%%% -*-BibTeX-*-
%%% ====================================================================
%%% BibTeX-file{
%%% author = "Nelson H. F. Beebe",
%%% version = "4.79",
%%% date = "07 June 2016",
%%% time = "19:19:22 MDT",
%%% filename = "cryptography.bib",
%%% address = "University of Utah
%%% Department of Mathematics, 110 LCB
%%% 155 S 1400 E RM 233
%%% Salt Lake City, UT 84112-0090
%%% USA",
%%% telephone = "+1 801 581 5254",
%%% FAX = "+1 801 581 4148",
%%% URL = "http://www.math.utah.edu/~beebe",
%%% checksum = "16184 25680 106486 1080738",
%%% email = "beebe at math.utah.edu, beebe at acm.org,
%%% beebe at computer.org (Internet)",
%%% codetable = "ISO/ASCII",
%%% keywords = "bibliography; BibTeX; Blowfish; cipher;
%%% Clipper; code breaking; cracking;
%%% cryptanalysis; crypto; cryptobytes;
%%% cryptography; cryptology; cryptosystem; data
%%% encryption algorithm; decryption; DES;
%%% Diffie; digital signature; encryption;
%%% Hellmann; International Data Encryption
%%% Algorithm (IDEA); Kahn; Kerberos; key escrow;
%%% kleptography; PGP; Pretty Good Privacy;
%%% Rivest; RSA; Schneier; Smart Card;
%%% steganography; Twofish; Zimmermann",
%%% license = "public domain",
%%% supported = "yes",
%%% docstring = "This is bibliography of publications on
%%% cryptography and related subjects for the
%%% years 1606--1989. Material for years
%%% 1990--date appears in companion
%%% bibliographies, cryptography1990.bib,
%%% cryptography2000.bib, and so on, to reduce
%%% the size of this bibliography.
%%%
%%% At version 3.29 of this file, the number of
%%% entries exceeded 4000, so material for the
%%% 1990s was moved into a new file,
%%% cryptography1990.bib.
%%%
%%% The initial draft of this bibliography was
%%% extracted using the bibsearch utility from
%%% the large TeX User Group and BibNet Project
%%% bibliography archives, available on the
%%% Internet at
%%%
%%% ftp://ftp.math.utah.edu/pub/tex/bib
%%% http://www.math.utah.edu/pub/tex/bib/index-table.html
%%%
%%% and
%%%
%%% ftp://ftp.math.utah.edu/pub/bibnet
%%% http://www.math.utah.edu/pub/bibnet/index.html
%%%
%%% As of April 1999, these archives hold more
%%% than 231,000 bibliographic entries in BibTeX
%%% form.
%%%
%%% Those results were then augmented by entries
%%% for books found in the University of
%%% California Melvyl catalog, the Library of
%%% Congress catalog, and the OCLC WorldCat
%%% database, and by other publications found in
%%% the Compendex database, the OCLC Contents1st,
%%% Proceedings, and PapersFirst databases, and
%%% the MathSciNet database.
%%%
%%% Counterpane Systems maintains a Web site at
%%%
%%% http://www.counterpane.com/
%%% http://www.counterpane.com/publish.html
%%%
%%% with a substantial number of their technical
%%% reports and articles available in electronic
%%% form.
%%%
%%% The International Association for Cryptologic
%%% Research (IACR) is a ``non-profit scientific
%%% organization whose primary purpose is to
%%% further research in cryptology and related
%%% fields''. It has a World-Wide Web site at
%%%
%%% http://www.iacr.org/index.html
%%%
%%% IACR publishes an email newsletter thrice
%%% yearly. Back issues are available starting
%%% with Volume 15, Number 1, Fall 1998 at the
%%% above site. It also supports a distinguished
%%% lecture series
%%%
%%% http://www.iacr.org/publications/dl/
%%%
%%% and a preprint server
%%%
%%% http://www.iacr.org/publications/preprint.html
%%%
%%% The Cryptography and Security Group at the
%%% Department of Computer Science and
%%% Engineering of the University of California
%%% at San Diego supports a World-Wide Web site,
%%% called the Theory of Cryptography Library, at
%%%
%%% http://philby.ucsd.edu/cryptolib/
%%%
%%% There is another site with cryptographic
%%% miscellanea and news articles at
%%%
%%% http://cryptome.org/
%%%
%%% There is an archive of the cryptography
%%% mailing list at
%%%
%%% http://www.mail-archive.com/cryptography%40wasabisystems.com/
%%%
%%% All of the cited references from all of the
%%% articles in the online journal CryptoBytes
%%% are also included, with referencedin key
%%% values recording the source of citations.
%%%
%% However, publications in the journals
%%%
%%% * Cryptologia,
%%% * Designs, Codes, and Cryptography,
%%% * Journal of Cryptology,
%%% * Journal of Discrete Mathematical
%%% Sciences and Cryptography
%%%
%%% are generally excluded, unless they are
%%% cross-referenced by other entries in this
%%% bibliography, because they are covered in
%%% separate companion bibliographies,
%%% cryptologia.bib, designscodescryptogr.bib,
%%% jcryptology.bib, and jdiscrmathscicrypto.bib.
%%%
%%% Historical note: Whitfield Diffie, Martin
%%% E. Hellman, and Ralph Merkle are justly
%%% credited with the first publicly-reported
%%% discovery (in 1976--78) of public-key key
%%% cryptography. However, three British
%%% researchers, James Ellis, Clifford Cocks and
%%% Malcolm Williamson independently discovered
%%% it earlier (about 1975), but their work was
%%% secret until its declassification in 1997.
%%% See entries Ellis:1975:PKC, Diffie:1976:NDC,
%%% Merkle:1978:HIS, Merkle:1978:SCI. I have not
%%% yet been able to locate the declassified
%%% reports. Two reports by Alan Turing on
%%% cryptography (entries Turing:1941:APC and
%%% Turing:1941:SR) were similarly closely-held
%%% secrets, and were only declassified in 2012.
%%%
%%% At version 4.79, the year coverage looked
%%% like this:
%%%
%%% 1518 ( 1) 1682 ( 0) 1846 ( 0)
%%% 1528 ( 0) 1692 ( 1) 1856 ( 0)
%%% 1535 ( 0) 1699 ( 0) 1863 ( 1)
%%% 1536 ( 0) 1700 ( 0) 1864 ( 1)
%%% 1545 ( 0) 1709 ( 0) 1873 ( 1)
%%% 1546 ( 0) 1710 ( 0) 1874 ( 1)
%%% 1555 ( 0) 1719 ( 0) 1883 ( 1)
%%% 1557 ( 0) 1721 ( 0) 1885 ( 1)
%%% 1564 ( 0) 1728 ( 0) 1892 ( 1)
%%% 1570 ( 0) 1734 ( 0) 1898 ( 1)
%%% 1572 ( 0) 1736 ( 0) 1900 ( 1)
%%% 1575 ( 0) 1739 ( 1) 1903 ( 0)
%%% 1576 ( 0) 1740 ( 0) 1904 ( 1)
%%% 1584 ( 0) 1748 ( 0) 1912 ( 1)
%%% 1587 ( 0) 1751 ( 0) 1915 ( 1)
%%% 1591 ( 0) 1755 ( 0) 1919 ( 1)
%%% 1592 ( 0) 1756 ( 0) 1920 ( 1)
%%% 1593 ( 0) 1757 ( 0) 1921 ( 1)
%%% 1594 ( 0) 1758 ( 0) 1922 ( 4)
%%% 1595 ( 0) 1759 ( 0) 1923 ( 1)
%%% 1596 ( 0) 1760 ( 0) 1924 ( 2)
%%% 1597 ( 0) 1761 ( 0) 1925 ( 1)
%%% 1598 ( 0) 1762 ( 0) 1926 ( 1)
%%% 1599 ( 0) 1763 ( 0) 1927 ( 2)
%%% 1600 ( 0) 1764 ( 0) 1928 ( 1)
%%% 1601 ( 0) 1765 ( 0) 1929 ( 2)
%%% 1603 ( 0) 1767 ( 0) 1931 ( 2)
%%% 1604 ( 0) 1768 ( 0) 1932 ( 1)
%%% 1606 ( 3) 1770 ( 0) 1934 ( 0)
%%% 1607 ( 0) 1771 ( 0) 1935 ( 3)
%%% 1608 ( 0) 1772 ( 0) 1936 ( 2)
%%% 1610 ( 0) 1774 ( 0) 1938 ( 2)
%%% 1611 ( 0) 1775 ( 0) 1939 ( 7)
%%% 1612 ( 0) 1776 ( 0) 1940 ( 3)
%%% 1613 ( 0) 1777 ( 0) 1941 ( 5)
%%% 1614 ( 0) 1778 ( 0) 1942 ( 2)
%%% 1615 ( 0) 1779 ( 0) 1943 ( 9)
%%% 1616 ( 0) 1780 ( 0) 1944 ( 2)
%%% 1617 ( 0) 1781 ( 0) 1945 ( 6)
%%% 1618 ( 0) 1782 ( 0) 1946 ( 1)
%%% 1619 ( 0) 1783 ( 0) 1947 ( 1)
%%% 1620 ( 1) 1784 ( 0) 1948 ( 3)
%%% 1621 ( 3) 1785 ( 0) 1949 ( 1)
%%% 1624 ( 0) 1788 ( 0) 1952 ( 2)
%%% 1625 ( 0) 1789 ( 0) 1953 ( 1)
%%% 1626 ( 0) 1790 ( 0) 1954 ( 1)
%%% 1627 ( 1) 1791 ( 0) 1955 ( 4)
%%% 1628 ( 0) 1792 ( 0) 1956 ( 3)
%%% 1629 ( 0) 1793 ( 0) 1957 ( 3)
%%% 1630 ( 0) 1794 ( 0) 1958 ( 2)
%%% 1631 ( 0) 1795 ( 0) 1959 ( 1)
%%% 1632 ( 0) 1796 ( 0) 1960 ( 6)
%%% 1633 ( 1) 1797 ( 0) 1961 ( 5)
%%% 1635 ( 0) 1799 ( 0) 1963 ( 3)
%%% 1636 ( 0) 1800 ( 0) 1964 ( 1)
%%% 1637 ( 0) 1801 ( 0) 1965 ( 1)
%%% 1638 ( 0) 1802 ( 0) 1966 ( 3)
%%% 1639 ( 0) 1803 ( 0) 1967 ( 9)
%%% 1640 ( 0) 1804 ( 0) 1968 ( 6)
%%% 1641 ( 1) 1805 ( 0) 1969 ( 4)
%%% 1642 ( 0) 1806 ( 0) 1970 ( 7)
%%% 1643 ( 0) 1807 ( 0) 1971 ( 5)
%%% 1644 ( 2) 1808 ( 0) 1972 ( 2)
%%% 1645 ( 0) 1809 ( 0) 1973 ( 9)
%%% 1646 ( 0) 1810 ( 0) 1974 ( 14)
%%% 1647 ( 0) 1811 ( 0) 1975 ( 18)
%%% 1648 ( 0) 1812 ( 0) 1976 ( 21)
%%% 1649 ( 0) 1813 ( 0) 1977 ( 20)
%%% 1650 ( 0) 1814 ( 0) 1978 ( 30)
%%% 1651 ( 0) 1815 ( 0) 1979 ( 50)
%%% 1652 ( 0) 1816 ( 0) 1980 ( 36)
%%% 1653 ( 0) 1817 ( 0) 1981 ( 49)
%%% 1654 ( 0) 1818 ( 0) 1982 ( 60)
%%% 1655 ( 0) 1819 ( 0) 1983 ( 71)
%%% 1656 ( 0) 1820 ( 0) 1984 ( 60)
%%% 1657 ( 0) 1821 ( 0) 1985 ( 115)
%%% 1658 ( 0) 1822 ( 0) 1986 ( 67)
%%% 1659 ( 0) 1823 ( 0) 1987 ( 81)
%%% 1660 ( 0) 1824 ( 0) 1988 ( 110)
%%% 1661 ( 0) 1825 ( 0) 1989 ( 100)
%%% 1662 ( 0) 1826 ( 0) 1990 ( 1)
%%% 1665 ( 0) 1829 ( 0) 1993 ( 2)
%%% 1666 ( 1) 1830 ( 0) 1994 ( 0)
%%% 1668 ( 0) 1832 ( 0) 1996 ( 1)
%%% 1669 ( 0) 1833 ( 0) 1997 ( 1)
%%% 1670 ( 0) 1834 ( 0) 1998 ( 1)
%%% 1671 ( 0) 1835 ( 0) 1999 ( 2)
%%% 1673 ( 0) 1837 ( 0) 2001 ( 1)
%%% 1676 ( 1) 1840 ( 0) 2004 ( 0)
%%% 1681 ( 0) 1845 ( 0) 2009 ( 1)
%%% 19xx ( 2)
%%%
%%% Article: 422
%%% Book: 291
%%% InCollection: 31
%%% InProceedings: 137
%%% Manual: 19
%%% MastersThesis: 39
%%% Misc: 15
%%% Periodical: 3
%%% PhdThesis: 12
%%% Proceedings: 62
%%% TechReport: 54
%%% Unpublished: 3
%%%
%%% Total entries: 1088
%%%
%%% There is a hypertext bibliography of
%%% classical cryptography at
%%%
%%% http://ourworld.compuserve.com/homepages/crypto/BIB1XX.HTM
%%%
%%% CIPHER, the Electronic Newsletter of the
%%% Technical Committee on Security and Privacy,
%%% A Technical Committee of the Computer Society
%%% of the IEEE, is available on the World-Wide
%%% Web at
%%%
%%% http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher
%%%
%%% with pointers to all back issues (1994--1998).
%%%
%%% ``CRYPTO-GRAM is a free monthly newsletter
%%% providing summaries, analyses, insights, and
%%% commentaries on cryptography and computer
%%% security. To subscribe, visit
%%%
%%% http://www.counterpane.com/crypto-gram.html
%%%
%%% or send a blank message to
%%%
%%% crypto-gram-subscribe at chaparraltree.com
%%%
%%% Back issues are available on
%%%
%%% http://www.counterpane.com''
%%%
%%% CRYPTO-GRAM is a good source of news of
%%% recent developments in the field, and
%%% contains many interesting essays on aspects
%%% of cryptography.
%%%
%%% There is a Web site on steganography at
%%%
%%% http://www.cl.cam.ac.uk/~fapp2/steganography/
%%%
%%% In this bibliography, entries are sorted
%%% first by ascending year, and within each
%%% year, alphabetically by author or editor,
%%% and then, if necessary, by the 3-letter
%%% abbreviation at the end of the BibTeX
%%% citation tag, using the bibsort -byyear
%%% utility. Year order has been chosen to
%%% make it easier to identify the most recent
%%% work.
%%%
%%% The checksum field above contains a CRC-16
%%% checksum as the first value, followed by the
%%% equivalent of the standard UNIX wc (word
%%% count) utility output of lines, words, and
%%% characters. This is produced by Robert
%%% Solovay's checksum utility.",
%%% }
%%% ====================================================================
@Preamble{
"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"
# "\ifx \undefined \cprime \def \cprime {$\mathsurround=0pt '$}\fi"
# "\ifx \undefined \Dbar \def \Dbar {\leavevmode\raise0.2ex\hbox{--}\kern-0.5emD} \fi"
# "\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi"
# "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi"
# "\ifx \undefined \operatorname \def \operatorname #1{{\rm #1}}\fi"
# "\hyphenation{
Aba-di
Arch-ives
Ding-yi
for-ge-ry
Go-pa-la-krish-nan
Hi-de-ki
Kraw-czyk
Lands-verk
Law-rence
Leigh-ton
Mich-ael
Moell-er
North-ridge
para-digm
para-digms
Piep-rzyk
Piv-e-teau
Ram-kilde
Re-tro-fit-ting
Rich-ard
Sho-stak
Si-ro-mo-n-ey
Ste-ph-en
The-o-dore
Tho-m-as
Tzone-lih
venge-ance
Will-iam
Ye-sh-i-va
}"
}
%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-bs = "Bruce Schneier,
Counterpane Systems,
101 East Minnehaha Parkway,
Minneapolis, MN 55419,
e-mail: \path|schneier@counterpane.com"}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{ack-pb = "Preston Briggs,
Tera Computer Company,
2815 Eastlake East,
Seattle, WA 98102,
USA,
Tel: +1 206 325-0800,
e-mail: \path|preston@tera.com|"}
%%% ====================================================================
%%% Institution abbreviations:
@String{inst-COUNTERPANE-INTERNET-SECURITY = "Counterpane Internet Security"}
@String{inst-COUNTERPANE-INTERNET-SECURITY:adr = "3031 Tisch Way, Suite 100PE,
San Jose, CA 95128, USA"}
@String{inst-COUNTERPANE-LABS = "Counterpane Systems"}
@String{inst-COUNTERPANE-LABS:adr = "101 East Minnehaha Parkway, Minneapolis,
MN 55419"}
@String{inst-COUNTERPANE-SYSTEMS = "Counterpane Systems"}
@String{inst-COUNTERPANE-SYSTEMS:adr = "101 East Minnehaha Parkway, Minneapolis,
MN 55419"}
%% Old address:
%% String{inst-COUNTERPANE-SYSTEMS:adr = "Oak Park, IL, USA"}
@String{inst-CSU = "Colorado State University"}
@String{inst-CSU:adr = "Fort Collins, CO, USA"}
@String{inst-IBM-WATSON = "IBM T. J. Watson Research Center"}
@String{inst-IBM-WATSON:adr = "Yorktown Heights, NY, USA"}
@String{inst-KENT-STATE-UNIV = "Kent State University"}
@String{inst-KENT-STATE-UNIV:adr = "Kent, OH, USA"}
@String{inst-MIT-CS = "Massachusetts Institute of Technology,
Computer Science Lab."}
@String{inst-MIT:adr = "Cambridge, Massachusetts"}
@String{inst-NORTHWESTERN-UNIVERSITY = "Northwestern University"}
@String{inst-NORTHWESTERN-UNIVERSITY:adr = "Evanston, IL, USA"}
@String{inst-SRC-IDA = "Supercomputing Research Center: IDA"}
@String{inst-SRC-IDA:adr = "Lanham, MD, USA"}
@String{inst-UC-BERKELEY-ICSI = "International Computer Science Institute"}
@String{inst-UC-BERKELEY-ICSI:adr = "Berkeley, CA, USA"}
@String{inst-UIUC-CSRD = "University of Illinois at Urbana-Champaign,
Center for Supercomputing Research and
Development"}
@String{inst-UIUC-CSRD:adr = "Urbana, IL 61801, USA"}
@String{inst-UTK = "University of Tennessee, Knoxville"}
@String{inst-UTK:adr = "Knoxville, TN 37996, USA"}
%%% ====================================================================
%%% Journal abbreviations:
@String{j-ADV-ENG-SOFTWARE = "Advances in Engineering Software"}
@String{j-ADV-IMAGING = "Advanced Imaging"}
@String{j-ALGORITHMICA = "Algorithmica"}
@String{j-AM-DOC = "American Documentation"}
@String{j-AMER-MATH-MONTHLY = "American Mathematical Monthly"}
@String{j-AMER-STAT = "The American Statistician"}
@String{j-ANN-BIOMED-ENG = "Annals of biomedical engineering"}
@String{j-ANN-HIST-COMPUT = "Annals of the History of Computing"}
@String{j-ANN-MATH = "Annals of Mathematics"}
@String{j-ANNALS-MATH-STAT = "Ann. Math. Stat."}
@String{j-APPL-ALGEBRA-ENG-COMMUN-COMPUT = "Applicable algebra in engineering,
communication and computing"}
@String{j-APPL-MATH-COMP = "Applied Mathematics and Computation"}
@String{j-APPL-MATH-LETT = "Applied Mathematics Letters"}
@String{j-APPL-NUM-MATH = "Applied Numerical Mathematics: Transactions
of IMACS"}
@String{j-APPL-STAT = "Applied Statistics"}
@String{j-ATT-BELL-LAB-TECH-J = "ATT Bell Lab. tech. j"}
@String{j-ATT-TECH-J = "AT\&T Technical Journal"}
@String{j-BANK-SYST-TECHNOL = "Bank systems + technology"}
@String{j-BELL-SYST-TECH-J = "The Bell System Technical Journal"}
@String{j-BIT = "BIT"}
@String{j-BT-TECH-J = "BT Technology Journal"}
@String{j-BULL-AUSTRAL-MATH-SOC = "Bulletin of the Australian Mathematical
Society"}
@String{j-BYTE = "BYTE Magazine"}
@String{j-C-PLUS-PLUS-REPORT = "C++ Report"}
@String{j-CACM = "Communications of the Association for
Computing Machinery"}
@String{j-CCCUJ = "C/C++ Users Journal"}
@String{j-CG-WORLD = "Computer Graphics World"}
@String{j-CGF = "Com{\-}pu{\-}ter Graphics Forum"}
@String{j-CGIP = "Computer Graphics and Image Processing"}
@String{j-CHIN-J-COMPUTERS = "Chinese Journal of Computers = Chi suan chi
hsueh pao"}
@String{j-CISCO-WORLD = "Cisco World: The Independent Journal for
Internetworking Professionals"}
@String{j-COLLEGE-MATH-J = "College Mathematics Journal"}
@String{j-COMP-ARCH-NEWS = "ACM SIGARCH Computer Architecture News"}
@String{j-COMP-COMM-REV = "Computer Communications Review, ACM
SIGCOMM"}
@String{j-COMP-GRAPHICS = "Computer Graphics"}
@String{j-COMP-J = "The Computer Journal"}
@String{j-COMP-LANG-MAG = "Computer Language Magazine"}
@String{j-COMP-LANGS = "Computer Languages"}
@String{j-COMP-LAW-SECURITY-REP = "The Computer Law and Security Report"}
@String{j-COMP-MATH-APPL = "Computers and Mathematics with
Applications"}
@String{j-COMP-NET = "Computer Networks: The International Journal
of Distributed Informatique"}
@String{j-COMP-NET-AMSTERDAM = "Computer Networks (Amsterdam, Netherlands:
1999)"}
@String{j-COMP-NET-ISDN = "Computer Networks and ISDN Systems"}
@String{j-COMP-PHYSICS = "Computers in physics"}
@String{j-COMP-STRUCTURES = "Computers and Structures"}
@String{j-COMP-SURV = "ACM Computing Surveys"}
@String{j-COMP-SYS = "Computing Systems"}
@String{j-COMPLEX-SYSTEMS = "Complex Systems"}
@String{j-COMPUT-COMPLEX = "Computational complexity"}
@String{j-COMPUT-METH-PROG-BIOMED = "Computer Methods and Programs in
Biomedicine"}
@String{j-COMPUT-SECUR = "Computers and Security"}
@String{j-COMPUT-SECUR-J = "Computer Security Journal"}
@String{j-COMPUT-SYST-ENG = "Computing systems in engineering: an
international journal"}
@String{j-COMPUT-SYST-SCI-ENG = "Computer Systems Science and Engineering"}
@String{j-COMPUTER = "Computer"}
@String{j-COMPUTERS-AND-GRAPHICS = "Computers and Graphics"}
@String{j-COMPUTERWORLD = "Computerworld"}
@String{j-COMPUTING = "Computing"}
%%%
@String{j-CONG-NUM = "Congressus Numerantium"}
@String{j-CONN-LAW-REVIEW = "Connecticut Law Review"}
@String{j-CRYPTOBYTES = "CryptoBytes"}
@String{j-CRYPTOLOG = "Cryptolog"}
@String{j-CRYPTOLOGIA = "Cryptologia"}
@String{j-CUJ = "C Users Journal"}
@String{j-CVGIP = "Computer Vision, Graphics, and Image
Processing"}
@String{j-CVGIP-GMIP = "Computer Vision, Graphics, and Image
Processing. Graphical Models and Image
Processing"}
@String{j-DATAMATION = "Datamation"}
@String{j-DDDU = "Dr. Dobb's Developer Update"}
@String{j-DDJ = "Dr. Dobb's Journal of Software Tools"}
@String{j-DEC-TECH-J = "Digital Technical Journal of Digital
Equipment Corporation"}
@String{j-DESIGN-NEWS = "Design news"}
@String{j-DESIGNS-CODES-CRYPTOGR = "Designs, Codes, and Cryptography"}
@String{j-DISCRETE-APPL-MATH = "Discrete Applied Mathematics"}
@String{j-DISCRETE-MATH-APPL = "Discrete Mathematics and Applications"}
@String{j-ELECT-COMM-JAPAN-3-FUND-ELECT-SCI = "Electronics and communications
in Japan. Part 3, Fundamental electronic
science"}
@String{j-ELECT-LETTERS = "Electronics Letters"}
@String{j-ELECTRONICS = "Electronics"}
@String{j-EMBED-SYS-PROG = "Embedded Systems Programming"}
@String{j-ENG-FRACTURE-MECH = "Engineering fracture mechanics"}
@String{j-EPODD = "Electronic
Pub\-lish\-ing\emdash{}Orig\-i\-na\-tion,
Dissemination, and Design"}
@String{j-ETT = "European Transactions on
Telecommunications: ETT"}
@String{j-EUR-J-OPER-RES = "European Journal of Operational Research"}
@String{j-EUR-TRANS-TELECOMM = "European transactions on telecommunications
and related technologies"}
@String{j-EUUG-NEWSLETTER = "EUUG Newsletter"}
@String{j-FINANC-TECH-INT-BULL = "Financial Technology International
Bulletin"}
@String{j-FUT-GEN-COMP-SYS = "Future Generation Computer Systems"}
@String{j-GRAPH-MODELS-IMAGE-PROC = "Graphical models and image processing:
GMIP"}
@String{j-HEWLETT-PACKARD-J = "Hew\-lett-Pack\-ard Journal: technical
information from the laboratories of
Hew\-lett-Pack\-ard Company"}
@String{j-HIST-MATH = "Historia Mathematica"}
@String{j-IBM-JRD = "IBM Journal of Research and Development"}
@String{j-IBM-SYS-J = "IBM Systems Journal"}
@String{j-IEE-CONF-PUBL = "IEE conference publication"}
@String{j-IEE-PROC-VIS-IMAGE-SIGNAL-PROCESS = "IEE proceedings. Vision, image,
and signal processing"}
@String{j-IEEE-ANN-HIST-COMPUT = "IEEE Annals of the History of Computing"}
@String{j-IEEE-ASSP = "IEEE Trans. ASSP"}
@String{j-IEEE-CGA = "IEEE Computer Graphics and Applications"}
@String{j-IEEE-COMM-MAG = "IEEE Communications Magazine"}
@String{j-IEEE-J-SEL-AREAS-COMMUN = "IEEE Journal on Selected Areas in
Communications"}
@String{j-IEEE-MICRO = "IEEE Micro"}
@String{j-IEEE-MULTIMEDIA = "IEEE MultiMedia"}
@String{j-IEEE-PAR-DIST-TECH = "IEEE parallel and distributed technology:
systems and applications"}
@String{j-IEEE-SOFTWARE = "IEEE Software"}
@String{j-IEEE-SPECTRUM = "IEEE Spectrum"}
@String{j-IEEE-TRANS-COMM = "IEEE Transactions on Communications"}
@String{j-IEEE-TRANS-COMPUT = "IEEE Transactions on Computers"}
@String{j-IEEE-TRANS-CONSUMER-ELECTRONICS = "IEEE Transactions on Consumer
Electronics"}
@String{j-IEEE-TRANS-IMAGE-PROCESS = "IEEE Transactions on Image Processing"}
@String{j-IEEE-TRANS-INF-THEORY = "IEEE Transactions on Information Theory"}
@String{j-IEEE-TRANS-NETWORKING = "IEEE\slash ACM Transactions on Networking"}
@String{j-IEEE-TRANS-PAR-DIST-SYS = "IEEE Transactions on Parallel and
Distributed Systems"}
@String{j-IEEE-TRANS-PATT-ANAL-MACH-INTEL = "IEEE Transactions on Pattern
Analysis and Machine Intelligence"}
@String{j-IEEE-TRANS-PROF-COMM = "IEEE Transactions on Professional
Communication"}
@String{j-IEICE-TRANS-FUND-ELECT = "IEICE Transactions on Fundamentals of
Electronics Communications and Computer
Sciences"}
@String{j-IJQC = "International Journal of Quantum Chemistry"}
@String{j-IJSAHPC = "The International Journal of Supercomputer
Applications and High Performance Computing"}
@String{j-IMAGE-VIS-COMPUT = "Image and Vision Computing"}
@String{j-INF-COMM-TECH-LAW = "Information \& Communications Technology
Law"}
@String{j-INF-COMPUT = "Information and Computation"}
@String{j-INF-CONTROL = "Information and Control"}
@String{j-INF-SOC = "The Information Society"}
@String{j-INFO-PROC-LETT = "Information Processing Letters"}
@String{j-INFO-PROC-MAN = "Information Processing and Management"}
@String{j-INFORMATION-WEEK = "Information Week"}
@String{j-INT-J-BIFURC-CHAOS-APPL-SCI-ENG = "International journal of
bifurcation and chaos in applied sciences and
engineering"}
@String{j-INT-J-COMPUT-INF-SCI = "International Journal of Computer and
Information Sciences"}
@String{j-INT-J-COMPUT-MATH = "International Journal of Computer
Mathematics"}
@String{j-INT-J-COMPUT-SYST-SCI-ENG = "International Journal of Computer
Systems Science and Engineering"}
@String{j-INT-J-ELECTRON = "International Journal of Electronics
Theoretical \& Experimental"}
@String{j-INT-J-SYST-SCI = "International Journal of Systems Science"}
@String{j-INT-J-THEOR-PHYS = "International Journal of Theoretical
Physics"}
@String{j-INTELL-NATL-SECUR = "Intelligence and National Security"}
@String{j-ISIS = "Isis"}
@String{j-J-ACM = "Journal of the Association for Computing
Machinery"}
@String{j-J-ALG = "Journal of Algorithms"}
@String{j-J-COMP-SCI-TECH = "Journal of computer science and technology"}
@String{j-J-COMP-SECUR = "Journal of Computer Security"}
@String{j-J-COMP-SYS-SCI = "Journal of Computer and System Sciences"}
@String{j-J-CRYPTOLOGY = "Journal of Cryptology"}
@String{j-J-DOC = "Journal of Documentation"}
@String{j-J-ELECTRON-IMAGING = "Journal of Electronic Imaging"}
@String{j-J-ENG-MECH = "Journal of Engineering Mechanics"}
@String{j-J-MATH-PHYS = "Journal of Mathematical Physics"}
@String{j-J-PAR-DIST-COMP = "Journal of Parallel and Distributed
Computing"}
@String{j-J-PHYS-E = "Journal of Physics. E: Scientific
Instruments"}
@String{j-J-RES-NATL-INST-STAND-TECHNOL = "Journal of research of the National
Institute of Standards and Technology"}
@String{j-J-SCI-IND-RES = "Journal of Scientific and Industrial
Research"}
@String{j-J-SIAM = "Journal of the Society for Industrial and
Applied Mathematics"}
@String{j-J-SUPERCOMPUTING = "The Journal of Supercomputing"}
@String{j-J-SYMBOLIC-COMP = "Journal of Symbolic Computation"}
@String{j-J-SYST-SOFTW = "The Journal of Systems and Software"}
