175--182", year = "1984", LCCN = "TK7881.5 I65 1984", bibdate = "Sun Mar 11 10:47:07 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "IEEE catalog number 84CH1998-4.", acknowledgement = ack-nhfb, } @Article{Winternitz:1984:SOH, author = "Robert S. Winternitz", title = "Secure One-Way Hash Function Built from {DES}", journal = "Proceedings of the Symposium on Security and Privacy", pages = "88--90", year = "1984", CODEN = "PSSPEO", ISBN = "0-8186-0532-4", ISBN-13 = "978-0-8186-0532-1", LCCN = "QA76.9.A25 S95 1984", bibdate = "Tue May 12 09:47:14 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/hash.bib", note = "IEEE Service Cent. Piscataway, NJ, USA.", acknowledgement = ack-nhfb, classification = "723; 902", conference = "Proceedings of the 1984 Symposium on Security and Privacy.", journalabr = "Proc Symp Secur Privacy", keywords = "authentication of information; data encryption standard (des); data processing; digital message signing for security and efficiency; encryption algorithms; randomly chosen block cipher; secure one-way hash function", meetingaddress = "Oakland, CA, USA", sponsor = "IEEE Computer Soc, Technical Committee on Security \& Privacy, Los Alamitos, Calif, USA; IEEE, New York, NY, USA", } @InProceedings{Akl:1985:FPR, author = "Selim G. Akl and Henk Meijer", title = "A Fast Pseudo Random Permutation Generator With Applications to Cryptology", crossref = "Blakley:1985:ACP", pages = "269--275", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=269", acknowledgement = ack-nhfb, } @InProceedings{Anonymous:1985:BM, author = "Anonymous", title = "Back matter", crossref = "Blakley:1985:ACP", pages = "??--??", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=??", acknowledgement = ack-nhfb, } @TechReport{Anonymous:1985:DEA, author = "Anonymous", title = "Data encryption algorithm: Electronic funds transfer: requirements for interfaces", institution = "????", address = "????", pages = "16", year = "1985", ISBN = "0-7262-3764-7", ISBN-13 = "978-0-7262-3764-5", bibdate = "Wed Sep 28 07:58:30 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @TechReport{Aruliah:1985:PIE, author = "A. A. Aruliah and G. I. Parkin and Brian A. Wichmann", title = "A {Pascal} implementation of the {DES} encryption algorithm including cipher block chaining", type = "NPL report", number = "DITC 61/85", institution = "National Physical Laboratory, Division of Information Technology and Computing", address = "Teddington, Middlesex, UK", pages = "37", year = "1985", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography; Electronic data processing; Pascal (Computer program language)", } @InProceedings{Beker:1985:KMS, author = "Henry Beker and Michael Walker", title = "Key Management for Secure Electronic Funds Transfer in a Retail Environment", crossref = "Blakley:1985:ACP", pages = "401--410", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=401", acknowledgement = ack-nhfb, } @Book{Beker:1985:SSC, author = "Henry Beker and F. C. (Frederick Charles) Piper", title = "Secure speech communications", volume = "3", publisher = pub-ACADEMIC, address = pub-ACADEMIC:adr, pages = "xi + 267", year = "1985", ISBN = "0-12-084780-9", ISBN-13 = "978-0-12-084780-8", LCCN = "TK5102.5 .B354 1985", bibdate = "Fri Nov 25 08:37:47 MST 2005", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; z3950.loc.gov:7090/Voyager", series = "Microelectronics and signal processing", acknowledgement = ack-nhfb, subject = "Scrambling systems (Telecommunication)", } @InProceedings{Bennett:1985:UQC, author = "Charles H. Bennett and Gilles Brassard", title = "An Update on Quantum Cryptography", crossref = "Blakley:1985:ACP", pages = "475--480", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=475", acknowledgement = ack-nhfb, } @Article{Birrell:1985:SCU, author = "Andrew D. Birrell", title = "Secure Communication Using Remote Procedure Calls", journal = j-TOCS, volume = "3", number = "1", pages = "1--14", month = feb, year = "1985", CODEN = "ACSYEC", ISSN = "0734-2071", ISSN-L = "0734-2071", bibdate = "Thu Jan 14 06:47:30 MST 1999", bibsource = "Compendex database; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.acm.org:80/pubs/citations/journals/tocs/1985-3-1/p1-birrell/", abstract = "Research on encryption-based secure communication protocols has reached a stage where it is feasible to construct end-to-end secure protocols. The design of such a protocol, built as part of a remote procedure call package, is described. The security abstraction presented to users of the package, the authentication mechanisms, and the protocol for encrypting and verifying remote calls are also described.", acknowledgement = ack-nhfb, affiliationaddress = "Xerox Corp", classification = "723", fjournal = "ACM Transactions on Computer Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774", journalabr = "ACM Trans Comput Syst", keywords = "computer networks; cryptography; design; experimentation; Protocols; remote procedure calls; secure communication; security", subject = "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and Protection, Cryptographic controls. {\bf C.2.0} Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, General, Security and protection (e.g., firewalls). {\bf C.2.2} Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, Network Protocols, Protocol architecture.", } @InProceedings{Blake:1985:CLG, author = "I. F. Blake and R. C. Mullin and S. A. Vanstone", title = "Computing Logarithms in {$ {\rm GF}(2^n) $}", crossref = "Blakley:1985:ACP", pages = "73--82", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=73", acknowledgement = ack-nhfb, } @InProceedings{Blakley:1985:ITF, author = "G. R. Blakley", title = "Information Theory without the Finiteness Assumption, {I}: Cryptosystems as Group-Theoretic Objects", crossref = "Blakley:1985:ACP", pages = "314--338", year = "1985", MRclass = "94A60 (20F99)", MRnumber = "87c:94034", MRreviewer = "D. Lieberman", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=314", acknowledgement = ack-nhfb, } @InProceedings{Blakley:1985:SRS, author = "G. R. Blakley and Catherine Meadows", title = "Security of Ramp Schemes", crossref = "Blakley:1985:ACP", pages = "242--268", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=242", acknowledgement = ack-nhfb, } @InProceedings{Blum:1985:EPP, author = "Manuel Blum and Shafi Goldwasser", title = "An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information", crossref = "Blakley:1985:ACP", pages = "289--302", year = "1985", MRclass = "94A60", MRnumber = "87e:94029", MRreviewer = "Willi Meier", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=289", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 6]{Goldreich:1997:FMCb}.", xxpages = "289--299", } @Article{Book:1985:CRE, author = "Ronald V. Book and Friedrich Otto", title = "Cancellation Rules and Extended Word Problems", journal = j-INFO-PROC-LETT, volume = "20", number = "1", pages = "5--11", day = "2", month = jan, year = "1985", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "68Q45 (03D03)", MRnumber = "87d:68054", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, affiliation = "Univ of California, Santa Barbara, Dep of Mathematics, Santa Barbara, CA, USA", affiliationaddress = "Univ of California, Santa Barbara, Dep of Mathematics, Santa Barbara, CA, USA", classification = "721; B6120B (Codes); B6150 (Communication system theory)", corpsource = "Dept. of Maths., California Univ., Santa Barbara, CA, USA", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "automata theory; cancellation rules; Church--Rosser property; computer metatheory; congruences; cryptography; extended word problems; Formal Languages; formal model; name-stamp protocols; protocols; public key encryption; rewriting process; secure network communication; Thue systems", treatment = "T Theoretical or Mathematical", } @Article{Book:1985:SNP, author = "R. V. Book and F. Otto", title = "On the security of name-stamp protocols", journal = j-THEOR-COMP-SCI, volume = "39", number = "2-3", pages = "319--325", month = aug, year = "1985", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Sat Nov 22 13:29:49 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/tcs1985.bib", acknowledgement = ack-nhfb, classification = "C5620 (Computer networks and techniques); C6130 (Data handling techniques)", corpsource = "Dept. of Math., California Univ., Santa Barbara, CA, USA", fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", keywords = "cryptography; name-stamp protocols; p-parity cascade protocols; protocols; security; two-party cascade protocols", pubcountry = "Netherlands A15", treatment = "T Theoretical or Mathematical", } @Article{Book:1985:SNS, author = "R. V. Book and F. Otto", title = "On the security of name-stamp protocols", journal = j-THEOR-COMP-SCI, volume = "39", number = "2-3", pages = "319--325", month = aug, year = "1985", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Sat Nov 22 13:29:49 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classification = "C5620 (Computer networks and techniques); C6130 (Data handling techniques)", corpsource = "Dept. of Math., California Univ., Santa Barbara, CA, USA", fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", keywords = "cryptography; name-stamp protocols; p-parity cascade protocols; protocols; security; two-party cascade protocols", pubcountry = "Netherlands A15", treatment = "T Theoretical or Mathematical", } @Article{Book:1985:VTA, author = "R. V. Book and F. Otto", title = "On the verifiability of two-party algebraic protocols", journal = j-THEOR-COMP-SCI, volume = "40", number = "2-3", pages = "101--130", month = "????", year = "1985", CODEN = "TCSCDI", ISSN = "0304-3975 (print), 1879-2294 (electronic)", ISSN-L = "0304-3975", bibdate = "Sat Nov 22 13:29:49 MST 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/tcs1985.bib", acknowledgement = ack-nhfb, classification = "B6210L (Computer communications); C5620 (Computer networks and techniques); C6130 (Data handling techniques)", corpsource = "Dept. of Math., California Univ., Santa Barbara, CA, USA", fjournal = "Theoretical Computer Science", journal-URL = "http://www.sciencedirect.com/science/journal/03043975", keywords = "communication protocols; cryptography; protocols; public-key cryptosystems; two-party algebraic protocols; verifiability", pubcountry = "Netherlands A02", treatment = "P Practical; T Theoretical or Mathematical", } @Article{Bounas:1985:DDS, author = "Adam C. Bounas", title = "Direct determination of a ``seed'' binary matrix", journal = j-INFO-PROC-LETT, volume = "20", number = "1", pages = "47--50", day = "2", month = jan, year = "1985", CODEN = "IFPLAT", ISSN = "0020-0190 (print), 1872-6119 (electronic)", ISSN-L = "0020-0190", MRclass = "94A60 (94A15)", MRnumber = "86g:94038", MRreviewer = "S. Guia{\c{s}}u", bibdate = "Wed Nov 11 12:16:26 MST 1998", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, affiliationaddress = "Greek Atomic Energy Commission, Computer Science Dep, Attiki, Greece", classification = "723; 922; B6120B (Codes); C6130 (Data handling techniques)", corpsource = "Dept. of Comput. Sci., Min. of Res. and Technol., Greek Atomic Energy Comm., Attiki, Greece", fjournal = "Information Processing Letters", journal-URL = "http://www.sciencedirect.com/science/journal/00200190", journalabr = "Inf Process Lett", keywords = "binary matrix; cryptography; data transformation; generalized feedback shift register pseudorandom number generator; keys; mathematical statistics --- Random Number Generation; pseudorandom number generators; random number generation; seed matrices; seed matrix; stream enciphering", treatment = "T Theoretical or Mathematical", } @InProceedings{Brickell:1985:BIK, author = "Ernest F. Brickell", title = "Breaking Iterated Knapsacks", crossref = "Blakley:1985:ACP", pages = "342--358", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=342", acknowledgement = ack-nhfb, } @Article{Burton:1985:EAC, author = "Charles E. Burton", title = "An Enhanced {ADFGVX} Cipher System", journal = j-DDJ, volume = "10", number = "2", pages = "48--??", month = feb, year = "1985", CODEN = "DDJOEB", ISSN = "1044-789X", bibdate = "Thu Jan 9 09:35:43 MST 1997", bibsource = "Compendex database; http://www.ddj.com/index/author/index.htm; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib", acknowledgement = ack-nhfb, classification = "723", fjournal = "Dr. Dobb's Journal of Software Tools", journalabr = "Dr Dobb's J", keywords = "ADFGVX cipher; computer programs; cryptography; data processing; decrypted text; encrypted messages; information theory --- Data Compression; Security of Data", pagecount = "19p between p 48 and 70", } @Article{Chan:1985:NMP, author = "B. Chan and H. Meijer", title = "A note on the method of puzzles for key distribution", journal = j-INT-J-COMPUT-INF-SCI, volume = "14", number = "4", pages = "221--223", month = aug, year = "1985", CODEN = "IJCIAH", ISSN = "0091-7036", bibdate = "Sat Apr 26 12:20:22 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib", acknowledgement = ack-nhfb, classification = "B6120B (Codes); C1260 (Information theory)", corpsource = "Dept. of Comput. and Inf. Sci., Queens Univ., Kingston, Ont., Canada", fjournal = "International Journal of Computer and Information Sciences", keywords = "cryptography; error correction codes; key distribution; linear error correcting codes; public key cryptosystem; puzzles; security of data", treatment = "T Theoretical or Mathematical", } @InProceedings{Chaum:1985:HKS, author = "David Chaum", title = "How to Keep a Secret Alive Extensible Partial Key, Key Safeguarding, and Threshold Systems", crossref = "Blakley:1985:ACP", pages = "481--485", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=481", acknowledgement = ack-nhfb, } @InProceedings{Chaum:1985:NSC, author = "David Chaum", title = "New Secret Codes Can Prevent a Computerized Big Brother", crossref = "Blakley:1985:ACP", pages = "432--433", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=432", acknowledgement = ack-nhfb, } @Article{Chaum:1985:SIT, author = "David Chaum", title = "Security without identification: transaction systems to make big brother obsolete", journal = j-CACM, volume = "28", number = "10", pages = "1030--1044", month = oct, year = "1985", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib; ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib; http://www.acm.org/pubs/toc/; http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/index-table-c.html#cacm1980", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4373.html; http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1022.html", abstract = "The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.", acknowledgement = ack-nhfb, annote = "Extensive article on use of random, transient personal id's. A digital pseudonym with each organization.", fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "design; human factors; information hiding; security; steganography", referencedin = "Referenced in \cite[Ref. 4]{Kaliski:1995:SUR}.", review = "ACM CR 8608-0693", subject = "{\bf C.2.0}: Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, General, Security and protection. {\bf E.3}: Data, DATA ENCRYPTION. {\bf J.1}: Computer Applications, ADMINISTRATIVE DATA PROCESSING, Financial. {\bf K.4.1}: Computing Milieux, COMPUTERS AND SOCIETY, Public Policy Issues, Privacy. {\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY, Social Issues, Abuse and crime involving computers.", } @InProceedings{Chen:1985:RGE, author = "Su-shing Chen", title = "On Rotation Group and Encryption of Analog Signals", crossref = "Blakley:1985:ACP", pages = "95--100", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=95", acknowledgement = ack-nhfb, } @InProceedings{Chor:1985:KTP, author = "Benny Chor and Ronald L. Rivest", title = "A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields (preliminary draft)", crossref = "Blakley:1985:ACP", pages = "54--65", year = "1985", MRclass = "94A60", MRnumber = "820 013", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "See also revised version in \cite{Chor:1988:KTP}.", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=54", acknowledgement = ack-nhfb, } @InProceedings{Chor:1985:RRL, author = "Benny Chor and Oded Goldreich", title = "{RSA\slash Rabin} least significant bits are {$ \frac {1}{2} + \frac {1}{{\rm poly}(\log N)} $} secure (extended abstract)", crossref = "Blakley:1985:ACP", pages = "303--313", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=303", acknowledgement = ack-nhfb, } @InProceedings{Chor:1985:VSS, author = "B. Chor and S. Goldwasser and S. Micali and B. Awerbuch", title = "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults", crossref = "IEEE:1985:FOC", pages = "383--395 (or 335--344??)", year = "1985", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 7]{Canetti:1997:PSL}, \cite[Ref. 6]{Gemmell:1997:ITC}.", xxtitle = "Verifiable Secret Sharing and Achieving Simultaneous Broadcast", } @Article{Coppersmith:1985:AF, author = "D. Coppersmith and J. H. Davenport", title = "An Application of Factoring", journal = j-J-SYMBOLIC-COMP, volume = "1", number = "2", pages = "241--243", month = jun, year = "1985", CODEN = "JSYCEH", ISSN = "0747-7171 (print), 1095-855X (electronic)", ISSN-L = "0747-7171", MRclass = "11T71 (11Y16 68Q40)", MRnumber = "87b:11125", MRreviewer = "Kevin S. McCurley", bibdate = "Sat May 10 15:54:09 MDT 1997", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/jsymcomp.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Symbolic Computation", journal-URL = "http://www.sciencedirect.com/science/journal/07477171", keywords = "Factorization, Logarithms, Cryptography, SCRATCHPAD", } @InProceedings{Davies:1985:MAA, author = "Donald Watts Davies", title = "A Message Authenticator Algorithm Suitable for a Mainframe Computer", crossref = "Blakley:1985:ACP", pages = "393--400", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=393", acknowledgement = ack-nhfb, } @InProceedings{Davio:1985:EHS, author = "Marc Davio and Yvo Desmedt and Jo Goubert and Frank Hoornaert and Jean-Jacques Quisquater", title = "Efficient hardware and software implementations for the {DES}", crossref = "Blakley:1985:ACP", pages = "144--146", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=144", acknowledgement = ack-nhfb, } @Article{Davis:1985:NRI, author = "J. A. Davis and D. B. Holdridge", title = "New results on integer factorizations", journal = j-CONG-NUM, volume = "46", pages = "65--78", year = "1985", ISSN = "0384-9864", MRclass = "11Y05 (94A60)", MRnumber = "86f:11098", bibdate = "Tue Feb 9 11:14:49 MST 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", note = "Proceedings of the fourteenth Manitoba conference on numerical mathematics and computing (Winnipeg, Man., 1984).", acknowledgement = ack-nhfb, fjournal = "Congressus Numerantium", } @InProceedings{Davis:1985:UFS, author = "J. A. Davis and D. B. Holdridge", title = "An Update on Factorization at {Sandia National Laboratories}", crossref = "Blakley:1985:ACP", pages = "114--114", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=114", acknowledgement = ack-nhfb, } @Book{Dawson:1985:COL, author = "M. J. Dawson", title = "Cryptanalysis of ornithological literature", volume = "4", publisher = "Oriel Stringer", address = "Brighton", pages = "40", year = "1985", ISBN = "0-948122-04-8 (paperback)", ISBN-13 = "978-0-948122-04-0 (paperback)", LCCN = "????", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "Caliologists' series", acknowledgement = ack-nhfb, keywords = "Birds --- Great Britain --- Nests; Great Britain --- Birds --- Nests", } @Book{Deavours:1985:MCM, author = "Cipher A. Deavours and Louis Kruh", title = "Machine cryptography and modern cryptanalysis", publisher = pub-ARTECH, address = pub-ARTECH:adr, pages = "xiv + 258", year = "1985", ISBN = "0-89006-161-0", ISBN-13 = "978-0-89006-161-9", LCCN = "Z103 .D431 1985", MRclass = "94A60 (01A60 94-03)", MRnumber = "87h:94017", MRreviewer = "Harriet Fell", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "The Artech House telecom library", acknowledgement = ack-nhfb, keywords = "Cryptography; Machine ciphers; World War, 1939--1945 --- Cryptography.", } @InProceedings{Delsarte:1985:FCM, author = "P. Delsarte and Y. Desmedt and A. Odlyzko and P. Piret", title = "Fast cryptanalysis of the {Matsumoto--Imai} public key scheme", crossref = "Beth:1985:ACP", pages = "142--149", year = "1985", DOI = "https://doi.org/10.1007/3-540-39757-4_14", MRclass = "94A60", MRnumber = "87c:94037", bibdate = "Mon Jul 19 07:03:50 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.research.att.com/~amo/doc/arch/break.mi.scheme.pdf; http://www.research.att.com/~amo/doc/arch/break.mi.scheme.ps; http://www.research.att.com/~amo/doc/arch/break.mi.scheme.troff", acknowledgement = ack-nhfb, } @InProceedings{Desmedt:1985:DOI, author = "Yvo Desmedt and Jean-Jacques Quisquater and Marc Davio", title = "Dependence of output on input in {DES}: Small avalanche characteristics", crossref = "Blakley:1985:ACP", pages = "359--376", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=359", acknowledgement = ack-nhfb, } @Book{DRC:1985:AAN, author = "{Datapro Research Corporation}", title = "All about network access control and data encryption devices: with in-depth analyses of leading devices", publisher = "Datapro Research Corporation", address = "Delran, NJ, USA", pages = "65", month = jun, year = "1985", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Special report prepared by editors of Datapro's monthly loose-leaf services.", keywords = "Computers --- Access control; Electronic data processing.", } @TechReport{Ecker:1985:STS, author = "Allen Ecker", title = "Satellite television, signal encryption and the future of broadband distribution", type = "Seminar notes", institution = "Communications Forum, Massachusetts Institute of Technology", address = "Cambridge, MA, USA", pages = "13", day = "19", month = sep, year = "1985", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{El-Gamal:1985:PCS, author = "T. El-Gamal", title = "A public-key cryptosystem and a signature scheme based on discrete logarithms", journal = j-IEEE-TRANS-INF-THEORY, volume = "IT-31", number = "4", pages = "469--472", year = "1985", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1985.1057074", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Information Theory", referencedin = "Referenced in \cite[Ref. 4]{Handschuh:1998:SCC}.", } @Article{ElGamal:1985:PKCa, author = "Taher ElGamal", title = "A public key cryptosystem and a signature scheme based on discrete logarithms", journal = j-IEEE-TRANS-INF-THEORY, volume = "IT-31", number = "4", pages = "469--472", year = "1985", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1985.1057074", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", MRclass = "94A60 (11T71)", MRnumber = "86j:94045", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "IEEE Transactions on Information Theory", } @InProceedings{ElGamal:1985:PKCb, author = "Taher ElGamal", title = "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", crossref = "Blakley:1985:ACP", pages = "10--18", year = "1985", MRclass = "94A60 (11T71 68P25)", MRnumber = "87b:94037", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=10", acknowledgement = ack-nhfb, } @Article{ElGamal:1985:STA, author = "Taher ElGamal", title = "A subexponential-time algorithm for computing discrete logarithms over {$ {\rm GF}(p^2) $}", journal = j-IEEE-TRANS-INF-THEORY, volume = "IT-31", number = "4", pages = "473--481", year = "1985", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1985.1057075", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", bibdate = "Sun Mar 11 10:34:00 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Information Theory", } @InProceedings{Even:1985:CSW, author = "Shimon Even", title = "On the complexity of some word problems that arise in testing the security of protocols", crossref = "Apostolico:1985:CAW", pages = "299--314", year = "1985", MRclass = "68Q25 (68P25 94A60)", MRnumber = "87a:68080", bibdate = "Tue Feb 9 11:14:49 MST 1999", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, } @Article{Even:1985:PCC, author = "S. Even and O. Goldreich", title = "On the Power of Cascade Ciphers", journal = j-TOCS, volume = "3", number = "2", pages = "108--116", month = may, year = "1985", CODEN = "ACSYEC", ISSN = "0734-2071", ISSN-L = "0734-2071", bibdate = "Thu Jan 14 06:47:30 MST 1999", bibsource = "Compendex database; http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.acm.org:80/pubs/citations/journals/tocs/1985-3-2/p108-even/", abstract = "The unicity distance of a cascade of random ciphers, with respect to known plaintext attack, is shown to be the sum of the key lengths. At time-space trade-off for the exhaustive cracking of a cascade of ciphers is shown. The structure of the set of permutations realized by a cascade is studied; it is shown that only l. 2**k exhaustive experiments are necessary to determine the behavior of a cascade of l stages, each having k key bits. It is concluded that the cascade of random ciphers is not a random cipher. Yet, it is shown that, with probability, the number of permutations realizable by a cascade of l random ciphers, each having k key bits, is 2**l**k. Next, it is shown that two stages are not worse than one, by a simple reduction of the