Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "4.114",
%%%     date            = "02 November 2023",
%%%     time            = "07:28:45 MDT",
%%%     filename        = "cryptography.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "43735 29879 122963 1260134",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Blowfish; cipher;
%%%                        Clipper; code breaking; cracking;
%%%                        cryptanalysis; crypto; cryptobytes;
%%%                        cryptography; cryptology; cryptosystem; data
%%%                        encryption algorithm; decryption; DES;
%%%                        Diffie; digital signature; encryption;
%%%                        Hellmann; International Data Encryption
%%%                        Algorithm (IDEA); Kahn; Kerberos; key escrow;
%%%                        kleptography; PGP; Pretty Good Privacy;
%%%                        Rivest; RSA; Schneier; Smart Card;
%%%                        steganography; Twofish; Zimmermann",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is bibliography of publications on
%%%                        cryptography and related subjects for the
%%%                        years 1404--1989.  Material for years
%%%                        1990--date appears in companion
%%%                        bibliographies, cryptography1990.bib,
%%%                        cryptography2000.bib, and so on, to reduce
%%%                        the size of this bibliography.
%%%
%%%                        At version 3.29 of this file, the number of
%%%                        entries exceeded 4000, so material for the
%%%                        1990s was moved into a new file,
%%%                        cryptography1990.bib.
%%%
%%%                        The initial draft of this bibliography was
%%%                        extracted using the bibsearch utility from
%%%                        the large TeX User Group and BibNet Project
%%%                        bibliography archives, available on the
%%%                        Internet at
%%%
%%%                            ftp://ftp.math.utah.edu/pub/tex/bib
%%%                            https://www.math.utah.edu/pub/tex/bib/index-table.html
%%%
%%%                        and
%%%
%%%                            ftp://ftp.math.utah.edu/pub/bibnet
%%%                            https://www.math.utah.edu/pub/bibnet/index.html
%%%
%%%                        As of August 2017, these archives hold more
%%%                        than 1,300,000 bibliographic entries in
%%%                        BibTeX form.
%%%
%%%                        Those results were then augmented by entries
%%%                        for books found in the University of
%%%                        California Melvyl catalog, the Library of
%%%                        Congress catalog, and the OCLC WorldCat
%%%                        database, and by other publications found in
%%%                        the Compendex database, the OCLC Contents1st,
%%%                        Proceedings, and PapersFirst databases, and
%%%                        the MathSciNet database.
%%%
%%%                        Counterpane Systems maintains a Web site at
%%%
%%%                            http://www.counterpane.com/
%%%                            http://www.counterpane.com/publish.html
%%%
%%%                        with a substantial number of their technical
%%%                        reports and articles available in electronic
%%%                        form.
%%%
%%%                        The International Association for Cryptologic
%%%                        Research (IACR) is a ``non-profit scientific
%%%                        organization whose primary purpose is to
%%%                        further research in cryptology and related
%%%                        fields''.  It has a World-Wide Web site at
%%%
%%%                            http://www.iacr.org/index.html
%%%
%%%                        IACR publishes an email newsletter thrice
%%%                        yearly.  Back issues are available starting
%%%                        with Volume 15, Number 1, Fall 1998 at the
%%%                        above site.  It also supports a distinguished
%%%                        lecture series
%%%
%%%                            http://www.iacr.org/publications/dl/
%%%
%%%                        and a preprint server
%%%
%%%                            http://www.iacr.org/publications/preprint.html
%%%
%%%                        The Cryptography and Security Group at the
%%%                        Department of Computer Science and
%%%                        Engineering of the University of California
%%%                        at San Diego supports a World-Wide Web site,
%%%                        called the Theory of Cryptography Library, at
%%%
%%%                            http://philby.ucsd.edu/cryptolib/
%%%
%%%                        There is another site with cryptographic
%%%                        miscellanea and news articles at
%%%
%%%                            http://cryptome.org/
%%%
%%%                        There is an archive of the cryptography
%%%                        mailing list at
%%%
%%%                            http://www.mail-archive.com/cryptography%40wasabisystems.com/
%%%
%%%                        All of the cited references from all of the
%%%                        articles in the online journal CryptoBytes
%%%                        are also included, with referencedin key
%%%                        values recording the source of citations.
%%%
%%%                        However, publications in the journals
%%%
%%%                            * Cryptography and Communications,
%%%                            * Cryptologia,
%%%                            * Designs, Codes, and Cryptography,
%%%                            * Groups Complexity Cryptology,
%%%                            * Journal of Cryptology,
%%%                            * Journal of Discrete Mathematical
%%%                              Sciences and Cryptography
%%%
%%%                        are generally excluded, unless they are
%%%                        cross-referenced by other entries in this
%%%                        bibliography, because they are covered in
%%%                        separate companion bibliographies,
%%%                        cryptologia.bib, designscodescryptogr.bib,
%%%                        jcryptology.bib, and jdiscrmathscicrypto.bib.
%%%
%%%                        Historical note: Whitfield Diffie, Martin
%%%                        E. Hellman, and Ralph Merkle are justly
%%%                        credited with the first publicly-reported
%%%                        discovery (in 1976--78) of public-key key
%%%                        cryptography.  However, three British
%%%                        researchers, James Ellis, Clifford Cocks and
%%%                        Malcolm Williamson independently discovered
%%%                        it earlier (about 1975), but their work was
%%%                        secret until its declassification in 1997.
%%%                        See entries Ellis:1975:PKC, Diffie:1976:NDC,
%%%                        Merkle:1978:HIS, Merkle:1978:SCI.  I have not
%%%                        yet been able to locate the declassified
%%%                        reports.  Two reports by Alan Turing on
%%%                        cryptography (entries Turing:1941:APC and
%%%                        Turing:1941:SR) were similarly closely-held
%%%                        secrets, and were only declassified in 2012.
%%%
%%%                        At version 4.114, the year coverage looked
%%%                        like this:
%%%
%%%                             1404 (   1)    1606 (   3)    1808 (   0)
%%%                             1418 (   0)    1620 (   1)    1822 (   0)
%%%                             1419 (   0)    1621 (   3)    1823 (   0)
%%%                             1425 (   0)    1627 (   1)    1829 (   0)
%%%                             1431 (   0)    1633 (   1)    1835 (   0)
%%%                             1439 (   0)    1641 (   1)    1843 (   0)
%%%                             1442 (   0)    1644 (   2)    1846 (   0)
%%%                             1459 (   0)    1661 (   0)    1863 (   1)
%%%                             1460 (   0)    1662 (   0)    1864 (   1)
%%%                             1464 (   0)    1666 (   1)    1868 (   0)
%%%                             1469 (   0)    1671 (   0)    1873 (   1)
%%%                             1470 (   1)    1672 (   0)    1874 (   1)
%%%                             1474 (   0)    1676 (   1)    1878 (   0)
%%%                             1479 (   0)    1681 (   0)    1883 (   1)
%%%                             1481 (   0)    1683 (   0)    1885 (   1)
%%%                             1486 (   0)    1688 (   0)    1890 (   1)
%%%                             1488 (   0)    1690 (   0)    1892 (   1)
%%%                             1490 (   0)    1692 (   1)    1894 (   0)
%%%                             1494 (   0)    1696 (   0)    1898 (   1)
%%%                             1496 (   0)    1698 (   0)    1900 (   1)
%%%                             1498 (   0)    1700 (   0)    1902 (   1)
%%%                             1500 (   0)    1702 (   0)    1904 (   1)
%%%                             1508 (   0)    1710 (   0)    1912 (   1)
%%%                             1510 (   0)    1712 (   0)    1914 (   1)
%%%                             1511 (   0)    1713 (   0)    1915 (   1)
%%%                             1515 (   0)    1717 (   0)    1919 (   1)
%%%                             1516 (   0)    1718 (   0)    1920 (   1)
%%%                             1517 (   0)    1719 (   0)    1921 (   1)
%%%                             1518 (   1)    1720 (   0)    1922 (   4)
%%%                             1519 (   0)    1721 (   0)    1923 (   1)
%%%                             1520 (   0)    1722 (   0)    1924 (   2)
%%%                             1521 (   0)    1723 (   0)    1925 (   2)
%%%                             1522 (   0)    1724 (   0)    1926 (   1)
%%%                             1523 (   0)    1725 (   0)    1927 (   2)
%%%                             1524 (   0)    1726 (   0)    1928 (   1)
%%%                             1525 (   0)    1727 (   0)    1929 (   2)
%%%                             1527 (   0)    1729 (   0)    1931 (   3)
%%%                             1528 (   0)    1730 (   0)    1932 (   1)
%%%                             1529 (   0)    1731 (   0)    1933 (   1)
%%%                             1531 (   0)    1733 (   0)    1935 (   5)
%%%                             1532 (   0)    1734 (   0)    1936 (   3)
%%%                             1534 (   0)    1736 (   0)    1938 (   2)
%%%                             1535 (   0)    1737 (   0)    1939 (   8)
%%%                             1536 (   0)    1738 (   0)    1940 (   3)
%%%                             1537 (   0)    1739 (   1)    1941 (   5)
%%%                             1538 (   0)    1740 (   0)    1942 (   2)
%%%                             1539 (   0)    1741 (   0)    1943 (   9)
%%%                             1540 (   0)    1742 (   0)    1944 (   2)
%%%                             1541 (   0)    1743 (   0)    1945 (   6)
%%%                             1542 (   0)    1744 (   0)    1946 (   2)
%%%                             1543 (   0)    1745 (   0)    1947 (   2)
%%%                             1544 (   0)    1746 (   0)    1948 (   3)
%%%                             1545 (   0)    1747 (   0)    1949 (   1)
%%%                             1547 (   0)    1749 (   0)    1951 (   1)
%%%                             1548 (   0)    1750 (   0)    1952 (   2)
%%%                             1549 (   0)    1751 (   0)    1953 (   1)
%%%                             1550 (   0)    1752 (   0)    1954 (   1)
%%%                             1551 (   0)    1753 (   0)    1955 (   5)
%%%                             1552 (   0)    1754 (   0)    1956 (   4)
%%%                             1553 (   0)    1755 (   0)    1957 (   3)
%%%                             1554 (   0)    1756 (   0)    1958 (   2)
%%%                             1555 (   0)    1757 (   0)    1959 (   1)
%%%                             1556 (   0)    1758 (   0)    1960 (   6)
%%%                             1557 (   0)    1759 (   0)    1961 (   5)
%%%                             1559 (   0)    1761 (   0)    1963 (   4)
%%%                             1560 (   0)    1762 (   0)    1964 (   1)
%%%                             1561 (   0)    1763 (   0)    1965 (   1)
%%%                             1562 (   0)    1764 (   0)    1966 (   3)
%%%                             1563 (   0)    1765 (   0)    1967 (   9)
%%%                             1564 (   0)    1766 (   0)    1968 (   6)
%%%                             1565 (   0)    1767 (   0)    1969 (   7)
%%%                             1566 (   0)    1768 (   0)    1970 (   9)
%%%                             1567 (   0)    1769 (   0)    1971 (   7)
%%%                             1568 (   0)    1770 (   0)    1972 (   6)
%%%                             1569 (   0)    1771 (   0)    1973 (  11)
%%%                             1570 (   0)    1772 (   0)    1974 (  20)
%%%                             1571 (   0)    1773 (   0)    1975 (  24)
%%%                             1572 (   0)    1774 (   0)    1976 (  33)
%%%                             1573 (   0)    1775 (   0)    1977 (  22)
%%%                             1574 (   0)    1776 (   0)    1978 (  34)
%%%                             1575 (   0)    1777 (   0)    1979 (  57)
%%%                             1576 (   0)    1778 (   0)    1980 (  38)
%%%                             1577 (   0)    1779 (   0)    1981 (  51)
%%%                             1578 (   0)    1780 (   0)    1982 (  71)
%%%                             1579 (   0)    1781 (   0)    1983 (  74)
%%%                             1580 (   0)    1782 (   0)    1984 (  66)
%%%                             1581 (   0)    1783 (   0)    1985 ( 119)
%%%                             1582 (   0)    1784 (   0)    1986 (  79)
%%%                             1583 (   0)    1785 (   0)    1987 ( 100)
%%%                             1584 (   0)    1786 (   0)    1988 ( 139)
%%%                             1585 (   0)    1787 (   0)    1989 ( 108)
%%%                             1586 (   0)    1788 (   0)    1990 (   1)
%%%                             1587 (   0)    1789 (   0)    1991 (   1)
%%%                             1588 (   0)    1790 (   0)    1992 (   1)
%%%                             1589 (   0)    1791 (   0)    1993 (   2)
%%%                             1592 (   0)    1794 (   0)    1996 (   1)
%%%                             1593 (   0)    1795 (   0)    1997 (   2)
%%%                             1594 (   0)    1796 (   0)    1998 (   3)
%%%                             1595 (   0)    1797 (   0)    1999 (   3)
%%%                             1596 (   0)    1798 (   0)    2000 (   1)
%%%                             1597 (   0)    1799 (   0)    2001 (   1)
%%%                             1598 (   0)    1800 (   0)    2002 (   1)
%%%                             1605 (   0)    1807 (   0)    2009 (   1)
%%%                             19xx (   2)
%%%
%%%                             Article:        561
%%%                             Book:           306
%%%                             Booklet:          1
%%%                             InCollection:    31
%%%                             InProceedings:  142
%%%                             Manual:          19
%%%                             MastersThesis:   39
%%%                             Misc:            16
%%%                             Periodical:       3
%%%                             PhdThesis:       11
%%%                             Proceedings:     62
%%%                             TechReport:      66
%%%                             Unpublished:      3
%%%
%%%                             Total entries: 1260
%%%
%%%                        There is a hypertext bibliography of
%%%                        classical cryptography at
%%%
%%%                            http://ourworld.compuserve.com/homepages/crypto/BIB1XX.HTM
%%%
%%%                        CIPHER, the Electronic Newsletter of the
%%%                        Technical Committee on Security and Privacy,
%%%                        A Technical Committee of the Computer Society
%%%                        of the IEEE, is available on the World-Wide
%%%                        Web at
%%%
%%%                            http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher
%%%
%%%                        with pointers to all back issues (1994--1998).
%%%
%%%                        ``CRYPTO-GRAM is a free monthly newsletter
%%%                        providing summaries, analyses, insights, and
%%%                        commentaries on cryptography and computer
%%%                        security.  To subscribe, visit
%%%
%%%                            http://www.counterpane.com/crypto-gram.html
%%%
%%%                        or send a blank message to
%%%
%%%                            crypto-gram-subscribe at chaparraltree.com
%%%
%%%                        Back issues are available on
%%%
%%%                            http://www.counterpane.com''
%%%
%%%                        CRYPTO-GRAM is a good source of news of
%%%                        recent developments in the field, and
%%%                        contains many interesting essays on aspects
%%%                        of cryptography.
%%%
%%%                        There is a Web site on steganography at
%%%
%%%                            http://www.cl.cam.ac.uk/~fapp2/steganography/
%%%
%%%                        In this bibliography, entries are sorted
%%%                        first by ascending year, and within each
%%%                        year, alphabetically by author or editor,
%%%                        and then, if necessary, by the 3-letter
%%%                        abbreviation at the end of the BibTeX
%%%                        citation tag, using the bibsort -byyear
%%%                        utility.  Year order has been chosen to
%%%                        make it easier to identify the most recent
%%%                        work.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"
  # "\ifx \undefined \cprime \def \cprime {$\mathsurround=0pt '$}\fi"
  # "\ifx \undefined \Dbar \def \Dbar {\leavevmode\raise0.2ex\hbox{--}\kern-0.5emD} \fi"
  # "\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi"
  # "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi"
  # "\ifx \undefined \operatorname \def \operatorname #1{{\rm #1}}\fi"
  # "\hyphenation{
        Aba-di
        Arch-ives
        Ding-yi
        for-ge-ry
        Go-pa-la-krish-nan
        Hi-de-ki
        Kraw-czyk
        Lands-verk
        Law-rence
        Leigh-ton
        Mich-ael
        Moell-er
        North-ridge
        para-digm
        para-digms
        Piep-rzyk
        Piv-e-teau
        Ram-kilde
        Re-tro-fit-ting
        Rich-ard
        Sho-stak
        Si-ro-mo-n-ey
        Ste-ph-en
        The-o-dore
        Tho-m-as
        Tzone-lih
        venge-ance
        Will-iam
        Ye-sh-i-va
    }"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-bs =   "Bruce Schneier,
                    Counterpane Systems,
                    101 East Minnehaha Parkway,
                    Minneapolis, MN 55419,
                    e-mail: \path|schneier@counterpane.com"}

@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

@String{ack-pb =     "Preston Briggs,
                     Tera Computer Company,
                     2815 Eastlake East,
                     Seattle, WA 98102,
                     USA,
                     Tel: +1 206 325-0800,
                     e-mail: \path|preston@tera.com|"}

%%% ====================================================================
%%% Institution abbreviations:
@String{inst-COUNTERPANE-INTERNET-SECURITY = "Counterpane Internet Security"}

@String{inst-COUNTERPANE-INTERNET-SECURITY:adr = "3031 Tisch Way, Suite 100PE,
                                  San Jose, CA 95128, USA"}

@String{inst-COUNTERPANE-LABS = "Counterpane Systems"}

@String{inst-COUNTERPANE-LABS:adr = "101 East Minnehaha Parkway, Minneapolis,
                                   MN 55419"}

@String{inst-COUNTERPANE-SYSTEMS = "Counterpane Systems"}

@String{inst-COUNTERPANE-SYSTEMS:adr = "101 East Minnehaha Parkway, Minneapolis,
                                   MN 55419"}

%% Old address:
%% String{inst-COUNTERPANE-SYSTEMS:adr = "Oak Park, IL, USA"}
@String{inst-CSU                = "Colorado State University"}

@String{inst-CSU:adr            = "Fort Collins, CO, USA"}

@String{inst-IBM-WATSON         = "IBM T. J. Watson Research Center"}

@String{inst-IBM-WATSON:adr     = "Yorktown Heights, NY, USA"}

@String{inst-KENT-STATE-UNIV    = "Kent State University"}

@String{inst-KENT-STATE-UNIV:adr = "Kent, OH, USA"}

@String{inst-MIT-CS             = "Massachusetts Institute of Technology,
                                  Computer Science Lab."}

@String{inst-MIT:adr            = "Cambridge, Massachusetts"}

@String{inst-NORTHWESTERN-UNIVERSITY = "Northwestern University"}

@String{inst-NORTHWESTERN-UNIVERSITY:adr = "Evanston, IL, USA"}

@String{inst-SRC-IDA            = "Supercomputing Research Center: IDA"}

@String{inst-SRC-IDA:adr        = "Lanham, MD, USA"}

@String{inst-UC-BERKELEY-ICSI   = "International Computer Science Institute"}

@String{inst-UC-BERKELEY-ICSI:adr = "Berkeley, CA, USA"}

@String{inst-UIUC-CSRD          = "University of Illinois at Urbana-Champaign,
                                  Center for Supercomputing Research and
                                  Development"}

@String{inst-UIUC-CSRD:adr      = "Urbana, IL 61801, USA"}

@String{inst-UTK                = "University of Tennessee, Knoxville"}

@String{inst-UTK:adr            = "Knoxville, TN 37996, USA"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-ADV-ENG-SOFTWARE      = "Advances in Engineering Software"}

@String{j-ADV-IMAGING           = "Advanced Imaging"}

@String{j-ALGORITHMICA          = "Algorithmica"}

@String{j-AM-DOC                = "American Documentation"}

@String{j-AMBIX                 = "Ambix: Journal of the Society for the History
                                  of Alchemy and Chemistry"}

@String{j-AMER-MATH-MONTHLY     = "American Mathematical Monthly"}

@String{j-AMER-STAT             = "The American Statistician"}

@String{j-ANN-BIOMED-ENG        = "Annals of biomedical engineering"}

@String{j-ANN-HIST-COMPUT       = "Annals of the History of Computing"}

@String{j-ANN-MATH              = "Annals of Mathematics"}

@String{j-ANNALS-MATH-STAT      = "Ann. Math. Stat."}

@String{j-APPL-ALGEBRA-ENG-COMMUN-COMPUT = "Applicable algebra in engineering,
                                  communication and computing"}

@String{j-APPL-MATH-COMP        = "Applied Mathematics and Computation"}

@String{j-APPL-MATH-LETT        = "Applied Mathematics Letters"}

@String{j-APPL-NUM-MATH         = "Applied Numerical Mathematics: Transactions
                                  of IMACS"}

@String{j-APPL-STAT             = "Applied Statistics"}

@String{j-ATT-BELL-LAB-TECH-J   = "ATT Bell Lab. tech. j"}

@String{j-ATT-TECH-J            = "AT\&T Technical Journal"}

@String{j-BANK-SYST-TECHNOL     = "Bank systems + technology"}

@String{j-BELL-SYST-TECH-J      = "The Bell System Technical Journal"}

@String{j-BIT                   = "BIT"}

@String{j-BT-TECH-J             = "BT Technology Journal"}

@String{j-BULL-AUSTRAL-MATH-SOC = "Bulletin of the Australian Mathematical
                                  Society"}

@String{j-BYTE                  = "BYTE Magazine"}

@String{j-C-PLUS-PLUS-REPORT    = "C++ Report"}

@String{j-CACM                  = "Communications of the Association for
                                  Computing Machinery"}

@String{j-CCCUJ                 = "C/C++ Users Journal"}

@String{j-CG-WORLD              = "Computer Graphics World"}

@String{j-CGF                   = "Com{\-}pu{\-}ter Graphics Forum"}

@String{j-CGIP                  = "Computer Graphics and Image Processing"}

@String{j-CHIN-J-COMPUTERS      = "Chinese Journal of Computers = Chi suan chi
                                  hsueh pao"}

@String{j-CISCO-WORLD           = "Cisco World: The Independent Journal for
                                  Internetworking Professionals"}

@String{j-COLLEGE-MATH-J        = "College Mathematics Journal"}

@String{j-COMP-ARCH-NEWS        = "ACM SIGARCH Computer Architecture News"}

@String{j-COMP-COMM-REV         = "Computer Communications Review, ACM
                                  SIGCOMM"}

@String{j-COMP-GRAPHICS         = "Computer Graphics"}

@String{j-COMP-J                = "The Computer Journal"}

@String{j-COMP-LANG-MAG         = "Computer Language Magazine"}

@String{j-COMP-LANGS            = "Computer Languages"}

@String{j-COMP-LAW-SECURITY-REP = "The Computer Law and Security Report"}

@String{j-COMP-NET              = "Computer Networks: The International Journal
                                   of Distributed Informatique"}

@String{j-COMP-NET-AMSTERDAM    = "Computer Networks (Amsterdam, Netherlands:
                                  1999)"}

@String{j-COMP-NET-ISDN         = "Computer Networks and ISDN Systems"}

@String{j-COMP-PHYSICS          = "Computers in physics"}

@String{j-COMP-STRUCTURES       = "Computers and Structures"}

@String{j-COMP-SURV             = "ACM Computing Surveys"}

@String{j-COMP-SYS              = "Computing Systems"}

@String{j-COMPLEX-SYSTEMS       = "Complex Systems"}

@String{j-COMPUT-COMPLEX        = "Computational complexity"}

@String{j-COMPUT-MATH-APPL      = "Computers and Mathematics with Applications"}

@String{j-COMPUT-METH-PROG-BIOMED = "Computer Methods and Programs in
                                  Biomedicine"}

@String{j-COMPUT-PHYS           = "Computers in Physics"}

@String{j-COMPUT-SECUR          = "Computers and Security"}

@String{j-COMPUT-SECUR-J        = "Computer Security Journal"}

@String{j-COMPUT-SYST-ENG       = "Computing systems in engineering: an
                                  international journal"}

@String{j-COMPUT-SYST-SCI-ENG   = "Computer Systems Science and Engineering"}

@String{j-COMPUTER              = "Computer"}

@String{j-COMPUTERS-AND-GRAPHICS = "Computers and Graphics"}

@String{j-COMPUTERWORLD         = "Computerworld"}

@String{j-COMPUTING             = "Computing"}
%%%
@String{j-CONG-NUM              = "Congressus Numerantium"}

@String{j-CONN-LAW-REVIEW       = "Connecticut Law Review"}

@String{j-CRYPTOBYTES           = "CryptoBytes"}

@String{j-CRYPTOLOG             = "Cryptolog"}

@String{j-CRYPTOLOGIA           = "Cryptologia"}

@String{j-CUJ                   = "C Users Journal"}

@String{j-CVGIP                 = "Computer Vision, Graphics, and Image
                                  Processing"}

@String{j-CVGIP-GMIP            = "Computer Vision, Graphics, and Image
                                  Processing. Graphical Models and Image
                                  Processing"}

@String{j-DATAMATION            = "Datamation"}

@String{j-DDDU                  = "Dr. Dobb's Developer Update"}

@String{j-DDJ                   = "Dr. Dobb's Journal of Software Tools"}

@String{j-DEC-TECH-J            = "Digital Technical Journal of Digital
                                  Equipment Corporation"}

@String{j-DESIGN-NEWS           = "Design news"}

@String{j-DESIGNS-CODES-CRYPTOGR = "Designs, Codes, and Cryptography"}

@String{j-DIALECTICA            = "Dialectica: International Review of
                                  Philosophy of Knowledge"}

@String{j-DISCRETE-APPL-MATH    = "Discrete Applied Mathematics"}

@String{j-DISCRETE-MATH-APPL    = "Discrete Mathematics and Applications"}

@String{j-ELECT-COMM-JAPAN-3-FUND-ELECT-SCI = "Electronics and communications
                                  in Japan. Part 3, Fundamental electronic
                                  science"}

@String{j-ELECT-LETTERS         = "Electronics Letters"}

@String{j-ELECTRONIC-DESIGN     = "Electronic Design"}

@String{j-ELECTRONICS           = "Electronics"}

@String{j-EMBED-SYS-PROG        = "Embedded Systems Programming"}

@String{j-ENG-FRACTURE-MECH     = "Engineering fracture mechanics"}

@String{j-EPODD                 = "Electronic
                                  Pub\-lish\-ing\emdash{}Orig\-i\-na\-tion,
                                  Dissemination, and Design"}

@String{j-ETT                   = "European Transactions on
                                  Telecommunications: ETT"}

@String{j-EUR-J-OPER-RES        = "European Journal of Operational Research"}

@String{j-EUR-TRANS-TELECOMM    = "European transactions on telecommunications
                                  and related technologies"}

@String{j-EUUG-NEWSLETTER       = "EUUG Newsletter"}

@String{j-FED-REGIST            = "Federal Register"}

@String{j-FINANC-TECH-INT-BULL  = "Financial Technology International
                                  Bulletin"}

@String{j-FUT-GEN-COMP-SYS      = "Future Generation Computer Systems"}

@String{j-GRAPH-MODELS-IMAGE-PROC = "Graphical models and image processing:
                                  GMIP"}

@String{j-HEWLETT-PACKARD-J     = "Hew\-lett-Pack\-ard Journal: technical
                                  information from the laboratories of
                                  Hew\-lett-Pack\-ard Company"}

@String{j-HIST-MATH             = "Historia Mathematica"}

@String{j-HONEYWELL-COMP-J      = "Honeywell Computer Journal"}

@String{j-IBM-JRD               = "IBM Journal of Research and Development"}

@String{j-IBM-SYS-J             = "IBM Systems Journal"}

@String{j-IEE-CONF-PUBL         = "IEE conference publication"}

@String{j-IEE-PROC-VIS-IMAGE-SIGNAL-PROCESS = "IEE proceedings. Vision, image,
                                  and signal processing"}

@String{j-IEEE-ANN-HIST-COMPUT  = "IEEE Annals of the History of Computing"}

@String{j-IEEE-ASSP             = "IEEE Trans. ASSP"}

@String{j-IEEE-CGA              = "IEEE Computer Graphics and Applications"}

@String{j-IEEE-COMM-MAG         = "IEEE Communications Magazine"}

@String{j-IEEE-J-SEL-AREAS-COMMUN = "IEEE Journal on Selected Areas in
                                  Communications"}

@String{j-IEEE-MICRO            = "IEEE Micro"}

@String{j-IEEE-MULTIMEDIA       = "IEEE MultiMedia"}

@String{j-IEEE-PAR-DIST-TECH    = "IEEE parallel and distributed technology:
                                  systems and applications"}

@String{j-IEEE-SOFTWARE         = "IEEE Software"}

@String{j-IEEE-SPECTRUM         = "IEEE Spectrum"}

@String{j-IEEE-TRANS-COMM       = "IEEE Transactions on Communications"}

@String{j-IEEE-TRANS-COMPUT     = "IEEE Transactions on Computers"}

@String{j-IEEE-TRANS-CONSUMER-ELECTRONICS = "IEEE Transactions on Consumer
                                  Electronics"}

@String{j-IEEE-TRANS-IMAGE-PROCESS = "IEEE Transactions on Image Processing"}

@String{j-IEEE-TRANS-INF-THEORY = "IEEE Transactions on Information Theory"}

@String{j-IEEE-TRANS-NETWORKING = "IEEE\slash ACM Transactions on Networking"}

@String{j-IEEE-TRANS-PAR-DIST-SYS = "IEEE Transactions on Parallel and
                                  Distributed Systems"}

@String{j-IEEE-TRANS-PATT-ANAL-MACH-INTEL = "IEEE Transactions on Pattern
                                  Analysis and Machine Intelligence"}

@String{j-IEEE-TRANS-PROF-COMM  = "IEEE Transactions on Professional
                                  Communication"}

@String{j-IEEE-TRANS-SOFTW-ENG  = "IEEE Transactions on Software Engineering"}

@String{j-IEICE-TRANS-FUND-ELECT = "IEICE Transactions on Fundamentals of
                                  Electronics Communications and Computer
                                  Sciences"}

@String{j-IJQC                  = "International Journal of Quantum Chemistry"}

@String{j-IJSAHPC               = "The International Journal of Supercomputer
                                  Applications and High Performance Computing"}

@String{j-IMAGE-VIS-COMPUT      = "Image and Vision Computing"}

@String{j-INF-COMM-TECH-LAW     = "Information \& Communications Technology
                                  Law"}

@String{j-INF-COMPUT            = "Information and Computation"}

@String{j-INF-CONTROL           = "Information and Control"}

@String{j-INF-SOC               = "The Information Society"}

@String{j-INFO-PROC-LETT        = "Information Processing Letters"}

@String{j-INFO-PROC-MAN         = "Information Processing and Management"}

@String{j-INFORMATIK-SPEKTRUM   = "Informatik Spektrum"}

@String{j-INFORMATION-WEEK      = "Information Week"}

@String{j-INFOWORLD             = "InfoWorld"}

@String{j-INT-J-BIFURC-CHAOS-APPL-SCI-ENG = "International journal of
                                  bifurcation and chaos in applied sciences and
                                  engineering"}

@String{j-INT-J-COMPUT-INF-SCI  = "International Journal of Computer and
                                  Information Sciences"}

@String{j-INT-J-COMPUT-MATH     = "International Journal of Computer
                                  Mathematics"}

@String{j-INT-J-COMPUT-SYST-SCI-ENG = "International Journal of Computer
                                  Systems Science and Engineering"}

@String{j-INT-J-ELECTRON        = "International Journal of Electronics
                                  Theoretical \& Experimental"}

@String{j-INT-J-SYST-SCI        = "International Journal of Systems Science"}

@String{j-INT-J-THEOR-PHYS      = "International Journal of Theoretical
                                  Physics"}

@String{j-INTELL-NATL-SECUR     = "Intelligence and National Security"}

@String{j-ISIS                  = "Isis"}

@String{j-J-ACM                 = "Journal of the Association for Computing
                                  Machinery"}

@String{j-J-ALG                 = "Journal of Algorithms"}

@String{j-J-COMP-SCI-TECH       = "Journal of computer science and technology"}

@String{j-J-COMP-SECUR          = "Journal of Computer Security"}

@String{j-J-COMP-SYS-SCI        = "Journal of Computer and System Sciences"}

@String{j-J-CRYPTOLOGY          = "Journal of Cryptology"}

@String{j-J-DOC                 = "Journal of Documentation"}

@String{j-J-ELECTRON-IMAGING    = "Journal of Electronic Imaging"}

@String{j-J-ENG-MECH            = "Journal of Engineering Mechanics"}

@String{j-J-MATH-PHYS           = "Journal of Mathematical Physics"}

@String{j-J-PAR-DIST-COMP       = "Journal of Parallel and Distributed
                                  Computing"}

@String{j-J-PHYS-E              = "Journal of Physics. E: Scientific
                                  Instruments"}

@String{j-J-RES-NATL-INST-STAND-TECHNOL = "Journal of research of the National
                                  Institute of Standards and Technology"}

@String{j-J-SCI-IND-RES         = "Journal of Scientific and Industrial
                                  Research"}

@String{j-J-SIAM                = "Journal of the Society for Industrial and
                                  Applied Mathematics"}

@String{j-J-SUPERCOMPUTING      = "The Journal of Supercomputing"}

@String{j-J-SYMBOLIC-COMP       = "Journal of Symbolic Computation"}

@String{j-J-SYST-SOFTW          = "The Journal of Systems and Software"}

@String{j-J-UCS                 = "J.UCS: Journal of Universal Computer
                                  Science"}

@String{j-J-VIS-COMP-ANIMATION  = "The Journal of Visualization and Computer
                                  Animation"}

@String{j-JAVAWORLD             = "JavaWorld: IDG's magazine for the Java
                                  community"}

@String{j-LECT-NOTES-COMP-SCI   = "Lecture Notes in Computer Science"}

@String{j-LINEAR-ALGEBRA-APPL   = "Linear Algebra and its Applications"}

@String{j-LINUX-J               = "Linux Journal"}

@String{j-LMS-J-COMPUT-MATH     = "LMS Journal of Computation and Mathematics"}

@String{j-LOGIN                 = ";login: the USENIX Association newsletter"}

@String{j-MACUSER               = "MacUser"}

@String{j-MATH-COMP-EDU         = "Mathematics and computer education"}

@String{j-MATH-COMP-MODELLING   = "Mathematical and computer modelling"}

@String{j-MATH-COMPUT           = "Mathematics of Computation"}

@String{j-MATH-GAZ              = "The Mathematical Gazette"}

@String{j-MATH-MAG              = "Mathematics Magazine"}

@String{j-MATH-SEMESTERBER      = "Mathematische Semesterberichte"}

@String{j-MATH-SLOVACA          = "Mathematica Slovaca"}

@String{j-MATHEMATICA-J         = "Mathematica Journal"}

@String{j-MATHEMATIKA           = "Mathematika"}

@String{j-MICROELECT-RELIABILITY = "Microelectronics and Reliability"}

@String{j-N-I-A-CR              = "Newsletter of the International Association
                                  for Cryptologic Research"}

@String{j-NAMS                  = "Notices of the American Mathematical
                                  Society"}

@String{j-NORDIC-J-COMPUT       = "Nordic Journal of Computing"}

@String{j-NTT-R-D               = "NTT R\&D"}

@String{j-NUM-LIN-ALG-APPL      = "Numerical linear algebra with applications"}

@String{j-NUM-MATH              = "Numerische Mathematik"}

@String{j-NUMER-ALGORITHMS      = "Numerical Algorithms"}

@String{j-NY-TIMES              = "New York Times"}

@String{j-OBZORNIK-MAT-FIZ      = "Dru{\\v{s}}tvo Matematikov, Fizikov in
                                  Astronomov SRS. Obzornik za Matematiko in
                                  Fiziko"}

@String{j-OPEN-COMPUTING        = "Open Computing"}

@String{j-OPEN-SYSTEMS-TODAY    = "Open Systems Today"}

@String{j-OPER-SYS-REV          = "Operating Systems Review"}

@String{j-PARALLEL-ALGORITHMS-APPL = "Parallel Algorithms and Applications"}

@String{j-PARALLEL-COMPUTING    = "Parallel Computing"}

@String{j-PARALLEL-PROCESS-LETT = "Parallel Processing Letters"}

@String{j-PC-TECH               = "PC Techniques"}

@String{j-PERFORM-COMPUT        = "Performance Computing"}

@String{j-PHILIPS-J-RES         = "Philips Journal of Research"}

@String{j-PROC-ICASSP           = "Proceedings of the International Conference
                                  on Acoustics, Speech, and Signal Processing"}

@String{j-PROC-CAMBRIDGE-PHIL-SOC = "Proceedings of the Cambridge Philosophical
                                  Society. Mathematical and physical sciences"}

@String{j-PROC-IEEE             = "Proceedings of the IEEE"}

@String{j-PROC-SPIE             = "Proceedings of the SPIE --- The
                                  International Society for Optical
                                  Engineering"}

@String{j-SCI-AMER              = "Scientific American"}

@String{j-SCI-AMER-INT-ED       = "Scientific American [International
                                  Edition]"}

@String{j-SCI-COMPUT-PROGRAM    = "Science of Computer Programming"}

@String{j-SCIENCE               = "Science"}

@String{j-SCIENCE-NEWS          = "Science News (Washington, DC)"}

@String{j-SIAM-J-ALG-DISC-METH  = "SIAM Journal on Algebraic and Discrete
                                  Methods"}

@String{j-SIAM-J-APPL-MATH      = "SIAM Journal on Applied Mathematics"}

@String{j-SIAM-J-COMPUT         = "SIAM Journal on Computing"}

@String{j-SIAM-J-DISCR-MATH     = "SIAM Journal on Discrete Mathematics"}

@String{j-SIAM-J-MAT-ANA-APPL   = "SIAM Journal on Matrix Analysis and
                                  Applications"}

@String{j-SIAM-J-NUMER-ANAL     = "SIAM Journal on Numerical Analysis"}

@String{j-SIAM-J-SCI-STAT-COMP  = "SIAM Journal on Scientific and Statistical
                                  Computing"}

@String{j-SIAM-REVIEW           = "SIAM Review"}

@String{j-SIG-PROC              = "Signal Processing"}

@String{j-SIGACT                = "ACM SIGACT News"}

@String{j-SIGADA-LETTERS        = "ACM SIGADA Ada Letters"}

@String{j-SIGCSE                = "SIGCSE Bulletin (ACM Special Interest Group
                                  on Computer Science Education)"}

@String{j-SIGMETRICS            = "ACM SIGMETRICS Performance Evaluation
                                  Review"}

@String{j-SIGMOD                = "SIGMOD Record (ACM Special Interest Group
                                  on Management of Data)"}

@String{j-SIGNUM                = "ACM SIGNUM Newsletter"}

@String{j-SIGPLAN               = "ACM SIG{\-}PLAN Notices"}

@String{j-SIGSAM                = "SIGSAM Bulletin (ACM Special Interest Group
                                  on Symbolic and Algebraic Manipulation)"}

@String{j-SIGSOFT               = "ACM SIGSOFT Software Engineering Notes"}

@String{j-SMITHSONIAN           = "Smithsonian"}

@String{j-SOUTHCON              = "Southcon Conference Record"}

@String{j-SPE                   = "Soft\-ware\emdash Prac\-tice and
                                  Experience"}

@String{j-SUNSERVER             = "SunServer"}

@String{j-SUPER-REV             = "Supercomputing Review"}

@String{j-SUPERCOMPUTER         = "Supercomputer"}

@String{j-SUPERCOMPUTING-REVIEW = "Supercomputing Review"}

@String{j-SYS-ADMIN             = "Sys Admin: The Journal for UNIX Systems
                                  Administrators"}

@String{j-SYS-COMP-JAPAN        = "Systems and computers in Japan"}

@String{j-TECH-COMMUN           = "Technical Communication"}

@String{j-TECH-CULTURE          = "Technology and Culture"}

@String{j-TELECOMMUNICATIONS-AMERICAS-ED = "Telecommunications (Americas Edition)"}

@String{j-THEOR-COMP-SCI        = "Theoretical Computer Science"}

@String{j-TOCS                  = "ACM Transactions on Computer Systems"}

@String{j-TODS                  = "ACM Transactions on Database Systems"}

@String{j-TOIS                  = "ACM Transactions on Information Systems"}

@String{j-TOMS                  = "ACM Transactions on Mathematical Software"}

@String{j-TOOIS                 = "ACM Transactions on Office Information
                                   Systems"}

@String{j-TOPLAS                = "ACM Transactions on Programming Languages
                                  and Systems"}

@String{j-TRANS-AM-NUCL-SOC     = "Transactions of the American Nuclear
                                  Society"}

@String{j-UNIX-DEVELOPER        = "UNIX Developer"}

@String{j-UNIX-WORLD            = "UNIX/world"}

@String{j-VISIBLE-LANGUAGE      = "Visible Language"}

@String{j-WEBSERVER             = "WebServer Magazine: For Managers of World
                                  Wide Web Sites"}

@String{j-WORD-WAYS             = "Word Ways"}

@String{j-X-RESOURCE            = "{The X Resource}"}

%%% ====================================================================
%%% Organization abbreviations:
@String{org-GENERAL-ELECTRIC    = "General Electric"}

@String{org-GENERAL-ELECTRIC:adr = "Schenectady, NY, USA"}

%%% ====================================================================
%%% Publisher abbreviations:
@String{pub-A-K-PETERS          = "A. K. Peters, Ltd."}
@String{pub-A-K-PETERS:adr      = "Wellesley, MA, USA"}

@String{pub-ACADEMIC            = "Academic Press"}
@String{pub-ACADEMIC:adr        = "New York, NY, USA"}

@String{pub-ACM                 = "ACM Press"}
@String{pub-ACM:adr             = "New York, NY 10036, USA"}

@String{pub-AEGEAN-PARK         = "Aegean Park Press"}
@String{pub-AEGEAN-PARK:adr     = "Laguna Hills, CA, USA"}

@String{pub-AFIPS               = "AFIPS Press"}
@String{pub-AFIPS:adr           = "Montvale, NJ, USA"}

@String{pub-AMS                 = "American Mathematical Society"}
@String{pub-AMS:adr             = "Providence, RI, USA"}

@String{pub-ANSI                = "American National Standards Institute"}
@String{pub-ANSI:adr            = "1430 Broadway, New York, NY 10018, USA"}

@String{pub-AP-PROFESSIONAL     = "AP Professional"}
@String{pub-AP-PROFESSIONAL:adr = "Boston, MA, USA"}

@String{pub-ARTECH              = "Artech House Inc."}
@String{pub-ARTECH:adr          = "Norwood, MA, USA"}

@String{pub-AW                  = "Ad{\-d}i{\-s}on-Wes{\-l}ey"}
@String{pub-AW:adr              = "Reading, MA, USA"}

@String{pub-BIRKHAUSER          = "Birkh{\"a}user Verlag"}
@String{pub-BIRKHAUSER:adr      = "Basel, Switzerland"}

@String{pub-BLACKWELL-SCI       = "Blackwell Scientific Publications"}
@String{pub-BLACKWELL-SCI:adr   = "Oxford, UK"}

@String{pub-CAMBRIDGE           = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr       = "Cambridge, UK"}

@String{pub-CHAPMAN-HALL        = "Chapman and Hall, Ltd."}
@String{pub-CHAPMAN-HALL:adr    = "London, UK"}

@String{pub-CLARENDON           = "Clarendon Press"}
@String{pub-CLARENDON:adr       = "Oxford, UK"}

@String{pub-CRC                 = "CRC Press"}
@String{pub-CRC:adr             = "2000 N.W. Corporate Blvd., Boca Raton,
                                  FL 33431-9868, USA"}

@String{pub-CUP                 = "Cambridge University Press"}
@String{pub-CUP:adr             = "New York, NY, USA"}

@String{pub-DEKKER              = "Marcel Dekker, Inc."}
@String{pub-DEKKER:adr          = "New York, NY, USA"}

@String{pub-DOUBLEDAY           = "Doubleday"}
@String{pub-DOUBLEDAY:adr       = "New York, NY, USA"}

@String{pub-DOVER               = "Dover Publications, Inc."}
@String{pub-DOVER:adr           = "New York, NY, USA"}

@String{pub-ELSEVIER            = "Elsevier"}
@String{pub-ELSEVIER:adr        = "Amsterdam, The Netherlands"}

@String{pub-ESP                 = "Elsevier Science Publishers"}
@String{pub-ESP:adr             = "Amsterdam, The Netherlands"}

@String{pub-FREEMAN             = "W.H. Freeman"}
@String{pub-FREEMAN:adr         = "San Francisco, CA, USA and New York, NY,
                                  USA"}

@String{pub-GAUTHIER-VILLARS    = "Gauthier-Villars"}
@String{pub-GAUTHIER-VILLARS:adr = "Paris, France"}

@String{pub-GORDON-BREACH       = "Gordon and Breach"}
@String{pub-GORDON-BREACH:adr   = "Langhorne, PA, USA"}

@String{pub-HARCOURT-BRACE-JOVANOVICH = "Harcourt, Brace, Jovanovich"}
@String{pub-HARCOURT-BRACE-JOVANOVICH:adr = "San Diego, CA, USA"}

@String{pub-HARPER-ROW          = "Harper \& Row"}
@String{pub-HARPER-ROW:adr      = "New York, NY, USA"}

@String{pub-HARTUNG-GORRE       = "Hartung-Gorre Verlag"}
@String{pub-HARTUNG-GORRE:adr   = "Konstanz, Switzerland"}

@String{pub-HAYDEN-BOOK         = "Hayden Book Co."}
@String{pub-HAYDEN-BOOK:adr     = "Rochelle Park, NJ, USA"}

@String{pub-HOLDEN-DAY          = "Holden-Day"}
@String{pub-HOLDEN-DAY:adr      = "San Francisco, CA, USA"}

@String{pub-HOUGHTON-MIFFLIN    = "Houghton-Mifflin"}
@String{pub-HOUGHTON-MIFFLIN:adr = "Boston, MA, USA"}

@String{pub-IBM                 = "IBM Corporation"}
@String{pub-IBM:adr             = "San Jose, CA, USA"}

@String{pub-IEE                 = "IEE"}
@String{pub-IEE:adr             = "London, UK"}

@String{pub-IEEE                = "IEEE Computer Society Press"}
@String{pub-IEEE:adr            = "1109 Spring Street, Suite 300, Silver
                                  Spring, MD 20910, USA"}

@String{pub-IMA                 = "Institute of Mathematics and its
                                  Applications"}
@String{pub-IMA:adr             = "Southend-on-Sea, UK"}

@String{pub-IOS                 = "IOS Press"}
@String{pub-IOS:adr             = "Postal Drawer 10558, Burke, VA 2209-0558,
                                  USA"}

@String{pub-ISO                 = "International Organization for
                                  Standardization"}
@String{pub-ISO:adr             = "Geneva, Switzerland"}

@String{pub-JOHNS-HOPKINS       = "The Johns Hopkins University Press"}
@String{pub-JOHNS-HOPKINS:adr   = "Baltimore, MD, USA"}

@String{pub-JW                  = "John Wiley"}
@String{pub-JW:adr              = "New York, NY, USA"}

@String{pub-KAP                 = "Kluwer Academic Publisher"}
@String{pub-KAP:adr             = "Norwell, MA, USA, and Dordrecht, The
                                  Netherlands"}

@String{pub-KLUWER              = "Kluwer Academic Publishers"}
@String{pub-KLUWER:adr          = "Dordrecht, The Netherlands"}

@String{pub-KNOPF               = "Alfred A. Knopf"}
@String{pub-KNOPF:adr           = "New York, NY, USA"}

@String{pub-MACMILLAN           = "MacMillan Publishing Company"}
@String{pub-MACMILLAN:adr       = "New York, NY, USA"}

@String{pub-MANNING             = "Manning Publications"}
@String{pub-MANNING:adr         = "Greenwich, CT, USA"}

@String{pub-MASSON              = "Masson Editeur"}
@String{pub-MASSON:adr          = "Masson, France"}

@String{pub-MATH-ASSOC-AMER     = "Mathematical Association of America"}
@String{pub-MATH-ASSOC-AMER:adr = "Washington, DC, USA"}

@String{pub-MCGRAW-HILL         = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr     = "New York, NY, USA"}

@String{pub-MILLER-FREEMAN      = "Miller Freeman Publications"}
@String{pub-MILLER-FREEMAN:adr  = "San Francisco, CA, USA"}

@String{pub-MINDQ               = "MindQ Publishing, Inc."}
@String{pub-MINDQ:adr           = "450 Springpark Place Ste. 1200, Herndon, VA
                                  20170, USA, Tel: +1 703 708-9380"}

@String{pub-MIT                 = "MIT Press"}
@String{pub-MIT:adr             = "Cambridge, MA, USA"}

@String{pub-NAP                 = "National Academy Press"}
@String{pub-NAP:adr             = "Washington, DC, USA"}

@String{pub-NAT-COMP-CENTRE     = "National Computing Centre"}
@String{pub-NAT-COMP-CENTRE:adr = "Manchester, UK"}

@String{pub-NBS                 = "U.S. National Bureau of Standards"}
@String{pub-NBS:adr             = "Gaithersburg, MD, USA"}

@String{pub-NIST                = "National Institute for Standards and
                                  Technology"}
@String{pub-NIST:adr            = "Gaithersburg, MD 20899-8900, USA"}

@String{pub-NORTH-HOLLAND       = "North-Hol{\-}land"}
@String{pub-NORTH-HOLLAND:adr   = "Amsterdam, The Netherlands"}

@String{pub-NORTON              = "W. W. Norton \& Co."}
@String{pub-NORTON:adr          = "New York, NY, USA"}

@String{pub-NTIS                = "National Technical Information Service"}
@String{pub-NTIS:adr            = "Washington, DC, USA"}

@String{pub-ORA                 = "O'Reilly \& {Associates, Inc.}"}
@String{pub-ORA:adr             = "103a Morris Street, Sebastopol, CA 95472,
                                  USA, Tel: +1 707 829 0515, and 90 Sherman
                                  Street, Cambridge, MA 02140, USA, Tel: +1
                                  617 354 5800"}

@String{pub-OXFORD              = "Oxford University Press"}
@String{pub-OXFORD:adr          = "Walton Street, Oxford OX2 6DP, UK"}

@String{pub-PEACHPIT            = "Peachpit Press, Inc."}
@String{pub-PEACHPIT:adr        = "1085 Keith Avenue, Berkeley, CA 94708, USA"}

@String{pub-PH                  = "Pren{\-}tice-Hall, Inc."}
@String{pub-PH:adr              = "Upper Saddle River, NJ 07458, USA"}

@String{pub-PHPTR               = "Pren{\-}tice-Hall PTR"}
@String{pub-PHPTR:adr           = "Upper Saddle River, NJ 07458, USA"}

@String{pub-PLENUM              = "Plenum Press"}
@String{pub-PLENUM:adr          = "New York, NY, USA; London, UK"}

@String{pub-PRINCETON          = "Princeton University Press"}
@String{pub-PRINCETON:adr      = "Princeton, NJ, USA"}

@String{pub-PROJECT-GUTENBERG   = "Project Gutenberg"}
@String{pub-PROJECT-GUTENBERG:adr = "P.O. Box 2782, Champaign, IL 61825-2782,
                                  USA"}

@String{pub-RANDOM              = "Random House"}
@String{pub-RANDOM:adr          = "New York, NY, USA"}

@String{pub-REIDEL              = "D. Reidel"}
@String{pub-REIDEL:adr          = "Dordrecht, Boston, Lancaster, Tokyo"}

@String{pub-RSA                 = "RSA Data Security, Inc."}
@String{pub-RSA:adr             = "Redwood City, CA, USA"}

@String{pub-SAMS                = "Howard W. Sams"}
@String{pub-SAMS:adr            = "Indianapolis, IN 46268, USA"}

@String{pub-SIAM                = "Society for Industrial and Applied
                                  Mathematics"}
@String{pub-SIAM:adr            = "Philadelphia, PA, USA"}

@String{pub-SIMON-SCHUSTER      = "Simon and Schuster"}
@String{pub-SIMON-SCHUSTER:adr  = "1230 Ave. of the Americas, New York, NY
                                  10020, USA"}

@String{pub-SPE                 = "Society of Petroleum Engineers"}
@String{pub-SPE:adr             = "Richardson, TX, USA"}

@String{pub-SPIE                = "Society of Photo-optical
                                  Instrumentation Engineers (SPIE)"}
@String{pub-SPIE:adr            = "Bellingham, WA, USA"}

@String{pub-SRI                 = "SRI International"}
@String{pub-SRI:adr             = "333 Ravenswood Avenue, Menlo Park, CA
                                  94025-3493, USA, Tel: +1 415 859 6387, FAX:
                                  +1 415 859-6028"}

@String{pub-STATSCI             = "StatSci, a Division of MathSoft, Inc."}
@String{pub-STATSCI:adr         = "Seattle, WA, USA"}

@String{pub-SUN                 = "Sun Microsystems"}
@String{pub-SUN:adr             = "2550 Garcia Avenue, Mountain View, CA
                                  94043, USA"}

@String{pub-SV                  = "Spring{\-}er-Ver{\-}lag"}
@String{pub-SV:adr              = "Berlin, Germany~/ Heidelberg, Germany~/
                                  London, UK~/ etc."}

@String{pub-USC-ISI             = "University of Southern California,
                                  Information Sciences Institute"}
@String{pub-USC-ISI:adr         = "Marina del Rey, CA, USA"}

@String{pub-USENIX              = "USENIX Association"}
@String{pub-USENIX:adr          = "Berkeley, CA, USA"}

@String{pub-USGPO               = "United States Government Printing Office"}
@String{pub-USGPO:adr           = "Washington, DC, USA"}

@String{pub-UTILITAS-MATH       = "Utilitas Mathematica Publishers"}
@String{pub-UTILITAS-MATH:adr   = "Winnipeg, Manitoba, Canada"}

@String{pub-VENTANA             = "Ventana Press"}
@String{pub-VENTANA:adr         = "Chapel Hill, NC, USA"}

@String{pub-WESTVIEW            = "Westview Press"}
@String{pub-WESTVIEW:adr        = "Boulder, CO, USA"}

@String{pub-WILEY               = "John Wiley and Sons, Inc."}
@String{pub-WILEY:adr           = "New York, NY, USA"}

@String{pub-WORLD-SCI           = "World Scientific Publishing Co."}
@String{pub-WORLD-SCI:adr       = "Singapore; Philadelphia, PA, USA; River
                                  Edge, NJ, USA"}

%%% ====================================================================
%%% Series abbreviations:
@String{ser-LNAI                = "Lecture Notes in Artificial Intelligence"}

@String{ser-LNCS                = "Lecture Notes in Computer Science"}

@String{ser-LNMATH              = "Lecture Notes in Mathematics"}

@String{ser-PROJECT-GUTENBERG   = "Project Gutenberg"}

@String{ser-SIGPLAN             = "ACM SIG{\-}PLAN Notices"}

%%% ====================================================================
%%% Bibliography entries, sorted by year, and then by citation label:
@Book{Simonetta:1404:LTC,
  author =       "Cicco Simonetta",
  title =        "{[Little} tract on cryptanalysis]",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1404",
  bibdate =      "Sun Dec 24 09:39:18 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cited in \cite[page 25]{Callimahos:1992:HC}. Elsewhere
                 in the journal (volume 12, number 5, May 1985, page
                 11), the year is given as 1471, the author as Sicco
                 Simonetta, and the title as \booktitle{Regulae ad
                 extrahendum litteras zifferatas sine exemplo. (Latin)
                 [Rules for extracting an enciphered text: an
                 example]}.",
}

@Book{Alberti:1470:TC,
  author =       "Leon Battista Alberti",
  title =        "Trattati in Cifra. ({Italian}) [{Treatises} in
                 ciphers]",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1470",
  bibdate =      "Sun Dec 24 09:37:07 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "Leon Battista Alberti (1404--1472)",
  language =     "Italian",
  remark =       "Cited in \cite[page 25]{Callimahos:1992:HC}.",
  remark =       "Alberti is considered the father of Western
                 cryptology, according to \cite[page
                 26]{Callimahos:1992:HC}.",
}

@Book{Trithemius:1518:PLS,
  author =       "Johannes Trithemius",
  title =        "Polygraphiae Libri Sex",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1518",
  bibdate =      "Thu Feb 05 06:27:05 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "Latin",
  remark =       "This book is cited in a 4-Feb-2015 New York Times
                 article ``Cracking Codes through the Centuries'' as the
                 earliest printed book on cryptography. However,
                 Callimahos \cite[page 25]{Callimahos:1992:HC} gives the
                 year as 1531.",
}

@Book{Trithemius:1606:CGT,
  author =       "Johannes Trithemius",
  title =        "Clauis generalis triplex in libros steganographicos
                 {Iohannis Trithemij} \ldots{}",
  publisher =    "Iohannis Berneri",
  address =      "Frankfurt, Germany",
  pages =        "7 + 1",
  year =         "1606",
  LCCN =         "Z103.T84 S 1606",
  bibdate =      "Wed Apr 14 06:33:41 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Ab ipso authore conscripta \ldots{} Darmbstadij:
                 Excudebat Balthasar Hofmann, impensis Iohannis Berneri,
                 bibliop. Francof., anno 1606.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1606:CSI,
  author =       "Johannes Trithemius",
  title =        "Clauis {Steganographiae Ioannis Trithemij}, abbatis
                 {Spanheimensis}, ad Serenissimum Principem Dn.
                 {Philippum} \ldots{}",
  publisher =    "Ioannem Bernerum",
  address =      "Frankfurt, Germany",
  pages =        "70",
  year =         "1606",
  LCCN =         "Z103.T84 S 1606",
  bibdate =      "Wed Apr 14 06:14:52 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Venundatur apud Ioannem Bernerum, bibliopolam
                 Francofurtensem, anno 1606.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1606:SHE,
  author =       "Johannes Trithemius",
  title =        "Steganographia: hoc est, ars per occultam scripturam
                 animi sui voluntatem absentibus aperiendi certa",
  publisher =    "Matthiae Beckeri",
  address =      "Frankfurt, Germany",
  pages =        "8 + 180",
  year =         "1606",
  LCCN =         "Z103.T84 S 1606",
  bibdate =      "Wed Apr 14 06:18:44 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Authore \ldots{} Ioanne Trithemio \ldots{}; praefixa
                 est huic operi sua clauis, seu vera introductio ab ipso
                 authore concinnata \ldots{} nunc vero in gratiam
                 secretioris philosophiae studiosorum publici iuris
                 facta. Francofurti. Ex officina typographica Matthiae
                 Beckeri, sumptibus Ioannis Berneri, anno 1606.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Schwenter:1620:SSN,
  author =       "Daniel Schwenter",
  title =        "{Steganologia \& steganographia nova: Geheime
                 magische, naturliche Red vnd Schreibkunst, einem in der
                 nahe vnd ferrne Alsbalden oder in gewiser Zeit, so woln
                 in Schimpff als Ernst, etwas verborgens vnnd geheimes
                 zu eroffnen durch Reden, Schreiben vnd mancherley
                 Instrumenta: item wie verborgene Schrifften zu machen,
                 auffzulosen, vnd mit sonderlichen Kunsten zu
                 schreiben}",
  publisher =    "Resene Gibronte Runeclus Hanedi",
  address =      "N{\"u}rnberg, Germany",
  pages =        "16 + 299 + 5",
  year =         "1620",
  LCCN =         "KK276 .E36 1575; Z103.5",
  bibdate =      "Wed Apr 14 06:21:05 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Publication year uncertain. Publicirt vnd an Tag
                 gegeben durch Resene Gibronte Runeclus Hanedi \ldots{}
                 Nurnberg: Inn Verlegung Simon Halbmayers.",
  acknowledgement = ack-nhfb,
  annote =       "Schwenter, Daniel, 1585--1636. The Trithemius ciphers
                 were finally solved in 1998 by J. Reeds
                 \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1621:CGT,
  author =       "Johannes Trithemius",
  title =        "Clauis generalis triplex in libros steganographicos
                 {Iohannis Trithemij} \ldots{}",
  publisher =    "Balthasar Hofmann",
  address =      "Darmstadt, Germany",
  pages =        "7 + 1",
  year =         "1621",
  LCCN =         "Z103 .T84 1621",
  bibdate =      "Wed Apr 14 06:07:51 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Ab ipso authore conscripta \ldots{} Darmbstadij.
                 Excudebat Balthasar Hofmann, impensis Iohannis Berneri,
                 bibliop. Francof., anno 1621.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1621:CSI,
  author =       "Johannes Trithemius",
  title =        "Clauis Steganographiae {Ioannis Trithemij}, abbatis
                 Spanheimensis, ad Serenissimum Principem Dn.
                 {Philippum} \ldots{}",
  publisher =    "Iohannem Bernerum",
  address =      "Frankfurt, Germany",
  pages =        "64",
  year =         "1621",
  LCCN =         "Z103 .T84 1621",
  bibdate =      "Wed Apr 14 06:09:58 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Venundatur apud Iohannem Bernerum, bibliopolam
                 Francofurtensem, anno 1621.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1621:SHE,
  author =       "Johannes Trithemius",
  title =        "Steganographia: hoc est, ars per occultam scripturam
                 animi sui voluntatem absentibus aperiendi certa",
  publisher =    "Balthasaris Aulaeandri",
  address =      "Darmstadt, Germany",
  pages =        "8 + 152 + 2",
  year =         "1621",
  LCCN =         "Z103 .T84 1621",
  bibdate =      "Wed Apr 14 06:04:51 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Authore \ldots{} Ioanne Trithemio \ldots{}; praefixa
                 est huic operi sua clauis, seu vera introductio ab ipso
                 authore concinnata \ldots{} nunc vero in gratiam
                 secretioris philosophiae studiosorum publici iuris
                 facta. Darmbstadij. Ex officina typographica
                 Balthasaris Aulaeandri, sumptibus vero Ioannis Berneri,
                 bibliop. Francof., anno 1621",
  acknowledgement = ack-nhfb,
  annote =       "Trithemius, Johannes, 1462--1516. The Trithemius
                 ciphers were finally solved in 1998 by J. Reeds
                 \cite{Reeds:1998:SCB}.",
}