@String{j-J-UCS = "J.UCS: Journal of Universal Computer
Science"}
@String{j-J-VIS-COMP-ANIMATION = "The Journal of Visualization and Computer
Animation"}
@String{j-JAVAWORLD = "JavaWorld: IDG's magazine for the Java
community"}
@String{j-LECT-NOTES-COMP-SCI = "Lecture Notes in Computer Science"}
@String{j-LINEAR-ALGEBRA-APPL = "Linear Algebra and its Applications"}
@String{j-LINUX-J = "Linux Journal"}
@String{j-LMS-J-COMPUT-MATH = "LMS Journal of Computation and Mathematics"}
@String{j-LOGIN = ";login: the USENIX Association newsletter"}
@String{j-MACUSER = "MacUser"}
@String{j-MATH-COMP-EDU = "Mathematics and computer education"}
@String{j-MATH-COMP-MODELLING = "Mathematical and computer modelling"}
@String{j-MATH-COMPUT = "Mathematics of Computation"}
@String{j-MATH-GAZ = "The Mathematical Gazette"}
@String{j-MATH-MAG = "Mathematics Magazine"}
@String{j-MATH-SEMESTERBER = "Mathematische Semesterberichte"}
@String{j-MATH-SLOVACA = "Mathematica Slovaca"}
@String{j-MATHEMATICA-J = "Mathematica Journal"}
@String{j-MATHEMATIKA = "Mathematika"}
@String{j-MICROELECT-RELIABILITY = "Microelectronics and Reliability"}
@String{j-N-I-A-CR = "Newsletter of the International Association
for Cryptologic Research"}
@String{j-NAMS = "Notices of the American Mathematical
Society"}
@String{j-NORDIC-J-COMPUT = "Nordic Journal of Computing"}
@String{j-NTT-R-D = "NTT R\&D"}
@String{j-NUM-LIN-ALG-APPL = "Numerical linear algebra with applications"}
@String{j-NUM-MATH = "Numerische Mathematik"}
@String{j-NUMER-ALGORITHMS = "Numerical Algorithms"}
@String{j-OBZORNIK-MAT-FIZ = "Dru{\\v{s}}tvo Matematikov, Fizikov in
Astronomov SRS. Obzornik za Matematiko in
Fiziko"}
@String{j-OPEN-COMPUTING = "Open Computing"}
@String{j-OPEN-SYSTEMS-TODAY = "Open Systems Today"}
@String{j-OPER-SYS-REV = "Operating Systems Review"}
@String{j-PARALLEL-ALGORITHMS-APPL = "Parallel Algorithms and Applications"}
@String{j-PARALLEL-COMPUTING = "Parallel Computing"}
@String{j-PARALLEL-PROCESS-LETT = "Parallel Processing Letters"}
@String{j-PC-TECH = "PC Techniques"}
@String{j-PERFORM-COMPUT = "Performance Computing"}
@String{j-PHILIPS-J-RES = "Philips Journal of Research"}
@String{j-PROC-ICASSP = "Proceedings of the International Conference
on Acoustics, Speech, and Signal Processing"}
@String{j-PROC-CAMBRIDGE-PHIL-SOC = "Proceedings of the Cambridge Philosophical
Society. Mathematical and physical sciences"}
@String{j-PROC-IEEE = "Proceedings of the IEEE"}
@String{j-PROC-SPIE = "Proceedings of the SPIE --- The
International Society for Optical
Engineering"}
@String{j-SCI-AMER = "Scientific American"}
@String{j-SCI-AMER-INT-ED = "Scientific American [International
Edition]"}
@String{j-SCI-COMPUT-PROGRAM = "Science of Computer Programming"}
@String{j-SCIENCE = "Science"}
@String{j-SIAM-J-ALG-DISC-METH = "SIAM Journal on Algebraic and Discrete
Methods"}
@String{j-SIAM-J-APPL-MATH = "SIAM Journal on Applied Mathematics"}
@String{j-SIAM-J-COMPUT = "SIAM Journal on Computing"}
@String{j-SIAM-J-DISCR-MATH = "SIAM Journal on Discrete Mathematics"}
@String{j-SIAM-J-MAT-ANA-APPL = "SIAM Journal on Matrix Analysis and
Applications"}
@String{j-SIAM-J-NUMER-ANAL = "SIAM Journal on Numerical Analysis"}
@String{j-SIAM-J-SCI-STAT-COMP = "SIAM Journal on Scientific and Statistical
Computing"}
@String{j-SIAM-REVIEW = "SIAM Review"}
@String{j-SIG-PROC = "Signal Processing"}
@String{j-SIGACT = "ACM SIGACT News"}
@String{j-SIGADA-LETTERS = "ACM SIGADA Ada Letters"}
@String{j-SIGCSE = "SIGCSE Bulletin (ACM Special Interest Group
on Computer Science Education)"}
@String{j-SIGMETRICS = "ACM SIGMETRICS Performance Evaluation
Review"}
@String{j-SIGMOD = "SIGMOD Record (ACM Special Interest Group
on Management of Data)"}
@String{j-SIGNUM = "ACM SIGNUM Newsletter"}
@String{j-SIGPLAN = "ACM SIG{\-}PLAN Notices"}
@String{j-SIGSAM = "SIGSAM Bulletin (ACM Special Interest Group
on Symbolic and Algebraic Manipulation)"}
@String{j-SMITHSONIAN = "Smithsonian"}
@String{j-SOUTHCON = "Southcon Conference Record"}
@String{j-SPE = "Soft\-ware\emdash Prac\-tice and
Experience"}
@String{j-SUNSERVER = "SunServer"}
@String{j-SUPER-REV = "Supercomputing Review"}
@String{j-SUPERCOMPUTER = "Supercomputer"}
@String{j-SUPERCOMPUTING-REVIEW = "Supercomputing Review"}
@String{j-SYS-ADMIN = "Sys Admin: The Journal for UNIX Systems
Administrators"}
@String{j-SYS-COMP-JAPAN = "Systems and computers in Japan"}
@String{j-TECH-COMMUN = "Technical Communication"}
@String{j-TELECOMMUNICATIONS-AMERICAS-ED = "Telecommunications (Americas Edition)"}
@String{j-THEOR-COMP-SCI = "Theoretical Computer Science"}
@String{j-TOCS = "ACM Transactions on Computer Systems"}
@String{j-TODS = "ACM Transactions on Database Systems"}
@String{j-TOIS = "ACM Transactions on Information Systems"}
@String{j-TOMS = "ACM Transactions on Mathematical Software"}
@String{j-TOOIS = "ACM Transactions on Office Information
Systems"}
@String{j-TOPLAS = "ACM Transactions on Programming Languages
and Systems"}
@String{j-TRANS-AM-NUCL-SOC = "Transactions of the American Nuclear
Society"}
@String{j-UNIX-DEVELOPER = "UNIX Developer"}
@String{j-UNIX-WORLD = "UNIX/world"}
@String{j-WEBSERVER = "WebServer Magazine: For Managers of World
Wide Web Sites"}
@String{j-WORD-WAYS = "Word Ways"}
@String{j-X-RESOURCE = "{The X Resource}"}
%%% ====================================================================
%%% Organization abbreviations:
@String{org-GENERAL-ELECTRIC = "General Electric"}
@String{org-GENERAL-ELECTRIC:adr = "Schenectady, NY, USA"}
%%% ====================================================================
%%% Publisher abbreviations:
@String{pub-A-K-PETERS = "A. K. Peters, Ltd."}
@String{pub-A-K-PETERS:adr = "Wellesley, MA, USA"}
@String{pub-ACADEMIC = "Academic Press"}
@String{pub-ACADEMIC:adr = "New York, NY, USA"}
@String{pub-ACM = "ACM Press"}
@String{pub-ACM:adr = "New York, NY 10036, USA"}
@String{pub-AEGEAN-PARK = "Aegean Park Press"}
@String{pub-AEGEAN-PARK:adr = "Laguna Hills, CA, USA"}
@String{pub-AFIPS = "AFIPS Press"}
@String{pub-AFIPS:adr = "Montvale, NJ, USA"}
@String{pub-AMS = "American Mathematical Society"}
@String{pub-AMS:adr = "Providence, RI, USA"}
@String{pub-ANSI = "American National Standards Institute"}
@String{pub-ANSI:adr = "1430 Broadway, New York, NY 10018, USA"}
@String{pub-AP-PROFESSIONAL = "AP Professional"}
@String{pub-AP-PROFESSIONAL:adr = "Boston, MA, USA"}
@String{pub-ARTECH = "Artech House Inc."}
@String{pub-ARTECH:adr = "Norwood, MA, USA"}
@String{pub-AW = "Ad{\-d}i{\-s}on-Wes{\-l}ey"}
@String{pub-AW:adr = "Reading, MA, USA"}
@String{pub-BIRKHAUSER = "Birkh{\"a}user Verlag"}
@String{pub-BIRKHAUSER:adr = "Basel, Switzerland"}
@String{pub-BLACKWELL-SCI = "Blackwell Scientific Publications"}
@String{pub-BLACKWELL-SCI:adr = "Oxford, UK"}
@String{pub-CAMBRIDGE = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr = "Cambridge, UK"}
@String{pub-CHAPMAN-HALL = "Chapman and Hall, Ltd."}
@String{pub-CHAPMAN-HALL:adr = "London, UK"}
@String{pub-CLARENDON = "Clarendon Press"}
@String{pub-CLARENDON:adr = "Oxford, UK"}
@String{pub-CRC = "CRC Press"}
@String{pub-CRC:adr = "2000 N.W. Corporate Blvd., Boca Raton,
FL 33431-9868, USA"}
@String{pub-CUP = "Cambridge University Press"}
@String{pub-CUP:adr = "New York, NY, USA"}
@String{pub-DEKKER = "Marcel Dekker, Inc."}
@String{pub-DEKKER:adr = "New York, NY, USA"}
@String{pub-DOUBLEDAY = "Doubleday"}
@String{pub-DOUBLEDAY:adr = "New York, NY, USA"}
@String{pub-DOVER = "Dover Publications, Inc."}
@String{pub-DOVER:adr = "New York, NY, USA"}
@String{pub-ELSEVIER = "Elsevier"}
@String{pub-ELSEVIER:adr = "Amsterdam, The Netherlands"}
@String{pub-ESP = "Elsevier Science Publishers"}
@String{pub-ESP:adr = "Amsterdam, The Netherlands"}
@String{pub-FREEMAN = "W.H. Freeman"}
@String{pub-FREEMAN:adr = "San Francisco, CA, USA and New York, NY,
USA"}
@String{pub-GORDON-BREACH = "Gordon and Breach"}
@String{pub-GORDON-BREACH:adr = "Langhorne, PA, USA"}
@String{pub-HARCOURT-BRACE-JOVANOVICH = "Harcourt, Brace, Jovanovich"}
@String{pub-HARCOURT-BRACE-JOVANOVICH:adr = "San Diego, CA, USA"}
@String{pub-HARPER-ROW = "Harper \& Row"}
@String{pub-HARPER-ROW:adr = "New York, NY, USA"}
@String{pub-HARTUNG-GORRE = "Hartung-Gorre Verlag"}
@String{pub-HARTUNG-GORRE:adr = "Konstanz, Switzerland"}
@String{pub-HAYDEN-BOOK = "Hayden Book Co."}
@String{pub-HAYDEN-BOOK:adr = "Rochelle Park, NJ, USA"}
@String{pub-HOLDEN-DAY = "Holden-Day"}
@String{pub-HOLDEN-DAY:adr = "San Francisco, CA, USA"}
@String{pub-HOUGHTON-MIFFLIN = "Houghton-Mifflin"}
@String{pub-HOUGHTON-MIFFLIN:adr = "Boston, MA, USA"}
@String{pub-IBM = "IBM Corporation"}
@String{pub-IBM:adr = "San Jose, CA, USA"}
@String{pub-IEE = "IEE"}
@String{pub-IEE:adr = "London, UK"}
@String{pub-IEEE = "IEEE Computer Society Press"}
@String{pub-IEEE:adr = "1109 Spring Street, Suite 300, Silver
Spring, MD 20910, USA"}
@String{pub-IMA = "Institute of Mathematics and its
Applications"}
@String{pub-IMA:adr = "Southend-on-Sea, UK"}
@String{pub-IOS = "IOS Press"}
@String{pub-IOS:adr = "Postal Drawer 10558, Burke, VA 2209-0558,
USA"}
@String{pub-ISO = "International Organization for
Standardization"}
@String{pub-ISO:adr = "Geneva, Switzerland"}
@String{pub-JOHNS-HOPKINS = "The Johns Hopkins University Press"}
@String{pub-JOHNS-HOPKINS:adr = "Baltimore, MD, USA"}
@String{pub-JW = "John Wiley"}
@String{pub-JW:adr = "New York, NY, USA"}
@String{pub-KAP = "Kluwer Academic Publisher"}
@String{pub-KAP:adr = "Norwell, MA, USA, and Dordrecht, The
Netherlands"}
@String{pub-KLUWER = "Kluwer Academic Publishers"}
@String{pub-KLUWER:adr = "Dordrecht, The Netherlands"}
@String{pub-KNOPF = "Alfred A. Knopf"}
@String{pub-KNOPF:adr = "New York, NY, USA"}
@String{pub-MACMILLAN = "MacMillan Publishing Company"}
@String{pub-MACMILLAN:adr = "New York, NY, USA"}
@String{pub-MANNING = "Manning Publications"}
@String{pub-MANNING:adr = "Greenwich, CT, USA"}
@String{pub-MASSON = "Masson Editeur"}
@String{pub-MASSON:adr = "Masson, France"}
@String{pub-MATH-ASSOC-AMER = "Mathematical Association of America"}
@String{pub-MATH-ASSOC-AMER:adr = "Washington, DC, USA"}
@String{pub-MCGRAW-HILL = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr = "New York, NY, USA"}
@String{pub-MILLER-FREEMAN = "Miller Freeman Publications"}
@String{pub-MILLER-FREEMAN:adr = "San Francisco, CA, USA"}
@String{pub-MINDQ = "MindQ Publishing, Inc."}
@String{pub-MINDQ:adr = "450 Springpark Place Ste. 1200, Herndon, VA
20170, USA, Tel: +1 703 708-9380"}
@String{pub-MIT = "MIT Press"}
@String{pub-MIT:adr = "Cambridge, MA, USA"}
@String{pub-NAP = "National Academy Press"}
@String{pub-NAP:adr = "Washington, DC, USA"}
@String{pub-NAT-COMP-CENTRE = "National Computing Centre"}
@String{pub-NAT-COMP-CENTRE:adr = "Manchester, UK"}
@String{pub-NBS = "U.S. National Bureau of Standards"}
@String{pub-NBS:adr = "Gaithersburg, MD, USA"}
@String{pub-NIST = "National Institute for Standards and
Technology"}
@String{pub-NIST:adr = "Gaithersburg, MD 20899-8900, USA"}
@String{pub-NORTH-HOLLAND = "North-Hol{\-}land"}
@String{pub-NORTH-HOLLAND:adr = "Amsterdam, The Netherlands"}
@String{pub-NORTON = "W. W. Norton \& Co."}
@String{pub-NORTON:adr = "New York, NY, USA"}
@String{pub-NTIS = "National Technical Information Service"}
@String{pub-NTIS:adr = "Washington, DC, USA"}
@String{pub-ORA = "O'Reilly \& {Associates, Inc.}"}
@String{pub-ORA:adr = "103a Morris Street, Sebastopol, CA 95472,
USA, Tel: +1 707 829 0515, and 90 Sherman
Street, Cambridge, MA 02140, USA, Tel: +1
617 354 5800"}
@String{pub-OXFORD = "Oxford University Press"}
@String{pub-OXFORD:adr = "Walton Street, Oxford OX2 6DP, UK"}
@String{pub-PEACHPIT = "Peachpit Press, Inc."}
@String{pub-PEACHPIT:adr = "1085 Keith Avenue, Berkeley, CA 94708, USA"}
@String{pub-PH = "Pren{\-}tice-Hall, Inc."}
@String{pub-PH:adr = "Upper Saddle River, NJ 07458, USA"}
@String{pub-PHPTR = "Pren{\-}tice-Hall PTR"}
@String{pub-PHPTR:adr = "Upper Saddle River, NJ 07458, USA"}
@String{pub-PLENUM = "Plenum Press"}
@String{pub-PLENUM:adr = "New York, NY, USA; London, UK"}
@String{pub-PRINCETON = "Princeton University Press"}
@String{pub-PRINCETON:adr = "Princeton, NJ, USA"}
@String{pub-PROJECT-GUTENBERG = "Project Gutenberg"}
@String{pub-PROJECT-GUTENBERG:adr = "P.O. Box 2782, Champaign, IL 61825-2782,
USA"}
@String{pub-RANDOM = "Random House"}
@String{pub-RANDOM:adr = "New York, NY, USA"}
@String{pub-REIDEL = "D. Reidel"}
@String{pub-REIDEL:adr = "Dordrecht, Boston, Lancaster, Tokyo"}
@String{pub-RSA = "RSA Data Security, Inc."}
@String{pub-RSA:adr = "Redwood City, CA, USA"}
@String{pub-SAMS = "Howard W. Sams"}
@String{pub-SAMS:adr = "Indianapolis, IN 46268, USA"}
@String{pub-SIAM = "Society for Industrial and Applied
Mathematics"}
@String{pub-SIAM:adr = "Philadelphia, PA, USA"}
@String{pub-SIMON-SCHUSTER = "Simon and Schuster"}
@String{pub-SIMON-SCHUSTER:adr = "1230 Ave. of the Americas, New York, NY
10020, USA"}
@String{pub-SPE = "Society of Petroleum Engineers"}
@String{pub-SPE:adr = "Richardson, TX, USA"}
@String{pub-SPIE = "Society of Photo-optical
Instrumentation Engineers (SPIE)"}
@String{pub-SPIE:adr = "Bellingham, WA, USA"}
@String{pub-SRI = "SRI International"}
@String{pub-SRI:adr = "333 Ravenswood Avenue, Menlo Park, CA
94025-3493, USA, Tel: +1 415 859 6387, FAX:
+1 415 859-6028"}
@String{pub-STATSCI = "StatSci, a Division of MathSoft, Inc."}
@String{pub-STATSCI:adr = "Seattle, WA, USA"}
@String{pub-SUN = "Sun Microsystems"}
@String{pub-SUN:adr = "2550 Garcia Avenue, Mountain View, CA
94043, USA"}
@String{pub-SV = "Spring{\-}er-Ver{\-}lag"}
@String{pub-SV:adr = "Berlin, Germany~/ Heidelberg, Germany~/
London, UK~/ etc."}
@String{pub-USC-ISI = "University of Southern California,
Information Sciences Institute"}
@String{pub-USC-ISI:adr = "Marina del Rey, CA, USA"}
@String{pub-USENIX = "USENIX Association"}
@String{pub-USENIX:adr = "Berkeley, CA, USA"}
@String{pub-USGPO = "United States Government Printing Office"}
@String{pub-USGPO:adr = "Washington, DC, USA"}
@String{pub-UTILITAS-MATH = "Utilitas Mathematica Publishers"}
@String{pub-UTILITAS-MATH:adr = "Winnipeg, Manitoba, Canada"}
@String{pub-VENTANA = "Ventana Press"}
@String{pub-VENTANA:adr = "Chapel Hill, NC, USA"}
@String{pub-WESTVIEW = "Westview Press"}
@String{pub-WESTVIEW:adr = "Boulder, CO, USA"}
@String{pub-WILEY = "John Wiley and Sons, Inc."}
@String{pub-WILEY:adr = "New York, NY, USA"}
@String{pub-WORLD-SCI = "World Scientific Publishing Co."}
@String{pub-WORLD-SCI:adr = "Singapore; Philadelphia, PA, USA; River
Edge, NJ, USA"}
%%% ====================================================================
%%% Series abbreviations:
@String{ser-LNAI = "Lecture Notes in Artificial Intelligence"}
@String{ser-LNCS = "Lecture Notes in Computer Science"}
@String{ser-LNMATH = "Lecture Notes in Mathematics"}
@String{ser-PROJECT-GUTENBERG = "Project Gutenberg"}
@String{ser-SIGPLAN = "ACM SIG{\-}PLAN Notices"}
%%% ====================================================================
%%% Bibliography entries, sorted by year, and then by citation label:
@Book{Trithemius:1518:PLS,
author = "Johannes Trithemius",
title = "Polygraphiae Libri Sex",
publisher = "????",
address = "????",
pages = "????",
year = "1518",
bibdate = "Thu Feb 05 06:27:05 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
remark = "This book is cited in a 4-Feb-2015 New York Times
article ``Cracking Codes through the Centuries'' as the
earliest printed book on cryptography.",
}
@Book{Trithemius:1606:CGT,
author = "Johannes Trithemius",
title = "Clauis generalis triplex in libros steganographicos
{Iohannis Trithemij} \ldots{}",
publisher = "Iohannis Berneri",
address = "Frankfurt, Germany",
pages = "7 + 1",
year = "1606",
LCCN = "Z103.T84 S 1606",
bibdate = "Wed Apr 14 06:33:41 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Ab ipso authore conscripta \ldots{} Darmbstadij:
Excudebat Balthasar Hofmann, impensis Iohannis Berneri,
bibliop. Francof., anno 1606.",
acknowledgement = ack-nhfb,
annote = "The Trithemius ciphers were finally solved in 1998 by
J. Reeds \cite{Reeds:1998:SCB}.",
}
@Book{Trithemius:1606:CSI,
author = "Johannes Trithemius",
title = "Clauis {Steganographiae Ioannis Trithemij}, abbatis
{Spanheimensis}, ad Serenissimum Principem Dn.
{Philippum} \ldots{}",
publisher = "Ioannem Bernerum",
address = "Frankfurt, Germany",
pages = "70",
year = "1606",
LCCN = "Z103.T84 S 1606",
bibdate = "Wed Apr 14 06:14:52 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Venundatur apud Ioannem Bernerum, bibliopolam
Francofurtensem, anno 1606.",
acknowledgement = ack-nhfb,
annote = "The Trithemius ciphers were finally solved in 1998 by
J. Reeds \cite{Reeds:1998:SCB}.",
}
@Book{Trithemius:1606:SHE,
author = "Johannes Trithemius",
title = "Steganographia: hoc est, ars per occultam scripturam
animi sui voluntatem absentibus aperiendi certa",
publisher = "Matthiae Beckeri",
address = "Frankfurt, Germany",
pages = "8 + 180",
year = "1606",
LCCN = "Z103.T84 S 1606",
bibdate = "Wed Apr 14 06:18:44 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Authore \ldots{} Ioanne Trithemio \ldots{}; praefixa
est huic operi sua clauis, seu vera introductio ab ipso
authore concinnata \ldots{} nunc vero in gratiam
secretioris philosophiae studiosorum publici iuris
facta. Francofurti. Ex officina typographica Matthiae
Beckeri, sumptibus Ioannis Berneri, anno 1606.",
acknowledgement = ack-nhfb,
annote = "The Trithemius ciphers were finally solved in 1998 by
J. Reeds \cite{Reeds:1998:SCB}.",
}
@Book{Schwenter:1620:SSN,
author = "Daniel Schwenter",
title = "{Steganologia \& steganographia nova: Geheime
magische, naturliche Red vnd Schreibkunst, einem in der
nahe vnd ferrne Alsbalden oder in gewiser Zeit, so woln
in Schimpff als Ernst, etwas verborgens vnnd geheimes
zu eroffnen durch Reden, Schreiben vnd mancherley
Instrumenta: item wie verborgene Schrifften zu machen,
auffzulosen, vnd mit sonderlichen Kunsten zu
schreiben}",
publisher = "Resene Gibronte Runeclus Hanedi",
address = "N{\"u}rnberg, Germany",
pages = "16 + 299 + 5",
year = "1620",
LCCN = "KK276 .E36 1575; Z103.5",
bibdate = "Wed Apr 14 06:21:05 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Publication year uncertain. Publicirt vnd an Tag
gegeben durch Resene Gibronte Runeclus Hanedi \ldots{}
Nurnberg: Inn Verlegung Simon Halbmayers.",
acknowledgement = ack-nhfb,
annote = "Schwenter, Daniel, 1585--1636. The Trithemius ciphers
were finally solved in 1998 by J. Reeds
\cite{Reeds:1998:SCB}.",
}
@Book{Trithemius:1621:CGT,
author = "Johannes Trithemius",
title = "Clauis generalis triplex in libros steganographicos
{Iohannis Trithemij} \ldots{}",
publisher = "Balthasar Hofmann",
address = "Darmstadt, Germany",
pages = "7 + 1",
year = "1621",
LCCN = "Z103 .T84 1621",
bibdate = "Wed Apr 14 06:07:51 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Ab ipso authore conscripta \ldots{} Darmbstadij.
Excudebat Balthasar Hofmann, impensis Iohannis Berneri,
bibliop. Francof., anno 1621.",
acknowledgement = ack-nhfb,
annote = "The Trithemius ciphers were finally solved in 1998 by
J. Reeds \cite{Reeds:1998:SCB}.",
}
@Book{Trithemius:1621:CSI,
author = "Johannes Trithemius",
title = "Clauis Steganographiae {Ioannis Trithemij}, abbatis
Spanheimensis, ad Serenissimum Principem Dn.
{Philippum} \ldots{}",
publisher = "Iohannem Bernerum",
address = "Frankfurt, Germany",
pages = "64",
year = "1621",
LCCN = "Z103 .T84 1621",
bibdate = "Wed Apr 14 06:09:58 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Venundatur apud Iohannem Bernerum, bibliopolam
Francofurtensem, anno 1621.",
acknowledgement = ack-nhfb,
annote = "The Trithemius ciphers were finally solved in 1998 by
J. Reeds \cite{Reeds:1998:SCB}.",
}
@Book{Trithemius:1621:SHE,
author = "Johannes Trithemius",
title = "Steganographia: hoc est, ars per occultam scripturam
animi sui voluntatem absentibus aperiendi certa",
publisher = "Balthasaris Aulaeandri",
address = "Darmstadt, Germany",
pages = "8 + 152 + 2",
year = "1621",
LCCN = "Z103 .T84 1621",
bibdate = "Wed Apr 14 06:04:51 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Authore \ldots{} Ioanne Trithemio \ldots{}; praefixa
est huic operi sua clauis, seu vera introductio ab ipso
authore concinnata \ldots{} nunc vero in gratiam
secretioris philosophiae studiosorum publici iuris
facta. Darmbstadij. Ex officina typographica
Balthasaris Aulaeandri, sumptibus vero Ioannis Berneri,
bibliop. Francof., anno 1621",
acknowledgement = ack-nhfb,
annote = "Trithemius, Johannes, 1462--1516. The Trithemius
ciphers were finally solved in 1998 by J. Reeds
\cite{Reeds:1998:SCB}.",
}
@Book{Puteanus:1627:EPC,
author = "Erycius Puteanus",
title = "{ErycI} Puteani Cryptographia Tassiana, sive,
Clandestina scripti",
publisher = "Typis Cornelii Coenesteynii",
address = "Louvanii",
pages = "18 + 2",
year = "1627",
LCCN = "Z103.5 .P88 1627",
bibdate = "Mon Sep 13 07:01:38 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Schwenter:1633:SSA,
author = "Daniel Schwenter",
title = "{Steganologia \& [i.e. et] steganographia aucta:
geheime, magische, naturliche Red vnnd Schreibkunst}",
publisher = "Resene Gibronte Runeclusam Hunidem",
address = "N{\"u}rnberg, Germany",
pages = "24 + 370",
year = "1633",
LCCN = "Z103 .S38 1633",
bibdate = "Wed Apr 14 06:28:21 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Auffs neue revidirt, an etlichen Orten corrigirt,
\ldots{} augirt, vnd dann zum drittenmal in Truck
verfertiget durch Janum Herculem de Sunde, sonst Resene
Gibronte Runeclusam Hunidem \ldots{}. Nurnberg, In
Verlegung Jeremiae Dumlers [between 1633 and 1636].",
acknowledgement = ack-nhfb,
annote = "The Trithemius ciphers were finally solved in 1998 by
J. Reeds \cite{Reeds:1998:SCB}.",
}
@Book{Wilkins:1641:MSS,
author = "John Wilkins",
title = "{Mercury}, or the Secret and Swift Messenger",
publisher = "????",
address = "????",
pages = "????",
year = "1641",
bibdate = "Thu Feb 05 06:32:55 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
remark = "This book is cited in a 4-Feb-2015 New York Times
article ``Cracking Codes through the Centuries'' with
the comments ``[the book] suggests writing with \the
juice of glow-worms' to create messages that can be
read only in the dark, or `glutinous moisture' --- milk
or fat --- that the recipient can read only by
scattering dust on the letters. Alphabets could be
translated into musical notes or flowers.''",
}
@Book{duCarlet:1644:CCV,
author = "Maistre Iean Robert {du Carlet}",
title = "La cryptographie: contenant vne tres-subtile manier
d'escrire secr{\`e}tement",
publisher = "Imprimeur ordinaire du Roy et R. Aurelhe, Marchand
libraire",
address = "Paris, France",
pages = "234 + 2",
year = "1644",
LCCN = "Z103.5 .D82 1644b",
bibdate = "Mon Sep 13 06:54:53 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Mersenne:1644:CPM,
author = "Marin Mersenne",
title = "Cogitata Physica-Mathematica \ldots{} [Tractatus de
mensuris ponderibus atque nummis \ldots{} Hydraulica
pneumatica; arsque navigandi. Harmonia theorica,
practica. Et Mechanica phaenomena. Ballistica et
acontismologia]",
publisher = "Antonii Bertier",
address = "Paris, France",
pages = "[30], 40 [24], 41--370, [16], 96, [8], 138, [34] +
40",
day = "1",
month = apr,
year = "1644",
bibdate = "Sat Aug 23 10:04:54 2003",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Three volumes. This is the book that introduced the
conjecture that numbers of the form $ M(n) = 2^n - 1 $
are prime for $ n = 2, 3, 5, 7, 13, 17, 19, 31, 67,
127, $ and $ 257 $, but could not test this claim.