cracking problem of any of the stages to the cracking problem of the cascade. Finally, it is shown that proving a nonpolynomial lower bound on the cracking problem of long cascades is a hard task, since such a bound implies that P does not equal NP.", acknowledgement = ack-nhfb, affiliationaddress = "Technion-Israel Inst of Technology, Haifa, Isr", classification = "723", fjournal = "ACM Transactions on Computer Systems", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774", journalabr = "ACM Trans Comput Syst", keywords = "algorithms; cascade ciphers; cryptography; data encryption; data processing --- Security of Data; random ciphers; security; theory; unicity distance", subject = "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and Protection. {\bf E.3} Data, DATA ENCRYPTION.", } @Article{Even:1985:RPS, author = "Shimon Even and Oded Goldreich and Abraham Lempel", title = "A randomized protocol for signing contracts", journal = j-CACM, volume = "28", number = "6", pages = "637--647", month = jun, year = "1985", CODEN = "CACMA2", ISSN = "0001-0782 (print), 1557-7317 (electronic)", ISSN-L = "0001-0782", MRclass = "68P25", MRnumber = "800 680", bibdate = "Fri Apr 5 10:03:00 MST 1996", bibsource = "http://www.acm.org/pubs/toc/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3818.html", acknowledgement = ack-nhfb, fjournal = "Communications of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79", keywords = "security; theory; verification", review = "ACM CR 8512-1137", subject = "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption standard (DES). {\bf E.3}: Data, DATA ENCRYPTION, Public key cryptosystems. {\bf C.2.2}: Computer Systems Organization, COMPUTER-COMMUNICATION NETWORKS, Network Protocols. {\bf H.4.3}: Information Systems, INFORMATION SYSTEMS APPLICATIONS, Communications Applications, Electronic mail. {\bf J.1}: Computer Applications, ADMINISTRATIVE DATA PROCESSING, Financial.", } @InProceedings{Fairfield:1985:LDE, author = "R. C. Fairfield and A. Matusevich and J. Plany", title = "An {LSI Digital Encryption Processor (DEP)}", crossref = "Blakley:1985:ACP", pages = "115--143", year = "1985", MRclass = "94A60", MRnumber = "820 017", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=115", acknowledgement = ack-nhfb, } @InProceedings{Fairfield:1985:LRN, author = "R. C. Fairfield and R. L. Mortenson and K. B. Coulthart", title = "An {LSI} Random Number Generator ({RNG})", crossref = "Blakley:1985:ACP", pages = "203--230", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=203", acknowledgement = ack-nhfb, } @InProceedings{Fortune:1985:PP, author = "Steven Fortune and Michael Merritt", title = "Poker Protocols", crossref = "Blakley:1985:ACP", pages = "454--464", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=454", acknowledgement = ack-nhfb, } @MastersThesis{Franklin:1985:MID, author = "Matthew Keith Franklin", title = "Mathematical investigations of the {Data Encryption Standard}", type = "Thesis ({M.A. in Mathematics})", school = "Department of Mathematics, University of California, Berkeley", address = "Berkeley, CA, USA", pages = "36", month = may, year = "1985", LCCN = "C 2 930 522", bibdate = "Mon Oct 19 08:50:31 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "University of California, Berkeley --- dissertations --- mathematics", } @Book{Franksen:1985:MBS, author = "Ole Immanuel Franksen", title = "{Mr. Babbage}'s secret: the tale of a cypher and {APL}", publisher = pub-PH, address = pub-PH:adr, pages = "319", year = "1985", ISBN = "0-13-604729-7", ISBN-13 = "978-0-13-604729-2", LCCN = "Z103.B2 F721 1985", bibdate = "Mon Nov 4 07:46:57 MST 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "APL (computer program language); Babbage, Charles, 1791--1871; ciphers --- history; cryptographers --- Great Britain --- biography; cryptography --- history", } @Book{Gleason:1985:ECP, author = "Andrew M. Gleason and Walter F. Penney and Ronald E. Wyllys", title = "Elementary course in probability for the cryptanalyst", volume = "41", publisher = pub-AEGEAN-PARK, address = pub-AEGEAN-PARK:adr, edition = "Revised", pages = "????", year = "1985", ISBN = "0-89412-072-7", ISBN-13 = "978-0-89412-072-5", LCCN = "Z104 .G53 1985", bibdate = "Wed May 11 23:23:17 MDT 2011", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", series = "A Cryptographic series", acknowledgement = ack-nhfb, subject = "Probabilities; Cryptography", } @InProceedings{Goldreich:1985:CAR, author = "Oded Goldreich and Shafi Goldwasser and Silvio Micali", title = "On the Cryptographic Applications of Random Functions (Extended Abstract)", crossref = "Blakley:1985:ACP", pages = "276--288", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=276", acknowledgement = ack-nhfb, } @InProceedings{Goldwasser:1985:PSS, author = "Shafi Goldwasser and Silvio Micali and Ronald L. Rivest", title = "A {``Paradoxical''} Solution to the Signature Problem", crossref = "Blakley:1985:ACP", pages = "467--467", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=467", acknowledgement = ack-nhfb, } @Article{Goodman:1985:NTK, author = "R. M. F. Goodman and A. J. McAuley", booktitle = "Advances in cryptology (Paris, 1984)", title = "A new trapdoor knapsack public key cryptosystem", journal = j-LECT-NOTES-COMP-SCI, volume = "209", pages = "150--158", year = "1985", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60", MRnumber = "87c:94038", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Lecture Notes in Computer Science", } @InProceedings{Gordon:1985:SPE, author = "John A. Gordon", title = "Strong primes are easy to find", crossref = "Beth:1985:ACP", pages = "216--223", year = "1985", DOI = "https://doi.org/10.1007/3-540-39757-4_19", bibdate = "Sun Mar 11 10:24:54 2012", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, remark = "A {\em strong prime\/} $p$ is a prime that satisfies three conditions: (1) $ p = 1 \bmod r $, (2) $ p = (s - 1) \bmod s $, and (3) $ r = 1 \bmod t $, where $r$, $s$, and $t$ are all large random primes of a given number of bits.", } @InProceedings{Haastad:1985:CST, author = "J. H{\aa}stad and A. Shamir", title = "The cryptographic security of truncated linearly related variables", crossref = "ACM:1985:PSA", pages = "356--362", year = "1985", bibdate = "Wed Feb 20 18:33:46 MST 2002", bibsource = "http://portal.acm.org/; http://www.acm.org/pubs/contents/proceedings/series/stoc/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.acm.org/pubs/articles/proceedings/stoc/22145/p356-hastad/p356-hastad.pdf; http://www.acm.org/pubs/citations/proceedings/stoc/22145/p356-hastad/", acknowledgement = ack-nhfb, } @Manual{Hardy:1985:ECC, author = "John M. Hardy and Dorothy W. Fuller and Douglas R. Long and Jane C. Hartin and Faye Davis", title = "Electronic cryptographic communications equipment specialist {(AFSC 30650)}", number = "CDC 30650", organization = "Extension Course Institute, Air University", address = "????", pages = "various", year = "1985", LCCN = "D 301.26/17-2:30650 2 8502 Govt Pubs; Other Govt Docs numbers: D 301.26/17-2:30650 04 8502", bibdate = "Sat Nov 18 12:53:52 MST 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "``30650 -2 8502''--Vol. 2. ``30650 04 8502''--Vol. 4. ``CDC 30650.'' Description based in vol. 2. Bibliography: vol. 2, p. 153. Contents: v. 2. Advanced electronics / [prepared by John M. Hardy; edited by Dorothy W. Fuller] -- v. 4. Maintenance practices and test equipment / [prepared by John M. Hardy, Douglas R. Long; edited by Jane C. Hartin, Faye Davis].", keywords = "cryptography -- handbooks, manuals, etc; electronics in military engineering -- handbooks, manuals, etc; United States. Air Force -- handbooks, manuals, etc", } @Article{HJH:1985:BRK, author = "HJH", title = "Book Review: {{\booktitle{Kahn on codes: Secrets of the new cryptology}}: David Kahn New York: Macmillan Publishing Company, 1984. 344 + viii pages, \$19.95}", journal = j-COMPUT-SECUR, volume = "4", number = "3", pages = "247--247", month = sep, year = "1985", CODEN = "CPSEDU", ISSN = "0167-4048 (print), 1872-6208 (electronic)", ISSN-L = "0167-4048", bibdate = "Mon Sep 23 09:44:26 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "https://www.sciencedirect.com/science/article/pii/0167404885900379", acknowledgement = ack-nhfb, fjournal = "Computers \& Security", journal-URL = "http://www.sciencedirect.com/science/journal/01674048", } @InProceedings{Hoornaert:1985:EHI, author = "Frank Hoornaert and Jo Goubert and Yvo Desmedt", title = "Efficient hardware implementation of the {DES}", crossref = "Blakley:1985:ACP", pages = "147--173", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=147", acknowledgement = ack-nhfb, } @Article{Horgan:1985:TIT, author = "J. Horgan", title = "Thwarting the information thieves: Fear of spying through simple or sophisticated electronics has spawned an industry whose challenge is to block the illegal interception of intelligence", journal = j-IEEE-SPECTRUM, volume = "22", number = "7", pages = "30--41", month = jul, year = "1985", CODEN = "IEESAM", DOI = "https://doi.org/10.1109/MSPEC.1985.6370754", ISSN = "0018-9235 (print), 1939-9340 (electronic)", ISSN-L = "0018-9235", bibdate = "Mon Jan 20 06:41:24 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib", acknowledgement = ack-nhfb, fjournal = "IEEE Spectrum", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6", keywords = "bugs; Coaxial cables; communications interception; Companies; Computer bugs; computer crime; cryptography; data privacy; defense contractors; domestic competitors; electronic surveillance; electronic sweeps; encryption; expensive; foreign governments; information thieves; Microwave theory and techniques; private security vendors; Security; security of data; Surveillance; tapes; time-consuming; US Government", } @Article{Hunter:1985:ARK, author = "D. G. N. Hunter", title = "{Algorithm 121}: {RSA} key calculation in {Ada}", journal = j-COMP-J, volume = "28", number = "3", pages = "343--348", month = jul, year = "1985", CODEN = "CMPJA6", DOI = "https://doi.org/10.1093/comjnl/28.3.343", ISSN = "0010-4620 (print), 1460-2067 (electronic)", ISSN-L = "0010-4620", MRclass = "94A60 (94-04)", MRnumber = "86j:94048", bibdate = "Tue Dec 4 14:48:18 MST 2012", bibsource = "http://comjnl.oxfordjournals.org/content/28/3.toc; https://www.math.utah.edu/pub/tex/bib/compj1980.bib; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/", note = "See note \cite{Wichmann:1987:NAR}.", URL = "http://comjnl.oxfordjournals.org/content/28/3/343.full.pdf+html; http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/343.tif; http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/344.tif; http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/345.tif; http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/346.tif; http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/347.tif; http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/348.tif", acknowledgement = ack-nhfb, classcodes = "C6130 (Data handling techniques)", corpsource = "Stand. Telecommun. Labs. Ltd., Harlow, UK", fjournal = "The Computer Journal", journal-URL = "http://comjnl.oxfordjournals.org/", keywords = "16-bit microcomputers; Ada; Ada listings; assembly code; cryptography; encryption programs; exponentiation operation; finite arithmetic; general purpose arithmetic packages; multiple precision arithmetic; packages; RSA key calculation in", treatment = "T Theoretical or Mathematical", } @Article{Kak:1985:EEC, author = "Subhash C. Kak", title = "Encryption and error-correction coding using {$D$} sequences", journal = j-IEEE-TRANS-COMPUT, volume = "34", number = "9", pages = "803--809", year = "1985", CODEN = "ITCOB4", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", MRclass = "94A60 (68P20)", MRnumber = "86k:94028", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", fjournal = "Institute of Electrical and Electronics Engineers. Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @InProceedings{Kaliski:1985:WAE, author = "Burt S. Kaliski", title = "{Wyner}'s Analog Encryption Scheme: Results of a Simulation", crossref = "Blakley:1985:ACP", pages = "83--94", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=83", acknowledgement = ack-nhfb, } @Article{Karger:1985:ADA, author = "Paul A. Karger", title = "Authentication and Discretionary Access Control in Computer Networks", journal = j-COMP-NET-ISDN, volume = "10", number = "1", pages = "27--37", month = aug, year = "1985", CODEN = "CNISE9", ISSN = "0169-7552 (print), 1879-2324 (electronic)", ISSN-L = "0169-7552", bibdate = "Sat Sep 25 23:08:50 MDT 1999", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, affiliation = "Digital Equipment Corp, Littleton, MA, USA", classification = "723", fjournal = "Computer Networks and ISDN Systems", journal-URL = "http://www.sciencedirect.com/science/journal/01697552", journalabr = "Comput Networks ISDN Syst", keywords = "access control; authentication; computer networks; data processing --- Security of Data; data security; digital network architecture; network security", } @Article{Knuth:1985:DLC, author = "Donald E. Knuth", title = "Deciphering a linear congruential encryption", journal = j-IEEE-TRANS-INF-THEORY, volume = "IT-31", number = "1", pages = "49--52", month = jan, year = "1985", CODEN = "IETTAW", DOI = "https://doi.org/10.1109/TIT.1985.1056997", ISSN = "0018-9448 (print), 1557-9654 (electronic)", ISSN-L = "0018-9448", MRclass = "94A60", MRnumber = "87c:94040", bibdate = "Fri Oct 25 18:39:09 2002", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; MathSciNet database", note = "Russian translation, to appear.", fjournal = "IEEE Transactions on Information Theory", subject = "G.3 Mathematics of Computing, PROBABILITY AND STATISTICS, Random number generation E Data, DATA ENCRYPTION", } @InProceedings{Konheim:1985:CAE, author = "Alan G. Konheim", title = "Cryptanalysis of {ADFGVX} Encipherment Systems (extended abstract)", crossref = "Blakley:1985:ACP", pages = "339--341", year = "1985", MRclass = "94A60", MRnumber = "820 027", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=339", acknowledgement = ack-nhfb, } @InProceedings{Kothari:1985:GLT, author = "S. C. Kothari", title = "Generalized Linear Threshold Scheme", crossref = "Blakley:1985:ACP", pages = "231--241", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=231", acknowledgement = ack-nhfb, } @Article{Lagarias:1985:SLD, author = "J. C. Lagarias and A. M. Odlyzko", title = "Solving Low-Density Subset Sum Problems", journal = j-J-ACM, volume = "32", number = "1", pages = "229--246", month = jan, year = "1985", CODEN = "JACOAH", ISSN = "0004-5411", ISSN-L = "0004-5411", bibdate = "Wed Jan 15 18:12:53 MST 1997", bibsource = "Compendex database; https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/jacm.bib", note = "Preliminary version in {\em Proc. 24th IEEE Foundations Computer Science Symp.}, pp. 1--10, 1983.", URL = "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2461.html", abstract = "The subset sum problem is to decide whether or not a 0-1 integer programming problem which is NP-complete, has a solution. The difficulty of solving it is the basis of public-key cryptosystems of knapsack type. An algorithm is proposed that searches for a solution when given an instance of the subset sum problem. This algorithm always halts in polynomial time but does not always find a solution when one exists. It converts the problem to one of finding a particular short vector in a lattice, and then uses a lattice basis reduction algorithm to attempt to find this short vector. The performance of the proposed algorithm is analyzed.", acknowledgement = ack-nhfb, affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA", classification = "721; 722; 723", fjournal = "Journal of the ACM", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J401", journalabr = "J Assoc Comput Mach", keywords = "Algorithms; algorithms; automata theory --- Theorem Proving; computer programming; computers, digital --- Special Purpose Application; cryptography --- Applications; data encryption; discrete mathematics; integer lattice; measurement; public-key cryptosystems; security; subset sum problems; theory; verification", subject = "{\bf F.2.1}: Theory of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms and Problems, Number-theoretic computations. {\bf E.3}: Data, DATA ENCRYPTION. {\bf G.1.6}: Mathematics of Computing, NUMERICAL ANALYSIS, Optimization, Integer programming. {\bf G.2.m}: Mathematics of Computing, DISCRETE MATHEMATICS, Miscellaneous.", } @MastersThesis{Lassek:1985:CCA, author = "Teresa A. Lassek", title = "Cryptology and the computer age", type = "Thesis ({Honors})", school = "University of Nebraska at Omaha", address = "Omaha, NE, USA", pages = "58", year = "1985", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Computers --- Access control; Cryptography; Data protection", } @InProceedings{Leighton:1985:HBC, author = "Albert C. Leighton and Stephen M. Matyas", title = "The History of Book Ciphers", crossref = "Blakley:1985:ACP", pages = "101--113", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=101", acknowledgement = ack-nhfb, } @InProceedings{Leung:1985:SCT, author = "A. K. Leung and S. E. Tavares", title = "Sequence Complexity as a Test for Cryptographic Systems", crossref = "Blakley:1985:ACP", pages = "468--474", year = "1985", bibdate = "Thu Feb 23 08:43:57 MST 2012", bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=468", acknowledgement = ack-nhfb, } @InProceedings{Levin:1985:OWF, author = "L. A. Levin", title = "One-way functions and pseudorandom generators", crossref = "ACM:1985:PSA", pages = "363--365", year = "1985", bibdate = "Wed Feb 20 18:33:46 MST 2002", bibsource = "http://portal.acm.org/; http://www.acm.org/pubs/contents/proceedings/series/stoc/; https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.acm.org/pubs/articles/proceedings/stoc/22145/p363-levin/p363-levin.pdf; http://www.acm.org/pubs/citations/proceedings/stoc/22145/p363-levin/", acknowledgement = ack-nhfb, } @Article{Lidl:1985:CBP, author = "R. Lidl", booktitle = "Advances in cryptology (Paris, 1984)", title = "On cryptosystems based on polynomials and finite fields", journal = j-LECT-NOTES-COMP-SCI, volume = "209", pages = "10--15", year = "1985", CODEN = "LNCSD9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", MRclass = "94A60 (11T71)", MRnumber = "87c:94041", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", fjournal = "Lecture Notes in Computer Science", } @Article{Mackinnon:1985:OAA, author = "S. J. Mackinnon and P. D. Taylor and H. Meijer and S. G. Akl", title = "An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy", journal = j-IEEE-TRANS-COMPUT, volume = "C-34", number = "9", pages = "797--802", month = sep, year = "1985", CODEN = "ITCOB4", DOI = "https://doi.org/10.1109/TC.1985.1676635", ISSN = "0018-9340 (print), 1557-9956 (electronic)", ISSN-L = "0018-9340", bibdate = "Sun Jul 10 08:33:28 MDT 2011", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib", URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1676635", acknowledgement = ack-nhfb, fjournal = "IEEE Transactions on Computers", journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12", } @Article{McIvor:1985:SC, author = "R. McIvor", title = "Smart cards", journal = j-SCI-AMER, volume = "253", number = "5", pages = "130--137", month = nov, year = "1985", CODEN = "SCAMAC", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Mon May 18 08:08:24 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, classification = "B1265 (Digital electronics); C7120 (Financial computing)", fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", keywords = "credit cards; digital IC; digital integrated circuits; EFTS; microelectronic chip; smart cards", treatment = "G General Review", } @TechReport{Meijer:1985:MEN, author = "Henk Meijer", title = "Multiplication-permutation encryption networks", type = "Technical report", number = "85-171", institution = "Department of Computing and Information Science, Queen's University", address = "Kingston, Ont., Canada", pages = "15", year = "1985", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, annote = "Supported by the Natural Sciences and Engineering Research Council of Canada.", keywords = "Cryptography.", } @MastersThesis{Miller:1985:PES, author = "Jay I. Miller", title = "A private-key encryption system based on plane geometry", type = "Thesis ({M.S. in Computer Science})", school = "University of Wisconsin-Milwaukee", address = "Milwaukee, WI, USA", pages = "iv + 33 + 115", year = "1985", bibdate = "Mon Oct 19 08:47:56 MDT 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, keywords = "Cryptography; Data protection; Geometry, Plane.", } @Article{Montgomery:1985:MMT, author = "Peter L. Montgomery", title = "Modular Multiplication Without Trial Division", journal = j-MATH-COMPUT, volume = "44", number = "170", pages = "519--521", month = apr, year = "1985", CODEN = "MCMPAF", DOI = "https://doi.org/10.1090/S0025-5718-1985-0777282-X", ISSN = "0025-5718 (print), 1088-6842 (electronic)", ISSN-L = "0025-5718", MRclass = "11Y16", MRnumber = "86e:11121", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib; https://www.math.utah.edu/pub/tex/bib/mathcomp1980.bib; JSTOR database", URL = "http://www.ams.org/journals/mcom/1985-44-170/S0025-5718-1985-0777282-X/", acknowledgement = ack-nhfb, classcodes = "C1160 (Combinatorial mathematics); C5230 (Digital arithmetic methods); C6130 (Data handling techniques)", corpsource = "Syst. Dev. Corp., Santa Monica, CA, USA", fjournal = "Mathematics of Computation", journal-URL = "http://www.ams.org/mcom/", keywords = "digital arithmetic; integer; integer arithmetic; modular arithmetic; modular multiplication; multiplication; N-residue; N-residue arithmetic; number theory", referencedin = "Referenced in \cite[Ref. 8]{Handschuh:1998:SCC}.", treatment = "T Theoretical or Mathematical", } @Manual{NIST:1985:FPC, author = "{NIST}", title = "{FIPS PUB} 113: Computer Data Authentication", organization = "National Institute of Standards and Technology (formerly National Bureau of Standards)", address = "Gaithersburg, MD, USA", pages = "??", day = "30", month = may, year = "1985", bibdate = "Fri Nov 20 15:54:39 MST 1998", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", acknowledgement = ack-nhfb, referencedin = "Referenced in \cite[Ref. 7]{Kaliski:1995:MAM}.", } @Book{NIST:1985:FPSa, author = "{National Institute of Standards and Technology}", title = "{FIPS PUB 112}: Standard for Password Usage", publisher = pub-NIST, address = pub-NIST:adr, day = "30", month = may, year = "1985", bibdate = "Mon Nov 27 08:37:27 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.itl.nist.gov/fipspubs/fip112.htm", abstract = "The document specifies basic security criteria for two different uses of passwords in an ADP system, (1) personal identity authentication and (2) data access authorization. It establishes the basic criteria for the design, implementation and use of a password system in those systems where passwords are used. It identifies fundamental ADP management functions pertaining to passwords and specifies some user actions required to satisfy these functions. In addition, it specifies several technical features which may be implemented in an ADP system in order to support a password system. An implementation schedule is established for compliance with the Standard. Numerous guidelines are provided in the Appendices for managers and users seeking to comply with the Standard.", acknowledgement = ack-nhfb, keywords = "computer security; data security; passphrase; password; personal identification; systems security.", } @Book{NIST:1985:FPSb, author = "{National Institute of Standards and Technology}", title = "{FIPS PUB 113}: Standard for Computer Data Authentication", publisher = pub-NIST, address = pub-NIST:adr, day = "30", month = may, year = "1985", bibdate = "Mon Nov 27 08:37:27 2000", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography.bib", URL = "http://www.itl.nist.gov/fipspubs/fip113.htm", abstract = "his publication specifies a standard to be used by Federal organizations which require that the integrity of computer data be cryptographically authenticated. In addition, it may be used by any organization whenever cryptographic authentication is desired. Cryptographic authentication of data during transmission between electronic components or while in storage is necessary to maintain the integrity of the information represented by the data. The standard specifies a cryptographic authentication algorithm for use in ADP systems and networks. The authentication algorithm makes use of the Data Encryption Standard (DES) cryptographic algorithm as defined in Federal Information Processing Standard 46 (FIPS PUB 46).", acknowledgement = ack-nhfb, keywords = "authentication; cryptography; data authentication algorithm; Data Authentication Algorithm (DAA); Data Encryption Standard (DES); data integrity; Federal Information Processing Standard (FIPS)", } @InProceedings{Nobauer:1985:CRS, author = "Rupert N{\"o}bauer", booktitle = "Contributions to general algebra, 3 (Vienna, 1984)", title = "Cryptanalysis of the {R{\'e}dei}-scheme", publisher = "H{\"o}lder-Pichler-Tempsky", address = "Vienna, Austria", pages = "255--264", year = "1985", MRclass = "94A60 (11T71)", MRnumber = "87b:94040", bibdate = "Sat Oct 26 10:21:29 2