@Book{Puteanus:1627:EPC,
  author =       "Erycius Puteanus",
  title =        "{ErycI} Puteani Cryptographia Tassiana, sive,
                 Clandestina scripti",
  publisher =    "Typis Cornelii Coenesteynii",
  address =      "Louvanii",
  pages =        "18 + 2",
  year =         "1627",
  LCCN =         "Z103.5 .P88 1627",
  bibdate =      "Mon Sep 13 07:01:38 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Schwenter:1633:SSA,
  author =       "Daniel Schwenter",
  title =        "{Steganologia \& [i.e. et] steganographia aucta:
                 geheime, magische, naturliche Red vnnd Schreibkunst}",
  publisher =    "Resene Gibronte Runeclusam Hunidem",
  address =      "N{\"u}rnberg, Germany",
  pages =        "24 + 370",
  year =         "1633",
  LCCN =         "Z103 .S38 1633",
  bibdate =      "Wed Apr 14 06:28:21 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Auffs neue revidirt, an etlichen Orten corrigirt,
                 \ldots{} augirt, vnd dann zum drittenmal in Truck
                 verfertiget durch Janum Herculem de Sunde, sonst Resene
                 Gibronte Runeclusam Hunidem \ldots{}. Nurnberg, In
                 Verlegung Jeremiae Dumlers [between 1633 and 1636].",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Wilkins:1641:MSS,
  author =       "John Wilkins",
  title =        "{Mercury}, or the Secret and Swift Messenger",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1641",
  bibdate =      "Thu Feb 05 06:32:55 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "This book is cited in a 4-Feb-2015 New York Times
                 article ``Cracking Codes through the Centuries'' with
                 the comments ``[the book] suggests writing with \the
                 juice of glow-worms' to create messages that can be
                 read only in the dark, or `glutinous moisture' --- milk
                 or fat --- that the recipient can read only by
                 scattering dust on the letters. Alphabets could be
                 translated into musical notes or flowers.''",
}

@Book{duCarlet:1644:CCV,
  author =       "Maistre Iean Robert {du Carlet}",
  title =        "La cryptographie: contenant vne tres-subtile manier
                 d'escrire secr{\`e}tement. ({French}) [{Cryptography}:
                 containing a very subtle manner of secret writing]",
  publisher =    "Imprimeur ordinaire du Roy et R. Aurelhe, Marchand
                 libraire",
  address =      "Paris, France",
  pages =        "234 + 2",
  year =         "1644",
  LCCN =         "Z103.5 .D82 1644b",
  bibdate =      "Mon Sep 13 06:54:53 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
}

@Book{Mersenne:1644:CPM,
  author =       "Marin Mersenne",
  title =        "Cogitata Physica-Mathematica \ldots{} [Tractatus de
                 mensuris ponderibus atque nummis \ldots{} Hydraulica
                 pneumatica; arsque navigandi. Harmonia theorica,
                 practica. Et Mechanica phaenomena. Ballistica et
                 acontismologia]",
  publisher =    "Antonii Bertier",
  address =      "Paris, France",
  pages =        "[30], 40 [24], 41--370, [16], 96, [8], 138, [34] +
                 40",
  day =          "1",
  month =        apr,
  year =         "1644",
  bibdate =      "Sat Aug 23 10:04:54 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes. This is the book that introduced the
                 conjecture that numbers of the form $ M(n) = 2^n - 1 $
                 are prime for $ n = 2, 3, 5, 7, 13, 17, 19, 31, 67,
                 127, $ and $ 257 $, but could not test this claim.
                 Euler showed in 1750 that $ M(31) $ is prime. Lucas
                 showed in 1876 that $ M(127) $ is prime. Pervouchine
                 showed in 1883 that $ M(61) $ is prime, finally
                 disproving the Mersenne conjecture. Powers in the early
                 1900s showed that $ M(89) $ and $ M(107) $ are prime,
                 both missed by Mersenne. By 1947, it was known that the
                 correct list is $ 2, 3, 5, 7, 13, 17, 19, 31, 61, 89,
                 107 $, and $ 127 $, so Mersenne had five errors in his
                 list: $ 67 $ and $ 257 $ should have been removed, and
                 $ 61, 89 $, and $ 107 $ added. By late 2001, 39
                 Mersenne primes were known, the five largest having
                 been found by massive distributed computing efforts
                 through the Great Internet Mersenne Primes Search
                 (GIMPS) project. The largest of these is $ M(13466917)
                 $, a number containing 4,053,946 digits.",
  URL =          "http://www.mersenne.org/prime.htm;
                 http://www.mersenne.org/status.htm",
  acknowledgement = ack-nhfb,
  annote =       "Peracta est haec impressio die 1. April. 1644.",
  keywords =     "Marin Mersenne (1588--1648)",
  language =     "Latin",
  tableofcontents = "I: De mensuris, ponderibus, & nummis Hebraicis,
                 Graecis, & Romanis ad Gallica redactis. -- II: De
                 hydraulico-pneumaticis phaenomenis. -- III: De arte
                 nautica, sev histiodromia, & hydrostatica. -- IV: De
                 musica theorica & practica. -- V: De mechanicis
                 phaenomenis. -- VI: De ballisticis, sev
                 acontismologicis phaenomenis",
}

@Book{Morland:1666:NMC,
  author =       "Sir Samuel Morland",
  title =        "A New Method of Cryptography",
  publisher =    "????",
  address =      "????",
  pages =        "12",
  year =         "1666",
  bibdate =      "Tue Jul 05 14:50:30 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Microfilm in Folger Shakespeare Library, Washington,
                 DC, USA.",
  acknowledgement = ack-nhfb,
  remark =       "This book is cited in a 4-Feb-2015 New York Times
                 article ``Cracking Codes through the Centuries'' with
                 the comment ``His [Morland's] proposal for a cyclologic
                 cryptographic machine, illustrated on the book's last
                 page, relies on a series of cipher wheels that make it
                 a close cousin to Sigaba and Enigma''.",
}

@Book{Heidel:1676:JTP,
  author =       "Wolfgango Ernesto Heidel",
  title =        "{Johannis Trithemii} primo Spanheimensis deinde {Divi
                 Jacobi Peapolitani} abbatis {Steganographia}: quae
                 hucusq[ue] a nemine intellecta sed passim ut
                 supposititia, perniciosa, magica \& necromantica
                 rejecta, elusa, damnata \& sententiam inquisitionis
                 passa, nunc tandem vindicata, reserata et illustrata
                 ubi post vindicias Trithemii clarissime explicantur
                 conjurationes spirituum ex {Arabicis}, {Hebraicis},
                 {Chaldaicis} \& {Graecis} spirituum nominibus juxta
                 quosdam conglobatae, aut secundum alios ex barbaris \&
                 nihil significantibus verbis concinnatae: deinde
                 solvuntur \& exhibentur artificia nova steganographica
                 a {Trithemio} in literis ad {Arnoldum Bostium} \&
                 {Polygraphia} promissa, in hunc diem a nemine capta,
                 sed pro paradoxis \& impossibilibus habita \& summe
                 desiderata",
  publisher =    "Wormatiense, Moguntiae. Sumptibus Joannis Petri
                 Zubrodt",
  address =      "",
  pages =        "8 + 394 (or 396) + 4",
  year =         "1676",
  LCCN =         "Z103 .T84 1676",
  bibdate =      "Wed Apr 14 06:11:27 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Includes Heidel's life of Trithemius and his
                 vindication of the Steganographia.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Morrice:1692:EB,
  author =       "Roger Morrice",
  title =        "Entring Book",
  publisher =    "????",
  address =      "????",
  pages =        "1500",
  year =         "1692",
  bibdate =      "Mon Sep 15 16:32:21 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  URL =          "http://www.hist.cam.ac.uk/seminars_events/events/roger-morrice.html;
                 http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2003/08/29/ndiary29.xml",
  acknowledgement = ack-nhfb,
  remark =       "From the Cambridge Web site: ``The Morrice Project
                 exists to publish Roger Morrice's Entring Book, the
                 most important unpublished record of British political
                 and religious history of the second half of the
                 seventeenth century. The fragile, three volume, 1500
                 page manuscript of Roger Morrice's Entring Book is in
                 Dr Williams's Library, 14 Gordon Square, London, the
                 pre-eminent research library of English Protestant
                 Nonconformity. The Entring Book is 900,000 words long
                 and covers the years 1677 to 1691.''\par

                 From the Telegraph story of 29-Aug-2003: ``A remarkable
                 million-word account of life in late 17th century
                 England which is as vivid as Samuel Pepys's diary has
                 been transcribed by experts after lying largely
                 forgotten for more than three centuries.\par

                 A specialist code-breaker was brought in to crack the
                 shorthand that Roger Morrice, a Puritan minister turned
                 political journalist, used in part of the diary to stop
                 the King's agents reading it. \ldots{} \par

                 Now the transcription has been completed and six
                 volumes of Morrice's well-informed account of a
                 turbulent period during which England was ruled by
                 three different monarchs will be published in 2005.\par
                 About 40,000 words of the diary were in code and the
                 team, led by the Cambridge academic Dr Mark Goldie,
                 brought in an expert in 17th century shorthand to
                 reveal for the first time what Morrice had written.''",
  xxnote =       "Exact publication year unknown; I set it to just after
                 the years covered.",
}

@Book{Conradi:1739:CDS,
  author =       "David Arnold Conradi",
  title =        "Cryptographia denudata; sive, Ars deciferandi, quae
                 occulte scripta sunt in quocunque linguarum genere,
                 praecipue in {Germanica, Batava, Latina, Anglica,
                 Gallica, Italica, Graeca}",
  publisher =    "Apud P. Bonk",
  address =      "Lugduni Batavorum",
  pages =        "73",
  year =         "1739",
  LCCN =         "Z103 .C66",
  bibdate =      "Mon Sep 13 07:04:09 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Kasiski:1863:GDG,
  author =       "Friedrich Wilhelm Kasiski",
  title =        "{Die Geheimschriften und die Dechiffrirkunst, Mit
                 besonderer Ber{\"u}cksichtigung der deutschen und
                 franz{\"o}sischen Sprache}. ({German}) [{Secret}
                 writing and the art of deciphering, with special
                 reference to the {German} and {French} languages]",
  publisher =    "E. S. Mittler und Sohn",
  address =      "Berlin, Germany",
  pages =        "viii + 95 + 4",
  year =         "1863",
  LCCN =         "????",
  bibdate =      "Sat May 16 11:30:41 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "This is the first published account of the breaking of
                 the Vigen{\`e}re Cipher, although Charles Babbage
                 accomplished that in 1854; Babbage's planned book on
                 cryptography was never completed or published. See
                 \cite{Singh:1999:CBE,Lewand:2010:PC} for more on
                 Kasiski and Babbage's work.",
}

@Book{Colaco:1864:CRO,
  author =       "F. N. Cola{\c{c}}o",
  title =        "A cryptographia revelada, ou, Arte de traduzir e
                 decifrar as escrituras obscuras, quaesquer que sejao os
                 caracteres empregados. ({Portuguese}) [{Cryptography}
                 revealed, or, the art of translating and deciphering
                 obscure writings, whatever the characters employed]",
  publisher =    "De Santos e Cia",
  address =      "Pernambuco, Brazil",
  pages =        "93",
  year =         "1864",
  LCCN =         "Z104 .C68 1846",
  bibdate =      "Mon Sep 13 06:59:12 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "Portuguese",
  xxnote =       "Check year: Library of Congress has conflicting data:
                 1846 and 1864??",
}

@Book{S:1873:COD,
  author =       "H. S.",
  title =        "Cryptographie, ou, Divers syst{\`e}mes d'{\'e}crire
                 secr{\`e}te sp{\'e}cialement pour l'usage des cartes
                 postales: combinations alphab{\'e}tiques,
                 correspondance chiffr{\'e}e, {\'e}criture par signes:
                 divers proc{\'e}d{\'e}s pour la fabrication d'encres
                 sympathiques",
  publisher =    "G. Jousset",
  address =      "Paris, France",
  pages =        "8",
  year =         "1873",
  LCCN =         "Z104 .H16 1873",
  bibdate =      "Mon Sep 13 06:51:31 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Jevons:1874:PS,
  author =       "W. Stanley Jevons",
  title =        "The Principles of Science",
  publisher =    "????",
  address =      "????",
  pages =        "??--??",
  year =         "1874",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 7]{Odlyzko:1995:FIF}.",
}

@Article{Kerckhoffs:1883:CMF,
  author =       "Auguste Kerckhoffs (von Nieuwenhof)",
  title =        "La Cryptographie Militaire. ({French}) [{Military}
                 cryptography]",
  journal =      "Journal des Sciences Militaires",
  volume =       "IX",
  number =       "??",
  pages =        "5--38, 161--191",
  month =        jan # "\slash " # feb,
  year =         "1883",
  bibdate =      "Thu May 16 08:07:14 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/kerckhoffs/la_cryptographie_militaire_i.htm
                 https://www.petitcolas.net/kerckhoffs/;
                 https://www.petitcolas.net/kerckhoffs/crypto_militaire_1_b.pdf;
                 https://www.petitcolas.net/kerckhoffs/crypto_militaire_2.pdf",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced online at the indicated URL. This is one of
                 the early papers that argues for publication of
                 cryptographic algorithms, as discussed by Bruce
                 Schneier in the CRYPTO-GRAM newsletter of 15-May-2002.
                 Also discussed in \cite{Cohen:1987:IIP} in Chapter 2.1:
                 ``A Short History of Cryptography'': Cohen writes:
                 ``Kerckhoffs \ldots{} set forth six basic requirements
                 of cryptography. We note that the easily remembered key
                 is very amenable to attack, and that these rules, as
                 all others, should be questioned before placing trust
                 in them: \begin{itemize} \item ciphertext should be
                 unbreakable in practice \item the cryptosystem should
                 be convenient for the correspondents \item the key
                 should be easily remembered and changeable \item the
                 ciphertext should be transmissible by telegraph \item
                 the cipher apparatus should be easily portable \item
                 the cipher machine should be relatively easily to use
                 \end{itemize} ''",
  language =     "French",
  xxpages =      "38--??",
}

@Book{Josse:1885:CSA,
  author =       "H. (Henri) Joss{\'e}",
  title =        "La cryptographie et ses applications {\`a} l'art
                 militaire",
  publisher =    "Libraire militaire de L. Baudoin",
  address =      "Paris, France",
  pages =        "103",
  year =         "1885",
  LCCN =         "Z104 .J67 1885",
  bibdate =      "Thu May 16 08:13:44 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Perret:1890:RCS,
  author =       "P.-M. Perret",
  title =        "Les r{\`e}gles de {Cicco Simonetta} pour le
                 d{\'e}chiffrement des {\'e}critures secr{\`e}tes (4
                 juillet 1474). ({French}) [The rules of {Cicco
                 Simonetta} for decryption of secret writings ({4 July
                 1474})]",
  journal =      "Biblioth{\`e}que de l{\'E}cole des chartes",
  volume =       "51",
  pages =        "516--525",
  year =         "1890",
  ISSN =         "0373-6237 (print), 1953-8138 (electronic)",
  ISSN-L =       "0373-6237",
  bibdate =      "Sun Dec 24 17:37:36 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.jstor.org/stable/43000437",
  acknowledgement = ack-nhfb,
  language =     "French",
  xxDOI =        "https://doi.org/10.2307/43000437",
}

@Article{Valerio:1892:C,
  author =       "Paul Louis Eugene Valerio",
  title =        "De la Cryptographie",
  journal =      "Journal des Sciences militares, 9th series, Paris",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  month =        dec,
  year =         "1892",
  bibdate =      "Thu Oct 31 18:47:22 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Date cited as 9th series, Dec 1892--May 1895.",
}

@Book{Hulme:1898:CHP,
  author =       "F. Edward (Frederick Edward) Hulme",
  title =        "Cryptography; or, The history, principles, and
                 practice of cipher-writing",
  publisher =    "Ward, Lock and Co., Limited",
  address =      "????",
  pages =        "192",
  year =         "1898",
  LCCN =         "Z 104 H91",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "First edition. Galland, p. 94. Bound in yellow cloth;
                 stamped in black. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Walden:1900:ADB,
  author =       "John William Henry Walden",
  title =        "{August, Duke of Braunschweig-Luneburg}: The
                 cryptomenytics and cryptography of {Gustavus Selenus}:
                 in nine books: wherein is also contained a most clear
                 elucidation of the {Steganographia}, a book at one time
                 composed in magic and enigmatic form by {Johannes
                 Trithemius}",
  publisher =    "????",
  address =      "????",
  year =         "1900",
  LCCN =         "Z103 .A95 1900",
  bibdate =      "Wed Apr 14 06:24:45 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "August, Duke of Braunschweig-Luneburg 1579--1666. The
                 Trithemius ciphers were finally solved in 1998 by J.
                 Reeds \cite{Reeds:1998:SCB}.",
}

@Book{delaStelle:1902:TCF,
  author =       "F{\'e}lix-Marie de la Stelle",
  title =        "Trait{\'e} de cryptographie. ({French}) [{Treatise} on
                 cryptography]",
  publisher =    pub-GAUTHIER-VILLARS,
  address =      pub-GAUTHIER-VILLARS:adr,
  pages =        "????",
  year =         "1902",
  bibdate =      "Sun Dec 24 09:50:59 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "F{\'e}lix-Marie de la Stelle (or Delastelle)
                 (1840--1902)",
  remark =       "Cited in \cite[page 26]{Callimahos:1992:HC}.",
}

@Article{Guarini:1904:MTT,
  author =       "Emile Guarini",
  title =        "The {Malcotti} Telecryptograph for Telegraphing Upon
                 Telephone Lines",
  journal =      j-SCI-AMER,
  volume =       "91",
  number =       "12",
  pages =        "193--194",
  day =          "17",
  month =        sep,
  year =         "1904",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican09171904-193a",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:20:28 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1900.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v91/n12/pdf/scientificamerican09171904-193a.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "cryptography; decryption; encryption",
}

@Article{Claudy:1912:TMS,
  author =       "C. H. Claudy",
  title =        "A Triple Mirror for Secret Signaling",
  journal =      j-SCI-AMER,
  volume =       "107",
  number =       "17",
  pages =        "346--346",
  day =          "26",
  month =        oct,
  year =         "1912",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican10261912-346",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:15:12 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v107/n17/pdf/scientificamerican10261912-346.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@TechReport{Mauborgne:1914:APC,
  author =       "Joseph O. Mauborgne",
  title =        "An Advanced Problem in Cryptography and Solution",
  institution =  "Army Service School's Press",
  address =      "Ft. Leavenworth, KS, USA",
  pages =        "21",
  year =         "1914",
  bibdate =      "Sun Dec 24 09:44:44 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Solution of the Playfair Cipher, invented by Sir
                 Charles Wheatstone, but named by Lord Lyon Playfair of
                 the UK Foreign Office. WorldCat dates this as 1918.",
}

@Article{Edwards:1915:CCT,
  author =       "E. C. Edwards",
  title =        "Cipher Codes and their Uses",
  journal =      j-SCI-AMER,
  volume =       "113",
  number =       "1",
  pages =        "9--9",
  day =          "3",
  month =        jul,
  year =         "1915",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican07031915-9",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:20:13 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v113/n1/pdf/scientificamerican07031915-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Honore:1919:STS,
  author =       "F. Honore",
  title =        "The Secret Telephone, Are Sound Waves ever Visible?",
  journal =      j-SCI-AMER,
  volume =       "121",
  number =       "23",
  pages =        "555--555",
  day =          "6",
  month =        dec,
  year =         "1919",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican12061919-555",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:27:45 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v121/n23/pdf/scientificamerican12061919-555.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Meador:1920:KCE,
  author =       "J. E. D. Meador",
  title =        "Keeping the Camera on an Even Keel, Telephoning in
                 Cipher",
  journal =      j-SCI-AMER,
  volume =       "123",
  number =       "5",
  pages =        "107--107",
  day =          "31",
  month =        jul,
  year =         "1920",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican07311920-107a",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:11:40 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v123/n5/pdf/scientificamerican07311920-107a.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Arensberg:1921:CD,
  author =       "Walter Arensberg",
  title =        "The cryptography of {Dante}",
  publisher =    pub-KNOPF,
  address =      pub-KNOPF:adr,
  pages =        "x + 494",
  year =         "1921",
  LCCN =         "PQ4406.A7",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; Dante Alighieri, 1265--1321 ---
                 symbolism; Dante Alighieri, 1265--1321 Divina
                 Commedia",
}

@Article{Anonymous:1922:PUS,
  author =       "Anonymous",
  title =        "Practical Uses for the Spectroscope, Secret Radio
                 Communication",
  journal =      j-SCI-AMER,
  volume =       "127",
  number =       "4",
  pages =        "259--259",
  month =        oct,
  year =         "1922",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican1022-259",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:13:39 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v127/n4/pdf/scientificamerican1022-259.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Arensberg:1922:CSP,
  author =       "Walter Arensberg",
  title =        "The cryptography of {Shakespeare}. Part one",
  publisher =    "Howard Bowen",
  address =      "Los Angeles, CA, USA",
  pages =        "ix + 280",
  year =         "1922",
  LCCN =         "PR2944.A6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "No more published. Source: Bequest of George Fabyan,
                 1940. DLC",
  acknowledgement = ack-nhfb,
  keywords =     "Shakespeare, William, 1564-1616 --- authorship ---
                 Baconian theory",
}

@Book{Budge:1922:RS,
  author =       "Sir E. A. Wallis (Ernest Alfred Wallis) Budge",
  title =        "The {Rosetta} Stone",
  publisher =    "British Museum Press",
  address =      "London, UK",
  pages =        "8 + 1",
  year =         "1922",
  LCCN =         "PJ1531.R3 1913",
  bibdate =      "Tue Dec 01 10:37:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted with revisions in 1935, 1950, and 1968.",
  acknowledgement = ack-nhfb,
}

@Book{Langie:1922:C,
  author =       "Andr{\'e} Langie and James Cruickshank Henderson
                 Macbeth",
  title =        "Cryptography",
  publisher =    "Constable and Company Limited",
  address =      "London, UK",
  pages =        "vii + 1 + 192",
  year =         "1922",
  LCCN =         "Z 104 L26dE",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Bibliography: p.158.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{USASC:1923:EC,
  author =       "{United States.Army.Signal Corps} and {George Fabyan
                 Collection (Library of Congress)}",
  title =        "Elements of cryptanalysis",
  number =       "3",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "vii + 157",
  year =         "1923",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Training pamphlet",
  acknowledgement = ack-nhfb,
  annote =       "LC copy is item no. 717 of the George Fabyan
                 Collection.",
  keywords =     "Ciphers; Cryptography",
}

@Book{USWarDept:1924:EC,
  author =       "{United States.War Dept}",
  title =        "Elements of cryptanalysis",
  volume =       "3",
  publisher =    "Government Printing Office",
  address =      "Washington, DC, USA",
  pages =        "vii + 157",
  year =         "1924",
  LCCN =         "Z104 .U6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Its training pamphlet",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{USWD:1924:EC,
  author =       "{United States.War Dept}",
  title =        "Elements of cryptanalysis",
  number =       "3",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "vii + 157",
  year =         "1924",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Its Training pamphlet",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography.",
}

@Book{Givierge:1925:CC,
  author =       "Marcel Givierge",
  title =        "Cours de cryptographie",
  publisher =    "Berger-Levrault",
  address =      "Paris, France",
  pages =        "ix + 304",
  year =         "1925",
  LCCN =         "Z104 .G43",
  bibdate =      "Sat Sep 25 10:58:57 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cited in \cite{Shannon:1949:CTS}.",
}

@Book{Lange:1925:TC,
  author =       "Andr{\'e} Lange and E. A. Soudart",
  title =        "Trait{\'e} de cryptographie. ({French}) [{Treatise} on
                 cryptography]",
  publisher =    "Librairie F{\'e}lix Alcan",
  address =      "Paris, France",
  pages =        "xii + 366 + vi",
  year =         "1925",
  LCCN =         "Z104 .L26 1925",
  bibdate =      "Sun Dec 24 17:46:24 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  language =     "French",
  remark =       "LC copy is item no. 411 of the George Fabyan
                 Collection (Riverbank Laboratories, west of Chicago,
                 IL, USA)",
  subject =      "Cryptography; Cyphers; Signs and symbols",
}

@Article{Vernam:1926:CPT,
  author =       "G. S. Vernam",
  title =        "Cipher Printing Telegraph Systems for Secret Wire and
                 Radio Telegraphic Communications",
  journal =      "Journal American Institute of Electrical Engineers",
  volume =       "{XLV}",
  number =       "??",
  pages =        "109--115",
  year =         "1926",
  bibdate =      "Sat Sep 25 11:06:06 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cited in \cite{Shannon:1949:CTS}.",
}

@Article{Russell:1927:CMS,
  author =       "Henry Norris Russell",
  title =        "Cipher Messages of the Stars",
  journal =      j-SCI-AMER,
  volume =       "137",
  number =       "2",
  pages =        "118--119",
  month =        aug,
  year =         "1927",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican0827-118",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:15:38 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v137/n2/pdf/scientificamerican0827-118.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Tippett:1927:RSN,
  author =       "L. H. C. (Leonard Henry Caleb) Tippett",
  title =        "Random sampling numbers",
  volume =       "15",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "viii + xxvi",
  year =         "1927",
  bibdate =      "Sat Aug 23 08:23:19 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in 1952. Reprinted in 1959 with a foreword
                 by Karl Pearson.",
  series =       "Tracts for computers",
  acknowledgement = ack-nhfb,
  annote =       "This may be the first known publication of tables of
                 random numbers. I found an unsubstantiated claim that
                 they were determined by taking the middle digits from
                 area measurements of English churches. See also
                 \cite{Rand:1955:MRD}.",
}

@Article{Sarton:1928:BRBn,
  author =       "George Sarton",
  title =        "Book Review: {{\booktitle{The Cipher of Roger Bacon}}
                 by William Romaine Newbold; Roland Grubb Kent}",
  journal =      j-ISIS,
  volume =       "11",
  number =       "1",
  pages =        "141--145",
  month =        sep,
  year =         "1928",
  CODEN =        "ISISA4",
  ISSN =         "0021-1753 (print), 1545-6994 (electronic)",
  ISSN-L =       "0021-1753",
  bibdate =      "Tue Jul 30 21:57:51 MDT 2013",
  bibsource =    "http://www.jstor.org/action/showPublication?journalCode=isis;
                 http://www.jstor.org/stable/i302190;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/isis1920.bib",
  URL =          "http://www.jstor.org/stable/224770",
  acknowledgement = ack-nhfb,
  fjournal =     "Isis",
  journal-URL =  "http://www.jstor.org/page/journal/isis/about.html",
}

@Book{Budge:1929:RSB,
  author =       "Sir E. A. Wallis(Ernest Alfred Wallis) Budge",
  title =        "The {Rosetta} Stone in the {British Museum}: the
                 {Greek}, {Demotic} and {Hieroglyphic} texts of the
                 decree inscribed on the {Rosetta} Stone conferring
                 additional honours on {Ptolemy V. Epiphanes (203-181
                 B.C.) \ldots{}}",
  publisher =    "British Museum Press",
  address =      "London, UK",
  pages =        "viii + 323",
  year =         "1929",
  LCCN =         "PJ1531 .R3 1929",
  bibdate =      "Tue Dec 01 10:37:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted with revisions in 1929, 1935, 1950, and
                 1968.",
  acknowledgement = ack-nhfb,
}

@Article{Hill:1929:CAA,
  author =       "Lester S. Hill",
  title =        "Cryptography in an Algebraic Alphabet",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "36",
  number =       "6",
  pages =        "306--312",
  month =        jun # "\slash " # jul,
  year =         "1929",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:39:12 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Booklet{Gylden:1931:CEI,
  author =       "Yves Gyld{\'e}n",
  title =        "Chifferbyr{\aa}ernas Insatser i V{\"a}rldskriget Till
                 Lands. ({Swedish}) [{Cipher} bureaus' operations in the
                 {World War} on land]",
  address =      "Stockholm, Sweden",
  year =         "1931",
  bibdate =      "Sun Dec 24 10:27:31 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  remark =       "Cited in \cite[page 11]{Gylden:1933:CCB}.",
}

@Article{Hill:1931:CCL,
  author =       "Lester S. Hill",
  title =        "Concerning Certain Linear Transformation Apparatus of
                 Cryptography",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "38",
  number =       "3",
  pages =        "135--154",
  month =        mar,
  year =         "1931",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:10 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{Yardley:1931:ABC,
  author =       "Herbert O. Yardley",
  title =        "The {American Black Chamber}",
  publisher =    "Faber \& Faber Limited",
  address =      "London, UK",
  pages =        "x + 264 + 1",
  year =         "1931",
  LCCN =         "D639.S7 Y3 1931b",
  bibdate =      "Wed Nov 15 14:21:04 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "The history and work of the Cryptographic bureau,
                 officially known as section 8 of the Military
                 intelligence division (MI-8).",
  acknowledgement = ack-nhfb,
}

@Book{Givierge:1932:CC,
  author =       "Marcel Givierge",
  title =        "Cours de cryptographie",
  publisher =    "Berger-Levrault",
  address =      "Paris, France",
  edition =      "Deuxi{\`e}me",
  pages =        "ix + 304",
  year =         "1932",
  bibdate =      "Sat Sep 25 10:58:57 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Gylden:1933:CCB,
  author =       "Yves Gyld{\'e}n",
  title =        "The Contribution of the Cryptographic Bureaus in the
                 {World War}",
  journal =      "The Signal Corps Bulletin",
  number =       "75--81",
  pages =        "??--??",
  month =        nov # "--" # dec,
  year =         "1933--1934",
  bibdate =      "Sun Dec 24 10:23:49 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://archive.org/download/cryptolog_96/cryptolog_96.pdf",
  acknowledgement = ack-nhfb,
  remark =       "Small extract reprinted in \booktitle{Cryptolog},
                 volume 12, number 5, May 1985, page 11.",
}

@Book{Friedman:1935:ICA,
  author =       "William F. (William Frederick) Friedman",
  title =        "The index of coincidence and its applications in
                 cryptanalysis: technical paper",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "87 + 3",
  year =         "1935",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: War Department, Office of the Chief
                 Signal Officer, Washington. Register no. 200. The
                 present paper was prepared in 1923. It is a revision of
                 an earlier paper with the same title published in 1922
                 by the Riverbank Laboratories, Geneva, Ill.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography.",
}

@Book{Friedman:1935:MCP,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis. Part 1, monoalphabetic
                 substitution systems",
  number =       "30",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "149",
  year =         "1935",
  ISBN =         "0-89412-044-1",
  ISBN-13 =      "978-0-89412-044-2",
  LCCN =         "Z103.5.F77 1992",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Four volumes.",
  series =       "Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "On cover: With new added problems for the student. (p.
                 143--149) Reprint. Originally published: Washington,
                 DC: U.S. G.P.O., between 1935 and 1945.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Communications, Military; Cryptography",
}

@Book{Friedman:1935:PIS,
  author =       "William F. (William Frederick) Friedman",
  title =        "The principles of indirect symmetry of position in
                 secondary alphabets and their application in the
                 solution of polyalphabetic substitution ciphers:
                 technical paper",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "????",
  year =         "1935",
  bibdate =      "Tue Dec 26 07:21:46 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
}

@Book{Kullback:1935:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis: technical
                 paper",
  publisher =    "War Dept., Office of the Chief Signal Officer: U.S.
                 G.P.O.",
  address =      "Washington, DC, USA",
  pages =        "various",
  year =         "1935",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Rowlett:1935:FAP,
  author =       "Frank B. Rowlett and William F. Friedman",
  title =        "Further applications of the principles of indirect
                 symmetry of position in secondary alphabets: technical
                 paper",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "????",
  year =         "1935",
  bibdate =      "Tue Dec 26 07:23:00 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Gylden:1936:AMC,
  author =       "Yves Gylden",
  title =        "Analysis of model {C-36} cryptograph from the
                 viewpoint of cryptanalysis",
  publisher =    "A. B. Teknik co.",
  address =      "Stockholm, Sweden",
  pages =        "22",
  year =         "1936",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Xeroxed on rectos only; unbound. Translated from the
                 French into English. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Book{Nanovic:1936:SWI,
  author =       "John Leonard Nanovic",
  title =        "Secret writing: an introduction to cryptograms,
                 ciphers and codes",
  publisher =    "D. Kemp and Co",
  address =      "New York, NY, USA",
  pages =        "x + 117 + 1",
  year =         "1936",
  LCCN =         "Z104 .N3",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also reprint \cite{Nanovic:1974:SWI}.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Sacco:1936:MC,
  author =       "Luigi Sacco",
  title =        "Manuale di crittografia. ({Italian}) [{Manual} of
                 cryptography]",
  publisher =    "Tipografia Santa Barbara",
  address =      "Roma, Italia",
  edition =      "Second",
  pages =        "viii + 247 + 8",
  year =         "1936",
  bibdate =      "Tue Dec 26 07:04:56 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "Italian",
}

@Book{Gylden:1938:APV,
  author =       "Yves Gylden",
  title =        "Analysis from the point of view of cryptanalysis of
                 ``cryptograph type {C-36},'' provided with six key
                 wheels, 27 slide bars, the latter having movable
                 projections, single or multiple",
  publisher =    "A. B. Teknik co.",
  address =      "Stockholm, Sweden",
  pages =        "10",
  year =         "1938",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Xeroxed on rectos only; unbound. Translated from the
                 French into English. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Book{Kullback:1938:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis",
  publisher =    "War Department, Office of the Chief Signal Officer",
  address =      "Washington, DC, USA",
  edition =      "Revised",
  pages =        "194",
  year =         "1938",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: War Department, Office of the Chief
                 Signal Officer, Washington. ``Confidential.''
                 ``Register no. 170.''",
  keywords =     "Ciphers; Cryptography",
  remark =       "From \cite{Anscombe:2003:QCC}: ``A bookseller
                 description [of this book]: `This classic text provides
                 various statistical tests: the Chi Test, which affords
                 a quantitative measure of the degree of similarity
                 between two distributions, and the Phi Test, which
                 provides a quantitative measurement of the degree of
                 non-randomness of a distribution. Text includes
                 numerous tabulations of frequency data in other
                 languages.'.''",
}

@TechReport{Anonymous:1939:ITM,
  author =       "Anonymous",
  title =        "Introductory talk to members of the {William and Mary
                 College} cryptanalysis class",
  institution =  "William and Mary College",
  address =      "Williamsburg, VA, USA",
  pages =        "7",
  year =         "1939",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from typescript.",
}

@Book{Baudouin:1939:ECF,
  author =       "Roger Baudouin",
  title =        "{{\'E}}l{\'e}ments de cryptographie. ({French})
                 [{Elements} of cryptography]",
  publisher =    "A. Pedone",
  address =      "Paris, France",
  pages =        "336",
  year =         "1939",
  bibdate =      "Tue Dec 26 07:17:01 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
}

@Book{DAgapeyeff:1939:CC,
  author =       "Alexander D'Agapeyeff",
  title =        "Codes and ciphers",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "160",
  year =         "1939",
  LCCN =         "Z104 .D3 1939",
  bibdate =      "Sat Apr 20 12:19:43 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Friedman:1939:CAC,
  author =       "William F. (William Frederick) Friedman",
  title =        "The cryptanalyst accepts a challenge",
  publisher =    "War Department, Office of the Chief Signal Officer",
  address =      "Washington, DC, USA",
  pages =        "24--36",
  year =         "1939",
  LCCN =         "????",
  bibdate =      "Wed May 11 23:30:34 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  remark =       "An article analyzed from The Signal Corps bulletin,
                 no. 103, January--March, 1939.",
  subject =      "Cryptography; Ciphers; CHR 1939; PRO Mendelsohn,
                 Charles J. (Charles Jastrow) (donor); PRO Mendelsohn,
                 Esther Jastrow (donor)",
}

@Book{Friedman:1939:MC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis",
  publisher =    "New York Public Library",
  address =      "New York, NY, USA",
  year =         "1939",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "1 microfilm reel",
  acknowledgement = ack-nhfb,
  annote =       "Titles and statements of authorship from label on
                 container. First work originally published: Washington:
                 U.S. G.P.O., 1939- 1943. 4 v. Vols. 1-2, 3rd ed. Vol.
                 3, 2nd ed. Second work originally published:
                 Washington: U.S. G.P.O., 1942. v, 316 p.",
  author-dates = "1891--1969",
  keywords =     "Cryptography.",
}

@Book{Gaines:1939:ECS,
  author =       "Helen Fouche Gaines",
  title =        "Elementary cryptanalysis: a study of ciphers and their
                 solution",
  publisher =    "American Photographic Publishing Co.",
  address =      "Boston, MA, USA",
  pages =        "vi + 230 + 1",
  year =         "1939",
  LCCN =         "Z104 .G3",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "First edition. Galland, p. 72. Inscribed by Gelett
                 Burgess. Bound in gray cloth; stamped in red; top edges
                 stained red. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Mendelsohn:1939:CC,
  author =       "Charles Jastrow Mendelsohn",
  title =        "{Cardan} on cryptography",
  publisher =    "Yeshiva College",
  address =      "New York, NY, USA",
  pages =        "157--168",
  year =         "1939",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted from Scripta mathematica, Vol. 6, No. 3,
                 October, 1939. J. S. Galland, Bibliography of \ldots{}
                 cryptology, 1945, p. 124.",
  acknowledgement = ack-nhfb,
  keywords =     "Cardano, Girolamo, 1501--1576; cryptography",
}

@Book{Pratt:1939:SUS,
  author =       "Fletcher Pratt",
  title =        "Secret and urgent: the story of codes and ciphers",
  publisher =    "Robert Hale",
  address =      "London, UK",
  pages =        "282",
  year =         "1939",
  LCCN =         "Z104 .P92 1939",
  bibdate =      "Sat Apr 20 12:05:03 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Reprinted in 1939 by the Bobbs-Merrill Company, New
                 York, NY, USA, in 1942 by Blue Ribbon Books, Garden
                 City, NY, USA, and in 1996 by Aegean Park Press, Laguna
                 Hills, CA, USA.",
  tableofcontents = "1. Sermons in Stones \\
                 2. The Element of Doubt \\
                 3. Jargon \\
                 4. Invention and Death \\
                 5. Bacon or Shakespeare? \\
                 6. Satellites of the Royal Sun \\
                 7. Kings, Thieves and Diarists \\
                 8. Failure \\
                 9. The Revival \\
                 10. Code \\
                 11. The War of Cryptographers \\
                 12. The Cryptographers' War",
}

@Book{Gaines:1940:ECS,
  author =       "Helen Fouche Gaines",
  title =        "Elementary cryptanalysis; a study of ciphers and their
                 solution",
  publisher =    pub-CHAPMAN-HALL,
  address =      pub-CHAPMAN-HALL:adr,
  pages =        "vi + 230 + 23",
  year =         "1940",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Inscription by the author pasted in. Bound in gray
                 cloth; stamped in red; top edges stained red. Dust
                 jacket.",
  keywords =     "Ciphers; Cryptography",
}

@Book{USASC:1940:CML,
  author =       "{United States Army Signal Corps}",
  title =        "Cryptanalyst's manual",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "????",
  year =         "1940",
  LCCN =         "Z104 .U33c",
  bibdate =      "Wed May 11 23:30:34 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Prepared under the direction of the Chief Signal
                 Officer.",
  subject =      "cryptography",
}

@Book{Yardley:1940:SSA,
  author =       "Herbert O. Yardley",
  title =        "Secret service in {America}: The {American Black
                 Chamber}",
  publisher =    "Faber \& Faber Limited",
  address =      "London, UK",
  pages =        "x + 264 + 1",
  year =         "1940",
  LCCN =         "D639.S7 Y3 1940",
  bibdate =      "Wed Nov 15 14:23:09 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "The history and work of the Cryptographic bureau,
                 officially known as section 8 of the Military
                 intelligence division (MI-8).",
  acknowledgement = ack-nhfb,
}

@Book{Friedman:1941:MCP,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis. Part {IV}, Transposition and
                 fractionating systems",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "189",
  year =         "1941",
  ISBN =         "0-89412-198-7 (paperback), 0-89412-199-5 (library
                 bound)",
  ISBN-13 =      "978-0-89412-198-2 (paperback), 978-0-89412-199-9
                 (library bound)",
  LCCN =         "Z103.5.F77 1992",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Cryptographic series; 61",
  acknowledgement = ack-nhfb,
  alttitle =     "Transposition and fractionating series",
  annote =       "Reprint of a U.S. military text, originally published
                 in 1941. Declassified December 1992.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Communications, Military; Cryptography",
}

@TechReport{Turing:1941:APC,
  author =       "Alan M. Turing",
  title =        "The Applications of Probability to Cryptography",
  type =         "Report",
  institution =  "GCHQ",
  address =      "Cheltenham, UK",
  year =         "1941",
  bibdate =      "Wed Apr 25 10:25:22 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Unclassified and released 23 April 2012. Date
                 uncertain, but believed to be between April 1941 and
                 April 1942.",
  URL =          "http://www.gchq.gov.uk/Press/Pages/turing-papers-released.aspx;
                 http://www.theregister.co.uk/2012/04/23/turing_papers_released/",
  acknowledgement = ack-nhfb,
}

@TechReport{Turing:1941:SR,
  author =       "Alan M. Turing",
  title =        "On Statistics of Repetitions",
  type =         "Report",
  institution =  "GCHQ",
  address =      "Cheltenham, UK",
  year =         "1941",
  bibdate =      "Wed Apr 25 10:25:22 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Unclassified and released 23 April 2012. Date
                 uncertain, but believed to be between April 1941 and
                 April 1942.",
  URL =          "http://www.gchq.gov.uk/Press/Pages/turing-papers-released.aspx;
                 http://www.theregister.co.uk/2012/04/23/turing_papers_released/",
  acknowledgement = ack-nhfb,
}

@Book{Volts:1941:BC,
  author =       "James D. Volts and David Shulman",
  title =        "Bibliography of cryptography",
  publisher =    "U. S. Army",
  address =      "Cincinnati, OH. USA",
  pages =        "93",
  year =         "1941",
  LCCN =         "Z103.A1 V6 1941",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Typewritten (carbon copy) Three heavy leaves precede
                 sections II-IV (not included in pagination). This copy
                 was made especially for the United States Army from the
                 original manuscript. Third copy: pencilled note on
                 cover. Contents: pt.1. Cryptography; pt.2. Titles
                 relating indirectly to cryptography; pt.3. Rejected
                 titles; pt.4. Author index.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers --- bibliography; cryptography ---
                 bibliography",
}

@Book{Volts:1941:BCP,
  author =       "James D. Volts",
  title =        "Bibliography of cryptography: Part {I}: Cryptography",
  publisher =    "U. S. Army",
  address =      "Cincinnati, OH, USA",
  pages =        "various",
  year =         "1941",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Chronologically arranged, covering period 1518--1940,
                 and indexed by authors.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Book{Friedman:1942:MC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  edition =      "Third",
  pages =        "various",
  year =         "1942",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  alttitle =     "Restricted",
  annote =       "Each pt. has separate t.p. and numbering sequence. pt.
                 1. Monoalphabetic substitution systems --- pt. 2.
                 Simple varities of polyalphabetic substitution systems
                 --- pt. 3. Simpler varieties of aperiodic substitution
                 systems --- pt. 4. Transportation and fractionating
                 systems.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Communications, Military; Cryptography",
}

@Book{USASC:1942:ACC,
  author =       "{United States.Army.Signal Corps}",
  title =        "Articles on cryptography and cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "v + 316",
  year =         "1942",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: War Department. Office of the Chief
                 Signal Officer, Washington. ``Reprinted from the Signal
                 Corps Bulletin.''",
  keywords =     "Cryptography.",
}

@Book{Gaines:1943:ECS,
  author =       "Helen Fouche Gaines",
  title =        "Elementary cryptanalysis: a study of ciphers and their
                 solution",
  publisher =    "American Photographic Publishing Co.",
  address =      "Boston, MA, USA",
  pages =        "vi + 230 + 1",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Fourth printing. Errata slip tipped in before Preface.
                 Bound in gray cloth; stamped in red; top edges stained
                 red. Library of the American Cryptogram Association
                 (George C. Lamb Collection).",
  keywords =     "Ciphers; Cryptography.",
}

@Book{Hitt:1943:MSM,
  author =       "Parker Hitt",
  title =        "Manual for the solution of military ciphers \ldots{}
                 For use in {Donald D. Millikin}'s cryptography and
                 cryptanalysis classes",
  publisher =    "New York University Bookstore",
  address =      "New York, NY, USA",
  pages =        "viii + 101 + 22",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reprint. Galland, p. 90. Bound in blue paper wrappers;
                 printed in black. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  keywords =     "Ciphers; Cryptography.",
}

@Book{Millikin:1943:ECCa,
  author =       "Donald D. Millikin",
  title =        "Elementary cryptography and cryptanalysis",
  volume =       "56",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "vii + 132",
  year =         "1943",
  ISBN =         "0-89412-173-1 (soft cover), 0-89412-174-X (library
                 bound)",
  ISBN-13 =      "978-0-89412-173-9 (soft cover), 978-0-89412-174-6
                 (library bound)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "``\ldots{} reproduction of a classic text written and
                 used by Donald D. Millikin to introduce cryptography
                 and cryptanalysis to college students at New York
                 University in 1943.''",
  keywords =     "Ciphers; Cryptography",
}

@Book{Millikin:1943:ECCb,
  author =       "Donald D. Millikin",
  title =        "Elementary cryptography and cryptanalysis",
  publisher =    "New York University Bookstore",
  address =      "New York, NY, USA",
  edition =      "Second",
  pages =        "vii + 132 + 1 + 28",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy",
  keywords =     "Cryptography.",
}

@Book{Millikin:1943:ECCc,
  author =       "Donald D. Millikin",
  title =        "Elementary cryptography and cryptanalysis",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Third",
  pages =        "vii + 132",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy.",
  keywords =     "Cryptography.",
}

@Book{Smith:1943:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography, the science of secret writing",
  publisher =    pub-NORTON,
  address =      pub-NORTON:adr,
  pages =        "164",
  year =         "1943",
  LCCN =         "Z104 .S5",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Wolfe:1943:FCCa,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis",
  publisher =    "Brooklyn college press",
  address =      "Brooklyn, NY, USA",
  pages =        "??",
  year =         "1943",
  LCCN =         "Z104 .W6 1943 v. 1-3 (1943)",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reproduced from type-written copy. Lesson 11 (44 numb)
                 inserted after v. 2.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Wolfe:1943:FCCb,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis",
  publisher =    "University Press",
  address =      "Ann Arbor, MI, USA",
  pages =        "various",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy.",
  keywords =     "Cryptography.",
}

@Book{Wolfe:1943:FCCc,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis",
  publisher =    "Brooklyn College Press",
  address =      "Brooklyn, NY, USA",
  pages =        "various",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  acknowledgement = ack-nhfb,
  annote =       "Mimeographed on rectos only. Bound in printed paper
                 wrappers. Library of the American Cryptogram
                 Association (George C. Lamb Collection)",
  keywords =     "Ciphers; Cryptography",
}

@Book{Gaines:1944:CSC,
  author =       "Helen Fouche Gaines",
  title =        "Cryptanalysis: a study of ciphers and their solution",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  year =         "1944",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Codigos (Ou Codificacao)",
}

@Book{Smith:1944:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography: the science of secret writing",
  publisher =    "G. Allen and Unwin",
  address =      "London, UK",
  pages =        "164",
  year =         "1944",
  LCCN =         "Z104.S5",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@TechReport{Alexander:1945:CHG,
  author =       "C. H. O'D. Alexander",
  title =        "Cryptologic History of the {German Naval Enigma}",
  type =         "{GC\&CS} Report",
  number =       "HW 25/7",
  institution =  "British National Archives",
  address =      "????",
  year =         "1945",
  bibdate =      "Thu Mar 06 16:07:17 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Galland:1945:HABa,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  publisher =    inst-NORTHWESTERN-UNIVERSITY,
  address =      inst-NORTHWESTERN-UNIVERSITY:adr,
  pages =        "viii + 11 + 209",
  year =         "1945",
  LCCN =         "Z103.A1 G3",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``Works consulted and utilized'' in preface.",
  series =       "Northwestern University studies in the humanities no.
                 10",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Book{Galland:1945:HABb,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  number =       "10",
  publisher =    "AMS Press",
  address =      "New York, NY, USA",
  pages =        "viii + 209",
  year =         "1945",
  ISBN =         "0-404-50710-7",
  ISBN-13 =      "978-0-404-50710-7",
  LCCN =         "Z103.A1G3 1970",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Northwestern University humanities series; v. 10",
  acknowledgement = ack-nhfb,
  annote =       "Bound in blue cloth; stamped in gold. Library of the
                 American Cryptogram Association (George C. Lamb
                 Collection). Master microform held by: UnM. Microfilm.
                 Ann Arbor, Mich., University Microfilms International,
                 19--. 1 reel. 35 mm.",
  keywords =     "Cryptography --- Bibliography.",
}

@Book{Galland:1945:HABc,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  volume =       "71",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "209",
  year =         "1945",
  ISBN =         "0-89412-252-5",
  ISBN-13 =      "978-0-89412-252-1",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  alttitle =     "Bibliography of the literature of cryptology",
  keywords =     "Cryptography --- Bibliography.",
}

@TechReport{Good:1945:GRT,
  author =       "I. Jack Good and Donald Michie and Geoffrey Timms",
  title =        "General Report on {Tunny}",
  type =         "{GC\&CS} report",
  number =       "HW 25/4",
  institution =  "British National Archives",
  address =      "????",
  year =         "1945",
  bibdate =      "Thu Mar 06 16:13:00 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{Shannon:1945:MTC,
  author =       "Claude Shannon",
  title =        "A Mathematical Theory of Cryptography",
  type =         "Classified report",
  institution =  "Bell Laboratories",
  address =      "Murray Hill, NJ, USA",
  day =          "1",
  month =        sep,
  year =         "1945",
  bibdate =      "Mon Nov 04 18:32:51 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bstj1940.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "In this paper, the binary-choice measure was called
                 `alternative'; the term `bit' did not appear in print
                 until \cite{Shannon:1948:MTCa}.",
}

@Book{Baudouin:1946:ECF,
  author =       "Roger Baudouin",
  title =        "{{\'E}}l{\'e}ments de cryptographie. ({French})
                 [{Elements} of cryptography]",
  publisher =    "A. Pedone",
  address =      "Paris, France",
  pages =        "336",
  year =         "1946",
  bibdate =      "Tue Dec 26 07:17:01 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
}

@Article{Landers:1946:RPR,
  author =       "A. W. Landers",
  title =        "Recent Publications: Reviews: {{\em An Historical and
                 Analytical Bibliography of the Literature of
                 Cryptology}}, by {J. S. Galland}",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "53",
  number =       "6",
  pages =        "330--331",
  month =        jun # "\slash " # jul,
  year =         "1946",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:38:13 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{Bond:1947:FSC,
  author =       "Raymond T. (Raymond Tostevin) Bond",
  title =        "Famous stories of code and cipher",
  publisher =    "Rinehart and Company",
  address =      "New York; Toronto",
  pages =        "xxvi + 342",
  year =         "1947",
  LCCN =         "PS648.C6 B65",
  bibdate =      "Wed Nov 25 14:08:17 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in 1965 by Collier Books.",
  acknowledgement = ack-nhfb,
}

@Book{Sacco:1947:MC,
  author =       "Luigi Sacco",
  title =        "Manuale di crittografia. ({Italian}) [{Manual} of
                 cryptography]",
  publisher =    "Istituto Polygrafico Dello Stato",
  address =      "Roma, Italia",
  edition =      "Third",
  pages =        "xii + 374",
  year =         "1947",
  bibdate =      "Tue Dec 26 07:04:56 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "Italian",
}

@Article{Shannon:1948:MTCa,
  author =       "Claude Shannon",
  title =        "A Mathematical Theory of Communication",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "27",
  number =       "3",
  pages =        "379--423",
  month =        jul,
  year =         "1948",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Mon Nov 04 18:36:13 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "From the first page: ``If the base $2$ is used the
                 resulting units may be called binary digits, or more
                 briefly, {\em bits}, a word suggested by J. W.
                 Tukey.''. This is the first known printed instance of
                 the word `bit' with the meaning of binary digit.",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Article{Shannon:1948:MTCb,
  author =       "Claude Shannon",
  title =        "A Mathematical Theory of Communication (continued)",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "27",
  number =       "4",
  pages =        "623--656",
  month =        oct,
  year =         "1948",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Mon Nov 04 18:36:13 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Book{Zim:1948:CSW,
  author =       "Herbert S. Zim",
  title =        "Codes and secret writing",
  publisher =    "William Morrow",
  address =      "New York, NY, USA",
  pages =        "vi + 154",
  year =         "1948",
  LCCN =         "Z104 .Z5",
  bibdate =      "Wed Nov 25 14:13:48 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Children's book.",
}

@Article{Shannon:1949:CTS,
  author =       "Claude Shannon",
  title =        "Communication Theory of Secrecy Systems",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "28",
  number =       "4",
  pages =        "656--715",
  month =        "????",
  year =         "1949",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Sat Sep 25 10:52:04 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "A footnote on the initial page says: ``The material in
                 this paper appeared in a confidential report, `A
                 Mathematical Theory of Cryptography', dated Sept.~1,
                 1946, which has now been declassified.''.",
  URL =          "http://en.wikipedia.org/wiki/Communication_Theory_of_Secrecy_Systems;
                 http://www.cs.ucla.edu/~jkong/research/security/shannon1949.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  remark =       "The Wikipedia entry credits this paper as the
                 foundation of modern cryptography. Diffie and Hellman
                 \cite[page 653]{Diffie:1976:NDC} remark: ``Shannon
                 [this paper] showed that the one time pad systems,
                 which had been in use since the late twenties [1920s]
                 offered `perfect security' (a form of unconditional
                 security).''",
}

@Book{Sacco:1951:MCF,
  author =       "Luigi Sacco",
  title =        "Manuel de cryptographie. ({French}) [{Manual} of
                 cryptography]",
  publisher =    "Payot",
  address =      "Paris, France",
  pages =        "????",
  year =         "1951",
  bibdate =      "Tue Dec 26 07:10:55 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
  remark =       "French translation of third Italian edition.",
}

@Book{Andree:1952:C,
  author =       "Richard Vernon Andree",
  title =        "Cryptanalysis",
  publisher =    "Yeshiva College",
  address =      "New York, NY, USA",
  pages =        "5--16",
  year =         "1952",
  MRclass =      "09.0X",
  MRnumber =     "14,124d",
  bibdate =      "Wed Nov 25 14:18:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted from Scripta mathematica, Vol. 28, No. 1.
                 March, 1952.",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Article{Porges:1952:MNC,
  author =       "Arthur Porges",
  title =        "Mathematical Notes: a Continued Fraction Cipher",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "59",
  number =       "4",
  pages =        "236--236",
  month =        apr,
  year =         "1952",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:41 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{deVries:1953:SMC,
  author =       "M. {de Vries}",
  title =        "Statistical methods in cryptanalysis",
  publisher =    "Math. Centrum Amsterdam",
  address =      "Amsterdam, The Netherlands",
  pages =        "15",
  year =         "1953",
  MRclass =      "62.0X",
  MRnumber =     "15,974d",
  MRreviewer =   "H. Campaigne",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Rapport ZW 1953-014",
}

@TechReport{Behrens:1954:EUP,
  author =       "Carl E. Behrens",
  title =        "Effects on {U-boat} performance of intelligence from
                 decryption of {Allied} communication",
  type =         "Technical report OEG study",
  number =       "553",
  institution =  "Distributed by NTIS",
  address =      "Springfield, VA, USA",
  pages =        "various",
  year =         "1954",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "``Prepared by Operations Evaluation Group, Office of
                 the Chief of Naval Operations\ldots{}Prepared for:
                 Office of the Chief of Operations (Navy) 28 April
                 1954.'' On cover: ``distributed by Defense Technical
                 Information Center''.",
  keywords =     "Military intelligence; Military surveillance;
                 Submarine boats --- World War, 1939-1945",
}

@Book{Friedman:1955:CLS,
  author =       "William F. (William Frederick) Friedman and Elizebeth
                 Friedman and Louis B. (Louis Booker) Wright",
  title =        "The cryptologist looks at {Shakespeare}",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1955",
  LCCN =         "????",
  bibdate =      "Fri Dec 22 09:28:29 MST 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Original typescript, awarded Folger literary prize,
                 1955.",
  acknowledgement = ack-nhfb,
  author-dates = "Elizebeth Smith Friedman (1892--1980); William
                 Frederick Friedman (1891--1969)",
  remark =       "Published 1957 as \booktitle{The Shakespearean ciphers
                 examined}, in reduced form. Also: Copy of award from
                 American Shakespeare Theatre and Academy, 1958; Letter
                 from Mr. and Mrs. W. F. Friedman to Dr. Wright, June 9,
                 1959, with Dr. Wright's reply of June 12, 1959.",
  subject =      "Shakespeare, William; Authorship; Manuscripts;
                 Friedman, William F. (William Frederick);
                 Correspondence; Friedman, Elizebeth; Wright, Louis B.
                 (Louis Booker); Ciphers; Authorship; Ciphers",
  subject-dates = "William Shakespeare (1564--1616)",
}

@MastersThesis{Hoffer:1955:MAC,
  author =       "Carol M. Hoffer",
  title =        "On the mathematical approach to cryptanalysis",
  type =         "Thesis",
  school =       "University of South Dakota",
  address =      "Vermillion, SD, USA",
  pages =        "65",
  year =         "1955",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Book{Rand:1955:MRD,
  author =       "{Rand Corporation}",
  title =        "A Million Random Digits With 100,000 Normal Deviates",
  publisher =    "Free Press",
  address =      "Glencoe, IL, USA",
  pages =        "xxv + 400 + 200",
  year =         "1955",
  ISBN =         "0-02-925790-5",
  ISBN-13 =      "978-0-02-925790-6",
  LCCN =         "QA276.5 .R3",
  bibdate =      "Sat Aug 23 07:58:03 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in 1966 and 2001 \cite{Rand:2001:MRD}. See
                 also \cite{Tippett:1927:RSN}.",
  acknowledgement = ack-nhfb,
}

@Book{Sawirudin:1955:PND,
  author =       "Sawirudin",
  title =        "Pegawai negeri dan {PGP} baru",
  publisher =    "Badan Penerbitan Dewan Nasional SOBSI",
  address =      "Djakarta",
  edition =      "Cet. 1.",
  pages =        "93",
  year =         "1955",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Photocopy. [S.1.: s.n., 1958?].",
  keywords =     "Indonesia --- Officials and employees --- Salaries,
                 etc.",
}

@Book{Smith:1955:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography; the science of secret writing",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "164",
  year =         "1955",
  LCCN =         "Z104 .S6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``An unabridged republication of the first edition
                 with corrections.''",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Epstein:1956:FBC,
  author =       "Sam Epstein and Beryl Epstein",
  title =        "The first book of codes and ciphers",
  publisher =    "Franklin Watts",
  address =      "New York, NY, USA",
  year =         "1956",
  LCCN =         "Z104 .E68",
  bibdate =      "Wed Nov 25 14:12:11 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Pictures by Laszlo Roth",
  acknowledgement = ack-nhfb,
  annote =       "Children's book.",
}

@Book{Friedman:1956:CCC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Codes and ciphers (cryptology)",
  publisher =    "Encyclopaedia Britannica",
  address =      "Chicago, IL, USA",
  pages =        "8",
  year =         "1956",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Caption title. ``From Encyclopaedia Britannica,
                 copyright 1956.'' Text in double columns.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography; Cryptography --- Equipment and
                 supplies; Cryptography --- History",
}

@Book{Gaines:1956:CSC,
  author =       "Helen Fouch{\'e} Gaines",
  title =        "Cryptanalysis: a study of ciphers and their solution",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "237",
  year =         "1956",
  ISBN =         "0-486-20097-3",
  ISBN-13 =      "978-0-486-20097-2",
  LCCN =         "Z104 .G3 1956",
  MRclass =      "99.0X",
  MRnumber =     "19,519g",
  MRreviewer =   "H. Campaigne",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Formerly published under the title: Elementary
                 cryptanalysis.",
  acknowledgement = ack-nhfb,
  annote =       "Unabridged and corrected edition of \ldots{} [the
                 author's] Elementary cryptanalysis.",
  keywords =     "Ciphers; Cryptography",
}