Euler showed in 1750 that $ M(31) $ is prime. Lucas
showed in 1876 that $ M(127) $ is prime. Pervouchine
showed in 1883 that $ M(61) $ is prime, finally
disproving the Mersenne conjecture. Powers in the early
1900s showed that $ M(89) $ and $ M(107) $ are prime,
both missed by Mersenne. By 1947, it was known that the
correct list is $ 2, 3, 5, 7, 13, 17, 19, 31, 61, 89,
107 $, and $ 127 $, so Mersenne had five errors in his
list: $ 67 $ and $ 257 $ should have been removed, and
$ 61, 89 $, and $ 107 $ added. By late 2001, 39
Mersenne primes were known, the five largest having
been found by massive distributed computing efforts
through the Great Internet Mersenne Primes Search
(GIMPS) project. The largest of these is $ M(13466917)
$, a number containing $ 4, 053, 946 $ digits.",
URL = "http://www.mersenne.org/prime.htm;
http://www.mersenne.org/status.htm",
acknowledgement = ack-nhfb,
annote = "Peracta est haec impressio die 1. April. 1644.",
keywords = "Marin Mersenne (1588--1648)",
language = "Latin",
tableofcontents = "I: De mensuris, ponderibus, & nummis Hebraicis,
Graecis, & Romanis ad Gallica redactis. -- II: De
hydraulico-pneumaticis phaenomenis. -- III: De arte
nautica, sev histiodromia, & hydrostatica. -- IV: De
musica theorica & practica. -- V: De mechanicis
phaenomenis. -- VI: De ballisticis, sev
acontismologicis phaenomenis",
}
@Book{Morland:1666:NMC,
author = "Sir Samuel Morland",
title = "A New Method of Cryptography",
publisher = "????",
address = "????",
pages = "12",
year = "1666",
bibdate = "Tue Jul 05 14:50:30 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Microfilm in Folger Shakespeare Library, Washington,
DC, USA.",
acknowledgement = ack-nhfb,
remark = "This book is cited in a 4-Feb-2015 New York Times
article ``Cracking Codes through the Centuries'' with
the comment ``His [Morland's] proposal for a cyclologic
cryptographic machine, illustrated on the book's last
page, relies on a series of cipher wheels that make it
a close cousin to Sigaba and Enigma''.",
}
@Book{Heidel:1676:JTP,
author = "Wolfgango Ernesto Heidel",
title = "{Johannis Trithemii} primo Spanheimensis deinde {Divi
Jacobi Peapolitani} abbatis {Steganographia}: quae
hucusq[ue] a nemine intellecta sed passim ut
supposititia, perniciosa, magica \& necromantica
rejecta, elusa, damnata \& sententiam inquisitionis
passa, nunc tandem vindicata, reserata et illustrata
ubi post vindicias Trithemii clarissime explicantur
conjurationes spirituum ex {Arabicis}, {Hebraicis},
{Chaldaicis} \& {Graecis} spirituum nominibus juxta
quosdam conglobatae, aut secundum alios ex barbaris \&
nihil significantibus verbis concinnatae: deinde
solvuntur \& exhibentur artificia nova steganographica
a {Trithemio} in literis ad {Arnoldum Bostium} \&
{Polygraphia} promissa, in hunc diem a nemine capta,
sed pro paradoxis \& impossibilibus habita \& summe
desiderata",
publisher = "Wormatiense, Moguntiae. Sumptibus Joannis Petri
Zubrodt",
address = "",
pages = "8 + 394 (or 396) + 4",
year = "1676",
LCCN = "Z103 .T84 1676",
bibdate = "Wed Apr 14 06:11:27 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Includes Heidel's life of Trithemius and his
vindication of the Steganographia.",
acknowledgement = ack-nhfb,
annote = "The Trithemius ciphers were finally solved in 1998 by
J. Reeds \cite{Reeds:1998:SCB}.",
}
@Book{Morrice:1692:EB,
author = "Roger Morrice",
title = "Entring Book",
publisher = "????",
address = "????",
pages = "1500",
year = "1692",
bibdate = "Mon Sep 15 16:32:21 2003",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Three volumes.",
URL = "http://www.hist.cam.ac.uk/seminars_events/events/roger-morrice.html;
http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2003/08/29/ndiary29.xml",
acknowledgement = ack-nhfb,
remark = "From the Cambridge Web site: ``The Morrice Project
exists to publish Roger Morrice's Entring Book, the
most important unpublished record of British political
and religious history of the second half of the
seventeenth century. The fragile, three volume, 1500
page manuscript of Roger Morrice's Entring Book is in
Dr Williams's Library, 14 Gordon Square, London, the
pre-eminent research library of English Protestant
Nonconformity. The Entring Book is 900,000 words long
and covers the years 1677 to 1691.''\par
From the Telegraph story of 29-Aug-2003: ``A remarkable
million-word account of life in late 17th century
England which is as vivid as Samuel Pepys's diary has
been transcribed by experts after lying largely
forgotten for more than three centuries.\par
A specialist code-breaker was brought in to crack the
shorthand that Roger Morrice, a Puritan minister turned
political journalist, used in part of the diary to stop
the King's agents reading it. \ldots{} \par
Now the transcription has been completed and six
volumes of Morrice's well-informed account of a
turbulent period during which England was ruled by
three different monarchs will be published in 2005.\par
About 40,000 words of the diary were in code and the
team, led by the Cambridge academic Dr Mark Goldie,
brought in an expert in 17th century shorthand to
reveal for the first time what Morrice had written.''",
xxnote = "Exact publication year unknown; I set it to just after
the years covered.",
}
@Book{Conradi:1739:CDS,
author = "David Arnold Conradi",
title = "Cryptographia denudata; sive, Ars deciferandi, quae
occulte scripta sunt in quocunque linguarum genere,
praecipue in {Germanica, Batava, Latina, Anglica,
Gallica, Italica, Graeca}",
publisher = "Apud P. Bonk",
address = "Lugduni Batavorum",
pages = "73",
year = "1739",
LCCN = "Z103 .C66",
bibdate = "Mon Sep 13 07:04:09 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Kasiski:1863:GDG,
author = "Friedrich Wilhelm Kasiski",
title = "{Die Geheimschriften und die Dechiffrirkunst, Mit
besonderer Ber{\"u}cksichtigung der deutschen und
franz{\"o}sischen Sprache}. ({German}) [{Secret}
writing and the art of deciphering, with special
reference to the {German} and {French} languages]",
publisher = "E. S. Mittler und Sohn",
address = "Berlin, Germany",
pages = "viii + 95 + 4",
year = "1863",
LCCN = "????",
bibdate = "Sat May 16 11:30:41 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
remark = "This is the first published account of the breaking of
the Vigen{\`e}re Cipher, although Charles Babbage
accomplished that in 1854; Babbage's planned book on
cryptography was never completed or published. See
\cite{Singh:1999:CBE,Lewand:2010:PC} for more on
Kasiski and Babbage's work.",
}
@Book{Colaco:1864:CRO,
author = "F. N. Colaco",
title = "A cryptographia revelada, ou, Arte de traduzir e
decifrar as escrituras obscuras, quaesquer que sejao os
caracteres empregados",
publisher = "De Santos e Cia",
address = "Pernambuco",
pages = "93",
year = "1864",
LCCN = "Z104 .C68 1846",
bibdate = "Mon Sep 13 06:59:12 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
xxnote = "Check year: Library of Congress has conflicting data:
1846 and 1864??",
}
@Book{S:1873:COD,
author = "H. S.",
title = "Cryptographie, ou, Divers syst{\`e}mes d'{\'e}crire
secr{\`e}te sp{\'e}cialement pour l'usage des cartes
postales: combinations alphab{\'e}tiques,
correspondance chiffr{\'e}e, {\'e}criture par signes:
divers proc{\'e}d{\'e}s pour la fabrication d'encres
sympathiques",
publisher = "G. Jousset",
address = "Paris, France",
pages = "8",
year = "1873",
LCCN = "Z104 .H16 1873",
bibdate = "Mon Sep 13 06:51:31 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Jevons:1874:PS,
author = "W. Stanley Jevons",
title = "The Principles of Science",
publisher = "????",
address = "????",
pages = "??--??",
year = "1874",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 7]{Odlyzko:1995:FIF}.",
}
@Article{Kerckhoffs:1883:CMF,
author = "Auguste Kerckhoffs (von Nieuwenhof)",
title = "La Cryptographie Militaire. ({French}) [{Military}
cryptography]",
journal = "Journal des Sciences Militaires",
volume = "IX",
number = "??",
pages = "12--??",
month = jan,
year = "1883",
bibdate = "Thu May 16 08:07:14 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/kerckhoffs/la_cryptographie_militaire_i.htm",
acknowledgement = ack-nhfb,
annote = "Reproduced online at the indicated URL. This is one of
the early papers that argues for publication of
cryptographic algorithms, as discussed by Bruce
Schneier in the CRYPTO-GRAM newsletter of 15-May-2002.
Also discussed in \cite{Cohen:1987:IIP} in Chapter 2.1:
``A Short History of Cryptography'': Cohen writes:
``Kerckhoffs \ldots{} set forth six basic requirements
of cryptography. We note that the easily remembered key
is very amenable to attack, and that these rules, as
all others, should be questioned before placing trust
in them: \begin{itemize} \item ciphertext should be
unbreakable in practice \item the cryptosystem should
be convenient for the correspondents \item the key
should be easily remembered and changeable \item the
ciphertext should be transmissible by telegraph \item
the cipher apparatus should be easily portable \item
the cipher machine should be relatively easily to use
\end{itemize} ''",
language = "French",
xxpages = "38--??",
}
@Book{Josse:1885:CSA,
author = "H. (Henri) Joss{\'e}",
title = "La cryptographie et ses applications {\`a} l'art
militaire",
publisher = "Libraire militaire de L. Baudoin",
address = "Paris, France",
pages = "103",
year = "1885",
LCCN = "Z104 .J67 1885",
bibdate = "Thu May 16 08:13:44 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Valerio:1892:C,
author = "Paul Louis Eugene Valerio",
title = "De la Cryptographie",
journal = "Journal des Sciences militares, 9th series, Paris",
volume = "??",
number = "??",
pages = "??--??",
month = dec,
year = "1892",
bibdate = "Thu Oct 31 18:47:22 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Date cited as 9th series, Dec 1892--May 1895.",
}
@Book{Hulme:1898:CHP,
author = "F. Edward (Frederick Edward) Hulme",
title = "Cryptography; or, The history, principles, and
practice of cipher-writing",
publisher = "Ward, Lock and Co., Limited",
address = "????",
pages = "192",
year = "1898",
LCCN = "Z 104 H91",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "First edition. Galland, p. 94. Bound in yellow cloth;
stamped in black. Library of the American Cryptogram
Association (George C. Lamb Collection).",
acknowledgement = ack-nhfb,
keywords = "cryptography",
}
@Book{Walden:1900:ADB,
author = "John William Henry Walden",
title = "{August, Duke of Braunschweig-Luneburg}: The
cryptomenytics and cryptography of {Gustavus Selenus}:
in nine books: wherein is also contained a most clear
elucidation of the {Steganographia}, a book at one time
composed in magic and enigmatic form by {Johannes
Trithemius}",
publisher = "????",
address = "????",
year = "1900",
LCCN = "Z103 .A95 1900",
bibdate = "Wed Apr 14 06:24:45 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "August, Duke of Braunschweig-Luneburg 1579--1666. The
Trithemius ciphers were finally solved in 1998 by J.
Reeds \cite{Reeds:1998:SCB}.",
}
@Article{Guarini:1904:MTT,
author = "Emile Guarini",
title = "The {Malcotti} Telecryptograph for Telegraphing Upon
Telephone Lines",
journal = j-SCI-AMER,
volume = "91",
number = "12",
pages = "193--194",
day = "17",
month = sep,
year = "1904",
CODEN = "SCAMAC",
DOI = "http://dx.doi.org/10.1038/scientificamerican09171904-193a",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Sat May 18 16:20:28 MDT 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sciam1900.bib",
URL = "http://www.nature.com/scientificamerican/journal/v91/n12/pdf/scientificamerican09171904-193a.pdf",
acknowledgement = ack-nhfb,
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
keywords = "cryptography; decryption; encryption",
}
@Article{Claudy:1912:TMS,
author = "C. H. Claudy",
title = "A Triple Mirror for Secret Signaling",
journal = j-SCI-AMER,
volume = "107",
number = "17",
pages = "346--346",
day = "26",
month = oct,
year = "1912",
CODEN = "SCAMAC",
DOI = "http://dx.doi.org/10.1038/scientificamerican10261912-346",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Sat May 18 16:15:12 MDT 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
URL = "http://www.nature.com/scientificamerican/journal/v107/n17/pdf/scientificamerican10261912-346.pdf",
acknowledgement = ack-nhfb,
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
}
@Article{Edwards:1915:CCT,
author = "E. C. Edwards",
title = "Cipher Codes and their Uses",
journal = j-SCI-AMER,
volume = "113",
number = "1",
pages = "9--9",
day = "3",
month = jul,
year = "1915",
CODEN = "SCAMAC",
DOI = "http://dx.doi.org/10.1038/scientificamerican07031915-9",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Sat May 18 16:20:13 MDT 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
URL = "http://www.nature.com/scientificamerican/journal/v113/n1/pdf/scientificamerican07031915-9.pdf",
acknowledgement = ack-nhfb,
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
}
@Article{Honore:1919:STS,
author = "F. Honore",
title = "The Secret Telephone, Are Sound Waves ever Visible?",
journal = j-SCI-AMER,
volume = "121",
number = "23",
pages = "555--555",
day = "6",
month = dec,
year = "1919",
CODEN = "SCAMAC",
DOI = "http://dx.doi.org/10.1038/scientificamerican12061919-555",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Sat May 18 16:27:45 MDT 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
URL = "http://www.nature.com/scientificamerican/journal/v121/n23/pdf/scientificamerican12061919-555.pdf",
acknowledgement = ack-nhfb,
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
}
@Article{Meador:1920:KCE,
author = "J. E. D. Meador",
title = "Keeping the Camera on an Even Keel, Telephoning in
Cipher",
journal = j-SCI-AMER,
volume = "123",
number = "5",
pages = "107--107",
day = "31",
month = jul,
year = "1920",
CODEN = "SCAMAC",
DOI = "http://dx.doi.org/10.1038/scientificamerican07311920-107a",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Sat May 18 16:11:40 MDT 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
URL = "http://www.nature.com/scientificamerican/journal/v123/n5/pdf/scientificamerican07311920-107a.pdf",
acknowledgement = ack-nhfb,
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
}
@Book{Arensberg:1921:CD,
author = "Walter Arensberg",
title = "The cryptography of {Dante}",
publisher = pub-KNOPF,
address = pub-KNOPF:adr,
pages = "x + 494",
year = "1921",
LCCN = "PQ4406.A7",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "cryptography; Dante Alighieri, 1265--1321 ---
symbolism; Dante Alighieri, 1265--1321 Divina
Commedia",
}
@Article{Anonymous:1922:PUS,
author = "Anonymous",
title = "Practical Uses for the Spectroscope, Secret Radio
Communication",
journal = j-SCI-AMER,
volume = "127",
number = "4",
pages = "259--259",
month = oct,
year = "1922",
CODEN = "SCAMAC",
DOI = "http://dx.doi.org/10.1038/scientificamerican1022-259",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Sat May 18 16:13:39 MDT 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
URL = "http://www.nature.com/scientificamerican/journal/v127/n4/pdf/scientificamerican1022-259.pdf",
acknowledgement = ack-nhfb,
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
}
@Book{Arensberg:1922:CSP,
author = "Walter Arensberg",
title = "The cryptography of {Shakespeare}. Part one",
publisher = "Howard Bowen",
address = "Los Angeles, CA, USA",
pages = "ix + 280",
year = "1922",
LCCN = "PR2944.A6",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "No more published. Source: Bequest of George Fabyan,
1940. DLC",
acknowledgement = ack-nhfb,
keywords = "Shakespeare, William, 1564-1616 --- authorship ---
Baconian theory",
}
@Book{Budge:1922:RS,
author = "Sir E. A. Wallis (Ernest Alfred Wallis) Budge",
title = "The {Rosetta} Stone",
publisher = "British Museum Press",
address = "London, UK",
pages = "8 + 1",
year = "1922",
LCCN = "PJ1531.R3 1913",
bibdate = "Tue Dec 01 10:37:35 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprinted with revisions in 1935, 1950, and 1968.",
acknowledgement = ack-nhfb,
}
@Book{Langie:1922:C,
author = "Andr{\'e} Langie and James Cruickshank Henderson
Macbeth",
title = "Cryptography",
publisher = "Constable and Company Limited",
address = "London, UK",
pages = "vii + 1 + 192",
year = "1922",
LCCN = "Z 104 L26dE",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Bibliography: p.158.",
acknowledgement = ack-nhfb,
keywords = "cryptography",
}
@Book{USASC:1923:EC,
author = "{United States. Army. Signal Corps} and {George Fabyan
Collection (Library of Congress)}",
title = "Elements of cryptanalysis",
number = "3",
publisher = pub-USGPO,
address = pub-USGPO:adr,
pages = "vii + 157",
year = "1923",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Training pamphlet",
acknowledgement = ack-nhfb,
annote = "LC copy is item no. 717 of the George Fabyan
Collection.",
keywords = "Ciphers; Cryptography",
}
@Book{USWarDept:1924:EC,
author = "{United States. War Dept}",
title = "Elements of cryptanalysis",
volume = "3",
publisher = "Government Printing Office",
address = "Washington, DC, USA",
pages = "vii + 157",
year = "1924",
LCCN = "Z104 .U6",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Its training pamphlet",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@Book{USWD:1924:EC,
author = "{United States. War Dept}",
title = "Elements of cryptanalysis",
number = "3",
publisher = pub-USGPO,
address = pub-USGPO:adr,
pages = "vii + 157",
year = "1924",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Its Training pamphlet",
acknowledgement = ack-nhfb,
keywords = "Ciphers; Cryptography.",
}
@Book{Givierge:1925:CC,
author = "Marcel Givierge",
title = "Cours de cryptographie",
publisher = "Berger-Levrault",
address = "Paris, France",
pages = "ix + 304",
year = "1925",
LCCN = "Z104 .G43",
bibdate = "Sat Sep 25 10:58:57 2004",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
remark = "Cited in \cite{Shannon:1949:CTS}.",
}
@Article{Vernam:1926:CPT,
author = "G. S. Vernam",
title = "Cipher Printing Telegraph Systems for Secret Wire and
Radio Telegraphic Communications",
journal = "Journal American Institute of Electrical Engineers",
volume = "{XLV}",
number = "??",
pages = "109--115",
year = "1926",
bibdate = "Sat Sep 25 11:06:06 2004",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
remark = "Cited in \cite{Shannon:1949:CTS}.",
}
@Article{Russell:1927:CMS,
author = "Henry Norris Russell",
title = "Cipher Messages of the Stars",
journal = j-SCI-AMER,
volume = "137",
number = "2",
pages = "118--119",
month = aug,
year = "1927",
CODEN = "SCAMAC",
DOI = "http://dx.doi.org/10.1038/scientificamerican0827-118",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Sat May 18 16:15:38 MDT 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
URL = "http://www.nature.com/scientificamerican/journal/v137/n2/pdf/scientificamerican0827-118.pdf",
acknowledgement = ack-nhfb,
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
}
@Book{Tippett:1927:RSN,
author = "L. H. C. (Leonard Henry Caleb) Tippett",
title = "Random sampling numbers",
volume = "15",
publisher = pub-CAMBRIDGE,
address = pub-CAMBRIDGE:adr,
pages = "viii + xxvi",
year = "1927",
bibdate = "Sat Aug 23 08:23:19 2003",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprinted in 1952. Reprinted in 1959 with a foreword
by Karl Pearson.",
series = "Tracts for computers",
acknowledgement = ack-nhfb,
annote = "This may be the first known publication of tables of
random numbers. I found an unsubstantiated claim that
they were determined by taking the middle digits from
area measurements of English churches. See also
\cite{Rand:1955:MRD}.",
}
@Article{Sarton:1928:BRBn,
author = "George Sarton",
title = "Book Review: {{\booktitle{The Cipher of Roger Bacon}}
by William Romaine Newbold; Roland Grubb Kent}",
journal = j-ISIS,
volume = "11",
number = "1",
pages = "141--145",
month = sep,
year = "1928",
CODEN = "ISISA4",
ISSN = "0021-1753 (print), 1545-6994 (electronic)",
ISSN-L = "0021-1753",
bibdate = "Tue Jul 30 21:57:51 MDT 2013",
bibsource = "http://www.jstor.org/action/showPublication?journalCode=isis;
http://www.jstor.org/stable/i302190;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/isis1920.bib",
URL = "http://www.jstor.org/stable/224770",
acknowledgement = ack-nhfb,
fjournal = "Isis",
journal-URL = "http://www.jstor.org/page/journal/isis/about.html",
}
@Book{Budge:1929:RSB,
author = "Sir E. A. Wallis(Ernest Alfred Wallis) Budge",
title = "The {Rosetta} Stone in the {British Museum}: the
{Greek}, {Demotic} and {Hieroglyphic} texts of the
decree inscribed on the {Rosetta} Stone conferring
additional honours on {Ptolemy V. Epiphanes (203-181
B.C.) \ldots{}}",
publisher = "British Museum Press",
address = "London, UK",
pages = "viii + 323",
year = "1929",
LCCN = "PJ1531 .R3 1929",
bibdate = "Tue Dec 01 10:37:35 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprinted with revisions in 1929, 1935, 1950, and
1968.",
acknowledgement = ack-nhfb,
}
@Article{Hill:1929:CAA,
author = "Lester S. Hill",
title = "Cryptography in an Algebraic Alphabet",
journal = j-AMER-MATH-MONTHLY,
volume = "36",
number = "6",
pages = "306--312",
month = jun # "\slash " # jul,
year = "1929",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
bibdate = "Mon Jun 28 12:39:12 MDT 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@Article{Hill:1931:CCL,
author = "Lester S. Hill",
title = "Concerning Certain Linear Transformation Apparatus of
Cryptography",
journal = j-AMER-MATH-MONTHLY,
volume = "38",
number = "3",
pages = "135--154",
month = mar,
year = "1931",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
bibdate = "Mon Jun 28 12:36:10 MDT 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@Book{Yardley:1931:ABC,
author = "Herbert O. Yardley",
title = "The {American Black Chamber}",
publisher = "Faber \& Faber Limited",
address = "London, UK",
pages = "x + 264 + 1",
year = "1931",
LCCN = "D639.S7 Y3 1931b",
bibdate = "Wed Nov 15 14:21:04 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "The history and work of the Cryptographic bureau,
officially known as section 8 of the Military
intelligence division (MI-8).",
acknowledgement = ack-nhfb,
}
@Book{Givierge:1932:CC,
author = "Marcel Givierge",
title = "Cours de cryptographie",
publisher = "Berger-Levrault",
address = "Paris, France",
edition = "Deuxi{\`e}me",
pages = "ix + 304",
year = "1932",
bibdate = "Sat Sep 25 10:58:57 2004",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Friedman:1935:ICA,
author = "William F. (William Frederick) Friedman",
title = "The index of coincidence and its applications in
cryptanalysis: technical paper",
publisher = pub-USGPO,
address = pub-USGPO:adr,
pages = "87 + 3",
year = "1935",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "At head of title: War Department, Office of the Chief
Signal Officer, Washington. Register no. 200. The
present paper was prepared in 1923. It is a revision of
an earlier paper with the same title published in 1922
by the Riverbank Laboratories, Geneva, Ill.",
author-dates = "1891--1969",
keywords = "Ciphers; Cryptography.",
}
@Book{Friedman:1935:MCP,
author = "William F. (William Frederick) Friedman",
title = "Military cryptanalysis. Part 1, monoalphabetic
substitution systems",
number = "30",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "149",
year = "1935",
ISBN = "0-89412-044-1",
ISBN-13 = "978-0-89412-044-2",
LCCN = "Z103.5.F77 1992",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Four volumes.",
series = "Cryptographic series",
acknowledgement = ack-nhfb,
annote = "On cover: With new added problems for the student. (p.
143--149) Reprint. Originally published: Washington,
DC: U.S. G.P.O., between 1935 and 1945.",
author-dates = "1891--1969",
keywords = "Ciphers; Communications, Military; Cryptography",
}
@Book{Kullback:1935:SMC,
author = "Solomon Kullback",
title = "Statistical methods in cryptanalysis: technical
paper",
publisher = "War Dept., Office of the Chief Signal Officer: U.S.
G.P.O.",
address = "Washington, DC, USA",
pages = "various",
year = "1935",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Ciphers; Cryptography",
}
@Book{Gylden:1936:AMC,
author = "Yves Gylden",
title = "Analysis of model {C-36} cryptograph from the
viewpoint of cryptanalysis",
publisher = "A. B. Teknik co.",
address = "Stockholm, Sweden",
pages = "22",
year = "1936",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Xeroxed on rectos only; unbound. Translated from the
French into English. Library of the American Cryptogram
Association (George C. Lamb Collection).",
keywords = "Cryptography.",
}
@Book{Nanovic:1936:SWI,
author = "John Leonard Nanovic",
title = "Secret writing: an introduction to cryptograms,
ciphers and codes",
publisher = "D. Kemp and Co",
address = "New York, NY, USA",
pages = "x + 117 + 1",
year = "1936",
LCCN = "Z104 .N3",
bibdate = "Wed Nov 25 14:23:25 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See also reprint \cite{Nanovic:1974:SWI}.",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@Book{Gylden:1938:APV,
author = "Yves Gylden",
title = "Analysis from the point of view of cryptanalysis of
``cryptograph type {C-36},'' provided with six key
wheels, 27 slide bars, the latter having movable
projections, single or multiple",
publisher = "A. B. Teknik co.",
address = "Stockholm, Sweden",
pages = "10",
year = "1938",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Xeroxed on rectos only; unbound. Translated from the
French into English. Library of the American Cryptogram
Association (George C. Lamb Collection).",
keywords = "Cryptography.",
}
@Book{Kullback:1938:SMC,
author = "Solomon Kullback",
title = "Statistical methods in cryptanalysis",
publisher = "War Department, Office of the Chief Signal Officer",
address = "Washington, DC, USA",
edition = "Revised",
pages = "194",
year = "1938",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "At head of title: War Department, Office of the Chief
Signal Officer, Washington. ``Confidential.''
``Register no. 170.''",
keywords = "Ciphers; Cryptography",
remark = "From \cite{Anscombe:2003:QCC}: ``A bookseller
description [of this book]: `This classic text provides
various statistical tests: the Chi Test, which affords
a quantitative measure of the degree of similarity
between two distributions, and the Phi Test, which
provides a quantitative measurement of the degree of
non-randomness of a distribution. Text includes
numerous tabulations of frequency data in other
languages.'.''",
}
@TechReport{Anonymous:1939:ITM,
author = "Anonymous",
title = "Introductory talk to members of the {William and Mary
College} cryptanalysis class",
institution = "William and Mary College",
address = "Williamsburg, VA, USA",
pages = "7",
year = "1939",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Reproduced from typescript.",
}
@Book{DAgapeyeff:1939:CC,
author = "Alexander D'Agapeyeff",
title = "Codes and ciphers",
publisher = pub-OXFORD,
address = pub-OXFORD:adr,
pages = "160",
year = "1939",
LCCN = "Z104 .D3 1939",
bibdate = "Sat Apr 20 12:19:43 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Friedman:1939:CAC,
author = "William F. (William Frederick) Friedman",
title = "The cryptanalyst accepts a challenge",
publisher = "War Department, Office of the Chief Signal Officer",
address = "Washington, DC, USA",
pages = "24--36",
year = "1939",
LCCN = "????",
bibdate = "Wed May 11 23:30:34 MDT 2011",
bibsource = "fsz3950.oclc.org:210/WorldCat;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
author-dates = "1891--1969",
remark = "An article analyzed from The Signal Corps bulletin,
no. 103, January--March, 1939.",
subject = "Cryptography; Ciphers; CHR 1939; PRO Mendelsohn,
Charles J. (Charles Jastrow) (donor); PRO Mendelsohn,
Esther Jastrow (donor)",
}
@Book{Friedman:1939:MC,
author = "William F. (William Frederick) Friedman",
title = "Military cryptanalysis",
publisher = "New York Public Library",
address = "New York, NY, USA",
year = "1939",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "1 microfilm reel",
acknowledgement = ack-nhfb,
annote = "Titles and statements of authorship from label on
container. First work originally published: Washington:
U.S. G.P.O., 1939- 1943. 4 v. Vols. 1-2, 3rd ed. Vol.
3, 2nd ed. Second work originally published:
Washington: U.S. G.P.O., 1942. v, 316 p.",
author-dates = "1891--1969",
keywords = "Cryptography.",
}
@Book{Gaines:1939:ECS,
author = "Helen Fouche Gaines",
title = "Elementary cryptanalysis: a study of ciphers and their
solution",
publisher = "American Photographic Publishing Co.",
address = "Boston, MA, USA",
pages = "vi + 230 + 1",
year = "1939",
LCCN = "Z104 .G3",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "First edition. Galland, p. 72. Inscribed by Gelett
Burgess. Bound in gray cloth; stamped in red; top edges
stained red. Library of the American Cryptogram
Association (George C. Lamb Collection).",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@Book{Mendelsohn:1939:CC,
author = "Charles Jastrow Mendelsohn",
title = "{Cardan} on cryptography",
publisher = "Yeshiva College",
address = "New York, NY, USA",
pages = "157--168",
year = "1939",
LCCN = "????",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprinted from Scripta mathematica, Vol. 6, No. 3,
October, 1939. J. S. Galland, Bibliography of \ldots{}
cryptology, 1945, p. 124.",
acknowledgement = ack-nhfb,
keywords = "Cardano, Girolamo, 1501--1576; cryptography",
}
@Book{Pratt:1939:SUS,
author = "Fletcher Pratt",
title = "Secret and urgent: the story of codes and ciphers",
publisher = "Robert Hale",
address = "London, UK",
pages = "282",
year = "1939",
LCCN = "Z104 .P92 1939",
bibdate = "Sat Apr 20 12:05:03 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
remark = "Reprinted in 1939 by the Bobbs-Merrill Company, New
York, NY, USA, in 1942 by Blue Ribbon Books, Garden
City, NY, USA, and in 1996 by Aegean Park Press, Laguna
Hills, CA, USA.",
tableofcontents = "1. Sermons in Stones \\
2. The Element of Doubt \\
3. Jargon \\
4. Invention and Death \\
5. Bacon or Shakespeare? \\
6. Satellites of the Royal Sun \\
7. Kings, Thieves and Diarists \\
8. Failure \\
9. The Revival \\
10. Code \\
11. The War of Cryptographers \\
12. The Cryptographers' War",
}
@Book{Gaines:1940:ECS,
author = "Helen Fouche Gaines",
title = "Elementary cryptanalysis; a study of ciphers and their
solution",
publisher = pub-CHAPMAN-HALL,
address = pub-CHAPMAN-HALL:adr,
pages = "vi + 230 + 23",
year = "1940",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Inscription by the author pasted in. Bound in gray
cloth; stamped in red; top edges stained red. Dust
jacket.",
keywords = "Ciphers; Cryptography",
}
@Book{USASC:1940:CML,
author = "{United States Army Signal Corps}",
title = "Cryptanalyst's manual",
publisher = pub-USGPO,
address = pub-USGPO:adr,
pages = "????",
year = "1940",
LCCN = "Z104 .U33c",
bibdate = "Wed May 11 23:30:34 MDT 2011",
bibsource = "fsz3950.oclc.org:210/WorldCat;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
remark = "Prepared under the direction of the Chief Signal
Officer.",
subject = "cryptography",
}
@Book{Yardley:1940:SSA,
author = "Herbert O. Yardley",
title = "Secret service in {America}: The {American Black
Chamber}",
publisher = "Faber \& Faber Limited",
address = "London, UK",
pages = "x + 264 + 1",
year = "1940",
LCCN = "D639.S7 Y3 1940",
bibdate = "Wed Nov 15 14:23:09 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "The history and work of the Cryptographic bureau,
officially known as section 8 of the Military
intelligence division (MI-8).",
acknowledgement = ack-nhfb,
}
@Book{Friedman:1941:MCP,
author = "William F. (William Frederick) Friedman",
title = "Military cryptanalysis. Part {IV}, Transposition and
fractionating systems",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "189",
year = "1941",
ISBN = "0-89412-198-7 (paperback), 0-89412-199-5 (library
bound)",
ISBN-13 = "978-0-89412-198-2 (paperback), 978-0-89412-199-9
(library bound)",
LCCN = "Z103.5.F77 1992",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Cryptographic series; 61",
acknowledgement = ack-nhfb,
alttitle = "Transposition and fractionating series",
annote = "Reprint of a U.S. military text, originally published
in 1941. Declassified December 1992.",
author-dates = "1891--1969",
keywords = "Ciphers; Communications, Military; Cryptography",
}
@TechReport{Turing:1941:APC,
author = "Alan M. Turing",
title = "The Applications of Probability to Cryptography",
type = "Report",
institution = "GCHQ",
address = "Cheltenham, UK",
year = "1941",
bibdate = "Wed Apr 25 10:25:22 2012",
bibsource = "http://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Unclassified and released 23 April 2012. Date
uncertain, but believed to be between April 1941 and
April 1942.",
URL = "http://www.gchq.gov.uk/Press/Pages/turing-papers-released.aspx;
http://www.theregister.co.uk/2012/04/23/turing_papers_released/",
acknowledgement = ack-nhfb,
}
@TechReport{Turing:1941:SR,
author = "Alan M. Turing",
title = "On Statistics of Repetitions",
type = "Report",
institution = "GCHQ",
address = "Cheltenham, UK",
year = "1941",
bibdate = "Wed Apr 25 10:25:22 2012",
bibsource = "http://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Unclassified and released 23 April 2012. Date
uncertain, but believed to be between April 1941 and
April 1942.",
URL = "http://www.gchq.gov.uk/Press/Pages/turing-papers-released.aspx;
http://www.theregister.co.uk/2012/04/23/turing_papers_released/",
acknowledgement = ack-nhfb,
}
@Book{Volts:1941:BC,
author = "James D. Volts and David Shulman",
title = "Bibliography of cryptography",
publisher = "U. S. Army",
address = "Cincinnati, OH. USA",
pages = "93",
year = "1941",
LCCN = "Z103.A1 V6 1941",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Typewritten (carbon copy) Three heavy leaves precede
sections II-IV (not included in pagination). This copy
was made especially for the United States Army from the
original manuscript. Third copy: pencilled note on
cover. Contents: pt.1. Cryptography; pt.2. Titles
relating indirectly to cryptography; pt.3. Rejected
titles; pt.4. Author index.",
acknowledgement = ack-nhfb,
keywords = "ciphers --- bibliography; cryptography ---
bibliography",
}
@Book{Volts:1941:BCP,
author = "James D. Volts",
title = "Bibliography of cryptography: Part {I}: Cryptography",
publisher = "U. S. Army",
address = "Cincinnati, OH, USA",
pages = "various",
year = "1941",
LCCN = "????",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Chronologically arranged, covering period 1518--1940,
and indexed by authors.",
acknowledgement = ack-nhfb,
keywords = "cryptography --- bibliography",
}
@Book{Friedman:1942:MC,
author = "William F. (William Frederick) Friedman",
title = "Military cryptanalysis",
publisher = pub-USGPO,
address = pub-USGPO:adr,
edition = "Third",
pages = "various",
year = "1942",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
alttitle = "Restricted",
annote = "Each pt. has separate t.p. and numbering sequence. pt.
1. Monoalphabetic substitution systems --- pt. 2.
Simple varities of polyalphabetic substitution systems
--- pt. 3. Simpler varieties of aperiodic substitution
systems --- pt. 4. Transportation and fractionating
systems.",
author-dates = "1891--1969",
keywords = "Ciphers; Communications, Military; Cryptography",
}
@Book{USASC:1942:ACC,
author = "{United States. Army. Signal Corps}",
title = "Articles on cryptography and cryptanalysis",
publisher = pub-USGPO,
address = pub-USGPO:adr,
pages = "v + 316",
year = "1942",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "At head of title: War Department. Office of the Chief
Signal Officer, Washington. ``Reprinted from the Signal
Corps Bulletin.''",
keywords = "Cryptography.",
}
@Book{Gaines:1943:ECS,
author = "Helen Fouche Gaines",
title = "Elementary cryptanalysis: a study of ciphers and their
solution",
publisher = "American Photographic Publishing Co.",
address = "Boston, MA, USA",
pages = "vi + 230 + 1",
year = "1943",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Fourth printing. Errata slip tipped in before Preface.
Bound in gray cloth; stamped in red; top edges stained
red. Library of the American Cryptogram Association
(George C. Lamb Collection).",
keywords = "Ciphers; Cryptography.",
}
@Book{Hitt:1943:MSM,
author = "Parker Hitt",
title = "Manual for the solution of military ciphers \ldots{}
For use in {Donald D. Millikin}'s cryptography and
cryptanalysis classes",
publisher = "New York University Bookstore",
address = "New York, NY, USA",
pages = "viii + 101 + 22",
year = "1943",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Reprint. Galland, p. 90. Bound in blue paper wrappers;
printed in black. Library of the American Cryptogram
Association (George C. Lamb Collection).",
keywords = "Ciphers; Cryptography.",
}
@Book{Millikin:1943:ECCa,
author = "Donald D. Millikin",
title = "Elementary cryptography and cryptanalysis",
volume = "56",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "vii + 132",
year = "1943",
ISBN = "0-89412-173-1 (soft cover), 0-89412-174-X (library
bound)",
ISBN-13 = "978-0-89412-173-9 (soft cover), 978-0-89412-174-6
(library bound)",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
annote = "``\ldots{} reproduction of a classic text written and
used by Donald D. Millikin to introduce cryptography
and cryptanalysis to college students at New York
University in 1943.''",
keywords = "Ciphers; Cryptography",
}
@Book{Millikin:1943:ECCb,
author = "Donald D. Millikin",
title = "Elementary cryptography and cryptanalysis",
publisher = "New York University Bookstore",
address = "New York, NY, USA",
edition = "Second",
pages = "vii + 132 + 1 + 28",
year = "1943",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Reproduced from type-written copy",
keywords = "Cryptography.",
}
@Book{Millikin:1943:ECCc,
author = "Donald D. Millikin",
title = "Elementary cryptography and cryptanalysis",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
edition = "Third",
pages = "vii + 132",
year = "1943",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Reproduced from type-written copy.",
keywords = "Cryptography.",
}
@Book{Smith:1943:CSS,
author = "Laurence Dwight Smith",
title = "Cryptography, the science of secret writing",
publisher = pub-NORTON,
address = pub-NORTON:adr,
pages = "164",
year = "1943",
LCCN = "Z104 .S5",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@Book{Wolfe:1943:FCCa,
author = "Jack Martin Wolfe",
title = "A first course in cryptanalysis",
publisher = "Brooklyn college press",
address = "Brooklyn, NY, USA",
pages = "??",
year = "1943",
LCCN = "Z104 .W6 1943 v. 1-3 (1943)",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reproduced from type-written copy. Lesson 11 (44 numb)
inserted after v. 2.",
acknowledgement = ack-nhfb,
keywords = "cryptography",
}
@Book{Wolfe:1943:FCCb,
author = "Jack Martin Wolfe",
title = "A first course in cryptanalysis",
publisher = "University Press",
address = "Ann Arbor, MI, USA",
pages = "various",
year = "1943",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Three volumes.",
acknowledgement = ack-nhfb,
annote = "Reproduced from type-written copy.",
keywords = "Cryptography.",
}
@Book{Wolfe:1943:FCCc,
author = "Jack Martin Wolfe",
title = "A first course in cryptanalysis",
publisher = "Brooklyn College Press",
address = "Brooklyn, NY, USA",
pages = "various",
year = "1943",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Three volumes.",
acknowledgement = ack-nhfb,
annote = "Mimeographed on rectos only. Bound in printed paper
wrappers. Library of the American Cryptogram
Association (George C. Lamb Collection)",
keywords = "Ciphers; Cryptography",
}
@Book{Gaines:1944:CSC,
author = "Helen Fouche Gaines",
title = "Cryptanalysis: a study of ciphers and their solution",
publisher = pub-DOVER,
address = pub-DOVER:adr,
year = "1944",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Codigos (Ou Codificacao)",
}
@Book{Smith:1944:CSS,
author = "Laurence Dwight Smith",
title = "Cryptography: the science of secret writing",
publisher = "G. Allen and Unwin",
address = "London, UK",
pages = "164",
year = "1944",
LCCN = "Z104.S5",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@TechReport{Alexander:1945:CHG,
author = "C. H. O'D. Alexander",
title = "Cryptologic History of the German Naval Enigma",
type = "{GC\&CS} Report",
number = "HW 25/7,",
institution = "British National Archives",
address = "????",
year = "1945",
bibdate = "Thu Mar 06 16:07:17 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Galland:1945:HABa,
author = "Joseph Stanislaus Galland",
title = "An historical and analytical bibliography of the
literature of cryptology",
publisher = inst-NORTHWESTERN-UNIVERSITY,
address = inst-NORTHWESTERN-UNIVERSITY:adr,
pages = "viii + 11 + 209",
year = "1945",
LCCN = "Z103.A1 G3",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "``Works consulted and utilized'' in preface.",
series = "Northwestern University studies in the humanities no.
10",
acknowledgement = ack-nhfb,
keywords = "cryptography --- bibliography",
}
@Book{Galland:1945:HABb,
author = "Joseph Stanislaus Galland",
title = "An historical and analytical bibliography of the
literature of cryptology",
number = "10",
publisher = "AMS Press",
address = "New York, NY, USA",
pages = "viii + 209",
year = "1945",
ISBN = "0-404-50710-7",
ISBN-13 = "978-0-404-50710-7",
LCCN = "Z103.A1G3 1970",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Northwestern University humanities series; v. 10",
acknowledgement = ack-nhfb,
annote = "Bound in blue cloth; stamped in gold. Library of the
American Cryptogram Association (George C. Lamb
Collection). Master microform held by: UnM. Microfilm.
Ann Arbor, Mich., University Microfilms International,
19--. 1 reel. 35 mm.",
keywords = "Cryptography --- Bibliography.",
}
@Book{Galland:1945:HABc,
author = "Joseph Stanislaus Galland",
title = "An historical and analytical bibliography of the
literature of cryptology",
volume = "71",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "209",
year = "1945",
ISBN = "0-89412-252-5",
ISBN-13 = "978-0-89412-252-1",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
alttitle = "Bibliography of the literature of cryptology",
keywords = "Cryptography --- Bibliography.",
}
@TechReport{Good:1945:GRT,
author = "I. Jack Good and Donald Michie and Geoffrey Timms",
title = "General Report on {Tunny}",
type = "{GC\&CS} report",
number = "HW 25/4",
institution = "British National Archives",
address = "????",
year = "1945",
bibdate = "Thu Mar 06 16:13:00 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@TechReport{Shannon:1945:MTC,
author = "Claude Shannon",
title = "A Mathematical Theory of Cryptography",
type = "Classified report",
institution = "Bell Laboratories",
address = "Murray Hill, NJ, USA",
day = "1",
month = sep,
year = "1945",
bibdate = "Mon Nov 04 18:32:51 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "In this paper, the binary-choice measure was called
`alternative'; the term `bit' did not appear in print
until \cite{Shannon:1948:MTCa}.",
}
@Article{Landers:1946:RPR,
author = "A. W. Landers",
title = "Recent Publications: Reviews: {{\em An Historical and
Analytical Bibliography of the Literature of
Cryptology}}, by {J. S. Galland}",
journal = j-AMER-MATH-MONTHLY,
volume = "53",
number = "6",
pages = "330--331",
month = jun # "\slash " # jul,
year = "1946",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
bibdate = "Mon Jun 28 12:38:13 MDT 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@Book{Bond:1947:FSC,
author = "Raymond T. (Raymond Tostevin) Bond",
title = "Famous stories of code and cipher",
publisher = "Rinehart and Company",
address = "New York; Toronto",
pages = "xxvi + 342",
year = "1947",
LCCN = "PS648.C6 B65",
bibdate = "Wed Nov 25 14:08:17 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprinted in 1965 by Collier Books.",
acknowledgement = ack-nhfb,
}
@Article{Shannon:1948:MTCa,
author = "Claude Shannon",
title = "A Mathematical Theory of Communication",
journal = j-BELL-SYST-TECH-J,
volume = "27",
number = "3",
pages = "379--423",
month = jul,
year = "1948",
CODEN = "BSTJAN",
ISSN = "0005-8580",
bibdate = "Mon Nov 04 18:36:13 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "From the first page: ``If the base $2$ is used the
resulting units may be called binary digits, or more
briefly, {\em bits}, a word suggested by J. W.
Tukey.''. This is the first known printed instance of
the word `bit' with the meaning of binary digit.",
acknowledgement = ack-nhfb,
fjournal = "The Bell System Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}
@Article{Shannon:1948:MTCb,
author = "Claude Shannon",
title = "A Mathematical Theory of Communication (continued)",
journal = j-BELL-SYST-TECH-J,
volume = "27",
number = "4",
pages = "623--656",
month = oct,
year = "1948",
CODEN = "BSTJAN",
ISSN = "0005-8580",
bibdate = "Mon Nov 04 18:36:13 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "The Bell System Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}
@Book{Zim:1948:CSW,
author = "Herbert S. Zim",
title = "Codes and secret writing",
publisher = "William Morrow",
address = "New York, NY, USA",
pages = "vi + 154",
year = "1948",
LCCN = "Z104 .Z5",
bibdate = "Wed Nov 25 14:13:48 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Children's book.",
}
@Article{Shannon:1949:CTS,
author = "Claude Shannon",
title = "Communication Theory of Secrecy Systems",
journal = j-BELL-SYST-TECH-J,
volume = "28",
number = "4",
pages = "656--715",
month = "????",
year = "1949",
CODEN = "BSTJAN",
ISSN = "0005-8580",
bibdate = "Sat Sep 25 10:52:04 2004",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "A footnote on the initial page says: ``The material in
this paper appeared in a confidential report, `A
Mathematical Theory of Cryptography', dated Sept.~1,
1946, which has now been declassified.''.",
URL = "http://en.wikipedia.org/wiki/Communication_Theory_of_Secrecy_Systems;
http://www.cs.ucla.edu/~jkong/research/security/shannon1949.pdf",
acknowledgement = ack-nhfb,
fjournal = "The Bell System Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
remark = "The Wikipedia entry credits this paper as the
foundation of modern cryptography. Diffie and Hellman
\cite[page 653]{Diffie:1976:NDC} remark: ``Shannon
[this paper] showed that the one time pad systems,
which had been in use since the late twenties [1920s]
offered `perfect security' (a form of unconditional
security).''",
}
@Book{Andree:1952:C,
author = "Richard Vernon Andree",
title = "Cryptanalysis",
publisher = "Yeshiva College",
address = "New York, NY, USA",
pages = "5--16",
year = "1952",
MRclass = "09.0X",
MRnumber = "14,124d",
bibdate = "Wed Nov 25 14:18:35 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprinted from Scripta mathematica, Vol. 28, No. 1.
March, 1952.",
acknowledgement = ack-nhfb,
keywords = "Cryptography.",
}
@Article{Porges:1952:MNC,
author = "Arthur Porges",
title = "Mathematical Notes: a Continued Fraction Cipher",
journal = j-AMER-MATH-MONTHLY,
volume = "59",
number = "4",
pages = "236--236",
month = apr,
year = "1952",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
bibdate = "Mon Jun 28 12:36:41 MDT 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@Book{deVries:1953:SMC,
author = "M. {de Vries}",
title = "Statistical methods in cryptanalysis",
publisher = "Math. Centrum Amsterdam",
address = "Amsterdam, The Netherlands",
pages = "15",
year = "1953",
MRclass = "62.0X",
MRnumber = "15,974d",
MRreviewer = "H. Campaigne",
bibdate = "Sat Oct 26 10:21:29 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Rapport ZW 1953-014",
}
@TechReport{Behrens:1954:EUP,
author = "Carl E. Behrens",
title = "Effects on {U-boat} performance of intelligence from
decryption of {Allied} communication",
type = "Technical report OEG study",
number = "553",
institution = "Distributed by NTIS",
address = "Springfield, VA, USA",
pages = "various",
year = "1954",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "``Prepared by Operations Evaluation Group, Office of
the Chief of Naval Operations\ldots{}Prepared for:
Office of the Chief of Operations (Navy) 28 April
1954.'' On cover: ``distributed by Defense Technical
Information Center''.",
keywords = "Military intelligence; Military surveillance;
Submarine boats --- World War, 1939-1945",
}
@MastersThesis{Hoffer:1955:MAC,
author = "Carol M. Hoffer",
title = "On the mathematical approach to cryptanalysis",
type = "Thesis",
school = "University of South Dakota",
address = "Vermillion, SD, USA",
pages = "65",
year = "1955",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography.",
}
@Book{Rand:1955:MRD,
author = "{Rand Corporation}",
title = "A Million Random Digits With 100,000 Normal Deviates",
publisher = "Free Press",
address = "Glencoe, IL, USA",
pages = "xxv + 400 + 200",
year = "1955",
ISBN = "0-02-925790-5",
ISBN-13 = "978-0-02-925790-6",
LCCN = "QA276.5 .R3",
bibdate = "Sat Aug 23 07:58:03 2003",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprinted in 1966 and 2001 \cite{Rand:2001:MRD}. See
also \cite{Tippett:1927:RSN}.",
acknowledgement = ack-nhfb,
}
@Book{Sawirudin:1955:PND,
author = "Sawirudin",
title = "Pegawai negeri dan {PGP} baru",
publisher = "Badan Penerbitan Dewan Nasional SOBSI",
address = "Djakarta",
edition = "Cet. 1.",
pages = "93",
year = "1955",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Photocopy. [S.1.: s.n., 1958?].",
keywords = "Indonesia --- Officials and employees --- Salaries,
etc.",
}
@Book{Smith:1955:CSS,
author = "Laurence Dwight Smith",
title = "Cryptography; the science of secret writing",
publisher = pub-DOVER,
address = pub-DOVER:adr,
pages = "164",
year = "1955",
LCCN = "Z104 .S6",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "``An unabridged republication of the first edition
with corrections.''",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@Book{Epstein:1956:FBC,
author = "Sam Epstein and Beryl Epstein",
title = "The first book of codes and ciphers",
publisher = "Franklin Watts",
address = "New York, NY, USA",
year = "1956",
LCCN = "Z104 .E68",
bibdate = "Wed Nov 25 14:12:11 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Pictures by Laszlo Roth",
acknowledgement = ack-nhfb,
annote = "Children's book.",
}
@Book{Friedman:1956:CCC,
author = "William F. (William Frederick) Friedman",
title = "Codes and ciphers (cryptology)",
publisher = "Encyclopaedia Britannica",
address = "Chicago, IL, USA",
pages = "8",
year = "1956",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Caption title. ``From Encyclopaedia Britannica,
copyright 1956.'' Text in double columns.",
author-dates = "1891--1969",
keywords = "Ciphers; Cryptography; Cryptography --- Equipment and
supplies; Cryptography --- History",
}
@Book{Gaines:1956:CSC,
author = "Helen Fouch{\'e} Gaines",
title = "Cryptanalysis: a study of ciphers and their solution",
publisher = pub-DOVER,
address = pub-DOVER:adr,
pages = "237",
year = "1956",
ISBN = "0-486-20097-3",
ISBN-13 = "978-0-486-20097-2",
LCCN = "Z104 .G3 1956",
MRclass = "99.0X",
MRnumber = "19,519g",
MRreviewer = "H. Campaigne",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Formerly published under the title: Elementary
cryptanalysis.",
acknowledgement = ack-nhfb,
annote = "Unabridged and corrected edition of \ldots{} [the
author's] Elementary cryptanalysis.",
keywords = "Ciphers; Cryptography",
}
@Article{Davison:1957:SCG,
author = "W. H. T. Davison and M. Gordon",
title = "Sorting for chemical groups using
{Gordon--Kendall--Davison} ciphers",
journal = j-AM-DOC,
volume = "8",
number = "3",
pages = "202--210",
month = jul,
year = "1957",
CODEN = "AMDOA7",
DOI = "http://dx.doi.org/10.1002/asi.5090080305",
ISSN = "0096-946X",
ISSN-L = "0096-946X",
bibdate = "Fri Sep 11 06:21:07 MDT 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/amdoc.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "American Documentation",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)2330-1643/",
onlinedate = "19 Apr 2007",
}
@Book{Friedman:1957:SCE,
author = "William F. (William Frederick) Friedman and Elizabeth
S. Friedman",
title = "The {Shakespearean} Ciphers Examined: an analysis of
cryptographic systems used as evidence that some author
other than William Shakespeare wrote the plays commonly
attributed to him",
publisher = pub-CUP,
address = pub-CUP:adr,
pages = "4 + vii--xvi + 1 + 302 + 1",
year = "1957",
LCCN = "PR2937 .F7",
bibdate = "Wed Nov 25 14:04:49 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
author-dates = "1891--1969",
}
@Book{Gleason:1957:ECP,
author = "Andrew M. Gleason",
title = "Elementary course in probability",
publisher = "National Security Agency, Office of Research and
Development, Mathematical Research Division",
address = "Washington, DC, USA",
edition = "Second",
pages = "various",
year = "1957",
LCCN = "Z104 .G53 1957",
bibdate = "Wed May 11 23:23:17 MDT 2011",
bibsource = "fsz3950.oclc.org:210/WorldCat;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Revised by Walter F. Penney and Ronald E. Wyllys.",
acknowledgement = ack-nhfb,
subject = "cryptography; probabilities",
}
@InCollection{Gamow:1958:CAP,
author = "George Gamow and Martynas Y{\c{c}}as",
booktitle = "{Das Universum. Unser Bild vom Weltall}. ({German})
[{The Universe}. {Our} picture of the {Universe}]",
title = "The cryptographic approach to the problem of protein
synthesis",
publisher = "????",
address = "Wiesbaden, Germany",
pages = "????",
year = "1958",
LCCN = "",
bibdate = "Sat Jun 02 09:24:50 2012",
bibsource = "http://www.math.utah.edu/pub/bibnet/authors/g/gamow-george.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Levine:1958:VMS,
author = "Jack Levine",
title = "Variable Matrix Substitution in Algebraic
Cryptography",
journal = j-AMER-MATH-MONTHLY,
volume = "65",
number = "3",
pages = "170--179",
month = mar,
year = "1958",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
bibdate = "Mon Jun 28 12:38:55 MDT 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@Book{Bowers:1959:DSP,
author = "William Maxwell Bowers",
title = "Digraphic substitution: the {Playfair} cipher, the
four square cipher",
publisher = "American Cryptogram Association",
address = "Greenfield, MA, USA",
pages = "46",
year = "1959",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Practical cryptanalysis; v. 1",
acknowledgement = ack-nhfb,
keywords = "Ciphers.",
}
@Book{Anonymous:1960:CNH,
author = "Anonymous",
title = "Cryptanalysis, a new horizon, by {Dr. Cryptogram}
[pseudonym]",
publisher = "American Cryptogram Association",
address = "New York, NY, USA (??)",
pages = "10 + 1 + 27",
year = "1960",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "An address to the Annual Convention of the American
Cryptogram Association, 1960. Printed by a spirit
process on rectos only. In plastic binder. Library of
the American Cryptogram Association (George C. Lamb
Collection).",
keywords = "Cryptography.",
}
@Book{Bowers:1960:BC,
author = "William Maxwell Bowers",
title = "The bifid cipher",
publisher = "American Cryptogram Association",
address = "Greenfield, MA, USA",
pages = "48",
year = "1960",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Practical cryptanalysis; v. 2",
acknowledgement = ack-nhfb,
keywords = "Ciphers.",
}
@Book{Bowers:1960:PC,
author = "William Maxwell Bowers and William G. Bryan",
title = "Practical cryptanalysis",
publisher = "American Cryptogram Association",
address = "Greenfield, MA, USA",
pages = "??",
year = "1960",
LCCN = "Z103 .B6",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Bound in printed paper wrappers. Contents: v. 1.
Digraphic substitution; the playfair cypher, the four
square cypher.-- v. 2. The Bifid cipher. --- v. 3. The
Trifid cipher.-- v. 4. Cryptographic ABC'S;
Substitution and transposition ciphers, by William G.
Bryan. --- v. 5. Cryptographic ABC's; periodic ciphers,
miscellaneous, by William G. Bryan.",
acknowledgement = ack-nhfb,
keywords = "cryptography",
}
@Book{Bowers:1960:TC,
author = "William Maxwell Bowers",
title = "The trifid cipher",
publisher = "American Cryptogram Association",
address = "Greenfield, MA, USA",
pages = "ix + 55",
year = "1960",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Practical cryptanalysis; v. 3",
acknowledgement = ack-nhfb,
keywords = "Ciphers.",
}
@Article{Mandelbrot:1960:BRJa,
author = "Beno{\^\i}t Mandelbrot",
title = "Book Review: {John Chadwick, \booktitle{The
Decipherment of Linear B} (1958) Cambridge University
Press}",
journal = j-INF-CONTROL,
volume = "3",
number = "1",
pages = "95--96",
month = mar,
year = "1960",
CODEN = "IFCNA4",
DOI = "http://dx.doi.org/10.1016/S0019-9958(60)90347-8",
ISSN = "0019-9958 (print), 1878-2981 (electronic)",
ISSN-L = "0019-9958",
bibdate = "Sat Sep 8 16:48:41 MDT 2012",
bibsource = "http://www.math.utah.edu/pub/bibnet/authors/m/mandelbrot-benoit.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.sciencedirect.com/science/article/pii/S0019995860903478",
acknowledgement = ack-nhfb,
fjournal = "Information and Control",
}
@Article{Pelta:1960:SP,
author = "Harold N. Pelta",
title = "Selfcipher: Programming",
journal = j-CACM,
volume = "3",
number = "2",
pages = "83--83",
month = feb,
year = "1960",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Nov 25 18:19:25 MST 2005",
bibsource = "http://dblp.uni-trier.de/db/journals/cacm/cacm3.html#Pelta60;
http://www.acm.org/pubs/contents/journals/cacm/;
http://www.math.utah.edu/pub/tex/bib/cacm1960.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
oldlabel = "Pelta60",
XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Pelta60",
}
@Book{Barker:1961:CSC,
author = "Wayne G. Barker",
title = "Cryptanalysis of the single columnar transposition
cipher",
publisher = "C. E. Tuttle Co.",
address = "Rutland, VT, USA",
pages = "x + 1 + 140",
year = "1961",
LCCN = "Z103 Z32",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "First edition. Bound in tan cloth; stamped in black;
red endpapers. Dust jacket. Library of The American
Cryptogram Association (George C. Lamb Collection).",
keywords = "Cryptography.",
}
@Article{Levine:1961:SAH,
author = "Jack Levine",
title = "Some Applications of High-Speed Computers to the Case
$ n = 2 $ of Algebraic Cryptography",
journal = j-MATH-COMPUT,
volume = "15",
number = "75",
pages = "254--260",
month = jul,
year = "1961",
CODEN = "MCMPAF",
ISSN = "0025-5718 (paper), 1088-6842 (electronic)",
ISSN-L = "0025-5718",
bibdate = "Tue Oct 13 08:06:19 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/mathcomp1960.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "Mathematics of Computation",
journal-URL = "http://www.ams.org/mcom/",
}
@Article{Levine:1961:SECa,
author = "Jack Levine",
title = "Some Elementary Cryptanalysis of Algebraic
Cryptography",
journal = j-AMER-MATH-MONTHLY,
volume = "68",
number = "5",
pages = "411--418",
month = may,
year = "1961",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
MRclass = "94.10",
MRnumber = "23 \#B2111",
bibdate = "Mon Jun 28 12:36:19 MDT 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@Book{Levine:1961:SECb,
author = "Jack Levine",
title = "Some elementary cryptanalysis of algebraic
cryptography",
publisher = "Mathematical Association of America",
address = "Buffalo, NY, USA",
pages = "411--418",
year = "1961",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprint from American Mathematical Monthly, vol. 68,
no. 5, May 1961.",
acknowledgement = ack-nhfb,
annote = "Bound in blue paper wrappers; printed in black.
Library of the American Cryptogram Association (George
C. Lamb Collection).",
keywords = "Cryptography.",
}
@Book{Shulman:1961:GC,
author = "David Shulman and Joseph Weintraub",
title = "A glossary of cryptography",
publisher = "Crypto Press",
address = "New York, NY, USA",
pages = "various",
year = "1961",
LCCN = "Z103 .S48",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Handbook of cryptography; section 1",
acknowledgement = ack-nhfb,
keywords = "cryptography --- terminology",
}
@Book{Friedman:1963:SLC,
author = "William F. (William Frederick) Friedman",
title = "Six lectures on cryptology",
publisher = "????",
address = "????",
pages = "iii + 182",
year = "1963",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "SRH-004.",
author-dates = "1891--1969",
keywords = "Ciphers; Cryptography",
}
@Book{Kahn:1963:PNU,
author = "David Kahn",
title = "Plaintext in the new unabridged: an examination of the
definitions on cryptology in {Webster's Third New
International Dictionary}",
publisher = "Crypto Press",
address = "New York, NY, USA",
pages = "35",
year = "1963",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography --- Terminology; language; Webster's
third new international dictionary of the English",
}
@Book{Thompson:1963:SDE,
author = "James Westfall Thompson and Saul Kussiel Padover",
title = "Secret diplomacy; espionage and cryptography,
1500-1815",
publisher = "F. Ungar Pub. Co",
address = "New York, NY, USA",
pages = "290",
year = "1963",
LCCN = "JX1648 .T5 1963",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "``Appendix: Cryptography'': p. 253--263. Bibliography:
p. 265--282.",
acknowledgement = ack-nhfb,
keywords = "cryptography --- history; diplomacy --- history;
Europe --- politics and government; secret service",
}
@Book{Laffin:1964:CCS,
author = "John Laffin",
title = "Codes and ciphers: secret writing through the ages",
publisher = "Abelard-Schuman",
address = "????",
pages = "164",
year = "1964",
LCCN = "",
bibdate = "Sat Apr 20 12:01:11 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Stout:1965:DRN,
author = "Rex Stout",
title = "The Doorbell Rang: a Nero Wolfe Novel",
publisher = "????",
address = "????",
pages = "??",
year = "1965",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 5]{Rivest:1998:CWC}.",
}
@Article{Kahn:1966:MC,
author = "David Kahn",
title = "Modern Cryptology",
journal = j-SCI-AMER,
volume = "215",
number = "1",
pages = "38--46",
month = jul,
year = "1966",
CODEN = "SCAMAC",
DOI = "http://dx.doi.org/10.1038/scientificamerican0766-38",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Sat May 18 15:58:23 MDT 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sciam1960.bib",
URL = "http://www.nature.com/scientificamerican/journal/v215/n1/pdf/scientificamerican0766-38.pdf",
acknowledgement = ack-nhfb,
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
}
@Book{Sinkov:1966:ECM,
author = "Abraham Sinkov",
title = "Elementary cryptanalysis: a mathematical approach",
volume = "22",
publisher = pub-MATH-ASSOC-AMER,
address = pub-MATH-ASSOC-AMER:adr,
pages = "ix + 222",
year = "1966",
ISBN = "0-88385-622-0",
ISBN-13 = "978-0-88385-622-2",
LCCN = "Z 104 S47 1980",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "With a supplement by Paul L. Irwin. Reissued in 1975
and 1980.",
series = "New mathematical library",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@Book{Tuchman:1966:ZT,
author = "Barbara W. Tuchman",
title = "The {Zimmermann} telegram",
publisher = pub-MACMILLAN,
address = pub-MACMILLAN:adr,
pages = "xii + 244",
year = "1966",
LCCN = "D511 .T77 1966",
bibdate = "Wed Nov 25 13:57:39 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprint of original 1958 edition. Kahn
\cite{Kahn:1996:CSS} describes this book as
``recount[ing] the political effects of the most
important cryptogram solution in history''.",
acknowledgement = ack-nhfb,
}
@Book{Bowers:1967:PC,
author = "William Maxwell Bowers and William G. Bryan",
title = "Practical cryptanalysis",
publisher = "American Cryptogrm Association",
address = "Greenfield, MA, USA",
pages = "various",
year = "1967",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Bound in printed paper wrappers. From the library of
the American Cryptogram Association. (The George C.
Lamb Collection.) V. I. Digraphic substitution, by
Bowers.-- V. II. The Bifid cipher, by Bowers.-- V. III.
The Trifid cipher.-- V. IV and V. ``Cryptographic
ABC'S'' by William G. Bryan.",
keywords = "Cryptography.",
}
@Article{Brillhart:1967:SFR,
author = "John Brillhart and J. L. Selfridge",
title = "Some Factorizations of $ 2^n \pm 1 $ and Related
Results",
journal = j-MATH-COMPUT,
volume = "21",
number = "97",
pages = "87--96",
month = jan,
year = "1967",
CODEN = "MCMPAF",
ISSN = "0025-5718 (paper), 1088-6842 (electronic)",
ISSN-L = "0025-5718",
bibdate = "Tue Oct 13 08:06:19 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "Mathematics of Computation",
journal-URL = "http://www.ams.org/mcom/",
}
@Book{Bryan:1967:CA,
author = "William G. Bryan",
title = "Cryptographic {ABC}'s",
publisher = "American Cryptogram Association",
address = "Greenfield, MA, USA",
year = "1967",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Practical cryptanalysis; v. 4, 5",
acknowledgement = ack-nhfb,
annote = "v. 1. Substitution and transposition ciphers.--v. 2.