@Article{Seaton:1956:THS,
  author =       "E. Seaton",
  title =        "{Thomas Hariot}'s Secret Script",
  journal =      j-AMBIX,
  volume =       "5",
  number =       "3--4",
  pages =        "111--114",
  year =         "1956",
  CODEN =        "AMBXAO",
  DOI =          "https://doi.org/10.1179/amb.1956.5.3-4.111",
  ISSN =         "0002-6980 (print), 1745-8234 (electronic)",
  ISSN-L =       "0002-6980",
  bibdate =      "Wed Apr 25 21:08:25 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ambix.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.tandfonline.com/doi/abs/10.1179/amb.1956.5.3-4.111",
  acknowledgement = ack-nhfb,
  ajournal =     "Ambix",
  fjournal =     "Ambix: Journal of the Society for the History of
                 Alchemy and Chemistry",
  journal-URL =  "http://www.tandfonline.com/loi/yamb20",
  onlinedate =   "18 Jul 2013",
}

@Article{Davison:1957:SCG,
  author =       "W. H. T. Davison and M. Gordon",
  title =        "Sorting for chemical groups using
                 {Gordon--Kendall--Davison} ciphers",
  journal =      j-AM-DOC,
  volume =       "8",
  number =       "3",
  pages =        "202--210",
  month =        jul,
  year =         "1957",
  CODEN =        "AMDOA7",
  DOI =          "https://doi.org/10.1002/asi.5090080305",
  ISSN =         "0096-946X",
  ISSN-L =       "0096-946X",
  bibdate =      "Fri Sep 11 06:21:07 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/amdoc.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "American Documentation",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)2330-1643/",
  onlinedate =   "19 Apr 2007",
}

@Book{Friedman:1957:SCE,
  author =       "William F. (William Frederick) Friedman and Elizebeth
                 S. (Elizebeth Smith) Friedman",
  title =        "The {Shakespearean} Ciphers Examined: an analysis of
                 cryptographic systems used as evidence that some author
                 other than {William Shakespeare} wrote the plays
                 commonly attributed to him",
  publisher =    pub-CUP,
  address =      pub-CUP:adr,
  pages =        "4 + vii--xvi + 1 + 302 + 1",
  year =         "1957",
  LCCN =         "PR2937 .F7",
  bibdate =      "Wed Nov 25 14:04:49 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  tableofcontents = "The great controversy \\
                 Cryptology as a science \\
                 Ignatius Donnelly and The great cryptogram \\
                 The cipher in the epitaph \\
                 Dr. Owen and his word cipher \\
                 A miscellany \\
                 Acrostics and anagrams \\
                 The long word and other anagrams \\
                 The string cipher of William Stone Booth \\
                 Walter Conrad Arensberg \\
                 The strange story of Dr. Cunningham and Maria Bauer \\
                 Odd numbers \\
                 The Bilateral Cipher and Elizabeth Wells Gallup \\
                 Mrs. Gallup and Colonel Fabyan \\
                 Elizabethan printing and its bearing on the Bilateral
                 Cipher \\
                 A study of the Gallup decipherments \\
                 General Cartier and the Bilateral Cipher \\
                 The Bilateral Cipher: experiments and deductions \\
                 Conclusions",
}

@Book{Gleason:1957:ECP,
  author =       "Andrew M. Gleason",
  title =        "Elementary course in probability",
  publisher =    "National Security Agency, Office of Research and
                 Development, Mathematical Research Division",
  address =      "Washington, DC, USA",
  edition =      "Second",
  pages =        "various",
  year =         "1957",
  LCCN =         "Z104 .G53 1957",
  bibdate =      "Wed May 11 23:23:17 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Revised by Walter F. Penney and Ronald E. Wyllys.",
  acknowledgement = ack-nhfb,
  subject =      "cryptography; probabilities",
}

@InCollection{Gamow:1958:CAP,
  author =       "George Gamow and Martynas Y{\c{c}}as",
  booktitle =    "{Das Universum. Unser Bild vom Weltall}. ({German})
                 [{The Universe}. {Our} picture of the {Universe}]",
  title =        "The cryptographic approach to the problem of protein
                 synthesis",
  publisher =    "????",
  address =      "Wiesbaden, Germany",
  pages =        "????",
  year =         "1958",
  LCCN =         "",
  bibdate =      "Sat Jun 02 09:24:50 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/g/gamow-george.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Levine:1958:VMS,
  author =       "Jack Levine",
  title =        "Variable Matrix Substitution in Algebraic
                 Cryptography",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "65",
  number =       "3",
  pages =        "170--179",
  month =        mar,
  year =         "1958",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:38:55 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{Bowers:1959:DSP,
  author =       "William Maxwell Bowers",
  title =        "Digraphic substitution: the {Playfair} cipher, the
                 four square cipher",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "46",
  year =         "1959",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 1",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers.",
}

@Book{Anonymous:1960:CNH,
  author =       "Anonymous",
  title =        "Cryptanalysis, a new horizon, by {Dr. Cryptogram}
                 [pseudonym]",
  publisher =    "American Cryptogram Association",
  address =      "New York, NY, USA (??)",
  pages =        "10 + 1 + 27",
  year =         "1960",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "An address to the Annual Convention of the American
                 Cryptogram Association, 1960. Printed by a spirit
                 process on rectos only. In plastic binder. Library of
                 the American Cryptogram Association (George C. Lamb
                 Collection).",
  keywords =     "Cryptography.",
}

@Book{Bowers:1960:BC,
  author =       "William Maxwell Bowers",
  title =        "The bifid cipher",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "48",
  year =         "1960",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 2",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers.",
}

@Book{Bowers:1960:PC,
  author =       "William Maxwell Bowers and William G. Bryan",
  title =        "Practical cryptanalysis",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "??",
  year =         "1960",
  LCCN =         "Z103 .B6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Bound in printed paper wrappers. Contents: v. 1.
                 Digraphic substitution; the playfair cypher, the four
                 square cypher.-- v. 2. The Bifid cipher. --- v. 3. The
                 Trifid cipher.-- v. 4. Cryptographic ABC'S;
                 Substitution and transposition ciphers, by William G.
                 Bryan. --- v. 5. Cryptographic ABC's; periodic ciphers,
                 miscellaneous, by William G. Bryan.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Bowers:1960:TC,
  author =       "William Maxwell Bowers",
  title =        "The trifid cipher",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "ix + 55",
  year =         "1960",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 3",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers.",
}

@Article{Mandelbrot:1960:BRJa,
  author =       "Beno{\^\i}t Mandelbrot",
  title =        "Book Review: {John Chadwick, \booktitle{The
                 Decipherment of Linear B} (1958) Cambridge University
                 Press}",
  journal =      j-INF-CONTROL,
  volume =       "3",
  number =       "1",
  pages =        "95--96",
  month =        mar,
  year =         "1960",
  CODEN =        "IFCNA4",
  DOI =          "https://doi.org/10.1016/S0019-9958(60)90347-8",
  ISSN =         "0019-9958 (print), 1878-2981 (electronic)",
  ISSN-L =       "0019-9958",
  bibdate =      "Sat Sep 8 16:48:41 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/m/mandelbrot-benoit.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0019995860903478",
  acknowledgement = ack-nhfb,
  fjournal =     "Information and Control",
}

@Article{Pelta:1960:SP,
  author =       "Harold N. Pelta",
  title =        "Selfcipher: Programming",
  journal =      j-CACM,
  volume =       "3",
  number =       "2",
  pages =        "83--83",
  month =        feb,
  year =         "1960",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Nov 25 18:19:25 MST 2005",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm3.html#Pelta60;
                 http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm1960.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  oldlabel =     "Pelta60",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Pelta60",
}

@Book{Barker:1961:CSC,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of the single columnar transposition
                 cipher",
  publisher =    "C. E. Tuttle Co.",
  address =      "Rutland, VT, USA",
  pages =        "x + 1 + 140",
  year =         "1961",
  LCCN =         "Z103 Z32",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "First edition. Bound in tan cloth; stamped in black;
                 red endpapers. Dust jacket. Library of The American
                 Cryptogram Association (George C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Article{Levine:1961:SAH,
  author =       "Jack Levine",
  title =        "Some Applications of High-Speed Computers to the Case
                 $ n = 2 $ of Algebraic Cryptography",
  journal =      j-MATH-COMPUT,
  volume =       "15",
  number =       "75",
  pages =        "254--260",
  month =        jul,
  year =         "1961",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcomp1960.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Article{Levine:1961:SECa,
  author =       "Jack Levine",
  title =        "Some Elementary Cryptanalysis of Algebraic
                 Cryptography",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "68",
  number =       "5",
  pages =        "411--418",
  month =        may,
  year =         "1961",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  MRclass =      "94.10",
  MRnumber =     "23 \#B2111",
  bibdate =      "Mon Jun 28 12:36:19 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{Levine:1961:SECb,
  author =       "Jack Levine",
  title =        "Some elementary cryptanalysis of algebraic
                 cryptography",
  publisher =    "Mathematical Association of America",
  address =      "Buffalo, NY, USA",
  pages =        "411--418",
  year =         "1961",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint from American Mathematical Monthly, vol. 68,
                 no. 5, May 1961.",
  acknowledgement = ack-nhfb,
  annote =       "Bound in blue paper wrappers; printed in black.
                 Library of the American Cryptogram Association (George
                 C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Book{Shulman:1961:GC,
  author =       "David Shulman and Joseph Weintraub",
  title =        "A glossary of cryptography",
  publisher =    "Crypto Press",
  address =      "New York, NY, USA",
  pages =        "various",
  year =         "1961",
  LCCN =         "Z103 .S48",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Handbook of cryptography; section 1",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- terminology",
}

@Book{Friedman:1963:SLC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Six lectures on cryptology",
  publisher =    "????",
  address =      "????",
  pages =        "iii + 182",
  year =         "1963",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "SRH-004.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography",
}

@Book{Kahn:1963:PNU,
  author =       "David Kahn",
  title =        "Plaintext in the new unabridged: an examination of the
                 definitions on cryptology in {Webster's Third New
                 International Dictionary}",
  publisher =    "Crypto Press",
  address =      "New York, NY, USA",
  pages =        "35",
  year =         "1963",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography --- Terminology; language; Webster's
                 third new international dictionary of the English",
}

@Book{Thompson:1963:SDE,
  author =       "James Westfall Thompson and Saul Kussiel Padover",
  title =        "Secret diplomacy; espionage and cryptography,
                 1500-1815",
  publisher =    "F. Ungar Pub. Co",
  address =      "New York, NY, USA",
  pages =        "290",
  year =         "1963",
  LCCN =         "JX1648 .T5 1963",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``Appendix: Cryptography'': p. 253--263. Bibliography:
                 p. 265--282.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- history; diplomacy --- history;
                 Europe --- politics and government; secret service",
}

@Article{Zafiropulo:1963:RAD,
  author =       "Jean Zafiropulo",
  title =        "Le r{\^o}le de l'analogie dans le d{\'e}chiffrement de
                 l'{\'e}criture myc{\'e}nienne lin{\'e}aire {B}.
                 ({French}) [{The} role of analogy in deciphering
                 {Mycenaean} linear script {B}]",
  journal =      j-DIALECTICA,
  volume =       "17",
  number =       "4",
  pages =        "307--327",
  month =        dec,
  year =         "1963",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1111/j.1746-8361.1963.tb00466.x",
  ISSN =         "0012-2017 (print), 1746-8361 (electronic)",
  ISSN-L =       "0012-2017",
  bibdate =      "Thu Jul 20 09:32:38 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dialectica.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dialectica: International Review of Philosophy of
                 Knowledge",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1746-8361",
  language =     "French",
}

@Book{Laffin:1964:CCS,
  author =       "John Laffin",
  title =        "Codes and ciphers: secret writing through the ages",
  publisher =    "Abelard-Schuman",
  address =      "????",
  pages =        "164",
  year =         "1964",
  LCCN =         "",
  bibdate =      "Sat Apr 20 12:01:11 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Stout:1965:DRN,
  author =       "Rex Stout",
  title =        "The Doorbell Rang: a Nero Wolfe Novel",
  publisher =    "????",
  address =      "????",
  pages =        "??",
  year =         "1965",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 5]{Rivest:1998:CWC}.",
}

@Article{Kahn:1966:MC,
  author =       "David Kahn",
  title =        "Modern Cryptology",
  journal =      j-SCI-AMER,
  volume =       "215",
  number =       "1",
  pages =        "38--46",
  month =        jul,
  year =         "1966",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican0766-38",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 15:58:23 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1960.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v215/n1/pdf/scientificamerican0766-38.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Sinkov:1966:ECM,
  author =       "Abraham Sinkov",
  title =        "Elementary cryptanalysis: a mathematical approach",
  volume =       "22",
  publisher =    pub-MATH-ASSOC-AMER,
  address =      pub-MATH-ASSOC-AMER:adr,
  pages =        "ix + 222",
  year =         "1966",
  ISBN =         "0-88385-622-0",
  ISBN-13 =      "978-0-88385-622-2",
  LCCN =         "Z 104 S47 1980",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "With a supplement by Paul L. Irwin. Reissued in 1975
                 and 1980.",
  series =       "New mathematical library",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Tuchman:1966:ZT,
  author =       "Barbara W. Tuchman",
  title =        "The {Zimmermann} telegram",
  publisher =    pub-MACMILLAN,
  address =      pub-MACMILLAN:adr,
  pages =        "xii + 244",
  year =         "1966",
  LCCN =         "D511 .T77 1966",
  bibdate =      "Wed Nov 25 13:57:39 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of original 1958 edition. Kahn
                 \cite{Kahn:1996:CSS} describes this book as
                 ``recount[ing] the political effects of the most
                 important cryptogram solution in history''.",
  acknowledgement = ack-nhfb,
}

@Book{Bowers:1967:PC,
  author =       "William Maxwell Bowers and William G. Bryan",
  title =        "Practical cryptanalysis",
  publisher =    "American Cryptogrm Association",
  address =      "Greenfield, MA, USA",
  pages =        "various",
  year =         "1967",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Bound in printed paper wrappers. From the library of
                 the American Cryptogram Association. (The George C.
                 Lamb Collection.) V. I. Digraphic substitution, by
                 Bowers.-- V. II. The Bifid cipher, by Bowers.-- V. III.
                 The Trifid cipher.-- V. IV and V. ``Cryptographic
                 ABC'S'' by William G. Bryan.",
  keywords =     "Cryptography.",
}

@Article{Brillhart:1967:SFR,
  author =       "John Brillhart and J. L. Selfridge",
  title =        "Some Factorizations of $ 2^n \pm 1 $ and Related
                 Results",
  journal =      j-MATH-COMPUT,
  volume =       "21",
  number =       "97",
  pages =        "87--96",
  month =        jan,
  year =         "1967",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Book{Bryan:1967:CA,
  author =       "William G. Bryan",
  title =        "Cryptographic {ABC}'s",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  year =         "1967",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 4, 5",
  acknowledgement = ack-nhfb,
  annote =       "v. 1. Substitution and transposition ciphers.--v. 2.
                 Periodic ciphers. Miscellaneous.",
  keywords =     "Ciphers.",
}

@Book{Farago:1967:BSS,
  author =       "Ladislas Farago",
  title =        "The broken seal: the story of {Operation Magic} and
                 the {Pearl Harbor} disaster",
  publisher =    pub-RANDOM,
  address =      pub-RANDOM:adr,
  pages =        "439",
  year =         "1967",
  LCCN =         "D742.U5 F3",
  bibdate =      "Thu Apr 29 18:01:53 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also reprint \cite{Farago:1969:BSS}.",
  acknowledgement = ack-nhfb,
}

@Book{Golomb:1967:SRS,
  author =       "S. Golomb",
  title =        "Shift Register Sequences",
  publisher =    pub-HOLDEN-DAY,
  address =      pub-HOLDEN-DAY:adr,
  pages =        "xiv + 224",
  year =         "1967",
  LCCN =         "QA267.5.S4 G6",
  bibdate =      "Mon Nov 30 08:47:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Portions co-authored with Lloyd R. Welch, Richard M.
                 Goldstein, and Alfred W. Hales.",
  acknowledgement = ack-nhfb,
}

@Book{Kahn:1967:CSSa,
  author =       "David Kahn",
  title =        "The codebreakers: the story of secret writing",
  publisher =    pub-MACMILLAN,
  address =      pub-MACMILLAN:adr,
  pages =        "xvi + 1164",
  year =         "1967",
  LCCN =         "Z103 .K28",
  bibdate =      "Tue Dec 01 08:31:37 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-c.html#cryptography",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1000.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Book{Kahn:1967:CSSb,
  author =       "David Kahn",
  title =        "The codebreakers: the story of secret writing",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  pages =        "xvi + 1164",
  year =         "1967",
  LCCN =         "Z103 .K28 1967",
  bibdate =      "Tue Dec 01 08:35:10 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Kullback:1967:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis",
  number =       "14",
  publisher =    "National Archives",
  address =      "Washington, DC, USA",
  edition =      "Revised",
  pages =        "iii + 194",
  year =         "1967",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Technical literature series monograph",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
  remark =       "From \cite{Anscombe:2003:QCC}: ``A bookseller
                 description [of this book]: `This classic text provides
                 various statistical tests: the Chi Test, which affords
                 a quantitative measure of the degree of similarity
                 between two distributions, and the Phi Test, which
                 provides a quantitative measurement of the degree of
                 non-randomness of a distribution. Text includes
                 numerous tabulations of frequency data in other
                 languages.'.''",
}

@Book{Monge:1967:NMC,
  author =       "Alf Monge and O. G. Landsverk",
  title =        "Norse medieval cryptography in runic carvings",
  publisher =    "Norseman Press",
  address =      "Glendale, CA, USA",
  pages =        "224",
  year =         "1967",
  LCCN =         "E105 .M65",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Includes bibliographies.",
  acknowledgement = ack-nhfb,
  keywords =     "America --- discovery and exploration --- Norse;
                 cryptography; runes",
}

@Article{Ayoub:1968:EEK,
  author =       "F. Ayoub",
  title =        "Erratum: Encryption with keyed random permutations",
  journal =      j-ELECT-LETTERS,
  volume =       "17",
  number =       "??",
  pages =        "??--??",
  month =        feb,
  year =         "1968",
  CODEN =        "ELLEAK",
  DOI =          "https://doi.org/10.1049/el:19810541",
  ISSN =         "0013-5194 (print), 1350-911X (electronic)",
  ISSN-L =       "0013-5194",
  bibdate =      "Fri Dec 30 16:39:43 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4246020",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220",
  fjournal =     "Electronics Letters",
}

@Article{Ayoub:1968:EKR,
  author =       "F. Ayoub",
  title =        "Encryption with keyed random permutations",
  journal =      j-ELECT-LETTERS,
  volume =       "17",
  number =       "??",
  pages =        "583--585",
  month =        feb,
  year =         "1968",
  CODEN =        "ELLEAK",
  DOI =          "https://doi.org/10.1049/el:19810411",
  ISSN =         "0013-5194 (print), 1350-911X (electronic)",
  ISSN-L =       "0013-5194",
  bibdate =      "Fri Dec 30 16:39:40 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4245887",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220",
  fjournal =     "Electronics Letters",
}

@Book{Sinkov:1968:ECMa,
  author =       "Abraham Sinkov",
  title =        "Elementary cryptanalysis: a mathematical approach",
  volume =       "22",
  publisher =    pub-RANDOM,
  address =      pub-RANDOM:adr,
  pages =        "ix + 189",
  year =         "1968",
  LCCN =         "QA11 .N5 v.22",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "New mathematical library",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Sinkov:1968:ECMb,
  author =       "Abraham Sinkov",
  title =        "Elementary cryptanalysis: a mathematical approach",
  volume =       "22",
  publisher =    pub-MATH-ASSOC-AMER,
  address =      pub-MATH-ASSOC-AMER:adr,
  pages =        "ix + 222",
  year =         "1968",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "New mathematical library",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Wilkes:1968:TSCa,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  volume =       "5",
  publisher =    "Macdonald and Co.",
  address =      "London, UK",
  pages =        "vii + 102",
  year =         "1968",
  ISBN =         "0-356-02426-1",
  ISBN-13 =      "978-0-356-02426-4",
  LCCN =         "QA76.5 .W523 1968b",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Macdonald computer monographs",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography.",
  subject =      "Time-sharing computer systems",
}

@Book{Wilkes:1968:TSCb,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  volume =       "5",
  publisher =    "American Elsevier Pub. Co.",
  address =      "New York, NY, USA",
  pages =        "102",
  year =         "1968",
  LCCN =         "QA76.5 .W523",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Computer monograph series",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography.",
  subject =      "Time-sharing computer systems",
}

@Book{Farago:1969:BSS,
  author =       "Ladislas Farago",
  title =        "The broken seal: the story of {Operation Magic} and
                 the {Pearl Harbor} disaster",
  publisher =    "Mayflower",
  address =      "London, UK",
  pages =        "415",
  year =         "1969",
  LCCN =         "D742.U5 F3",
  bibdate =      "Wed Nov 25 14:00:32 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of \cite{Farago:1967:BSS}.",
  acknowledgement = ack-nhfb,
}

@Book{Knuth:1969:SA,
  author =       "Donald E. Knuth",
  title =        "Seminumerical Algorithms",
  volume =       "2",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xi + 624",
  year =         "1969",
  ISBN =         "0-201-03802-1",
  ISBN-13 =      "978-0-201-03802-6",
  LCCN =         "QA76.5 .K57",
  MRclass =      "68.00 (65.00)",
  MRnumber =     "44 \#3531",
  MRreviewer =   "M. Muller",
  bibdate =      "Wed Dec 15 15:47:38 1993",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/benfords-law.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  price =        "US\$19.75",
  series =       "The Art of Computer Programming",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Handschuh:1998:SCC}.",
  remark =       "Benford's Law is discussed on pp. 219--229.",
  tableofcontents = "3: Random Numbers \\
                 3.1. Introduction / 1 \\
                 3.2. Generating Uniform Random Numbers / 9 \\
                 3.2.1. The Linear Congruential Method / 9 \\
                 3.2.1.1. Choice of modulus / 11 \\
                 3.2.1.2. Choice of multiplier / 15 \\
                 3.2.1.3. Potency / 21 \\
                 3.2.2. Other Methods / 25 \\
                 3.3. Statistical Tests / 34 \\
                 3.3.1. General Test Procedures for Studying Random Data
                 / 35 \\
                 3.3.2. Empirical Tests / 54 \\
                 *3.3.3. Theoretical Tests / 69 \\
                 3.3.4. The Spectral Test / 82 \\
                 3.4. Other Types of Random Quantities / 100 \\
                 3.4.1. Numerical Distributions / 101 \\
                 3.4.2. Random Sampling and Shuffling / 121 \\
                 *3.5. What is a Random Sequence? / 127 \\
                 3.6. Summary / 155 \\
                 4: Arithmetic \\
                 4.1. Positional Number Systems / 162 \\
                 4.2. Floating-Point Arithmetic / 180 \\
                 4.2.1. Single-Precision Calculations / 180 \\
                 4.2.2. Accuracy of Floating-Point Arithmetic / 195 \\
                 *4.2.3. Double-Precision Calculations / 210 \\
                 4.2.4. Statistical Distribution / 218 \\
                 4.3. Multiple-Precision Arithmetic / 229 \\
                 4.3.1. The Classical Algorithms / 229 \\
                 *4.3.2. Modular Arithmetic / 248 \\
                 *4.3.3. How Fast Can We Multiply? / 258 \\
                 4.4. Radix Conversion / 280 \\
                 4.5. Rational Arithmetic / 290 \\
                 4.5.1. Fractions / 290 \\
                 4.5.2. The Greatest Common Divisor / 293 \\
                 *4.5.3. Analysis of Euclid's Algorithm / 316 \\
                 4.5.4. Factoring into Primes / 339 \\
                 4.6. Polynomial Arithmetic / 360 \\
                 4.6.1. Division of Polynomials / 363 \\
                 *4.6.2. Factorization of Polynomials / 381 \\
                 4.6.3. Evaluation of Powers / 398 \\
                 4.6.4. Evaluation of Polynomials / 422 \\
                 *4.7. Manipulation of Power Series / 444 \\
                 Answers to Exercises / 452 \\
                 Appendix A: MIX / 565 \\
                 1. Description of MIX / 565 \\
                 2. The MIX Assembly Language / 584 \\
                 Appendix B: Tables of Numerical Quantities / 596 \\
                 1. Fundamental Constants (decimal) / 596 \\
                 2. Fundamental Constants (octal) / 597 \\
                 3. Harmonic Numbers, Bernoulli Numbers, Fibonacci
                 Numbers / 598 \\
                 Appendix C: Index to Notations / 600 \\
                 Index and Glossary / 605",
  xxyear =       "{\noopsort{1968c}}1969",
}

@Book{Knuth:1969:SNM,
  author =       "Donald E. Knuth",
  title =        "Semi\-nu\-mer\-i\-cal Algorithms",
  volume =       "2",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xi + 624",
  year =         "1969",
  ISBN =         "0-201-03802-1",
  ISBN-13 =      "978-0-201-03802-6",
  LCCN =         "QA76.5 .K57",
  bibdate =      "Wed Dec 15 15:47:38 1993",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See pages 248--250.",
  price =        "US\$19.75",
  series =       "The Art of Computer Programming",
  acknowledgement = ack-nhfb,
}

@Article{Leighton:1969:SCA,
  author =       "Albert C. Leighton",
  title =        "Secret Communication among the {Greeks} and {Romans}",
  journal =      j-TECH-CULTURE,
  volume =       "10",
  number =       "2",
  pages =        "139--154",
  month =        apr,
  year =         "1969",
  CODEN =        "TECUA3",
  DOI =          "https://doi.org/10.1353/tech.1969.a892350",
  ISSN =         "0040-165X (print), 1097-3729 (electronic)",
  ISSN-L =       "0040-165X",
  bibdate =      "Sat Sep 30 08:23:14 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/techculture1960.bib",
  URL =          "https://muse.jhu.edu/pub/1/article/892350/pdf",
  acknowledgement = ack-nhfb,
  ajournal =     "Tech. Culture",
  fjournal =     "Technology and Culture",
  journal-URL =  "https://muse.jhu.edu/journal/194",
}

@Article{Schroeder:1969:IC,
  author =       "M. R. Schroeder",
  title =        "Images from computers",
  journal =      j-IEEE-SPECTRUM,
  volume =       "6",
  number =       "3",
  pages =        "66--78",
  month =        mar,
  year =         "1969",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1969.5214005",
  ISSN =         "1939-9340",
  ISSN-L =       "0018-9235",
  bibdate =      "Wed Jan 15 11:58:06 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1960.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Application software; Brightness; Cryptography;
                 Laboratories; Optical computing; Optical films; Optical
                 materials; Optical signal processing; Spectrogram;
                 Telephony",
}

@Article{VanTassel:1969:ACT,
  author =       "Dennie {Van Tassel}",
  title =        "Advanced Cryptographic Techniques for Computers",
  journal =      j-CACM,
  volume =       "12",
  number =       "12",
  pages =        "664--665",
  month =        dec,
  year =         "1969",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Mar 24 21:38:51 MST 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1960.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Cryptographic techniques which can be used to maintain
                 the confidentiality of information processed by
                 computers are dealt with. Special emphasis is paid to
                 the unique characteristics of computer files that make
                 many cryptographic methods of little use. Relative
                 security, costs, and preferred methods are included in
                 this paper.",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "San Jose State Coll., CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "ciphers secrecy systems; codes; computational
                 linguistics; confidential information processing;
                 cryptanalysis; cryptographic; security of data;
                 security systems",
}

@Book{Winterbotham:1969:SP,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "Secret and personal",
  publisher =    "Kimber",
  address =      "London, UK",
  pages =        "192",
  year =         "1969",
  ISBN =         "0-7183-0321-0",
  ISBN-13 =      "978-0-7183-0321-1",
  LCCN =         "D810.S7 W48; D810.S7 W73",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
  subject =      "World War, 1939--1945; Secret service; Great Britain",
}

@TechReport{Feistel:1970:CCD,
  author =       "Horst Feistel",
  title =        "Cryptographic coding for data-bank privacy",
  type =         "Research Report",
  number =       "RC-2827",
  institution =  inst-IBM-WATSON,
  address =      inst-IBM-WATSON:adr,
  day =          "18",
  month =        mar,
  year =         "1970",
  bibdate =      "Sat Jun 10 11:33:02 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Galland:1970:HAB,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  number =       "10",
  publisher =    "AMS Press",
  address =      "New York, NY, USA",
  pages =        "viii + 209",
  year =         "1970",
  ISBN =         "0-404-50710-7",
  ISBN-13 =      "978-0-404-50710-7",
  LCCN =         "Z103.A1 G3 1970",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Northwestern University studies in the humanities",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Article{Gingerich:1970:BRB,
  author =       "Owen Gingerich",
  title =        "Book Review: {{\booktitle{The Codebreakers. The Story
                 of Secret Writing}} by David Kahn}",
  journal =      j-ISIS,
  volume =       "61",
  number =       "3",
  pages =        "405--406",
  month =        "Autumn",
  year =         "1970",
  CODEN =        "ISISA4",
  ISSN =         "0021-1753 (print), 1545-6994 (electronic)",
  ISSN-L =       "0021-1753",
  bibdate =      "Tue Jul 30 21:28:42 MDT 2013",
  bibsource =    "http://www.jstor.org/action/showPublication?journalCode=isis;
                 http://www.jstor.org/stable/i302289;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/isis1970.bib",
  URL =          "http://www.jstor.org/stable/229701",
  acknowledgement = ack-nhfb,
  fjournal =     "Isis",
  journal-URL =  "http://www.jstor.org/page/journal/isis/about.html",
}

@Book{Marsh:1970:CSS,
  author =       "D. C. B. Marsh",
  title =        "Cryptology as a senior seminar topic",
  publisher =    "Mathematical Association of America",
  address =      "Buffalo, NY, USA",
  pages =        "761--764",
  year =         "1970",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint from American Mathematical Monthly, vol. 77,
                 no. 7, August-September, 1970.",
  acknowledgement = ack-nhfb,
  annote =       "Library of the American Cryptogram Association (George
                 C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Article{Marsh:1970:MEC,
  author =       "D. C. B. Marsh",
  title =        "Mathematical Education: Cryptology as a Senior Seminar
                 Topic",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "77",
  number =       "7",
  pages =        "761--764",
  month =        aug # "\slash " # sep,
  year =         "1970",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:02 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{Stark:1970:INT,
  author =       "Harold M. Stark",
  title =        "An introduction to number theory",
  publisher =    "Markham Publishing Company",
  address =      "Chicago, IL, USA",
  pages =        "x + 347",
  year =         "1970",
  ISBN =         "0-8410-1014-5",
  ISBN-13 =      "978-0-8410-1014-7",
  LCCN =         "QA241 .S72",
  bibdate =      "Fri Jun 24 14:24:21 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Markham mathematics series",
  acknowledgement = ack-nhfb,
  subject =      "Number theory",
}

@TechReport{Tuckerman:1970:SVV,
  author =       "Bryant Tuckerman",
  title =        "A study of the {Vigen{\'e}re--Vernam} single and
                 multiple loop enciphering systems",
  type =         "Research Report",
  number =       "RC-2879",
  institution =  inst-IBM-WATSON,
  address =      inst-IBM-WATSON:adr,
  day =          "14",
  month =        may,
  year =         "1970",
  bibdate =      "Sat Jun 10 12:30:19 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Manual{USDOS:1970:BC,
  author =       "{United States.Dept.of the Army}",
  title =        "Basic cryptanalysis",
  type =         "Field Manual",
  number =       "FM 34-40-2",
  organization = pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "various",
  day =          "13",
  month =        sep,
  year =         "1970",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  alttitle =     "TM 32-220 20 August 1970.",
  keywords =     "Cryptography --- Military aspects --- Handbooks,
                 manuals, etc; Security systems --- Military aspects ---
                 Handbooks, manuals, etc; United States. --- Army ---
                 Handbooks, manuals, etc",
}

@Book{Wolfe:1970:SWC,
  author =       "James Raymond Wolfe",
  title =        "Secret writing: the craft of the cryptographer",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "192",
  year =         "1970",
  LCCN =         "652.8 W",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Explains the distinction between ciphers and codes and
                 describes their past and present use in secret
                 communications.",
  acknowledgement = ack-nhfb,
  annote =       "High-school level book.",
  keywords =     "ciphers; cryptography",
}

@Article{Campaigne:1971:REC,
  author =       "H. H. Campaigne",
  title =        "Reviews: {{\em Elementary Cryptanalysis --- A
                 Mathematical Approach}}, by {Abraham Sinkov}",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "78",
  number =       "4",
  pages =        "423--423",
  month =        apr,
  year =         "1971",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:19 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Book{DAgapeyeff:1971:CC,
  author =       "Alexander D'Agapeyeff",
  title =        "Codes and ciphers",
  publisher =    "Gryphon Books",
  address =      "Ann Arbor, MI, USA",
  pages =        "160",
  year =         "1971",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "Z103 .D35 1971",
  bibdate =      "Sat Apr 20 13:40:57 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of \cite{DAgapeyeff:1939:CC}.",
  acknowledgement = ack-nhfb,
}

@Article{Girdansky:1971:DPC,
  author =       "M. B. Girdansky",
  title =        "Data privacy --- cryptology and the computer at {IBM
                 Research},",
  journal =      "IBM Research Reports",
  volume =       "7",
  number =       "4",
  pages =        "12",
  year =         "1971",
  bibdate =      "Sat Jun 10 11:41:21 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hammer:1971:SSC,
  author =       "Carl Hammer",
  title =        "Signature Simulation and Certain Cryptographic Codes",
  journal =      j-CACM,
  volume =       "14",
  number =       "1",
  pages =        "3--14",
  month =        jan,
  year =         "1971",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Three cyphers allegedly authored by Thomas Jefferson
                 Beale in 1822 have been the subject of intensive study
                 for over 100 years. Generations of cryptanalysts have
                 expended untold man-years, thus far without success,
                 attempting tode code them; vast armies of fortune
                 hunters and treasure seekers have devoted Herculean
                 labors to digging up the rolling hills of Virginia
                 trying to locate the promised bonanza. \par

                 The history of pertinent activities would fill volumes,
                 yet serious students of cryptography have always had
                 nagging doubts about the cyphers' authenticity. It has
                 been alleged that the ``known solution'' to Cypher
                 Number Two: 115, 73, 24, 818, 37, 52, 49, \ldots{} (``I
                 have deposited in the County of Bedford about four
                 miles from Buford's in an excavation or vault
                 \ldots{}'') with the aid of an unsanitized version of
                 the Declaration of Independence was merely a superb,
                 imaginative, and grandiose hoax perpetrated ages ago
                 for whatever reasons. Modern computer technology could
                 obviously perform signature analyses the process of
                 encoding itself so as to yield new clues and deeper
                 insights into their construction. For the benefit of
                 the uninitiated, the encoding method used in the second
                 cypher employs a specified document whose words are
                 simply numbered consecutively, and first letters of
                 these words are sought out at random to match the
                 letters of these words are sought out at random to
                 match the letters of the clear text or message.
                 \par

                 The sequence of numbers corresponding to these matches
                 is then written down as the final code. While
                 primitive, the process has the advantage of relative
                 security until the source document becomes known; at
                 that moment the cypher can be decoded even by second
                 graders. The work now completed with the help of our
                 UNIVAC 1108 includes numerous analytical studies of the
                 Beale cyphers and various types of simulations.
                 \par

                 For example, we have turned the entire process of
                 simulated encoding by various schemes over to the
                 machine and analyzed the signatures of these synthetic
                 codes; we have also encoded various messages by hand,
                 using different texts and a variety of methods to
                 obtain their signatures. These simulations provide
                 convincing evidence that the signatures are both
                 process and data dependent; they indicate also very
                 strongly that Mr. Beale's cyphers are for real and that
                 it is merely a matter of time before someone finds the
                 correct source document and locates the right vault in
                 the common-wealth of Virginia.",
  acknowledgement = ack-nhfb,
  classcodes =   "B6120B (Codes); C6130 (Data handling techniques)",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "Beale Cyphers codes; codes; computer applications;
                 computer signature simulation; cryptanalysis; cyphers;
                 Declaration of Independence; decoding; encoding; Magna
                 Carta; numerical cryptographic codes; pseudotext;
                 results analysis; signature; simulation; Thomas
                 Jefferson Beale; treasure site identification",
  treatment =    "A Application",
}

@Book{Smith:1971:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography, the science of secret writing",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "164",
  year =         "1971",
  ISBN =         "0-486-20247-X",
  ISBN-13 =      "978-0-486-20247-1",
  LCCN =         "Z 104 S65c 1971",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``This Dover edition, first published in 1955, is an
                 unabridged and corrected republication of the work
                 originally published by W. W. Norton and Company in
                 1943.'' ``Copyright renewed 1971.'' Bibliography: p.
                 156.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@TechReport{Smith:1971:DLC,
  author =       "J. L. Smith",
  title =        "The design of {Lucifer}, a cryptographic device for
                 data communications",
  type =         "Research Report",
  number =       "RC-3326",
  institution =  inst-IBM-WATSON,
  address =      inst-IBM-WATSON:adr,
  year =         "1971",
  bibdate =      "Sat Jun 10 12:23:30 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Vincent:1971:PAG,
  author =       "C. H. Vincent",
  title =        "Precautions for accuracy in the generation of truly
                 random binary numbers",
  journal =      j-J-PHYS-E,
  volume =       "4",
  number =       "11",
  pages =        "825--828",
  year =         "1971",
  CODEN =        "JPSIAE",
  DOI =          "https://doi.org/10.1088/0022-3735/5/6/521",
  ISSN =         "0022-3735",
  bibdate =      "Sat Nov 29 15:13:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See corrigendum \cite{Vincent:1972:CPA}.",
  URL =          "http://stacks.iop.org/0022-3735/4/i=11/a=007",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Physics. E: Scientific instruments",
  journal-URL =  "http://iopscience.iop.org/0022-3735/",
}

@Article{Beardsley:1972:YCI,
  author =       "C. W. Beardsley",
  title =        "Is your computer insecure?",
  journal =      j-IEEE-SPECTRUM,
  volume =       "9",
  number =       "1",
  pages =        "67--78",
  month =        jan,
  year =         "1972",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1972.5218476",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Communication system control; Computer crime; Computer
                 errors; Computerized monitoring; Condition monitoring;
                 Cryptography; Disaster management; Hardware; Process
                 control; Remote monitoring",
}

@Article{Girdansky:1972:CCD,
  author =       "M. B. Girdansky",
  title =        "Cryptology, the computer and data privacy",
  journal =      "Computers and Automation",
  volume =       "21",
  number =       "??",
  pages =        "12--19",
  month =        apr,
  year =         "1972",
  bibdate =      "Sat Jun 10 11:43:49 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Meyer:1972:PCC,
  author =       "C. H. Meyer and W. L. Tuchman",
  title =        "Pseudorandom codes can be cracked",
  journal =      j-ELECTRONIC-DESIGN,
  volume =       "20",
  number =       "23",
  pages =        "74--76",
  day =          "9",
  month =        nov,
  year =         "1972",
  CODEN =        "ELODAW",
  ISSN =         "0013-4872 (print), 1944-9550 (electronic)",
  ISSN-L =       "0013-4872",
  bibdate =      "Sat Jun 10 12:07:32 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Electronic Design",
}

@Article{Smith:1972:EAC,
  author =       "J. L. Smith and W. A. Notz and P. R. Osseck",
  title =        "An experimental application of cryptography to a
                 remotely accessed data system",
  journal =      "Proceedings of the ACM 1972 Annual Conference",
  volume =       "??",
  number =       "??",
  pages =        "282--297",
  month =        "????",
  year =         "1972",
  bibdate =      "Sat Jun 10 12:27:33 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Vincent:1972:CPA,
  author =       "C. H. Vincent",
  title =        "Corrigendum: {Precautions for accuracy in the
                 generation of truly random binary numbers}",
  journal =      j-J-PHYS-E,
  volume =       "5",
  number =       "6",
  pages =        "546--546",
  year =         "1972",
  CODEN =        "JPSIAE",
  ISSN =         "0022-3735",
  bibdate =      "Sat Nov 29 15:13:30 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "See \cite{Vincent:1971:PAG}.",
  URL =          "http://stacks.iop.org/0022-3735/5/i=6/a=521",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Physics. E: Scientific instruments",
  journal-URL =  "http://iopscience.iop.org/0022-3735/",
}

@Book{Wilkes:1972:TSC,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  volume =       "5",
  publisher =    "Macdonald and Co.",
  address =      "London, UK",
  edition =      "Second",
  pages =        "ix + 149",
  year =         "1972",
  ISBN =         "0-444-19583-1 (Elsevier)",
  ISBN-13 =      "978-0-444-19583-8 (Elsevier)",
  LCCN =         "QA76.5 .W523 1972",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Computer monographs",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography.",
  subject =      "Time-sharing computer systems",
}

@Book{Bertrand:1973:EOP,
  author =       "Gustave Bertrand",
  title =        "{Enigma}; ou, La plus grande {\'e}nigme de la guerre
                 1939--1945",
  publisher =    "Plon",
  address =      "Paris, France",
  pages =        "295 + 2 + 16",
  year =         "1973",
  LCCN =         "????",
  bibdate =      "Sun Dec 01 09:15:14 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
}

@Article{Chesson:1973:CC,
  author =       "F. W. (Frederick William) Chesson",
  title =        "Computers and cryptology",
  journal =      j-DATAMATION,
  volume =       "??",
  number =       "??",
  pages =        "62--77",
  month =        jan,
  year =         "1973",
  CODEN =        "DTMNAT",
  ISSN =         "0011-6963",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Datamation",
}

@Article{Feistel:1973:CCP,
  author =       "Horst Feistel",
  title =        "Cryptography and Computer Privacy",
  journal =      j-SCI-AMER,
  volume =       "228",
  number =       "5",
  pages =        "15--23",
  month =        may,
  year =         "1973",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam.bib",
  acknowledgement = ack-nhfb,
  annote =       "Survey of cryptography for data bases.",
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "code security; computer privacy; cryptography",
  referencedin = "Referenced in \cite[Ref. 14]{Biham:1998:TA}.",
}

@Book{Futrelle:1973:BTM,
  author =       "Jacques Futrelle",
  title =        "Best ``{Thinking Machine}'' detective stories",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "ix + 241",
  year =         "1973",
  ISBN =         "0-486-20537-1",
  ISBN-13 =      "978-0-486-20537-3",
  LCCN =         "PS3511.U98 B4",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  contents =     "The problem of cell 13.--The crystal gazer.--The
                 scarlet thread.--The flaming phantom.--The problem of
                 the stolen Rubens.--The missing necklace.--The phantom
                 motor.--The brown coat.--His perfect alibi.--The lost
                 radium.--Kidnapped Baby Blake, millionaire.--The fatal
                 cipher.",
  keywords =     "detective and mystery stories",
}

@Article{Geffe:1973:HPD,
  author =       "P. Geffe",
  title =        "How to protect data with ciphers that are really hard
                 to break",
  journal =      j-ELECTRONICS,
  volume =       "46",
  number =       "1",
  pages =        "99--101",
  year =         "1973",
  ISSN =         "0883-4989",
  bibdate =      "Mon Nov 30 08:58:36 1998",
  bibsource =    "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This cipher was later broken by
                 \cite{Siegenthaler:1985:DCS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Electronics",
}

@Book{Higenbottam:1973:CC,
  author =       "Frank Higenbottam",
  title =        "Codes and ciphers",
  publisher =    "English Universities Press",
  address =      "London, UK",
  pages =        "180 (est.)",
  year =         "1973",
  ISBN =         "0-340-12493-8",
  ISBN-13 =      "978-0-340-12493-2",
  LCCN =         "????",
  bibdate =      "Sat Apr 20 12:10:26 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Knuth:1973:FA,
  author =       "Donald E. Knuth",
  title =        "Fundamental Algorithms",
  volume =       "1",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  edition =      "Second",
  pages =        "xxi + 634",
  year =         "1973",
  ISBN =         "0-201-03809-9",
  ISBN-13 =      "978-0-201-03809-5",
  LCCN =         "QA76.6 .K641 1973",
  bibdate =      "Wed Dec 15 10:36:21 1993",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  series =       "The Art of Computer Programming",
  acknowledgement = ack-nhfb,
  tableofcontents = "1: Basic Concepts / 1 \\
                 1.1. Algorithms / 1 \\
                 1.2. Mathematical Preliminaries / 10 \\
                 1.2.1. Mathematical Induction / 11 \\
                 1.2.2. Numbers, Powers, and Logarithms / 21 \\
                 1.2.3. Sums and Products / 26 \\
                 1.2.4. Integer Functions and Elementary Number Theory /
                 37 \\
                 1.2.5. Permutations and Factorials / 44 \\
                 1.2.6. Binomial Coefficients / 51 \\
                 1.2.7. Harmonic Numbers / 73 \\
                 1.2.8. Fibonacci Numbers / 78 \\
                 1.2.9. Generating Functions / 86 \\
                 1.2.10. Analysis of an Algorithm / 94 \\
                 *1.2.11. Asymptotic Representations / 104 \\
                 *1.2.11.1. The O-notation / 104 \\
                 *1.2.11.2. Euler's summation formula / 108 \\
                 *1.2.11.3. Some asymptotic calculations / 112 \\
                 1.3. MIX / 120 \\
                 1.3.1. Description of MIX / 120 \\
                 1.3.2. The MIX Assembly Language / 141 \\
                 1.3.3. Applications to Permutations / 160 \\
                 1.4. Some Fundamental Programming Techniques / 182 \\
                 1.4.1. Subroutines / 182 \\
                 1.4.2. Coroutines / 190 \\
                 1.4.3. Interpretive Routines / 197 \\
                 1.4.3.1. A MIX simulator / 198 \\
                 1.4.3.2. Trace routines / 208 \\
                 1.4.4. Input and Output / 211 \\
                 1.4.5. History and Bibliography / 225 \\
                 2: Information Structures / 228 \\
                 2.1. Introduction / 228 \\
                 2.2 Linear Lists / 234 \\
                 2.2.1. Stacks, Queues, and Deques / 234 \\
                 2.2.2. Sequential Allocation / 240 \\
                 2.2.3. Linked Allocation / 251 \\
                 2.2.4. Circular Lists / 270 \\
                 2.2.5. Doubly Linked Lists / 278 \\
                 2.2.6. Arrays and Orthogonal Lists / 295 \\
                 2.3. Trees / 305 \\
                 2.3.1. Traversing Binary Trees / 315 \\
                 2.3.2. Binary Tree Representation of Trees / 332 \\
                 2.3.3. Other Representations of Trees / 347 \\
                 2.3.4. Basic Mathematical Properties of Trees / 362 \\
                 2.3.4.1. Free trees / 362 \\
                 *2.3.4.2. Oriented trees / 371 \\
                 *2.3.4.3. The ``infinity lemma'' / 381 \\
                 *2.3.4.4. Enumeration of trees / 385 \\
                 2.3.4.5. Path length / 399 \\
                 *2.3.4.6. History and bibliography / 405 \\
                 2.3.5. Lists and Garbage Collection / 406 \\
                 2.4. Multilinked Structures / 423 \\
                 2.5. Dynamic Storage Allocation / 435 \\
                 2.6. History and Bibliography / 456 \\
                 Answers to Exercises / 465 \\
                 Appendix A: Index to Notations / 607 \\
                 Appendix B: Tables of Numerical Quantities \\
                 1. Fundamental Constants (decimal) / 613 \\
                 2. Fundamental Constants (octal) / 614 \\
                 3. Harmonic Numbers, Bernoulli Numbers, Fibonacci
                 Numbers / 615 \\
                 Index and Glossary / 617",
}

@Article{Lampson:1973:NCP,
  author =       "Butler W. Lampson",
  title =        "A Note on the Confinement Problem",
  journal =      j-CACM,
  volume =       "16",
  number =       "10",
  pages =        "613--615",
  month =        oct,
  year =         "1973",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1014.html",
  abstract =     "This note explores the problem of confining a program
                 during its execution so that it cannot transmit
                 information to any other program except its caller. A
                 set of examples attempts to stake out the boundaries of
                 the problem. Necessary conditions for a solution are
                 stated and informally justified.",
  acknowledgement = ack-nhfb,
  annote =       "Prevention of privacy leaks between programs.",
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "723",
  corpsource =   "Xerox Palo Alto Res. Center, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "computer systems programming; confinement; information
                 hiding; leakage of data; operating systems (computers);
                 privacy; proprietary program; protection; security;
                 security of data; steganography",
  treatment =    "P Practical",
}

@Article{Meyer:1973:DCC,
  author =       "C. H. Meyer",
  title =        "Design considerations for cryptography",
  journal =      "AFIPS Conference Proceedings",
  volume =       "42",
  number =       "??",
  pages =        "603--606",
  month =        "????",
  year =         "1973",
  bibdate =      "Sat Jun 10 12:06:00 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Norman:1973:SWB,
  author =       "Bruce Norman",
  title =        "Secret warfare: the battle of codes and ciphers",
  publisher =    "David and Charles",
  address =      "Newton Abbot, UK",
  pages =        "187",
  year =         "1973",
  ISBN =         "0-7153-6223-2",
  ISBN-13 =      "978-0-7153-6223-5",
  LCCN =         "Z103 .N67",
  bibdate =      "Sat Apr 20 12:02:52 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Saltzer:1973:PCI,
  author =       "Jerome H. Saltzer",
  title =        "Protection and control of information sharing in
                 {Multics}",
  journal =      j-OPER-SYS-REV,
  volume =       "7",
  number =       "4",
  pages =        "119--119",
  month =        oct,
  year =         "1973",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/957195.808059",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Thu Feb 23 08:03:02 MST 2017",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/opersysrev.bib",
  abstract =     "This paper describes the design of mechanisms to
                 control sharing of information in the Multics system.
                 Seven design principles help provide insight into the
                 tradeoffs among different possible designs. The key
                 mechanisms described include access control lists,
                 hierarchical control of access specifications,
                 identification and authentication of users, and primary
                 memory protection. The paper ends with a discussion of
                 several known weaknesses in the current protection
                 mechanism design.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGOPS Operating Systems Review",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J597",
}

@Article{Bartek:1974:EDS,
  author =       "Douglas J. Bartek",
  title =        "Encryption for data security",
  journal =      j-HONEYWELL-COMP-J,
  volume =       "8",
  number =       "2",
  pages =        "86--89",
  month =        "????",
  year =         "1974",
  CODEN =        "HNCJA3",
  ISSN =         "0046-7847",
  bibdate =      "Sat Jun 10 11:10:59 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Honeywell Computer Journal",
}

@Article{Borucki:1974:MNN,
  author =       "L. J. Borucki and J. B. Diaz",
  title =        "Mathematical Notes: a Note on Primes, with Arbitrary
                 Initial or Terminal Decimal Ciphers, in {Dirichlet}
                 Arithmetic Progressions",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "81",
  number =       "9",
  pages =        "1001--1002",
  month =        nov,
  year =         "1974",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:37:41 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Article{Evans:1974:UAS,
  author =       "Arthur {Evans, Jr.} and William Kantrowitz and Edwin
                 Weiss",
  title =        "A User Authentication Scheme Not Requiring Secrecy in
                 the Computer",
  journal =      j-CACM,
  volume =       "17",
  number =       "8",
  pages =        "437--442",
  month =        aug,
  year =         "1974",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 06:38:18 MST 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm17.html#EvansKW74;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "In many computer operating systems a user
                 authenticates himself by entering a secret password
                 known solely to himself and the system. The system
                 compares this password with one recorded in a Password
                 Table which is available to only the authentication
                 program. The integrity of the system depends on keeping
                 the table secret. In this paper a password scheme is
                 presented which does not require secrecy in the
                 computer. All aspects of the system, including all
                 relevant code and data bases, may be known by anyone
                 attempting to intrude. The scheme is based on using a
                 function H which the would-be intruder is unable to
                 invert. This function is applied to the user's password
                 and the result compared to a table entry, a match being
                 interpreted as authentication of the user. The intruder
                 may know all about H and have access to the table, but
                 he can penetrate the system only if he can invert H to
                 determine an input that produces a given output. This
                 paper discusses issues surrounding selection of a
                 suitable H.",
  acknowledgement = ack-nhfb,
  annote =       "Password protection by irreversible transformation",
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "722; 723",
  corpsource =   "MIT, Lexington, MA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "authentication; computer operating systems;
                 cryptology; engineering problems; human; invert; one
                 way encryption; operating system security; operating
                 systems (computers); password scheme; security;
                 security of data; user authentication scheme",
  oldlabel =     "EvansKW74",
  treatment =    "A Application; T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/EvansKW74",
}

@Misc{Feistel:1974:BCC,
  author =       "Horst Feistel",
  title =        "Block cipher cryptographic system",
  howpublished = "{U.S.} Patent No. 3,798,359.",
  day =          "19",
  month =        mar,
  year =         "1974",
  bibdate =      "Sat Jun 10 11:35:48 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Friedman:1974:ETR,
  author =       "Theodore D. Friedman and Lance J. Hoffman",
  title =        "Execution Time Requirements for Encipherment
                 Programs",
  journal =      j-CACM,
  volume =       "17",
  number =       "8",
  pages =        "445--449",
  month =        aug,
  year =         "1974",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See letter \cite{McCarthy:1975:AFP}.",
  abstract =     "The time taken to decipher 20,000 words of data by
                 four additive methods on a Control Data 6400 computer
                 was measured using assembly language and Fortran
                 routines. Standard deviations were computed for 100
                 runs by each method, and from this the range of error
                 at the 95 percent confidence level was calculated. The
                 time required for selecting and fetching the plaintext
                 data and for storing the ciphertext was separately
                 measured (the ``null transformation''), and was then
                 compared with the times required by each enciphering
                 method. The enciphering processes required at least
                 four times as much cpu time when programmed in
                 Fortran.",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "723",
  corpsource =   "Univ. California, Berkeley, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "additive ciphers; assembly language; cpu;
                 cryptography; cryptology; data processing; double key
                 encipherment; enciphering time coefficient;
                 encipherment programs; errors; execution time;
                 experiments; Fortran; null; one word key; operating
                 systems (computers); privacy transformations;
                 protection; pseudo random key; security; security of
                 data; time; transformation",
  treatment =    "A Application; T Theoretical or Mathematical; X
                 Experimental",
}

@Article{Gelb:1974:RWD,
  author =       "I. J. Gelb",
  title =        "Records, Writing, and Decipherment",
  journal =      j-VISIBLE-LANGUAGE,
  volume =       "VIII",
  number =       "4",
  pages =        "293--318",
  month =        "Autumn",
  year =         "1974",
  CODEN =        "VSLGAO",
  ISSN =         "0022-2224 (print), 2691-5529 (electronic)",
  ISSN-L =       "0022-2224",
  bibdate =      "Tue Feb 9 08:33:00 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/visible-language.bib",
  URL =          "https://s3-us-west-2.amazonaws.com/visiblelanguage/pdf/V8N4_1974_E.pdf",
  abstract =     "Written records together with material remains derived
                 from excavations form the main bases for our
                 understanding of past civilizations and their
                 underlying language systems. There is no systematic
                 treatment of written records, and little attention has
                 been paid to the interrelationship between ancient
                 writing and language. Full systems of writing express
                 language at two levels --- morphological and phonetic
                 --- which give rise to three basic writing systems
                 types --- logo-syllabic, syllabic, and alphabetic. Four
                 categories of decipherment --- based on our relative
                 knowledge of the writing system and the language ---
                 are discussed: known writing/known language; unknown
                 writing/known language; known writing/unknown language;
                 and unknown writing/unknown language. From a
                 cryptanalytic point of view there are two general
                 decipherment methods: (1) utilization of external
                 information to determine probable contents (e.g.,
                 bilingual texts,) and (2) internal information from an
                 analysis of the text itself (structure and typology).
                 The assumption of the underlying language is critical
                 for deciphering procedures and provides the test of
                 successful decipherment.",
  acknowledgement = ack-nhfb,
  ajournal =     "Visible Lang.",
  fjournal =     "Visible Language",
  journal-URL =  "https://journals.uc.edu/index.php/vl",
  old-journal-url = "http://visiblelanguage.herokuapp.com/",
}

@TechReport{Grossman:1974:GTR,
  author =       "E. Grossman",
  title =        "Group theoretic remarks on cryptographic systems based
                 on two types of addition",
  type =         "Research Report",
  number =       "RC-4742",
  institution =  inst-IBM-WATSON,
  address =      inst-IBM-WATSON:adr,
  day =          "26",
  month =        feb,
  year =         "1974",
  bibdate =      "Sat Jun 10 11:46:57 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Haugen:1974:RSS,
  author =       "Einar Haugen",
  title =        "The Rune Stones of {Spirit Pond, Maine}",
  journal =      j-VISIBLE-LANGUAGE,
  volume =       "VIII",
  number =       "1",
  pages =        "33--64",
  month =        "Winter",
  year =         "1974",
  CODEN =        "VSLGAO",
  ISSN =         "0022-2224 (print), 2691-5529 (electronic)",
  ISSN-L =       "0022-2224",
  bibdate =      "Tue Feb 9 08:33:00 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/visible-language.bib",
  URL =          "https://s3-us-west-2.amazonaws.com/visiblelanguage/pdf/V8N1_1974_E.pdf",
  abstract =     "The author reports on his official investigation of
                 the inscription on three rune stones discovered in 1971
                 by Walter J. Elliott near Spirit Pond, Maine (USA). In
                 determining the authenticity of the stones as Viking
                 Age artifacts, three steps were involved: (1)
                 transcription of the runes, (2) transliteration into
                 the Latin alphabet, and (3) interpretation of the
                 meaning of the inscriptions. The relationship of runes
                 (as alphabetic symbols) to the history of Scandinavian
                 languages is outlined; special problems of these
                 inscriptions are discussed: (1) the runes are not those
                 used in the eleventh or later centuries, (2) spelling
                 and the use of ``runic'' numerals are inconsistent with
                 runic and scribal practice, (3) the grammatical form is
                 unrecognizable as Old Norse, (4) peculiarities relate
                 directly to the Kensington Stone inscription in
                 Minnesota. Conclusion: the inscriptions could not have
                 been carved by Scandinavian Vikings in the Middle Ages,
                 and probably date since 1932.",
  acknowledgement = ack-nhfb,
  ajournal =     "Visible Lang.",
  fjournal =     "Visible Language",
  old-journal-URL =  "http://visiblelanguage.herokuapp.com/",
  journal-URL =  "https://journals.uc.edu/index.php/vl",
}

@Book{Kahn:1974:C,
  author =       "David Kahn",
  title =        "The Codebreakers",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  edition =      "Abridged",
  pages =        "xvi + 576",
  year =         "1974",
  ISBN =         "0-02-560460-0, 0-297-76785-2",
  ISBN-13 =      "978-0-02-560460-5, 978-0-297-76785-5",
  LCCN =         "Z103 .K28 1974",
  bibdate =      "Thu Jul 23 17:02:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  abstract =     "The first comprehensive history of secret
                 communication from ancient times to the threshold of
                 outer space.",
  acknowledgement = ack-nhfb,
  subject =      "Cryptography; History; Ciphers; Cryptographie;
                 Histoire; Ciphers; Cryptography; Codierung;
                 Geheimschrift; Geschichte; Informationstheorie;
                 Kryptologie; Cryptographers; Informationstheorie;
                 Geheimschrift; Geschichte; Codierung; Kryptologie",
  tableofcontents = "A few words \\
                 One day of MAGIC \\
                 The pageant of cryptology \\
                 The first 3,000 years \\
                 The rise of the West \\
                 On the origin of a species \\
                 The era of the black chambers \\
                 The contribution of the dilettantes \\
                 Crises of the Union \\
                 The professor, the soldier, and the man on Devil's
                 Island \\
                 Room 40 \\
                 A war of intercepts \\
                 Two Americans \\
                 Secrecy for sale \\
                 Duel in the ether: the Axis \\
                 Duel in the ether: neutrals and Allies \\
                 Censors, scramblers, and spies \\
                 The scrutable orientals \\
                 PYCCKAR KPNNTONOTNR \\
                 N.S.A. \\
                 Sideshows \\
                 The anatomy of cryptology \\
                 Heterogeneous impulses \\
                 Rumrunners, businessmen, and makers of non-secret codes
                 \\
                 Ciphers in the past tense \\
                 The pathology of cryptology \\
                 Paracryptology \\
                 Ancestral voices \\
                 Messages from outer space",
}

@Book{Nanovic:1974:SWI,
  author =       "Nanovic, John L. (John Leonard)",
  title =        "Secret writing: an introduction to cryptograms,
                 ciphers, and codes",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "x + 117",
  year =         "1974",
  ISBN =         "0-486-23062-7",
  ISBN-13 =      "978-0-486-23062-7",
  LCCN =         "Z104.N35 1974",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of the 1936 edition \cite{Nanovic:1936:SWI}.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptograms; cryptography",
}

@Article{Pollard:1974:TFP,
  author =       "J. Pollard",
  title =        "Theorems on factorization and primality testing",
  journal =      j-PROC-CAMBRIDGE-PHIL-SOC,
  volume =       "76",
  pages =        "521--528",
  year =         "1974",
  CODEN =        "PCPSA4",
  ISSN =         "0008-1981",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the Cambridge Philosophical Society.
                 Mathematical and physical sciences",
  referencedin = "Referenced in \cite[Ref. 18]{Kaliski:1995:SUR}.",
}