Periodic ciphers. Miscellaneous.",
keywords = "Ciphers.",
}
@Book{Farago:1967:BSS,
author = "Ladislas Farago",
title = "The broken seal: the story of {Operation Magic} and
the {Pearl Harbor} disaster",
publisher = pub-RANDOM,
address = pub-RANDOM:adr,
pages = "439",
year = "1967",
LCCN = "D742.U5 F3",
bibdate = "Thu Apr 29 18:01:53 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See also reprint \cite{Farago:1969:BSS}.",
acknowledgement = ack-nhfb,
}
@Book{Golomb:1967:SRS,
author = "S. Golomb",
title = "Shift Register Sequences",
publisher = pub-HOLDEN-DAY,
address = pub-HOLDEN-DAY:adr,
pages = "xiv + 224",
year = "1967",
LCCN = "QA267.5.S4 G6",
bibdate = "Mon Nov 30 08:47:35 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Portions co-authored with Lloyd R. Welch, Richard M.
Goldstein, and Alfred W. Hales.",
acknowledgement = ack-nhfb,
}
@Book{Kahn:1967:CSSa,
author = "David Kahn",
title = "The codebreakers: the story of secret writing",
publisher = pub-MACMILLAN,
address = pub-MACMILLAN:adr,
pages = "xvi + 1164",
year = "1967",
LCCN = "Z103 .K28",
bibdate = "Tue Dec 01 08:31:37 1998",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/index-table-c.html#cryptography",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1000.html",
acknowledgement = ack-nhfb,
keywords = "information hiding; steganography",
}
@Book{Kahn:1967:CSSb,
author = "David Kahn",
title = "The codebreakers: the story of secret writing",
publisher = "Weidenfeld and Nicolson",
address = "London, UK",
pages = "xvi + 1164",
year = "1967",
LCCN = "Z103 .K28 1967",
bibdate = "Tue Dec 01 08:35:10 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Kullback:1967:SMC,
author = "Solomon Kullback",
title = "Statistical methods in cryptanalysis",
number = "14",
publisher = "National Archives",
address = "Washington, DC, USA",
edition = "Revised",
pages = "iii + 194",
year = "1967",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Technical literature series monograph",
acknowledgement = ack-nhfb,
keywords = "Cryptography.",
remark = "From \cite{Anscombe:2003:QCC}: ``A bookseller
description [of this book]: `This classic text provides
various statistical tests: the Chi Test, which affords
a quantitative measure of the degree of similarity
between two distributions, and the Phi Test, which
provides a quantitative measurement of the degree of
non-randomness of a distribution. Text includes
numerous tabulations of frequency data in other
languages.'.''",
}
@Book{Monge:1967:NMC,
author = "Alf Monge and O. G. Landsverk",
title = "Norse medieval cryptography in runic carvings",
publisher = "Norseman Press",
address = "Glendale, CA, USA",
pages = "224",
year = "1967",
LCCN = "E105 .M65",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Includes bibliographies.",
acknowledgement = ack-nhfb,
keywords = "America --- discovery and exploration --- Norse;
cryptography; runes",
}
@Article{Ayoub:1968:EEK,
author = "F. Ayoub",
title = "Erratum: Encryption with keyed random permutations",
journal = j-ELECT-LETTERS,
volume = "17",
number = "??",
pages = "??--??",
month = feb,
year = "1968",
CODEN = "ELLEAK",
DOI = "http://dx.doi.org/10.1049/el:19810541",
ISSN = "0013-5194 (print), 1350-911X (electronic)",
ISSN-L = "0013-5194",
bibdate = "Fri Dec 30 16:39:43 MST 2011",
bibsource = "http://www.computer.org/tc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4246020",
acknowledgement = ack-nhfb,
book-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220",
fjournal = "Electronics Letters",
}
@Article{Ayoub:1968:EKR,
author = "F. Ayoub",
title = "Encryption with keyed random permutations",
journal = j-ELECT-LETTERS,
volume = "17",
number = "??",
pages = "583--585",
month = feb,
year = "1968",
CODEN = "ELLEAK",
DOI = "http://dx.doi.org/10.1049/el:19810411",
ISSN = "0013-5194 (print), 1350-911X (electronic)",
ISSN-L = "0013-5194",
bibdate = "Fri Dec 30 16:39:40 MST 2011",
bibsource = "http://www.computer.org/tc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4245887",
acknowledgement = ack-nhfb,
book-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220",
fjournal = "Electronics Letters",
}
@Book{Sinkov:1968:ECMa,
author = "Abraham Sinkov",
title = "Elementary cryptanalysis: a mathematical approach",
volume = "22",
publisher = pub-RANDOM,
address = pub-RANDOM:adr,
pages = "ix + 189",
year = "1968",
LCCN = "QA11 .N5 v.22",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "New mathematical library",
acknowledgement = ack-nhfb,
keywords = "Ciphers; Cryptography",
}
@Book{Sinkov:1968:ECMb,
author = "Abraham Sinkov",
title = "Elementary cryptanalysis: a mathematical approach",
volume = "22",
publisher = pub-MATH-ASSOC-AMER,
address = pub-MATH-ASSOC-AMER:adr,
pages = "ix + 222",
year = "1968",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "New mathematical library",
acknowledgement = ack-nhfb,
keywords = "Ciphers; Cryptography",
}
@Book{Wilkes:1968:TSCa,
author = "M. V. (Maurice Vincent) Wilkes",
title = "Time-sharing computer systems",
volume = "5",
publisher = "Macdonald and Co.",
address = "London, UK",
pages = "vii + 102",
year = "1968",
ISBN = "0-356-02426-1",
ISBN-13 = "978-0-356-02426-4",
LCCN = "QA76.5 .W523 1968b",
bibdate = "Sun Mar 11 09:46:15 MDT 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
series = "Macdonald computer monographs",
acknowledgement = ack-nhfb,
remark = "According to \cite{Koblitz:1987:CNT}, this book
describes a one-way function invented by Roger Needham
for password encryption, a precursor to public-key
cryptography.",
subject = "Time-sharing computer systems",
}
@Book{Wilkes:1968:TSCb,
author = "M. V. (Maurice Vincent) Wilkes",
title = "Time-sharing computer systems",
volume = "5",
publisher = "American Elsevier Pub. Co.",
address = "New York, NY, USA",
pages = "102",
year = "1968",
LCCN = "QA76.5 .W523",
bibdate = "Sun Mar 11 09:46:15 MDT 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
series = "Computer monograph series",
acknowledgement = ack-nhfb,
remark = "According to \cite{Koblitz:1987:CNT}, this book
describes a one-way function invented by Roger Needham
for password encryption, a precursor to public-key
cryptography.",
subject = "Time-sharing computer systems",
}
@Book{Farago:1969:BSS,
author = "Ladislas Farago",
title = "The broken seal: the story of {Operation Magic} and
the {Pearl Harbor} disaster",
publisher = "Mayflower",
address = "London, UK",
pages = "415",
year = "1969",
LCCN = "D742.U5 F3",
bibdate = "Wed Nov 25 14:00:32 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprint of \cite{Farago:1967:BSS}.",
acknowledgement = ack-nhfb,
}
@Book{Knuth:1969:SNM,
author = "Donald E. Knuth",
title = "Semi\-nu\-mer\-i\-cal Algorithms",
volume = "2",
publisher = pub-AW,
address = pub-AW:adr,
pages = "xi + 624",
year = "1969",
ISBN = "0-201-03802-1",
ISBN-13 = "978-0-201-03802-6",
LCCN = "QA76.5 .K57",
bibdate = "Wed Dec 15 15:47:38 1993",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See pages 248--250.",
price = "US\$19.75",
series = "The Art of Computer Programming",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 6]{Handschuh:1998:SCC}.",
}
@Article{VanTassel:1969:ACT,
author = "Dennie {Van Tassel}",
title = "Advanced Cryptographic Techniques for Computers",
journal = j-CACM,
volume = "12",
number = "12",
pages = "664--665",
month = dec,
year = "1969",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Mar 24 21:38:51 MST 1997",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
http://www.math.utah.edu/pub/tex/bib/cacm1960.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Cryptographic techniques which can be used to maintain
the confidentiality of information processed by
computers are dealt with. Special emphasis is paid to
the unique characteristics of computer files that make
many cryptographic methods of little use. Relative
security, costs, and preferred methods are included in
this paper.",
acknowledgement = ack-nhfb,
classcodes = "C6130 (Data handling techniques)",
corpsource = "San Jose State Coll., CA, USA",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "ciphers secrecy systems; codes; computational
linguistics; confidential information processing;
cryptanalysis; cryptographic; security of data;
security systems",
}
@Book{Winterbotham:1969:SP,
author = "F. W. (Frederick William) Winterbotham",
title = "Secret and personal",
publisher = "Kimber",
address = "London, UK",
pages = "192",
year = "1969",
ISBN = "0-7183-0321-0",
ISBN-13 = "978-0-7183-0321-1",
LCCN = "D810.S7 W48; D810.S7 W73",
bibdate = "Fri May 13 08:14:55 MDT 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
melvyl.cdlib.org:210/CDL90",
acknowledgement = ack-nhfb,
author-dates = "1897--1990",
subject = "World War, 1939--1945; Secret service; Great Britain",
}
@Book{Galland:1970:HAB,
author = "Joseph Stanislaus Galland",
title = "An historical and analytical bibliography of the
literature of cryptology",
number = "10",
publisher = "AMS Press",
address = "New York, NY, USA",
pages = "viii + 209",
year = "1970",
ISBN = "0-404-50710-7",
ISBN-13 = "978-0-404-50710-7",
LCCN = "Z103.A1 G3 1970",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Northwestern University studies in the humanities",
acknowledgement = ack-nhfb,
keywords = "cryptography --- bibliography",
}
@Article{Gingerich:1970:BRB,
author = "Owen Gingerich",
title = "Book Review: {{\booktitle{The Codebreakers. The Story
of Secret Writing}} by David Kahn}",
journal = j-ISIS,
volume = "61",
number = "3",
pages = "405--406",
month = "Autumn",
year = "1970",
CODEN = "ISISA4",
ISSN = "0021-1753 (print), 1545-6994 (electronic)",
ISSN-L = "0021-1753",
bibdate = "Tue Jul 30 21:28:42 MDT 2013",
bibsource = "http://www.jstor.org/action/showPublication?journalCode=isis;
http://www.jstor.org/stable/i302289;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/isis1970.bib",
URL = "http://www.jstor.org/stable/229701",
acknowledgement = ack-nhfb,
fjournal = "Isis",
journal-URL = "http://www.jstor.org/page/journal/isis/about.html",
}
@Book{Marsh:1970:CSS,
author = "D. C. B. Marsh",
title = "Cryptology as a senior seminar topic",
publisher = "Mathematical Association of America",
address = "Buffalo, NY, USA",
pages = "761--764",
year = "1970",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprint from American Mathematical Monthly, vol. 77,
no. 7, August-September, 1970.",
acknowledgement = ack-nhfb,
annote = "Library of the American Cryptogram Association (George
C. Lamb Collection).",
keywords = "Cryptography.",
}
@Article{Marsh:1970:MEC,
author = "D. C. B. Marsh",
title = "Mathematical Education: Cryptology as a Senior Seminar
Topic",
journal = j-AMER-MATH-MONTHLY,
volume = "77",
number = "7",
pages = "761--764",
month = aug # "\slash " # sep,
year = "1970",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
bibdate = "Mon Jun 28 12:36:02 MDT 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@Book{Stark:1970:INT,
author = "Harold M. Stark",
title = "An introduction to number theory",
publisher = "Markham Publishing Company",
address = "Chicago, IL, USA",
pages = "x + 347",
year = "1970",
ISBN = "0-8410-1014-5",
ISBN-13 = "978-0-8410-1014-7",
LCCN = "QA241 .S72",
bibdate = "Fri Jun 24 14:24:21 MDT 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
series = "Markham mathematics series",
acknowledgement = ack-nhfb,
subject = "Number theory",
}
@Manual{USDOS:1970:BC,
author = "{United States. Dept. of the Army}",
title = "Basic cryptanalysis",
type = "Field Manual",
number = "FM 34-40-2",
organization = pub-USGPO,
address = pub-USGPO:adr,
pages = "various",
day = "13",
month = sep,
year = "1970",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
alttitle = "TM 32-220 20 August 1970.",
keywords = "Cryptography --- Military aspects --- Handbooks,
manuals, etc; Security systems --- Military aspects ---
Handbooks, manuals, etc; United States. --- Army ---
Handbooks, manuals, etc",
}
@Book{Wolfe:1970:SWC,
author = "James Raymond Wolfe",
title = "Secret writing: the craft of the cryptographer",
publisher = pub-MCGRAW-HILL,
address = pub-MCGRAW-HILL:adr,
pages = "192",
year = "1970",
LCCN = "652.8 W",
bibdate = "Wed Nov 25 14:23:25 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Explains the distinction between ciphers and codes and
describes their past and present use in secret
communications.",
acknowledgement = ack-nhfb,
annote = "High-school level book.",
keywords = "ciphers; cryptography",
}
@Article{Campaigne:1971:REC,
author = "H. H. Campaigne",
title = "Reviews: {{\em Elementary Cryptanalysis --- A
Mathematical Approach}}, by {Abraham Sinkov}",
journal = j-AMER-MATH-MONTHLY,
volume = "78",
number = "4",
pages = "423--423",
month = apr,
year = "1971",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
bibdate = "Mon Jun 28 12:36:19 MDT 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@Book{DAgapeyeff:1971:CC,
author = "Alexander D'Agapeyeff",
title = "Codes and ciphers",
publisher = "Gryphon Books",
address = "Ann Arbor, MI, USA",
pages = "160",
year = "1971",
ISBN = "????",
ISBN-13 = "????",
LCCN = "Z103 .D35 1971",
bibdate = "Sat Apr 20 13:40:57 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprint of \cite{DAgapeyeff:1939:CC}.",
acknowledgement = ack-nhfb,
}
@Article{Hammer:1971:SSC,
author = "Carl Hammer",
title = "Signature Simulation and Certain Cryptographic Codes",
journal = j-CACM,
volume = "14",
number = "1",
pages = "3--14",
month = jan,
year = "1971",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Mar 25 13:26:09 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Three cyphers allegedly authored by Thomas Jefferson
Beale in 1822 have been the subject of intensive study
for over 100 years. Generations of cryptanalysts have
expended untold man-years, thus far without success,
attempting tode code them; vast armies of fortune
hunters and treasure seekers have devoted Herculean
labors to digging up the rolling hills of Virginia
trying to locate the promised bonanza. \par
The history of pertinent activities would fill volumes,
yet serious students of cryptography have always had
nagging doubts about the cyphers' authenticity. It has
been alleged that the ``known solution'' to Cypher
Number Two: 115, 73, 24, 818, 37, 52, 49, \ldots{} (``I
have deposited in the County of Bedford about four
miles from Buford's in an excavation or vault
\ldots{}'') with the aid of an unsanitized version of
the Declaration of Independence was merely a superb,
imaginative, and grandiose hoax perpetrated ages ago
for whatever reasons. Modern computer technology could
obviously perform signature analyses the process of
encoding itself so as to yield new clues and deeper
insights into their construction. For the benefit of
the uninitiated, the encoding method used in the second
cypher employs a specified document whose words are
simply numbered consecutively, and first letters of
these words are sought out at random to match the
letters of these words are sought out at random to
match the letters of the clear text or message.
\par
The sequence of numbers corresponding to these matches
is then written down as the final code. While
primitive, the process has the advantage of relative
security until the source document becomes known; at
that moment the cypher can be decoded even by second
graders. The work now completed with the help of our
UNIVAC 1108 includes numerous analytical studies of the
Beale cyphers and various types of simulations.
\par
For example, we have turned the entire process of
simulated encoding by various schemes over to the
machine and analyzed the signatures of these synthetic
codes; we have also encoded various messages by hand,
using different texts and a variety of methods to
obtain their signatures. These simulations provide
convincing evidence that the signatures are both
process and data dependent; they indicate also very
strongly that Mr. Beale's cyphers are for real and that
it is merely a matter of time before someone finds the
correct source document and locates the right vault in
the common-wealth of Virginia.",
acknowledgement = ack-nhfb,
classcodes = "B6120B (Codes); C6130 (Data handling techniques)",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "Beale Cyphers codes; codes; computer applications;
computer signature simulation; cryptanalysis; cyphers;
Declaration of Independence; decoding; encoding; Magna
Carta; numerical cryptographic codes; pseudotext;
results analysis; signature; simulation; Thomas
Jefferson Beale; treasure site identification",
treatment = "A Application",
}
@Book{Smith:1971:CSS,
author = "Laurence Dwight Smith",
title = "Cryptography, the science of secret writing",
publisher = pub-DOVER,
address = pub-DOVER:adr,
pages = "164",
year = "1971",
ISBN = "0-486-20247-X",
ISBN-13 = "978-0-486-20247-1",
LCCN = "Z 104 S65c 1971",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "``This Dover edition, first published in 1955, is an
unabridged and corrected republication of the work
originally published by W. W. Norton and Company in
1943.'' ``Copyright renewed 1971.'' Bibliography: p.
156.",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@Article{Vincent:1971:PAG,
author = "C. H. Vincent",
title = "Precautions for accuracy in the generation of truly
random binary numbers",
journal = j-J-PHYS-E,
volume = "4",
number = "11",
pages = "825--828",
year = "1971",
CODEN = "JPSIAE",
DOI = "http://dx.doi.org/10.1088/0022-3735/5/6/521",
ISSN = "0022-3735",
bibdate = "Sat Nov 29 15:13:35 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See corrigendum \cite{Vincent:1972:CPA}.",
URL = "http://stacks.iop.org/0022-3735/4/i=11/a=007",
acknowledgement = ack-nhfb,
fjournal = "Journal of Physics. E: Scientific instruments",
journal-URL = "http://iopscience.iop.org/0022-3735/",
}
@Article{Vincent:1972:CPA,
author = "C. H. Vincent",
title = "Corrigendum: {Precautions for accuracy in the
generation of truly random binary numbers}",
journal = j-J-PHYS-E,
volume = "5",
number = "6",
pages = "546--546",
year = "1972",
CODEN = "JPSIAE",
ISSN = "0022-3735",
bibdate = "Sat Nov 29 15:13:30 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
note = "See \cite{Vincent:1971:PAG}.",
URL = "http://stacks.iop.org/0022-3735/5/i=6/a=521",
acknowledgement = ack-nhfb,
fjournal = "Journal of Physics. E: Scientific instruments",
journal-URL = "http://iopscience.iop.org/0022-3735/",
}
@Book{Wilkes:1972:TSC,
author = "M. V. (Maurice Vincent) Wilkes",
title = "Time-sharing computer systems",
volume = "5",
publisher = "Macdonald and Co.",
address = "London, UK",
edition = "Second",
pages = "ix + 149",
year = "1972",
ISBN = "0-444-19583-1 (Elsevier)",
ISBN-13 = "978-0-444-19583-8 (Elsevier)",
LCCN = "QA76.5 .W523 1972",
bibdate = "Sun Mar 11 09:46:15 MDT 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
series = "Computer monographs",
acknowledgement = ack-nhfb,
remark = "According to \cite{Koblitz:1987:CNT}, this book
describes a one-way function invented by Roger Needham
for password encryption, a precursor to public-key
cryptography.",
subject = "Time-sharing computer systems",
}
@Book{Bertrand:1973:EOP,
author = "Gustave Bertrand",
title = "{Enigma}; ou, La plus grande {\'e}nigme de la guerre
1939--1945",
publisher = "Plon",
address = "Paris, France",
pages = "295 + 2 + 16",
year = "1973",
LCCN = "????",
bibdate = "Sun Dec 01 09:15:14 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
language = "French",
}
@Article{Chesson:1973:CC,
author = "F. W. (Frederick William) Chesson",
title = "Computers and cryptology",
journal = j-DATAMATION,
volume = "??",
number = "??",
pages = "62--77",
month = jan,
year = "1973",
CODEN = "DTMNAT",
ISSN = "0011-6963",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Datamation",
}
@Article{Feistel:1973:CCP,
author = "Horst Feistel",
title = "Cryptography and Computer Privacy",
journal = j-SCI-AMER,
volume = "228",
number = "5",
pages = "15--23",
month = may,
year = "1973",
CODEN = "SCAMAC",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "Database/Wiederhold.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sciam.bib",
acknowledgement = ack-nhfb,
annote = "Survey of cryptography for data bases.",
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
keywords = "code security; computer privacy; cryptography",
referencedin = "Referenced in \cite[Ref. 14]{Biham:1998:TA}.",
}
@Book{Futrelle:1973:BTM,
author = "Jacques Futrelle",
title = "Best ``{Thinking Machine}'' detective stories",
publisher = pub-DOVER,
address = pub-DOVER:adr,
pages = "ix + 241",
year = "1973",
ISBN = "0-486-20537-1",
ISBN-13 = "978-0-486-20537-3",
LCCN = "PS3511.U98 B4",
bibdate = "Mon Nov 4 07:46:57 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
contents = "The problem of cell 13.--The crystal gazer.--The
scarlet thread.--The flaming phantom.--The problem of
the stolen Rubens.--The missing necklace.--The phantom
motor.--The brown coat.--His perfect alibi.--The lost
radium.--Kidnapped Baby Blake, millionaire.--The fatal
cipher.",
keywords = "detective and mystery stories",
}
@Article{Geffe:1973:HPD,
author = "P. Geffe",
title = "How to protect data with ciphers that are really hard
to break",
journal = j-ELECTRONICS,
volume = "46",
number = "1",
pages = "99--101",
year = "1973",
ISSN = "0883-4989",
bibdate = "Mon Nov 30 08:58:36 1998",
bibsource = "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "This cipher was later broken by
\cite{Siegenthaler:1985:DCS}.",
acknowledgement = ack-nhfb,
fjournal = "Electronics",
}
@Book{Higenbottam:1973:CC,
author = "Frank Higenbottam",
title = "Codes and ciphers",
publisher = "English Universities Press",
address = "London, UK",
pages = "180 (est.)",
year = "1973",
ISBN = "0-340-12493-8",
ISBN-13 = "978-0-340-12493-2",
LCCN = "????",
bibdate = "Sat Apr 20 12:10:26 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Knuth:1973:ACP,
author = "Donald E. Knuth",
title = "The Art of Computer Programming, Vol. 2: Seminumerical
Algorithms",
publisher = "Addison-Wesley",
address = "Reading, MA",
edition = "Second",
pages = "??",
year = "1973",
ISBN = "0-201-03809-9, 0-201-03822-6",
ISBN-13 = "978-0-201-03809-5, 978-0-201-03822-4",
LCCN = "QA76.6 .K641 1973",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Citation has year as 1981, but that appears to be
incorrect.",
referencedin = "Referenced in \cite[Ref. 14]{Kaliski:1995:SUR}.",
}
@Article{Lampson:1973:NCP,
author = "Butler W. Lampson",
title = "A Note on the Confinement Problem",
journal = j-CACM,
volume = "16",
number = "10",
pages = "613--615",
month = oct,
year = "1973",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Mar 25 13:26:09 MST 1997",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1014.html",
abstract = "This note explores the problem of confining a program
during its execution so that it cannot transmit
information to any other program except its caller. A
set of examples attempts to stake out the boundaries of
the problem. Necessary conditions for a solution are
stated and informally justified.",
acknowledgement = ack-nhfb,
annote = "Prevention of privacy leaks between programs.",
classcodes = "C6130 (Data handling techniques); C6150J (Operating
systems)",
classification = "723",
corpsource = "Xerox Palo Alto Res. Center, CA, USA",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
journalabr = "Commun ACM",
keywords = "computer systems programming; confinement; information
hiding; leakage of data; operating systems (computers);
privacy; proprietary program; protection; security;
security of data; steganography",
treatment = "P Practical",
}
@Book{Norman:1973:SWB,
author = "Bruce Norman",
title = "Secret warfare: the battle of codes and ciphers",
publisher = "David and Charles,",
address = "Newton Abbot, UK",
pages = "187",
year = "1973",
ISBN = "0-7153-6223-2",
ISBN-13 = "978-0-7153-6223-5",
LCCN = "Z103 .N67",
bibdate = "Sat Apr 20 12:02:52 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Borucki:1974:MNN,
author = "L. J. Borucki and J. B. Diaz",
title = "Mathematical Notes: a Note on Primes, with Arbitrary
Initial or Terminal Decimal Ciphers, in {Dirichlet}
Arithmetic Progressions",
journal = j-AMER-MATH-MONTHLY,
volume = "81",
number = "9",
pages = "1001--1002",
month = nov,
year = "1974",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
bibdate = "Mon Jun 28 12:37:41 MDT 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@Article{Evans:1974:UAS,
author = "Arthur {Evans, Jr.} and William Kantrowitz and Edwin
Weiss",
title = "A User Authentication Scheme Not Requiring Secrecy in
the Computer",
journal = j-CACM,
volume = "17",
number = "8",
pages = "437--442",
month = aug,
year = "1974",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jan 22 06:38:18 MST 2001",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
http://dblp.uni-trier.de/db/journals/cacm/cacm17.html#EvansKW74;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "In many computer operating systems a user
authenticates himself by entering a secret password
known solely to himself and the system. The system
compares this password with one recorded in a Password
Table which is available to only the authentication
program. The integrity of the system depends on keeping
the table secret. In this paper a password scheme is
presented which does not require secrecy in the
computer. All aspects of the system, including all
relevant code and data bases, may be known by anyone
attempting to intrude. The scheme is based on using a
function H which the would-be intruder is unable to
invert. This function is applied to the user's password
and the result compared to a table entry, a match being
interpreted as authentication of the user. The intruder
may know all about H and have access to the table, but
he can penetrate the system only if he can invert H to
determine an input that produces a given output. This
paper discusses issues surrounding selection of a
suitable H.",
acknowledgement = ack-nhfb,
annote = "Password protection by irreversible transformation",
classcodes = "C6130 (Data handling techniques); C6150J (Operating
systems)",
classification = "722; 723",
corpsource = "MIT, Lexington, MA, USA",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
journalabr = "Commun ACM",
keywords = "authentication; computer operating systems;
cryptology; engineering problems; human; invert; one
way encryption; operating system security; operating
systems (computers); password scheme; security;
security of data; user authentication scheme",
oldlabel = "EvansKW74",
treatment = "A Application; T Theoretical or Mathematical",
XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/EvansKW74",
}
@Article{Friedman:1974:ETR,
author = "Theodore D. Friedman and Lance J. Hoffman",
title = "Execution Time Requirements for Encipherment
Programs",
journal = j-CACM,
volume = "17",
number = "8",
pages = "445--449",
month = aug,
year = "1974",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Mar 25 13:26:09 MST 1997",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See letter \cite{McCarthy:1975:AFP}.",
abstract = "The time taken to decipher 20,000 words of data by
four additive methods on a Control Data 6400 computer
was measured using assembly language and Fortran
routines. Standard deviations were computed for 100
runs by each method, and from this the range of error
at the 95 percent confidence level was calculated. The
time required for selecting and fetching the plaintext
data and for storing the ciphertext was separately
measured (the ``null transformation''), and was then
compared with the times required by each enciphering
method. The enciphering processes required at least
four times as much cpu time when programmed in
Fortran.",
acknowledgement = ack-nhfb,
classcodes = "C6130 (Data handling techniques); C6150J (Operating
systems)",
classification = "723",
corpsource = "Univ. California, Berkeley, CA, USA",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
journalabr = "Commun ACM",
keywords = "additive ciphers; assembly language; cpu;
cryptography; cryptology; data processing; double key
encipherment; enciphering time coefficient;
encipherment programs; errors; execution time;
experiments; Fortran; null; one word key; operating
systems (computers); privacy transformations;
protection; pseudo random key; security; security of
data; time; transformation",
treatment = "A Application; T Theoretical or Mathematical; X
Experimental",
}
@Book{Kahn:1974:C,
author = "David Kahn",
title = "The codebreakers",
publisher = "Weidenfeld and Nicolson",
address = "London, UK",
edition = "Abridged",
pages = "xvi + 576",
year = "1974",
ISBN = "0-297-76785-2",
ISBN-13 = "978-0-297-76785-5",
LCCN = "Z103 .K28 1974",
bibdate = "Thu Jul 23 17:02:35 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/master.bib",
acknowledgement = ack-nhfb,
}
@Book{Nanovic:1974:SWI,
author = "Nanovic, John L. (John Leonard)",
title = "Secret writing: an introduction to cryptograms,
ciphers, and codes",
publisher = pub-DOVER,
address = pub-DOVER:adr,
pages = "x + 117",
year = "1974",
ISBN = "0-486-23062-7",
ISBN-13 = "978-0-486-23062-7",
LCCN = "Z104.N35 1974",
bibdate = "Wed Nov 25 14:23:25 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprint of the 1936 edition \cite{Nanovic:1936:SWI}.",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptograms; cryptography",
}
@Article{Pollard:1974:TFP,
author = "J. Pollard",
title = "Theorems on factorization and primality testing",
journal = j-PROC-CAMBRIDGE-PHIL-SOC,
volume = "76",
pages = "521--528",
year = "1974",
CODEN = "PCPSA4",
ISSN = "0008-1981",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Proceedings of the Cambridge Philosophical Society.
Mathematical and physical sciences",
referencedin = "Referenced in \cite[Ref. 18]{Kaliski:1995:SUR}.",
}
@Article{Purdy:1974:HSL,
author = "George B. Purdy",
title = "A High Security Log-in Procedure",
journal = j-CACM,
volume = "17",
number = "8",
pages = "442--445",
month = aug,
year = "1974",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Mar 25 13:26:09 MST 1997",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "The protection of time sharing systems from
unauthorized users is often achieved by the use of
passwords. By using one-way ciphers to code the
passwords, the risks involved with storing the
passwords in the computer can be avoided. The selection
of a suitable one-way cipher is discussed. It is
suggested that for this purpose polynomials over a
prime modulus are superior to one-way ciphers derived
from Shannon codes.",
acknowledgement = ack-nhfb,
annote = "Password protection by irreversible cryptographic
transformation",
classcodes = "C6130 (Data handling techniques); C6150J (Operating
systems)",
classification = "722; 723",
corpsource = "Univ. Illinois, Urbana-Champaign, IL, USA",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
journalabr = "Commun ACM",
keywords = "code; computer operating systems; cryptography; data
processing --- Security of Data; one way ciphers;
operating systems; operating systems (computers);
passwords; security; security of data; time sharing
systems",
treatment = "A Application; T Theoretical or Mathematical",
}
@Manual{Richards:1974:SWP,
author = "Sheila R. Richards",
title = "Secret writing in the public records: {Henry
VIII--George II}",
publisher = "H.M.S.O.",
address = "London",
pages = "x + 173 + 4 plates",
year = "1974",
ISBN = "0-11-440054-7",
ISBN-13 = "978-0-11-440054-5",
LCCN = "DA310 .G681 1974",
bibdate = "Wed Nov 25 14:23:25 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Contains one hundred documents, all but one of which
are written wholly or partially in cipher and are now
deciphered and printed in full for the first time.
Includes letters in French or Italian, with a summary
in English.",
price = "UK\pounds4.50",
acknowledgement = ack-nhfb,
keywords = "Great Britain --- history --- 18th Century ---
sources; Great Britain --- history --- stuarts,
1603--1714 --- sources; Great Britain --- history ---
Tudors, 1485--1603 --- sources",
}
@TechReport{Rivest:1974:AAR,
author = "Ronald L. Rivest",
title = "Analysis of Associative Retrieval Algorithms",
type = "Technical Report",
number = "TR.54",
institution = "Institut de la Recherche en Informatique et
Automatique, now Institut National de Recherche en
Informatique et Automatique (INRIA)",
address = "Domaine de Voluceau --- Rocquencourt --- B.P. 105,
78153 Le Chesnay Cedex, France",
pages = "??",
month = feb,
year = "1974",
bibdate = "Thu Jul 21 09:32:07 1994",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
note = "Also published in/as: Stanford CSD report 74-415. Also
published in/as: SIAM Journal for Computing,
Springer-Verlag (Heidelberg, FRG and New York NY,
USA)-Verlag, 1976, with mod. title.",
acknowledgement = ack-nhfb,
annote = "Combinatorial hashing for retrieval.",
}
@InProceedings{Rivest:1974:HCA,
author = "R. L. Rivest",
title = "On hash-coding algorithms for partial-match
retrieval",
crossref = "IEEE:1974:ASS",
pages = "95--103",
year = "1974",
bibdate = "Mon Jul 18 10:06:22 1994",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
acknowledgement = ack-nhfb,
}
@Misc{Thomas:1974:RPS,
author = "R. Thomas",
title = "{RFC 644}: On the problem of signature authentication
for network mail",
day = "22",
month = jul,
year = "1974",
bibdate = "Thu Oct 16 09:34:09 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Status: UNKNOWN. Not online.",
URL = "ftp://ftp.internic.net/rfc/rfc644.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc644.txt",
acknowledgement = ack-nhfb,
online = "no",
status = "UNKNOWN",
}
@Book{Winterbotham:1974:US,
author = "F. W. (Frederick William) Winterbotham",
title = "The {Ultra} secret",
publisher = "Weidenfeld and Nicolson",
address = "London, UK",
pages = "xiii + 199",
year = "1974",
ISBN = "0-297-76832-8",
ISBN-13 = "978-0-297-76832-6",
LCCN = "D810.C88 W56",
bibdate = "Fri May 13 08:14:55 MDT 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
melvyl.cdlib.org:210/CDL90",
acknowledgement = ack-nhfb,
subject = "Winterbotham, F. W; (Frederick William); World War,
1939--1945; Cryptography; Secret service; Great
Britain; Personal narratives, British; Enigma cipher
system",
subject-dates = "1897--1990",
}
@Book{Winterbotham:1974:USF,
author = "F. W. (Frederick William) Winterbotham",
title = "The {Ultra} secret: the first account of the most
astounding cryptanalysis coup of {World War II} --- how
the {British} broke the {German} code and read most of
the signals between {Hitler} and his generals
throughout the war",
publisher = pub-HARPER-ROW,
address = pub-HARPER-ROW:adr,
pages = "xiii + 199",
year = "1974",
ISBN = "0-06-014678-8",
ISBN-13 = "978-0-06-014678-8",
LCCN = "D810.C95 W73 1974",
bibdate = "Fri May 13 06:39:10 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
melvyl.cdlib.org:210/CDL90",
acknowledgement = ack-nhfb,
author-dates = "1897--1990",
subject = "Winterbotham, F. W; (Frederick William); World War,
1939-1945; Cryptography; Secret service; Great Britain;
Personal narratives, English",
}
@Book{Barker:1975:CSS,
author = "Wayne G. Barker",
title = "Cryptanalysis of the simple substitution cipher with
word divisions using non-pattern word lists",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "20 + 108",
year = "1975",
ISBN = "????",
ISBN-13 = "????",
LCCN = "Z103 .B3",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
annote = "Bound in gray paper wrappers; printed in black and
gray. The George C. Lamb Collection.",
keywords = "ciphers; Ciphers; Cryptography; cryptography",
}
@InProceedings{Bayer:1975:EST,
author = "Rudolf Bayer and J. K. Metzger",
title = "On the Encipherment of Search Trees and Random Access
Files",
crossref = "Kerr:1975:PIC",
pages = "452--452",
year = "1975",
bibdate = "Fri Jan 12 07:50:25 MST 2001",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.vldb.org/dblp/db/conf/vldb/vldb75.html",
URL = "http://www.vldb.org/dblp/db/conf/vldb/BayerM75.html",
acknowledgement = ack-nhfb,
authorurl = "http://www.vldb.org/dblp/db/indices/a-tree/b/Bayer:Rudolf.html;
http://www.vldb.org/dblp/db/indices/a-tree/m/Metzger:J=_K=.html",
}
@MastersThesis{Blatman:1975:MMC,
author = "Peter Blatman",
title = "Method of modern cryptanalysis: research project",
type = "Thesis ({M.S. in Electrical Engineering})",
school = "Department of Electrical Engineering and Computer
Sciences, University of California, Berkeley",
address = "Berkeley, CA, USA",
pages = "various",
month = jun,
year = "1975",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "computer sciences --- dissertations; dissertations,
academic --- UCB --- Electrical Engineering ---
1971--1980; University of California, Berkeley. Dept.
of Electrical Engineering and Computer Sciences",
}
@Article{Brillhart:1975:NPC,
author = "John Brillhart and D. H. Lehmer and J. L. Selfridge",
title = "New primality criteria and factorizations of $ 2^m \pm
1 $",
journal = j-MATH-COMPUT,
volume = "29",
number = "130",
pages = "620--647",
month = apr,
year = "1975",
CODEN = "MCMPAF",
ISSN = "0025-5718 (paper), 1088-6842 (electronic)",
ISSN-L = "0025-5718",
bibdate = "Tue Oct 13 08:06:19 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
classcodes = "B0210 (Algebra); C1110 (Algebra)",
corpsource = "Dept. Math., Univ. Arizona, Tucson, AZ, USA",
fjournal = "Mathematics of Computation",
journal-URL = "http://www.ams.org/mcom/",
keywords = "divisibility properties; factorizations; Fermat's
theorem; hyperbola; Lucas sequences; Mersenne numbers;
number theory; primality criteria; search bound",
referencedin = "Referenced in \cite[Ref. 2]{Silverman:1997:FGR}.",
treatment = "T Theoretical or Mathematical",
}
@Book{Brown:1975:BL,
author = "Anthony Cave Brown",
title = "Bodyguard of lies",
publisher = pub-HARPER-ROW,
address = pub-HARPER-ROW:adr,
pages = "x + 947 + 8",
year = "1975",
ISBN = "0-06-010551-8",
ISBN-13 = "978-0-06-010551-8",
LCCN = "D810.S7 C36 1975",
bibdate = "Mon Aug 25 16:20:50 MDT 2014",
bibsource = "fsz3950.oclc.org:210/WorldCat;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Examines Allied intelligence and counter-intelligence
operations during World War II, describing the cipher
machine used to break German codes and the tactics,
ruses, and deception employed to ensure the successful
invasion of Normandy.",
acknowledgement = ack-nhfb,
subject = "World War, 1939--1945; Secret service; Secret
service.",
tableofcontents = "Part 1. The origins of special means 1938--1942.
Ultra \\
Coventry \\
Special means operational \\
Part 2. The roots of conspiracy 1934--1943 \\
Canaris \\
The schwarze Kapelle \\
Friend or foe \\
The plot begins \\
The outbreak of war \\
Conspiracy at the Vatican \\
The Venlo incident \\
``Adroit intrigue'' \\
Canaris at work \\
The assassination of Heydrich \\
Operation flash \\
Part 3. High strategy and low tactics 1943 \\
Casablanca \\
The battle of the Atlantic \\
The LCS and plan Jael \\
Mincemeat \\
Quebec \\
The Schwarze Kappelle, 1943 \\
Starkey \\
Prosper \\
The intelligence attack \\
Teheran \\
Cicero \\
Part 4. Cover and deception \\
January to June 1944. Eisenhower, supreme commander \\
The German supreme command \\
Bodyguard \\
The Balkans \\
Fortitude north \\
Fortitude south \\
Nuremberg \\
Aerial stratagems \\
Security \\
The wireless game \\
The French labyrinth \\
Canaris's last throw \\
Vendetta \\
The eve of D-day \\
Part 5. Normandy to nemesis \\
June 6 to August 20, 1944. D-day \\
The deceptions of D-day \\
Sword and stratagem \\
The French revolt \\
Rommel \\
The V1 \\
Goodwood \\
July 20, 1944 \\
The breakout \\
Gotterdammerung",
}
@Article{Coppersmith:1975:GCA,
author = "Don Coppersmith and Edna Grossman",
title = "Generators for Certain Alternating Groups with
Applications to Cryptography",
journal = j-SIAM-J-APPL-MATH,
volume = "29",
number = "4",
pages = "624--627",
month = dec,
year = "1975",
CODEN = "SMJMAP",
ISSN = "0036-1399 (print), 1095-712X (electronic)",
ISSN-L = "0036-1399",
bibdate = "Thu Oct 15 18:16:06 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjapplmath.bib;
JSTOR database",
acknowledgement = ack-nhfb,
classification = "B0210 (Algebra); C1110 (Algebra); C6130 (Data
handling techniques)",
corpsource = "Dept. of Math. Sci., IBM Thomas J. Watson Res. Center,
Yorktown Heights, NY, USA",
fjournal = "SIAM Journal on Applied Mathematics",
journal-URL = "http://epubs.siam.org/siap",
keywords = "alternating groups; block ciphers; computer
encipherment of data; cryptography; data handling;
group theory; permutations; security; security of data;
subgroups",
treatment = "A Application; T Theoretical or Mathematical",
}
@Misc{Ellis:1975:PKC,
author = "James Ellis and Clifford Cocks and Malcolm
Williamson",
title = "Public-key Cryptography",
howpublished = "Classified reports (titles uncertain) at Government
Communications Headquarters (GCHQ), Cheltenham, UK.",
year = "1975",
bibdate = "Wed Apr 25 10:41:58 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Work declassified in 1997. Awarded the 100th IEEE
Milestone Award for the first discovery (albeit long
secret) of public-key cryptography.",
URL = "http://www.gchq.gov.uk/Press/Pages/100th-IEEE-milestone-award.aspx",
acknowledgement = ack-nhfb,
}
@Book{Hardy:1975:ITN,
author = "Godfrey H. Hardy and Edward M. Wright",
title = "An Introduction to the Theory of Numbers",
publisher = pub-CLARENDON,
address = pub-CLARENDON:adr,
edition = "Fourth",
pages = "421",
year = "1975",
ISBN = "0-19-853310-7 (invalid checksum??)",
ISBN-13 = "978-0-19-853310-8",
LCCN = "????",
bibdate = "Fri Jun 24 12:32:14 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Jones:1975:ESP,
author = "Anita K. Jones and Richard J. Lipton",
title = "The enforcement of security policies for computation",
journal = j-OPER-SYS-REV,
volume = "9",
number = "5",
pages = "197--206",
month = nov,
year = "1975",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:57 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Article{McCarthy:1975:AFP,
author = "John McCarthy",
title = "{ACM Forum}: {Proposed} Criterion for a Cipher to be
Probable-Word-Proof",
journal = j-CACM,
volume = "18",
number = "2",
pages = "131--132",
month = feb,
year = "1975",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Jul 26 10:24:13 2001",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See \cite{Friedman:1974:ETR}.",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
}
@PhdThesis{Neat:1975:NCC,
author = "Charlie Edmund Neat",
title = "A new computer cryptography: the Expanded Character
Set {(ECS)} cipher",
school = "Engineering, University of California, Los Angeles",
address = "Los Angeles, CA, USA",
pages = "xxi + 203",
year = "1975",
LCCN = "????",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "ciphers; computers --- access control; dissertations,
academic --- UCLA --- engineering; electronic data
processing --- security measures",
}
@TechReport{Pless:1975:ESC,
author = "Vera Pless",
title = "Encryption schemes for computer confidentially [sic]",
type = "MAC technical memorandum",
number = "63",
institution = "Massachusetts Institute of Technology, Project MAC",
address = "Cambridge, MA, USA",
pages = "19",
year = "1975",
LCCN = "QA76.9.A25 P55",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Research done under ARPA Order no.2095, ONR Contract
no. N00014-70-A-0362-0006 and IBM Contract 82280.",
acknowledgement = ack-nhfb,
annote = "Research supported by the Advanced Research Projects
Agency under ARPA Order No. 2095 monitored by ONR
Contract No. N00014-70-A-0362-0006, and in part by IBM
Contract 82280. 18-19.",
keywords = "Computers; electronic data processing departments;
security measures",
}
@Book{Rohwer:1975:GIM,
author = "Jurgen Rohwer",
title = "{Geleitzugschlachten im Marz 1943:
F{\"u}hrungsprobleme im H{\"o}hepunkt der Schlacht im
Atlantik}. ({German}) [{Convoy} in {March 1943}:
implementation problems in the climax of the {Battle of
the Atlantic}]",
publisher = "Motorbuch",
address = "Stuttgart, Germany",
pages = "356",
year = "1975",
ISBN = "3-87943-383-6",
ISBN-13 = "978-3-87943-383-4",
LCCN = "????",
bibdate = "Tue Aug 26 07:20:00 MDT 2014",
bibsource = "fsz3950.oclc.org:210/WorldCat;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See also English translation \cite{Rohwer:1977:CCB}.",
acknowledgement = ack-nhfb,
language = "German",
}
@Article{Schroeder:1975:ESK,
author = "Michael D. Schroeder",
title = "Engineering a security kernel for {Multics}",
journal = j-OPER-SYS-REV,
volume = "9",
number = "5",
pages = "25--32",
month = nov,
year = "1975",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:57 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Book{Wilkes:1975:TSC,
author = "M. V. (Maurice Vincent) Wilkes",
title = "Time-sharing computer systems",
publisher = "Macdonald and Jane's",
address = "London, UK",
edition = "Third",
pages = "ii + 166",
year = "1975",
ISBN = "0-444-19525-4 (American Elsevier)",
ISBN-13 = "978-0-444-19525-8 (American Elsevier)",
LCCN = "QA76.53 .W54 1975",
bibdate = "Sun Mar 11 09:46:15 MDT 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
series = "Computer monographs",
acknowledgement = ack-nhfb,
remark = "According to \cite{Koblitz:1987:CNT}, this book
describes a one-way function invented by Roger Needham
for password encryption, a precursor to public-key
cryptography. Fragment on page 148 seems to be the
location.",
subject = "Time-sharing computer systems",
}
@Book{Winterbotham:1975:US,
author = "F. W. (Frederick William) Winterbotham",
title = "The {Ultra} secret",
publisher = "Dell",
address = "New York, NY, USA",
pages = "286",
year = "1975",
ISBN = "????",
ISBN-13 = "????",
LCCN = "D810.C88 W56 1976",
bibdate = "Fri May 13 08:14:55 MDT 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
melvyl.cdlib.org:210/CDL90",
acknowledgement = ack-nhfb,
author-dates = "1897--1990",
}
@MastersThesis{Worth:1975:CMA,
author = "Vivian I. Worth",
title = "Cryptology: mathematical applications",
type = "Thesis ({M.S.})",
school = "Central Missouri State University",
address = "Warrensburg, MO, USA",
pages = "iv + 63",
year = "1975",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography.",
}
@Book{Anonymous:1976:CCA,
author = "Anonymous",
title = "Cryptography and cryptanalysis articles",
volume = "5",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "v + 144",
year = "1976",
ISBN = "0-89412-003-4",
ISBN-13 = "978-0-89412-003-9",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
keywords = "Ciphers; Cryptography",
}
@Article{Bayer:1976:EST,
author = "R. Bayer and J. K. Metzger",
title = "On the Encipherment of Search Trees and Random Access
Files",
journal = j-TODS,
volume = "1",
number = "1",
pages = "37--52",
month = mar,
year = "1976",
CODEN = "ATDSD3",
ISSN = "0362-5915 (print), 1557-4644 (electronic)",
ISSN-L = "0362-5915",
bibdate = "Sat Apr 14 10:34:48 MDT 2001",
bibsource = "Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Also published in \cite[p.~508--510]{Kerr:1975:PIC}.",
URL = "http://www.acm.org/pubs/articles/journals/tods/1976-1-1/p37-bayer/p37-bayer.pdf;
http://www.acm.org/pubs/citations/journals/tods/1976-1-1/p37-bayer/",
abstract = "The securing of information in indexed, random access
files by means of privacy transformations must be
considered as a problem distinct from that for
sequential files. Not only must processing overhead due
to encrypting be considered, but also threats to
encipherment arising from updating and the file
structure itself must be countered. A general
encipherment scheme is proposed for files maintained in
a paged structure in secondary storage. This is applied
to the encipherment of indexes organized as $B$-trees;
a $B$-tree is a particular type of multiway search
tree. Threats to the encipherment of $B$-trees,
especially relating to updating, are examined, and
countermeasures are proposed for each. In addition, the
effect of encipherment on file access and update, on
paging mechanisms, and on files related to the
enciphered index are discussed. Many of the concepts
presented may be readily transferred to other forms of
multiway index trees and to binary search trees.",
acknowledgement = ack-nhfb,
annote = "Trees versus hashing as his 1974 IFIP paper?",
fjournal = "ACM Transactions on Database Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J777",
keywords = "",
subject = "Software --- Operating Systems --- Security and
Protection (D.4.6): {\bf Access controls}; Software ---
Operating Systems --- Security and Protection (D.4.6):
{\bf Cryptographic controls}",
}
@Book{Budge:1976:RSB,
author = "Sir E. A. Wallis (Ernest Alfred Wallis) Budge",
title = "The {Rosetta} stone in the {British Museum}: the
{Greek}, demotic, and hieroglyphic texts of the decree
inscribed on the {Rosetta} stone conferring additional
honours on {Ptolemy V Epiphanes (203-181 B.C.)} with
{English} translations and a short history of the
decipherment of the {Egyptian} hieroglyphs, and an
appendix containing translations of the stelae of {San
(Tanis)} and {Tall al-Maskhutah}",
publisher = "AMS Press",
address = "New York, NY, USA",
pages = "325 + 22",
year = "1976",
ISBN = "0-404-11362-1",
ISBN-13 = "978-0-404-11362-9",
LCCN = "PJ1531.R5 B8 1976",
bibdate = "Tue Dec 01 10:45:33 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Diffie:1976:NDC,
author = "Whitfield Diffie and Martin E. Hellman",
title = "New Directions in Cryptography",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "IT-22",
number = "6",
pages = "644--654",
month = nov,
year = "1976",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1976.1055638",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Information Theory",
referencedin = "Referenced in \cite[Ref. 8]{Kaliski:1995:SUR},
\cite[Ref. 8]{Goldreich:1997:FMCb}, \cite[Ref.
1]{Wiener:1998:PCP}, \cite[Ref. 3]{Handschuh:1998:SCC},
\cite[Ref. 2]{Haber:1995:HDD}.",
remark = "This important paper, the first public description of
public-key cryptography (see also
\cite{Merkle:1978:SCI,Ellis:1975:PKC}), begins with the
prescient statement ``We stand today on the brink of a
revolution in cryptography.'' and ends with ``Thomas
Jefferson, a cryptographic amateur, invented a system
which was still in use in World War II [2, pp.
192--195], while the most noted cryptographic system of
the twentieth century, the rotor machine, was invented
simultaneously by four separate people, all amateurs
[2, pp. 415, 420, 422--424]. We hope this will inspire
others to work in this fascinating area in which
participation has been discouraged in the recent past
by a nearly total government monopoly.'' Their
reference [2] is \cite{Kahn:1967:CSSa}.",
}
@Book{Friedman:1976:AMC,
author = "William F. (William Frederick) Friedman",
title = "Advanced military cryptography",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "113",
year = "1976",
ISBN = "0-89412-011-5",
ISBN-13 = "978-0-89412-011-4",
LCCN = "????",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Continuation of Elementary military cryptography,
Aegean Park Press, 1976.",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
author-dates = "1891--1969",
keywords = "ciphers; cryptography",
}
@Book{Friedman:1976:CCA,
author = "William Frederick (William Frederick) Friedman",
title = "Cryptography and cryptanalysis articles",
volume = "5--6",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "??",
year = "1976",
LCCN = "Z103 .C79 1976",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
author-dates = "1891--1969",
keywords = "ciphers --- addresses, essays, lectures; cryptography
--- addresses, essays, lectures; Cryptography.",
}
@Book{Friedman:1976:EC,
author = "William F. (William Frederick) Friedman",
title = "Elements of cryptanalysis",
volume = "3",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "172",
year = "1976",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
author-dates = "1891--1969",
keywords = "Ciphers; Cryptography",
}
@Book{Friedman:1976:EMC,
author = "William Frederick Friedman",
title = "Elementary military cryptography",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "86",
year = "1976",
ISBN = "0-89412-010-7",
ISBN-13 = "978-0-89412-010-7",
LCCN = "Z104 .F8740 1976",
bibdate = "Fri Feb 16 11:46:14 2001",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "On cover: Formerly Special text no. 165 (1935)",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
author-dates = "1891--1969",
keywords = "ciphers; cryptography",
}
@Book{Friedman:1976:ZTJ,
author = "William F. (William Frederick) Friedman and Charles
Jastrow Mendelsohn",
title = "The {Zimmermann} telegram of {January 16, 1917}, and
its cryptographic background",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "33",
year = "1976",
ISBN = "0-89412-009-3",
ISBN-13 = "978-0-89412-009-1",
LCCN = "D511 .F683 1976",
bibdate = "Sat Nov 18 12:53:52 MST 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
author-dates = "1891--1969",
keywords = "World War, 1914--1918 -- causes; Zimmermann, Arthur,
1864--1940",
}
@Article{Griffiths:1976:AMR,
author = "Patricia P. Griffiths and Bradford W. Wade",
title = "An Authorization Mechanism for a Relational Database
System",
journal = j-TODS,
volume = "1",
number = "3",
pages = "242--255",
month = sep,
year = "1976",
CODEN = "ATDSD3",
ISSN = "0362-5915 (print), 1557-4644 (electronic)",
ISSN-L = "0362-5915",
bibdate = "Sat Apr 14 10:34:48 MDT 2001",
bibsource = "Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/tods.bib",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/articles/journals/tods/1976-1-3/p242-griffiths/p242-griffiths.pdf;
http://www.acm.org/pubs/citations/journals/tods/1976-1-3/p242-griffiths/",
abstract = "A multiuser database system must selectively permit
users to share data, while retaining the ability to
restrict data access. There must be a mechanism to
provide protection and security, permitting information
to be accessed only by properly authorized users.
Further, when tables or restricted views of tables are
created and destroyed dynamically, the granting,
authentication, and revocation of authorization to use
them must also be dynamic. Each of these issues and
their solutions in the context of the relational
database management system System R are discussed.
\par
When a database user creates a table, he is fully and
solely authorized to perform upon it actions such as
read, insert, update, and delete. He may explicitly
grant to any other user any or all of his privileges on
the table. In addition he may specify that that user is
authorized to further grant these privileges to still
other users. The result is a directed graph of granted
privileges originating from the table creator.\par
At some later time a user A may revoke some or all of
the privileges which he previously granted to another
user B. This action usually revokes the entire subgraph
of the grants originating from A's grant to B. It may
be, however, that B will still possess the revoked
privileges by means of a grant from another user C, and
therefore some or all of B's grants should not be
revoked. This problem is discussed in detail, and an
algorithm for detecting exactly which of B's grants
should be revoked is presented.",
acknowledgement = ack-nhfb,
annote = "Defines a dynamic authorization mechanism. A database
user can grant or revoke privileges (such as to read,
insert, or delete) on a file that he has created.
Furthermore, he can authorize others to grant these
same privileges. The database management system keeps
track of a directed graph, emanating from the creator
of granted privileges.",
fjournal = "ACM Transactions on Database Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J777",
keywords = "access control; authorization; data dependent
authorization; database systems; privacy; protection in
databases; revocation of authorization; security",
subject = "Information Systems --- Database Management ---
Systems (H.2.4): {\bf Relational databases};
Information Systems --- Database Management --- Systems
(H.2.4); Information Systems --- Database Management
--- General (H.2.0): {\bf Security, integrity, and
protection**}",
}
@InProceedings{Guy:1976:HFN,
author = "R. K. Guy",
title = "How to factor a number",
crossref = "Hartnell:1976:PFM",
pages = "49--89",
year = "1976",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 6]{Odlyzko:1995:FIF}.",
}
@Article{Harrison:1976:POS,
author = "Michael A. Harrison and Walter L. Ruzzo and Jeffrey D.
Ullman",
title = "Protection in Operating Systems",
journal = j-CACM,
volume = "19",
number = "8",
pages = "461--471",
month = aug,
year = "1976",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
MRclass = "68A99",
MRnumber = "54 14474",
MRreviewer = "George I. Davida",
bibdate = "Tue Mar 25 13:26:09 MST 1997",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "A model of protection mechanisms in computing systems
is presented and its appropriateness is argued. The
``safety'' problem for protection systems under this
model is to determine in a given situation whether a
subject can acquire a particular right to an object. In
restricted cases, it can be shown that this problem is
decidable; i.e., there is an algorithm to determine
whether a system in a particular configuration is safe.