@Article{Purdy:1974:HSL,
  author =       "George B. Purdy",
  title =        "A High Security Log-in Procedure",
  journal =      j-CACM,
  volume =       "17",
  number =       "8",
  pages =        "442--445",
  month =        aug,
  year =         "1974",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/361082.361089",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://dl.acm.org/doi/10.1145/361082.361089",
  abstract =     "The protection of time sharing systems from
                 unauthorized users is often achieved by the use of
                 passwords. By using one-way ciphers to code the
                 passwords, the risks involved with storing the
                 passwords in the computer can be avoided. The selection
                 of a suitable one-way cipher is discussed. It is
                 suggested that for this purpose polynomials over a
                 prime modulus are superior to one-way ciphers derived
                 from Shannon codes.",
  acknowledgement = ack-nhfb,
  annote =       "Password protection by irreversible cryptographic
                 transformation",
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "722; 723",
  corpsource =   "Univ. Illinois, Urbana-Champaign, IL, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "code; computer operating systems; cryptography; data
                 processing --- Security of Data; one way ciphers;
                 operating systems; operating systems (computers);
                 passwords; security; security of data; time sharing
                 systems",
  treatment =    "A Application; T Theoretical or Mathematical",
}

@Manual{Richards:1974:SWP,
  author =       "Sheila R. Richards",
  title =        "Secret writing in the public records: {Henry
                 VIII--George II}",
  publisher =    "H.M.S.O.",
  address =      "London",
  pages =        "x + 173 + 4 plates",
  year =         "1974",
  ISBN =         "0-11-440054-7",
  ISBN-13 =      "978-0-11-440054-5",
  LCCN =         "DA310 .G681 1974",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Contains one hundred documents, all but one of which
                 are written wholly or partially in cipher and are now
                 deciphered and printed in full for the first time.
                 Includes letters in French or Italian, with a summary
                 in English.",
  price =        "UK\pounds4.50",
  acknowledgement = ack-nhfb,
  keywords =     "Great Britain --- history --- 18th Century ---
                 sources; Great Britain --- history --- stuarts,
                 1603--1714 --- sources; Great Britain --- history ---
                 Tudors, 1485--1603 --- sources",
}

@TechReport{Rivest:1974:AAR,
  author =       "Ronald L. Rivest",
  title =        "Analysis of Associative Retrieval Algorithms",
  type =         "Technical Report",
  number =       "TR.54",
  institution =  "Institut de la Recherche en Informatique et
                 Automatique, now Institut National de Recherche en
                 Informatique et Automatique (INRIA)",
  address =      "Domaine de Voluceau --- Rocquencourt --- B.P. 105,
                 78153 Le Chesnay Cedex, France",
  pages =        "??",
  month =        feb,
  year =         "1974",
  bibdate =      "Thu Jul 21 09:32:07 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "Also published in/as: Stanford CSD report 74-415. Also
                 published in/as: SIAM Journal for Computing,
                 Springer-Verlag (Heidelberg, FRG and New York NY,
                 USA)-Verlag, 1976, with mod. title.",
  acknowledgement = ack-nhfb,
  annote =       "Combinatorial hashing for retrieval.",
}

@InProceedings{Rivest:1974:HCA,
  author =       "R. L. Rivest",
  title =        "On hash-coding algorithms for partial-match
                 retrieval",
  crossref =     "IEEE:1974:ASS",
  pages =        "95--103",
  year =         "1974",
  bibdate =      "Mon Jul 18 10:06:22 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Smith:1974:RBC,
  author =       "J. L. Smith",
  title =        "Recirculating block cipher cryptographic system",
  howpublished = "{U.S.} Patent No. 3,796,830",
  day =          "12",
  month =        mar,
  year =         "1974",
  bibdate =      "Sat Jun 10 12:25:23 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Thomas:1974:RPS,
  author =       "R. Thomas",
  title =        "{RFC 644}: On the problem of signature authentication
                 for network mail",
  day =          "22",
  month =        jul,
  year =         "1974",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Status: UNKNOWN. Not online.",
  URL =          "ftp://ftp.internic.net/rfc/rfc644.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc644.txt",
  acknowledgement = ack-nhfb,
  online =       "no",
  status =       "UNKNOWN",
}

@Book{Winterbotham:1974:US,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Ultra} secret",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  pages =        "xiii + 199",
  year =         "1974",
  ISBN =         "0-297-76832-8",
  ISBN-13 =      "978-0-297-76832-6",
  LCCN =         "D810.C88 W56",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  subject =      "Winterbotham, F. W; (Frederick William); World War,
                 1939--1945; Cryptography; Secret service; Great
                 Britain; Personal narratives, British; Enigma cipher
                 system",
  subject-dates = "1897--1990",
}

@Book{Winterbotham:1974:USF,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Ultra} secret: the first account of the most
                 astounding cryptanalysis coup of {World War II} --- how
                 the {British} broke the {German} code and read most of
                 the signals between {Hitler} and his generals
                 throughout the war",
  publisher =    pub-HARPER-ROW,
  address =      pub-HARPER-ROW:adr,
  pages =        "xiii + 199",
  year =         "1974",
  ISBN =         "0-06-014678-8",
  ISBN-13 =      "978-0-06-014678-8",
  LCCN =         "D810.C95 W73 1974",
  bibdate =      "Fri May 13 06:39:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
  subject =      "Winterbotham, F. W; (Frederick William); World War,
                 1939-1945; Cryptography; Secret service; Great Britain;
                 Personal narratives, English",
}

@Book{Barker:1975:CSS,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of the simple substitution cipher with
                 word divisions using non-pattern word lists",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "20 + 108",
  year =         "1975",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "Z103 .B3",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Bound in gray paper wrappers; printed in black and
                 gray. The George C. Lamb Collection.",
  keywords =     "ciphers; Ciphers; Cryptography; cryptography",
}

@InProceedings{Bayer:1975:EST,
  author =       "Rudolf Bayer and J. K. Metzger",
  title =        "On the Encipherment of Search Trees and Random Access
                 Files",
  crossref =     "Kerr:1975:PIC",
  pages =        "452--452",
  year =         "1975",
  bibdate =      "Fri Jan 12 07:50:25 MST 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.vldb.org/dblp/db/conf/vldb/vldb75.html",
  URL =          "http://www.vldb.org/dblp/db/conf/vldb/BayerM75.html",
  acknowledgement = ack-nhfb,
  authorurl =    "http://www.vldb.org/dblp/db/indices/a-tree/b/Bayer:Rudolf.html;
                 http://www.vldb.org/dblp/db/indices/a-tree/m/Metzger:J=_K=.html",
}

@MastersThesis{Blatman:1975:MMC,
  author =       "Peter Blatman",
  title =        "Method of modern cryptanalysis: research project",
  type =         "Thesis ({M.S. in Electrical Engineering})",
  school =       "Department of Electrical Engineering and Computer
                 Sciences, University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "various",
  month =        jun,
  year =         "1975",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "computer sciences --- dissertations; dissertations,
                 academic --- UCB --- Electrical Engineering ---
                 1971--1980; University of California, Berkeley. Dept.
                 of Electrical Engineering and Computer Sciences",
}

@TechReport{Branstad:1975:DGI,
  author =       "D. K. Branstad",
  title =        "Draft guidelines for implementing and using the {NBS
                 Data Encryption Standard}",
  type =         "Report",
  number =       "??",
  institution =  pub-NBS,
  address =      pub-NBS:adr,
  day =          "10",
  month =        nov,
  year =         "1975",
  bibdate =      "Sat Jun 10 11:12:28 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Branstad:1975:EPC,
  author =       "D. K. Branstad",
  editor =       "????",
  booktitle =    "{Fourth Data Communications Symposium, 7--9 October
                 1975, Quebec City, Canada}",
  title =        "Encryption protection in computer data
                 communications,",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "??--??",
  year =         "1975",
  bibdate =      "Sat Jun 10 11:14:36 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brillhart:1975:NPC,
  author =       "John Brillhart and D. H. Lehmer and J. L. Selfridge",
  title =        "New primality criteria and factorizations of $ 2^m \pm
                 1 $",
  journal =      j-MATH-COMPUT,
  volume =       "29",
  number =       "130",
  pages =        "620--647",
  month =        apr,
  year =         "1975",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "B0210 (Algebra); C1110 (Algebra)",
  corpsource =   "Dept. Math., Univ. Arizona, Tucson, AZ, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "divisibility properties; factorizations; Fermat's
                 theorem; hyperbola; Lucas sequences; Mersenne numbers;
                 number theory; primality criteria; search bound",
  referencedin = "Referenced in \cite[Ref. 2]{Silverman:1997:FGR}.",
  treatment =    "T Theoretical or Mathematical",
}

@Book{Brown:1975:BL,
  author =       "Anthony Cave Brown",
  title =        "Bodyguard of lies",
  publisher =    pub-HARPER-ROW,
  address =      pub-HARPER-ROW:adr,
  pages =        "x + 947 + 8",
  year =         "1975",
  ISBN =         "0-06-010551-8",
  ISBN-13 =      "978-0-06-010551-8",
  LCCN =         "D810.S7 C36 1975",
  bibdate =      "Mon Aug 25 16:20:50 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Examines Allied intelligence and counter-intelligence
                 operations during World War II, describing the cipher
                 machine used to break German codes and the tactics,
                 ruses, and deception employed to ensure the successful
                 invasion of Normandy.",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Secret service; Secret
                 service.",
  tableofcontents = "Part 1. The origins of special means 1938--1942.
                 Ultra \\
                 Coventry \\
                 Special means operational \\
                 Part 2. The roots of conspiracy 1934--1943 \\
                 Canaris \\
                 The schwarze Kapelle \\
                 Friend or foe \\
                 The plot begins \\
                 The outbreak of war \\
                 Conspiracy at the Vatican \\
                 The Venlo incident \\
                 ``Adroit intrigue'' \\
                 Canaris at work \\
                 The assassination of Heydrich \\
                 Operation flash \\
                 Part 3. High strategy and low tactics 1943 \\
                 Casablanca \\
                 The battle of the Atlantic \\
                 The LCS and plan Jael \\
                 Mincemeat \\
                 Quebec \\
                 The Schwarze Kappelle, 1943 \\
                 Starkey \\
                 Prosper \\
                 The intelligence attack \\
                 Teheran \\
                 Cicero \\
                 Part 4. Cover and deception \\
                 January to June 1944. Eisenhower, supreme commander \\
                 The German supreme command \\
                 Bodyguard \\
                 The Balkans \\
                 Fortitude north \\
                 Fortitude south \\
                 Nuremberg \\
                 Aerial stratagems \\
                 Security \\
                 The wireless game \\
                 The French labyrinth \\
                 Canaris's last throw \\
                 Vendetta \\
                 The eve of D-day \\
                 Part 5. Normandy to nemesis \\
                 June 6 to August 20, 1944. D-day \\
                 The deceptions of D-day \\
                 Sword and stratagem \\
                 The French revolt \\
                 Rommel \\
                 The V1 \\
                 Goodwood \\
                 July 20, 1944 \\
                 The breakout \\
                 Gotterdammerung",
}

@Article{Coppersmith:1975:GCA,
  author =       "Don Coppersmith and Edna Grossman",
  title =        "Generators for Certain Alternating Groups with
                 Applications to Cryptography",
  journal =      j-SIAM-J-APPL-MATH,
  volume =       "29",
  number =       "4",
  pages =        "624--627",
  month =        dec,
  year =         "1975",
  CODEN =        "SMJMAP",
  ISSN =         "0036-1399 (print), 1095-712X (electronic)",
  ISSN-L =       "0036-1399",
  bibdate =      "Thu Oct 15 18:16:06 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjapplmath.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classification = "B0210 (Algebra); C1110 (Algebra); C6130 (Data
                 handling techniques)",
  corpsource =   "Dept. of Math. Sci., IBM Thomas J. Watson Res. Center,
                 Yorktown Heights, NY, USA",
  fjournal =     "SIAM Journal on Applied Mathematics",
  journal-URL =  "http://epubs.siam.org/siap",
  keywords =     "alternating groups; block ciphers; computer
                 encipherment of data; cryptography; data handling;
                 group theory; permutations; security; security of data;
                 subgroups",
  treatment =    "A Application; T Theoretical or Mathematical",
}

@TechReport{Diffie:1975:PRN,
  author =       "Whitfield Diffie",
  title =        "Preliminary remarks on the {National Bureau of
                 Standards} proposed standard encryption algorithm for
                 computer data protection",
  type =         "Unpublished report",
  institution =  "Stanford University",
  address =      "Stanford, CA, USA",
  month =        may,
  year =         "1975",
  bibdate =      "Sat Jun 10 11:20:54 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Ellis:1975:PKC,
  author =       "James Ellis and Clifford Cocks and Malcolm
                 Williamson",
  title =        "Public-key Cryptography",
  howpublished = "Classified reports (titles uncertain) at Government
                 Communications Headquarters (GCHQ), Cheltenham, UK.",
  year =         "1975",
  bibdate =      "Wed Apr 25 10:41:58 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Work declassified in 1997. Awarded the 100th IEEE
                 Milestone Award for the first discovery (albeit long
                 secret) of public-key cryptography.",
  URL =          "http://www.gchq.gov.uk/Press/Pages/100th-IEEE-milestone-award.aspx",
  acknowledgement = ack-nhfb,
}

@Article{Feistel:1975:SCT,
  author =       "H. Feistel and W. A. Notz and J. L. Smith",
  title =        "Some cryptographic techniques for machine-to-machine
                 data communications",
  journal =      j-PROC-IEEE,
  volume =       "63",
  number =       "??",
  pages =        "1545--1534",
  year =         "1975",
  CODEN =        "IEEPAD",
  DOI =          "https://doi.org/10.1109/PROC.1975.10005",
  ISSN =         "0018-9219 (print), 1558-2256 (electronic)",
  ISSN-L =       "0018-9219",
  bibdate =      "Sat Jun 10 11:37:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://ieeexplore.ieee.org/document/1451934",
  abstract =     "Some of the threats to the integrity of multiuser
                 teleprocessing systems and to the data they contain can
                 be countered by the use of cryptography.
                 Stream-generator ciphers are not ideally suited for
                 such an application, thus the use of block ciphers,
                 which have the beneficial property of a strong
                 nonlinear intersymbol dependence, is suggested. This
                 property provides the means for automatic error
                 detection for verifying the authenticity of terminal
                 operators, and for ensuring message integrity. An
                 experimental demonstration system has been constructed
                 to illustrate protection features that can be provided
                 for real applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the IEEE",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5",
}

@Book{Hardy:1975:ITN,
  author =       "Godfrey H. Hardy and Edward M. Wright",
  title =        "An Introduction to the Theory of Numbers",
  publisher =    pub-CLARENDON,
  address =      pub-CLARENDON:adr,
  edition =      "Fourth",
  pages =        "421",
  year =         "1975",
  ISBN =         "0-19-853310-7 (invalid checksum??)",
  ISBN-13 =      "978-0-19-853310-8",
  LCCN =         "????",
  bibdate =      "Fri Jun 24 12:32:14 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Jones:1975:ESP,
  author =       "Anita K. Jones and Richard J. Lipton",
  title =        "The enforcement of security policies for computation",
  journal =      j-OPER-SYS-REV,
  volume =       "9",
  number =       "5",
  pages =        "197--206",
  month =        nov,
  year =         "1975",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{McCarthy:1975:AFP,
  author =       "John McCarthy",
  title =        "{ACM Forum}: {Proposed} Criterion for a Cipher to be
                 Probable-Word-Proof",
  journal =      j-CACM,
  volume =       "18",
  number =       "2",
  pages =        "131--132",
  month =        feb,
  year =         "1975",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 26 10:24:13 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Friedman:1974:ETR}.",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{NBS:1975:EAC,
  author =       "{NBS}",
  title =        "Encryption algorithm for computer data protection:
                 requests for comments",
  journal =      j-FED-REGIST,
  volume =       "40",
  number =       "??",
  pages =        "12134--??",
  day =          "17",
  month =        mar,
  year =         "1975",
  CODEN =        "FEREAC",
  ISSN =         "0097-6326",
  ISSN-L =       "0097-6326",
  bibdate =      "Sat Jun 10 12:09:27 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Fed. regist. (Vienna, VA)",
  fjournal =     "Federal Register",
  journal-URL =  "https://www.archives.gov/federal-register",
  xxISSN =       "1097-7651",
}

@Article{NBS:1975:NPF,
  author =       "{NBS}",
  title =        "Notice of a Proposed Federal Information Processing
                 {Data Encryption Standard}",
  journal =      j-FED-REGIST,
  volume =       "40",
  number =       "??",
  pages =        "12607--??",
  day =          "12",
  month =        aug,
  year =         "1975",
  CODEN =        "FEREAC",
  ISSN =         "0097-6326",
  ISSN-L =       "0097-6326",
  bibdate =      "Sat Jun 10 12:18:37 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Federal Register",
  journal-URL =  "https://www.archives.gov/federal-register",
}

@PhdThesis{Neat:1975:NCC,
  author =       "Charlie Edmund Neat",
  title =        "A new computer cryptography: the Expanded Character
                 Set {(ECS)} cipher",
  school =       "Engineering, University of California, Los Angeles",
  address =      "Los Angeles, CA, USA",
  pages =        "xxi + 203",
  year =         "1975",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; computers --- access control; dissertations,
                 academic --- UCLA --- engineering; electronic data
                 processing --- security measures",
}

@TechReport{Pless:1975:ESC,
  author =       "Vera Pless",
  title =        "Encryption schemes for computer confidentially [sic]",
  type =         "MAC technical memorandum",
  number =       "63",
  institution =  "Massachusetts Institute of Technology, Project MAC",
  address =      "Cambridge, MA, USA",
  pages =        "19",
  year =         "1975",
  LCCN =         "QA76.9.A25 P55",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Research done under ARPA Order no.2095, ONR Contract
                 no. N00014-70-A-0362-0006 and IBM Contract 82280.",
  acknowledgement = ack-nhfb,
  annote =       "Research supported by the Advanced Research Projects
                 Agency under ARPA Order No. 2095 monitored by ONR
                 Contract No. N00014-70-A-0362-0006, and in part by IBM
                 Contract 82280. 18-19.",
  keywords =     "Computers; electronic data processing departments;
                 security measures",
}

@Book{Rohwer:1975:GIM,
  author =       "Jurgen Rohwer",
  title =        "{Geleitzugschlachten im Marz 1943:
                 F{\"u}hrungsprobleme im H{\"o}hepunkt der Schlacht im
                 Atlantik}. ({German}) [{Convoy} in {March 1943}:
                 implementation problems in the climax of the {Battle of
                 the Atlantic}]",
  publisher =    "Motorbuch",
  address =      "Stuttgart, Germany",
  pages =        "356",
  year =         "1975",
  ISBN =         "3-87943-383-6",
  ISBN-13 =      "978-3-87943-383-4",
  LCCN =         "????",
  bibdate =      "Tue Aug 26 07:20:00 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also English translation \cite{Rohwer:1977:CCB}.",
  acknowledgement = ack-nhfb,
  language =     "German",
}

@Article{Schroeder:1975:ESK,
  author =       "Michael D. Schroeder",
  title =        "Engineering a security kernel for {Multics}",
  journal =      j-OPER-SYS-REV,
  volume =       "9",
  number =       "5",
  pages =        "25--32",
  month =        nov,
  year =         "1975",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Wilkes:1975:TSC,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  publisher =    "Macdonald and Jane's",
  address =      "London, UK",
  edition =      "Third",
  pages =        "ii + 166",
  year =         "1975",
  ISBN =         "0-444-19525-4 (American Elsevier)",
  ISBN-13 =      "978-0-444-19525-8 (American Elsevier)",
  LCCN =         "QA76.53 .W54 1975",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Computer monographs",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography. Fragment on page 148 seems to be the
                 location.",
  subject =      "Time-sharing computer systems",
}

@Book{Winterbotham:1975:US,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Ultra} secret",
  publisher =    "Dell",
  address =      "New York, NY, USA",
  pages =        "286",
  year =         "1975",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "D810.C88 W56 1976",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
}

@MastersThesis{Worth:1975:CMA,
  author =       "Vivian I. Worth",
  title =        "Cryptology: mathematical applications",
  type =         "Thesis ({M.S.})",
  school =       "Central Missouri State University",
  address =      "Warrensburg, MO, USA",
  pages =        "iv + 63",
  year =         "1975",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Book{Anonymous:1976:CCA,
  author =       "Anonymous",
  title =        "Cryptography and cryptanalysis articles",
  volume =       "5",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "v + 144",
  year =         "1976",
  ISBN =         "0-89412-003-4",
  ISBN-13 =      "978-0-89412-003-9",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Article{Bayer:1976:EST,
  author =       "R. Bayer and J. K. Metzger",
  title =        "On the Encipherment of Search Trees and Random Access
                 Files",
  journal =      j-TODS,
  volume =       "1",
  number =       "1",
  pages =        "37--52",
  month =        mar,
  year =         "1976",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Sat Apr 14 10:34:48 MDT 2001",
  bibsource =    "Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Also published in \cite[p.~508--510]{Kerr:1975:PIC}.",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1976-1-1/p37-bayer/p37-bayer.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1976-1-1/p37-bayer/",
  abstract =     "The securing of information in indexed, random access
                 files by means of privacy transformations must be
                 considered as a problem distinct from that for
                 sequential files. Not only must processing overhead due
                 to encrypting be considered, but also threats to
                 encipherment arising from updating and the file
                 structure itself must be countered. A general
                 encipherment scheme is proposed for files maintained in
                 a paged structure in secondary storage. This is applied
                 to the encipherment of indexes organized as $B$-trees;
                 a $B$-tree is a particular type of multiway search
                 tree. Threats to the encipherment of $B$-trees,
                 especially relating to updating, are examined, and
                 countermeasures are proposed for each. In addition, the
                 effect of encipherment on file access and update, on
                 paging mechanisms, and on files related to the
                 enciphered index are discussed. Many of the concepts
                 presented may be readily transferred to other forms of
                 multiway index trees and to binary search trees.",
  acknowledgement = ack-nhfb,
  annote =       "Trees versus hashing as his 1974 IFIP paper?",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "",
  subject =      "Software --- Operating Systems --- Security and
                 Protection (D.4.6): {\bf Access controls}; Software ---
                 Operating Systems --- Security and Protection (D.4.6):
                 {\bf Cryptographic controls}",
}

@Article{Bright:1976:CUM,
  author =       "H. S. Bright and R. L. Enison",
  editor =       "????",
  title =        "Cryptography using modular software elements",
  journal =      "AFIPS Conference Proceedings",
  volume =       "45",
  number =       "??",
  pages =        "113--123",
  month =        "????",
  year =         "1976",
  bibdate =      "Sat Jun 10 11:17:44 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Budge:1976:RSB,
  author =       "Sir E. A. Wallis (Ernest Alfred Wallis) Budge",
  title =        "The {Rosetta} stone in the {British Museum}: the
                 {Greek}, demotic, and hieroglyphic texts of the decree
                 inscribed on the {Rosetta} stone conferring additional
                 honours on {Ptolemy V Epiphanes (203-181 B.C.)} with
                 {English} translations and a short history of the
                 decipherment of the {Egyptian} hieroglyphs, and an
                 appendix containing translations of the stelae of {San
                 (Tanis)} and {Tall al-Maskhutah}",
  publisher =    "AMS Press",
  address =      "New York, NY, USA",
  pages =        "325 + 22",
  year =         "1976",
  ISBN =         "0-404-11362-1",
  ISBN-13 =      "978-0-404-11362-9",
  LCCN =         "PJ1531.R5 B8 1976",
  bibdate =      "Tue Dec 01 10:45:33 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Casson:1976:SAD,
  author =       "Lionel Casson",
  title =        "{{\booktitle{The Story of Archaeological Decipherment,
                 from Egyptian Hieroglyphs to Linear B}} by Maurice
                 Pope} (review)",
  journal =      j-TECH-CULTURE,
  volume =       "17",
  number =       "3",
  pages =        "530--531",
  month =        jul,
  year =         "1976",
  CODEN =        "TECUA3",
  ISSN =         "0040-165X (print), 1097-3729 (electronic)",
  ISSN-L =       "0040-165X",
  bibdate =      "Sat Sep 30 08:23:32 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/techculture1970.bib",
  URL =          "https://muse.jhu.edu/pub/1/article/891767/pdf",
  acknowledgement = ack-nhfb,
  ajournal =     "Tech. Culture",
  fjournal =     "Technology and Culture",
  journal-URL =  "https://muse.jhu.edu/journal/194",
}

@TechReport{CPI:1976:CMS,
  author =       "{Computation Planning Incorporated}",
  title =        "{Cryptopak}: modular subroutine library for
                 cryptographic transformation",
  type =         "Report",
  institution =  "Computation Planning Incorporated",
  address =      "Bethesda, MD, USA",
  year =         "1976",
  bibdate =      "Sat Jun 10 11:19:06 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Diffie:1976:CPD,
  author =       "Whitfield Diffie and Martin E. Hellman",
  title =        "A critique of the proposed {Data Encryption
                 Standard}",
  journal =      j-CACM,
  volume =       "19",
  number =       "3",
  pages =        "164--165",
  month =        mar,
  year =         "1976",
  DOI =          "https://doi.org/10.1145/360018.360031",
  bibdate =      "Sat Jun 10 11:27:35 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://dl.acm.org/doi/pdf/10.1145/360018.360031",
  abstract =     "[From the first paragraph: ``Motivated by the growing
                 need for cryptographic protection of computerized data,
                 the National Bureau of Standards has proposed a data
                 encryption standard. The purpose of such a standard is
                 to foster compatibility among users and to ensure that
                 the algorithm used is of high quality. We believe that
                 the proposed standard fails to meet these criteria in
                 its current form and should be modified prior to its
                 adoption.''",
  acknowledgement = ack-nhfb,
}

@Article{Diffie:1976:NDC,
  author =       "Whitfield Diffie and Martin E. Hellman",
  title =        "New Directions in Cryptography",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-22",
  number =       "6",
  pages =        "644--654",
  month =        nov,
  year =         "1976",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1976.1055638",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://ee.stanford.edu/~hellman/publications/24.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  referencedin = "Referenced in \cite[Ref. 8]{Kaliski:1995:SUR},
                 \cite[Ref. 8]{Goldreich:1997:FMCb}, \cite[Ref.
                 1]{Wiener:1998:PCP}, \cite[Ref. 3]{Handschuh:1998:SCC},
                 \cite[Ref. 2]{Haber:1995:HDD}.",
  remark =       "This important paper, the first public description of
                 public-key cryptography (see also
                 \cite{Merkle:1978:SCI,Ellis:1975:PKC}), begins with the
                 prescient statement ``We stand today on the brink of a
                 revolution in cryptography.'' and ends with ``Thomas
                 Jefferson, a cryptographic amateur, invented a system
                 which was still in use in World War II [2, pp.
                 192--195], while the most noted cryptographic system of
                 the twentieth century, the rotor machine, was invented
                 simultaneously by four separate people, all amateurs
                 [2, pp. 415, 420, 422--424]. We hope this will inspire
                 others to work in this fascinating area in which
                 participation has been discouraged in the recent past
                 by a nearly total government monopoly.'' Their
                 reference [2] is \cite{Kahn:1967:CSSa}.",
}

@InProceedings{Diffie:1976:PKC,
  author =       "Whitfield Diffie and Martin E. Hellman",
  editor =       "{IEEE}",
  booktitle =    "{IEEE International Symposium on Information Theory,
                 June 21--24, 1976, Ronneby, Sweden}",
  title =        "Public key cryptography",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "??--??",
  year =         "1976",
  bibdate =      "Sat Jun 10 11:30:52 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Friedman:1976:AMC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Advanced military cryptography",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "113",
  year =         "1976",
  ISBN =         "0-89412-011-5",
  ISBN-13 =      "978-0-89412-011-4",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Continuation of Elementary military cryptography,
                 Aegean Park Press, 1976.",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "ciphers; cryptography",
}

@Book{Friedman:1976:CCA,
  author =       "William F. (William Frederick) Friedman",
  title =        "Cryptography and cryptanalysis articles",
  volume =       "5--6",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "??",
  year =         "1976",
  LCCN =         "Z103 .C79 1976",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "ciphers --- addresses, essays, lectures; cryptography
                 --- addresses, essays, lectures; Cryptography.",
}

@Book{Friedman:1976:CEC,
  author =       "William F. (William Frederick) Friedman",
  title =        "The classic elements of cryptanalysis: with new added
                 problems for the solver",
  volume =       "3",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "????",
  year =         "1976",
  ISBN =         "0-89412-002-6",
  ISBN-13 =      "978-0-89412-002-2",
  bibdate =      "Tue Dec 26 07:31:03 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Friedman:1976:EC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Elements of cryptanalysis",
  volume =       "3",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "172",
  year =         "1976",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography",
}

@Book{Friedman:1976:EMC,
  author =       "William Frederick Friedman",
  title =        "Elementary military cryptography",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "86",
  year =         "1976",
  ISBN =         "0-89412-010-7",
  ISBN-13 =      "978-0-89412-010-7",
  LCCN =         "Z104 .F8740 1976",
  bibdate =      "Fri Feb 16 11:46:14 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "On cover: Formerly Special text no. 165 (1935)",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "ciphers; cryptography",
}

@Book{Friedman:1976:ZTJ,
  author =       "William F. (William Frederick) Friedman and Charles
                 Jastrow Mendelsohn",
  title =        "The {Zimmermann} telegram of {January 16, 1917}, and
                 its cryptographic background",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "33",
  year =         "1976",
  ISBN =         "0-89412-009-3",
  ISBN-13 =      "978-0-89412-009-1",
  LCCN =         "D511 .F683 1976",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "William Frederick Friedman (1891--1969)",
  keywords =     "World War, 1914--1918 -- causes; Zimmermann, Arthur,
                 1864--1940",
}

@Article{Griffiths:1976:AMR,
  author =       "Patricia P. Griffiths and Bradford W. Wade",
  title =        "An Authorization Mechanism for a Relational Database
                 System",
  journal =      j-TODS,
  volume =       "1",
  number =       "3",
  pages =        "242--255",
  month =        sep,
  year =         "1976",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Sat Apr 14 10:34:48 MDT 2001",
  bibsource =    "Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tods.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1976-1-3/p242-griffiths/p242-griffiths.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1976-1-3/p242-griffiths/",
  abstract =     "A multiuser database system must selectively permit
                 users to share data, while retaining the ability to
                 restrict data access. There must be a mechanism to
                 provide protection and security, permitting information
                 to be accessed only by properly authorized users.
                 Further, when tables or restricted views of tables are
                 created and destroyed dynamically, the granting,
                 authentication, and revocation of authorization to use
                 them must also be dynamic. Each of these issues and
                 their solutions in the context of the relational
                 database management system System R are discussed.
                 \par

                 When a database user creates a table, he is fully and
                 solely authorized to perform upon it actions such as
                 read, insert, update, and delete. He may explicitly
                 grant to any other user any or all of his privileges on
                 the table. In addition he may specify that that user is
                 authorized to further grant these privileges to still
                 other users. The result is a directed graph of granted
                 privileges originating from the table creator.\par

                 At some later time a user A may revoke some or all of
                 the privileges which he previously granted to another
                 user B. This action usually revokes the entire subgraph
                 of the grants originating from A's grant to B. It may
                 be, however, that B will still possess the revoked
                 privileges by means of a grant from another user C, and
                 therefore some or all of B's grants should not be
                 revoked. This problem is discussed in detail, and an
                 algorithm for detecting exactly which of B's grants
                 should be revoked is presented.",
  acknowledgement = ack-nhfb,
  annote =       "Defines a dynamic authorization mechanism. A database
                 user can grant or revoke privileges (such as to read,
                 insert, or delete) on a file that he has created.
                 Furthermore, he can authorize others to grant these
                 same privileges. The database management system keeps
                 track of a directed graph, emanating from the creator
                 of granted privileges.",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "access control; authorization; data dependent
                 authorization; database systems; privacy; protection in
                 databases; revocation of authorization; security",
  subject =      "Information Systems --- Database Management ---
                 Systems (H.2.4): {\bf Relational databases};
                 Information Systems --- Database Management --- Systems
                 (H.2.4); Information Systems --- Database Management
                 --- General (H.2.0): {\bf Security, integrity, and
                 protection**}",
}

@Article{Guillen:1976:AC,
  author =       "M. Guillen",
  title =        "Automated cryptography",
  journal =      j-SCIENCE-NEWS,
  volume =       "110",
  number =       "12",
  pages =        "188--190",
  day =          "18",
  month =        sep,
  year =         "1976",
  CODEN =        "SCNEBK",
  ISSN =         "0036-8423 (print), 1943-0930 (electronic)",
  ISSN-L =       "0036-8423",
  bibdate =      "Sat Jun 10 11:48:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Science News (Washington, DC)",
  journal-URL =  "http://www.jstor.org/journals/00368423.html;
                 http://www.sciencenews.org/view/archives;
                 http://www3.interscience.wiley.com/journal/122396840/home",
}

@InProceedings{Guy:1976:HFN,
  author =       "R. K. Guy",
  title =        "How to factor a number",
  crossref =     "Hartnell:1976:PFM",
  pages =        "49--89",
  year =         "1976",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Odlyzko:1995:FIF}.",
}

@Article{Harrison:1976:POS,
  author =       "Michael A. Harrison and Walter L. Ruzzo and Jeffrey D.
                 Ullman",
  title =        "Protection in Operating Systems",
  journal =      j-CACM,
  volume =       "19",
  number =       "8",
  pages =        "461--471",
  month =        aug,
  year =         "1976",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68A99",
  MRnumber =     "54 14474",
  MRreviewer =   "George I. Davida",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "A model of protection mechanisms in computing systems
                 is presented and its appropriateness is argued. The
                 ``safety'' problem for protection systems under this
                 model is to determine in a given situation whether a
                 subject can acquire a particular right to an object. In
                 restricted cases, it can be shown that this problem is
                 decidable; i.e., there is an algorithm to determine
                 whether a system in a particular configuration is safe.
                 In general, and under surprisingly weak assumptions, it
                 cannot be decided if a situation is safe. Various
                 implications of this fact are discussed.",
  acknowledgement = ack-nhfb,
  classcodes =   "C4210 (Formal logic); C4220 (Automata theory); C6150J
                 (Operating systems)",
  classification = "721; 723",
  corpsource =   "Univ. of California, Berkeley, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "(computers); automata theory --- Turing Machines;
                 computability and decidability; computer operating
                 systems --- Design; computer security; data processing;
                 decidability; operating systems; protection; protection
                 systems; security model; security of data; Turing
                 machine; Turing machines",
  ort =          "ordner sicherheit",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@TechReport{Hellman:1976:SPN,
  author =       "M. E. Hellman",
  title =        "Statement to participants at {NBS} workshop on
                 cryptography in support of computer security",
  type =         "Unpublished memorandum",
  institution =  "????",
  address =      "????",
  day =          "21",
  month =        sep,
  year =         "1976",
  bibdate =      "Sat Jun 10 11:50:49 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kahn:1976:TC,
  author =       "David Kahn",
  title =        "Tapping computers",
  journal =      j-NY-TIMES,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "3",
  month =        apr,
  year =         "1976",
  CODEN =        "NYTIAO",
  ISSN =         "0362-4331 (print), 1542-667X, 1553-8095",
  ISSN-L =       "0362-4331",
  bibdate =      "Sat Jun 10 11:53:12 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "New York Times",
  journal-URL =  "http://www.nytimes.com/",
}

@Book{Kullback:1976:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis",
  volume =       "4",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Revised",
  pages =        "v + 206",
  year =         "1976",
  LCCN =         "Z104 .K84",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography; cryptography --- statistical
                 methods",
}

@TechReport{Lexar:1976:END,
  author =       "{Lexar Corporation}",
  title =        "An evaluation of the {NBS Data Encryption Standard}",
  type =         "Unpublished report",
  institution =  "Lexar Corporation",
  address =      "11611 San Vicente Boulevard, Los Angeles, CA, USA",
  year =         "1976",
  bibdate =      "Sat Jun 10 12:04:12 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Macalister:1976:SLI,
  author =       "Robert Alexander Stewart Macalister and John Sampson",
  title =        "The secret languages of {Ireland}: {Ogham},
                 {Hisperic}, {Bearlagair na Saer}, {Bog-Latin}, and
                 cryptography, with special reference to the origin and
                 nature of the {Shelta} language; partly based upon
                 collections and manuscripts of the late {John Sampson};
                 with an {English}-jargon vocabulary",
  publisher =    "APA-Philo Press",
  address =      "Amsterdam, The Netherlands",
  pages =        "x + 284",
  year =         "1976",
  ISBN =         "90-6022-276-8",
  ISBN-13 =      "978-90-6022-276-8",
  LCCN =         "PM9001 .M2 1976",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of the 1937 ed. published by the Cambridge
                 University Press, Cambridge, England.",
  acknowledgement = ack-nhfb,
  keywords =     "cant; Druids and Druidism; Irish language --- history;
                 Irish language --- writing; Shelta",
}

@MastersThesis{Marion:1976:ANB,
  author =       "Bruce Phillip Marion",
  title =        "Analysis of {National Bureau of Standards Data
                 Encryption Algorithm}",
  type =         "Thesis ({Engineer})",
  school =       "Department of Electrical Engineering, Stanford
                 University",
  address =      "Stanford, CA, USA",
  pages =        "v + 46",
  year =         "1976",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cipher and telegraph codes --- Data processing;
                 Electronic data processing departments --- Security
                 measures",
}

@Article{Miller:1976:RHT,
  author =       "G. L. Miller",
  title =        "{Reimann}'s hypothesis and tests for primality",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "13",
  pages =        "300--317",
  year =         "1976",
  CODEN =        "JCSSBM",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
  referencedin = "Referenced in \cite[Ref. 16]{Kaliski:1995:SUR}.",
}

@MastersThesis{Mitchell:1976:EAD,
  author =       "James Melvin Mitchell",
  title =        "Encryption algorithm for data security based on a
                 polyalphabetic substitution scheme and a pseudo-random
                 number generator",
  type =         "Thesis ({M.S.})",
  school =       "University of Tennessee, Knoxville",
  address =      "Knoxville, TN, USA",
  pages =        "v + 83",
  year =         "1976",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{NBS:1976:NWC,
  author =       "{NBS}",
  title =        "The {NBS} workshop on cryptography in support of
                 computer security",
  type =         "Unpublished memorandum",
  institution =  pub-NBS,
  address =      pub-NBS:adr,
  month =        sep,
  year =         "1976",
  bibdate =      "Sat Jun 10 12:20:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sambur:1976:SEM,
  author =       "M. R. Sambur and N. S. Jayant",
  title =        "Speech Encryption by Manipulations of {LPC}
                 Parameters",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "55",
  number =       "9",
  pages =        "1373--1388",
  month =        nov,
  year =         "1976",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Tue Nov 9 11:15:56 MST 2010",
  bibsource =    "http://bstj.bell-labs.com/oldfiles/year.1976/BSTJ.1976.5509.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://bstj.bell-labs.com/BSTJ/images/Vol55/bstj55-9-1373.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Book{Shulman:1976:ABC,
  author =       "David Shulman",
  title =        "An annotated bibliography of cryptography",
  volume =       "37",
  publisher =    "Garland Pub.",
  address =      "New York, NY, USA",
  pages =        "388",
  year =         "1976",
  ISBN =         "0-8240-9974-5",
  ISBN-13 =      "978-0-8240-9974-9",
  LCCN =         "Z103.A1 S58",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Garland reference library of the humanities",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Book{Stevenson:1976:MCI,
  author =       "William Stevenson",
  title =        "A man called {Intrepid}: the secret war",
  publisher =    pub-HARCOURT-BRACE-JOVANOVICH,
  address =      pub-HARCOURT-BRACE-JOVANOVICH:adr,
  pages =        "xxv + 486 + 16",
  year =         "1976",
  ISBN =         "0-15-156795-6",
  ISBN-13 =      "978-0-15-156795-9",
  LCCN =         "D810.S8 S85",
  bibdate =      "Mon Aug 25 16:25:51 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Stephenson, whose code name was Intrepid, tells how he
                 established a worldwide intelligence network to combat
                 Nazism.",
  acknowledgement = ack-nhfb,
  author-dates = "1924--2013",
  keywords =     "Bombe; cryptography; Ultra",
  subject =      "Stephenson, William Samuel; Stephenson, William
                 Samuel; World War, 1939--1945; Secret service; Secret
                 service",
  subject-dates = "1896--1989",
  tableofcontents = "Point of departure: a foreword by Intrepid \\
                 A break in the silence: a historical note by Charles
                 Howard Ellis \\
                 Significant dates \\
                 In time of peace \\
                 Fight on \\
                 Impeachable offenses \\
                 Cry, ``havoc!'' \\
                 An original and sinister touch \\
                 The end of the beginning \\
                 Epilogue: A view from another island \\
                 Valediction",
}

@Article{Yasaki:1976:EAK,
  author =       "E. K. Yasaki",
  title =        "Encryption algorithm: key size is the thing",
  journal =      j-DATAMATION,
  volume =       "22",
  number =       "3",
  pages =        "164--166",
  month =        mar,
  year =         "1976",
  CODEN =        "DTMNAT",
  ISSN =         "0011-6963",
  bibdate =      "Sat Jun 10 12:33:05 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Datamation",
}

@Book{Barker:1977:CHC,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of the {Hagelin} cryptograph",
  volume =       "17",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "xi + 223",
  year =         "1977",
  ISBN =         "0-89412-022-0",
  ISBN-13 =      "978-0-89412-022-0",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Claimed in \cite{} to be the main published work on
                 the Hagelin M-209 machine.",
  keywords =     "ciphers; Ciphers; Cryptography; cryptography",
}

@Book{Bell:1977:IVU,
  author =       "Ernest L. Bell",
  title =        "An initial view of {Ultra} as an {American} weapon",
  publisher =    "T S U Press",
  address =      "Keene, NH, USA",
  pages =        "iii + 110",
  year =         "1977",
  LCCN =         "D810.C88 B45",
  bibdate =      "Mon May 08 07:14:10 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  xxISBN =       "none",
}

@Book{Clark:1977:MWBa,
  author =       "Ronald William Clark",
  title =        "The man who broke {Purple}: the life of {Colonel
                 William F. Friedman}, who deciphered the {Japanese}
                 code in {World War II}",
  publisher =    "Little, Brown",
  address =      "Boston, MA, USA",
  pages =        "ix + 271",
  year =         "1977",
  ISBN =         "0-316-14595-5",
  ISBN-13 =      "978-0-316-14595-4",
  LCCN =         "UB290 .C58 1977",
  bibdate =      "Thu Mar 29 18:43:38 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Friedman, William F (William Frederick);
                 Cryptographers; United States; Biography",
  subject-dates = "1891--1969",
}

@Book{Clark:1977:MWBb,
  author =       "Ronald William Clark",
  title =        "The man who broke {Purple}: the life of the world's
                 greatest cryptologist, {Colonel William F. Friedman}",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  pages =        "xi + 212 + 4",
  year =         "1977",
  ISBN =         "0-297-77279-1",
  ISBN-13 =      "978-0-297-77279-8",
  LCCN =         "UB290 .C58 1977b",
  bibdate =      "Thu Mar 29 18:43:38 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Friedman, William F (William Frederick);
                 Cryptographers; United States; Biography",
  subject-dates = "1891--1969",
}

@Article{Diffie:1977:ECN,
  author =       "Whitfield Diffie and Martin E. Hellman",
  title =        "Exhaustive Cryptanalysis of the {NBS Data Encryption
                 Standard}",
  journal =      j-COMPUTER,
  volume =       "10",
  number =       "6",
  pages =        "74--84",
  month =        jun,
  year =         "1977",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
                 https://www.math.utah.edu/pub/tex/bib/computer.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "The article deals with data encryption standard
                 adopted by the National Bureau of Standards, providing
                 a basic argument concerning the standard's inadequate
                 level of security. Cost-effective ways are recommended
                 to avoid the problem.",
  acknowledgement = ack-nhfb,
  classification = "722; 902",
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  journalabr =   "Computer",
  keywords =     "cryptanalysis; data processing; standards",
  referencedin = "Referenced in \cite[Ref. 12]{Biham:1998:TA}.",
}

@Article{Feiertag:1977:PMS,
  author =       "R. J. Feiertag and K. N. Levitt and L. Robinson",
  title =        "Proving multilevel security of a system design",
  journal =      j-OPER-SYS-REV,
  volume =       "11",
  number =       "5",
  pages =        "57--65",
  month =        nov,
  year =         "1977",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Filby:1977:TPT,
  author =       "P. William Filby",
  title =        "Teaching {Purple} to Talk Saved Thousands",
  journal =      "Baltimore Sun",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "16",
  month =        oct,
  year =         "1977",
  bibdate =      "Sun Dec 24 08:50:19 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Review of \booktitle{The Man Who Broke Purple}, by
                 Ronald Clark.",
  acknowledgement = ack-nhfb,
}

@Manual{Gait:1977:VCH,
  author =       "Jason Gait",
  title =        "Validating the correctness of hardware implementations
                 of the {NBS Data Encryption Standard}",
  volume =       "500-20",
  organization = pub-NBS,
  address =      pub-NBS:adr,
  pages =        "iv + 40",
  month =        nov,
  year =         "1977",
  CODEN =        "XNBSAV",
  LCCN =         "T1.U52 no.500-20",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "NBS special publication, computer science and
                 technology",
  acknowledgement = ack-nhfb,
  govtdocnumber = "0 13.10:500-20",
  keywords =     "computers --- access control --- code words; Computers
                 --- Access control --- Passwords; computers --- access
                 control --- passwords; Computers --- Testing; computers
                 --- testing; Data encryption (Computer science); data
                 encryption (computer science); Monte Carlo method",
}

@Article{Gardner:1977:MGN,
  author =       "Martin Gardner",
  title =        "Mathematical Games: A new kind of cipher that would
                 take millions of years to break",
  journal =      j-SCI-AMER,
  volume =       "237",
  number =       "2",
  pages =        "120--124",
  month =        aug,
  year =         "1977",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican0877-120",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Wed May 22 12:01:13 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam1970.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v237/n2/pdf/scientificamerican0877-120.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  referencedin = "Referenced in \cite[Ref. 5]{Odlyzko:1995:FIF},
                 \cite[Ref. 2]{Anonymous:1996:RF}.",
  remark =       "This article introduced public-key cryptography to a
                 wide audience.",
}

@Article{Kak:1977:SEU,
  author =       "S. C. Kak and N. S. Jayant",
  title =        "On Speech Encryption Using Waveform Scrambling",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "56",
  number =       "5",
  pages =        "781--808",
  month =        may # "--" # jun,
  year =         "1977",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Tue Nov 9 11:15:56 MST 2010",
  bibsource =    "http://bstj.bell-labs.com/oldfiles/year.1977/BSTJ.1977.5605.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://bstj.bell-labs.com/BSTJ/images/Vol56/bstj56-5-781.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Book{Katzan:1977:SDE,
  author =       "Harry {Katzan, Jr.}",
  title =        "The Standard Data Encryption Algorithm",
  publisher =    "Petrocelli Books",
  address =      "New York, NY, USA",
  pages =        "viii + 134",
  year =         "1977",
  ISBN =         "0-89433-016-0",
  ISBN-13 =      "978-0-89433-016-2",
  LCCN =         "QA76.9 .A25K37",
  bibdate =      "Wed Sep 28 08:01:24 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computer security --- Passwords; Data encryption
                 (Computer science)",
}

@Article{Kolata:1977:NCC,
  author =       "Gina Bari Kolata",
  title =        "News and Comment: Computer Encryption and the
                 {National Security Agency} Connection",
  journal =      j-SCIENCE,
  volume =       "197",
  number =       "4302",
  pages =        "438--440",
  day =          "29",
  month =        jul,
  year =         "1977",
  CODEN =        "SCIEAS",
  DOI =          "https://doi.org/10.1126/science.197.4302.438",
  ISSN =         "0036-8075 (print), 1095-9203 (electronic)",
  ISSN-L =       "0036-8075",
  bibdate =      "Sun Dec 24 09:02:13 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://science.sciencemag.org/content/197/4302/438/",
  acknowledgement = ack-nhfb,
  fjournal =     "Science",
  journal-URL =  "http://www.sciencemag.org/archive/",
  remark =       "This article discusses the view that the US National
                 Bureau of Standards (NBS) Data Encryption Standard
                 (DES) was possibly designed to allow a back door for
                 the US National Security Agency (NSA), or that the NSA
                 would have sufficient computer resources to break DES,
                 which has only a 56-bit encryption key.",
}

@Manual{NBS:1977:DES,
  author =       "{National Bureau of Standards}",
  title =        "Data Encryption Standard",
  volume =       "46",
  organization = "U. S. Department of Commerce",
  address =      "Washington, DC, USA",
  pages =        "18",
  month =        jan,
  year =         "1977",
  LCCN =         "JK468.A8 A31 no.46",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Federal information processing standards publication",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 21]{Biham:1998:TA}.",
  xxISBN =       "none",
}

@Book{Pierce:1977:SSP,
  author =       "Clayton C. Pierce",
  title =        "Secret and secure: privacy, cryptography, and secure
                 communication",
  publisher =    "Pierce",
  address =      "Ventura, CA, USA",
  pages =        "iv + 84",
  year =         "1977",
  LCCN =         "Z103.P531",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Article{Pless:1977:ESC,
  author =       "Vera S. Pless",
  title =        "Encryption schemes for computer confidentiality",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-26",
  number =       "11",
  pages =        "1133--1136",
  year =         "1977",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.1977.1674759",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  MRclass =      "94A10",
  MRnumber =     "57 \#5410",
  MRreviewer =   "A. T. Amin",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Rabin:1977:DS,
  author =       "M. O. Rabin",
  editor =       "Richard A. DeMillo and others",
  booktitle =    "Foundations of Secure Computation: Papers presented at
                 a 3 day workshop held at Georgia Institute of
                 Technology, Atlanta, October 1977",
  title =        "Digitalized Signatures",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "x + 404",
  year =         "1977",
  ISBN =         "0-12-210350-5",
  ISBN-13 =      "978-0-12-210350-6",
  LCCN =         "QA76.9.A25 F66",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 26]{Goldreich:1997:FMCb}.",
}

@Article{Rejewski:1977:ATP,
  author =       "Marian Rejewski",
  title =        "An application of the theory of permutations in
                 breaking the {Enigma} cipher",
  journal =      "Applications of Mathematicae, Polish Academy of
                 Sciences",
  volume =       "16",
  number =       "??",
  pages =        "543--559",
  month =        "????",
  year =         "1977",
  bibdate =      "Sun Dec 01 09:58:13 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Rohwer:1977:CCB,
  author =       "J{\"u}rgen Rohwer",
  title =        "The critical convoy battles of {March 1943}: the
                 battle for {HX.229\slash SC122}",
  publisher =    "Naval Institute Press",
  address =      "Annapolis, MD, USA",
  pages =        "256 + 32",
  year =         "1977",
  ISBN =         "0-87021-818-2",
  ISBN-13 =      "978-0-87021-818-7",
  LCCN =         "D770 .R59313",
  bibdate =      "Tue Aug 26 07:10:39 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Revised English translation by Derek Masters of the
                 German original \cite{Rohwer:1975:GIM}.",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite[Chapter 10]{Good:1979:EWC}, this
                 book contains some discussion of cryptanalysis. I have
                 been unable to locate a table of contents for this
                 book.",
  subject =      "World War, 1939--1945; Campaigns; Atlantic Ocean;
                 Naval operations; Submarine; Naval operations, German;
                 Naval convoys; History; 20th century; Military
                 campaigns.; Military operations, Naval; German.;
                 Submarine.; Naval convoys.",
}

@Book{Sacco:1977:MC,
  author =       "Luigi Sacco",
  title =        "Manual of cryptography",
  volume =       "14",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "x + 193",
  year =         "1977",
  ISBN =         "0-89412-016-6",
  ISBN-13 =      "978-0-89412-016-9",
  LCCN =         "Z104 .S313 1977",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: Manuale di crittografia. Bibliography:
                 p. viii.",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Sinnott:1977:CTC,
  author =       "Robert Sinnott",
  title =        "A catalogue of titles on chess, checkers, and
                 cryptology in the library of the {United States
                 Military Academy, West Point, New York}",
  publisher =    "????",
  address =      "Norwell, MA, USA",
  pages =        "35",
  year =         "1977",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Photostatic copy, partly of typescript, partly of
                 printed matter.",
  keywords =     "Checkers --- Bibliography --- Catalogs; Chess ---
                 Bibliography --- Catalogs; Cryptography ---
                 Bibliography --- Catalogs.",
}

@Book{USNBS:1977:DES,
  author =       "{United States.National Bureau of Standards}",
  title =        "{Data Encryption Standard}",
  volume =       "46",
  publisher =    pub-NBS,
  address =      pub-NBS:adr,
  pages =        "18",
  year =         "1977",
  LCCN =         "JK468.A8 A31 no.46",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Federal Information Processing Standards publication",
  acknowledgement = ack-nhfb,
  annote =       "Cover title.",
  keywords =     "Computers --- Access control --- Standards.",
}

@Article{Anonymous:1978:NPAd,
  author =       "Anonymous",
  title =        "New product applications: Single-board bipolar
                 microcomputer emulates any mini- or microcomputer",
  journal =      j-IEEE-SPECTRUM,
  volume =       "15",
  number =       "4",
  pages =        "68--73",
  month =        apr,
  year =         "1978",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1978.6367674",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Band pass filters; Companies; Cryptography;
                 Microcomputers; Microprocessors; Modems",
}

@Book{Anonymous:1978:ODA,
  author =       "Anonymous",
  title =        "The origin and development of the {Army Security
                 Agency}, 1917--1947",
  volume =       "16",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "51",
  year =         "1978",
  ISBN =         "0-89412-025-5",
  ISBN-13 =      "978-0-89412-025-1",
  LCCN =         "UB290 .O75 1978",
  bibdate =      "Mon Sep 13 06:43:57 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A cryptographic series",
  acknowledgement = ack-nhfb,
}

@TechReport{Chaum:1978:ICP,
  author =       "D. L. Chaum and R. S. Fabry",
  title =        "Implementing capability-based protection using
                 encryption",
  type =         "Technical Report",
  number =       "UCB/ERL M78/46",
  institution =  "University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  edition =      "July 17, 1978",
  pages =        "i + 9",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "This work was partially supported by the National
                 Science Foundation Center.",
  keywords =     "Computer networks --- Access control; Computers ---
                 Access control; Cryptography",
}

@Article{Christiansen:1978:SL,
  author =       "D. Christiansen",
  title =        "Spectral lines",
  journal =      j-IEEE-SPECTRUM,
  volume =       "15",
  number =       "1",
  pages =        "23--23",
  month =        jan,
  year =         "1978",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1978.6369376",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Graphics; IEEE publications; Libraries;
                 Materials; Microprocessors; Organizations",
}

@Article{Ehrsam:1978:CKM,
  author =       "William F. Ehrsam and Stephen M. Matyas and Carl H.
                 Meyer and Walter L. Tuchman",
  title =        "A Cryptographic Key Management Scheme for Implementing
                 the {Data Encryption Standard}",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "106--125",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Data being transmitted through a communications
                 network can be protected by cryptography. In a data
                 processing environment, cryptography is implemented by
                 an algorithm which utilizes a secret key, or sequence
                 of bits. Any key-controlled cryptographic algorithm,
                 such as the Data Encryption Standard, requires a
                 protocol for the management of its cryptographic keys.
                 The complexity of the key management protocol
                 ultimately depends on the level of functional
                 capability provided by the cryptographic system. This
                 paper discusses a possible key management scheme that
                 provides the support necessary to protect
                 communications between individual end users (end-to-end
                 encryption) and that also can be used to protect data
                 stored or transported on removable media.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Filby:1978:BRM,
  author =       "P. William Filby",
  title =        "Book Review: {{\booktitle{The Man Who Broke Purple}},
                 by Ronald Clark, 271 pages, Little, Brown}",
  journal =      j-CRYPTOLOG,
  volume =       "5",
  number =       "1",
  pages =        "13--14",
  month =        jan,
  year =         "1978",
  ISSN =         "0740-7602",
  ISSN-L =       "0740-7602",
  bibdate =      "Sun Dec 24 08:50:19 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of \cite{Filby:1977:TPT}.",
  URL =          "https://archive.org/download/cryptolog_38/cryptolog_38.pdf",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Funk:1978:DUS,
  author =       "Mark Robert Funk",
  title =        "A digital ultrasound system for data collection,
                 imaging, and tissue signature analysis",
  type =         "Thesis ({M.S.})",
  school =       "Department of Electrical Engineering, Michigan State
                 University",
  address =      "East Lansing, MI 48824, USA",
  pages =        "vii + 141",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Tissues --- Analysis; Ultrasonics in biology ---
                 Automation; Ultrasonics in biology.",
}

@Article{Gaines:1978:SSP,
  author =       "R. Stockton Gaines and Norman Z. Shapiro",
  title =        "Some security principles and their application to
                 computer security",
  journal =      j-OPER-SYS-REV,
  volume =       "12",
  number =       "3",
  pages =        "19--28",
  month =        jul,
  year =         "1978",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:44 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Gait:1978:EEP,
  author =       "Jason Gait",
  title =        "Easy entry: the password encryption problem",
  journal =      j-OPER-SYS-REV,
  volume =       "12",
  number =       "3",
  pages =        "54--60",
  month =        jul,
  year =         "1978",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:44 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Givierge:1978:CC,
  author =       "Marcel Givierge",
  title =        "Course in cryptography",
  volume =       "19",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "164",
  year =         "1978",
  ISBN =         "0-89412-028-X",
  ISBN-13 =      "978-0-89412-028-2",
  LCCN =         "",
  bibdate =      "Sat Sep 25 11:01:24 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "English translation of \cite{Givierge:1932:CC}",
  series =       "A cryptographic series",
  acknowledgement = ack-nhfb,
}

@Article{Herlestam:1978:CRS,
  author =       "Tore Herlestam",
  title =        "Critical remarks on some public-key cryptosystems",
  journal =      j-BIT,
  volume =       "18",
  number =       "4",
  pages =        "493--496",
  month =        dec,
  year =         "1978",
  CODEN =        "NBITAB",
  DOI =          "https://doi.org/10.1007/BF01932028",
  ISSN =         "0006-3835 (print), 1572-9125 (electronic)",
  ISSN-L =       "0006-3835",
  MRclass =      "94B99",
  MRnumber =     "80b:94033",
  MRreviewer =   "M. C. Cheng",
  bibdate =      "Wed Jan 4 18:52:15 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=18&issue=4;
                 https://www.math.utah.edu/pub/tex/bib/bit.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=18&issue=4&spage=493",
  fjournal =     "BIT; Nordisk Tidskrift for Informationsbehandling
                 (BIT)",
  journal-URL =  "http://link.springer.com/journal/10543",
}

@Book{Jones:1978:MSW,
  author =       "Reginald V. Jones",
  title =        "Most secret war: [{British} scientific intelligence,
                 1939--1945]",
  publisher =    "Hamilton",
  address =      "London, UK",
  pages =        "xx + 556 + 16",
  year =         "1978",
  ISBN =         "0-241-89746-7",
  ISBN-13 =      "978-0-241-89746-1",
  LCCN =         "????",
  bibdate =      "Mon Aug 25 16:47:40 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "1911--",
  subject =      "Geheimdienst; Spionage; Weltkrieg (1939--1945);
                 Geschichte; Gro{\ss}britannien; Jones, R. V (Reginald
                 Victor); World War, 1939--1945; Secret service; Great
                 Britain; Personal narratives, British; Technology;
                 Scientists; England; Biography; Service des
                 renseignements militaires; Guerre mondiale, 1939--1945;
                 Service secret; Grande-Bretagne; Tweede Wereldoorlog;
                 Geheime Diensten; Natuurwetenschappen; Technische
                 wetenschappen; Scientists; Secret service; Technology;
                 History; George VI, 1936--1952",
}