In general, and under surprisingly weak assumptions, it
cannot be decided if a situation is safe. Various
implications of this fact are discussed.",
acknowledgement = ack-nhfb,
classcodes = "C4210 (Formal logic); C4220 (Automata theory); C6150J
(Operating systems)",
classification = "721; 723",
corpsource = "Univ. of California, Berkeley, CA, USA",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
journalabr = "Commun ACM",
keywords = "(computers); automata theory --- Turing Machines;
computability and decidability; computer operating
systems --- Design; computer security; data processing;
decidability; operating systems; protection; protection
systems; security model; security of data; Turing
machine; Turing machines",
ort = "ordner sicherheit",
treatment = "P Practical; T Theoretical or Mathematical",
}
@Book{Kullback:1976:SMC,
author = "Solomon Kullback",
title = "Statistical methods in cryptanalysis",
volume = "4",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
edition = "Revised",
pages = "v + 206",
year = "1976",
LCCN = "Z104 .K84",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
keywords = "Ciphers; Cryptography; cryptography --- statistical
methods",
}
@Book{Macalister:1976:SLI,
author = "Robert Alexander Stewart Macalister and John Sampson",
title = "The secret languages of {Ireland}: {Ogham},
{Hisperic}, {Bearlagair na Saer}, {Bog-Latin}, and
cryptography, with special reference to the origin and
nature of the {Shelta} language; partly based upon
collections and manuscripts of the late {John Sampson};
with an {English}-jargon vocabulary",
publisher = "APA-Philo Press",
address = "Amsterdam, The Netherlands",
pages = "x + 284",
year = "1976",
ISBN = "90-6022-276-8",
ISBN-13 = "978-90-6022-276-8",
LCCN = "PM9001 .M2 1976",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprint of the 1937 ed. published by the Cambridge
University Press, Cambridge, England.",
acknowledgement = ack-nhfb,
keywords = "cant; Druids and Druidism; Irish language --- history;
Irish language --- writing; Shelta",
}
@MastersThesis{Marion:1976:ANB,
author = "Bruce Phillip Marion",
title = "Analysis of {National Bureau of Standards Data
Encryption Algorithm}",
type = "Thesis ({Engineer})",
school = "Department of Electrical Engineering, Stanford
University",
address = "Stanford, CA, USA",
pages = "v + 46",
year = "1976",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cipher and telegraph codes --- Data processing;
Electronic data processing departments --- Security
measures",
}
@Article{Miller:1976:RHT,
author = "G. L. Miller",
title = "{Reimann}'s hypothesis and tests for primality",
journal = j-J-COMP-SYS-SCI,
volume = "13",
pages = "300--317",
year = "1976",
CODEN = "JCSSBM",
ISSN = "0022-0000 (print), 1090-2724 (electronic)",
ISSN-L = "0022-0000",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer and System Sciences",
journal-URL = "http://www.sciencedirect.com/science/journal/00220000",
referencedin = "Referenced in \cite[Ref. 16]{Kaliski:1995:SUR}.",
}
@MastersThesis{Mitchell:1976:EAD,
author = "James Melvin Mitchell",
title = "Encryption algorithm for data security based on a
polyalphabetic substitution scheme and a pseudo-random
number generator",
type = "Thesis ({M.S.})",
school = "University of Tennessee, Knoxville",
address = "Knoxville, TN, USA",
pages = "v + 83",
year = "1976",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Sambur:1976:SEM,
author = "M. R. Sambur and N. S. Jayant",
title = "Speech Encryption by Manipulations of {LPC}
Parameters",
journal = j-BELL-SYST-TECH-J,
volume = "55",
number = "9",
pages = "1373--1388",
month = nov,
year = "1976",
CODEN = "BSTJAN",
ISSN = "0005-8580",
bibdate = "Tue Nov 9 11:15:56 MST 2010",
bibsource = "http://bstj.bell-labs.com/oldfiles/year.1976/BSTJ.1976.5509.html;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://bstj.bell-labs.com/BSTJ/images/Vol55/bstj55-9-1373.pdf",
acknowledgement = ack-nhfb,
fjournal = "The Bell System Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}
@Book{Shulman:1976:ABC,
author = "David Shulman",
title = "An annotated bibliography of cryptography",
volume = "37",
publisher = "Garland Pub.",
address = "New York, NY, USA",
pages = "388",
year = "1976",
ISBN = "0-8240-9974-5",
ISBN-13 = "978-0-8240-9974-9",
LCCN = "Z103.A1 S58",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Garland reference library of the humanities",
acknowledgement = ack-nhfb,
keywords = "cryptography --- bibliography",
}
@Book{Stevenson:1976:MCI,
author = "William Stevenson",
title = "A man called {Intrepid}: the secret war",
publisher = pub-HARCOURT-BRACE-JOVANOVICH,
address = pub-HARCOURT-BRACE-JOVANOVICH:adr,
pages = "xxv + 486 + 16",
year = "1976",
ISBN = "0-15-156795-6",
ISBN-13 = "978-0-15-156795-9",
LCCN = "D810.S8 S85",
bibdate = "Mon Aug 25 16:25:51 MDT 2014",
bibsource = "fsz3950.oclc.org:210/WorldCat;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Stephenson, whose code name was Intrepid, tells how he
established a worldwide intelligence network to combat
Nazism.",
acknowledgement = ack-nhfb,
author-dates = "1924--2013",
keywords = "Bombe; cryptography; Ultra",
subject = "Stephenson, William Samuel; Stephenson, William
Samuel; World War, 1939--1945; Secret service; Secret
service",
subject-dates = "1896--1989",
tableofcontents = "Point of departure: a foreword by Intrepid \\
A break in the silence: a historical note by Charles
Howard Ellis \\
Significant dates \\
In time of peace \\
Fight on \\
Impeachable offenses \\
Cry, ``havoc!'' \\
An original and sinister touch \\
The end of the beginning \\
Epilogue : A view from another island \\
Valediction",
}
@Book{Barker:1977:CHC,
author = "Wayne G. Barker",
title = "Cryptanalysis of the {Hagelin} cryptograph",
volume = "17",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "xi + 223",
year = "1977",
ISBN = "0-89412-022-0",
ISBN-13 = "978-0-89412-022-0",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
annote = "Claimed in \cite{} to be the main published work on
the Hagelin M-209 machine.",
keywords = "ciphers; Ciphers; Cryptography; cryptography",
}
@Book{Bell:1977:IVU,
author = "Ernest L. Bell",
title = "An initial view of {Ultra} as an {American} weapon",
publisher = "T S U Press,",
address = "Keene, NH, USA",
pages = "iii + 110",
year = "1977",
LCCN = "D810.C88 B45",
bibdate = "Mon May 08 07:14:10 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
xxISBN = "none",
}
@Book{Clark:1977:MWBa,
author = "Ronald William Clark",
title = "The man who broke {Purple}: the life of {Colonel
William F. Friedman}, who deciphered the {Japanese}
code in {World War II}",
publisher = "Little, Brown",
address = "Boston, MA, USA",
pages = "ix + 271",
year = "1977",
ISBN = "0-316-14595-5",
ISBN-13 = "978-0-316-14595-4",
LCCN = "UB290 .C58 1977",
bibdate = "Thu Mar 29 18:43:38 MDT 2007",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Friedman, William F (William Frederick);
Cryptographers; United States; Biography",
subject-dates = "1891--1969",
}
@Book{Clark:1977:MWBb,
author = "Ronald William Clark",
title = "The man who broke {Purple}: the life of the world's
greatest cryptologist, {Colonel William F. Friedman}",
publisher = "Weidenfeld and Nicolson",
address = "London, UK",
pages = "xi + 212 + 4",
year = "1977",
ISBN = "0-297-77279-1",
ISBN-13 = "978-0-297-77279-8",
LCCN = "UB290 .C58 1977b",
bibdate = "Thu Mar 29 18:43:38 MDT 2007",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Friedman, William F (William Frederick);
Cryptographers; United States; Biography",
subject-dates = "1891--1969",
}
@Article{Diffie:1977:ECN,
author = "Whitfield Diffie and Martin E. Hellman",
title = "Exhaustive Cryptanalysis of the {NBS Data Encryption
Standard}",
journal = j-COMPUTER,
volume = "10",
number = "6",
pages = "74--84",
month = jun,
year = "1977",
CODEN = "CPTRB4",
ISSN = "0018-9162 (print), 1558-0814 (electronic)",
ISSN-L = "0018-9162",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
http://www.math.utah.edu/pub/tex/bib/computer.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "The article deals with data encryption standard
adopted by the National Bureau of Standards, providing
a basic argument concerning the standard's inadequate
level of security. Cost-effective ways are recommended
to avoid the problem.",
acknowledgement = ack-nhfb,
classification = "722; 902",
fjournal = "Computer",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
journalabr = "Computer",
keywords = "cryptanalysis; data processing; standards",
referencedin = "Referenced in \cite[Ref. 12]{Biham:1998:TA}.",
}
@Article{Feiertag:1977:PMS,
author = "R. J. Feiertag and K. N. Levitt and L. Robinson",
title = "Proving multilevel security of a system design",
journal = j-OPER-SYS-REV,
volume = "11",
number = "5",
pages = "57--65",
month = nov,
year = "1977",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:57 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Manual{Gait:1977:VCH,
author = "Jason Gait",
title = "Validating the correctness of hardware implementations
of the {NBS Data Encryption Standard}",
volume = "500-20",
organization = pub-NBS,
address = pub-NBS:adr,
pages = "iv + 40",
month = nov,
year = "1977",
CODEN = "XNBSAV",
LCCN = "T1.U52 no.500-20",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "NBS special publication, computer science and
technology",
acknowledgement = ack-nhfb,
govtdocnumber = "0 13.10:500-20",
keywords = "computers --- access control --- code words; Computers
--- Access control --- Passwords; computers --- access
control --- passwords; Computers --- Testing; computers
--- testing; Data encryption (Computer science); data
encryption (computer science); Monte Carlo method",
}
@Article{Gardner:1977:MG,
author = "M. Gardner",
title = "Mathematical games",
journal = j-SCI-AMER,
pages = "120--124",
month = aug,
year = "1977",
CODEN = "SCAMAC",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
referencedin = "Referenced in \cite[Ref. 5]{Odlyzko:1995:FIF},
\cite[Ref. 2]{Anonymous:1996:RF}.",
}
@Article{Kak:1977:SEU,
author = "S. C. Kak and N. S. Jayant",
title = "On Speech Encryption Using Waveform Scrambling",
journal = j-BELL-SYST-TECH-J,
volume = "56",
number = "5",
pages = "781--808",
month = may # "--" # jun,
year = "1977",
CODEN = "BSTJAN",
ISSN = "0005-8580",
bibdate = "Tue Nov 9 11:15:56 MST 2010",
bibsource = "http://bstj.bell-labs.com/oldfiles/year.1977/BSTJ.1977.5605.html;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://bstj.bell-labs.com/BSTJ/images/Vol56/bstj56-5-781.pdf",
acknowledgement = ack-nhfb,
fjournal = "The Bell System Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}
@Book{Katzan:1977:SDE,
author = "Harry {Katzan, Jr.}",
title = "The Standard Data Encryption Algorithm",
publisher = "Petrocelli Books",
address = "New York, NY, USA",
pages = "viii + 134",
year = "1977",
ISBN = "0-89433-016-0",
ISBN-13 = "978-0-89433-016-2",
LCCN = "QA76.9 .A25K37",
bibdate = "Wed Sep 28 08:01:24 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Computer security --- Passwords; Data encryption
(Computer science)",
}
@Manual{NBS:1977:DES,
author = "{National Bureau of Standards}",
title = "Data Encryption Standard",
volume = "46",
organization = "U. S. Department of Commerce",
address = "Washington, DC, USA",
pages = "18",
month = jan,
year = "1977",
LCCN = "JK468.A8 A31 no.46",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Federal information processing standards publication",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 21]{Biham:1998:TA}.",
xxISBN = "none",
}
@Book{Pierce:1977:SSP,
author = "Clayton C. Pierce",
title = "Secret and secure: privacy, cryptography, and secure
communication",
publisher = "Pierce",
address = "Ventura, CA, USA",
pages = "iv + 84",
year = "1977",
LCCN = "Z103.P531",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@Article{Pless:1977:ESC,
author = "Vera S. Pless",
title = "Encryption schemes for computer confidentiality",
journal = j-IEEE-TRANS-COMPUT,
volume = "C-26",
number = "11",
pages = "1133--1136",
year = "1977",
CODEN = "ITCOB4",
DOI = "http://dx.doi.org/10.1109/TC.1977.1674759",
ISSN = "0018-9340 (print), 1557-9956 (electronic)",
ISSN-L = "0018-9340",
MRclass = "94A10",
MRnumber = "57 \#5410",
MRreviewer = "A. T. Amin",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "IEEE Transactions on Computers",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}
@InProceedings{Rabin:1977:DS,
author = "M. O. Rabin",
editor = "Richard A. DeMillo and others",
booktitle = "Foundations of Secure Computation: Papers presented at
a 3 day workshop held at Georgia Institute of
Technology, Atlanta, October 1977",
title = "Digitalized Signatures",
publisher = "Academic Press",
address = "New York",
pages = "x + 404",
year = "1977",
ISBN = "0-12-210350-5",
ISBN-13 = "978-0-12-210350-6",
LCCN = "QA76.9.A25 F66",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 26]{Goldreich:1997:FMCb}.",
}
@Article{Rejewski:1977:ATP,
author = "Marian Rejewski",
title = "An application of the theory of permutations in
breaking the {Enigma} cipher",
journal = "Applications of Mathematicae, Polish Academy of
Sciences",
volume = "16",
number = "??",
pages = "543--559",
month = "????",
year = "1977",
bibdate = "Sun Dec 01 09:58:13 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Rohwer:1977:CCB,
author = "J{\"u}rgen Rohwer",
title = "The critical convoy battles of {March 1943}: the
battle for {HX.229\slash SC122}",
publisher = "Naval Institute Press",
address = "Annapolis, MD, USA",
pages = "256 + 32",
year = "1977",
ISBN = "0-87021-818-2",
ISBN-13 = "978-0-87021-818-7",
LCCN = "D770 .R59313",
bibdate = "Tue Aug 26 07:10:39 MDT 2014",
bibsource = "fsz3950.oclc.org:210/WorldCat;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
note = "Revised English translation by Derek Masters of the
German original \cite{Rohwer:1975:GIM}.",
remark = "According to \cite[Chapter 10]{Good:1979:EWC}, this
book contains some discussion of cryptanalysis. I have
been unable to locate a table of contents for this
book.",
subject = "World War, 1939--1945; Campaigns; Atlantic Ocean;
Naval operations; Submarine; Naval operations, German;
Naval convoys; History; 20th century; Military
campaigns.; Military operations, Naval; German.;
Submarine.; Naval convoys.",
}
@Book{Sacco:1977:MC,
author = "Luigi Sacco",
title = "Manual of cryptography",
volume = "14",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "x + 193",
year = "1977",
ISBN = "0-89412-016-6",
ISBN-13 = "978-0-89412-016-9",
LCCN = "Z104 .S313 1977",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Translation of: Manuale di crittografia. Bibliography:
p. viii.",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@Book{Sinnott:1977:CTC,
author = "Robert Sinnott",
title = "A catalogue of titles on chess, checkers, and
cryptology in the library of the {United States
Military Academy, West Point, New York}",
publisher = "????",
address = "Norwell, MA, USA",
pages = "35",
year = "1977",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Photostatic copy, partly of typescript, partly of
printed matter.",
keywords = "Checkers --- Bibliography --- Catalogs; Chess ---
Bibliography --- Catalogs; Cryptography ---
Bibliography --- Catalogs.",
}
@Book{USNBS:1977:DES,
author = "{United States. National Bureau of Standards}",
title = "{Data Encryption Standard}",
volume = "46",
publisher = pub-NBS,
address = pub-NBS:adr,
pages = "18",
year = "1977",
LCCN = "JK468.A8 A31 no.46",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Federal Information Processing Standards publication",
acknowledgement = ack-nhfb,
annote = "Cover title.",
keywords = "Computers --- Access control --- Standards.",
}
@Book{Anonymous:1978:ODA,
author = "Anonymous",
title = "The origin and development of the {Army Security
Agency}, 1917--1947",
volume = "16",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "51",
year = "1978",
ISBN = "0-89412-025-5",
ISBN-13 = "978-0-89412-025-1",
LCCN = "UB290 .O75 1978",
bibdate = "Mon Sep 13 06:43:57 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A cryptographic series",
acknowledgement = ack-nhfb,
}
@TechReport{Chaum:1978:ICP,
author = "D. L. Chaum and R. S. Fabry",
title = "Implementing capability-based protection using
encryption",
type = "Technical Report",
number = "UCB/ERL M78/46",
institution = "University of California, Berkeley",
address = "Berkeley, CA, USA",
edition = "July 17, 1978",
pages = "i + 9",
year = "1978",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "This work was partially supported by the National
Science Foundation Center.",
keywords = "Computer networks --- Access control; Computers ---
Access control; Cryptography",
}
@Article{Ehrsam:1978:CKM,
author = "William F. Ehrsam and Stephen M. Matyas and Carl H.
Meyer and Walter L. Tuchman",
title = "A Cryptographic Key Management Scheme for Implementing
the {Data Encryption Standard}",
journal = j-IBM-SYS-J,
volume = "17",
number = "2",
pages = "106--125",
year = "1978",
CODEN = "IBMSA7",
ISSN = "0018-8670",
bibdate = "Wed Jan 08 16:35:07 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
abstract = "Data being transmitted through a communications
network can be protected by cryptography. In a data
processing environment, cryptography is implemented by
an algorithm which utilizes a secret key, or sequence
of bits. Any key-controlled cryptographic algorithm,
such as the Data Encryption Standard, requires a
protocol for the management of its cryptographic keys.
The complexity of the key management protocol
ultimately depends on the level of functional
capability provided by the cryptographic system. This
paper discusses a possible key management scheme that
provides the support necessary to protect
communications between individual end users (end-to-end
encryption) and that also can be used to protect data
stored or transported on removable media.",
acknowledgement = ack-nhfb,
classification = "723",
fjournal = "IBM Systems Journal",
journalabr = "IBM Syst J",
keywords = "data processing",
}
@MastersThesis{Funk:1978:DUS,
author = "Mark Robert Funk",
title = "A digital ultrasound system for data collection,
imaging, and tissue signature analysis",
type = "Thesis ({M.S.})",
school = "Department of Electrical Engineering, Michigan State
University",
address = "East Lansing, MI 48824, USA",
pages = "vii + 141",
year = "1978",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Tissues --- Analysis; Ultrasonics in biology ---
Automation; Ultrasonics in biology.",
}
@Article{Gaines:1978:SSP,
author = "R. Stockton Gaines and Norman Z. Shapiro",
title = "Some security principles and their application to
computer security",
journal = j-OPER-SYS-REV,
volume = "12",
number = "3",
pages = "19--28",
month = jul,
year = "1978",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:44 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Article{Gait:1978:EEP,
author = "Jason Gait",
title = "Easy entry: the password encryption problem",
journal = j-OPER-SYS-REV,
volume = "12",
number = "3",
pages = "54--60",
month = jul,
year = "1978",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:44 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Book{Givierge:1978:CC,
author = "Marcel Givierge",
title = "Course in cryptography",
volume = "19",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "164",
year = "1978",
ISBN = "0-89412-028-X",
ISBN-13 = "978-0-89412-028-2",
LCCN = "",
bibdate = "Sat Sep 25 11:01:24 2004",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "English translation of \cite{Givierge:1932:CC}",
series = "A cryptographic series",
acknowledgement = ack-nhfb,
}
@Article{Herlestam:1978:CRS,
author = "Tore Herlestam",
title = "Critical remarks on some public-key cryptosystems",
journal = j-BIT,
volume = "18",
number = "4",
pages = "493--496",
month = dec,
year = "1978",
CODEN = "NBITAB",
DOI = "http://dx.doi.org/10.1007/BF01932028",
ISSN = "0006-3835 (print), 1572-9125 (electronic)",
ISSN-L = "0006-3835",
MRclass = "94B99",
MRnumber = "80b:94033",
MRreviewer = "M. C. Cheng",
bibdate = "Wed Jan 4 18:52:15 MST 2006",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=18&issue=4;
http://www.math.utah.edu/pub/tex/bib/bit.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=18&issue=4&spage=493",
fjournal = "BIT; Nordisk Tidskrift for Informationsbehandling
(BIT)",
journal-URL = "http://link.springer.com/journal/10543",
}
@Book{Jones:1978:MSW,
author = "Reginald V. Jones",
title = "Most secret war: [{British} scientific intelligence,
1939--1945]",
publisher = "Hamilton",
address = "London, UK",
pages = "xx + 556 + 16",
year = "1978",
ISBN = "0-241-89746-7",
ISBN-13 = "978-0-241-89746-1",
LCCN = "????",
bibdate = "Mon Aug 25 16:47:40 MDT 2014",
bibsource = "fsz3950.oclc.org:210/WorldCat;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
author-dates = "1911--",
subject = "Geheimdienst; Spionage; Weltkrieg (1939--1945);
Geschichte; Gro{\ss}britannien; Jones, R. V (Reginald
Victor); World War, 1939--1945; Secret service; Great
Britain; Personal narratives, British; Technology;
Scientists; England; Biography; Service des
renseignements militaires; Guerre mondiale, 1939--1945;
Service secret; Grande-Bretagne; Tweede Wereldoorlog;
Geheime diensten; Natuurwetenschappen; Technische
wetenschappen; Scientists; Secret service; Technology;
History; George VI, 1936--1952",
}
@Book{Jones:1978:WWB,
author = "R. V. (Reginald Victor) Jones",
title = "The wizard war: {British} scientific intelligence,
1939-1945",
publisher = "Coward, McCann and Geoghegan",
address = "New York, NY, USA",
pages = "xx + 556 + 16",
year = "1978",
ISBN = "0-698-10896-5",
ISBN-13 = "978-0-698-10896-7",
LCCN = "D810.C88 J66 1978",
bibdate = "Thu Aug 9 14:32:26 MDT 2012",
bibsource = "http://www.math.utah.edu/pub/bibnet/authors/h/heisenberg-werner.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
price = "US\$12.95",
acknowledgement = ack-nhfb,
subject = "World War, 1939-1945; Cryptography; Secret service;
Great Britain; Jones, R. V; (Reginald Victor); Personal
narratives, British",
subject-dates = "1911--",
tableofcontents = "Part 1. The men who went first \\
Friends and rivals \\
The Clarendon laboratory 1936-1938 \\
Inferior red 1936-1938 \\
Exile \\
The day before war broke out \\
The secret weapon \\
The Oslo report \\
A plan for intelligence \\
The phoney war \\
The crooked leg \\
Reflections \\
The fortunes of major Wintle \\
The fifth column \\
The Edda revived \\
Knickebein Jammed- and photographed \\
The X-apparatus \\
Coventry \\
Target no. 54 \\
The atrocious crime \\
Wotan's other eye \\
Retrospect and prospect \\
Part 2. Freya \\
Beams on the wane \\
Jay \\
Wurzburg \\
The Bruneval raid \\
The Baedeker beams \\
El Hatto \\
Pineapple \\
The Kammhuber line \\
Lichtenstein \\
Window \\
Hamburg \\
Heavy water \\
Revelations from the secret service \\
Full stretch \\
Peenem{\"u}nde \\
FZG 76 \\
The Americans convinced \\
Flames: problems of bomber command \\
The baby blitz \\
D-Day \\
V-1 \\
V-2 \\
V-3 \\
Bomber triumph \\
Nuclear energy \\
A.D.I. (science) overseas \\
The year of madness \\
German generals and staff colleges \\
Swords into ploughshares, bombs into saucers \\
Exeunt",
}
@InCollection{Kam:1978:SDS,
author = "John B. Kam and George I. Davida",
booktitle = "Foundations of secure computation (Workshop, Georgia
Inst. Tech., Atlanta, Ga., 1977)",
title = "A structured design of substitution-permutation
encryption network",
publisher = "Academic Press",
address = "New York",
pages = "95--113",
year = "1978",
MRclass = "68B15 (68H05 94A99 94B15)",
MRnumber = "80b:68031",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
}
@Article{Lennon:1978:CAI,
author = "Richard E. Lennon",
title = "Cryptography Architecture for Information Security",
journal = j-IBM-SYS-J,
volume = "17",
number = "2",
pages = "138--150",
year = "1978",
CODEN = "IBMSA7",
ISSN = "0018-8670",
bibdate = "Wed Jan 08 16:35:07 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
abstract = "Information being transferred from point to point over
a public communications carrier or stored on portable
media can be protected, by the use of cryptography,
from accidental or intentional disclosure. Control
functions are required to ensure synchronization of the
process. In a communications environment, the control
functions become logically part of the network
architecture. IBM's Systems Network Architecture (SNA)
has been extended to allow the use of cryptography when
sensitive information is being processed. Architectural
similarities for the file environment are discussed.",
acknowledgement = ack-nhfb,
classification = "723",
fjournal = "IBM Systems Journal",
journalabr = "IBM Syst J",
keywords = "computer networks; data processing",
}
@Book{Lewin:1978:UGW,
author = "Ronald Lewin",
title = "{Ultra} goes to war: the first account of {World War
II}'s greatest secret based on official documents",
publisher = pub-MCGRAW-HILL,
address = pub-MCGRAW-HILL:adr,
pages = "397 + 6",
year = "1978",
ISBN = "0-07-037453-8",
ISBN-13 = "978-0-07-037453-9",
LCCN = "D810.S7 L43 1978; D810.S7L43",
bibdate = "Fri May 13 08:13:27 MDT 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
melvyl.cdlib.org:210/CDL90",
price = "US\$12.95",
acknowledgement = ack-nhfb,
subject = "World War, 1939-1945; Secret service; Great Britain",
}
@Article{Matyas:1978:GDI,
author = "Stephen M. Matyas and Carl H. Meyer",
title = "Generation, Distribution, and Installation of
Cryptographic Keys",
journal = j-IBM-SYS-J,
volume = "17",
number = "2",
pages = "126--137",
year = "1978",
CODEN = "IBMSA7",
ISSN = "0018-8670",
bibdate = "Wed Jan 08 16:35:07 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
abstract = "A key controlled cryptographic system requires a
mechanism for the safe and secure generation,
distribution, and installation of its cryptographic
keys. Possible key generation, distribution, and
installation procedures are discussed for the key
management scheme presented in an accompanying paper.",
acknowledgement = ack-nhfb,
classification = "723",
fjournal = "IBM Systems Journal",
journalabr = "IBM Syst J",
keywords = "data processing",
}
@Article{Merkle:1978:HIS,
author = "Ralph Merkle and Martin E. Hellman",
title = "Hiding Information and Signatures in Trap Door
Knapsacks",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "24",
number = "5",
pages = "525--530",
year = "1978",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1978.1055927",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
bibdate = "Thu Jan 21 14:42:38 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Information Theory",
}
@Article{Merkle:1978:SCI,
author = "Ralph C. Merkle",
title = "Secure Communications Over Insecure Channels",
journal = j-CACM,
volume = "21",
number = "4",
pages = "294--299",
month = apr,
year = "1978",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Mar 25 13:26:09 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "According to traditional conceptions of cryptographic
security, it is necessary to transmit a key, by secret
means, before encrypted messages can be sent securely.
This paper shows that it is possible to select a key
over open communications channels in such a fashion
that communications security can be maintained. A
method is described which forces any enemy to expend an
amount of work which increases as the square of the
work required of the two communicants to select the
key. The method provides a logically new kind of
protection against the passive eaves dropper. It
suggests that further research on this topic will be
highly rewarding, both in a theoretical and a practical
sense.",
acknowledgement = ack-nhfb,
annote = "This article was originally submitted August 1975; was
the publication delay due to U.S. Government security
reviews?",
classcodes = "C5600 (Data communication equipment and techniques);
C6130 (Data handling techniques)",
classification = "723",
corpsource = "Dept. of Electrical Engng. and Computer Sci., Univ. of
California, Berkeley, CA, USA",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
journalabr = "Commun ACM",
keywords = "communications channels; communications security;
computer network security; cryptographic security;
cryptography; cryptology; data communication systems;
data processing; insecure channels; key distribution;
open; passive eavesdropper; passive eavesdropping;
protection; public key cryptosystem; Security; security
of data; wiretap",
treatment = "T Theoretical or Mathematical",
}
@TechReport{Needham:1978:UEAa,
author = "R. M. (Roger Michael) Needham and Michael D.
Schroeder",
title = "Using encryption for authentication in large networks
of computers",
number = "CSL-78-4",
institution = "Xerox Palo Alto Research Center",
address = "Palo Alto, CA, USA",
pages = "??",
year = "1978",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprinted June 1982.",
acknowledgement = ack-nhfb,
}
@Article{Needham:1978:UEAb,
author = "Roger M. Needham and Michael D. Schroeder",
title = "Using Encryption for Authentication in Large Networks
of Computers",
journal = j-CACM,
volume = "21",
number = "12",
pages = "993--999",
month = dec,
year = "1978",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jan 22 07:07:33 MST 2001",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
http://dblp.uni-trier.de/db/journals/cacm/cacm21.html#NeedhamS78;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Use of encryption to achieve authenticated
communication in computer networks is discussed.
Example protocols are presented for the establishment
of authenticated connections, for the management of
authenticated mail, and for signature verification and
document integrity guarantee. Both conventional and
public-key encryption algorithms are considered as the
basis for protocols.",
acknowledgement = ack-nhfb,
classcodes = "C5620 (Computer networks and techniques); C6130 (Data
handling techniques)",
classification = "723",
corpsource = "Xerox Palo Alto Res. Center, Palo Alto, CA, USA",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
journalabr = "Commun ACM",
keywords = "authenticated communication; computer networks; data
processing --- Security of Data; document integrity;
encryption; guarantee; protocols; public key encryption
algorithms; security of data; signature verification",
oldlabel = "NeedhamS78",
treatment = "P Practical",
XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/NeedhamS78",
}
@Article{Nilsson:1978:OST,
author = "Arne Nilsson and Rolf Blom and Harald Wesemeyer and S.
Hellstrom",
title = "On overflow systems in telephone networks: general
service times in the secondary group",
journal = "Ericsson technics",
volume = "34",
number = "2",
publisher = "Telefonaktiebolaget L. M. Ericsson",
address = "Stockholm, Sweden",
pages = "48--128",
year = "1978",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Caption title.",
keywords = "Computer networks; Computers --- Access control;
Electrets; Encryption methods in data networks;
Telephone systems",
}
@Book{Oakley:1978:RPC,
author = "Howard T. Oakley",
title = "The {Riverbank} publications on cryptology",
publisher = "????",
address = "Washington, DC, USA",
pages = "324--330",
year = "1978",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography; Fabyan, George, --- 1867-1936; Friedman,
William F. --- (William Frederick), --- 1891-1969;
Publication (Riverbank Laboratories); Riverbank
Laboratories. --- Dept. of Ciphers",
}
@Article{Payne:1978:OEN,
author = "W. H. Payne and K. L. McMillen",
title = "Orderly Enumeration of Nonsingular Binary Matrices
Applied to Text Encryption",
journal = j-CACM,
volume = "21",
number = "4",
pages = "259--263",
month = apr,
year = "1978",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
MRclass = "68C05",
MRnumber = "80h:68031",
MRreviewer = "P. E. O'Neil",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
abstract = "Nonsingular binary matrices of order N, i.e.,
nonsingular over the field left brace 0,1 right brace,
and an initial segment of the natural numbers are
placed in one-to-one correspondence. Each natural
number corresponds to two intermediate vectors. These
vectors are mapped into a nonsingular binary matrix.
Examples of complete enumeration of all 2 multiplied by
2 and 3 multiplied by 3 nonsingular binary matrices
were produced by mapping the intermediate vectors to
the matrices. The mapping has application to the Vernam
encipherment method using pseudorandom number
sequences. A bit string formed from bytes of text of a
data encryption key can be used as a representation of
a natural number. This natural number is transformed to
a nonsingular binary matrix. Key leverage is obtained
by using the matrix as a ``seed'' in a shift register
sequence pseudorandom number generator.",
acknowledgement = ack-nhfb,
classcodes = "C4140 (Linear algebra); C6130 (Data handling
techniques)",
classification = "723",
corpsource = "Washington State Univ., Pullman, WA, USA",
fjournal = "Communications of the Association for Computing
Machinery",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
journalabr = "Commun ACM",
keywords = "binary sequences; bit string; computer programming;
data encryption key; encoding; enumeration; mapped;
matrix algebra; natural number; nonsingular binary
matrices; pseudorandom number; sequences; text editing;
text encryption; Vernam encipherment method",
oldlabel = "PayneM78",
treatment = "A Application; T Theoretical or Mathematical",
XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/PayneM78",
}
@Article{Pohlig:1978:IAC,
author = "S. C. Pohlig and M. E. Hellman",
title = "An improved algorithm for computing logarithms over {$
{\rm GF}(p) $} and its cryptographic significance",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "24",
number = "1",
pages = "106--111",
month = "????",
year = "1978",
CODEN = "IETTAW",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
bibdate = "Thu Sep 22 18:53:42 2016",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Information Theory",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=18",
}
@Article{Pollard:1978:MCM,
author = "J. M. Pollard",
title = "{Monte Carlo} Methods for Index Computation $ (\bmod
p) $",
journal = j-MATH-COMPUT,
volume = "32",
number = "143",
pages = "918--924",
month = jul,
year = "1978",
CODEN = "MCMPAF",
ISSN = "0025-5718 (paper), 1088-6842 (electronic)",
ISSN-L = "0025-5718",
bibdate = "Mon Jul 19 08:06:24 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
classcodes = "C1140G (Monte Carlo methods)",
corpsource = "Math. Dept., Plessey Telecommunications Res.,
Maidenhead, UK",
fjournal = "Mathematics of Computation",
journal-URL = "http://www.ams.org/mcom/",
keywords = "factorisation of; index computation; integers; Monte
Carlo methods",
referencedin = "Referenced in \cite[Ref. 7]{Wiener:1998:PCP} and
\cite[Ref. 8]{Escott:1999:AEC}.",
treatment = "T Theoretical or Mathematical",
}
@Unpublished{Reeds:1978:HCM,
author = "J. Reeds and D. Ritchie and R. Morris",
title = "The {Hagelin} Cypher Machine ({M-209}): Cryptanalysis
from Ciphertext Alone",
year = "1978",
bibdate = "Thu Apr 29 18:08:31 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Submitted to the journal Cryptologia, but never
published. For the story behind the suppression of
publication, see \cite{Ritchie:19xx:DCW}. Internal
technical memoranda TM 78-1271-10, TM 78-1273-2.",
acknowledgement = ack-nhfb,
}
@Article{Rivest:1978:MOD,
author = "Ronald L. Rivest and Adi Shamir and Leonard M.
Adleman",
title = "A Method for Obtaining Digital Signatures and Public
Key Cryptosystems",
journal = j-CACM,
volume = "21",
number = "2",
pages = "120--126",
month = feb,
year = "1978",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
MRclass = "94A05",
MRnumber = "83m:94003",
MRreviewer = "J. L. Selfridge",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "The basics of trap-door functions and the famous RSA
public key cryptosystem are presented in this paper.",
abstract = "An encryption method is presented with the novel
property that publicly revealing an encryption key does
not thereby reveal the corresponding decryption key.
This has two important consequences: (1) Couriers or
other secure means are not needed to transmit keys,
since a message can be enciphered using an encryption
key publicly revealed by the intended recipient. (2) A
message can be ``signed'' using a privately held
decryption key. Anyone can verify this signature using
the corresponding publicly revealed encryption key.
Signatures cannot be forged, and a signer cannot later
deny the validity of his signature.",
acknowledgement = ack-nhfb,
classcodes = "C6130 (Data handling techniques)",
classification = "723",
corpsource = "Dept. of Math., MIT, Cambridge, MA, USA",
fjournal = "Communications of the Association for Computing
Machinery",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
journalabr = "Commun ACM",
keywords = "computer programming; cryptography; cryptosystems;
data handling; data processing --- Security of Data;
decryption key; digital signatures; encryption key;
number theory; operating protection; RSA; security;
security of data",
referencedin = "Referenced in \cite[Ref. 12]{Handschuh:1998:SCC},
\cite[Ref. 21]{Kaliski:1995:SUR}, \cite[Ref.
5]{Haber:1995:HDD}, \cite[Ref. 8]{Wiener:1998:PCP},
\cite[Ref. 27]{Goldreich:1997:FMCb}.",
treatment = "T Theoretical or Mathematical",
}
@Article{Saltzer:1978:DS,
author = "Jerome H. Saltzer",
title = "On digital signatures",
journal = j-OPER-SYS-REV,
volume = "12",
number = "2",
pages = "12--14",
month = apr,
year = "1978",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:39 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Book{Stark:1978:INT,
author = "Harold M. Stark",
title = "An introduction to number theory",
publisher = pub-MIT,
address = pub-MIT:adr,
pages = "x + 347",
year = "1978",
ISBN = "0-262-69060-8",
ISBN-13 = "978-0-262-69060-7",
LCCN = "QA241 .S72 1978",
bibdate = "Fri Jun 24 14:19:16 MDT 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
remark = "Originally published in \cite{Stark:1970:INT}.",
subject = "Number theory",
xxnote = "Some library catalogs give year as 1981.",
}
@Manual{USCSC:1978:CSD,
author = "{United States. Civil Service Commission}",
title = "Computer security and the {Data Encryption Standard}:
proceedings of the {Conference on Computer Security and
the Data Encryption Standard held at the National
Bureau of Standards in Gaithersburg, Maryland, on
February 15, 1977}",
number = "500-27",
publisher = pub-USGPO,
address = pub-USGPO:adr,
pages = "viii + 125",
year = "1978",
LCCN = "T1.U52 no.500- 27",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "NBS special publication. Computer science and
technology",
acknowledgement = ack-nhfb,
keywords = "computer security --- passwords; data encryption
(computer science)",
}
@Book{USCSSC:1978:USN,
author = "{United States. Congress. Senate. Select Committee on
Intelligence}",
title = "Unclassified summary --- involvement of {NSA} in the
development of the {Data Encryption Standard}: staff
report of the {Senate Select Committee on Intelligence,
United States Senate}",
publisher = pub-USGPO,
address = pub-USGPO:adr,
pages = "ii + 4",
month = apr,
year = "1978",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "At head of title: 95th Congress, 2d session. Committee
print.",
keywords = "Cryptography; Data encryption (Computer science);
United States. --- National Security Agency",
}
@Book{Winterbotham:1978:NC,
author = "F. W. (Frederick William) Winterbotham",
title = "The {Nazi} connection",
publisher = pub-HARPER-ROW,
address = pub-HARPER-ROW:adr,
pages = "222",
year = "1978",
ISBN = "0-06-014686-9",
ISBN-13 = "978-0-06-014686-3",
LCCN = "D810.S8 .W538 1978",
bibdate = "Fri May 13 08:14:55 MDT 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
melvyl.cdlib.org:210/CDL90",
acknowledgement = ack-nhfb,
author-dates = "1897--1990",
subject = "Winterbotham, F. W; (Frederick William); World War,
1939-1945; Secret service; Great Britain; Spies;
Biography; Germany; Personal narratives, British",
subject-dates = "1897--1990",
}
@InProceedings{Adleman:1979:SAD,
author = "L. M. Adleman",
title = "A subexponential algorithm for the discrete
logarithm",
crossref = "IEEE:1979:ASF",
pages = "55--60",
year = "1979",
DOI = "http://dx.doi.org/10.1109/SFCS.1979.2",
bibdate = "Sun Mar 11 10:27:21 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@PhdThesis{Andelman:1979:MLE,
author = "Dov Andelman",
title = "Maximum likelihood estimation applied to
cryptanalysis",
type = "Thesis ({Ph.D.})",
school = "Stanford University",
address = "Stanford, CA, USA",
pages = "viii + 167",
year = "1979",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography; Estimation theory; Maxima and minima.",
}
@Book{Barker:1979:CEC,
author = "Wayne G. Barker",
title = "Cryptanalysis of an enciphered code problem: where an
``additive'' method of encipherment has been used",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "vii + 174",
year = "1979",
ISBN = "0-89412-037-9",
ISBN-13 = "978-0-89412-037-4",
LCCN = "Z103 .B333",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
keywords = "Ciphers; Cryptography",
}
@Book{Barker:1979:HCCa,
editor = "Wayne G. Barker",
title = "The history of codes and ciphers in the {United
States} during {World War I}",
volume = "20",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "263",
year = "1979",
ISBN = "0-89412-031-X",
ISBN-13 = "978-0-89412-031-2",
LCCN = "D639.C75 H57 1979",
bibdate = "Mon Sep 13 06:32:02 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
}
@Book{Barker:1979:HCCb,
editor = "Wayne G. Barker",
title = "The history of codes and ciphers in the {United
States} during the period between the {World Wars}",
volume = "22, 54",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "various",
year = "1979",
ISBN = "0-89412-039-5 (part 1), 0-89412-165-0 (part 2)",
ISBN-13 = "978-0-89412-039-8 (part 1), 978-0-89412-165-4 (part
2)",
LCCN = "UB290 .H47 1979",
bibdate = "Mon Sep 13 06:37:57 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Two volumes. This book was written about 1946 by the
Historical Section of the Army Security Agency",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
}
@Article{Blakley:1979:RSA,
author = "G. R. Blakley and I. Borosh",
title = "{Rivest--Shamir--Adleman} public key cryptosystems do
not always conceal messages",
journal = j-COMP-MATH-APPL,
volume = "5",
number = "3",
pages = "169--178",
year = "1979",
CODEN = "CMAPDK",
ISSN = "0898-1221 (print), 1873-7668 (electronic)",
ISSN-L = "0898-1221",
MRclass = "94B99 (10A25 94A24)",
MRnumber = "81e:94026",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
http://www.math.utah.edu/pub/tex/bib/sigcse.bib",
fjournal = "Computers \& Mathematics with Applications. An
International Journal",
remark = "This paper points out that the some keys in the RSA
may fail to encrypt: instead, they produce an output
ciphertext that is identical to the input plaintext.