@Book{Jones:1978:WWB,
  author =       "R. V. (Reginald Victor) Jones",
  title =        "The Wizard War: {British} Scientific Intelligence,
                 1939--1945",
  publisher =    "Coward, McCann and Geoghegan",
  address =      "New York, NY, USA",
  pages =        "xx + 556 + 16",
  year =         "1978",
  ISBN =         "0-698-10896-5",
  ISBN-13 =      "978-0-698-10896-7",
  LCCN =         "D810.C88 J66 1978",
  bibdate =      "Thu Aug 9 14:32:26 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/b/bohr-niels.bib;
                 https://www.math.utah.edu/pub/bibnet/authors/h/heisenberg-werner.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "https://en.wikipedia.org/wiki/Reginald_Victor_Jones",
  acknowledgement = ack-nhfb,
  author-dates = "Reginald Victor Jones (29 September 1911--17 December
                 1997)",
  remark =       "This is an excellent memoir by the World War II head
                 of British Air Intelligence. It has extensive coverage
                 of the development and use of radar and signal-homing
                 on both sides of the War. The author had substantial
                 influence in the intelligence services because he had
                 authority for direct contact with Prime Minister
                 Winston Churchill, when the need arose. Chapter 48
                 describes extensive meetings between the author and
                 Niels Bohr, and his son Aage Bohr. Chapters 44--46
                 discuss the Nazi flying bombs and rockets developed,
                 and tested in Baltic Ocean flights, by the Werner von
                 Braun team at Peenemuende on the north German coast,
                 and how successful the British were at eliminating many
                 of them before the attacks were successful. The book
                 also has shorter commentary on the 1945--1946
                 internment at Farm Hall (just outside Cambridge, UK) of
                 ten German atomic scientists, and the fact that all of
                 their conversations were secretly recorded,
                 transcribed, and translated from German to English. The
                 book was written more than 15 years before the expiry
                 of the fifty-year period mandated by the British
                 Official Secrets Act that finally allowed the release
                 of the transcripts of the recordings, but nevertheless
                 appears to be quite accurate about what was learned
                 from them. After the war, the author had several
                 opportunities to meet with high-ranking officers from
                 the war-time German military, and to learn how much
                 each side of the conflict knew of the other's
                 activities.",
  subject =      "Geheimdienst; Spionage; Weltkrieg (1939--1945);
                 Geschichte; Gro{\ss}britannien; Jones, R. V (Reginald
                 Victor); World War, 1939--1945; Secret service; Great
                 Britain; Personal narratives, British; Technology;
                 Scientists; England; Biography; Service des
                 renseignements militaires; Guerre mondiale, 1939--1945;
                 Service secret; Grande-Bretagne; Tweede Wereldoorlog;
                 Geheime Diensten; Natuurwetenschappen; Technische
                 wetenschappen; Scientists; Secret service; Technology;
                 History; George VI, 1936--1952",
  tableofcontents = "Illustrations / ix \\
                 Foreword by the Vicomtesse de Clarens / xiii \\
                 Acknowledgements / xv \\
                 Introduction / xvii \\
                 Part 1 \\
                 1: The men who went first / 3 \\
                 2: Friends and rivals / 13 \\
                 3: The Clarendon laboratory 1936--1938 / 21 \\
                 4: Inferior red 1936--1938 / 34 \\
                 5: Exile / 45 \\
                 6: The day before war broke out / 53 \\
                 7: The secret weapon / 57 \\
                 8: The Oslo report / 67 \\
                 9: A plan for intelligence / 72 \\
                 10: The phoney war / 78 \\
                 11: The crooked leg / 92 \\
                 12: Reflections / 106 \\
                 13: The fortunes of major Wintle / 111 \\
                 14: The fifth column / 114 \\
                 15: The Edda revived / 120 \\
                 16: Knickebein Jammed --- and photographed / 127 \\
                 17: The X-apparatus / 135 \\
                 18: Coventry / 146 \\
                 19: Target no. 54 / 154 \\
                 20: The atrocious crime / 161 \\
                 21: Wotan's other eye / 172 \\
                 22: Retrospect and prospect / 179 \\
                 Part 2 \\
                 23: Freya / 189 \\
                 24: Beams on the wane / 203 \\
                 25: `Jay' / 215 \\
                 26: W{\"u}rzburg / 223 \\
                 27: The Bruneval raid / 233 \\
                 28: The Baedeker beams / 250 \\
                 29: El Hatto / 254 \\
                 30: Pineapple / 260 \\
                 31: The Kammhuber line / 264 \\
                 32: Lichtenstein / 280 \\
                 33: Window / 287 \\
                 34: Hamburg / 300 \\
                 35: Heavy water / 306 \\
                 36: Revelations from the Secret Service / 310 \\
                 37: Full stretch / 318 \\
                 38: Peenem{\"u}nde / 332 \\
                 39: FZG 76 / 349 \\
                 40: The Americans convinced / 376 \\
                 41: Flames: problems of bomber command / 381 \\
                 42: The Baby Blitz / 396 \\
                 43: D-Day / 400 \\
                 44: V-1 / 413 \\
                 45: V-2 / 430 \\
                 46: V-3 / 462 \\
                 47: Bomber triumph / 465 \\
                 48: Nuclear energy / 472 \\
                 49: A.D.I. (science) overseas / 484 \\
                 50: The year of madness / 492 \\
                 51: German generals and staff colleges / 499 \\
                 52: Swords into ploughshares, bombs into saucers / 507
                 \\
                 53: Exeunt / 514 \\
                 Epilogue / 523 \\
                 Notes / 535 \\
                 Glossary / 539 \\
                 Index / 543",
}

@InCollection{Kam:1978:SDS,
  author =       "John B. Kam and George I. Davida",
  booktitle =    "Foundations of secure computation (Workshop, Georgia
                 Inst. Tech., Atlanta, Ga., 1977)",
  title =        "A structured design of substitution-permutation
                 encryption network",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "95--113",
  year =         "1978",
  MRclass =      "68B15 (68H05 94A99 94B15)",
  MRnumber =     "80b:68031",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
}

@Article{Lennon:1978:CAI,
  author =       "Richard E. Lennon",
  title =        "Cryptography Architecture for Information Security",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "138--150",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Information being transferred from point to point over
                 a public communications carrier or stored on portable
                 media can be protected, by the use of cryptography,
                 from accidental or intentional disclosure. Control
                 functions are required to ensure synchronization of the
                 process. In a communications environment, the control
                 functions become logically part of the network
                 architecture. IBM's Systems Network Architecture (SNA)
                 has been extended to allow the use of cryptography when
                 sensitive information is being processed. Architectural
                 similarities for the file environment are discussed.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; data processing",
}

@Book{Lewin:1978:UGW,
  author =       "Ronald Lewin",
  title =        "{Ultra} goes to war: the first account of {World War
                 II}'s greatest secret based on official documents",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "397 + 6",
  year =         "1978",
  ISBN =         "0-07-037453-8",
  ISBN-13 =      "978-0-07-037453-9",
  LCCN =         "D810.S7 L43 1978; D810.S7L43",
  bibdate =      "Fri May 13 08:13:27 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  price =        "US\$12.95",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939-1945; Secret service; Great Britain",
}

@Article{Matyas:1978:GDI,
  author =       "Stephen M. Matyas and Carl H. Meyer",
  title =        "Generation, Distribution, and Installation of
                 Cryptographic Keys",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "126--137",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A key controlled cryptographic system requires a
                 mechanism for the safe and secure generation,
                 distribution, and installation of its cryptographic
                 keys. Possible key generation, distribution, and
                 installation procedures are discussed for the key
                 management scheme presented in an accompanying paper.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Merkle:1978:HIS,
  author =       "Ralph Merkle and Martin E. Hellman",
  title =        "Hiding Information and Signatures in Trap Door
                 Knapsacks",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "24",
  number =       "5",
  pages =        "525--530",
  year =         "1978",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1978.1055927",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Thu Jan 21 14:42:38 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Merkle:1978:SCI,
  author =       "Ralph C. Merkle",
  title =        "Secure Communications Over Insecure Channels",
  journal =      j-CACM,
  volume =       "21",
  number =       "4",
  pages =        "294--299",
  month =        apr,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "According to traditional conceptions of cryptographic
                 security, it is necessary to transmit a key, by secret
                 means, before encrypted messages can be sent securely.
                 This paper shows that it is possible to select a key
                 over open communications channels in such a fashion
                 that communications security can be maintained. A
                 method is described which forces any enemy to expend an
                 amount of work which increases as the square of the
                 work required of the two communicants to select the
                 key. The method provides a logically new kind of
                 protection against the passive eaves dropper. It
                 suggests that further research on this topic will be
                 highly rewarding, both in a theoretical and a practical
                 sense.",
  acknowledgement = ack-nhfb,
  annote =       "This article was originally submitted August 1975; was
                 the publication delay due to U.S. Government security
                 reviews?",
  classcodes =   "C5600 (Data communication equipment and techniques);
                 C6130 (Data handling techniques)",
  classification = "723",
  corpsource =   "Dept. of Electrical Engng. and Computer Sci., Univ. of
                 California, Berkeley, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "communications channels; communications security;
                 computer network security; cryptographic security;
                 cryptography; cryptology; data communication systems;
                 data processing; insecure channels; key distribution;
                 open; passive eavesdropper; passive eavesdropping;
                 protection; public key cryptosystem; Security; security
                 of data; wiretap",
  treatment =    "T Theoretical or Mathematical",
}

@TechReport{Needham:1978:UEAa,
  author =       "R. M. (Roger Michael) Needham and Michael D.
                 Schroeder",
  title =        "Using encryption for authentication in large networks
                 of computers",
  number =       "CSL-78-4",
  institution =  "Xerox Palo Alto Research Center",
  address =      "Palo Alto, CA, USA",
  pages =        "??",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted June 1982.",
  acknowledgement = ack-nhfb,
}

@Article{Needham:1978:UEAb,
  author =       "Roger M. Needham and Michael D. Schroeder",
  title =        "Using Encryption for Authentication in Large Networks
                 of Computers",
  journal =      j-CACM,
  volume =       "21",
  number =       "12",
  pages =        "993--999",
  month =        dec,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 07:07:33 MST 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm21.html#NeedhamS78;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Use of encryption to achieve authenticated
                 communication in computer networks is discussed.
                 Example protocols are presented for the establishment
                 of authenticated connections, for the management of
                 authenticated mail, and for signature verification and
                 document integrity guarantee. Both conventional and
                 public-key encryption algorithms are considered as the
                 basis for protocols.",
  acknowledgement = ack-nhfb,
  classcodes =   "C5620 (Computer networks and techniques); C6130 (Data
                 handling techniques)",
  classification = "723",
  corpsource =   "Xerox Palo Alto Res. Center, Palo Alto, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "authenticated communication; computer networks; data
                 processing --- Security of Data; document integrity;
                 encryption; guarantee; protocols; public key encryption
                 algorithms; security of data; signature verification",
  oldlabel =     "NeedhamS78",
  treatment =    "P Practical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/NeedhamS78",
}

@Article{Nilsson:1978:OST,
  author =       "Arne Nilsson and Rolf Blom and Harald Wesemeyer and S.
                 Hellstrom",
  title =        "On overflow systems in telephone networks: general
                 service times in the secondary group",
  journal =      "Ericsson technics",
  volume =       "34",
  number =       "2",
  publisher =    "Telefonaktiebolaget L. M. Ericsson",
  address =      "Stockholm, Sweden",
  pages =        "48--128",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Caption title.",
  keywords =     "Computer networks; Computers --- Access control;
                 Electrets; Encryption methods in data networks;
                 Telephone systems",
}

@Book{Oakley:1978:RPC,
  author =       "Howard T. Oakley",
  title =        "The {Riverbank} publications on cryptology",
  publisher =    "????",
  address =      "Washington, DC, USA",
  pages =        "324--330",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Fabyan, George, --- 1867-1936; Friedman,
                 William F. --- (William Frederick), --- 1891-1969;
                 Publication (Riverbank Laboratories); Riverbank
                 Laboratories. --- Dept. of Ciphers",
}

@Article{Payne:1978:OEN,
  author =       "W. H. Payne and K. L. McMillen",
  title =        "Orderly Enumeration of Nonsingular Binary Matrices
                 Applied to Text Encryption",
  journal =      j-CACM,
  volume =       "21",
  number =       "4",
  pages =        "259--263",
  month =        apr,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68C05",
  MRnumber =     "80h:68031",
  MRreviewer =   "P. E. O'Neil",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  abstract =     "Nonsingular binary matrices of order N, i.e.,
                 nonsingular over the field left brace 0,1 right brace,
                 and an initial segment of the natural numbers are
                 placed in one-to-one correspondence. Each natural
                 number corresponds to two intermediate vectors. These
                 vectors are mapped into a nonsingular binary matrix.
                 Examples of complete enumeration of all 2 multiplied by
                 2 and 3 multiplied by 3 nonsingular binary matrices
                 were produced by mapping the intermediate vectors to
                 the matrices. The mapping has application to the Vernam
                 encipherment method using pseudorandom number
                 sequences. A bit string formed from bytes of text of a
                 data encryption key can be used as a representation of
                 a natural number. This natural number is transformed to
                 a nonsingular binary matrix. Key leverage is obtained
                 by using the matrix as a ``seed'' in a shift register
                 sequence pseudorandom number generator.",
  acknowledgement = ack-nhfb,
  classcodes =   "C4140 (Linear algebra); C6130 (Data handling
                 techniques)",
  classification = "723",
  corpsource =   "Washington State Univ., Pullman, WA, USA",
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "binary sequences; bit string; computer programming;
                 data encryption key; encoding; enumeration; mapped;
                 matrix algebra; natural number; nonsingular binary
                 matrices; pseudorandom number; sequences; text editing;
                 text encryption; Vernam encipherment method",
  oldlabel =     "PayneM78",
  treatment =    "A Application; T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/PayneM78",
}

@Article{Pohlig:1978:IAC,
  author =       "S. C. Pohlig and M. E. Hellman",
  title =        "An improved algorithm for computing logarithms over {$
                 {\rm GF}(p) $} and its cryptographic significance",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "24",
  number =       "1",
  pages =        "106--111",
  month =        "????",
  year =         "1978",
  CODEN =        "IETTAW",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Thu Sep 22 18:53:42 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=18",
}

@Article{Pollard:1978:MCM,
  author =       "J. M. Pollard",
  title =        "{Monte Carlo} Methods for Index Computation $ (\bmod
                 p) $",
  journal =      j-MATH-COMPUT,
  volume =       "32",
  number =       "143",
  pages =        "918--924",
  month =        jul,
  year =         "1978",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Mon Jul 19 08:06:24 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "C1140G (Monte Carlo methods)",
  corpsource =   "Math. Dept., Plessey Telecommunications Res.,
                 Maidenhead, UK",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "factorisation of; index computation; integers; Monte
                 Carlo methods",
  referencedin = "Referenced in \cite[Ref. 7]{Wiener:1998:PCP} and
                 \cite[Ref. 8]{Escott:1999:AEC}.",
  treatment =    "T Theoretical or Mathematical",
}

@Unpublished{Reeds:1978:HCM,
  author =       "J. Reeds and D. Ritchie and R. Morris",
  title =        "The {Hagelin} Cypher Machine ({M-209}): Cryptanalysis
                 from Ciphertext Alone",
  year =         "1978",
  bibdate =      "Thu Apr 29 18:08:31 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Submitted to the journal Cryptologia, but never
                 published. For the story behind the suppression of
                 publication, see \cite{Ritchie:19xx:DCW}. Internal
                 technical memoranda TM 78-1271-10, TM 78-1273-2.",
  acknowledgement = ack-nhfb,
}

@Article{Rivest:1978:MOD,
  author =       "Ronald L. Rivest and Adi Shamir and Leonard M.
                 Adleman",
  title =        "A Method for Obtaining Digital Signatures and Public
                 Key Cryptosystems",
  journal =      j-CACM,
  volume =       "21",
  number =       "2",
  pages =        "120--126",
  month =        feb,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "94A05",
  MRnumber =     "83m:94003",
  MRreviewer =   "J. L. Selfridge",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "The basics of trap-door functions and the famous RSA
                 public key cryptosystem are presented in this paper.",
  abstract =     "An encryption method is presented with the novel
                 property that publicly revealing an encryption key does
                 not thereby reveal the corresponding decryption key.
                 This has two important consequences: (1) Couriers or
                 other secure means are not needed to transmit keys,
                 since a message can be enciphered using an encryption
                 key publicly revealed by the intended recipient. (2) A
                 message can be ``signed'' using a privately held
                 decryption key. Anyone can verify this signature using
                 the corresponding publicly revealed encryption key.
                 Signatures cannot be forged, and a signer cannot later
                 deny the validity of his signature.",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  classification = "723",
  corpsource =   "Dept. of Math., MIT, Cambridge, MA, USA",
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "computer programming; cryptography; cryptosystems;
                 data handling; data processing --- Security of Data;
                 decryption key; digital signatures; encryption key;
                 number theory; operating protection; RSA; security;
                 security of data",
  referencedin = "Referenced in \cite[Ref. 12]{Handschuh:1998:SCC},
                 \cite[Ref. 21]{Kaliski:1995:SUR}, \cite[Ref.
                 5]{Haber:1995:HDD}, \cite[Ref. 8]{Wiener:1998:PCP},
                 \cite[Ref. 27]{Goldreich:1997:FMCb}.",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Saltzer:1978:DS,
  author =       "Jerome H. Saltzer",
  title =        "On digital signatures",
  journal =      j-OPER-SYS-REV,
  volume =       "12",
  number =       "2",
  pages =        "12--14",
  month =        apr,
  year =         "1978",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:39 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Stark:1978:INT,
  author =       "Harold M. Stark",
  title =        "An introduction to number theory",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "x + 347",
  year =         "1978",
  ISBN =         "0-262-69060-8",
  ISBN-13 =      "978-0-262-69060-7",
  LCCN =         "QA241 .S72 1978",
  bibdate =      "Fri Jun 24 14:19:16 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Originally published in \cite{Stark:1970:INT}.",
  subject =      "Number theory",
  xxnote =       "Some library catalogs give year as 1981.",
}

@Manual{USCSC:1978:CSD,
  author =       "{United States.Civil Service Commission}",
  title =        "Computer security and the {Data Encryption Standard}:
                 proceedings of the {Conference on Computer Security and
                 the Data Encryption Standard held at the National
                 Bureau of Standards in Gaithersburg, Maryland, on
                 February 15, 1977}",
  number =       "500-27",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "viii + 125",
  year =         "1978",
  LCCN =         "T1.U52 no.500- 27",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "NBS special publication. Computer science and
                 technology",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- passwords; data encryption
                 (computer science)",
}

@Book{USCSSC:1978:USN,
  author =       "{United States.Congress.Senate.Select Committee on
                 Intelligence}",
  title =        "Unclassified summary --- involvement of {NSA} in the
                 development of the {Data Encryption Standard}: staff
                 report of the {Senate Select Committee on Intelligence,
                 United States Senate}",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "ii + 4",
  month =        apr,
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: 95th Congress, 2d session. Committee
                 print.",
  keywords =     "Cryptography; Data encryption (Computer science);
                 United States. --- National Security Agency",
}

@Book{Winterbotham:1978:NC,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Nazi} connection",
  publisher =    pub-HARPER-ROW,
  address =      pub-HARPER-ROW:adr,
  pages =        "222",
  year =         "1978",
  ISBN =         "0-06-014686-9",
  ISBN-13 =      "978-0-06-014686-3",
  LCCN =         "D810.S8 .W538 1978",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
  subject =      "Winterbotham, F. W; (Frederick William); World War,
                 1939-1945; Secret service; Great Britain; Spies;
                 Biography; Germany; Personal narratives, British",
  subject-dates = "1897--1990",
}

@InProceedings{Adleman:1979:SAD,
  author =       "L. M. Adleman",
  title =        "A subexponential algorithm for the discrete
                 logarithm",
  crossref =     "IEEE:1979:ASF",
  pages =        "55--60",
  year =         "1979",
  DOI =          "https://doi.org/10.1109/SFCS.1979.2",
  bibdate =      "Sun Mar 11 10:27:21 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@PhdThesis{Andelman:1979:MLE,
  author =       "Dov Andelman",
  title =        "Maximum likelihood estimation applied to
                 cryptanalysis",
  type =         "Thesis ({Ph.D.})",
  school =       "Stanford University",
  address =      "Stanford, CA, USA",
  pages =        "viii + 167",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Estimation theory; Maxima and minima.",
}

@Article{Anonymous:1979:SSA,
  author =       "Anonymous",
  title =        "{SB}. {Security Agency} denies tampering with {DES}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "39--39",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1979.6368158",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Educational institutions; Electrical engineering;
                 Encryption; National security; Public key",
}

@Book{Barker:1979:CEC,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of an enciphered code problem: where an
                 ``additive'' method of encipherment has been used",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "vii + 174",
  year =         "1979",
  ISBN =         "0-89412-037-9",
  ISBN-13 =      "978-0-89412-037-4",
  LCCN =         "Z103 .B333",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Barker:1979:HCCa,
  editor =       "Wayne G. Barker",
  title =        "The history of codes and ciphers in the {United
                 States} during {World War I}",
  volume =       "20",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "263",
  year =         "1979",
  ISBN =         "0-89412-031-X",
  ISBN-13 =      "978-0-89412-031-2",
  LCCN =         "D639.C75 H57 1979",
  bibdate =      "Mon Sep 13 06:32:02 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
}

@Book{Barker:1979:HCCb,
  editor =       "Wayne G. Barker",
  title =        "The history of codes and ciphers in the {United
                 States} during the period between the {World Wars}",
  volume =       "22, 54",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "various",
  year =         "1979",
  ISBN =         "0-89412-039-5 (part 1), 0-89412-165-0 (part 2)",
  ISBN-13 =      "978-0-89412-039-8 (part 1), 978-0-89412-165-4 (part
                 2)",
  LCCN =         "UB290 .H47 1979",
  bibdate =      "Mon Sep 13 06:37:57 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Two volumes. This book was written about 1946 by the
                 Historical Section of the Army Security Agency",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
}

@Article{Blakley:1979:RSA,
  author =       "G. R. Blakley and I. Borosh",
  title =        "{Rivest--Shamir--Adleman} public key cryptosystems do
                 not always conceal messages",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "5",
  number =       "3",
  pages =        "169--178",
  year =         "1979",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94B99 (10A25 94A24)",
  MRnumber =     "81e:94026",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse.bib",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
  remark =       "This paper points out that the some keys in the RSA
                 may fail to encrypt: instead, they produce an output
                 ciphertext that is identical to the input plaintext.
                 See also \cite{Smith:1979:UFM,Bergmann:2009:DKR}",
}

@InProceedings{Blakley:1979:SCK,
  author =       "G. R. Blakley",
  title =        "Safeguarding cryptographic keys",
  crossref =     "Merwin:1979:NCC",
  pages =        "313--317",
  year =         "1979",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL},
                 \cite[Ref. 2]{Gemmell:1997:ITC}.",
  xxauthor =     "R. Blakley",
}

@Article{Branstad:1979:VHD,
  author =       "D. Branstad",
  title =        "{V}. `{Hellman}'s data does not support his
                 conclusion'",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "41--41",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1979.6368161",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  abstract =     "Neither the information obtained by the National
                 Bureau of Standards nor the discussions in Prof. Martin
                 Hellman's paper support his conclusion that the Data
                 Encryption Standard will likely be ``totally insecure
                 within ten years.'",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Algorithm design and analysis; Educational
                 institutions; Encryption; National security;
                 Standards",
}

@Article{Bright:1979:QRN,
  author =       "Herbert S. Bright and Richard L. Enison",
  title =        "Quasi-Random Number Sequences from a Long-Period {TLP}
                 Generator with Remarks on Application to Cryptography",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "357--370",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Sep 19 21:17:11 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@MastersThesis{Chaum:1979:UEM,
  author =       "David Chaum",
  title =        "Untraceable electronic mail, return addresses, and
                 digital pseudonyms",
  type =         "Thesis ({M.S. in Computer Science})",
  school =       "University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  month =        jun,
  year =         "1979",
  bibdate =      "Mon Dec 28 13:41:04 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Culik:1979:SIS,
  author =       "K. {Culik, II} and H. A. Maurer",
  title =        "Secure Information Storage and Retrieval Using New
                 Results in Cryptography",
  journal =      j-INFO-PROC-LETT,
  volume =       "8",
  number =       "4",
  pages =        "181--186",
  day =          "30",
  month =        apr,
  year =         "1979",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68B15 (68H05)",
  MRnumber =     "80h:68010",
  MRreviewer =   "James W. Snively, Jr.",
  bibdate =      "Tue Nov 17 10:49:43 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C6130 (Data handling techniques)",
  corpsource =   "Dept. of Computer Sci., Univ. of Waterloo, Waterloo,
                 Ont., Canada",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "cryptography; data processing --- Security of Data;
                 encoding; information retrieval; information retrieval
                 systems; information storage; information systems;
                 security of data",
}

@Article{Davida:1979:IHS,
  author =       "G. I. Davida",
  title =        "{III}. `{Hellman}'s scheme breaks {DES} in its basic
                 form'",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "39--39",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1979.6368159",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Educational institutions; Electrical engineering;
                 Encryption; National security; Public key",
}

@Article{Denning:1979:EOS,
  author =       "Peter J. Denning",
  title =        "Editor's Overview --- Special Section on Data
                 Encryption",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "283--283",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356791",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1979:SPC,
  author =       "Dorothy E. Denning",
  title =        "Secure Personal Computing in an Insecure Network",
  journal =      j-CACM,
  volume =       "22",
  number =       "8",
  pages =        "476--482",
  month =        aug,
  year =         "1979",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68A05 (68B15 94A99)",
  MRnumber =     "80d:68010",
  bibdate =      "Mon Jan 22 06:35:06 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm22.html#Denning79;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "Computer Sci. Dept., Purdue Univ., West Lafayette, IN,
                 USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "communication links; confidential data; confidential
                 files; encoding; encryption; insecure network; secure
                 personal computing; security of data",
  oldlabel =     "Denning79",
  treatment =    "P Practical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Denning79",
}

@TechReport{Dreher:1979:PSC,
  author =       "Felix F. Dreher",
  title =        "Privacy and security in computer based systems using
                 encryption",
  type =         "Pittsburg State University. School of Business
                 monograph series",
  number =       "7",
  institution =  "Pittsburg State University. Gladys A. Kelce School of
                 Business and Economics.",
  address =      "Pittsburg, KS, USA",
  pages =        "8",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Cover title.",
  keywords =     "Computers --- Access control; Electronic data
                 processing departments --- Security measures",
}

@Book{Garey:1979:CIG,
  author =       "Michael R. Garey and David S. Johnson",
  title =        "Computers and Intractability: a Guide to the Theory of
                 {NP}-Completeness",
  publisher =    pub-FREEMAN,
  address =      pub-FREEMAN:adr,
  pages =        "x + 338",
  year =         "1979",
  ISBN =         "0-7167-1045-5, 0-7167-1044-7",
  ISBN-13 =      "978-0-7167-1045-5, 978-0-7167-1044-8",
  bibdate =      "Sun Mar 11 10:56:42 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/subjects/acc-stab-num-alg.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Garlinski:1979:IEW,
  author =       "J{\'o}zef Garli{\'n}ski",
  title =        "Intercept: the {Enigma} war",
  publisher =    "J. M. Dent",
  address =      "London, UK",
  pages =        "xx + 219 + 8",
  year =         "1979",
  ISBN =         "0-460-04337-4",
  ISBN-13 =      "978-0-460-04337-3",
  LCCN =         "D810.C88 G37",
  bibdate =      "Tue Sep 4 07:56:36 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939-1945; Cryptography",
}

@Article{Gligor:1979:OMA,
  author =       "V. D. Gligor and B. G. Lindsay",
  title =        "Object Migration and Authentication",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "SE-5",
  number =       "6",
  pages =        "607--611",
  month =        nov # "\slash " # dec,
  year =         "1979",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/TSE.1979.230196",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 08:07:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng1970.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1702677",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@Article{Good:1979:EWC,
  author =       "I. J. Good",
  title =        "Early Work on Computers at {Bletchley}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "1",
  number =       "1",
  pages =        "38--48",
  month =        jul # "\slash " # sep,
  year =         "1979",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:16 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/annhistcomput.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1979/pdf/a1038.pdf;
                 http://www.computer.org/annals/an1979/a1038abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  keywords =     "Bletchley; Bombe; chessplayers as cryptanalysts;
                 Colossus; cryptanalysis; Enigma; Geheimschreiber;
                 Government Code and Cypher School; history of
                 computers; Turing; Ultra",
}

@Book{Hardy:1979:ITN,
  author =       "G. H. (Godfrey Harold) Hardy and Edward Maitland
                 Wright",
  title =        "An introduction to the theory of numbers",
  publisher =    pub-CLARENDON,
  address =      pub-CLARENDON:adr,
  edition =      "Fifth",
  pages =        "xvi + 426",
  year =         "1979",
  ISBN =         "0-19-853170-2, 0-19-853171-0 (paperback)",
  ISBN-13 =      "978-0-19-853170-8, 978-0-19-853171-5 (paperback)",
  LCCN =         "QA241 .H28 1979",
  bibdate =      "Fri Jun 24 12:34:44 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  author-dates = "1877--1947",
  subject =      "Number theory",
}

@Article{Hellman:1979:MPK,
  author =       "Martin E. Hellman",
  title =        "The Mathematics of Public-Key Cryptography",
  journal =      j-SCI-AMER,
  volume =       "241",
  number =       "2",
  pages =        "146--157 (Intl. ed. 130--139)",
  month =        aug,
  year =         "1979",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Tue May 19 18:01:43 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C6130 (Data handling techniques);
                 C6160 (Database management systems (DBMS))",
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "computer privacy; cryptography; electronic
                 communications; encoding; encryption; knapsack problem;
                 mathematics; P-NP problem; public key cryptography;
                 public-key cryptosystem; random numbers; security of
                 data; trap-door one-way functions",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Hellman:1979:WTI,
  author =       "M. E. Hellman",
  title =        "{I}. `{DES} will be totally insecure within ten
                 years'",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "32--40",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1979.6368157",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Algorithm design and analysis; Computers; Encryption;
                 Standards",
}

@Manual{Hinsley:1979:BISa,
  author =       "F. H. (Francis Harry) Hinsley and E. E. Thomas",
  title =        "{British} intelligence in the {Second World War}: its
                 influence on strategy and operations",
  publisher =    "H.M. Stationery Office",
  address =      "London, UK",
  pages =        "various",
  year =         "1979",
  ISBN =         "0-11-630933-4 (vol. 1)",
  ISBN-13 =      "978-0-11-630933-4 (vol. 1)",
  LCCN =         "D810.S7 H49 1979b v.1-2 (1979--1981)",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Vol. 3, pt. 2 has additional author C. A. G.
                 Simkins.",
  price =        "UK\pounds10.00 (vol. 1)",
  series =       "History of the Second World War",
  acknowledgement = ack-nhfb,
  keywords =     "Great Britain --- history --- George VI, 1936--1952;
                 World War, 1939--1945 --- secret service --- Great
                 Britain",
}

@Book{Hinsley:1979:BISb,
  author =       "F. H. (Francis Harry) Hinsley and Michael Eliot
                 Howard",
  title =        "{British} intelligence in the {Second World War}: its
                 influence on strategy and operations",
  publisher =    pub-CUP,
  address =      pub-CUP:adr,
  pages =        "various",
  year =         "1979",
  ISBN =         "0-521-22940-5 (vol. 1)",
  ISBN-13 =      "978-0-521-22940-1 (vol. 1)",
  LCCN =         "D810.S7 H47 1979b",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Vols. 3-4 in series: History of the Second World War.
                 Vol. 4 has subtitle: Security and counter-intelligence;
                 Vol. 5 has subtitle: Strategic deception.",
  acknowledgement = ack-nhfb,
  contents =     "v. 1-3. Its influence on strategy and operations ---
                 v. 5. Strategic deception",
  keywords =     "World War, 1939--1945; World War, 1939--1945 ---
                 secret service --- Great Britain",
}

@Book{IRD:1979:DVE,
  author =       "{International Resource Development, Inc.}",
  title =        "Data and voice encryption",
  publisher =    "International Resource Development",
  address =      "New Canaan, CT, USA",
  pages =        "iv + 124",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography equipment industry --- United States;
                 Market surveys --- United States.",
}

@Article{Kahn:1979:CGP,
  author =       "David Kahn",
  title =        "Cryptology goes public",
  journal =      "Foreign affairs (Council on Foreign Relations)",
  volume =       "58",
  number =       "1",
  publisher =    "Council on Foreign Relations",
  address =      "New York, NY, USA",
  pages =        "141--159",
  month =        "Fall",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Caption title. Detached from Foreign affairs, v. 58,
                 no. 1, fall 1979.",
  keywords =     "Ciphers; Cryptography",
}

@Article{Kam:1979:SDS,
  author =       "John B. Kam and George I. Davida",
  title =        "Structured design of substitution-permutation
                 encryption networks",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "28",
  number =       "10",
  pages =        "747--753",
  year =         "1979",
  CODEN =        "ITCOB4",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  MRclass =      "68B15 (68H05)",
  MRnumber =     "80h:68013",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Institute of Electrical and Electronics Engineers.
                 Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Knoble:1979:AEO,
  author =       "H. D. Knoble",
  title =        "{Algorithm 536}: An Efficient One-Way Enciphering
                 Algorithm [{Z}]",
  journal =      j-TOMS,
  volume =       "5",
  number =       "1",
  pages =        "108--111",
  month =        mar,
  year =         "1979",
  CODEN =        "ACMSCU",
  DOI =          "https://doi.org/10.1145/355815.355823",
  ISSN =         "0098-3500 (print), 1557-7295 (electronic)",
  ISSN-L =       "0098-3500",
  bibdate =      "Sat Aug 27 23:58:53 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Mathematical Software",
  journal-URL =  "http://portal.acm.org/toc.cfm?idx=J782",
}

@Article{Knoble:1979:EOW,
  author =       "H. D. Knoble and C. {Forney, Jr.} and F. S. Bader",
  title =        "An Efficient One-Way Enciphering Algorithm",
  journal =      j-TOMS,
  volume =       "5",
  number =       "1",
  pages =        "97--107",
  month =        mar,
  year =         "1979",
  CODEN =        "ACMSCU",
  DOI =          "https://doi.org/10.1145/355815.355822",
  ISSN =         "0098-3500 (print), 1557-7295 (electronic)",
  ISSN-L =       "0098-3500",
  bibdate =      "Sat Aug 27 23:13:25 1994",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Mathematical Software",
  journal-URL =  "http://portal.acm.org/toc.cfm?idx=J782",
}

@Article{Leighton:1979:BRA,
  author =       "Albert C. Leighton",
  title =        "Book Review: {{\booktitle{An annotated bibliography of
                 cryptography}}: By David Shulman. Garland Reference
                 Library of the Humanities, Vol. 37 New York\slash
                 London (Garland Publishing Inc.). 1976. xvi + 372 pp.
                 illus. \$35.00}",
  journal =      j-HIST-MATH,
  volume =       "6",
  number =       "2",
  pages =        "213--218",
  month =        may,
  year =         "1979",
  CODEN =        "HIMADS",
  ISSN =         "0315-0860 (print), 1090-249X (electronic)",
  ISSN-L =       "0315-0860",
  bibdate =      "Wed Jun 26 06:17:09 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/histmath.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0315086079900934",
  acknowledgement = ack-nhfb,
  fjournal =     "Historia Mathematica",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03150860/",
}

@Article{Leighton:1979:BRB,
  author =       "Albert C. Leighton",
  title =        "Book Review: {{\booktitle{An annotated bibliography of
                 cryptography}}: By David Shulman. Garland Reference
                 Library of the Humanities, Vol. 37 New York\slash
                 London (Garland Publishing Inc.). 1976. xvi + 372 pp.
                 illus. \$35.00}",
  journal =      j-HIST-MATH,
  volume =       "6",
  number =       "2",
  pages =        "213--218",
  month =        may,
  year =         "1979",
  CODEN =        "HIMADS",
  ISSN =         "0315-0860 (print), 1090-249X (electronic)",
  ISSN-L =       "0315-0860",
  bibdate =      "Wed Jun 26 06:17:09 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/histmath.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0315086079900934",
  acknowledgement = ack-nhfb,
  fjournal =     "Historia Mathematica",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03150860",
}

@Article{Lempel:1979:CT,
  author =       "Abraham Lempel",
  title =        "Cryptology in Transition",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "285--303",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356792",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lu:1979:EGC,
  author =       "Shyue Ching Lu",
  title =        "The existence of good cryptosystems for key rates
                 greater than the message redundancy",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "25",
  number =       "4",
  pages =        "475--477",
  year =         "1979",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1979.1056061",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94B99",
  MRnumber =     "80g:94069a",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@MastersThesis{Ma:1979:RAD,
  author =       "Robert Ma",
  title =        "Review and analysis of the {Data Encryption
                 Standard}",
  type =         "Master of Science, Plan II.",
  school =       "Department of Electrical Engineering and Computer
                 Sciences, University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "70",
  year =         "1979",
  LCCN =         "TK7 .U5 1979:1:M-N",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Matyas:1979:DSO,
  author =       "Stephen M. Matyas",
  title =        "Digital Signatures --- an Overview",
  journal =      j-COMP-NET,
  volume =       "3",
  number =       "2",
  pages =        "87--94",
  month =        apr,
  year =         "1979",
  CODEN =        "CNETDP",
  ISSN =         "0376-5075",
  ISSN-L =       "0376-5075",
  bibdate =      "Sat Sep 25 18:04:41 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Kingston, NY",
  classification = "723",
  fjournal =     "Computer Networks",
  journalabr =   "Comput Networks",
  keywords =     "data processing; digital signatures",
}

@Article{Peleg:1979:BSC,
  author =       "Shmuel Peleg and Azriel Rosenfeld",
  title =        "Breaking Substitution Ciphers Using a Relaxation
                 Algorithm",
  journal =      j-CACM,
  volume =       "22",
  number =       "11",
  pages =        "598--605",
  month =        nov,
  year =         "1979",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 07:12:05 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm22.html#PelegR79;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C1230 (Artificial intelligence)",
  corpsource =   "Univ. of Maryland, College Park, MD, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "artificial intelligence; computer security;
                 cryptography; decoding; joint letter probabilities;
                 letters; plaintext; relaxation; relaxation algorithm;
                 substitution ciphers; updating scheme",
  oldlabel =     "PelegR79",
  ort =          "ordner sicherheit",
  treatment =    "T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/PelegR79",
}

@Article{Popek:1979:ESC,
  author =       "Gerald J. Popek and Charles S. Kline",
  title =        "Encryption and Secure Computer Networks",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "331--356",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356794",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@InCollection{Reeds:1979:CMC,
  author =       "James Reeds",
  booktitle =    "Information linkage between applied mathematics and
                 industry (Proc. First Annual Workshop, Naval
                 Postgraduate School, Monterey, Calif., 1978)",
  title =        "Cracking a multiplicative congruential encryption
                 algorithm",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "467--472",
  year =         "1979",
  MRclass =      "94B99 (65C10)",
  MRnumber =     "80h:94040",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
}

@Article{Rivest:1979:CRC,
  author =       "Ronald L. Rivest",
  title =        "Critical remarks on: {``Critical remarks on some
                 public-key cryptosystems'' [BIT {\bf 18}(4), 1978, pp.
                 493--496; MR 80b:94033 ] by Tore Herlestam}",
  journal =      j-BIT,
  volume =       "19",
  number =       "2",
  pages =        "274--275",
  month =        jun,
  year =         "1979",
  CODEN =        "NBITAB",
  DOI =          "https://doi.org/10.1007/BF01930859",
  ISSN =         "0006-3835 (print), 1572-9125 (electronic)",
  ISSN-L =       "0006-3835",
  MRclass =      "94B99 (68B99)",
  MRnumber =     "80m:94070",
  MRreviewer =   "M. C. Cheng",
  bibdate =      "Wed Jan 4 18:52:16 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=19&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/bit.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Herlestam:1978:CRS}.",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=19&issue=2&spage=274",
  acknowledgement = ack-nhfb,
  fjournal =     "BIT; Nordisk Tidskrift for Informationsbehandling
                 (BIT)",
  journal-URL =  "http://link.springer.com/journal/10543",
}

@Article{Rubin:1979:DSC,
  author =       "F. Rubin",
  title =        "Decrypting a Stream Cipher Based on {J}--{K}
                 Flip-Flops",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-28",
  number =       "7",
  pages =        "483--487",
  month =        jul,
  year =         "1979",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.1979.1675392",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 11 06:49:39 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput1970.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1675392",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Shamir:1979:HSS,
  author =       "Adi Shamir",
  title =        "How to Share a Secret",
  journal =      j-CACM,
  volume =       "22",
  number =       "11",
  pages =        "612--613",
  month =        nov,
  year =         "1979",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "94B99 (68E99)",
  MRnumber =     "80g:94070",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "protection against loss of keys by dividing the data
                 into pieces.",
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "MIT, Cambridge, MA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "computer security; cryptographic systems;
                 cryptography; encoding; key management; robust key
                 management schemes; security breaches; security of
                 data",
  ort =          "ordner sicherheit",
  referencedin = "Referenced in \cite[Ref. 38]{Gemmell:1997:ITC},
                 \cite[Ref. 26]{Canetti:1997:PSL}.",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@InProceedings{Simmons:1979:CCA,
  author =       "Gustavus J. Simmons",
  booktitle =    "Proceedings of the Eighth Manitoba Conference on
                 Numerical Mathematics and Computing (Univ. Manitoba,
                 Winnipeg, Man., 1978)",
  title =        "Computational complexity and asymmetric encryption",
  publisher =    pub-UTILITAS-MATH,
  address =      pub-UTILITAS-MATH:adr,
  pages =        "65--93",
  year =         "1979",
  MRclass =      "68B15 (68C25 94B99)",
  MRnumber =     "80h:68017",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  series =       "Congress. Numer., XXII",
}

@InProceedings{Simmons:1979:HID,
  author =       "G. J. Simmons",
  editor =       "{IEEE}",
  booktitle =    "{IEEE} {EASCON '79}, Washington, {DC, 1979}",
  title =        "How to Insure that Data Acquired to Verify Treaty
                 Compliance are Trustworthy",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "661--662",
  year =         "1979",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Thu Jan 21 14:46:12 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Simmons:1979:SAE,
  author =       "Gustavus J. Simmons",
  title =        "Symmetric and Asymmetric Encryption",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "305--330",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356789.356793",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Smith:1979:UFM,
  author =       "Donald R. Smith and James T. Palmer",
  title =        "Universal fixed messages and the
                 {Rivest--Shamir--Adleman} cryptosystem",
  journal =      j-MATHEMATIKA,
  volume =       "26",
  number =       "1",
  pages =        "44--52",
  year =         "1979",
  CODEN =        "MTKAAB",
  ISSN =         "0025-5793",
  MRclass =      "94B99",
  MRnumber =     "80m:94071",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigcse.bib",
  fjournal =     "Mathematika. A Journal of Pure and Applied
                 Mathematics",
  remark =       "This paper points out that the some keys in the RSA
                 may fail to encrypt: instead, they produce an output
                 ciphertext that is identical to the input plaintext.
                 See also \cite{Blakley:1979:RSA,Bergmann:2009:DKR}",
}

@Article{Snyder:1979:IUC,
  author =       "Samuel S. Snyder",
  title =        "Influence of {U.S. Cryptologic Organizations} on the
                 digital computer industry",
  journal =      j-J-SYST-SOFTW,
  volume =       "1",
  number =       "1",
  pages =        "87--102",
  month =        "????",
  year =         "1979",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed Sep 8 07:38:41 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Tuchman:1979:HPN,
  author =       "W. Tuchman",
  title =        "{Hellman} presents no shortcut solutions to {DES}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "40--41",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  referencedin = "Referenced in \cite[Ref. 25]{Biham:1998:TA}.",
}

@Article{Tuchman:1979:IHP,
  author =       "W. Tuchman",
  title =        "{IV}. `{Hellman} presents no shortcut solutions to the
                 {DES}'",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "40--41",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1979.6368160",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Algorithm design and analysis; Computers; Educational
                 institutions; Encryption; Standards",
}

@TechReport{USNA:1979:CS,
  author =       "{United States.National Archives and Records
                 Service}",
  title =        "Cryptology studies",
  type =         "Records of the National Security Agency",
  number =       "RG457",
  institution =  "National Archives of the United States",
  address =      "Washington, DC, USA",
  pages =        "??",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "reel 1. Studies SRH002-007.--reel 2. Studies SRM026,
                 SRM028-037.-- reel 3. Studies SRH-001, SRH-038.",
  keywords =     "Ciphers; Cryptography; World War, 1939-1945 ---
                 Cryptography.",
}

@Book{USNSG:1979:IRW,
  author =       "{United States.Naval Security Group}",
  title =        "Intelligence reports on the war in the {Atlantic},
                 1942--1945: the account of the war in the {Atlantic}
                 from {Dec. 1942} to {May 1945} as seen through and
                 influenced by decryption of {German} naval radio
                 traffic: [guide]",
  publisher =    "Michael Glazier",
  address =      "Wilmington, DE, USA",
  pages =        "6",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Microfilm (positive). v. 1. Allied communication
                 intelligence and the battle of the Atlantic.--v.2.
                 U-boat operations.--v. 3. German naval communications
                 intelligence.--v. 4. Technical intelligence from Allied
                 C.I. Released by the Department of the Navy, Naval
                 Security Group Command Headquarters. v. 1. Allied
                 communication intelligence and the battle of the
                 Atlantic.--v.2. U-boat operations.--v. 3. German naval
                 communications intelligence.--v. 4. Technical
                 intelligence from Allied C.I.",
  keywords =     "Cipher and telegraph codes; Germany. --- Kriegsmarine
                 --- Communication systems; World War, 1939--1945 ---
                 Atlantic Ocean; World War, 1939--1945 ---
                 Communications, Military; World War, 1939--1945 ---
                 Cryptography; World War, 1939--1945 --- Naval
                 operations, American; World War, 1939--1945 --- Naval
                 operations, German; World War, 1939-1945 --- Atlantic
                 Ocean",
}

@Book{Weber:1979:USD,
  author =       "Ralph Edward Weber",
  title =        "{United States} Diplomatic Codes and Ciphers,
                 1775--1938",
  publisher =    "Precedent Publishing",
  address =      "Chicago, IL, USA",
  pages =        "xviii + 633",
  year =         "1979",
  ISBN =         "0-913750-20-4",
  ISBN-13 =      "978-0-913750-20-9",
  LCCN =         "Z103 .W4",
  bibdate =      "Tue Dec 01 10:53:24 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$49.95",
  acknowledgement = ack-nhfb,
}

@Article{Williams:1979:CAA,
  author =       "P. W. Williams and D. Woodhead",
  title =        "Computer assisted analysis of cryptic crosswords",
  journal =      j-COMP-J,
  volume =       "22",
  number =       "1",
  pages =        "67--70",
  month =        feb,
  year =         "1979",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj1970.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C7830D (Computer games)",
  corpsource =   "Computation Dept., Univ. of Manchester, Manchester,
                 UK",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "BNF type definition; computer analysis program;
                 cryptic crosswords; games of skill; language LACROSS;
                 personal computing",
  treatment =    "A Application; P Practical",
}

@Article{Williams:1979:SRC,
  author =       "H. C. Williams and B. Schmid",
  title =        "Some remarks concerning the {M.I.T.} public-key
                 cryptosystem",
  journal =      j-BIT,
  volume =       "19",
  number =       "4",
  pages =        "525--538",
  month =        dec,
  year =         "1979",
  CODEN =        "BITTEL, NBITAB",
  DOI =          "https://doi.org/10.1007/BF01931269",
  ISSN =         "0006-3835 (print), 1572-9125 (electronic)",
  ISSN-L =       "0006-3835",
  MRclass =      "94B99",
  MRnumber =     "80m:94072",
  bibdate =      "Wed Jan 4 18:52:16 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=19&issue=4;
                 https://www.math.utah.edu/pub/tex/bib/bit.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=19&issue=4&spage=525",
  acknowledgement = ack-nhfb,
  fjournal =     "BIT; Nordisk Tidskrift for Informationsbehandling
                 (BIT)",
  journal-URL =  "http://link.springer.com/journal/10543",
  referencedin = "Referenced in \cite[Ref. 25]{Kaliski:1995:SUR}.",
}

@Manual{Zeidler:1979:DDE,
  author =       "Howard M. Zeidler",
  title =        "Digital data encryption",
  organization = pub-SRI,
  address =      pub-SRI:adr,
  pages =        "20",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Guidelines - SRI International, Business Intelligence
                 Program; no. 1044 Guidelines (Business Intelligence
                 Program (SRI International)); no. 1044",
  acknowledgement = ack-nhfb,
  annote =       "Cover title.",
  keywords =     "Computers --- Access control --- Passwords; Data
                 encryption (Computer science)",
}

@PhdThesis{Andelman:1980:MLE,
  author =       "Dov Andelman",
  title =        "Maximum likelihood estimation applied to
                 cryptanalysis",
  type =         "Thesis ({Ph.D.})",
  school =       "Department of Electrical Engineering, Stanford
                 University",
  address =      "Stanford, CA, USA",
  pages =        "viii + 167",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Maxima and minima.",
}

@TechReport{Anonymous:1980:ACS,
  author =       "Anonymous",
  title =        "An Assessment of civil sector uses of digital data
                 encryption",
  number =       "",
  institution =  "Department of Engineering and Public Policy,
                 Department of Social Sciences and School of Urban and
                 Public Affairs, Carnegie-Mellon University",
  address =      "Pittsburgh, PA, USA",
  pages =        "128",
  month =        nov,
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Draft version produced in April 1980, final revised
                 version produced November 1980.",
  keywords =     "Computers --- Access control; Digital communications;
                 Electronic data processing departments --- Security
                 measures.",
}

@Book{Bennett:1980:UWN,
  author =       "Ralph Francis Bennett",
  title =        "{Ultra} in the {West}: the {Normandy} campaign,
                 1944--45",
  publisher =    "Scribner",
  address =      "New York, NY, USA",
  pages =        "xvi + 336",
  year =         "1980",
  ISBN =         "0-684-16704-2",
  ISBN-13 =      "978-0-684-16704-6",
  LCCN =         "D756.5.N6 B44 1980",
  bibdate =      "Mon May 8 07:06:44 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$17.50",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Campaigns; France; Normandy;
                 Cryptography; Secret Service; Great Britain; Normandy
                 (France); History",
}

@Article{Berstis:1980:SPD,
  author =       "Viktors Berstis",
  title =        "Security and protection of data in the {IBM
                 System\slash 38}",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "8",
  number =       "3",
  pages =        "245--252",
  year =         "1980",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 16:54:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Book:1980:UDC,
  author =       "R. V. Book and Sai Choi Kwan",
  title =        "On Uniquely Decipherable Codes with Two Codewords",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-29",
  number =       "4",
  pages =        "324--325",
  month =        apr,
  year =         "1980",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.1980.1675571",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 10 19:15:25 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1675571",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Book{Calvocoressi:1980:TSU,
  author =       "Peter Calvocoressi",
  title =        "Top secret ultra",
  publisher =    "Pantheon Books",
  address =      "New York, NY, USA",
  pages =        "132",
  year =         "1980",
  ISBN =         "0-394-51154-9",
  ISBN-13 =      "978-0-394-51154-2",
  LCCN =         "D810.C88C34 1980",
  bibdate =      "Tue Dec 01 08:23:32 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Diffie:1980:CAM,
  author =       "B. W. Diffie and M. E. Hellman and R. C. Merkle",
  title =        "Cryptographic Apparatus and Method",
  howpublished = "US Patent No. 4,200,770A.",
  day =          "29",
  month =        apr,
  year =         "1980",
  bibdate =      "Sat Nov 29 13:44:46 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Patent filed 6 September 1977.",
  URL =          "https://www.google.com/patents/US4200770",
  abstract =     "A cryptographic system transmits a computationally
                 secure cryptogram over an insecure communication
                 channel without prearrangement of a cipher key. A
                 secure cipher key is generated by the conversers from
                 transformations of exchanged transformed signals. The
                 conversers each possess a secret signal and exchange an
                 initial transformation of the secret signal with the
                 other converser. The received transformation of the
                 other converser's secret signal is again transformed
                 with the receiving converser's secret signal to
                 generate a secure cipher key. The transformations use
                 non-secret operations that are easily performed but
                 extremely difficult to invert. It is infeasible for an
                 eavesdropper to invert the initial transformation to
                 obtain either conversers' secret signal, or duplicate
                 the latter transformation to obtain the secure cipher
                 key.",
  acknowledgement = ack-nhfb,
}

@Article{Estell:1980:BW,
  author =       "Robert G. Estell",
  title =        "Benchmarks and watermarks",
  journal =      j-SIGMETRICS,
  volume =       "9",
  number =       "3",
  pages =        "39--44",
  month =        "Fall",
  year =         "1980",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1041883.1041885",
  ISSN =         "0163-5999 (print), 1557-9484 (electronic)",
  ISSN-L =       "0163-5999",
  bibdate =      "Thu Jun 26 10:55:53 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Historically, benchmark tests have been one of several
                 ways to size a computer system, and measure its
                 performance. Today, it is more important to test the
                 System Software than the machine hardware. (Thus the
                 term `watermark' (as on bond paper) for software
                 tests.) Watermarks of software suffer the same
                 limitations and risks as benchmarks of hardware: e.a.,
                 they should be supplemented with simulations, models,
                 and other analysis and design tools of our trade.
                 Perhaps most significantly, watermarks, like
                 benchmarks, can be biased by their creators.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMETRICS Performance Evaluation Review",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J618",
}

@TechReport{Gait:1980:CST,
  author =       "Jason Gait",
  title =        "Computer science and technology: maintenance testing
                 for the {Data Encryption Standard}",
  type =         "United States. National Bureau of Standards Special
                 publication",
  number =       "500-61",
  institution =  pub-NBS,
  address =      pub-NBS:adr,
  pages =        "25",
  year =         "1980",
  ISSN =         "0083-1883",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Manual{Gait:1980:MTD,
  author =       "Jason Gait",
  title =        "Maintenance testing for the {Data Encryption
                 Standard}",
  volume =       "500-61",
  number =       "500-61",
  organization = pub-NBS,
  address =      pub-NBS:adr,
  pages =        "iii + 25",
  month =        aug,
  year =         "1980",
  CODEN =        "XNBSAV",
  LCCN =         "T1.U52 no.500-61",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "NBS special publication Computer science and
                 technology",
  acknowledgement = ack-nhfb,
  govtdocnumber = "C 13.10:500-61 247",
  keywords =     "computers --- access control; Computers --- Access
                 control --- Passwords; cryptography --- data
                 processing; Cryptography --- Data processing; Data
                 encryption (Computer science); Electronic data
                 processing departments --- Security measures;
                 electronic data processing departments --- security
                 measures; Monte Carlo method",
}

@Manual{Gait:1980:VCH,
  author =       "Jason Gait",
  title =        "Validating the correctness of hardware implementations
                 of the {NBS Data Encryption Standard}",
  number =       "500-20",
  organization = pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "iv + 40",
  year =         "1980",
  LCCN =         "C 13.10:500-20/2 Government Information U.S.",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$2.25 (paperback)",
  series =       "NBS special publication. Computer science and
                 technology",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Code words; computers
                 --- access control --- code words; computers ---
                 testing; Computers --- Testing; Data encryption
                 (Computer science); data encryption (computer science);
                 Monte Carlo method",
}

@Book{Garlinski:1980:EW,
  author =       "J{\'o}zef Garli{\'n}ski",
  title =        "The {Enigma} war",
  publisher =    "Scribner",
  address =      "New York, NY, USA",
  pages =        "xx + 219 + 8",
  year =         "1980",
  ISBN =         "0-684-15866-3",
  ISBN-13 =      "978-0-684-15866-2",
  LCCN =         "D810.S7 G32 1980",
  bibdate =      "Tue Sep 4 06:00:21 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$14.95",
  acknowledgement = ack-nhfb,
  remark =       "Original British edition \cite{Garlinski:1979:IEW}.",
  subject =      "World War, 1939-1945; Secret service; Cryptography",
}

@Article{Goethals:1980:CAL,
  author =       "J.-M. Goethals and C. Couvreur",
  title =        "A cryptanalytic attack on the {Lu-Lee} public-key
                 cryptosystem",
  journal =      j-PHILIPS-J-RES,
  volume =       "35",
  number =       "4-5",
  pages =        "301--306",
  year =         "1980",
  CODEN =        "PHJRD9",
  ISSN =         "0165-5817",
  ISSN-L =       "0165-5817",
  MRclass =      "94A99",
  MRnumber =     "82b:94018",
  MRreviewer =   "Tai Yang Hwang",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Philips Journal of Research",
}

@Article{Gudes:1980:DCB,
  author =       "E. Gudes",
  title =        "The Design of a Cryptography Based Secure File
                 System",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "SE-6",
  number =       "5",
  pages =        "411--420",
  month =        sep # "\slash " # oct,
  year =         "1980",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/TSE.1980.230489",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 08:07:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng1980.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1702757",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@Book{Hamming:1980:CIT,
  author =       "R. W. (Richard Wesley) Hamming",
  title =        "Coding and information theory",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "xii + 239",
  year =         "1980",
  ISBN =         "0-13-139139-9",
  ISBN-13 =      "978-0-13-139139-0",
  LCCN =         "QA268 .H35 1980",
  bibdate =      "Fri Jun 24 21:02:55 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$19.95",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Information theory",
}

@MastersThesis{Hood:1980:EFS,
  author =       "William Chester Hood",
  title =        "Encryption as a file security measure in large
                 operating systems",
  type =         "Thesis ({M.S.})",
  school =       "University of Tennessee, Knoxville",
  address =      "Knoxville, TN, USA",
  pages =        "iv + 116",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "[103]-112.",
  keywords =     "Computers --- Access control.",
}

@TechReport{Knuth:1980:DLC,
  author =       "Donald E. Knuth",
  title =        "Deciphering a linear congruential encryption",
  type =         "Report",
  number =       "024800",
  institution =  "Department of Computer Science, Stanford University",
  address =      "Stanford, CA, USA",
  year =         "1980",
  bibdate =      "Wed Feb 22 13:51:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  remark =       "Published in \cite{Knuth:1985:DLC}.",
}

@Article{Konheim:1980:ICP,
  author =       "Alan G. Konheim and Marian H. Mack and Robert K.
                 McNeill and Bryant Tuckerman and Gerald Waldbaum",
  title =        "The {IPS} Cryptographic Programs",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "2",
  pages =        "253--283",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Cryptographic methods of data protection have taken on
                 new importance as computers have become faster and as
                 strong cryptographic algorithms, such as the Data
                 Encryption Standard (DES), have become available. But a
                 standard encipherment technique is only the first step
                 in applying cryptography in a computing center. This
                 paper discusses the Information Protection System
                 (IPS), a set of cryptographic application programs
                 designed to use the DES algorithm in a working
                 computing center. In designing IPS, several important
                 augmentations of DES were formulated.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; information protection system",
}

@Article{Leiss:1980:NSS,
  author =       "E. Leiss",
  title =        "A note on a signature system based on probabilistic
                 logic",
  journal =      j-INFO-PROC-LETT,
  volume =       "11",
  number =       "2",
  pages =        "110--113",
  day =          "??",
  month =        oct,
  year =         "1980",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "C4210 (Formal logic); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Computer Sci., Univ. of Houston, Houston, TX,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "data privacy; digitalised signature system;
                 probabilistic logic; requirements",
  treatment =    "A Application",
}

@Article{Lu:1980:AEG,
  author =       "Shyue Ching Lu",
  title =        "Addition to: {``The existence of good cryptosystems
                 for key rates greater than the message redundancy''
                 [IEEE Trans. Inform. Theory {\bf 25} (1979), no. 4,
                 475--477;\ MR 80g:94069]}",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "26",
  number =       "1",
  pages =        "129--129",
  year =         "1980",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1980.1056129",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94B99",
  MRnumber =     "80g:94069b",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Luccio:1980:CMC,
  author =       "F. Luccio and S. Mazzone",
  title =        "A cryptosystem for multiple communication",
  journal =      j-INFO-PROC-LETT,
  volume =       "10",
  number =       "4--5",
  pages =        "180--183",
  day =          "5",
  month =        jul,
  year =         "1980",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Nov 17 10:49:43 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See notes \cite{Meijer:1981:NCM,Hellman:1981:ACA}.",
  acknowledgement = ack-nhfb,
  classification = "723; B6120B (Codes); B6210L (Computer
                 communications); C5620 (Computer networks and
                 techniques); C6130 (Data handling techniques)",
  corpsource =   "Univ. of Pisa, Pisa, Italy",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "authentication; computer networks; cryptosystem;
                 cryptosystems; data transmission; encoding; multiple
                 communication; security of data",
  treatment =    "P Practical",
}

@InProceedings{Merkle:1980:PPK,
  author =       "R. C. Merkle",
  title =        "Protocols for public key cryptosystems",
  crossref =     "IEEE:1980:PSS",
  pages =        "??--??",
  year =         "1980",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 22]{Goldreich:1997:FMCb}.",
}

@Manual{NBS:1980:MO,
  author =       "{National Bureau of Standards}",
  title =        "{DES} Modes of Operation",
  volume =       "81",
  organization = "U. S. Department of Commerce",
  address =      "Washington, DC, USA",
  pages =        "16",
  month =        dec,
  year =         "1980",
  LCCN =         "C 13.52:81",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Federal information processing standards publication",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 22]{Biham:1998:TA}.",
  xxISBN =       "none",
}

@Book{Pearcey:1980:EDS,
  author =       "T. (Trevor) Pearcey",
  title =        "Encryption in data systems and communication",
  publisher =    "Caulfield Institute of Technology. Computer Abuse
                 Research and Bureau (CITCARB)",
  address =      "Caulfield, Victoria, Australia",
  pages =        "99",
  year =         "1980",
  ISBN =         "0-909176-14-0",
  ISBN-13 =      "978-0-909176-14-3",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Cover title. At head of title: Caulfield Institute of
                 Technology. CITCARB. [1]-10.",
  keywords =     "Cryptography; Data transmission systems --- Security
                 measures",
}

@Article{Pomerance:1980:P,
  author =       "Carl Pomerance and J. L. Selfridge and Samuel S.
                 {Wagstaff, Jr.}",
  title =        "The Pseudoprimes to $ 25 \cdot 10^9 $",
  journal =      j-MATH-COMPUT,
  volume =       "35",
  number =       "151",
  pages =        "1003--1026",
  month =        jul,
  year =         "1980",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  MRclass =      "10A40 (10-04 10A25)",
  MRnumber =     "82g:10030",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "B0210 (Algebra); C1110 (Algebra)",
  corpsource =   "Dept. of Math., Univ. of Illinois, Urbana, IL, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "Carmichael numbers; counting function; Lucas
                 sequences; mathematical analysis; primality;
                 pseudoprimes",
  referencedin = "Referenced in \cite[Ref. 9]{Silverman:1997:FGR}.",
  treatment =    "T Theoretical or Mathematical",
}

@Book{Pritchard:1980:DE,
  author =       "John Arthur Thomas (John A. T.) Pritchard",
  title =        "Data encryption",
  publisher =    pub-NAT-COMP-CENTRE,
  address =      pub-NAT-COMP-CENTRE:adr,
  pages =        "126 (or 118??)",
  year =         "1980",
  ISBN =         "0-85012-253-8",
  ISBN-13 =      "978-0-85012-253-4",
  LCCN =         "QA76.9.A25 P7",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "and bibliographies.",
  keywords =     "Computers --- Access control --- Passwords.",
}

@Book{Pronzini:1980:MCC,
  author =       "Bill Pronzini",
  title =        "Mummy!: a chrestomathy of crypt-ology",
  publisher =    "Arbor House",
  address =      "New York, NY, USA",
  pages =        "xii + 273",
  year =         "1980",
  ISBN =         "0-87795-271-X",
  ISBN-13 =      "978-0-87795-271-8",
  LCCN =         "PN 6120.95 M77 M86 1980",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Contents: Doyle, A.C. Lot no. 249.--Poe, E.A. Some
                 words with a mummy.--Benson, E.F. Monkeys.--Wollheim,
                 D.A. Bones.--Williams, T. The vengeance of
                 Nitocris.--Gautier, T. The mummy's foot.--Bloch, R. The
                 eyes of the mummy.--Powell, T. Charlie.--Hoch, E.D. The
                 weekend magus.--Lansdale, J.R. The princess.--Mayhar,
                 A. The eagle-claw rattle.--Grant, C.L. The other
                 room.--Malzberg, B.N. Revelation in seven
                 stages.--Bibliography.",
  price =        "US\$10.95",
  acknowledgement = ack-nhfb,
  keywords =     "mummies --- fiction",
}

@Article{Rivest:1980:DSC,
  author =       "R. L. Rivest",
  title =        "A description of a single-chip implementation of the
                 {RSA} cipher",
  journal =      "Lambda: the magazine of {VLSI} design",
  volume =       "1",
  number =       "3",
  pages =        "14--18",
  month =        "Fourth Quarter",
  year =         "1980",
  CODEN =        "VDESDP",
  ISSN =         "0273-8414",
  ISSN-L =       "0273-8414",
  bibdate =      "Thu Aug 21 06:25:34 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Shulman:1980:BRB,
  author =       "David Shulman",
  title =        "Book Review: {{\booktitle{United States diplomatic
                 codes and ciphers 1775--1938}}: By Ralph E. Weber.
                 Chicago. xviii + 633 pp. Illus. \$49.95}",
  journal =      j-HIST-MATH,
  volume =       "7",
  number =       "4",
  pages =        "452--454",
  month =        nov,
  year =         "1980",
  CODEN =        "HIMADS",
  ISSN =         "0315-0860 (print), 1090-249X (electronic)",
  ISSN-L =       "0315-0860",
  bibdate =      "Wed Jun 26 06:17:21 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/histmath.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0315086080900142",
  acknowledgement = ack-nhfb,
  fjournal =     "Historia Mathematica",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03150860",
}

@Article{Shulman:1980:BRU,
  author =       "David Shulman",
  title =        "Book Review: {{\booktitle{United States diplomatic
                 codes and ciphers 1775--1938}}: By Ralph E. Weber.
                 Chicago. xviii + 633 pp. Illus. \$49.95}",
  journal =      j-HIST-MATH,
  volume =       "7",
  number =       "4",
  pages =        "452--454",
  month =        nov,
  year =         "1980",
  CODEN =        "HIMADS",
  ISSN =         "0315-0860 (print), 1090-249X (electronic)",
  ISSN-L =       "0315-0860",
  bibdate =      "Wed Jun 26 06:17:21 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/histmath.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0315086080900142",
  acknowledgement = ack-nhfb,
  fjournal =     "Historia Mathematica",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03150860/",
}

@Article{Snyder:1980:CAP,
  author =       "Samuel S. Snyder",
  title =        "Computer Advances Pioneered by Cryptologic
                 Organizations",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "2",
  number =       "1",
  pages =        "60--70",
  month =        jan # "\slash " # mar,
  year =         "1980",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:17 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1980/pdf/a1060.pdf;
                 http://www.computer.org/annals/an1980/a1060abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@MastersThesis{Sorkis:1980:USM,
  author =       "Michael Sorkis",
  title =        "Use of statistically matched codes in a data
                 encryption system",
  type =         "Thesis ({M.S.})",
  school =       "Southern Illinois University at Carbondale",
  address =      "Carbondale, IL, USA",
  pages =        "v + 91",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Book{USWD:1980:EC,
  author =       "{United States.War Dept} and {United
                 States.Adjutant-General's Office}",
  title =        "Elements of cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "165",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Training pamphlet; no. 3 War Dept document; no. 117
                 Training pamphlet (United States. War Dept.); no. 3.
                 Document (United States. War Dept.); no. 117",
  acknowledgement = ack-nhfb,
  annote =       "Photocopy.",
  keywords =     "Ciphers; Cryptography.",
}

@Article{Voukalis:1980:DFC,
  author =       "D. C. Voukalis",
  title =        "The distance factor in cryptosystems",
  journal =      j-INT-J-ELECTRON,
  volume =       "49",
  number =       "1",
  pages =        "73--75",
  year =         "1980",
  CODEN =        "IJELA2",
  ISSN =         "0020-7217",
  ISSN-L =       "0020-7217",
  MRclass =      "94B99",
  MRnumber =     "82k:94021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "International Journal of Electronics",
}

@Article{Voukalis:1980:GSE,
  author =       "D. C. Voukalis",
  title =        "A good solution of the encryption problem using matrix
                 code, distance factor and {PN} sequences",
  journal =      "Internat. J. Electron.",
  volume =       "48",
  number =       "3",
  pages =        "271--274",
  year =         "1980",
  CODEN =        "IJELA2",
  ISSN =         "0020-7217",
  MRclass =      "94A99",
  MRnumber =     "82b:94020",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "International Journal of Electronics",
}

@MastersThesis{Wells:1980:ADB,
  author =       "David L. Wells",
  title =        "Achieving data base protection through the use of
                 subkey encryption",
  type =         "Thesis ({Doctor of Engineering})",
  school =       "University of Wisconsin-Milwaukee",
  address =      "Milwaukee, WI, USA",
  pages =        "131",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Electronic data processing departments --- Security
                 measures.",
}

@Article{Williams:1980:MRP,
  author =       "H. C. Williams",
  title =        "A modification of the {RSA} public-key encryption
                 procedure",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "26",
  number =       "6",
  pages =        "726--729",
  year =         "1980",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1980.1056264",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94B99 (10A25)",
  MRnumber =     "81k:94041",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{ACE:1981:RPC,
  author =       "{American Council on Education}",
  title =        "Report of the {Public Cryptography Study Group}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "435--450",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jan 28 14:37:22 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See the opposing view in \cite{Davida:1981:CAR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@TechReport{Ahlswede:1981:BCG,
  author =       "R. Ahlswede and G. Dueck",
  title =        "Bad codes are good ciphers",
  type =         "Report",
  institution =  "Universit{\"a}t Bielefeld",
  address =      "Bielefeld, Germany",
  year =         "1981",
  bibdate =      "Sat Apr 20 12:15:46 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Submitted in Nov. 1980 to the proceedings of the
                 International Colloquium on Information Theory, to be
                 held at Budapest in August 1981.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:CHP,
  author =       "Anonymous",
  title =        "Corrections: {How Polish Mathematicians Deciphered the
                 Enigma, 3(3) 232}, {Reviews: H. H. Goldstine: A History
                 of Numerical Analysis, 3(3) 293}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "4",
  pages =        "407--407",
  month =        oct # "\slash " # dec,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 01 10:35:25 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Rejewski:1981:HPM,Salzer:1981:RHH}.",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a4400.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{Anonymous:1981:GIU,
  author =       "Anonymous",
  title =        "Guidelines for implementing and using the {NBS} Data
                 Encryption Standard",
  volume =       "74",
  publisher =    pub-NBS,
  address =      pub-NBS:adr,
  pages =        "39",
  year =         "1981",
  ISSN =         "0083-1816",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "United States. National Bureau of Standards. Federal
                 information processing standards publication, FIPS
                 PUB",
  acknowledgement = ack-nhfb,
}

@Article{Asmuth:1981:EAC,
  author =       "C. A. Asmuth and G. R. Blakley",
  title =        "An efficient algorithm for constructing a cryptosystem
                 which is harder to break than two other cryptosystems",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "7",
  number =       "6",
  pages =        "447--450",
  year =         "1981",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94B99 (68C05)",
  MRnumber =     "83d:94020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
}

@Article{Ayoub:1981:EKR,
  author =       "F. Ayoub",
  title =        "Encryption with keyed random permutations",
  journal =      j-ELECT-LETTERS,
  volume =       "17",
  number =       "17",
  pages =        "583--585",
  year =         "1981",
  CODEN =        "ELLEAK",
  ISSN =         "0013-5194",
  ISSN-L =       "0013-5194",
  MRclass =      "94B25 (05A05)",
  MRnumber =     "82h:94023",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Electronics Letters",
}

@Article{Baum:1981:RPC,
  author =       "Werner A. Baum and David H. Brandin and R. Creighton
                 Buck and George I. Davida and George Handelman and
                 Martin E. Hellman and Ira Michael Heyman and Wilfred
                 Kaplan and Daniel C. Schwartz",
  title =        "Report of the {Public Cryptography Study Group},
                 prepared for {American Council on Education, One Dupont
                 Circle, Washington, DC 20036, February 7, 1981}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "435--445",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jan 28 14:37:22 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See the opposing view in \cite{Davida:1981:CAR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Beesly:1981:CIW,
  author =       "Patrick Beesly",
  title =        "Cryptanalysis and its influence on the war at sea
                 1914--1918",
  publisher =    "U.S. Naval Academy",
  address =      "Annapolis, MD, USA",
  pages =        "13",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Xerox copy.",
  xxnote =       "Check publisher??",
}

@Article{Booth:1981:ASU,
  author =       "K. S. Booth",
  title =        "Authentication of Signatures Using Public Key
                 Encryption",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "772--774",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Sep 22 11:36:41 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "One of Needham and Schroeder's proposed signature
                 authentication protocols is shown to fail when there is
                 a possibility of compromised keys: this invalidates one
                 of the applications of their technique. A more
                 elaborate mechanism is proposed which does not require
                 a network clock, but does require a third party to the
                 transaction. The latter approach is shown to be
                 reliable in a fairly strong sence.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Brassard:1981:TLT,
  author =       "Gilles Brassard",
  title =        "A time-luck tradeoff in relativized cryptography",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "22",
  number =       "3",
  pages =        "280--311",
  month =        jun,
  year =         "1981",
  CODEN =        "JCSSBM",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:25:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0022000081900349",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Book{Brownell:1981:ODN,
  author =       "George A. Brownell",
  title =        "The origin and development of the {National Security
                 Agency}",
  volume =       "35",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "x + 98",
  year =         "1981",
  ISBN =         "0-89412-054-9",
  ISBN-13 =      "978-0-89412-054-1",
  LCCN =         "UB290 .B76 1981",
  bibdate =      "Mon Sep 13 06:41:04 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Edited by Wayne G. Barker. Originally published as
                 report of the Ad hoc Committee to Study the
                 Communications Intelligence Activities of the United
                 States, George A. Brownell, chairman.",
  series =       "A cryptographic series",
  acknowledgement = ack-nhfb,
}

@Article{Burchard:1981:NNF,
  author =       "Hank Burchard",
  title =        "News and Notices: {Finerman and Lee Receive ACM
                 Awards}; Summer Positions at {Digital Computer Museum};
                 {CBI Fellowship 1982--1983}; {GMD} Activities in the
                 History of Computing; Request for Articles; {Edwards}
                 Speaks at {Digital Computer Museum}; Exhibit of Cipher
                 Machines",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "4",
  pages =        "410--413",
  month =        oct # "\slash " # dec,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:18 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a4410.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{CBEMA:1981:ANS,
  author =       "{Computer and Business Equipment Manufacturers
                 Association} and {American National Standards
                 Institute}",
  title =        "{American National Standard Data Encryption
                 Algorithm}",
  publisher =    pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "16",
  day =          "30",
  month =        dec,
  year =         "1981",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "ANSI X3.92-1981.",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory --- standards --- United States;
                 computers --- access control --- standards --- United
                 States; data protection --- standards --- United
                 States",
}

@Article{Chaum:1981:UEM,
  author =       "D. Chaum",
  title =        "Untraceable electronic mail, return addresses, and
                 digital pseudonyms",
  journal =      j-CACM,
  volume =       "24",
  number =       "2",
  pages =        "84--88",
  month =        feb,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1019.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "information hiding; steganography",
}

@Book{Clark:1981:ECC,
  author =       "George C. {Clark, Jr.} and J. Bibb Cain",
  title =        "Error-correction coding for digital communications",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  pages =        "xii + 422",
  year =         "1981",
  ISBN =         "0-306-40615-2",
  ISBN-13 =      "978-0-306-40615-7",
  LCCN =         "TK5102.5 .C52",
  bibdate =      "Mon Nov 30 08:53:48 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Periodical{Crypto:1981:ACP,
  author =       "CRYPTO",
  title =        "Advances in cryptology: proceedings of {CRYPTO}",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  pages =        "various",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Volumes for 1984 to 1989 were published in the
                 Springer-Verlag Lecture Notes in Computer Science
                 series.",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Congresses;
                 Cryptography --- Congresses.",
}

@Article{Davida:1981:CAR,
  author =       "George I. Davida",
  title =        "The Case Against Restraints on Non-Governmental
                 Research in Cryptography",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "445--450",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jan 28 14:39:33 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This is an opposing view published with
                 \cite{ACE:1981:RPC}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Davida:1981:DES,
  author =       "George I. Davida and David L. Wells and John B. Kam",
  title =        "A Database Encryption System with Subkeys",
  journal =      j-TODS,
  volume =       "6",
  number =       "2",
  pages =        "312--328",
  month =        jun,
  year =         "1981",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  MRclass =      "68B15",
  MRnumber =     "82f:68020",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "Compendex database; Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1981-6-2/p312-davida/p312-davida.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1981-6-2/p312-davida/",
  abstract =     "A new cryptosystem that is suitable for database
                 encryption is presented. The system has the important
                 property of having subkeys that allow the encryption
                 and decryption of fields within a record. The system is
                 based on the Chinese Remainder Theorem.",
  acknowledgement = ack-nhfb,
  annote =       "Subkeys allow the encryption and decryption of fields
                 within a record. The system is based on the Chinese
                 Remainder Theorem.",
  classification = "723",
  fjournal =     "Association for Computing Machinery. Transactions on
                 Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "codes, symbolic; data base systems; data security;
                 databases; decryption; encryption; subkeys",
  subject =      "Data --- Data Encryption (E.3)",
}

@Article{Denning:1981:MKG,
  author =       "Dorothy E. Denning and Fred B. Schneider",
  title =        "Master keys for group sharing",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "1",
  pages =        "23--25",
  day =          "13",
  month =        feb,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94B99",
  MRnumber =     "82d:94046",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also note \cite{Brouwer:1982:NMK}.",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes)",
  corpsource =   "Computer Sci. Dept., Purdue Univ., W. Lafayette, IN,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "Diffie and Hellman's public-key distribution scheme;
                 encoding; group sharing; master key; Shamir's threshold
                 scheme",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Denning:1981:MMK,
  author =       "D. E. Denning and H. Meijer and F. B. Schneider",
  title =        "More on master keys for group sharing",
  journal =      j-INFO-PROC-LETT,
  volume =       "13",
  number =       "3",
  pages =        "125--126",
  day =          "13",
  month =        dec,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C0230 (Economic, social and
                 political aspects of computing); C6130 (Data handling
                 techniques)",
  corpsource =   "Computer Sci. Dept., Purdue Univ., West Lafayette, IN,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "cryptography; encryption; group sharing; master keys",
  treatment =    "P Practical",
}

@Article{Denning:1981:SRR,
  author =       "Peter J. Denning and David H. Brandin",
  title =        "Special Report: Report of the {Public Cryptography
                 Study Group}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "434--434",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 01 07:47:27 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Gifford:1981:CSI,
  author =       "David K. Gifford",
  title =        "Cryptographic sealing for information secrecy and
                 authentication",
  journal =      j-OPER-SYS-REV,
  volume =       "15",
  number =       "5",
  pages =        "123--124",
  month =        dec,
  year =         "1981",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Hellman:1981:ACA,
  author =       "M. E. Hellman",
  title =        "Another cryptanalytic attack on {``A cryptosystem for
                 multiple communication''} {[Inform. Process. Lett. {\bf
                 10}(4--5), 5 July 1980, pp. 180--183]}",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "4",
  pages =        "182--183",
  day =          "13",
  month =        aug,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Luccio:1980:CMC,Meijer:1981:NCM}.",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes)",
  corpsource =   "Dept. of Electrical Engng., Stanford Univ., Stanford,
                 CA, USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "authentification; cryptography; cryptosystem; data
                 communication systems; multiple communication; plain
                 text attack; security; text attack",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Henry:1981:BJB,
  author =       "P. S. Henry",
  title =        "{B.S.T.J.} Briefs: Fast Decryption Algorithm for the
                 Knapsack Cryptographic System",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "60",
  number =       "5",
  pages =        "767--773",
  month =        may # "--" # jun,
  year =         "1981",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Tue Nov 9 11:15:56 MST 2010",
  bibsource =    "http://bstj.bell-labs.com/oldfiles/year.1981/BSTJ.1981.6005.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://bstj.bell-labs.com/BSTJ/images/Vol60/bstj60-5-767.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@TechReport{Hershey:1981:DLP,
  author =       "J. E. (John E.) Hershey",
  title =        "The discrete logarithm public cryptographic system",
  type =         "NTIA report",
  number =       "81-81, PB82-130097",
  institution =  "U.S. Dept. of Commerce, National Telecommunications
                 and Information Administration",
  address =      "Washington, DC, USA (??)",
  pages =        "iv + 40",
  month =        sep,
  year =         "1981",
  LCCN =         "C 60.10: 81-81 Govt Pub",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; finite fields (algebra)",
}

@TechReport{IDC:1981:DE,
  author =       "{International Data Corporation}",
  title =        "Data encryption",
  type =         "Research memorandum",
  number =       "IDC \#ISPS-M81-10.",
  institution =  "International Data Corporation",
  address =      "Framingham, MA, USA",
  pages =        "30",
  month =        oct,
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ingemarsson:1981:UAS,
  author =       "Ingemar Ingemarsson and C. K. Wong",
  title =        "Use Authentication Scheme for Shared Data Based on a
                 Trap-Door One-Way Function",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "2",
  pages =        "63--67",
  month =        apr,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Jan 29 09:23:05 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "data base systems",
}

@TechReport{IRD:1981:DTV,
  author =       "{International Resource Development, Inc.}",
  title =        "Data, text, and voice encryption equipment",
  type =         "Report",
  number =       "183",
  institution =  "IRD",
  address =      "30 High St., Norwalk, CT 06851, USA",
  pages =        "vi + 154",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography equipment industry; Cryptography
                 equipment industry --- United States; Market surveys
                 --- United States.",
}

@TechReport{Juenemann:1981:DES,
  author =       "Robert R. Juenemann",
  title =        "The {Data Encryption Standard} vs. Exhaustive Search",
  type =         "Report",
  institution =  "Satellite Business Systems",
  address =      "McLean, VA, USA",
  day =          "5",
  month =        feb,
  year =         "1981",
  bibdate =      "Fri May 21 14:57:54 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Konheim:1981:CP,
  author =       "Alan G. Konheim",
  title =        "Cryptography, a primer",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xiv + 432",
  year =         "1981",
  ISBN =         "0-471-08132-9",
  ISBN-13 =      "978-0-471-08132-6",
  LCCN =         "Z103 .K66 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "A Wiley-interscience publication",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; telecommunication ---
                 security measures",
}

@Article{Lamport:1981:TNP,
  author =       "Leslie Lamport",
  title =        "Technical Note: Password Authentication with Insecure
                 Communication",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "770--772",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 06:57:19 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Lamport81;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  oldlabel =     "Lamport81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Lamport81",
}

@Book{Lange:1981:TC,
  author =       "Andr{\'e} Lange and E. A. Soudart",
  title =        "Treatise on cryptography",
  volume =       "36",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "xvi + 168",
  year =         "1981",
  ISBN =         "0-89412-055-7 (paperback)",
  ISBN-13 =      "978-0-89412-055-8 (paperback)",
  LCCN =         "Z104.L2613 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: Traite de cryptographie / par
                 Andr{\'e} Lange et E.-A. Soudart. ``Plus many problems
                 in French for the solver''",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Langie:1981:CSS,
  author =       "Andre Langie",
  title =        "Cryptography: a study on secret writings",
  volume =       "38",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "vii + 192",
  year =         "1981",
  ISBN =         "0-89412-061-1",
  ISBN-13 =      "978-0-89412-061-9",
  LCCN =         "Z104 .L28 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: De la cryptographie. Reprint of an
                 unspecified previous ed. Bibliography: p. 158.",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Lauer:1981:CSC,
  author =       "Rudolph F. Lauer",
  title =        "Computer simulation of classical substitution
                 cryptographic systems",
  volume =       "32",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "xi + 111",
  year =         "1981",
  ISBN =         "0-89412-050-6",
  ISBN-13 =      "978-0-89412-050-3",
  LCCN =         "Z104 .L38 1981",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "basic (computer program language); cryptography;
                 cryptography -- computer programs; electronic data
                 processing -- cryptography",
}

@Article{Lieberherr:1981:UCD,
  author =       "K. Lieberherr",
  title =        "Uniform complexity and digital signatures",
  journal =      j-THEOR-COMP-SCI,
  volume =       "16",
  number =       "1",
  pages =        "99--110",
  month =        oct,
  year =         "1981",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:36:07 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs1980.bib",
  acknowledgement = ack-nhfb,
  classification = "C4240 (Programming and algorithm theory)",
  corpsource =   "Dept. of Electrical Engng. and Computer Sci.,
                 Princeton Univ., Princeton, NJ, USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "computational complexity; digital signatures; security
                 of data; signature checking; signature production;
                 uniform complexity",
  pubcountry =   "Netherlands",
  treatment =    "T Theoretical or Mathematical",
}

@Article{McEliece:1981:SSR,
  author =       "R. J. McEliece and D. V. Sarwate",
  title =        "On sharing secrets and {Reed--Solomon} codes",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "583--584",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "94B35",
  MRnumber =     "82h:94024",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@TechReport{Meijer:1981:DSS,
  author =       "Henk Meijer and Selim G. Akl",
  title =        "Digital signature schemes",
  type =         "Technical report",
  number =       "81-120",
  institution =  "Department of Computing and Information Science,
                 Queen's University",
  address =      "Kingston, ON, Canada",
  pages =        "10",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Meijer:1981:NCM,
  author =       "H. Meijer",
  title =        "A note on {``A cryptosystem for multiple
                 communication''} {[Inform. Process. Lett. {\bf
                 10}(4--5), 5 July 1980, pp. 180--183]}",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "4",
  pages =        "179--181",
  day =          "13",
  month =        aug,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Luccio:1980:CMC,Hellman:1981:ACA}.",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes)",
  corpsource =   "Dept. of Math. and Statistics, Queen's Univ.,
                 Kingston, Ont., Canada",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "cryptography; cryptosystem; cyphertext; data
                 communication systems; multiple communication; node;
                 plain-text attack; secret messages; security",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Merkle:1981:SME,
  author =       "Ralph C. Merkle and Martin E. Hellman",
  title =        "On the Security of Multiple Encryption",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "465--467",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68K05 (94A24 94B99)",
  MRnumber =     "82f:68103",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  referencedin = "Referenced in \cite[Ref. 20]{Biham:1998:TA}.",
}

@MastersThesis{Mulherin:1981:FDE,
  author =       "Michael Hugh Mulherin",
  title =        "A file data encryption system using {Galois} fields",
  volume =       "52731",
  type =         "Thesis ({M.Sc.Cs.})",
  publisher =    "National Library of Canada",
  school =       "University of New Brunswick",
  address =      "Ottawa, ON, Canada",
  pages =        "174",
  year =         "1981",
  ISBN =         "0-315-04837-9",
  ISBN-13 =      "978-0-315-04837-9",
  ISSN =         "0227-3845",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "2 microfiche(s) (174 fr.)",
  series =       "Canadian theses on microfiche = Th{\`e}ses canadiennes
                 sur microfiche",
  acknowledgement = ack-nhfb,
}

@Article{Muller:1981:SRP,
  author =       "Winfried B. M{\"u}ller and Wilfried N{\"o}bauer",
  title =        "Some remarks on public-key cryptosystems",
  journal =      "Studia Sci. Math. Hungar.",
  volume =       "16",
  number =       "1-2",
  pages =        "71--76",
  year =         "1981",
  CODEN =        "SSMHAX",
  ISSN =         "0081-6906",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "85e:94018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Studia Scientiarum Mathematicarum Hungarica. A
                 Quarterly of the Hungarian Academy of Sciences",
}

@Book{OConnell:1981:CDE,
  author =       "Richard O'Connell",
  title =        "Crypto-ease: a data encryption dictionary",
  publisher =    "Atlantis Editions",
  address =      "Philadelphia, PA, USA",
  pages =        "33",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Dictionaries;
                 Dictionaries; Electronic data processing departments
                 --- Security measures",
}

@TechReport{Rabin:1981:HES,
  author =       "Michael O. Rabin",
  title =        "How to exchange secrets by oblivious transfer",
  type =         "Technical Report",
  number =       "TR-81",
  institution =  "Aiken Computation Laboratory, Harvard University",
  address =      "Cambridge, MA, USA",
  year =         "1981",
  bibdate =      "Sun Mar 11 11:14:25 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://eprint.iacr.org/2005/187.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Rejewski:1981:HPM,
  author =       "Marian Rejewski",
  title =        "How {Polish} Mathematicians Deciphered the {Enigma}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "3",
  pages =        "213--234",
  month =        jul # "\slash " # sep,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:18 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Afterwords by Cipher A. Deavours and I. J. Good. This
                 article was entitled ``Jak matematycy polscy
                 rozszyfrowz Enigmg{\c{e}}'' in the Annals of the Polish
                 Mathematical Society, Series II, Wiadomo{\'s}ci
                 Matematyczne, Volume 23, 1980, 1-28, translated by Joan
                 Stepenske. See minor correction
                 \cite{Anonymous:1981:CHP}.",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a3213.pdf;
                 http://www.computer.org/annals/an1981/a3213abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Salzer:1981:RHH,
  author =       "Herbert E. Salzer and Eric A. Weiss and Henry S. Tropp
                 and Jane Smith and Robert W. Rector",
  title =        "Reviews: {H. H. Goldstine: A History of Numerical
                 Analysis}; {Electronics: An Age of Innovation}; {J. A.
                 N. Lee: Banquet Anecdotes and Conference Excerpts}; {R.
                 L. Wexelblat: History of Programming Languages}:
                 Capsule Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "3",
  pages =        "289--302",
  month =        jul # "\slash " # sep,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:18 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See minor correction \cite{Anonymous:1981:CHP}.",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a3289.pdf;
                 http://www.computer.org/annals/an1981/a3289abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@MastersThesis{Seshadri:1981:KPP,
  author =       "Raghavan Seshadri",
  title =        "Knapsack problems in public key encryption systems",
  type =         "Thesis ({M.S.})",
  school =       "University of Oklahoma",
  address =      "Norman, OK, USA",
  pages =        "vii + 99",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Sidhu:1981:APG,
  author =       "Deepinder P. Sidhu",
  title =        "Authentication Protocols for General Communication
                 Channels",
  crossref =     "IEEE:1981:CLC",
  pages =        "30--40",
  year =         "1981",
  bibdate =      "Sat Sep 25 20:21:07 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Brookhaven Natl Lab, Upton, NY,USA",
  classification = "723; 731",
  conference =   "6th Conference on Local Computer Networks",
  conflocation = "Minneapolis, MN, USA",
  journalabr =   "Conf Local Comput Networks",
  keywords =     "authentication protocols; communication channels;
                 completeness; computer networks; deadlock freeness;
                 encryption; fifo channels; liveness; non-fifo channels;
                 public-key encryption",
  meetingaddress = "Minneapolis, MN, USA",
  sponsor =      "Univ of Minn, Comput Cent, Minneapolis, USA; IEEE,
                 Twin Cities Chapter, USA; IEEE Comput Soc Tech Comm on
                 Comput Commun, Los Alamitos, Calif, USA",
}

@Article{Smith:1981:VEP,
  author =       "Michael K. Smith and Ann E. Siebert and Benedetto L.
                 DiVito and Donald I. Good",
  title =        "A verified encrypted packet interface",
  journal =      j-SIGSOFT,
  volume =       "6",
  number =       "3",
  pages =        "13--16",
  month =        jul,
  year =         "1981",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1010832.1010838",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:11:35 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsoft1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Book{USNBS:1981:GIU,
  author =       "{United States.National Bureau of Standards}",
  title =        "Guidelines for implementing and using the {NBS Data
                 Encryption Standard}: category: {ADP} operations,
                 subcategory: computer security",
  publisher =    pub-NBS,
  address =      pub-NBS:adr,
  pages =        "39",
  day =          "1",
  month =        apr,
  year =         "1981",
  CODEN =        "FIPPAT",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "FIPS Pub; 74",
  acknowledgement = ack-nhfb,
  keywords =     "Computer networks --- Security measures --- Standards;
                 Computers --- Access control --- Standards; Electronic
                 data processing departments --- Security measures;
                 Standards",
}

@Article{Wegman:1981:NHF,
  author =       "Mark N. Wegman and J. Lawrence Carter",
  title =        "New Hash Functions and Their Use in Authentication and
                 Set Equality",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "22",
  number =       "3",
  pages =        "265--279",
  month =        jun,
  year =         "1981",
  CODEN =        "JCSSBM",
  ISSN =         "0022-0000",
  ISSN-L =       "0022-0000",
  bibdate =      "Sat Jan 25 17:38:12 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  abstract =     "In this paper we exhibit several new classes of hash
                 functions with certain desirable properties, and
                 introduce two novel applications for hashing which make
                 use of these functions. One class contains a small
                 number of functions, yet is almost universal2. If the
                 functions hash n-bit long names into m-bit indices,
                 then specifying a member of the class requires only
                 O((m + log2 log2(n)) g log2(n)) bits as compared to
                 O(n) bits for earlier techniques. For long names, this
                 is about a factor of m larger than the lower bound of $
                 m + \log_2 n \log_2 m $ bits. An application of this
                 class is a provably secure authentication technique for
                 sending messages over insecure lines. A second class of
                 functions satisfies a much stronger property than
                 universal2. We present the application of testing sets
                 for equality. The authentication technique allows the
                 receiver to be certain that a message is genuine. An
                 ``enemy'' even one with infinite computer resources
                 cannot forge or modify a message without detection. The
                 set equality technique allows operations including
                 ``add member to set,'' ``delete member from set,'' and
                 ``test two sets for equality'' to be performed in
                 expected constant time and with less than a specified
                 probability of error.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
  journalabr =   "J Comput Syst Sci",
  keywords =     "computer metatheory; cryptography; hash functions",
}

@Article{Anonymous:1982:BRCa,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Cryptography: a primer}}:
                 Alan G. Konheim: New York: John Wiley and Sons, 1981.
                 xiv + 432 pp. \$34.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "84--84",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488290030X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Anonymous:1982:CC,
  author =       "Anonymous",
  title =        "A course in cryptanalysis",
  volume =       "33, 34",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  year =         "1982",
  ISBN =         "0-89412-052-2 (vol. 1), 0-89412-053-0 (vol. 2)",
  ISBN-13 =      "978-0-89412-052-7 (vol. 1), 978-0-89412-053-4 (vol.
                 2)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Originally published in 1942. Revised and enlarged. v.
                 1. Explanatory text and short exercises; v. 2. Figures
                 and cipher texts.",
  keywords =     "Cryptography.",
}

@Misc{Anonymous:1982:ESS,
  author =       "Anonymous",
  title =        "Encryption scrambling the satellite signal for
                 security",
  publisher =    "Instant Replay",
  address =      "Arlington, VA, USA",
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "1 sound cassette (75 min.)",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: ``Space communications in the
                 80's.'' Presented at the Seventh Annual Conference of
                 the Public Service Satellite Consortium, October 19-22,
                 1982, Washington, DC",
  keywords =     "Telecommunication.",
}

@Article{Anonymous:1982:NNPa,
  author =       "Anonymous",
  title =        "News and Notices: {Pioneer Award Established by
                 Computer Society}; {Undergraduate Paper Competition in
                 Cryptology}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "4",
  number =       "2",
  pages =        "184--184",
  month =        apr # "\slash " # jun,
  year =         "1982",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1982/pdf/a2184.pdf;
                 http://www.computer.org/annals/an1982/a2184abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{Bamford:1982:PPR,
  author =       "James Bamford",
  title =        "The puzzle palace: a report on {America}'s most secret
                 agency",
  publisher =    pub-HOUGHTON-MIFFLIN,
  address =      pub-HOUGHTON-MIFFLIN:adr,
  pages =        "465",
  year =         "1982",
  ISBN =         "0-395-31286-8",
  ISBN-13 =      "978-0-395-31286-5",
  LCCN =         "KF7683.N32 B3",
  bibdate =      "Thu Jan 21 14:10:29 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "United States National Security Agency",
}

@Article{Bauer:1982:KVM,
  author =       "Friedrich L. Bauer",
  title =        "{Kryptologie --- Verfahren und Maximen}. ({German})
                 [{Cryptology} --- procedures and maxims]",
  journal =      j-INFORMATIK-SPEKTRUM,
  volume =       "5",
  number =       "??",
  pages =        "74--81",
  month =        "????",
  year =         "1982",
  CODEN =        "INSKDW",
  ISSN =         "0170-6012 (print), 1432-122X (electronic)",
  ISSN-L =       "0170-6012",
  MRclass =      "94A99 94-01",
  bibdate =      "Fri Aug 21 15:10:11 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/b/bauer-friedrich-ludwig.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  ZMnumber =     "0488.94019",
  acknowledgement = ack-nhfb,
  author-dates = "Friedrich (``Fritz'') Ludwig Bauer (10 June 1924--26
                 March 2015)",
  fjournal =     "Informatik Spektrum",
  journal-URL =  "http://link.springer.com/journal/287",
  keywords =     "code systems; cryptology; encryption; survey of
                 classical cryptographic methods",
  language =     "German",
  zmid =         "03769510",
}

@MastersThesis{Becker:1982:EDE,
  author =       "Michael S. Becker",
  title =        "An exercise with the {Data Encryption Standard}",
  type =         "Master of Science, Plan II",
  school =       "Department of Electrical Engineering and Computer
                 Sciences, University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "56",
  year =         "1982",
  LCCN =         "TK7 .U5 1982:2:B-C",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Beker:1982:CSP,
  author =       "Henry Beker and F. C. (Frederick Charles) Piper",
  title =        "Cipher systems: the protection of communications",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "427",
  year =         "1982",
  ISBN =         "0-471-89192-4",
  ISBN-13 =      "978-0-471-89192-5",
  LCCN =         "Z104 .B39 1982",
  bibdate =      "Sun Nov 20 19:54:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "According to the introduction to Fred Piper's 2005
                 Turing Lecture (Computer Journal 48(2), 145--156, March
                 2005, this is one of the first books published on the
                 protection of communications.",
  subject =      "Ciphers; Cryptography",
}

@InProceedings{Blum:1982:CFT,
  author =       "Manuel Blum",
  title =        "Coin Flipping by Telephone --- a Protocol for Solving
                 Impossible Problems",
  crossref =     "Rudolph:1982:HTI",
  pages =        "133--137",
  year =         "1982",
  bibdate =      "Sun Mar 11 10:10:54 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/conf/compcon/compcon1982.html#Blum82;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "See published article \cite{Blum:1983:CFT}.",
}

@InProceedings{Blum:1982:HGC,
  author =       "Manuel Blum and Silvio Micali",
  title =        "How to Generate Cryptographically Strong Sequences of
                 Pseudo-Random Bits",
  crossref =     "IEEE:1982:ASF",
  pages =        "112--117",
  year =         "1982",
  DOI =          "https://doi.org/10.1109/SFCS.1982.72",
  bibdate =      "Wed Dec 21 06:47:00 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  xxpages =      "464--479",
}

@Book{Bosworth:1982:CCC,
  author =       "Bruce Bosworth",
  title =        "Codes, ciphers, and computers: an introduction to
                 information security",
  publisher =    pub-HAYDEN-BOOK,
  address =      pub-HAYDEN-BOOK:adr,
  pages =        "259",
  year =         "1982",
  ISBN =         "0-8104-5149-2",
  ISBN-13 =      "978-0-8104-5149-0",
  LCCN =         "Z103.B58 1982",
  bibdate =      "Sat Apr 20 11:51:26 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Branstad:1982:ISS,
  author =       "Dennis K. Branstad and Miles E. Smid",
  title =        "Integrity and security standards based on
                 cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "255--260",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488290044X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Brouwer:1982:NMK,
  author =       "Andries E. Brouwer and Peter {van Emde Boas}",
  title =        "A note on: {``Master keys for group sharing'' [Inform.
                 Process. Lett. {\bf 12} (1981), no. 1, 23--25; MR
                 82d:94046] by D. E. Denning and F. B. Schneider}",
  journal =      j-INFO-PROC-LETT,
  volume =       "14",
  number =       "1",
  pages =        "12--14",
  day =          "27",
  month =        mar,
  year =         "1982",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94B99",
  MRnumber =     "83h:94019",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Denning:1981:MKG}.",
  acknowledgement = ack-nhfb,
  classification = "C6130 (Data handling techniques)",
  corpsource =   "Dept. of Pure Math., Math. Centre, Amsterdam,
                 Netherlands",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "cryptography; group keys; group sharing; master keys",
  treatment =    "P Practical",
}

@Article{Buck:1982:PCS,
  author =       "R. Creighton Buck",
  title =        "The public cryptography study group",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "249--254",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900438",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{DeMillo:1982:CP,
  author =       "Richard A. DeMillo and Nancy A. Lynch and Michael J.
                 Merritt",
  title =        "Cryptographic protocols",
  crossref =     "ACM:1982:PFA",
  pages =        "383--400",
  year =         "1982",
  bibdate =      "Wed Feb 20 18:33:45 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Denning:1982:CDS,
  author =       "Dorothy Elizabeth Robling Denning",
  title =        "Cryptography and data security",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xiii + 400",
  year =         "1982",
  ISBN =         "0-201-10150-5",
  ISBN-13 =      "978-0-201-10150-8",
  LCCN =         "QA76.9.A25 .D46 1982",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$22.95",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control; cryptography; data
                 protection",
}

@Article{Diffie:1982:CTF,
  author =       "Whitfield Diffie",
  title =        "Cryptographic technology: fifteen year forecast",
  journal =      j-SIGACT,
  volume =       "14",
  number =       "4",
  pages =        "38--57",
  month =        "Fall--Winter",
  year =         "1982",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1008902.1008903",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 08:21:21 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "This paper examines the forces driving public
                 development of cryptography today and projects the
                 course of the field over the next fifteen years with
                 attention to the possible influence of government
                 regulation. This paper was prepared, under contractual
                 arrangements to CRC Systems, in support of the Commerce
                 Department (National Telecommunications and Information
                 Administration, Special Projects Office) response to a
                 White House Office of Science and Technology Policy
                 request that the secretaries of the Departments of
                 Commerce and Defense propose a national policy on
                 cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@InCollection{Diffie:1982:CVP,
  author =       "Whitfield Diffie",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Conventional versus public key cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "41--72",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 720",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@Article{Ecker:1982:MGE,
  author =       "A. Ecker",
  title =        "{{\"U}ber die mathematischen Grundlagen einiger
                 Chiffrierverfahren}. ({German}) [{On} the mathematical
                 foundations of some cryptosystems]",
  journal =      j-COMPUTING,
  volume =       "29",
  number =       "4",
  pages =        "277--287",
  year =         "1982",
  CODEN =        "CMPTA2",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  MRclass =      "94B99 (10A10 20A05)",
  MRnumber =     "84d:94023",
  MRreviewer =   "J. H. van Lint",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Computing. Archiv f{\"u}r Informatik und Numerik",
  journal-URL =  "http://link.springer.com/journal/607",
  language =     "German",
}

@Article{Feynman:1982:SPC,
  author =       "Richard P. Feynman",
  title =        "Simulating physics with computers",
  journal =      j-INT-J-THEOR-PHYS,
  volume =       "21",
  number =       "6--7",
  pages =        "467--488",
  year =         "1982",
  CODEN =        "IJTPBM",
  DOI =          "https://doi.org/10.1007/BF02650179",
  ISSN =         "0020-7748",
  ISSN-L =       "0020-7748",
  MRclass =      "68J99",
  MRnumber =     "658311",
  bibdate =      "Sat Apr 9 15:46:55 2011",
  bibsource =    "ftp://ftp.math.utah.edu/pub/bibnet/authors/f/feynman-richard-p.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Physics of computation, Part II (Dedham, Mass.,
                 1981)",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Theoretical Physics",
  journal-URL =  "http://link.springer.com/journal/10773",
  remark =       "This paper contains an early proposal for quantum
                 cryptography.",
  xxvolume =     "B2",
}

@Book{Foster:1982:CM,
  author =       "Caxton C. Foster",
  title =        "Cryptanalysis for microcomputers",
  publisher =    pub-HAYDEN-BOOK,
  address =      pub-HAYDEN-BOOK:adr,
  pages =        "333",
  year =         "1982",
  ISBN =         "0-8104-5174-3 (paperback)",
  ISBN-13 =      "978-0-8104-5174-2 (paperback)",
  LCCN =         "Z103.F67 1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$14.95",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers --- Data processing; Cryptography --- Data
                 processing; Microcomputers.",
}

@Article{Gabriel:1982:VPI,
  author =       "Richard Gabriel",
  title =        "{Verschl{\"u}sselungsabbildungen mit Pseudo-Inversen,
                 Zufallsgeneratoren und T{\"a}felungen}. ({German})
                 [{Encryption} mapping with pseudoinverses, random
                 generators and tilings]",
  journal =      "Kybernetika (Prague)",
  volume =       "18",
  number =       "6",
  pages =        "485--504",
  year =         "1982",
  CODEN =        "KYBNAI",
  ISSN =         "0023-5954",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "85a:94023",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Kybernetika",
  language =     "German",
}

@Manual{Gersho:1982:ACR,
  author =       "Allen Gersho",
  title =        "Advances in cryptography: a report on {CRYPTO} 81",
  number =       "82-04",
  publisher =    "Department of Electrical and Computer Engineering,
                 University of California, Santa Barbara",
  address =      "Santa Barbara, CA, USA",
  pages =        "viii + 156",
  year =         "1982",
  LCCN =         "QA76.9.A25 I14 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``Sponsored by the Data and Computer Communications
                 Committees of the IEEE Communications Society with the
                 cooperation of the Dept. of Electrical and Computer
                 Engineering, University of California, Santa Barbara.''
                 --- Verso of t.p. ``August 20, 1982.'' Includes
                 bibliographies.",
  series =       "ECE report",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses",
}

@Article{Gifford:1982:CSI,
  author =       "D. K. Gifford and A. K. Jones",
  title =        "Cryptographic Sealing for Information Security and
                 Authentication",
  journal =      j-CACM,
  volume =       "25",
  number =       "4",
  pages =        "274--286",
  month =        apr,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "A new protection mechanism is described that provides
                 general primitives for protection and authentication.
                 The mechanism is based on the idea of sealing an object
                 with a key. Sealed objects are self-authenticating, and
                 in the absence of an appropriate set of keys, only
                 provide information about the size of their contents.
                 New keys can be freely created at any time, and keys
                 can also be derived from existing keys with operators
                 that include Key-And and Key-Or. This flexibility
                 allows the protection mechanism to implement common
                 protection mechanisms such as capabilities, access
                 control lists, and information flow control. The
                 mechanism is enforced with a synthesis of conventional
                 cryptography, public-key cryptography, and a threshold
                 scheme.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "CACM protection operating cryptography",
}

@InProceedings{Gilmour-Bryson:1982:CDT,
  author =       "A. Gilmour-Bryson",
  title =        "Coding of the depositions of the {Templars}",
  crossref =     "Ciampi:1982:EVS",
  pages =        "451--467",
  year =         "1982",
  bibdate =      "Sat Feb 17 14:59:04 1996",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "From {\em Computing Reviews\/}: ``The article reports
                 on the progress of an historical study using a computer
                 for statistical analysis. The subject of the study is a
                 mass of trial depositions of the Knights Templar. The
                 purpose of the project is to find statistical
                 regularities in the large amount of testimony and to
                 create a model for similar studies.

                 The Order of the Knights Templar, founded around 1100,
                 was the first Christian military order. After the
                 Crusades, in the early fourteenth century, 127 articles
                 of accusation were brought against the order, including
                 charges of idolatry, sacrilege, and sodomy. The data
                 being studied are the responses of 900 men to each of
                 127 accusations. The article details the accusations
                 and the way in which the responses are being coded. The
                 statistical package SAS (Statistical Analysis System)
                 will be used. Examples of the results to be sought are:
                 tallies of guilty/innocent responses, tallies of
                 offenses committed versus seen versus heard about, and
                 correlations between, for example, age and other
                 responses. Depositions that differ markedly from the
                 average response will be identified.''",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; legal aspects",
  review =       "ACM CR 40531",
  subject =      "E.4 Data, CODING AND INFORMATION THEORY, Nonsecret
                 encoding schemes \\ G.3 Mathematics of Computing,
                 PROBABILITY AND STATISTICS, Statistical computing \\
                 J.1 Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Law J Computer Applications, SOCIAL AND
                 BEHAVIORAL SCIENCES",
}

@InProceedings{Goldwasser:1982:PEH,
  author =       "Shafi Goldwasser and Silvio Micali",
  title =        "Probabilistic encryption \& how to play mental poker
                 keeping secret all partial information",
  crossref =     "ACM:1982:PFA",
  pages =        "365--377",
  year =         "1982",
  bibdate =      "Wed Feb 20 18:33:45 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Golomb:1982:SRS,
  author =       "S. Golomb",
  title =        "Shift Register Sequences",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Revised",
  pages =        "xvi + 247",
  year =         "1982",
  ISBN =         "0-89412-048-4",
  ISBN-13 =      "978-0-89412-048-0",
  LCCN =         "QA267.5.S4 G6 1982",
  bibdate =      "Mon Nov 30 08:47:35 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Portions co-authored with Lloyd R. Welch, Richard M.
                 Goldstein, and Alfred W. Hales.",
  acknowledgement = ack-nhfb,
}

@Article{Gray:1982:ICT,
  author =       "P. E. Gray",
  title =        "Information control {I}: Technology transfer at issue:
                 The academic viewpoint: Educators believe efforts to
                 limit transfer of knowledge at the university level are
                 likely to weaken the {U.S.} lead in innovation",
  journal =      j-IEEE-SPECTRUM,
  volume =       "19",
  number =       "5",
  pages =        "64--68",
  month =        may,
  year =         "1982",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1982.6366886",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 16:51:45 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1980.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Educational institutions; Government;
                 Laboratories; National security; Very high speed
                 integrated circuits",
}

@Article{Grover:1982:CP,
  author =       "Derrick Grover",
  title =        "Cryptography: a Primer",
  journal =      j-COMP-J,
  volume =       "25",
  number =       "3",
  pages =        "400c-400",
  month =        aug,
  year =         "1982",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/25.3.400-c",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Dec 4 14:48:13 MST 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/25/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/25/3/400-c.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Guillou:1982:CT,
  author =       "L. C. Guillou and B. Lorig",
  title =        "Cryptography and teleinformatics",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "27--33",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900220",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Henry:1982:FDA,
  author =       "Paul S. Henry",
  title =        "Fast decryption algorithm for the knapsack cipher",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "80--83",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900293",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Holland:1982:GSA,
  author =       "Edward R. Holland and James L. Robertson",
  title =        "{GUEST} --- a Signature Analysis Based Test System for
                 {ECL} Logic",
  journal =      j-HEWLETT-PACKARD-J,
  volume =       "33",
  number =       "3",
  pages =        "26--29",
  month =        mar,
  year =         "1982",
  CODEN =        "HPJOAX",
  ISSN =         "0018-1153",
  bibdate =      "Tue Mar 25 14:12:15 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hpj.bib",
  abstract =     "A special printed circuit board tester is developed,
                 the Gemini Universal ECL Signature Test (GUEST) system,
                 that can apply a signature analysis based tests to the
                 emitter coupled logic (ECL). The tester functions at
                 real-time clock rates up to 25 MHz and generates test
                 vectors algorithmically in real time by hardware for a
                 given unit-under-test (UUT). The hardware test vector
                 generation is illustrated and described, including
                 go\slash no go testing, fault backtracking, and
                 feedback loop breaking. A UUT test file is created and
                 verified for the accuracy of test generation.",
  acknowledgement = ack-nhfb,
  classcodes =   "B1265B (Logic circuits); B7210B (Automatic test and
                 measurement systems); C5210 (Logic design methods)",
  classification = "713; 721",
  fjournal =     "Hewlett-Packard Journal: technical information from
                 the laboratories of Hewlett-Packard Company",
  journalabr =   "Hewlett Packard J",
  keywords =     "automatic test equipment; ECL logic; Gemini Universal
                 ECL Signature; GUEST; HP 3000; logic circuits, emitter
                 coupled; logic testing; printed circuits; Series 64
                 boards; signature analysis; test system; Test system;
                 tester; unit-under-test (UUT)",
  treatment =    "P Practical",
}

@InCollection{Hoogendoorn:1982:SPK,
  author =       "P. J. Hoogendoorn",
  booktitle =    "Computational methods in number theory, {Part I}",
  title =        "On a secure public-key cryptosystem",
  volume =       "154",
  publisher =    "Math. Centrum",
  address =      "Amsterdam",
  pages =        "159--168",
  year =         "1982",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85b:68014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Math. Centre Tracts",
}

@Article{Kahn:1982:GLC,
  author =       "David Kahn",
  title =        "The grand lines of cryptology's development",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "245--248",
  month =        nov,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900426",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kasami:1982:KMS,
  author =       "Tadao Kasami and Saburo Yamamura and Kenichi Mori",
  title =        "A key management scheme for end-to-end encryption and
                 a formal verification of its security",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "3",
  pages =        "59--69 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "94B99",
  MRnumber =     "84i:94045",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@Article{Koyama:1982:CUM,
  author =       "Kenji Koyama",
  title =        "A cryptosystem using the master key for multi-address
                 communication",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "5",
  pages =        "36--46 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "85f:94014",
  MRreviewer =   "James W. Snively, Jr.",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@Article{Koyama:1982:MKR,
  author =       "Kenji Koyama",
  title =        "A master key for the {RSA} public-key cryptosystem",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "1",
  pages =        "63--70 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85a:68044",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@Article{Lamport:1982:BGP,
  author =       "Leslie Lamport and Robert Shostak and Marshall Pease",
  title =        "The {Byzantine} Generals Problem",
  journal =      j-TOPLAS,
  volume =       "4",
  number =       "3",
  pages =        "382--401",
  month =        jul,
  year =         "1982",
  CODEN =        "ATPSDT",
  ISSN =         "0164-0925 (print), 1558-4593 (electronic)",
  ISSN-L =       "0164-0925",
  bibdate =      "Sat Oct 17 12:24:31 1998",
  bibsource =    "Compiler/bevan.bib; Compiler/Compiler.Lins.bib;
                 Compiler/TOPLAS.bib; Database/dbase.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jamstatassoc.bib;
                 https://www.math.utah.edu/pub/tex/bib/toplas.bib",
  note =         "They proved that Byzantine agreement cannot be reached
                 unless fewer than one-third of the processes are
                 faulty. This result assumes that authentication, i.e.,
                 the crypting of messages to make them unforgeable, is
                 not used. With unforgeable messages, they show that the
                 problem is solvable for any $ n \geq t > 0 $, where $n$
                 is the total number of processes and $t$ is the number
                 of faulty processes.",
  abstract =     "Reliable computer systems must handle malfunctioning
                 components that give conflicting information to
                 different parts of the system. This situation can be
                 expressed abstractly in terms of a group of generals of
                 the Byzantine army camped with their troops around an
                 enemy city. Communicating only by messenger, the
                 generals must agree upon a common battle plan. However,
                 one or more of them may be traitors who will try and
                 confuse the others. The problem is to find an algorithm
                 to ensure that the loyal generals will reach agreement.
                 It is shown that, using only oral messages, this
                 problem is solvable if and only if more than two-thirds
                 of the generals are loyal; so a single traitor can
                 confound two loyal generals. With unforgeable written
                 messages, the problem is solvable for any number of
                 generals and possible traitors. Applications of the
                 solutions to reliable computer systems are then
                 discussed.",
  acknowledgement = ack-nhfb # " and " # ack-pb,
  checked =      "19940302",
  fjournal =     "ACM Transactions on Programming Languages and
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J783",
  keywords =     "fault tolerance; interactive consistency; network
                 communications; network operating systems;
                 reliability",
  source =       "Dept. Library",
}

@Book{Lewin:1982:AMC,
  author =       "Ronald Lewin",
  title =        "The {American} magic: codes, ciphers, and the defeat
                 of {Japan}",
  publisher =    "Farrar Straus Giroux",
  address =      "New York, NY, USA",
  pages =        "xv + 332",
  year =         "1982",
  ISBN =         "0-374-10417-4",
  ISBN-13 =      "978-0-374-10417-7",
  LCCN =         "D810.C88 .L48",
  bibdate =      "Sat Apr 20 12:07:03 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Matsumoto:1982:DTL,
  author =       "Tsutomu Matsumoto and Tomoko Okada and Hideki Imai",
  title =        "Directly transformed link encryption",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "6",
  pages =        "36--44 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85a:68045",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@InCollection{Merkle:1982:PPK,
  author =       "Ralph C. Merkle",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Protocols for public key cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "73--104",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 721",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@Book{Merkle:1982:SAP,
  author =       "Ralph C. (Ralph Charles) Merkle",
  title =        "Secrecy, authentication, and public key systems",
  volume =       "18",
  publisher =    "UMI Research Press",
  address =      "Ann Arbor, MI, USA",
  pages =        "104",
  year =         "1982",
  ISBN =         "0-8357-1384-9",
  ISBN-13 =      "978-0-8357-1384-9",
  LCCN =         "QA76.9.A25 M47 1982",
  bibdate =      "Thu Jan 21 14:22:11 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Revision of the author's thesis ({Ph.D.}---Stanford
                 University, 1979).",
  series =       "Computer science. Systems programming",
  acknowledgement = ack-nhfb,
}

@Book{Meyer:1982:CND,
  author =       "Carl H. Meyer and Stephen M. Matyas",
  title =        "Cryptography: a new dimension in computer data
                 security: a guide for the design and implementation of
                 secure systems",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xxi + 755",
  year =         "1982",
  ISBN =         "0-471-04892-5",
  ISBN-13 =      "978-0-471-04892-3",
  LCCN =         "Z103 .M55",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$39.95",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- handbooks, manuals, etc",
}

@InProceedings{Plumstead:1982:ISG,
  author =       "Joan Boyar Plumstead",
  title =        "Inferring a sequence generated by a linear
                 congruence",
  crossref =     "IEEE:1982:ASF",
  pages =        "153--159",
  year =         "1982",
  bibdate =      "Wed Jun 22 18:26:09 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Suppose it is known that $ \{ X_0, X_1, \ldots {}, X_n
                 \} $ is produced by a pseudo-random number generator of
                 the form $ X_{i + 1} = a X_i + b \bmod m $, but $a$,
                 $b$, and $m$ are unknown. Can one efficiently predict
                 the remainder of the sequence with knowledge of only a
                 few elements from that sequence? This question is
                 answered in the affirmative and an algorithm is
                 given.",
  acknowledgement = ack-nhfb,
  keywords =     "algorithm design and analysis; computer science;
                 cryptography; data analysis; error correction;
                 inference algorithms; power generation; random number
                 generation; sections; tiles",
}

@InCollection{Randell:1982:CGC,
  author =       "Brian Randell",
  title =        "{Colossus}: Godfather of the Computer (1977)",
  crossref =     "Randell:1982:ODC",
  pages =        "349--354",
  year =         "1982",
  bibdate =      "Sun Nov 03 08:36:11 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Rhodes-Burke:1982:RSA,
  author =       "Robert Rhodes-Burke",
  title =        "Retrofitting for Signature Analysis Simplified",
  journal =      j-HEWLETT-PACKARD-J,
  volume =       "33",
  number =       "1",
  pages =        "9--16",
  month =        jan,
  year =         "1982",
  CODEN =        "HPJOAX",
  ISSN =         "0018-1153",
  bibdate =      "Tue Mar 25 14:12:15 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hpj.bib",
  abstract =     "Four versions of Microprocessor Exerciser are
                 introduced that make it possible to apply signature
                 analysis trouble-shooting techniques to
                 microprocessor-based products not originally designed
                 for signal analysis methods, by providing preprogrammed
                 external stimulus routines and monitoring circuits.
                 Model 5001A for 6800-microprocessor is illustrated and
                 its operating modes are described.",
  acknowledgement = ack-nhfb,
  classcodes =   "C5130 (Microprocessor chips); C5210 (Logic design
                 methods)",
  classification = "722; 723",
  corpsource =   "Hewlett--Packard Co., Palo Alto, CA, USA",
  fjournal =     "Hewlett-Packard Journal: technical information from
                 the laboratories of Hewlett-Packard Company",
  journalabr =   "Hewlett Packard J",
  keywords =     "5001A; computers, microprocessor; external; fault
                 location; Hewlett--Packard; logic testing;
                 microprocessor chips; microprocessor exerciser;
                 microprocessor-based systems; signature analysis;
                 stimulus routines; troubleshooting; troubleshooting
                 techniques",
  treatment =    "P Practical",
}

@InCollection{Rivest:1982:MOD,
  author =       "Ronald Rivest and Adi Shamir and Leonard M. Adleman",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "A method for obtaining digital signatures and public
                 key cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "217--239",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 726",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@PhdThesis{Schaumuller-Bichl:1982:ADE,
  author =       "Ingrid Schaumuller-Bichl",
  title =        "{Zur Analyse des Data Encryption: Standard und
                 Synthese verwandter Chiffriersysteme}",
  volume =       "40",
  school =       "Johannes Kepler-Universit{\"a}t Linz",
  address =      "Linz, Austria",
  pages =        "168",
  year =         "1982",
  ISBN =         "3-85369-521-3",
  ISBN-13 =      "978-3-85369-521-0",
  LCCN =         "QA76.9.A25S33 1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Summary in English. Published by VWGO, Wien,
                 Austria.",
  series =       "Dissertationen der Johannes Kepler-Universit{\"a}t
                 Linz",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Passwords; Data
                 encryption (Computer science)",
}

@InCollection{Shamir:1982:PTA,
  author =       "Adi Shamir",
  booktitle =    "23rd annual symposium on foundations of computer
                 science (Chicago, Ill., 1982)",
  title =        "A polynomial time algorithm for breaking the basic
                 {Merkle--Hellman} cryptosystem",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "145--152",
  year =         "1982",
  MRclass =      "68P25",
  MRnumber =     "780 392",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Book{Shumaker:1982:RCJ,
  author =       "Wayne Shumaker",
  title =        "Renaissance curiosa: {John Dee}'s conversations with
                 angels, {Girolamo Cardano}'s horoscope of {Christ},
                 {Johannes Trithemius} and cryptography, {George
                 Dalgarno}'s Universal language",
  volume =       "8",
  publisher =    "Center for Medieval and Early Renaissance Studies",
  address =      "Binghamton, NY, USA",
  pages =        "207",
  year =         "1982",
  ISBN =         "0-86698-014-8",
  ISBN-13 =      "978-0-86698-014-2",
  LCCN =         "CB361 .S494 1982",
  bibdate =      "Mon Jul 19 08:47:18 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Intended audience: Renaissance specialists,
                 linguistics, students of occultism, and historians of
                 science.",
  series =       "Medieval and Renaissance texts and studies",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
  keywords =     "Cardano, Girolamo, 1501--1576; Dalgarno, George,
                 1626?--1687 ars signorum; Dee, John, 1527--1608 true
                 and faithful relation of what passed for many;
                 renaissance --- sources; Trithemius, Johannes,
                 1462--1516 steganographia; yeers between Dr. John Dee
                 \ldots{} and some spirits",
}

@InCollection{Simmons:1982:SAE,
  author =       "Gustavus J. Simmons",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Symmetric and asymmetric encryption",
  volume =       "69",
  publisher =    pub-WESTVIEW,
  address =      pub-WESTVIEW:adr,
  pages =        "241--298",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 727",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  series =       "AAAS Sel. Sympos. Ser.",
}

@Book{Simmons:1982:SCA,
  editor =       "Gustavus J. Simmons",
  title =        "Secure communications and asymmetric cryptosystems",
  volume =       "69",
  publisher =    "Westview Press",
  address =      "Boulder, CO",
  pages =        "x + 338",
  year =         "1982",
  ISBN =         "0-86531-338-5",
  ISBN-13 =      "978-0-86531-338-5",
  MRclass =      "94-06",
  MRnumber =     "85i:94001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Selected Symposia Series",
}

@Manual{USDA:1982:SMM,
  author =       "{United States.Dept.of the Army}",
  title =        "Soldier's manual: {MOS 32G}: fixed cryptographic
                 equipment repairer, skill levels 1 and 2",
  number =       "FM 11-32G1/2",
  organization = "Dept. of the Army, Headquarters",
  address =      "Washington, DC, USA (??)",
  pages =        "various",
  month =        may,
  year =         "1982",
  LCCN =         "D 101.20:11-32 G 1/2 Govt Pubs",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "communications, military -- handbooks, manuals, etc.;
                 United States. Army -- communications systems --
                 maintenance and repair -- handbooks, manuals, etc;
                 United States. Army -- handbooks, manuals, etc",
}

@Manual{USDA:1982:TGM,
  author =       "{United States.Dept.of the Army}",
  title =        "Trainer's guide: {MOS 32G}: fixed cryptographic
                 equipment repairer",
  number =       "FM 11-32G/TG",
  organization = "Dept. of the Army, Headquarters",
  address =      "Washington, DC, USA (??)",
  pages =        "35",
  day =          "14",
  month =        may,
  year =         "1982",
  LCCN =         "D 101.20:11-32 G/TG Govt Pubs",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "communications, military -- handbooks, manuals, etc;
                 United States. Army -- communications systems --
                 maintenance and repair -- handbooks, manuals, etc;
                 United States. Army -- handbooks, manuals, etc",
}

@Manual{USGSA:1982:TGS,
  author =       "{United States.General Services Administration}",
  title =        "Telecommunications: general security requirements for
                 equipment using the {Data Encryption Standard}",
  organization = "General Services Administration",
  address =      "Washington, DC, USA",
  pages =        "12",
  day =          "14",
  month =        apr,
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Federal Standard 1027.",
  acknowledgement = ack-nhfb,
}

@Book{Warren:1982:BTC,
  author =       "Alexander Z. Warren",
  title =        "{Basic-plus} through cryptanalysis; an introduction to
                 structured programming",
  publisher =    "????",
  address =      "????",
  pages =        "100",
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Privately printed",
  acknowledgement = ack-nhfb,
  keywords =     "BASIC-PLUS (Computer program language); Phillips
                 Academy --- Faculty",
}

@Book{Welchman:1982:HSS,
  author =       "Gordon Welchman",
  title =        "The {Hut Six} story: breaking the {Enigma} codes",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "ix + 326",
  year =         "1982",
  ISBN =         "0-07-069180-0",
  ISBN-13 =      "978-0-07-069180-3",
  LCCN =         "D810.C88 W44",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Welchman, Gordon; World War, 1939--1945 ---
                 cryptography; World War, 1939--1945 --- personal
                 narratives, British; World War, 1939--1945 --- secret
                 service --- Great Britain",
}

@TechReport{Wells:1982:USE,
  author =       "David L. Wells",
  title =        "The use of subkey encryption to counter traffic
                 analysis in communications networks",
  type =         "Technical report",
  number =       "CSE 8201",
  institution =  "Department of Computer Science and Engineering,
                 Southern Methodist University",
  address =      "Dallas, TX, USA",
  pages =        "24",
  month =        feb,
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Supported by the National Science Foundation under
                 grant no. MCS 8107479.",
  keywords =     "Computer networks.",
}

@Article{Wilkes:1982:MRJ,
  author =       "Maurice V. Wilkes and I. J. Good",
  title =        "Meetings in Retrospect: {J. G. Brainerd on the ENIAC};
                 {A Report on T. H. Flowers's Lecture on Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "4",
  number =       "1",
  pages =        "53--59",
  month =        jan # "\slash " # mar,
  year =         "1982",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:19 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1982/pdf/a1053.pdf;
                 http://www.computer.org/annals/an1982/a1053abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Willett:1982:CON,
  author =       "Michael Willett",
  title =        "Cryptography old and new",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "177--186",
  month =        jun,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:07 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900104",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Willett:1982:TPK,
  author =       "Michael Willett",
  title =        "A tutorial on public key cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "72--79",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404882900281",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InCollection{Williams:1982:CHP,
  author =       "Hugh C. Williams",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Computationally ``hard'' problems as a source for
                 cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "11--39",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 719",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@Article{Wood:1982:FAC,
  author =       "Charles Cresson Wood",
  title =        "Future applications of cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "65--71",
  month =        jan,
  year =         "1982",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488290027X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Yao:1982:PSC,
  author =       "A. Yao",
  title =        "Protocols for Secure Computation",
  crossref =     "IEEE:1982:ASF",
  pages =        "160--164",
  year =         "1982",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 27]{Canetti:1997:PSL}.",
}

@InProceedings{Yao:1982:TAT,
  author =       "A. C. Yao",
  title =        "Theory and Application of Trapdoor Functions",
  crossref =     "IEEE:1982:ASF",
  pages =        "80--91",
  year =         "1982",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 28]{Goldreich:1997:FMCb}.",
}

@InProceedings{Adleman:1983:BGK,
  author =       "Leonard M. Adleman",
  title =        "On breaking generalized knapsack public key
                 cryptosystems",
  crossref =     "ACM:1983:PFA",
  pages =        "402--412",
  year =         "1983",
  bibdate =      "Thu Feb 21 06:51:34 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Adleman:1983:CCS,
  author =       "L. M. Adleman and R. L. Rivest and A. Shamir",
  title =        "Cryptographic Communications System and Method",
  howpublished = "US Patent No. 4,405,829.",
  day =          "20",
  month =        sep,
  year =         "1983",
  bibdate =      "Sat Nov 29 13:42:30 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Patent filed 14 September 1977.",
  URL =          "https://www.google.com/patents/US4405829",
  abstract =     "A cryptographic communications system and method. The
                 system includes a communications channel coupled to at
                 least one terminal having an encoding device and to at
                 least one terminal having a decoding device. A
                 message-to-be-transferred is enciphered to ciphertext
                 at the encoding terminal by first encoding the message
                 as a number $M$ in a predetermined set, and then
                 raising that number to a first predetermined power
                 (associated with the intended receiver) and finally
                 computing the remainder, or residue, $C$, when the
                 exponentiated number is divided by the product of two
                 predetermined prime numbers (associated with the
                 intended receiver). The residue $C$ is the ciphertext.
                 The ciphertext is deciphered to the original message at
                 the decoding terminal in a similar manner by raising
                 the ciphertext to a second predetermined power
                 (associated with the intended receiver), and then
                 computing the residue, $ M'$, when the exponentiated
                 ciphertext is divided by the product of the two
                 predetermined prime numbers associated with the
                 intended receiver. The residue $ M'$ corresponds to the
                 original encoded message $M$.",
  acknowledgement = ack-nhfb,
}

@Article{Akl:1983:CSP,
  author =       "Selim G. Akl and Peter D. Taylor",
  title =        "Cryptographic Solution to a Problem of Access Control
                 in a Hierarchy",
  journal =      j-TOCS,
  volume =       "1",
  number =       "3",
  pages =        "239--248",
  month =        aug,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:18:40 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@Article{Akritas:1983:CEA,
  author =       "A. G. Akritas and S. S. Iyengar and A. A. Rampuria",
  title =        "Computationally efficient algorithms for a one-time
                 pad scheme",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "12",
  number =       "4",
  pages =        "285--316",
  month =        aug,
  year =         "1983",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  MRclass =      "68P25 (94A99)",
  MRnumber =     "741 781",
  bibdate =      "Sat Apr 26 14:03:16 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "C6130 (Data handling techniques)",
  corpsource =   "Dept. of Computer Sci., Univ. of Kansas, Lawrence, KS,
                 USA",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "chi-square method; ciphers security; cryptography;
                 data processing; one-time pad scheme",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Alpern:1983:KEU,
  author =       "B. Alpern and F. B. Schneider",
  title =        "Key exchange using keyless cryptography",
  journal =      j-INFO-PROC-LETT,
  volume =       "16",
  number =       "2",
  pages =        "79--81",
  day =          "26",
  month =        feb,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); B6210L (Computer communications);
                 C5620 (Computer networks and techniques); C6130 (Data
                 handling techniques)",
  corpsource =   "Dept. of Computer Sci., Cornell Univ., Ithaca, NY,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "computer network; computer networks; cryptography;
                 keyless cryptography; protocols; secret keys",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@Book{ANSI:1983:ANS,
  author =       "{American National Standards Institute}",
  title =        "{American National Standard} for information systems:
                 data encryption algorithm: modes of operation",
  publisher =    pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "??",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ayoub:1983:DCE,
  author =       "F. Ayoub",
  title =        "The design of complete encryption networks using
                 cryptographically equivalent permutations",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "3",
  pages =        "261--267",
  month =        nov,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:22 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488390010X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bauer:1983:KDP,
  author =       "R. K. Bauer and T. A. Berson and R. J. Feiertag",
  title =        "A Key Distribution Protocol Using Event Markers",
  journal =      j-TOCS,
  volume =       "1",
  number =       "3",
  pages =        "249--255",
  month =        aug,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:57:59 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@InProceedings{Ben-Or:1983:CSS,
  author =       "Michael Ben-Or and Benny Chor and Adi Shamir",
  title =        "On the cryptographic security of single {RSA} bits",
  crossref =     "ACM:1983:PFA",
  pages =        "421--430",
  year =         "1983",
  bibdate =      "Thu Feb 21 06:51:34 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Bertrand:1983:EGE,
  author =       "Gustave Bertrand",
  title =        "{Enigma}, or, The greatest enigma of the 1939--1945
                 war",
  publisher =    "????",
  address =      "????",
  pages =        "vi + 415",
  year =         "1983",
  LCCN =         "????",
  bibdate =      "Sun Dec 01 09:15:14 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "English translation by Russell Babcock Holmes of
                 \cite{Bertrand:1973:EOP}.",
  acknowledgement = ack-nhfb,
}

@Book{Blahut:1983:TPE,
  author =       "Richard E. Blahut",
  title =        "Theory and Practice of Error Control Coding",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xi + 500",
  year =         "1983",
  ISBN =         "0-201-10102-5",
  ISBN-13 =      "978-0-201-10102-7",
  LCCN =         "QA268 .B54 1983",
  bibdate =      "Mon Nov 30 08:52:10 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blum:1983:CFT,
  author =       "Manuel Blum",
  title =        "Coin Flipping by Telephone --- a Protocol for Solving
                 Impossible Problems",
  journal =      j-SIGACT,
  volume =       "15",
  number =       "1",
  pages =        "23--27",
  month =        jan,
  year =         "1983",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1008908.1008911",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Sun Mar 11 11:37:49 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "Alice and Bob want to flip a coin by telephone. (They
                 have just divorced, live in different cities, want to
                 decide who gets the car.) Bob would not like to tell
                 Alice HEADS and hear Alice (at the other end of the
                 line) say ``Here goes \ldots{} I'm flipping the
                 coin\ldots{}. You lost!'' Coin-flipping in the SPECIAL
                 way done here has a serious purpose. Indeed, it should
                 prove an INDISPENSABLE TOOL of the protocol designer.
                 Whenever a protocol requires one of two adversaries,
                 say Alice, to pick a sequence of bits at random, and
                 whenever it serves Alice's interests best NOT to pick
                 her sequence of bits at random, then coin-flipping (Bob
                 flipping coins to Alice) as defined here achieves the
                 desired goal: (1) It GUARANTEES to Bob that Alice will
                 pick her sequence of bits at random. Her bit is 1 if
                 Bob flips heads to her, 0 otherwise. (2) It GUARANTEES
                 to Alice that Bob will not know WHAT sequence of bits
                 he flipped to her. Coin-flipping has already proved
                 useful in solving a number of problems once thought
                 impossible: mental poker, certified mail, and exchange
                 of secrets. It will certainly prove a useful tool in
                 solving other problems as well.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Blum:1983:HES,
  author =       "Manuel Blum",
  title =        "How to Exchange (Secret) Keys",
  journal =      j-TOCS,
  volume =       "1",
  number =       "2",
  pages =        "175--193",
  month =        may,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:57:59 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.security.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Previously published in ACM STOC '83 proceedings,
                 pages 440--447.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@InProceedings{Brickell:1983:EAA,
  author =       "E. F. Brickell and J. C. Lagarias and A. M. Odlyzko",
  title =        "Evaluation of the {Adleman} attack on multiply
                 iterated knapsack cryptosystems",
  crossref =     "Chaum:1983:ACP",
  pages =        "39--42",
  year =         "1983",
  bibdate =      "Thu Apr 04 10:06:34 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brickell:1983:SRK,
  author =       "Ernest F. Brickell and Gustavus J. Simmons",
  title =        "A status report on knapsack based public key
                 cryptosystems",
  journal =      j-CONG-NUM,
  volume =       "37",
  pages =        "3--72",
  year =         "1983",
  ISSN =         "0384-9864",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "85f:94013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Congressus Numerantium. A Conference Journal on
                 Numerical Themes",
}

@Article{Bromley:1983:RFM,
  author =       "Allan G. Bromley and Martin Campbell-Kelly and K. W.
                 Smillie and Eric A. Weiss and Saul Rosen and Cipher A.
                 Deavours",
  title =        "Reviews: {O. I. Franksen: Mr. Babbage, the Difference
                 Engine, and the Problem of Notation: An Account of the
                 Origin of Recursiveness and Conditionals in Computer
                 Programming}; {H. Lukoff: from Dits to Bits}; {I.
                 Asimov: Asimov's Biographical Encyclopedia of Science
                 and Technology}; {J. Futrelle: Thinking Machine}; {R.
                 M. Hord: The Illiac IV}; {C. H. Meyer and S. M. Matyas:
                 Cryptography}; {T. J. Peters and R. H. Waterman: In
                 Search of Excellence}; {J. W. Stokes: 70 Years of Radio
                 Tubes and Valves}; {G. Welchman: The Hut Six Story};
                 Capsule Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "4",
  pages =        "411--427",
  month =        oct # "\slash " # dec,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Mon Nov 04 09:22:16 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a4411.pdf;
                 http://www.computer.org/annals/an1983/a4411abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@TechReport{CBEMA:1983:ANSa,
  author =       "{Computer and Business Equipment Manufacturers
                 Association} and {American National Standards
                 Institute}",
  title =        "{American National Standard for Information Systems}:
                 Data Link Encryption",
  type =         "????",
  number =       "ANSI X3.105-1983",
  institution =  pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "20",
  day =          "16",
  month =        may,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computer interfaces --- Standards; Programming
                 languages (Electronic computers) --- Standards",
}

@TechReport{CBEMA:1983:ANSb,
  author =       "{Computer and Business Equipment Manufacturers
                 Association} and {American National Standards
                 Institute}",
  title =        "{American National Standard for Information Systems}:
                 {Data Encryption Algorithm} --- Modes of Operation",
  type =         "????",
  number =       "ANSI X3.106-1983",
  institution =  pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "16",
  day =          "16",
  month =        may,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computer interfaces --- Standards; Programming
                 languages (Electronic computers) --- Standards",
}

@Article{Cesarini:1983:ACC,
  author =       "F. Cesarini and G. Soda",
  title =        "An algorithm to construct a compact {$B$}-tree in case
                 of ordered keys",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "1",
  pages =        "13--16",
  day =          "19",
  month =        jul,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C1160 (Combinatorial mathematics); C1260
                 (Information theory)",
  corpsource =   "Istituto di Informatica e Sistemistica, Univ. of
                 Florence, Florence, Italy",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "compact B-tree; computer programming; construction
                 algorithm; cryptography; data processing --- Data
                 Structures; ordered keys; overflow movings; trees
                 (mathematics)",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Chandler:1983:IMC,
  author =       "W. W. Chandler",
  title =        "The Installation and Maintenance of {Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "3",
  pages =        "260--262",
  month =        jul # "\slash " # sep,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:20 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a3260.pdf;
                 http://www.computer.org/annals/an1983/a3260abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@InProceedings{Chaum:1983:BSU,
  author =       "D. Chaum",
  editor =       "????",
  booktitle =    "{Advances in Cryptology, Proceedings of CRYPTO 82}",
  title =        "Blind signatures for untraceable payments",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  pages =        "199--203",
  year =         "1983",
  bibdate =      "Thu Sep 22 18:48:28 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Coombs:1983:MC,
  author =       "Allen W. M. Coombs",
  title =        "The Making of {Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "3",
  pages =        "253--259",
  month =        jul # "\slash " # sep,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:20 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a3253.pdf;
                 http://www.computer.org/annals/an1983/a3253abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{DeMillo:1983:ACC,
  author =       "Richard A. DeMillo and others",
  title =        "Applied cryptology, cryptographic protocols, and
                 computer security models",
  volume =       "29",
  publisher =    pub-AMS,
  address =      pub-AMS:adr,
  pages =        "xi + 192",
  year =         "1983",
  ISBN =         "0-8218-0041-8",
  ISBN-13 =      "978-0-8218-0041-6",
  ISSN =         "0160-7634",
  LCCN =         "QA1 .A56 v.29 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Expanded version of notes prepared for the AMS short
                 course entitled Cryptology in revolution, mathematics
                 and models, held in San Francisco, CA, Jan. 5--6, 1981,
                 by Richard A. DeMillo and others.",
  series =       "Proceedings of symposia in applied mathematics. AMS
                 short course lecture notes",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control; cryptography",
}

@Article{DeMillo:1983:PDS,
  author =       "R. DeMillo and M. Merritt",
  title =        "Protocols for Data Security",
  journal =      j-COMPUTER,
  volume =       "16",
  number =       "2",
  pages =        "39--50",
  month =        feb,
  year =         "1983",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1004.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "information hiding; steganography",
}

@Article{Dolev:1983:AAB,
  author =       "D. Dolev and H. R. Strong",
  title =        "Authenticated Algorithms for {Byzantine} Agreement",
  journal =      j-SIAM-J-COMPUT,
  volume =       "12",
  number =       "4",
  pages =        "656--666",
  month =        "????",
  year =         "1983",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68M10",
  MRnumber =     "85a:68004",
  bibdate =      "Mon Nov 29 10:59:59 MST 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/12/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Ecker:1983:FSR,
  author =       "A. Ecker",
  booktitle =    "Cryptography (Burg Feuerstein, 1982)",
  title =        "Finite semigroups and the {RSA}-cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "149",
  pages =        "353--369",
  year =         "1983",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A99 (20M35)",
  MRnumber =     "84k:94019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Flowers:1983:DC,
  author =       "Thomas H. Flowers",
  title =        "The Design of {Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "3",
  pages =        "239--253",
  month =        jul # "\slash " # sep,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:20 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Foreword by Howard Campaigne.",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a3239.pdf;
                 http://www.computer.org/annals/an1983/a3239abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
  xxpages =      "239--252",
}

@MastersThesis{Gullichsen:1983:BHS,
  author =       "Eric Alexander Gullichsen",
  title =        "Bidirectional heuristic search and spectral {S}-box
                 simplification for the cryptanalysis of the {NBS Data
                 Encryption Standard}",
  volume =       "64919",
  type =         "Thesis ({M.Sc.})",
  publisher =    "National Library of Canada",
  school =       "University of British Columbia",
  address =      "Ottawa, ON, Canada",
  year =         "1983",
  ISBN =         "0-315-17010-7",
  ISBN-13 =      "978-0-315-17010-0",
  ISSN =         "0227-3845",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "3 microfiches (265 fr.)",
  series =       "Canadian theses on microfiche = Th{\`e}ses canadiennes
                 sur microfiche",
  acknowledgement = ack-nhfb,
}

@Article{Highland:1983:BRCb,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Codes, ciphers and
                 computers: an introduction to information security}}:
                 Bruce Bosworth: Rochelle Park NJ: Hayden Book Company,
                 Inc., 1982. viii + 259 pp., \$13.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "83--84",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488390041X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Hodges:1983:ATE,
  author =       "Andrew Hodges",
  title =        "{Alan Turing}: the enigma",
  publisher =    pub-SIMON-SCHUSTER,
  address =      pub-SIMON-SCHUSTER:adr,
  pages =        "587",
  year =         "1983",
  ISBN =         "0-671-49207-1, 0-09-152130-0 (Burnett Books)",
  ISBN-13 =      "978-0-671-49207-6, 978-0-09-152130-1 (Burnett Books)",
  LCCN =         "QA29.T8 H63 1983",
  bibdate =      "Thu Jan 21 14:17:53 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hunter:1983:ERA,
  author =       "D. G. N. Hunter and A. R. McKenzie",
  title =        "Experiments with Relaxation Algorithms for Breaking
                 Simple Substitution Ciphers",
  journal =      j-COMP-J,
  volume =       "26",
  number =       "1",
  pages =        "68--71",
  month =        feb,
  year =         "1983",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C7890 (Other special applications of computing)",
  classification = "723",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "algorithms; cipher breaking; computer programming;
                 cryptography; decoding; relaxation; relaxation theory;
                 substitution ciphers; word boundaries",
  treatment =    "P Practical",
}

@Article{Israel:1983:AOS,
  author =       "J. E. Israel and T. A. Linden",
  title =        "Authentication in Office System Internetworks",
  journal =      j-TOOIS,
  volume =       "1",
  number =       "3",
  pages =        "193--210",
  month =        jul,
  year =         "1983",
  CODEN =        "ATOSDO",
  ISSN =         "0734-2047",
  ISSN-L =       "0734-2047",
  bibdate =      "Sat Jan 16 16:21:56 MST 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://liinwww.ira.uka.de/bibliography/Database/Graefe.html;
                 http://www.acm.org/pubs/tois/toc.html;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80",
  abstract =     "In a distributed office system, authentication data
                 (such as password) must be managed in such a way that
                 users and machines from different organizations can
                 easily authenticate themselves to each other. The
                 authentication facility must be secure, but user
                 convenience, decentralized administration, and a
                 capability for smooth, long-term evolution are also
                 important. In addition, the authentication arrangements
                 must not permit failures at a single node to cause
                 systemwide down time. The design used in the Xerox 8000
                 Series products is described. This design anticipates
                 applications in an open-network architecture where
                 there are nodes from diverse sources and one node does
                 not trust authentication checking done by other nodes.
                 Furthermore, in some offices encryption will be
                 required to authenticate data transmissions despite
                 hostile intruders on the network. Requirements and
                 design constraints when applying encryption for
                 authentication in office systems are discussed. It is
                 suggested that protocol standards for use in office
                 systems should allow unencrypted authentication as well
                 as two options for encrypted authentication. Issues
                 that will arise as an office system evolves to deal
                 with increasingly sophisticated threats from users of
                 the system are described.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Office Information Systems",
  keywords =     "Authentication; Computer-communication networks; Data
                 encryption; Data encryption standard (DES);
                 Decentralized systems; Distributed systems; Ethernet;
                 General; Heterogeneous systems; Information systems
                 applications; Internetworks; Network architecture and
                 design; Network communications; Network protocols;
                 Office automation; Open architecture; Protocol
                 architecture; Security; Security and protection;
                 Standardization",
}

@Book{Kahn:1983:KCS,
  author =       "David Kahn",
  title =        "{Kahn} on codes: secrets of the new cryptology",
  publisher =    pub-MACMILLAN,
  address =      pub-MACMILLAN:adr,
  pages =        "viii + 343",
  year =         "1983",
  ISBN =         "0-02-560640-9",
  ISBN-13 =      "978-0-02-560640-1",
  LCCN =         "Z103 .K29 1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Article{Kak:1983:EMP,
  author =       "Subhash C. Kak",
  title =        "Exponentiation modulo a polynomial for data security",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "12",
  number =       "5",
  pages =        "337--346",
  month =        oct,
  year =         "1983",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85f:68023",
  bibdate =      "Sat Apr 26 14:03:16 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "C6130 (Data handling techniques)",
  corpsource =   "Dept. of Electrical and Computer Engng., Louisiana
                 State Univ., Baton Rouge, LA, USA",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "cryptography; data security; encryption; exponential
                 modulo; public-key cryptosystem; RSA algorithm;
                 security of data",
  treatment =    "P Practical",
}

@Book{Koscielny:1983:PRD,
  author =       "Czeslaw Koscielny",
  title =        "Programowa realizacja dzialan w cialach skonczonych do
                 zastosowan w technice kodowania korekcyjnego i
                 kryptografii",
  volume =       "61. 11",
  publisher =    "Wydawn. Politechniki Wroclawskiej",
  address =      "Wroclaw, Poland",
  pages =        "115",
  year =         "1983",
  ISBN =         "????",
  ISBN-13 =      "????",
  ISSN =         "0324-9786",
  LCCN =         "QA76.9.A251 K6 1983",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Title on p. [2] of cover: A software approach to
                 computing in finite fields with applications to
                 error-correcting coding technique and cryptography.
                 Summary in English and Russian; legends and table of
                 contents also in English. Bibliography: p. 109--110.",
  price =        "zl93.00",
  series =       "Prace naukowe Instytutu Cybernetyki Technicznej
                 Politechniki Wroclawskiej; Seria Monografie",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; error-correcting codes (information
                 theory)",
}

@Article{Koyama:1983:MKR,
  author =       "Kenji Koyama",
  title =        "A master key for the {Rabin}'s public-key
                 cryptosystem",
  journal =      "Systems-Comput.-Controls",
  volume =       "14",
  number =       "6",
  pages =        "49--57 (1984)",
  year =         "1983",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "86j:94049",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@InCollection{Lakshmivarahan:1983:APK,
  author =       "S. Lakshmivarahan",
  booktitle =    "Advances in computers, Vol. 22",
  title =        "Algorithms for public key cryptosystems: theory and
                 application",
  volume =       "22",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "45--108",
  year =         "1983",
  MRclass =      "94A60",
  MRnumber =     "86f:94027",
  MRreviewer =   "M. R{\u{a}}duic{\u{a}}",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Adv. in Comput.",
}

@Book{Levine:1983:USC,
  author =       "Jack Levine",
  title =        "{United States} cryptographic patents, 1861--1981",
  publisher =    "Cryptologia",
  address =      "Terre Haute, IN, USA",
  pages =        "69",
  year =         "1983",
  ISBN =         "0-9610560-0-2",
  ISBN-13 =      "978-0-9610560-0-1",
  LCCN =         "T223.Z1 .L48",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; patents",
}

@Article{Lomet:1983:HPU,
  author =       "David B. Lomet",
  title =        "A high performance, universal, key associative access
                 method",
  journal =      j-SIGMOD,
  volume =       "13",
  number =       "4",
  pages =        "120--133",
  month =        may,
  year =         "1983",
  CODEN =        "SRECD8",
  ISSN =         "0163-5808 (print), 1943-5835 (electronic)",
  ISSN-L =       "0163-5808",
  bibdate =      "Sat Mar 6 07:33:53 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMOD Record",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J689",
}

@InProceedings{Massey:1983:LFC,
  author =       "J. L. Massey",
  editor =       "Edward C. van der Meulen",
  booktitle =    "{Proceedings of the Fourth Symposium on Information
                 Theory in the Benelux: held at the Brembergcentrum,
                 Haasrode, Belgium, May 26--27, 1983}",
  title =        "Logarithms in finite cycle groups -- cryptographic
                 issues",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "17--25",
  year =         "1983",
  ISBN =         "90-334-0690-X",
  ISBN-13 =      "978-90-334-0690-4",
  LCCN =         "Q350 S988 1983",
  bibdate =      "Sun Mar 11 10:44:22 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@PhdThesis{Meijer:1983:CCC,
  author =       "Henk Meijer",
  title =        "Cryptology computational complexity and applications",
  volume =       "65915",
  type =         "Thesis ({Ph.D.})",
  publisher =    "National Library of Canada",
  school =       "Queen's University",
  address =      "Ottawa, ON, Canada",
  year =         "1983",
  ISBN =         "0-315-18006-4",
  ISBN-13 =      "978-0-315-18006-2",
  ISSN =         "0227-3845",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "2 microfiches (179 fr.)",
  series =       "Canadian theses on microfiche = Th{\`e}ses canadiennes
                 sur microfiche",
  acknowledgement = ack-nhfb,
}

@Article{Moler:1983:SVA,
  author =       "Cleve Moler and Donald Morrison",
  title =        "Singular Value Analysis of Cryptograms",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "90",
  number =       "2",
  pages =        "78--87",
  month =        feb,
  year =         "1983",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:37:03 MDT 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Article{Morrison:1983:SEA,
  author =       "D. R. Morrison",
  title =        "Subtractive encryptors: alternatives to the {DES}",
  journal =      j-SIGACT,
  volume =       "15",
  number =       "1",
  pages =        "67--77",
  month =        "Winter--Spring",
  year =         "1983",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1008908.1008919",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 08:21:21 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Muller-Schloer:1983:MBC,
  author =       "C. M{\"u}ller-Schloer",
  title =        "A microprocessor-based cryptoprocessor",
  journal =      j-IEEE-MICRO,
  volume =       "3",
  number =       "5",
  pages =        "5--15",
  month =        sep # "\slash " # oct,
  year =         "1983",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.1983.291160",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Mon Apr 7 14:32:46 MDT 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "B6210L (Computer communications); C5250 (Microcomputer
                 techniques); C5620 (Computer networks and techniques)",
  classification = "723",
  corpsource =   "Siemens AG, Munich, West Germany",
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
  journalabr =   "IEEE Micro",
  keywords =     "computers; computers, microprocessor --- Applications;
                 crypto processor; cryptography; cryptoprocessor; data
                 communication systems; data encryption standard; data
                 privacy; data processing; electronic envelope;
                 electronic mail; hardware; host-computer application
                 programmer; hybrid system; IEEE 796 module;
                 IEEE-796-bus-compatible 8086 single-board computer;
                 microcomputers; microprocessor-based; RSA public-key;
                 satellite computers; security communication system;
                 software interface; special purpose; system; user
                 interface",
  treatment =    "P Practical",
}

@PhdThesis{Plumstead:1983:ISP,
  author =       "Joan Boyar Plumstead",
  title =        "Inferring Sequences Produced by Pseudo-Random Number
                 Generators",
  type =         "{Ph.D.} Dissertation",
  school =       "Department of Computer Science, University of
                 California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "ii + 56",
  month =        jun,
  year =         "1983",
  bibdate =      "Wed Jun 22 18:14:45 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "To solve the problem of inferring sequences produced
                 by pseudo-random number generators of a particular
                 form, one must present an efficient inference method
                 which, from knowledge of some of the numbers in a
                 sequence, predicts the remainder of the sequence.
                 Pseudo-random number generators of the following forms
                 are considered: (1) Linear congruential method, $ X(, i
                 + 1) = a X(, i) + b \bmod m $. (2) Linear congruences
                 with $n$ terms in the recurrence, for fixed $n$, $ X(,
                 i) = a(, 1) X(, i - 1) + a(, 2) X(, i - 2) + (.)(.)(.)
                 + a(, n) X(, i - n) + a(, n + 1) \bmod m $. (3)
                 Quadratic congruences, $ X(, i + 1) = a X(, i)('2) + b
                 X(, i) + c \bmod m $. In each case, it is assumed that
                 the coefficients and the modulus are unknown. It is
                 also assumed that whenever an incorrect prediction
                 occurs, the correct value is revealed before the next
                 prediction is made. Sequences of the first type can be
                 predicted with no more than $ 2 + \log (, 2) m $
                 errors, sequences of the second type with no more than
                 $ 2 + n('2) \log (, 2) n m $ errors, and sequences of
                 the third type with no more than $ 4 + 3 \log (, 2)m $
                 errors. All of the inference methods presented are
                 efficient. This shows that pseudo-random number
                 generators in any of these forms are cryptographically
                 insecure.",
  acknowledgement = ack-nhfb,
}

@Book{Price:1983:ABR,
  author =       "W. L. Price",
  title =        "Annotated bibliography of recent publications on data
                 security and cryptography",
  volume =       "35/83",
  publisher =    "National Physical Laboratory",
  address =      "Teddington, Middlesex, UK",
  edition =      "Sixth",
  pages =        "ii + 29",
  year =         "1983",
  LCCN =         "Z103.A1 P74 1983a",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted by permission of the Controller of Her
                 Britannic Majesty's Stationery Office. ``PB84-169168.''
                 Photocopy. Springfield, VA: National Technical
                 Information Service, [1983?]. 28 cm.",
  series =       "NPL-DITC",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography; data protection ---
                 bibliography",
}

@Article{Rivest:1983:MOD,
  author =       "R. L. Rivest and A. Shamir and L. Adleman",
  title =        "A Method for Obtaining Digital Signatures and
                 Public-Key Cryptosystems",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "96--99",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Sep 22 11:37:34 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "An encryption method is presented with the novel
                 property that publicly revealing an encryption key does
                 not thereby reveal the corresponding decryption key.
                 This has two important consequences: (1) Couriers or
                 other secure means are not needed to transmit keys,
                 since a message can be enciphered using an encryption
                 key publicly revealed by the intended recipient. Only
                 he can decipher the message, since only he knows the
                 corresponding decryption key. (2) A message can be
                 ``signed'' using a privately held decryption key.
                 Anyone can verify this signature using the
                 corresponding publicly revealed encryption key.
                 Signatures cannot be forged, and a signer cannot later
                 deny the validity of his signature. This has obvious
                 applications in ``electronic mail'' and ``electronic
                 funds transfer'' systems. A message is encrypted by
                 representing it as a number $M$, raising $M$ to a
                 publicly specified power $e$, and then taking the
                 remainder when the result is divided by the publicly
                 specified product, $n$, of two large secret prime
                 numbers $p$ and $q$. Decryption is similar; only a
                 different, secret, power $d$ is used, where $ e * d = =
                 1 (\mbox {mod}(p - 1)*(q - 1)) $. The security of the
                 system rests in part on the difficulty of factoring the
                 published divisor, n.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@TechReport{Rivest:1983:RET,
  author =       "Ronald L. Rivest and Alan T. Sherman",
  title =        "Randomized encryption techniques",
  type =         "Technical report",
  number =       "MIT/LCS/TM-234",
  institution =  "Massachusetts Institute of Technology, Laboratory for
                 Computer Science",
  address =      "Cambridge, MA, USA",
  pages =        "20",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Schell:1983:SPA,
  author =       "K. J. Schell",
  title =        "Security Printers Application of Lasers",
  journal =      "Proceedings of SPIE --- The International Society for
                 Optical Engineering",
  volume =       "396",
  pages =        "131--140",
  year =         "1983",
  CODEN =        "PSISDG",
  ISBN =         "0-89252-431-6",
  ISBN-13 =      "978-0-89252-431-0",
  ISSN =         "0277-786X (print), 1996-756X (electronic)",
  LCCN =         "TA1673 .A38 1983",
  bibdate =      "Mon May 11 18:28:54 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Industrial application of lasers in the graphic
                 industry is increasing. Examples are typesetting, color
                 separation and laser dot generating, laser printing,
                 laser gravure, laser plate making, etc. Application of
                 laser technology in the area of security printers had a
                 rather slow start but is speeding up rapidly. Encoding
                 credit cards by laser and holography are examples of
                 the application of lasers in this field. We summarize
                 known industrial applications of lasers in the graphic
                 industries and report about the applications of lasers
                 in the detection of a coded watermark. A step repeat
                 holographic laser camera for the production of
                 holograms in dichromatic gelatine is described.",
  acknowledgement = ack-nhfb,
  affiliation =  "Joh. Enschede \& Sons, Security Printers, Haarlem,
                 Neth",
  affiliationaddress = "Joh. Enschede \& Sons, Security Printers,
                 Haarlem, Neth",
  classification = "722; 743; 744; 745",
  conference =   "Advances in Laser Scanning and Recording.",
  journalabr =   "Proceedings of SPIE - The International Society for
                 Optical Engineering",
  keywords =     "coded watermark reacting; graphic industry laser
                 applications; graphic methods; holographic step and
                 repeat camera; Laser Applications; laser printing;
                 reflection holography; security printers' laser
                 applications; typesetting",
  meetingaddress = "Geneva, Switz",
  sponsor =      "SPIE, Bellingham, WA, USA",
}

@Article{Schobi:1983:FAT,
  author =       "P. Sch{\"o}bi and J. L. Massey",
  booktitle =    "Cryptography (Burg Feuerstein, 1982)",
  title =        "Fast authentication in a trapdoor-knapsack public key
                 cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "149",
  pages =        "289--306",
  year =         "1983",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94B99",
  MRnumber =     "84i:94047",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shamir:1983:ECT,
  author =       "Adi Shamir",
  title =        "Embedding Cryptographic Trapdoors in Arbitrary
                 Knapsack Systems",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "2",
  pages =        "77--79",
  day =          "24",
  month =        aug,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60",
  MRnumber =     "85e:94019",
  MRreviewer =   "Tai Yang Hwang",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C1260 (Information theory); C1290Z (Other
                 applications of systems theory); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Appl. Maths., Weizmann Inst. of Sci.,
                 Rehovot, Israel",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "arbitrary knapsack systems; cryptographic trapdoors;
                 cryptography; information theory; modular
                 multiplications; operations research; public-key
                 cryptography",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@Article{Shamir:1983:GCS,
  author =       "Adi Shamir",
  title =        "On the Generation of Cryptographically Strong
                 Pseudorandom Sequences",
  journal =      j-TOCS,
  volume =       "1",
  number =       "1",
  pages =        "38--44",
  month =        feb,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:57:59 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  keywords =     "TOCS",
}

@Article{Sicherman:1983:AQR,
  author =       "George L. Sicherman and Wiebren {De Jonge} and Reind
                 P. {Van De Riet}",
  title =        "Answering Queries without Revealing Secrets",
  journal =      j-TODS,
  volume =       "8",
  number =       "1",
  pages =        "41--59",
  month =        mar,
  year =         "1983",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Sat Apr 14 10:34:48 MDT 2001",
  bibsource =    "Compendex database; Database/Graefe.bib;
                 Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tods.bib;
                 Misc/is.bib",
  note =         "Also published in/as: reprinted in deJonge thesis,
                 Jun. 1985.",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1983-8-1/p41-sicherman/p41-sicherman.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1983-8-1/p41-sicherman/",
  abstract =     "Question-answering systems must often keep certain
                 information secret. This can be accomplished, for
                 example, by sometimes refusing to answer a query. Here
                 the danger of revealing a secret by refusing to answer
                 a query is investigated. First several criteria that
                 can be used to decide whether or not to answer a query
                 are developed. First several criteria that can be used
                 to decide whether or not to answer a query are
                 developed. Then it is shown which of these criteria are
                 safe if the questioner knows nothing at all about what
                 is kept secret. Furthermore, it is proved that one of
                 these criteria is safe even if the user of the system
                 knows which information is to be kept secret.",
  acknowledgement = ack-nhfb,
  acmcrnumber =  "8404-296",
  classification = "723",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "database systems, statistical security TODS; keeping
                 secrets; refusal to answer; strategy",
  subject =      "Information Systems --- Models and Principles ---
                 Systems and Information Theory (H.1.1): {\bf Value of
                 information}; Information Systems --- Models and
                 Principles --- User/Machine Systems (H.1.2);
                 Information Systems --- Information Storage and
                 Retrieval --- Systems and Software (H.3.4): {\bf
                 Current awareness systems (selective dissemination of
                 information--SDI)**}; Information Systems ---
                 Information Storage and Retrieval --- Systems and
                 Software (H.3.4): {\bf Question-answering (fact
                 retrieval) systems**}; Computing Methodologies ---
                 Artificial Intelligence --- Deduction and Theorem
                 Proving (I.2.3): {\bf Answer/reason extraction}",
}

@MastersThesis{Sieminski:1983:SBB,
  author =       "Gregory C. Sieminski",
  title =        "The search for a balance between scientific freedom
                 and national security: a case study of cryptology",
  type =         "Thesis ({M.S.})",
  school =       "Defense Intelligence College",
  address =      "Washington, DC, USA",
  pages =        "v + 73",
  month =        nov,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Intellectual freedom; National security
                 --- United States",
}

@Article{Silverman:1983:RVS,
  author =       "Jonathan M. Silverman",
  title =        "Reflections on the verification of the security of an
                 operating system kernel",
  journal =      j-OPER-SYS-REV,
  volume =       "17",
  number =       "5",
  pages =        "143--154",
  month =        oct,
  year =         "1983",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:54 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@InProceedings{Simmons:1983:PPS,
  author =       "G. J. Simmons",
  title =        "The Prisoners' Problem and the Subliminal Channel",
  crossref =     "Chaum:1983:ACP",
  pages =        "51--67",
  year =         "1983",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1001.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Article{Smith:1983:HCR,
  author =       "J. W. Smith and S. S. {Wagstaff, Jr.}",
  booktitle =    "Proceedings of the fourteenth Southeastern conference
                 on combinatorics, graph theory and computing (Boca
                 Raton, Fla., 1983)",
  title =        "How to crack an {RSA} cryptosystem",
  journal =      j-CONG-NUM,
  volume =       "40",
  pages =        "367--373",
  year =         "1983",
  ISSN =         "0384-9864",
  MRclass =      "94A60",
  MRnumber =     "86d:94020",
  MRreviewer =   "S. Guia{\c{s}}u",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Congressus Numerantium. A Conference Journal on
                 Numerical Themes",
}

@Article{Smith:1983:PKC,
  author =       "John Smith",
  title =        "Public Key Cryptography: An Introduction to a Powerful
                 Cryptographic System for Use on Microcomputers",
  journal =      j-BYTE,
  volume =       "7",
  number =       "??",
  pages =        "198--218",
  month =        Jan,
  year =         "1983",
  CODEN =        "BYTEDJ",
  ISSN =         "0360-5280",
  ISSN-L =       "0360-5280",
  bibsource =    "/usr/local/src/bib/bibliography/Misc/security.1.bib;
                 /usr/local/src/bib/bibliography/Theory/ProbAlgs.bib;
                 https://www.math.utah.edu/pub/tex/bib/byte1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This is a simple exposition of public key
                 cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "BYTE Magazine",
  keywords =     "algorithms; computer security; cryptography; RSA",
  ort =          "Ordner Sicherheit",
}

@TechReport{USGSA:1983:ISR,
  author =       "{United States.General Services Administration} and
                 {National Communications System (U.S.). Office of
                 Technology and Standards} and {National Institute of
                 Standards and Technology (U. S.)}",
  title =        "Interoperability and security requirements for use of
                 the {Data Encryption Standard} in the physical layer of
                 data communications",
  institution =  "General Services Administration, Office of Information
                 Resources Management",
  address =      "Washington, DC, USA",
  pages =        "4",
  day =          "3",
  month =        aug,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Federal standard 1026. Federal information processing
                 standards publication, FIPS PUB 139",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Standards.",
}

@Periodical{USNBS:1983:FPD,
  author =       "{United States.National Bureau of Standards}",
  title =        "{FIPS} Pub 46: {Data Encryption Standard}. {FIPS}
                 publication change notice",
  publisher =    "U.S. Department of Commerce, National Bureau of
                 Standards",
  address =      "Washinton, DC, USA",
  pages =        "various",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Electronic data processing departments --- Security
                 measures; Standards",
}

@Book{USWD:1983:EC,
  author =       "{United States.War Dept} and {United
                 States.Adjutant-General's Office}",
  title =        "Elements of cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "165",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "United States. War Dept. Training pamphlet no. 3. War
                 Dept document no. 117",
  acknowledgement = ack-nhfb,
  annote =       "Master microform held by: UnM. OP 66639. Microfilm.
                 Ann Arbor, Mich.: University Microfilms International,
                 19--. 1 reel; 35 mm.",
  keywords =     "Ciphers; Cryptography.",
}

@Article{Voydock:1983:SMH,
  author =       "Victor L. Voydock and Stephen T. Kent",
  title =        "Security Mechanisms in High-Level Network Protocols",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "2",
  pages =        "135--171",
  month =        jun,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/356909.356913",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:27 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "The implications of adding security mechanisms to
                 high-level network protocols operating in an
                 open-system environment are analyzed. First the threats
                 to security that may arise in such an environment are
                 described, and then a set of goals for communications
                 security measures is established. This is followed by a
                 brief description of the two basic approaches to
                 communications security, link-oriented measures and
                 end-to-end measures, which concludes that end-to-end
                 measures are more appropriate in an open-system
                 environment. Next, relevant properties of data
                 encryption --- the fundamental technique on which all
                 communications security mechanisms are based --- are
                 discussed. The remainder of the paper describes how
                 end-to-end measures can be used to achieve each of the
                 security goals previously established.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "security os networks, computer networks",
}

@InProceedings{Wagner:1983:F,
  author =       "Neal R. Wagner",
  title =        "Fingerprinting",
  crossref =     "IEEE:1983:PSS",
  pages =        "18--22",
  year =         "1983",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1030.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Article{Weingarten:1983:CCP,
  author =       "F. Weingarten",
  title =        "Controlling cryptographic publication",
  journal =      j-COMPUT-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "41--48",
  month =        jan,
  year =         "1983",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404883900330",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Willett:1983:TKS,
  author =       "Michael Willett",
  title =        "Trapdoor Knapsacks without Superincreasing Structure",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "1",
  pages =        "7--11",
  day =          "19",
  month =        jul,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "85e:94020",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C0230 (Economic, social and political aspects
                 of computing); C1260 (Information theory); C1290
                 (Applications of systems theory)",
  corpsource =   "Dept. of Math., Univ. of North Carolina, Greensboro,
                 NC, USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "computer programming; cryptography; information
                 theory; knapsacks; Merkle--Hellman public-key schemes;
                 operations research; polynomial-time algorithm;
                 superincreasing structure; trapdoor",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Williams:1983:PAP,
  author =       "M. H. Williams",
  title =        "The problem of absolute privacy",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "3",
  pages =        "169--171",
  day =          "5",
  month =        oct,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C6150J (Operating systems)",
  corpsource =   "Computer Sci. Dept., Heriot-Watt Univ., Edinburgh,
                 UK",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "computer operating systems; data privacy; data
                 processing --- Security of Data; data security; file
                 protection; operating systems (computers); security of
                 data",
  treatment =    "G General Review; P Practical",
}

@InProceedings{Winternitz:1983:POW,
  author =       "Robert S. Winternitz",
  title =        "Producing a One-Way Hash Function from {DES}",
  crossref =     "Chaum:1983:ACP",
  pages =        "203--207",
  year =         "1983",
  bibdate =      "Thu Oct 31 18:48:13 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
}

@Book{Wolfe:1983:FCC,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis [!]",
  publisher =    "Brooklyn College Press",
  address =      "Brooklyn",
  pages =        "various",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy. Mimeographed on
                 rectos only. Bound in printed paper wrappers. Library
                 of the American Cryptogram Association (George C. Lamb
                 Collection) Master microform held by: UnM. Microfilm.
                 Ann Arbor, Mich., University Microfilms International,
                 19--. reels. 35 mm.",
  keywords =     "Ciphers; Cryptography",
}

@Book{Yardley:1983:CBC,
  author =       "Herbert O. Yardley",
  title =        "The {Chinese Black Chamber}: an adventure in
                 espionage",
  publisher =    pub-HOUGHTON-MIFFLIN,
  address =      pub-HOUGHTON-MIFFLIN:adr,
  pages =        "xxiv + 225",
  year =         "1983",
  ISBN =         "0-395-34648-7",
  ISBN-13 =      "978-0-395-34648-8",
  LCCN =         "DS777.533.S65 Y37 1983",
  bibdate =      "Tue Dec 01 10:58:49 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Chinese title: Chung-kuo hei shih.",
  price =        "US\$13.95",
  acknowledgement = ack-nhfb,
}

@InProceedings{Alexi:1984:RRB,
  author =       "W. Alexi and B. Chor and O. Goldreich and C. P.
                 Schnorr",
  title =        "{RSA\slash Rabin} Bits are {$ 1 / 2 + 1 \mbox {Poly}
                 (\log N) $} Secure",
  crossref =     "IEEE:1984:ASF",
  pages =        "449--457",
  year =         "1984",
  bibdate =      "Thu Apr 5 06:13:39 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1984:BRP,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{The puzzle palace: a report
                 on NSA, America's most secret agency}}: James Bamford:
                 Boston: Houghton Mifflin Company, 1982, 465 pages.
                 \$16.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "57--57",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900300",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Anonymous:1984:ESC,
  author =       "Anonymous",
  title =        "{EDP} security: communications, database, end user,
                 encryption: advanced security concepts",
  number =       "3",
  publisher =    "FTP",
  address =      "Port Jefferson Station, NY, USA",
  pages =        "various",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "FTP technical library EDP security",
  acknowledgement = ack-nhfb,
}

@Article{Apostolico:1984:PMM,
  author =       "A. Apostolico and R. Giancarlo",
  title =        "Pattern matching machine implementation of a fast test
                 for unique decipherability",
  journal =      j-INFO-PROC-LETT,
  volume =       "18",
  number =       "3",
  pages =        "155--158",
  day =          "30",
  month =        mar,
  year =         "1984",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6140C (Optical information, image and video signal
                 processing); C1160 (Combinatorial mathematics); C1250
                 (Pattern recognition); C1260 (Information theory)",
  corpsource =   "ISI, Univ. of Salerno, Salerno, Italy",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "codes; fast implementation; graph theory; pattern
                 matching machine; pattern recognition; Sardinas-
                 Patterson-Even test; unique decipherability",
  treatment =    "N New Development; T Theoretical or Mathematical",
}

@Book{Barker:1984:CSG,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of shift-register generated stream
                 cipher systems",
  volume =       "39",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "ix + 247",
  year =         "1984",
  ISBN =         "0-89412-062-X",
  ISBN-13 =      "978-0-89412-062-6",
  LCCN =         "Z 104 B37 1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Spine title: Cryptanalysis --- stream cipher
                 systems.",
  keywords =     "Ciphers; Cryptography",
}

@Article{Blum:1984:HGC,
  author =       "Manuel Blum and Silvio Micali",
  title =        "How to Generate Cryptographically Strong Sequences of
                 Pseudo-Random Bits",
  journal =      j-SIAM-J-COMPUT,
  volume =       "13",
  number =       "4",
  pages =        "850--864",
  month =        "????",
  year =         "1984",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68P25 (65C10 68Q20)",
  MRnumber =     "86a:68021",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  referencedin = "Referenced in \cite[Ref. 7]{Goldreich:1997:FMCb}.",
}

@InProceedings{Blum:1984:IUC,
  author =       "Manuel Blum",
  title =        "Independent Unbiased Coin Flips from a Correlated
                 Biased Source: a Finite State {Markov} Chain",
  crossref =     "IEEE:1984:ASF",
  pages =        "425--433",
  year =         "1984",
  bibdate =      "Thu Feb 02 17:24:58 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Boyer:1984:PCR,
  author =       "Robert S. Boyer and J. Strother Moore",
  title =        "Proof checking the {RSA} public key encryption
                 algorithm",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "91",
  number =       "3",
  pages =        "181--189",
  year =         "1984",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  MRclass =      "68P25 (68T15 94A60)",
  MRnumber =     "85k:68024",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/amermathmonthly1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  fjournal =     "The American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@InCollection{Brickell:1984:EAA,
  author =       "E. F. Brickell and J. C. Lagarias and A. M. Odlyzko",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Evaluation of the {Adleman} attack on multiply
                 iterated knapsack cryptosystems (abstract)",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "39--42",
  year =         "1984",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "799 719",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Burton:1984:RPKa,
  author =       "Charles E. Burton",
  title =        "{RSA}: a Public Key Cryptography System Part {I}",
  journal =      j-DDJ,
  volume =       "9",
  number =       "3",
  pages =        "16--??",
  month =        mar,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 http://www.ddj.com/index/author/index.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib;
                 https://www.math.utah.edu/pub/tex/bib/fortran2.bib",
  acknowledgement = ack-nhfb,
  classification = "723; 921",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "computer programming --- Algorithms; computer
                 programming languages --- Fortran; computer programs;
                 computers, microprocessor --- Applications;
                 cryptography; modulo arithmetic; multi precision
                 arithmetic; public key system (PKS); Rational Fortran
                 (RATFOR)",
  pagecount =    "22p between p 16 and 43",
}

@Article{Burton:1984:RPKb,
  author =       "Charles E. Burton",
  title =        "{RSA}: a Public Key Cryptography System Part {II}",
  journal =      j-DDJ,
  volume =       "9",
  number =       "4",
  pages =        "32--??",
  month =        apr,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 http://www.ddj.com/index/author/index.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "computer programs; data processing; public key
                 cryptography",
  pagecount =    "20p between p 32 and 59",
}

@Article{Coppersmith:1984:FEL,
  author =       "D. Coppersmith",
  title =        "Fast evaluations of logarithms in fields of
                 characteristic two",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-30",
  number =       "4",
  pages =        "587--594",
  month =        "????",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1984.1056941",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Sun Mar 11 10:29:59 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Denning:1984:DSR,
  author =       "Dorothy E. Denning",
  title =        "Digital Signatures with {RSA} and Other Public-Key
                 Cryptosystems",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "388--392",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68P25",
  MRnumber =     "784 134",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InCollection{Denning:1984:FEA,
  author =       "Dorothy E. Denning",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Field encryption and authentication",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  pages =        "231--247",
  year =         "1984",
  MRclass =      "94A60",
  MRnumber =     "86j:94044",
  MRreviewer =   "Evangelos Kranakis",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
}

@Article{Fisher:1984:CCS,
  author =       "Warren W. Fisher",
  title =        "Cryptography for computer security: Making the
                 decision",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "229--233",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900440",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Book{Franksen:1984:MBS,
  author =       "Ole Immanuel Franksen",
  title =        "{Mr. Babbage}'s secret: the tale of a cypher and
                 {APL}",
  publisher =    "Strandberg",
  address =      "Birkerod, Denmark",
  pages =        "319",
  year =         "1984",
  ISBN =         "87-87200-86-4",
  ISBN-13 =      "978-87-87200-86-8",
  LCCN =         "Z103.B2 F72 1984",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "APL (computer program language); Babbage, Charles,
                 1791--1871; ciphers --- history; cryptographers ---
                 Great Britain --- biography; cryptography --- history",
}

@Article{Frederickson:1984:PRT,
  author =       "P. Frederickson and R. Hiromoto and T. L. Jordan and
                 B. Smith and T. Warnock",
  title =        "Pseudo-random trees in {Monte Carlo}",
  journal =      j-PARALLEL-COMPUTING,
  volume =       "1",
  number =       "2",
  pages =        "175--180",
  month =        dec,
  year =         "1984",
  CODEN =        "PACOEJ",
  ISSN =         "0167-8191 (print), 1872-7336 (electronic)",
  ISSN-L =       "0167-8191",
  bibdate =      "Mon Apr 14 11:08:33 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/parallelcomputing.bib",
  acknowledgement = ack-nhfb,
  classification = "C1140G (Monte Carlo methods); C7300 (Natural
                 sciences computing); C7400 (Engineering computing)",
  corpsource =   "Los Alamos Nat. Lab., Los Alamos, NM, USA",
  fjournal =     "Parallel Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01678191/",
  keywords =     "digital simulation; Lehmer pseudorandom number
                 generator; MIMD architecture; Monte Carlo methods;
                 Monte Carlo simulations; parallel; parallel computers;
                 processing; pseudorandom trees; random number
                 generation; reproducibility; SIMD architecture;
                 supercomputer; trees (mathematics)",
  treatment =    "P Practical",
}

@Article{Goldwasser:1984:PE,
  author =       "Shafi Goldwasser and Silvio Micali",
  title =        "Probabilistic Encryption",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "28",
  number =       "2",
  pages =        "270--299",
  year =         "1984",
  CODEN =        "JCSSBM",
  ISSN =         "0022-0000",
  ISSN-L =       "0022-0000",
  MRclass =      "94A60 (11T71 68P25 68Q25)",
  MRnumber =     "86j:94047",
  MRreviewer =   "J. C. Lagarias",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  note =         "See also preliminary version in 14th STOC, 1982.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
  referencedin = "Referenced in \cite[Ref. 18]{Goldreich:1997:FMCb}.",
}

@PhdThesis{Goldwasser:1984:PET,
  author =       "Shafrira Goldwasser",
  title =        "Probabilistic encryption: theory and applications",
  type =         "Thesis ({Ph. D. in Computer Science})",
  school =       "Department of Computer Science, University of
                 California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "iv + 63",
  month =        dec,
  year =         "1984",
  LCCN =         "T7.6 .G628",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Photocopy. Ann Arbor, Mich.: University Microfilms
                 International, 1986. 22 cm.",
  keywords =     "Computers --- Access control; Cryptography;
                 dissertations; dissertations, academic --- UCB ---
                 computer science --- 1981--1990; University of
                 California, Berkeley. Computer Science Division",
}

@InProceedings{Grollmann:1984:CMP,
  author =       "J. Grollmann and A. L. Selman",
  title =        "Complexity Measures for Public-Key Cryptosystems",
  crossref =     "IEEE:1984:ASF",
  pages =        "495--503",
  year =         "1984",
  bibdate =      "Thu Apr 5 06:13:39 MDT 2001",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Grundler:1984:DEH,
  author =       "Edward James Grundler",
  title =        "A data encryption hardware software package",
  type =         "Project ({M.S.})",
  school =       "California State University, Sacramento",
  address =      "Sacramento, CA, USA",
  pages =        "vii + 81",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Electronic data processing departments --- Security
                 measures.",
}

@Article{Haddon:1984:BRS,
  author =       "Bruce K. Haddon",
  title =        "Book review of ``{Security, IFIP\slash Sec'83:
                 proceedings of the first security conference''
                 North-Holland Publishing Co. 1983}",
  journal =      j-OPER-SYS-REV,
  volume =       "18",
  number =       "3",
  pages =        "14--14",
  month =        jul,
  year =         "1984",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:45 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Feak:1983:SIS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Haskett:1984:PAU,
  author =       "James A. Haskett",
  title =        "Pass-Algorithms: a User Validation Scheme Based on
                 Knowledge of Secret Algorithms",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "777--781",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 06:48:51 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Haskett84;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "cryptography",
  oldlabel =     "Haskett84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Haskett84",
}

@TechReport{IRD:1984:DTV,
  author =       "{International Resource Development, Inc.}",
  title =        "Data, text, and voice encryption equipment",
  type =         "Report",
  number =       "630",
  institution =  "International Resource Development",
  address =      "6 Prowitt St., Norwalk, CT 06855, USA",
  pages =        "vi + 184",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography equipment industry --- United States;
                 Market surveys --- United States.",
}

@InCollection{Jurgensen:1984:SRI,
  author =       "H. J{\"u}rgensen and D. E. Matthews",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Some results on the information theoretic analysis of
                 cryptosystems",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "303--356",
  year =         "1984",
  MRclass =      "94A60 (68Q25 94A17)",
  MRnumber =     "87b:94038",
  MRreviewer =   "James W. Snively, Jr.",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Kahn:1984:COS,
  author =       "D. Kahn",
  title =        "Cryptology and the origins of spread spectrum",
  journal =      j-IEEE-SPECTRUM,
  volume =       "21",
  number =       "9",
  pages =        "70--80",
  month =        sep,
  year =         "1984",
  CODEN =        "IEESAM",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1009.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  keywords =     "information hiding; steganography",
}

@Article{Kak:1984:MPK,
  author =       "S. C. Kak",
  title =        "On the method of puzzles for key distribution",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "13",
  number =       "2",
  pages =        "103--109",
  month =        apr,
  year =         "1984",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  bibdate =      "Sat Apr 26 12:20:22 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C6130 (Data handling techniques)",
  corpsource =   "Dept. of Electr. and Comput. Eng., Louisiana State
                 Univ., Baton Rouge, LA, USA",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "codes; cryptography; key distribution; nested puzzles
                 method; public channel; puzzles; work advantage",
  treatment =    "P Practical",
}

@MastersThesis{Kaliski:1984:AWA,
  author =       "Burton Stephen {Kaliski, Jr.}",
  title =        "Analysis of {Wyner}'s analog encryption scheme",
  type =         "Thesis ({B.S.})",
  school =       "Department of Electrical Engineering and Computer
                 Science, Massachusetts Institute of Technology",
  address =      "Cambridge, MA, USA",
  pages =        "97",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Supervised by Ronald L. Rivest.",
  acknowledgement = ack-nhfb,
}

@Article{Kothari:1984:CMW,
  author =       "S. Kothari and S. Lakshmivarahan",
  title =        "On the concealability of messages by the {Williams}
                 public-key encryption scheme",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "10",
  number =       "1",
  pages =        "15--24",
  year =         "1984",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94A60",
  MRnumber =     "85e:94017",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
}

@Book{Kozaczuk:1984:EHGa,
  author =       "W{\l}adys{\l}aw Kozaczuk",
  title =        "{Enigma}: how the {German} machine cipher was broken,
                 and how it was read by the {Allies} in {World War
                 Two}",
  publisher =    "Arms and Armour",
  address =      "London, UK",
  pages =        "xiv + 348",
  year =         "1984",
  ISBN =         "0-85368-640-8",
  ISBN-13 =      "978-0-85368-640-8",
  LCCN =         "D810.C88 K6813 1984b",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: W kregu Enigmy.",
  acknowledgement = ack-nhfb,
  keywords =     "World War, 1939--1945 --- cryptography",
}

@Book{Kozaczuk:1984:EHGb,
  author =       "W{\l}adys{\l}aw Kozaczuk",
  title =        "{Enigma}: How the {German} Machine Cipher Was Broken,
                 and How It Was Read by the {Allies} in {World War
                 Two}",
  publisher =    "University Publications of America",
  address =      "Frederick, MD, USA",
  pages =        "xiv + 348",
  year =         "1984",
  ISBN =         "0-89093-547-5",
  ISBN-13 =      "978-0-89093-547-7",
  LCCN =         "D810.C88 K6813 1984",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Edited and translated by Christopher Kasparek, from
                 the original Polish edition, {\em W kr{\c{e}}gu
                 Enigma}, Ksi{\c{a}}{\d{z}}ka i Wiedza, Warsaw, 1979.",
  price =        "US\$24.00",
  series =       "Foreign intelligence book series",
  acknowledgement = ack-nhfb,
  keywords =     "machine ciphers; World War, 1939--1945 ---
                 cryptography",
}

@Article{Krause:1984:DEI,
  author =       "Lothar Krause",
  title =        "Data encryption in {ISO}, the International
                 Organization for Standardization",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "3",
  pages =        "234--236",
  month =        aug,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900452",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InCollection{Lagarias:1984:KPK,
  author =       "J. C. Lagarias",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Knapsack public key cryptosystems and {Diophantine}
                 approximation (extended abstract)",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "3--23",
  year =         "1984",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "86j:94050",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Lagarias:1984:PAS,
  author =       "J. C. Lagarias",
  booktitle =    "Automata, languages and programming (Antwerp, 1984)",
  title =        "Performance analysis of {Shamir}'s attack on the basic
                 {Merkle--Hellman} knapsack cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "172",
  pages =        "312--323",
  year =         "1984",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "68P25",
  MRnumber =     "784 259",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Landwehr:1984:SMM,
  author =       "Carl E. Landwehr and Constance L. Heitmeyer and John
                 McLean",
  title =        "A Security Model for Military Message System",
  journal =      j-TOCS,
  volume =       "2",
  number =       "3",
  pages =        "198--222",
  month =        aug,
  year =         "1984",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold/1984.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/bibsec.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@InCollection{Lidl:1984:PPR,
  author =       "Rudolf Lidl and Winfried B. M{\"u}ller",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Permutation polynomials in {RSA}-cryptosystems",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "293--301",
  year =         "1984",
  MRclass =      "94A60 (11T06)",
  MRnumber =     "86i:94040",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Mullin:1984:NMP,
  author =       "Albert A. Mullin",
  title =        "A note on the mathematics of public-key
                 cryptosystems",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "45--47",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900269",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@TechReport{NCSOTS:1984:ISR,
  author =       "{National Communications System (U.S.). Office of
                 Technology and Standards}",
  title =        "Interoperability and security requirements for use of
                 the {Data Encryption Standard} in the physical layer of
                 data communications",
  type =         "Federal standard",
  number =       "1026",
  institution =  "General Services Administration, Office of Information
                 Resources Management",
  address =      "Washington, DC, USA",
  pages =        "various",
  day =          "3",
  month =        aug,
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  govtdocnumber = "GS 2.8/3:1026 563",
  keywords =     "Cryptography --- Standards --- United States;
                 Government information --- Standards --- United
                 States",
}

@InProceedings{Nobauer:1984:CRS,
  author =       "Rupert N{\"o}bauer",
  title =        "Cryptanalysis of the {R{\'e}dei}-scheme",
  crossref =     "Eigenthaler:1984:CGA",
  pages =        "255--264",
  year =         "1984",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "87b:94040",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Odlyzko:1984:CAM,
  author =       "Andrew M. Odlyzko",
  title =        "Cryptanalytic attacks on the multiplicative knapsack
                 cryptosystem and on {Shamir}'s fast signature scheme",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-30",
  number =       "4",
  pages =        "594--601",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1984.1056942",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "86i:94041",
  MRreviewer =   "Tai Yang Hwang",
  bibdate =      "Mon Jul 19 07:08:40 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.research.att.com/~amo/doc/arch/knapsack.attacks.pdf;
                 http://www.research.att.com/~amo/doc/arch/knapsack.attacks.ps;
                 http://www.research.att.com/~amo/doc/arch/knapsack.attacks.troff",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  xxtitle =      "Cryptanalytic attacks on the multiplicative knapsack
                 cryptosystem and on {Shamir's} signature scheme",
}

@Article{Oldehoeft:1984:SSU,
  author =       "Arthur E. Oldehoeft and Robert McDonald",
  title =        "A software scheme for user-controlled file
                 encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "35--41",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900245",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ozarow:1984:WTC,
  author =       "Lawrence H. Ozarow and Aaron D. Wyner",
  title =        "Wire-tap channel {II}",
  journal =      j-ATT-BELL-LAB-TECH-J,
  volume =       "63",
  number =       "10 part 1",
  pages =        "2135--2157",
  year =         "1984",
  CODEN =        "ABLJER",
  ISSN =         "0748-612X (print), 2376-7162 (electronic)",
  ISSN-L =       "0748-612X",
  bibdate =      "Fri Nov 12 09:17:39 2010",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "In this paper we study a communication system in which
                 an unauthorized intruder is able to intercept a subset
                 of the transmitted symbols, and it is desired to
                 maximize the intruder's uncertainty about the data
                 without the use of an encryption key (either public or
                 private).",
  acknowledgement = ack-nhfb,
  fjournal =     "AT\&T Bell Laboratories Technical Journal",
  keywords =     "computers --- data communication systems",
  subject =      "conditional entropy; intruder's uncertainty;
                 unauthorized intruder; wire-tap channel",
  topic =        "data processing",
}

@Article{Porter:1984:CNS,
  author =       "Sig Porter",
  title =        "Cryptology and number sequences: Pseudorandom, random,
                 and perfectly random",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "1",
  pages =        "43--44",
  month =        feb,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404884900257",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rao:1984:JEE,
  author =       "T. R. N. Rao",
  title =        "Joint encryption and error correction schemes",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "12",
  number =       "3",
  pages =        "240--241",
  month =        jun,
  year =         "1984",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:54 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Reeds:1984:FSU,
  author =       "James A. Reeds and Peter J. Weinberger",
  title =        "File Security and the {UNIX} System {\tt crypt}
                 Command",
  journal =      j-ATT-BELL-LAB-TECH-J,
  volume =       "63",
  number =       "8 part 2",
  pages =        "1673--1683",
  month =        oct,
  year =         "1984",
  CODEN =        "ABLJER",
  ISSN =         "0748-612X (print), 2376-7162 (electronic)",
  ISSN-L =       "0748-612X",
  bibdate =      "Fri Nov 12 09:17:39 2010",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in \cite[pp.~93--103]{ATT:1986:AUS}.",
  abstract =     "Sufficiently large files encrypted with the UNIX
                 system {\tt crypt} command can be deciphered in a few
                 hours by algebraic techniques and human interaction. We
                 outline such a decryption method and show it to be
                 applicable to a proposed strengthened algorithm as
                 well. We also discuss the role of encryption in file
                 security.",
  acknowledgement = ack-nhfb,
  fjournal =     "AT\&T Bell Laboratories Technical Journal",
  keywords =     "computer systems, digital",
  subject =      "crypt command; encryption; file security; UNIX
                 system",
  topic =        "data processing",
}

@Article{Rivest:1984:HEE,
  author =       "Ronald L. Rivest and Adi Shamir",
  title =        "How to Expose an Eavesdropper",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "393--395",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 27 13:18:33 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Routh:1984:PAA,
  author =       "Richard LeRoy Routh",
  title =        "A proposal for an architectural approach which
                 apparently solves all known software-based internal
                 computer security problems",
  journal =      j-OPER-SYS-REV,
  volume =       "18",
  number =       "3",
  pages =        "31--39",
  month =        jul,
  year =         "1984",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:45 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Saltzer:1984:EEA,
  author =       "J. H. Saltzer and D. P. Reed and D. D. Clark",
  key =          "Saltzer et al.",
  title =        "End-to-End Arguments in System Design",
  journal =      j-TOCS,
  volume =       "2",
  number =       "4",
  pages =        "277--288",
  month =        nov,
  year =         "1984",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Wed Mar 6 11:12:06 1985",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/digital.library.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Os/os.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/SE/dependability.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "This paper presents a design principle that helps
                 guide placement of functions among the modules of a
                 distributed computer system. The principle, called the
                 end-to-end argument, suggests that functions placed at
                 low levels of a system may be redundant or of little
                 value when compared with the cost of providing them at
                 that low level. Examples discussed in the paper include
                 bit-error recovery, security using encryption,
                 duplicate message suppression, recovery from system
                 crashes, and delivery acknowledgement. Low-level
                 mechanisms to support these functions are justified
                 only as performed enhancements.",
  acknowledgement = ack-nhfb,
  comments =     "Argues that you should put functionality at the higher
                 app layers, rather than at low layers. Includes a
                 security example",
  entered-by =   "Andreas Paepcke",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  keywords =     "data communication; design; design principles;
                 protocol design; TOCS",
}

@Book{Schroeder:1984:NTS,
  author =       "M. R. (Manfred Robert) Schroeder",
  title =        "Number theory in science and communication: with
                 applications in cryptography, physics, biology, digital
                 information, and computing",
  volume =       "7",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 324",
  year =         "1984",
  ISBN =         "0-387-12164-1",
  ISBN-13 =      "978-0-387-12164-2",
  LCCN =         "QA241 .S318 1984",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Springer series in information sciences",
  acknowledgement = ack-nhfb,
  keywords =     "number theory",
}

@Article{Shamir:1984:CCV,
  author =       "A. Shamir and C. P. Schnorr",
  title =        "Cryptanalysis of Certain Variants of {Rabin}'s
                 Signature Scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "19",
  number =       "3",
  pages =        "113--115",
  day =          "19",
  month =        oct,
  year =         "1984",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "86e:68029",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C6130 (Data handling techniques)",
  corpsource =   "Dept. of Appl. Math., Weizmann Inst. of Sci., Rehovot,
                 Israel",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "cleartext attacks; cryptanalysis; cryptography;
                 digital signatures; natural perturbation techniques;
                 protect; Rabin's signature scheme",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Shamir:1984:PTA,
  author =       "Adi Shamir",
  title =        "A polynomial-time algorithm for breaking the basic
                 {Merkle--Hellman} cryptosystem",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "30",
  number =       "5",
  pages =        "699--704",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1984.1056964",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60",
  MRnumber =     "86m:94032",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Siegenthaler:1984:CIN,
  author =       "T. Siegenthaler",
  title =        "Correlation-Immunity of Nonlinear Combining Functions
                 for Cryptographic Applications",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-30",
  number =       "5",
  pages =        "776--780",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1984.1056949",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Mon Nov 30 09:02:43 1998",
  bibsource =    "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Simmons:1984:HID,
  author =       "G. J. Simmons",
  title =        "How to Insure that Data Acquired to Verify Treaty
                 Compliance are Trustworthy",
  journal =      j-PROC-IEEE,
  volume =       "76",
  number =       "5",
  pages =        "621--627",
  month =        may,
  year =         "1984",
  CODEN =        "IEEPAD",
  ISSN =         "0018-9219",
  ISSN-L =       "0018-9219",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1003.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the IEEE",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5",
  keywords =     "information hiding; steganography",
}

@Article{Sorkin:1984:MCC,
  author =       "Arthur Sorkin and C. James Buchanan",
  title =        "Measurement of cryptographic capability protection
                 algorithms",
  journal =      j-COMPUT-SECUR,
  volume =       "3",
  number =       "2",
  pages =        "101--116",
  month =        may,
  year =         "1984",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740488490052X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Misc{StJohns:1984:RAS,
  author =       "M. {St. Johns}",
  title =        "{RFC 912}: Authentication service",
  day =          "1",
  month =        sep,
  year =         "1984",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}. Status:
                 UNKNOWN.",
  URL =          "ftp://ftp.internic.net/rfc/rfc912.txt;
                 ftp://ftp.internic.net/rfc/rfc931.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc912.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  format =       "TXT=4544 bytes",
  obsoletedby =  "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}.",
  online =       "yes",
  status =       "UNKNOWN",
}

@Article{Summers:1984:OCS,
  author =       "R. C. Summers",
  title =        "An Overview of Computer Security",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "309--325",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Presented is an overview of computer security,
                 including concepts, techniques, and measures relating
                 to the protection of computing systems and the
                 information they maintain against deliberate or
                 accidental threats. Motivations for security measures
                 are discussed. Security strategies are considered.
                 Actions and events that threaten security are
                 described, along with technical problems that can
                 prevent the computer from adequately dealing with
                 threats. Security models are surveyed. Specific
                 technical and administrative measures for promoting
                 security are described. Among the technical measures
                 discussed are design of secure systems, hardware and
                 operating systems, identification of users, encryption,
                 and access control packages. Administrative measures
                 include personnel, physical security of the computing
                 system, and auditing.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Los Angeles Scientific Cent, Los Angeles, CA,
                 USA",
  affiliationaddress = "IBM, Los Angeles Scientific Cent, Los Angeles,
                 CA, USA",
  classification = "723; 731",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; encryption; process control ---
                 Computer Applications; security measures; security
                 model; Security of Data; security threat sources",
}

@Article{Thersites:1984:IKE,
  author =       "Joan Thersites and John A. Thomas",
  title =        "An Infinite Key Encryption System",
  journal =      j-DDJ,
  volume =       "9",
  number =       "8",
  pages =        "44--??",
  month =        aug,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Mon Sep 2 09:09:39 MDT 1996",
  bibsource =    "http://www.ddj.com/index/author/index.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  xxnote =       "??Check author order??",
}

@Article{Thomas:1984:IKE,
  author =       "John A. Thomas and Joan Thersites",
  title =        "Infinite Key Encryption System",
  journal =      j-DDJ,
  volume =       "9",
  number =       "8",
  pages =        "44--??",
  month =        aug,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "codes, symbolic; computer programs; computers,
                 microcomputer; cryptography; data processing; file
                 encryption; infinite key encryption system; program
                 code; Security of Data",
  pagecount =    "35p between p 44 and 85",
}

@Article{Thompson:1984:RTT,
  author =       "Ken Thompson",
  title =        "Reflections on Trusting Trust",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "761--763",
  month =        aug,
  year =         "1984",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/358198.358210",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1028.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "information hiding; security; steganography; unix",
  remark =       "This is part two of the 1983 Turing Award Lecture.",
}

@Book{TI:1984:TTU,
  author =       "{Texas Instruments Inc}.",
  title =        "{TMS7500 TMS75C00} user's guide, data encryption
                 device: 8-bit microcomputer family",
  publisher =    "Texas Instruments",
  address =      "Dallas, TX, USA",
  pages =        "various",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "SPNU004",
  keywords =     "Microcomputers; TMS7500 (Computer).",
}

@Manual{USGSAOIRM:1984:ISR,
  author =       "{United States.General Services Administration.Office
                 of Information Resources Management}",
  title =        "Interoperability and security requirements for use of
                 the {Data Encryption Standard} in the physical layer of
                 data communications",
  number =       "1026",
  publisher =    "General Services Administration",
  address =      "Office of Information Resources Management",
  pages =        "various",
  year =         "1984",
  LCCN =         "GS 2.8/3:1026 Govt Pubs",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Cover title. ``August 3, 1983.'' ``FSC TELE.''",
  series =       "Federal standard",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- standards --- United States;
                 government information --- standards --- United
                 States",
}

@Article{Voydock:1984:SMT,
  author =       "Victor L. Voydock and Stephen T. Kent",
  title =        "Security Mechanisms in a Transport Layer Protocol",
  journal =      j-COMP-NET,
  volume =       "8",
  number =       "5--6",
  pages =        "433--449",
  month =        oct # "\slash " # dec,
  year =         "1984",
  CODEN =        "CNETDP",
  ISSN =         "0376-5075",
  ISSN-L =       "0376-5075",
  bibdate =      "Sat Sep 25 20:21:07 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Microcom Inc, Norwood, MA, USA",
  classification = "723; 902",
  fjournal =     "Computer Networks",
  journalabr =   "Comput Networks",
  keywords =     "Communication Systems; computer architecture ---
                 Standards; computer networks; computers --- Data; data
                 encryption standard; data processing --- Security of
                 Data; Protocols; security; transport layer protocol",
}

@InProceedings{Wah:1984:RAM,
  author =       "P. K. S. Wah and M. Z. Wang",
  editor =       "{IEEE}",
  booktitle =    "{1984 International Zurich Seminar on Digital
                 Communications: applications of source coding, channel
                 coding and secrecy coding: March 6--8, 1984,
                 Z{\"u}rich, Switzerland, Swiss Federal Institute of
                 Technology: proceedings}",
  title =        "Realization and application of the {Massey--Omura}
                 lock",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  bookpages =    "xi + 201",
  pages =        "175--182",
  year =         "1984",
  LCCN =         "TK7881.5 I65 1984",
  bibdate =      "Sun Mar 11 10:47:07 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "IEEE catalog number 84CH1998-4.",
  acknowledgement = ack-nhfb,
}

@Article{Winternitz:1984:SOH,
  author =       "Robert S. Winternitz",
  title =        "Secure One-Way Hash Function Built from {DES}",
  journal =      "Proceedings of the Symposium on Security and Privacy",
  pages =        "88--90",
  year =         "1984",
  CODEN =        "PSSPEO",
  ISBN =         "0-8186-0532-4",
  ISBN-13 =      "978-0-8186-0532-1",
  LCCN =         "QA76.9.A25 S95 1984",
  bibdate =      "Tue May 12 09:47:14 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "IEEE Service Cent. Piscataway, NJ, USA.",
  acknowledgement = ack-nhfb,
  classification = "723; 902",
  conference =   "Proceedings of the 1984 Symposium on Security and
                 Privacy.",
  journalabr =   "Proc Symp Secur Privacy",
  keywords =     "authentication of information; data encryption
                 standard (des); data processing; digital message
                 signing for security and efficiency; encryption
                 algorithms; randomly chosen block cipher; secure
                 one-way hash function",
  meetingaddress = "Oakland, CA, USA",
  sponsor =      "IEEE Computer Soc, Technical Committee on Security \&
                 Privacy, Los Alamitos, Calif, USA; IEEE, New York, NY,
                 USA",
}

@InProceedings{Akl:1985:FPR,
  author =       "Selim G. Akl and Henk Meijer",
  title =        "A Fast Pseudo Random Permutation Generator With
                 Applications to Cryptology",
  crossref =     "Blakley:1985:ACP",
  pages =        "269--275",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=269",
  acknowledgement = ack-nhfb,
}

@InProceedings{Anonymous:1985:BM,
  author =       "Anonymous",
  title =        "Back matter",
  crossref =     "Blakley:1985:ACP",
  pages =        "??--??",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=??",
  acknowledgement = ack-nhfb,
}

@TechReport{Anonymous:1985:DEA,
  author =       "Anonymous",
  title =        "Data encryption algorithm: Electronic funds transfer:
                 requirements for interfaces",
  institution =  "????",
  address =      "????",
  pages =        "16",
  year =         "1985",
  ISBN =         "0-7262-3764-7",
  ISBN-13 =      "978-0-7262-3764-5",
  bibdate =      "Wed Sep 28 07:58:30 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{Aruliah:1985:PIE,
  author =       "A. A. Aruliah and G. I. Parkin and Brian A. Wichmann",
  title =        "A {Pascal} implementation of the {DES} encryption
                 algorithm including cipher block chaining",
  type =         "NPL report",
  number =       "DITC 61/85",
  institution =  "National Physical Laboratory, Division of Information
                 Technology and Computing",
  address =      "Teddington, Middlesex, UK",
  pages =        "37",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Electronic data processing; Pascal
                 (Computer program language)",
}

@InProceedings{Beker:1985:KMS,
  author =       "Henry Beker and Michael Walker",
  title =        "Key Management for Secure Electronic Funds Transfer in
                 a Retail Environment",
  crossref =     "Blakley:1985:ACP",
  pages =        "401--410",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=401",
  acknowledgement = ack-nhfb,
}

@Book{Beker:1985:SSC,
  author =       "Henry Beker and F. C. (Frederick Charles) Piper",
  title =        "Secure speech communications",
  volume =       "3",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "xi + 267",
  year =         "1985",
  ISBN =         "0-12-084780-9",
  ISBN-13 =      "978-0-12-084780-8",
  LCCN =         "TK5102.5 .B354 1985",
  bibdate =      "Fri Nov 25 08:37:47 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Microelectronics and signal processing",
  acknowledgement = ack-nhfb,
  subject =      "Scrambling systems (Telecommunication)",
}

@InProceedings{Bennett:1985:UQC,
  author =       "Charles H. Bennett and Gilles Brassard",
  title =        "An Update on Quantum Cryptography",
  crossref =     "Blakley:1985:ACP",
  pages =        "475--480",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=475",
  acknowledgement = ack-nhfb,
}

@Article{Birrell:1985:SCU,
  author =       "Andrew D. Birrell",
  title =        "Secure Communication Using Remote Procedure Calls",
  journal =      j-TOCS,
  volume =       "3",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "1985",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 06:47:30 MST 1999",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tocs/1985-3-1/p1-birrell/",
  abstract =     "Research on encryption-based secure communication
                 protocols has reached a stage where it is feasible to
                 construct end-to-end secure protocols. The design of
                 such a protocol, built as part of a remote procedure
                 call package, is described. The security abstraction
                 presented to users of the package, the authentication
                 mechanisms, and the protocol for encrypting and
                 verifying remote calls are also described.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Xerox Corp",
  classification = "723",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  journalabr =   "ACM Trans Comput Syst",
  keywords =     "computer networks; cryptography; design;
                 experimentation; Protocols; remote procedure calls;
                 secure communication; security",
  subject =      "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
                 Protection, Cryptographic controls. {\bf C.2.0}
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, General, Security and protection (e.g.,
                 firewalls). {\bf C.2.2} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Protocol architecture.",
}

@InProceedings{Blake:1985:CLG,
  author =       "I. F. Blake and R. C. Mullin and S. A. Vanstone",
  title =        "Computing Logarithms in {$ {\rm GF}(2^n) $}",
  crossref =     "Blakley:1985:ACP",
  pages =        "73--82",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=73",
  acknowledgement = ack-nhfb,
}

@InProceedings{Blakley:1985:ITF,
  author =       "G. R. Blakley",
  title =        "Information Theory without the Finiteness Assumption,
                 {I}: Cryptosystems as Group-Theoretic Objects",
  crossref =     "Blakley:1985:ACP",
  pages =        "314--338",
  year =         "1985",
  MRclass =      "94A60 (20F99)",
  MRnumber =     "87c:94034",
  MRreviewer =   "D. Lieberman",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=314",
  acknowledgement = ack-nhfb,
}

@InProceedings{Blakley:1985:SRS,
  author =       "G. R. Blakley and Catherine Meadows",
  title =        "Security of Ramp Schemes",
  crossref =     "Blakley:1985:ACP",
  pages =        "242--268",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=242",
  acknowledgement = ack-nhfb,
}

@InProceedings{Blum:1985:EPP,
  author =       "Manuel Blum and Shafi Goldwasser",
  title =        "An Efficient Probabilistic Public-Key Encryption
                 Scheme Which Hides All Partial Information",
  crossref =     "Blakley:1985:ACP",
  pages =        "289--302",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "87e:94029",
  MRreviewer =   "Willi Meier",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=289",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Goldreich:1997:FMCb}.",
  xxpages =      "289--299",
}

@Article{Book:1985:CRE,
  author =       "Ronald V. Book and Friedrich Otto",
  title =        "Cancellation Rules and Extended Word Problems",
  journal =      j-INFO-PROC-LETT,
  volume =       "20",
  number =       "1",
  pages =        "5--11",
  day =          "2",
  month =        jan,
  year =         "1985",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68Q45 (03D03)",
  MRnumber =     "87d:68054",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California, Santa Barbara, Dep of Mathematics,
                 Santa Barbara, CA, USA",
  affiliationaddress = "Univ of California, Santa Barbara, Dep of
                 Mathematics, Santa Barbara, CA, USA",
  classification = "721; B6120B (Codes); B6150 (Communication system
                 theory)",
  corpsource =   "Dept. of Maths., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "automata theory; cancellation rules; Church--Rosser
                 property; computer metatheory; congruences;
                 cryptography; extended word problems; Formal Languages;
                 formal model; name-stamp protocols; protocols; public
                 key encryption; rewriting process; secure network
                 communication; Thue systems",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Book:1985:SNP,
  author =       "R. V. Book and F. Otto",
  title =        "On the security of name-stamp protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "39",
  number =       "2-3",
  pages =        "319--325",
  month =        aug,
  year =         "1985",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
  acknowledgement = ack-nhfb,
  classification = "C5620 (Computer networks and techniques); C6130
                 (Data handling techniques)",
  corpsource =   "Dept. of Math., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "cryptography; name-stamp protocols; p-parity cascade
                 protocols; protocols; security; two-party cascade
                 protocols",
  pubcountry =   "Netherlands A15",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Book:1985:SNS,
  author =       "R. V. Book and F. Otto",
  title =        "On the security of name-stamp protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "39",
  number =       "2-3",
  pages =        "319--325",
  month =        aug,
  year =         "1985",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "C5620 (Computer networks and techniques); C6130
                 (Data handling techniques)",
  corpsource =   "Dept. of Math., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "cryptography; name-stamp protocols; p-parity cascade
                 protocols; protocols; security; two-party cascade
                 protocols",
  pubcountry =   "Netherlands A15",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Book:1985:VTA,
  author =       "R. V. Book and F. Otto",
  title =        "On the verifiability of two-party algebraic
                 protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "40",
  number =       "2-3",
  pages =        "101--130",
  month =        "????",
  year =         "1985",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
  acknowledgement = ack-nhfb,
  classification = "B6210L (Computer communications); C5620 (Computer
                 networks and techniques); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Math., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "communication protocols; cryptography; protocols;
                 public-key cryptosystems; two-party algebraic
                 protocols; verifiability",
  pubcountry =   "Netherlands A02",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@Article{Bounas:1985:DDS,
  author =       "Adam C. Bounas",
  title =        "Direct determination of a ``seed'' binary matrix",
  journal =      j-INFO-PROC-LETT,
  volume =       "20",
  number =       "1",
  pages =        "47--50",
  day =          "2",
  month =        jan,
  year =         "1985",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60 (94A15)",
  MRnumber =     "86g:94038",
  MRreviewer =   "S. Guia{\c{s}}u",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Greek Atomic Energy Commission, Computer Science
                 Dep, Attiki, Greece",
  classification = "723; 922; B6120B (Codes); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Comput. Sci., Min. of Res. and Technol.,
                 Greek Atomic Energy Comm., Attiki, Greece",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "binary matrix; cryptography; data transformation;
                 generalized feedback shift register pseudorandom number
                 generator; keys; mathematical statistics --- Random
                 Number Generation; pseudorandom number generators;
                 random number generation; seed matrices; seed matrix;
                 stream enciphering",
  treatment =    "T Theoretical or Mathematical",
}

@InProceedings{Brickell:1985:BIK,
  author =       "Ernest F. Brickell",
  title =        "Breaking Iterated Knapsacks",
  crossref =     "Blakley:1985:ACP",
  pages =        "342--358",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=342",
  acknowledgement = ack-nhfb,
}

@Article{Burton:1985:EAC,
  author =       "Charles E. Burton",
  title =        "An Enhanced {ADFGVX} Cipher System",
  journal =      j-DDJ,
  volume =       "10",
  number =       "2",
  pages =        "48--??",
  month =        feb,
  year =         "1985",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 http://www.ddj.com/index/author/index.htm;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "ADFGVX cipher; computer programs; cryptography; data
                 processing; decrypted text; encrypted messages;
                 information theory --- Data Compression; Security of
                 Data",
  pagecount =    "19p between p 48 and 70",
}

@Article{Chan:1985:NMP,
  author =       "B. Chan and H. Meijer",
  title =        "A note on the method of puzzles for key distribution",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "14",
  number =       "4",
  pages =        "221--223",
  month =        aug,
  year =         "1985",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  bibdate =      "Sat Apr 26 12:20:22 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C1260 (Information theory)",
  corpsource =   "Dept. of Comput. and Inf. Sci., Queens Univ.,
                 Kingston, Ont., Canada",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "cryptography; error correction codes; key
                 distribution; linear error correcting codes; public key
                 cryptosystem; puzzles; security of data",
  treatment =    "T Theoretical or Mathematical",
}

@InProceedings{Chaum:1985:HKS,
  author =       "David Chaum",
  title =        "How to Keep a Secret Alive Extensible Partial Key, Key
                 Safeguarding, and Threshold Systems",
  crossref =     "Blakley:1985:ACP",
  pages =        "481--485",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=481",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chaum:1985:NSC,
  author =       "David Chaum",
  title =        "New Secret Codes Can Prevent a Computerized Big
                 Brother",
  crossref =     "Blakley:1985:ACP",
  pages =        "432--433",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=432",
  acknowledgement = ack-nhfb,
}

@Article{Chaum:1985:SIT,
  author =       "David Chaum",
  title =        "Security without identification: transaction systems
                 to make big brother obsolete",
  journal =      j-CACM,
  volume =       "28",
  number =       "10",
  pages =        "1030--1044",
  month =        oct,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.acm.org/pubs/toc/;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/index-table-c.html#cacm1980",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4373.html;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1022.html",
  abstract =     "The large-scale automated transaction systems of the
                 near future can be designed to protect the privacy and
                 maintain the security of both individuals and
                 organizations.",
  acknowledgement = ack-nhfb,
  annote =       "Extensive article on use of random, transient personal
                 id's. A digital pseudonym with each organization.",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "design; human factors; information hiding; security;
                 steganography",
  referencedin = "Referenced in \cite[Ref. 4]{Kaliski:1995:SUR}.",
  review =       "ACM CR 8608-0693",
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Security and
                 protection. {\bf E.3}: Data, DATA ENCRYPTION. {\bf
                 J.1}: Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Financial. {\bf K.4.1}: Computing Milieux,
                 COMPUTERS AND SOCIETY, Public Policy Issues, Privacy.
                 {\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Social Issues, Abuse and crime involving computers.",
}

@InProceedings{Chen:1985:RGE,
  author =       "Su-shing Chen",
  title =        "On Rotation Group and Encryption of Analog Signals",
  crossref =     "Blakley:1985:ACP",
  pages =        "95--100",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=95",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chor:1985:KTP,
  author =       "Benny Chor and Ronald L. Rivest",
  title =        "A Knapsack Type Public Key Cryptosystem Based On
                 Arithmetic in Finite Fields (preliminary draft)",
  crossref =     "Blakley:1985:ACP",
  pages =        "54--65",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "820 013",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also revised version in \cite{Chor:1988:KTP}.",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=54",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chor:1985:RRL,
  author =       "Benny Chor and Oded Goldreich",
  title =        "{RSA\slash Rabin} least significant bits are {$ \frac
                 {1}{2} + \frac {1}{{\rm poly}(\log N)} $} secure
                 (extended abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "303--313",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=303",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chor:1985:VSS,
  author =       "B. Chor and S. Goldwasser and S. Micali and B.
                 Awerbuch",
  title =        "Verifiable Secret Sharing and Achieving Simultaneity
                 in the Presence of Faults",
  crossref =     "IEEE:1985:FOC",
  pages =        "383--395 (or 335--344??)",
  year =         "1985",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 7]{Canetti:1997:PSL},
                 \cite[Ref. 6]{Gemmell:1997:ITC}.",
  xxtitle =      "Verifiable Secret Sharing and Achieving Simultaneous
                 Broadcast",
}

@Article{Coppersmith:1985:AF,
  author =       "D. Coppersmith and J. H. Davenport",
  title =        "An Application of Factoring",
  journal =      j-J-SYMBOLIC-COMP,
  volume =       "1",
  number =       "2",
  pages =        "241--243",
  month =        jun,
  year =         "1985",
  CODEN =        "JSYCEH",
  ISSN =         "0747-7171 (print), 1095-855X (electronic)",
  ISSN-L =       "0747-7171",
  MRclass =      "11T71 (11Y16 68Q40)",
  MRnumber =     "87b:11125",
  MRreviewer =   "Kevin S. McCurley",
  bibdate =      "Sat May 10 15:54:09 MDT 1997",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsymcomp.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Symbolic Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07477171",
  keywords =     "Factorization, Logarithms, Cryptography, SCRATCHPAD",
}

@InProceedings{Davies:1985:MAA,
  author =       "Donald Watts Davies",
  title =        "A Message Authenticator Algorithm Suitable for a
                 Mainframe Computer",
  crossref =     "Blakley:1985:ACP",
  pages =        "393--400",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=393",
  acknowledgement = ack-nhfb,
}

@InProceedings{Davio:1985:EHS,
  author =       "Marc Davio and Yvo Desmedt and Jo Goubert and Frank
                 Hoornaert and Jean-Jacques Quisquater",
  title =        "Efficient hardware and software implementations for
                 the {DES}",
  crossref =     "Blakley:1985:ACP",
  pages =        "144--146",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=144",
  acknowledgement = ack-nhfb,
}

@Article{Davis:1985:NRI,
  author =       "J. A. Davis and D. B. Holdridge",
  title =        "New results on integer factorizations",
  journal =      j-CONG-NUM,
  volume =       "46",
  pages =        "65--78",
  year =         "1985",
  ISSN =         "0384-9864",
  MRclass =      "11Y05 (94A60)",
  MRnumber =     "86f:11098",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Proceedings of the fourteenth Manitoba conference on
                 numerical mathematics and computing (Winnipeg, Man.,
                 1984).",
  acknowledgement = ack-nhfb,
  fjournal =     "Congressus Numerantium",
}

@InProceedings{Davis:1985:UFS,
  author =       "J. A. Davis and D. B. Holdridge",
  title =        "An Update on Factorization at {Sandia National
                 Laboratories}",
  crossref =     "Blakley:1985:ACP",
  pages =        "114--114",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=114",
  acknowledgement = ack-nhfb,
}

@Book{Dawson:1985:COL,
  author =       "M. J. Dawson",
  title =        "Cryptanalysis of ornithological literature",
  volume =       "4",
  publisher =    "Oriel Stringer",
  address =      "Brighton",
  pages =        "40",
  year =         "1985",
  ISBN =         "0-948122-04-8 (paperback)",
  ISBN-13 =      "978-0-948122-04-0 (paperback)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Caliologists' series",
  acknowledgement = ack-nhfb,
  keywords =     "Birds --- Great Britain --- Nests; Great Britain ---
                 Birds --- Nests",
}

@Book{Deavours:1985:MCM,
  author =       "Cipher A. Deavours and Louis Kruh",
  title =        "Machine cryptography and modern cryptanalysis",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "xiv + 258",
  year =         "1985",
  ISBN =         "0-89006-161-0",
  ISBN-13 =      "978-0-89006-161-9",
  LCCN =         "Z103 .D431 1985",
  MRclass =      "94A60 (01A60 94-03)",
  MRnumber =     "87h:94017",
  MRreviewer =   "Harriet Fell",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "The Artech House telecom library",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Machine ciphers; World War, 1939--1945
                 --- Cryptography.",
}

@InProceedings{Delsarte:1985:FCM,
  author =       "P. Delsarte and Y. Desmedt and A. Odlyzko and P.
                 Piret",
  title =        "Fast cryptanalysis of the {Matsumoto--Imai} public key
                 scheme",
  crossref =     "Beth:1985:ACP",
  pages =        "142--149",
  year =         "1985",
  DOI =          "https://doi.org/10.1007/3-540-39757-4_14",
  MRclass =      "94A60",
  MRnumber =     "87c:94037",
  bibdate =      "Mon Jul 19 07:03:50 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.research.att.com/~amo/doc/arch/break.mi.scheme.pdf;
                 http://www.research.att.com/~amo/doc/arch/break.mi.scheme.ps;
                 http://www.research.att.com/~amo/doc/arch/break.mi.scheme.troff",
  acknowledgement = ack-nhfb,
}

@InProceedings{Desmedt:1985:DOI,
  author =       "Yvo Desmedt and Jean-Jacques Quisquater and Marc
                 Davio",
  title =        "Dependence of output on input in {DES}: Small
                 avalanche characteristics",
  crossref =     "Blakley:1985:ACP",
  pages =        "359--376",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=359",
  acknowledgement = ack-nhfb,
}

@Book{DRC:1985:AAN,
  author =       "{Datapro Research Corporation}",
  title =        "All about network access control and data encryption
                 devices: with in-depth analyses of leading devices",
  publisher =    "Datapro Research Corporation",
  address =      "Delran, NJ, USA",
  pages =        "65",
  month =        jun,
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Special report prepared by editors of Datapro's
                 monthly loose-leaf services.",
  keywords =     "Computers --- Access control; Electronic data
                 processing.",
}

@TechReport{Ecker:1985:STS,
  author =       "Allen Ecker",
  title =        "Satellite television, signal encryption and the future
                 of broadband distribution",
  type =         "Seminar notes",
  institution =  "Communications Forum, Massachusetts Institute of
                 Technology",
  address =      "Cambridge, MA, USA",
  pages =        "13",
  day =          "19",
  month =        sep,
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{El-Gamal:1985:PCS,
  author =       "T. El-Gamal",
  title =        "A public-key cryptosystem and a signature scheme based
                 on discrete logarithms",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "4",
  pages =        "469--472",
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1985.1057074",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  referencedin = "Referenced in \cite[Ref. 4]{Handschuh:1998:SCC}.",
}

@Article{ElGamal:1985:PKCa,
  author =       "Taher ElGamal",
  title =        "A public key cryptosystem and a signature scheme based
                 on discrete logarithms",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "4",
  pages =        "469--472",
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1985.1057074",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "86j:94045",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@InProceedings{ElGamal:1985:PKCb,
  author =       "Taher ElGamal",
  title =        "A Public Key Cryptosystem and a Signature Scheme Based
                 on Discrete Logarithms",
  crossref =     "Blakley:1985:ACP",
  pages =        "10--18",
  year =         "1985",
  MRclass =      "94A60 (11T71 68P25)",
  MRnumber =     "87b:94037",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=10",
  acknowledgement = ack-nhfb,
}

@Article{ElGamal:1985:STA,
  author =       "Taher ElGamal",
  title =        "A subexponential-time algorithm for computing discrete
                 logarithms over {$ {\rm GF}(p^2) $}",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "4",
  pages =        "473--481",
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1985.1057075",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Sun Mar 11 10:34:00 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@InProceedings{Even:1985:CSW,
  author =       "Shimon Even",
  title =        "On the complexity of some word problems that arise in
                 testing the security of protocols",
  crossref =     "Apostolico:1985:CAW",
  pages =        "299--314",
  year =         "1985",
  MRclass =      "68Q25 (68P25 94A60)",
  MRnumber =     "87a:68080",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Even:1985:PCC,
  author =       "S. Even and O. Goldreich",
  title =        "On the Power of Cascade Ciphers",
  journal =      j-TOCS,
  volume =       "3",
  number =       "2",
  pages =        "108--116",
  month =        may,
  year =         "1985",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 06:47:30 MST 1999",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tocs/1985-3-2/p108-even/",
  abstract =     "The unicity distance of a cascade of random ciphers,
                 with respect to known plaintext attack, is shown to be
                 the sum of the key lengths. At time-space trade-off for
                 the exhaustive cracking of a cascade of ciphers is
                 shown. The structure of the set of permutations
                 realized by a cascade is studied; it is shown that only
                 l. 2**k exhaustive experiments are necessary to
                 determine the behavior of a cascade of l stages, each
                 having k key bits. It is concluded that the cascade of
                 random ciphers is not a random cipher. Yet, it is shown
                 that, with probability, the number of permutations
                 realizable by a cascade of l random ciphers, each
                 having k key bits, is 2**l**k. Next, it is shown that
                 two stages are not worse than one, by a simple
                 reduction of the cracking problem of any of the stages
                 to the cracking problem of the cascade. Finally, it is
                 shown that proving a nonpolynomial lower bound on the
                 cracking problem of long cascades is a hard task, since
                 such a bound implies that P does not equal NP.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technion-Israel Inst of Technology, Haifa, Isr",
  classification = "723",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  journalabr =   "ACM Trans Comput Syst",
  keywords =     "algorithms; cascade ciphers; cryptography; data
                 encryption; data processing --- Security of Data;
                 random ciphers; security; theory; unicity distance",
  subject =      "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
                 Protection. {\bf E.3} Data, DATA ENCRYPTION.",
}

@Article{Even:1985:RPS,
  author =       "Shimon Even and Oded Goldreich and Abraham Lempel",
  title =        "A randomized protocol for signing contracts",
  journal =      j-CACM,
  volume =       "28",
  number =       "6",
  pages =        "637--647",
  month =        jun,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68P25",
  MRnumber =     "800 680",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3818.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "security; theory; verification",
  review =       "ACM CR 8512-1137",
  subject =      "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption
                 standard (DES). {\bf E.3}: Data, DATA ENCRYPTION,
                 Public key cryptosystems. {\bf C.2.2}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Protocols. {\bf H.4.3}: Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Communications
                 Applications, Electronic mail. {\bf J.1}: Computer
                 Applications, ADMINISTRATIVE DATA PROCESSING,
                 Financial.",
}

@InProceedings{Fairfield:1985:LDE,
  author =       "R. C. Fairfield and A. Matusevich and J. Plany",
  title =        "An {LSI Digital Encryption Processor (DEP)}",
  crossref =     "Blakley:1985:ACP",
  pages =        "115--143",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "820 017",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=115",
  acknowledgement = ack-nhfb,
}

@InProceedings{Fairfield:1985:LRN,
  author =       "R. C. Fairfield and R. L. Mortenson and K. B.
                 Coulthart",
  title =        "An {LSI} Random Number Generator ({RNG})",
  crossref =     "Blakley:1985:ACP",
  pages =        "203--230",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=203",
  acknowledgement = ack-nhfb,
}

@InProceedings{Fortune:1985:PP,
  author =       "Steven Fortune and Michael Merritt",
  title =        "Poker Protocols",
  crossref =     "Blakley:1985:ACP",
  pages =        "454--464",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=454",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Franklin:1985:MID,
  author =       "Matthew Keith Franklin",
  title =        "Mathematical investigations of the {Data Encryption
                 Standard}",
  type =         "Thesis ({M.A. in Mathematics})",
  school =       "Department of Mathematics, University of California,
                 Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "36",
  month =        may,
  year =         "1985",
  LCCN =         "C 2 930 522",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "University of California, Berkeley --- dissertations
                 --- mathematics",
}

@Book{Franksen:1985:MBS,
  author =       "Ole Immanuel Franksen",
  title =        "{Mr. Babbage}'s secret: the tale of a cypher and
                 {APL}",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "319",
  year =         "1985",
  ISBN =         "0-13-604729-7",
  ISBN-13 =      "978-0-13-604729-2",
  LCCN =         "Z103.B2 F721 1985",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "APL (computer program language); Babbage, Charles,
                 1791--1871; ciphers --- history; cryptographers ---
                 Great Britain --- biography; cryptography --- history",
}

@Book{Gleason:1985:ECP,
  author =       "Andrew M. Gleason and Walter F. Penney and Ronald E.
                 Wyllys",
  title =        "Elementary course in probability for the
                 cryptanalyst",
  volume =       "41",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Revised",
  pages =        "????",
  year =         "1985",
  ISBN =         "0-89412-072-7",
  ISBN-13 =      "978-0-89412-072-5",
  LCCN =         "Z104 .G53 1985",
  bibdate =      "Wed May 11 23:23:17 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  subject =      "Probabilities; Cryptography",
}

@InProceedings{Goldreich:1985:CAR,
  author =       "Oded Goldreich and Shafi Goldwasser and Silvio
                 Micali",
  title =        "On the Cryptographic Applications of Random Functions
                 (Extended Abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "276--288",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=276",
  acknowledgement = ack-nhfb,
}

@InProceedings{Goldwasser:1985:PSS,
  author =       "Shafi Goldwasser and Silvio Micali and Ronald L.
                 Rivest",
  title =        "A {``Paradoxical''} Solution to the Signature
                 Problem",
  crossref =     "Blakley:1985:ACP",
  pages =        "467--467",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=467",
  acknowledgement = ack-nhfb,
}

@Article{Goodman:1985:NTK,
  author =       "R. M. F. Goodman and A. J. McAuley",
  booktitle =    "Advances in cryptology (Paris, 1984)",
  title =        "A new trapdoor knapsack public key cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "209",
  pages =        "150--158",
  year =         "1985",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "87c:94038",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Gordon:1985:SPE,
  author =       "John A. Gordon",
  title =        "Strong primes are easy to find",
  crossref =     "Beth:1985:ACP",
  pages =        "216--223",
  year =         "1985",
  DOI =          "https://doi.org/10.1007/3-540-39757-4_19",
  bibdate =      "Sun Mar 11 10:24:54 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "A {\em strong prime\/} $p$ is a prime that satisfies
                 three conditions: (1) $ p = 1 \bmod r $, (2) $ p = (s -
                 1) \bmod s $, and (3) $ r = 1 \bmod t $, where $r$,
                 $s$, and $t$ are all large random primes of a given
                 number of bits.",
}

@InProceedings{Haastad:1985:CST,
  author =       "J. H{\aa}stad and A. Shamir",
  title =        "The cryptographic security of truncated linearly
                 related variables",
  crossref =     "ACM:1985:PSA",
  pages =        "356--362",
  year =         "1985",
  bibdate =      "Wed Feb 20 18:33:46 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/22145/p356-hastad/p356-hastad.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/22145/p356-hastad/",
  acknowledgement = ack-nhfb,
}

@Manual{Hardy:1985:ECC,
  author =       "John M. Hardy and Dorothy W. Fuller and Douglas R.
                 Long and Jane C. Hartin and Faye Davis",
  title =        "Electronic cryptographic communications equipment
                 specialist {(AFSC 30650)}",
  number =       "CDC 30650",
  organization = "Extension Course Institute, Air University",
  address =      "????",
  pages =        "various",
  year =         "1985",
  LCCN =         "D 301.26/17-2:30650 2 8502 Govt Pubs; Other Govt Docs
                 numbers: D 301.26/17-2:30650 04 8502",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "``30650 -2 8502''--Vol. 2. ``30650 04 8502''--Vol. 4.
                 ``CDC 30650.'' Description based in vol. 2.
                 Bibliography: vol. 2, p. 153. Contents: v. 2. Advanced
                 electronics / [prepared by John M. Hardy; edited by
                 Dorothy W. Fuller] -- v. 4. Maintenance practices and
                 test equipment / [prepared by John M. Hardy, Douglas R.
                 Long; edited by Jane C. Hartin, Faye Davis].",
  keywords =     "cryptography -- handbooks, manuals, etc; electronics
                 in military engineering -- handbooks, manuals, etc;
                 United States. Air Force -- handbooks, manuals, etc",
}

@Article{HJH:1985:BRK,
  author =       "HJH",
  title =        "Book Review: {{\booktitle{Kahn on codes: Secrets of
                 the new cryptology}}: David Kahn New York: Macmillan
                 Publishing Company, 1984. 344 + viii pages, \$19.95}",
  journal =      j-COMPUT-SECUR,
  volume =       "4",
  number =       "3",
  pages =        "247--247",
  month =        sep,
  year =         "1985",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404885900379",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Hoornaert:1985:EHI,
  author =       "Frank Hoornaert and Jo Goubert and Yvo Desmedt",
  title =        "Efficient hardware implementation of the {DES}",
  crossref =     "Blakley:1985:ACP",
  pages =        "147--173",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=147",
  acknowledgement = ack-nhfb,
}

@Article{Horgan:1985:TIT,
  author =       "J. Horgan",
  title =        "Thwarting the information thieves: Fear of spying
                 through simple or sophisticated electronics has spawned
                 an industry whose challenge is to block the illegal
                 interception of intelligence",
  journal =      j-IEEE-SPECTRUM,
  volume =       "22",
  number =       "7",
  pages =        "30--41",
  month =        jul,
  year =         "1985",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.1985.6370754",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Mon Jan 20 06:41:24 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum1970.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "bugs; Coaxial cables; communications interception;
                 Companies; Computer bugs; computer crime; cryptography;
                 data privacy; defense contractors; domestic
                 competitors; electronic surveillance; electronic
                 sweeps; encryption; expensive; foreign governments;
                 information thieves; Microwave theory and techniques;
                 private security vendors; Security; security of data;
                 Surveillance; tapes; time-consuming; US Government",
}

@Article{Hunter:1985:ARK,
  author =       "D. G. N. Hunter",
  title =        "{Algorithm 121}: {RSA} key calculation in {Ada}",
  journal =      j-COMP-J,
  volume =       "28",
  number =       "3",
  pages =        "343--348",
  month =        jul,
  year =         "1985",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/28.3.343",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  MRclass =      "94A60 (94-04)",
  MRnumber =     "86j:94048",
  bibdate =      "Tue Dec 4 14:48:18 MST 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/28/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/",
  note =         "See note \cite{Wichmann:1987:NAR}.",
  URL =          "http://comjnl.oxfordjournals.org/content/28/3/343.full.pdf+html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/343.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/344.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/345.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/346.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/347.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/348.tif",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "Stand. Telecommun. Labs. Ltd., Harlow, UK",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "16-bit microcomputers; Ada; Ada listings; assembly
                 code; cryptography; encryption programs; exponentiation
                 operation; finite arithmetic; general purpose
                 arithmetic packages; multiple precision arithmetic;
                 packages; RSA key calculation in",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Kak:1985:EEC,
  author =       "Subhash C. Kak",
  title =        "Encryption and error-correction coding using {$D$}
                 sequences",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "34",
  number =       "9",
  pages =        "803--809",
  year =         "1985",
  CODEN =        "ITCOB4",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "86k:94028",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Institute of Electrical and Electronics Engineers.
                 Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Kaliski:1985:WAE,
  author =       "Burt S. Kaliski",
  title =        "{Wyner}'s Analog Encryption Scheme: Results of a
                 Simulation",
  crossref =     "Blakley:1985:ACP",
  pages =        "83--94",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=83",
  acknowledgement = ack-nhfb,
}

@Article{Karger:1985:ADA,
  author =       "Paul A. Karger",
  title =        "Authentication and Discretionary Access Control in
                 Computer Networks",
  journal =      j-COMP-NET-ISDN,
  volume =       "10",
  number =       "1",
  pages =        "27--37",
  month =        aug,
  year =         "1985",
  CODEN =        "CNISE9",
  ISSN =         "0169-7552 (print), 1879-2324 (electronic)",
  ISSN-L =       "0169-7552",
  bibdate =      "Sat Sep 25 23:08:50 MDT 1999",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Digital Equipment Corp, Littleton, MA, USA",
  classification = "723",
  fjournal =     "Computer Networks and ISDN Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01697552",
  journalabr =   "Comput Networks ISDN Syst",
  keywords =     "access control; authentication; computer networks;
                 data processing --- Security of Data; data security;
                 digital network architecture; network security",
}

@Article{Knuth:1985:DLC,
  author =       "Donald E. Knuth",
  title =        "Deciphering a linear congruential encryption",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "1",
  pages =        "49--52",
  month =        jan,
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "https://doi.org/10.1109/TIT.1985.1056997",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60",
  MRnumber =     "87c:94040",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  note =         "Russian translation, to appear.",
  fjournal =     "IEEE Transactions on Information Theory",
  subject =      "G.3 Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation E Data, DATA
                 ENCRYPTION",
}

@InProceedings{Konheim:1985:CAE,
  author =       "Alan G. Konheim",
  title =        "Cryptanalysis of {ADFGVX} Encipherment Systems
                 (extended abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "339--341",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "820 027",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=339",
  acknowledgement = ack-nhfb,
}

@InProceedings{Kothari:1985:GLT,
  author =       "S. C. Kothari",
  title =        "Generalized Linear Threshold Scheme",
  crossref =     "Blakley:1985:ACP",
  pages =        "231--241",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=231",
  acknowledgement = ack-nhfb,
}

@Article{Lagarias:1985:SLD,
  author =       "J. C. Lagarias and A. M. Odlyzko",
  title =        "Solving Low-Density Subset Sum Problems",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "229--246",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Preliminary version in {\em Proc. 24th IEEE
                 Foundations Computer Science Symp.}, pp. 1--10, 1983.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2461.html",
  abstract =     "The subset sum problem is to decide whether or not a
                 0-1 integer programming problem which is NP-complete,
                 has a solution. The difficulty of solving it is the
                 basis of public-key cryptosystems of knapsack type. An
                 algorithm is proposed that searches for a solution when
                 given an instance of the subset sum problem. This
                 algorithm always halts in polynomial time but does not
                 always find a solution when one exists. It converts the
                 problem to one of finding a particular short vector in
                 a lattice, and then uses a lattice basis reduction
                 algorithm to attempt to find this short vector. The
                 performance of the proposed algorithm is analyzed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  classification = "721; 722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; automata theory --- Theorem
                 Proving; computer programming; computers, digital ---
                 Special Purpose Application; cryptography ---
                 Applications; data encryption; discrete mathematics;
                 integer lattice; measurement; public-key cryptosystems;
                 security; subset sum problems; theory; verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Number-theoretic computations. {\bf E.3}:
                 Data, DATA ENCRYPTION. {\bf G.1.6}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Optimization, Integer
                 programming. {\bf G.2.m}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Miscellaneous.",
}

@MastersThesis{Lassek:1985:CCA,
  author =       "Teresa A. Lassek",
  title =        "Cryptology and the computer age",
  type =         "Thesis ({Honors})",
  school =       "University of Nebraska at Omaha",
  address =      "Omaha, NE, USA",
  pages =        "58",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control; Cryptography; Data
                 protection",
}

@InProceedings{Leighton:1985:HBC,
  author =       "Albert C. Leighton and Stephen M. Matyas",
  title =        "The History of Book Ciphers",
  crossref =     "Blakley:1985:ACP",
  pages =        "101--113",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=101",
  acknowledgement = ack-nhfb,
}

@InProceedings{Leung:1985:SCT,
  author =       "A. K. Leung and S. E. Tavares",
  title =        "Sequence Complexity as a Test for Cryptographic
                 Systems",
  crossref =     "Blakley:1985:ACP",
  pages =        "468--474",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=468",
  acknowledgement = ack-nhfb,
}

@InProceedings{Levin:1985:OWF,
  author =       "L. A. Levin",
  title =        "One-way functions and pseudorandom generators",
  crossref =     "ACM:1985:PSA",
  pages =        "363--365",
  year =         "1985",
  bibdate =      "Wed Feb 20 18:33:46 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/22145/p363-levin/p363-levin.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/22145/p363-levin/",
  acknowledgement = ack-nhfb,
}

@Article{Lidl:1985:CBP,
  author =       "R. Lidl",
  booktitle =    "Advances in cryptology (Paris, 1984)",
  title =        "On cryptosystems based on polynomials and finite
                 fields",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "209",
  pages =        "10--15",
  year =         "1985",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "87c:94041",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mackinnon:1985:OAA,
  author =       "S. J. Mackinnon and P. D. Taylor and H. Meijer and S.
                 G. Akl",
  title =        "An Optimal Algorithm for Assigning Cryptographic Keys
                 to Control Access in a Hierarchy",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-34",
  number =       "9",
  pages =        "797--802",
  month =        sep,
  year =         "1985",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.1985.1676635",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 10 08:33:28 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1676635",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{McIvor:1985:SC,
  author =       "R. McIvor",
  title =        "Smart cards",
  journal =      j-SCI-AMER,
  volume =       "253",
  number =       "5",
  pages =        "130--137",
  month =        nov,
  year =         "1985",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Mon May 18 08:08:24 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B1265 (Digital electronics); C7120 (Financial
                 computing)",
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "credit cards; digital IC; digital integrated circuits;
                 EFTS; microelectronic chip; smart cards",
  treatment =    "G General Review",
}

@TechReport{Meijer:1985:MEN,
  author =       "Henk Meijer",
  title =        "Multiplication-permutation encryption networks",
  type =         "Technical report",
  number =       "85-171",
  institution =  "Department of Computing and Information Science,
                 Queen's University",
  address =      "Kingston, Ont., Canada",
  pages =        "15",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Supported by the Natural Sciences and Engineering
                 Research Council of Canada.",
  keywords =     "Cryptography.",
}

@MastersThesis{Miller:1985:PES,
  author =       "Jay I. Miller",
  title =        "A private-key encryption system based on plane
                 geometry",
  type =         "Thesis ({M.S. in Computer Science})",
  school =       "University of Wisconsin-Milwaukee",
  address =      "Milwaukee, WI, USA",
  pages =        "iv + 33 + 115",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Data protection; Geometry, Plane.",
}

@Article{Montgomery:1985:MMT,
  author =       "Peter L. Montgomery",
  title =        "Modular Multiplication Without Trial Division",
  journal =      j-MATH-COMPUT,
  volume =       "44",
  number =       "170",
  pages =        "519--521",
  month =        apr,
  year =         "1985",
  CODEN =        "MCMPAF",
  DOI =          "https://doi.org/10.1090/S0025-5718-1985-0777282-X",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  MRclass =      "11Y16",
  MRnumber =     "86e:11121",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcomp1980.bib;
                 JSTOR database",
  URL =          "http://www.ams.org/journals/mcom/1985-44-170/S0025-5718-1985-0777282-X/",
  acknowledgement = ack-nhfb,
  classcodes =   "C1160 (Combinatorial mathematics); C5230 (Digital
                 arithmetic methods); C6130 (Data handling techniques)",
  corpsource =   "Syst. Dev. Corp., Santa Monica, CA, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "digital arithmetic; integer; integer arithmetic;
                 modular arithmetic; modular multiplication;
                 multiplication; N-residue; N-residue arithmetic; number
                 theory",
  referencedin = "Referenced in \cite[Ref. 8]{Handschuh:1998:SCC}.",
  treatment =    "T Theoretical or Mathematical",
}

@Manual{NIST:1985:FPC,
  author =       "{NIST}",
  title =        "{FIPS PUB} 113: Computer Data Authentication",
  organization = "National Institute of Standards and Technology
                 (formerly National Bureau of Standards)",
  address =      "Gaithersburg, MD, USA",
  pages =        "??",
  day =          "30",
  month =        may,
  year =         "1985",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 7]{Kaliski:1995:MAM}.",
}

@Book{NIST:1985:FPSa,
  author =       "{National Institute of Standards and Technology}",
  title =        "{FIPS PUB 112}: Standard for Password Usage",
  publisher =    pub-NIST,
  address =      pub-NIST:adr,
  day =          "30",
  month =        may,
  year =         "1985",
  bibdate =      "Mon Nov 27 08:37:27 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.itl.nist.gov/fipspubs/fip112.htm",
  abstract =     "The document specifies basic security criteria for two
                 different uses of passwords in an ADP system, (1)
                 personal identity authentication and (2) data access
                 authorization. It establishes the basic criteria for
                 the design, implementation and use of a password system
                 in those systems where passwords are used. It
                 identifies fundamental ADP management functions
                 pertaining to passwords and specifies some user actions
                 required to satisfy these functions. In addition, it
                 specifies several technical features which may be
                 implemented in an ADP system in order to support a
                 password system. An implementation schedule is
                 established for compliance with the Standard. Numerous
                 guidelines are provided in the Appendices for managers
                 and users seeking to comply with the Standard.",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; data security; passphrase;
                 password; personal identification; systems security.",
}

@Book{NIST:1985:FPSb,
  author =       "{National Institute of Standards and Technology}",
  title =        "{FIPS PUB 113}: Standard for Computer Data
                 Authentication",
  publisher =    pub-NIST,
  address =      pub-NIST:adr,
  day =          "30",
  month =        may,
  year =         "1985",
  bibdate =      "Mon Nov 27 08:37:27 2000",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.itl.nist.gov/fipspubs/fip113.htm",
  abstract =     "his publication specifies a standard to be used by
                 Federal organizations which require that the integrity
                 of computer data be cryptographically authenticated. In
                 addition, it may be used by any organization whenever
                 cryptographic authentication is desired. Cryptographic
                 authentication of data during transmission between
                 electronic components or while in storage is necessary
                 to maintain the integrity of the information
                 represented by the data. The standard specifies a
                 cryptographic authentication algorithm for use in ADP
                 systems and networks. The authentication algorithm
                 makes use of the Data Encryption Standard (DES)
                 cryptographic algorithm as defined in Federal
                 Information Processing Standard 46 (FIPS PUB 46).",
  acknowledgement = ack-nhfb,
  keywords =     "authentication; cryptography; data authentication
                 algorithm; Data Authentication Algorithm (DAA); Data
                 Encryption Standard (DES); data integrity; Federal
                 Information Processing Standard (FIPS)",
}

@InProceedings{Nobauer:1985:CRS,
  author =       "Rupert N{\"o}bauer",
  booktitle =    "Contributions to general algebra, 3 (Vienna, 1984)",
  title =        "Cryptanalysis of the {R{\'e}dei}-scheme",
  publisher =    "H{\"o}lder-Pichler-Tempsky",
  address =      "Vienna, Austria",
  pages =        "255--264",
  year =         "1985",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "87b:94040",
  bibdate =      "Sat Oct 26 10:21:29 2