See also \cite{Smith:1979:UFM,Bergmann:2009:DKR}",
}
@InProceedings{Blakley:1979:SCK,
author = "G. R. Blakley",
title = "Safeguarding cryptographic keys",
crossref = "Merwin:1979:NCC",
pages = "313--317",
year = "1979",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL},
\cite[Ref. 2]{Gemmell:1997:ITC}.",
xxauthor = "R. Blakley",
}
@Article{Bright:1979:QRN,
author = "Herbert S. Bright and Richard L. Enison",
title = "Quasi-Random Number Sequences from a Long-Period {TLP}
Generator with Remarks on Application to Cryptography",
journal = j-COMP-SURV,
volume = "11",
number = "4",
pages = "357--370",
month = dec,
year = "1979",
CODEN = "CMSVAN",
ISSN = "0010-4892",
ISSN-L = "0360-0300",
bibdate = "Mon Sep 19 21:17:11 1994",
bibsource = "http://www.math.utah.edu/pub/tex/bib/compsurv.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Computing Surveys",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204",
}
@MastersThesis{Chaum:1979:UEM,
author = "David Chaum",
title = "Untraceable electronic mail, return addresses, and
digital pseudonyms",
type = "Thesis ({M.S. in Computer Science})",
school = "University of California, Berkeley",
address = "Berkeley, CA, USA",
month = jun,
year = "1979",
bibdate = "Mon Dec 28 13:41:04 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Culik:1979:SIS,
author = "K. {Culik, II} and H. A. Maurer",
title = "Secure Information Storage and Retrieval Using New
Results in Cryptography",
journal = j-INFO-PROC-LETT,
volume = "8",
number = "4",
pages = "181--186",
day = "30",
month = apr,
year = "1979",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "68B15 (68H05)",
MRnumber = "80h:68010",
MRreviewer = "James W. Snively, Jr.",
bibdate = "Tue Nov 17 10:49:43 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
acknowledgement = ack-nhfb,
classification = "723; C6130 (Data handling techniques)",
corpsource = "Dept. of Computer Sci., Univ. of Waterloo, Waterloo,
Ont., Canada",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "cryptography; data processing --- Security of Data;
encoding; information retrieval; information retrieval
systems; information storage; information systems;
security of data",
}
@Article{Denning:1979:EOS,
author = "Peter J. Denning",
title = "Editor's Overview --- Special Section on Data
Encryption",
journal = j-COMP-SURV,
volume = "11",
number = "4",
pages = "283--283",
month = dec,
year = "1979",
CODEN = "CMSVAN",
DOI = "http://doi.acm.org/10.1145/356789.356791",
ISSN = "0010-4892",
ISSN-L = "0360-0300",
bibdate = "Thu Jun 19 09:25:45 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/surveys/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Computing Surveys",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204",
}
@Article{Denning:1979:SPC,
author = "Dorothy E. Denning",
title = "Secure Personal Computing in an Insecure Network",
journal = j-CACM,
volume = "22",
number = "8",
pages = "476--482",
month = aug,
year = "1979",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
MRclass = "68A05 (68B15 94A99)",
MRnumber = "80d:68010",
bibdate = "Mon Jan 22 06:35:06 MST 2001",
bibsource = "http://dblp.uni-trier.de/db/journals/cacm/cacm22.html#Denning79;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classcodes = "C6130 (Data handling techniques)",
corpsource = "Computer Sci. Dept., Purdue Univ., West Lafayette, IN,
USA",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "communication links; confidential data; confidential
files; encoding; encryption; insecure network; secure
personal computing; security of data",
oldlabel = "Denning79",
treatment = "P Practical",
XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Denning79",
}
@TechReport{Dreher:1979:PSC,
author = "Felix F. Dreher",
title = "Privacy and security in computer based systems using
encryption",
type = "Pittsburg State University. School of Business
monograph series",
number = "7",
institution = "Pittsburg State University. Gladys A. Kelce School of
Business and Economics.",
address = "Pittsburg, KS, USA",
pages = "8",
year = "1979",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Cover title.",
keywords = "Computers --- Access control; Electronic data
processing departments --- Security measures",
}
@Book{Garey:1979:CIG,
author = "Michael R. Garey and David S. Johnson",
title = "Computers and Intractability: a Guide to the Theory of
{NP}-Completeness",
publisher = pub-FREEMAN,
address = pub-FREEMAN:adr,
pages = "x + 338",
year = "1979",
ISBN = "0-7167-1045-5, 0-7167-1044-7",
ISBN-13 = "978-0-7167-1045-5, 978-0-7167-1044-8",
bibdate = "Sun Mar 11 10:56:42 2012",
bibsource = "http://www.math.utah.edu/pub/bibnet/subjects/acc-stab-num-alg.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Garlinski:1979:IEW,
author = "J{\'o}zef Garli{\'n}ski",
title = "Intercept: the {Enigma} war",
publisher = "J. M. Dent",
address = "London, UK",
pages = "xx + 219 + 8",
year = "1979",
ISBN = "0-460-04337-4",
ISBN-13 = "978-0-460-04337-3",
LCCN = "D810.C88 G37",
bibdate = "Tue Sep 4 07:56:36 MDT 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "World War, 1939-1945; Cryptography",
}
@Article{Good:1979:EWC,
author = "I. J. Good",
title = "Early Work on Computers at {Bletchley}",
journal = j-ANN-HIST-COMPUT,
volume = "1",
number = "1",
pages = "38--48",
month = jul # "\slash " # sep,
year = "1979",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:16 MST 2002",
bibsource = "http://www.computer.org/annals/an1979/;
http://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
http://www.math.utah.edu/pub/tex/bib/annhistcomput.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1979/pdf/a1038.pdf;
http://www.computer.org/annals/an1979/a1038abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
keywords = "Bletchley; Bombe; chessplayers as cryptanalysts;
Colossus; cryptanalysis; Enigma; Geheimschreiber;
Government Code and Cypher School; history of
computers; Turing; Ultra",
}
@Book{Hardy:1979:ITN,
author = "G. H. (Godfrey Harold) Hardy and Edward Maitland
Wright",
title = "An introduction to the theory of numbers",
publisher = pub-CLARENDON,
address = pub-CLARENDON:adr,
edition = "Fifth",
pages = "xvi + 426",
year = "1979",
ISBN = "0-19-853170-2, 0-19-853171-0 (paperback)",
ISBN-13 = "978-0-19-853170-8, 978-0-19-853171-5 (paperback)",
LCCN = "QA241 .H28 1979",
bibdate = "Fri Jun 24 12:34:44 MDT 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
author-dates = "1877--1947",
subject = "Number theory",
}
@Article{Hellman:1979:MPK,
author = "Martin E. Hellman",
title = "The Mathematics of Public-Key Cryptography",
journal = j-SCI-AMER,
volume = "241",
number = "2",
pages = "146--157 (Intl. ed. 130--139)",
month = aug,
year = "1979",
CODEN = "SCAMAC",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Tue May 19 18:01:43 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes); C6130 (Data handling techniques);
C6160 (Database management systems (DBMS))",
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
keywords = "computer privacy; cryptography; electronic
communications; encoding; encryption; knapsack problem;
mathematics; P-NP problem; public key cryptography;
public-key cryptosystem; random numbers; security of
data; trap-door one-way functions",
treatment = "T Theoretical or Mathematical",
}
@Manual{Hinsley:1979:BISa,
author = "F. H. (Francis Harry) Hinsley and E. E. Thomas",
title = "{British} intelligence in the {Second World War}: its
influence on strategy and operations",
publisher = "H.M. Stationery Office",
address = "London, UK",
pages = "various",
year = "1979",
ISBN = "0-11-630933-4 (vol. 1)",
ISBN-13 = "978-0-11-630933-4 (vol. 1)",
LCCN = "D810.S7 H49 1979b v.1-2 (1979--1981)",
bibdate = "Mon Nov 4 07:46:57 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Vol. 3, pt. 2 has additional author C. A. G.
Simkins.",
price = "UK\pounds10.00 (vol. 1)",
series = "History of the Second World War",
acknowledgement = ack-nhfb,
keywords = "Great Britain --- history --- George VI, 1936--1952;
World War, 1939--1945 --- secret service --- Great
Britain",
}
@Book{Hinsley:1979:BISb,
author = "F. H. (Francis Harry) Hinsley and Michael Eliot
Howard",
title = "{British} intelligence in the {Second World War}: its
influence on strategy and operations",
publisher = pub-CUP,
address = pub-CUP:adr,
pages = "various",
year = "1979",
ISBN = "0-521-22940-5 (vol. 1)",
ISBN-13 = "978-0-521-22940-1 (vol. 1)",
LCCN = "D810.S7 H47 1979b",
bibdate = "Mon Nov 4 07:46:57 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Vols. 3-4 in series: History of the Second World War.
Vol. 4 has subtitle: Security and counter-intelligence;
Vol. 5 has subtitle: Strategic deception.",
acknowledgement = ack-nhfb,
contents = "v. 1-3. Its influence on strategy and operations ---
v. 5. Strategic deception",
keywords = "World War, 1939--1945; World War, 1939--1945 ---
secret service --- Great Britain",
}
@Book{IRD:1979:DVE,
author = "{International Resource Development, Inc.}",
title = "Data and voice encryption",
publisher = "International Resource Development",
address = "New Canaan, CT, USA",
pages = "iv + 124",
year = "1979",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography equipment industry --- United States;
Market surveys --- United States.",
}
@Article{Kahn:1979:CGP,
author = "David Kahn",
title = "Cryptology goes public",
journal = "Foreign affairs (Council on Foreign Relations)",
volume = "58",
number = "1",
publisher = "Council on Foreign Relations",
address = "New York, NY, USA",
pages = "141--159",
month = "Fall",
year = "1979",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Caption title. Detached from Foreign affairs, v. 58,
no. 1, fall 1979.",
keywords = "Ciphers; Cryptography",
}
@Article{Kam:1979:SDS,
author = "John B. Kam and George I. Davida",
title = "Structured design of substitution-permutation
encryption networks",
journal = j-IEEE-TRANS-COMPUT,
volume = "28",
number = "10",
pages = "747--753",
year = "1979",
CODEN = "ITCOB4",
ISSN = "0018-9340 (print), 1557-9956 (electronic)",
ISSN-L = "0018-9340",
MRclass = "68B15 (68H05)",
MRnumber = "80h:68013",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "Institute of Electrical and Electronics Engineers.
Transactions on Computers",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}
@Article{Knoble:1979:AEO,
author = "H. D. Knoble",
title = "{Algorithm 536}: An Efficient One-Way Enciphering
Algorithm [{Z}]",
journal = j-TOMS,
volume = "5",
number = "1",
pages = "108--111",
month = mar,
year = "1979",
CODEN = "ACMSCU",
DOI = "http://doi.acm.org/10.1145/355815.355823",
ISSN = "0098-3500 (print), 1557-7295 (electronic)",
ISSN-L = "0098-3500",
bibdate = "Sat Aug 27 23:58:53 1994",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Mathematical Software",
journal-URL = "http://portal.acm.org/toc.cfm?idx=J782",
}
@Article{Knoble:1979:EOW,
author = "H. D. Knoble and C. {Forney, Jr.} and F. S. Bader",
title = "An Efficient One-Way Enciphering Algorithm",
journal = j-TOMS,
volume = "5",
number = "1",
pages = "97--107",
month = mar,
year = "1979",
CODEN = "ACMSCU",
DOI = "http://doi.acm.org/10.1145/355815.355822",
ISSN = "0098-3500 (print), 1557-7295 (electronic)",
ISSN-L = "0098-3500",
bibdate = "Sat Aug 27 23:13:25 1994",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Mathematical Software",
journal-URL = "http://portal.acm.org/toc.cfm?idx=J782",
}
@Article{Leighton:1979:BRB,
author = "Albert C. Leighton",
title = "Book Review: {{\booktitle{An annotated bibliography of
cryptography}}: By David Shulman. Garland Reference
Library of the Humanities, Vol. 37 New York\slash
London (Garland Publishing Inc.). 1976. xvi + 372 pp.
illus. \$35.00}",
journal = j-HIST-MATH,
volume = "6",
number = "2",
pages = "213--218",
month = may,
year = "1979",
CODEN = "HIMADS",
ISSN = "0315-0860 (print), 1090-249X (electronic)",
ISSN-L = "0315-0860",
bibdate = "Wed Jun 26 06:17:09 MDT 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/histmath.bib",
URL = "http://www.sciencedirect.com/science/article/pii/0315086079900934",
acknowledgement = ack-nhfb,
fjournal = "Historia Mathematica",
journal-URL = "http://www.sciencedirect.com/science/journal/03150860",
}
@Article{Lempel:1979:CT,
author = "Abraham Lempel",
title = "Cryptology in Transition",
journal = j-COMP-SURV,
volume = "11",
number = "4",
pages = "285--303",
month = dec,
year = "1979",
CODEN = "CMSVAN",
DOI = "http://doi.acm.org/10.1145/356789.356792",
ISSN = "0010-4892",
ISSN-L = "0360-0300",
bibdate = "Thu Jun 19 09:25:45 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/surveys/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Computing Surveys",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204",
}
@Article{Lu:1979:EGC,
author = "Shyue Ching Lu",
title = "The existence of good cryptosystems for key rates
greater than the message redundancy",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "25",
number = "4",
pages = "475--477",
year = "1979",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1979.1056061",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
MRclass = "94B99",
MRnumber = "80g:94069a",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "IEEE Transactions on Information Theory",
}
@MastersThesis{Ma:1979:RAD,
author = "Robert Ma",
title = "Review and analysis of the {Data Encryption
Standard}",
type = "Master of Science, Plan II.",
school = "Department of Electrical Engineering and Computer
Sciences, University of California, Berkeley",
address = "Berkeley, CA, USA",
pages = "70",
year = "1979",
LCCN = "TK7 .U5 1979:1:M-N",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Matyas:1979:DSO,
author = "Stephen M. Matyas",
title = "Digital Signatures --- an Overview",
journal = j-COMP-NET,
volume = "3",
number = "2",
pages = "87--94",
month = apr,
year = "1979",
CODEN = "CNETDP",
ISSN = "0376-5075",
ISSN-L = "0376-5075",
bibdate = "Sat Sep 25 18:04:41 MDT 1999",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "IBM, Kingston, NY",
classification = "723",
fjournal = "Computer Networks",
journalabr = "Comput Networks",
keywords = "data processing; digital signatures",
}
@Article{Peleg:1979:BSC,
author = "Shmuel Peleg and Azriel Rosenfeld",
title = "Breaking Substitution Ciphers Using a Relaxation
Algorithm",
journal = j-CACM,
volume = "22",
number = "11",
pages = "598--605",
month = nov,
year = "1979",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jan 22 07:12:05 MST 2001",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
http://dblp.uni-trier.de/db/journals/cacm/cacm22.html#PelegR79;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classcodes = "C1230 (Artificial intelligence)",
corpsource = "Univ. of Maryland, College Park, MD, USA",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "artificial intelligence; computer security;
cryptography; decoding; joint letter probabilities;
letters; plaintext; relaxation; relaxation algorithm;
substitution ciphers; updating scheme",
oldlabel = "PelegR79",
ort = "ordner sicherheit",
treatment = "T Theoretical or Mathematical",
XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/PelegR79",
}
@Article{Popek:1979:ESC,
author = "Gerald J. Popek and Charles S. Kline",
title = "Encryption and Secure Computer Networks",
journal = j-COMP-SURV,
volume = "11",
number = "4",
pages = "331--356",
month = dec,
year = "1979",
CODEN = "CMSVAN",
DOI = "http://doi.acm.org/10.1145/356789.356794",
ISSN = "0010-4892",
ISSN-L = "0360-0300",
bibdate = "Thu Jun 19 09:25:45 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/surveys/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Computing Surveys",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204",
}
@InCollection{Reeds:1979:CMC,
author = "James Reeds",
booktitle = "Information linkage between applied mathematics and
industry (Proc. First Annual Workshop, Naval
Postgraduate School, Monterey, Calif., 1978)",
title = "Cracking a multiplicative congruential encryption
algorithm",
publisher = pub-ACADEMIC,
address = pub-ACADEMIC:adr,
pages = "467--472",
year = "1979",
MRclass = "94B99 (65C10)",
MRnumber = "80h:94040",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
}
@Article{Rivest:1979:CRC,
author = "Ronald L. Rivest",
title = "Critical remarks on: {``Critical remarks on some
public-key cryptosystems'' [BIT {\bf 18}(4), 1978, pp.
493--496; MR 80b:94033 ] by Tore Herlestam}",
journal = j-BIT,
volume = "19",
number = "2",
pages = "274--275",
month = jun,
year = "1979",
CODEN = "NBITAB",
DOI = "http://dx.doi.org/10.1007/BF01930859",
ISSN = "0006-3835 (print), 1572-9125 (electronic)",
ISSN-L = "0006-3835",
MRclass = "94B99 (68B99)",
MRnumber = "80m:94070",
MRreviewer = "M. C. Cheng",
bibdate = "Wed Jan 4 18:52:16 MST 2006",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=19&issue=2;
http://www.math.utah.edu/pub/tex/bib/bit.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See \cite{Herlestam:1978:CRS}.",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=19&issue=2&spage=274",
acknowledgement = ack-nhfb,
fjournal = "BIT; Nordisk Tidskrift for Informationsbehandling
(BIT)",
journal-URL = "http://link.springer.com/journal/10543",
}
@Article{Rubin:1979:DSC,
author = "F. Rubin",
title = "Decrypting a Stream Cipher Based on {J}--{K}
Flip-Flops",
journal = j-IEEE-TRANS-COMPUT,
volume = "C-28",
number = "7",
pages = "483--487",
month = jul,
year = "1979",
CODEN = "ITCOB4",
DOI = "http://dx.doi.org/10.1109/TC.1979.1675392",
ISSN = "0018-9340 (print), 1557-9956 (electronic)",
ISSN-L = "0018-9340",
bibdate = "Mon Jul 11 06:49:39 MDT 2011",
bibsource = "http://www.computer.org/tc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/ieeetranscomput1970.bib",
URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1675392",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Computers",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}
@Article{Shamir:1979:HSS,
author = "Adi Shamir",
title = "How to Share a Secret",
journal = j-CACM,
volume = "22",
number = "11",
pages = "612--613",
month = nov,
year = "1979",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
MRclass = "94B99 (68E99)",
MRnumber = "80g:94070",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "protection against loss of keys by dividing the data
into pieces.",
classcodes = "C6130 (Data handling techniques)",
corpsource = "MIT, Cambridge, MA, USA",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "computer security; cryptographic systems;
cryptography; encoding; key management; robust key
management schemes; security breaches; security of
data",
ort = "ordner sicherheit",
referencedin = "Referenced in \cite[Ref. 38]{Gemmell:1997:ITC},
\cite[Ref. 26]{Canetti:1997:PSL}.",
treatment = "P Practical; T Theoretical or Mathematical",
}
@InProceedings{Simmons:1979:CCA,
author = "Gustavus J. Simmons",
booktitle = "Proceedings of the Eighth Manitoba Conference on
Numerical Mathematics and Computing (Univ. Manitoba,
Winnipeg, Man., 1978)",
title = "Computational complexity and asymmetric encryption",
publisher = pub-UTILITAS-MATH,
address = pub-UTILITAS-MATH:adr,
pages = "65--93",
year = "1979",
MRclass = "68B15 (68C25 94B99)",
MRnumber = "80h:68017",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
series = "Congress. Numer., XXII",
}
@InProceedings{Simmons:1979:HID,
author = "G. J. Simmons",
editor = "{IEEE}",
booktitle = "IEEE EASCON '79, Washington, DC, 1979",
title = "How to Insure that Data Acquired to Verify Treaty
Compliance are Trustworthy",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "661--662",
year = "1979",
ISBN = "????",
ISBN-13 = "????",
LCCN = "????",
bibdate = "Thu Jan 21 14:46:12 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Simmons:1979:SAE,
author = "Gustavus J. Simmons",
title = "Symmetric and Asymmetric Encryption",
journal = j-COMP-SURV,
volume = "11",
number = "4",
pages = "305--330",
month = dec,
year = "1979",
CODEN = "CMSVAN",
DOI = "http://doi.acm.org/10.1145/356789.356793",
ISSN = "0010-4892",
ISSN-L = "0360-0300",
bibdate = "Thu Jun 19 09:25:45 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/surveys/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Computing Surveys",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204",
}
@Article{Smith:1979:UFM,
author = "Donald R. Smith and James T. Palmer",
title = "Universal fixed messages and the
{Rivest--Shamir--Adleman} cryptosystem",
journal = j-MATHEMATIKA,
volume = "26",
number = "1",
pages = "44--52",
year = "1979",
CODEN = "MTKAAB",
ISSN = "0025-5793",
MRclass = "94B99",
MRnumber = "80m:94071",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
http://www.math.utah.edu/pub/tex/bib/sigcse.bib",
fjournal = "Mathematika. A Journal of Pure and Applied
Mathematics",
remark = "This paper points out that the some keys in the RSA
may fail to encrypt: instead, they produce an output
ciphertext that is identical to the input plaintext.
See also \cite{Blakley:1979:RSA,Bergmann:2009:DKR}",
}
@Article{Snyder:1979:IUC,
author = "Samuel S. Snyder",
title = "Influence of {U.S. Cryptologic Organizations} on the
digital computer industry",
journal = j-J-SYST-SOFTW,
volume = "1",
number = "1",
pages = "87--102",
month = "????",
year = "1979",
CODEN = "JSSODM",
ISSN = "0164-1212",
ISSN-L = "0164-1212",
bibdate = "Wed Sep 8 07:38:41 MDT 2010",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.sciencedirect.com/science/journal/01641212",
acknowledgement = ack-nhfb,
fjournal = "The Journal of systems and software",
journal-URL = "http://www.sciencedirect.com/science/journal/01641212",
}
@Article{Tuchman:1979:HPN,
author = "W. Tuchman",
title = "{Hellman} presents no shortcut solutions to {DES}",
journal = j-IEEE-SPECTRUM,
volume = "16",
number = "7",
pages = "40--41",
month = jul,
year = "1979",
CODEN = "IEESAM",
ISSN = "0018-9235 (print), 1939-9340 (electronic)",
ISSN-L = "0018-9235",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Spectrum",
referencedin = "Referenced in \cite[Ref. 25]{Biham:1998:TA}.",
}
@TechReport{USNA:1979:CS,
author = "{United States. National Archives and Records
Service}",
title = "Cryptology studies",
type = "Records of the National Security Agency",
number = "RG457",
institution = "National Archives of the United States",
address = "Washington, DC, USA",
pages = "??",
year = "1979",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "reel 1. Studies SRH002-007.--reel 2. Studies SRM026,
SRM028-037.-- reel 3. Studies SRH-001, SRH-038.",
keywords = "Ciphers; Cryptography; World War, 1939-1945 ---
Cryptography.",
}
@Book{USNSG:1979:IRW,
author = "{United States. Naval Security Group}",
title = "Intelligence reports on the war in the {Atlantic},
1942--1945: the account of the war in the {Atlantic}
from {Dec. 1942} to {May 1945} as seen through and
influenced by decryption of {German} naval radio
traffic: [guide]",
publisher = "Michael Glazier",
address = "Wilmington, DE, USA",
pages = "6",
year = "1979",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Microfilm (positive). v. 1. Allied communication
intelligence and the battle of the Atlantic.--v.2.
U-boat operations.--v. 3. German naval communications
intelligence.--v. 4. Technical intelligence from Allied
C.I. Released by the Department of the Navy, Naval
Security Group Command Headquarters. v. 1. Allied
communication intelligence and the battle of the
Atlantic.--v.2. U-boat operations.--v. 3. German naval
communications intelligence.--v. 4. Technical
intelligence from Allied C.I.",
keywords = "Cipher and telegraph codes; Germany. --- Kriegsmarine
--- Communication systems; World War, 1939--1945 ---
Atlantic Ocean; World War, 1939--1945 ---
Communications, Military; World War, 1939--1945 ---
Cryptography; World War, 1939--1945 --- Naval
operations, American; World War, 1939--1945 --- Naval
operations, German; World War, 1939-1945 --- Atlantic
Ocean",
}
@Book{Weber:1979:USD,
author = "Ralph Edward Weber",
title = "{United States} Diplomatic Codes and Ciphers,
1775--1938",
publisher = "Precedent Publishing",
address = "Chicago, IL, USA",
pages = "xviii + 633",
year = "1979",
ISBN = "0-913750-20-4",
ISBN-13 = "978-0-913750-20-9",
LCCN = "Z103 .W4",
bibdate = "Tue Dec 01 10:53:24 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "US\$49.95",
acknowledgement = ack-nhfb,
}
@Article{Williams:1979:CAA,
author = "P. W. Williams and D. Woodhead",
title = "Computer assisted analysis of cryptic crosswords",
journal = j-COMP-J,
volume = "22",
number = "1",
pages = "67--70",
month = feb,
year = "1979",
CODEN = "CMPJA6",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Mar 25 13:51:56 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/compj1970.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classcodes = "C7830D (Computer games)",
corpsource = "Computation Dept., Univ. of Manchester, Manchester,
UK",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "BNF type definition; computer analysis program;
cryptic crosswords; games of skill; language LACROSS;
personal computing",
treatment = "A Application; P Practical",
}
@Article{Williams:1979:SRC,
author = "H. C. Williams and B. Schmid",
title = "Some remarks concerning the {M.I.T.} public-key
cryptosystem",
journal = j-BIT,
volume = "19",
number = "4",
pages = "525--538",
month = dec,
year = "1979",
CODEN = "BITTEL, NBITAB",
DOI = "http://dx.doi.org/10.1007/BF01931269",
ISSN = "0006-3835 (print), 1572-9125 (electronic)",
ISSN-L = "0006-3835",
MRclass = "94B99",
MRnumber = "80m:94072",
bibdate = "Wed Jan 4 18:52:16 MST 2006",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=19&issue=4;
http://www.math.utah.edu/pub/tex/bib/bit.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=19&issue=4&spage=525",
acknowledgement = ack-nhfb,
fjournal = "BIT; Nordisk Tidskrift for Informationsbehandling
(BIT)",
journal-URL = "http://link.springer.com/journal/10543",
referencedin = "Referenced in \cite[Ref. 25]{Kaliski:1995:SUR}.",
}
@Manual{Zeidler:1979:DDE,
author = "Howard M. Zeidler",
title = "Digital data encryption",
organization = pub-SRI,
address = pub-SRI:adr,
pages = "20",
year = "1979",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Guidelines - SRI International, Business Intelligence
Program; no. 1044 Guidelines (Business Intelligence
Program (SRI International)); no. 1044",
acknowledgement = ack-nhfb,
annote = "Cover title.",
keywords = "Computers --- Access control --- Passwords; Data
encryption (Computer science)",
}
@PhdThesis{Andelman:1980:MLE,
author = "Dov Andelman",
title = "Maximum likelihood estimation applied to
cryptanalysis",
type = "Thesis ({Ph.D.})",
school = "Department of Electrical Engineering, Stanford
University",
address = "Stanford, CA, USA",
pages = "viii + 167",
year = "1980",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography; Maxima and minima.",
}
@TechReport{Anonymous:1980:ACS,
author = "Anonymous",
title = "An Assessment of civil sector uses of digital data
encryption",
number = "",
institution = "Department of Engineering and Public Policy,
Department of Social Sciences and School of Urban and
Public Affairs, Carnegie-Mellon University",
address = "Pittsburgh, PA, USA",
pages = "128",
month = nov,
year = "1980",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Draft version produced in April 1980, final revised
version produced November 1980.",
keywords = "Computers --- Access control; Digital communications;
Electronic data processing departments --- Security
measures.",
}
@Book{Bennett:1980:UWN,
author = "Ralph Francis Bennett",
title = "{Ultra} in the {West}: the {Normandy} campaign,
1944--45",
publisher = "Scribner",
address = "New York, NY, USA",
pages = "xvi + 336",
year = "1980",
ISBN = "0-684-16704-2",
ISBN-13 = "978-0-684-16704-6",
LCCN = "D756.5.N6 B44 1980",
bibdate = "Mon May 8 07:06:44 MDT 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
price = "US\$17.50",
acknowledgement = ack-nhfb,
subject = "World War, 1939--1945; Campaigns; France; Normandy;
Cryptography; Secret Service; Great Britain; Normandy
(France); History",
}
@Article{Berstis:1980:SPD,
author = "Viktors Berstis",
title = "Security and protection of data in the {IBM
System\slash 38}",
journal = j-COMP-ARCH-NEWS,
volume = "8",
number = "3",
pages = "245--252",
year = "1980",
CODEN = "CANED2",
ISSN = "0163-5964 (print), 1943-5851 (electronic)",
ISSN-L = "0163-5964",
bibdate = "Fri May 12 16:54:57 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGARCH Computer Architecture News",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J89",
}
@Article{Book:1980:UDC,
author = "R. V. Book and Sai Choi Kwan",
title = "On Uniquely Decipherable Codes with Two Codewords",
journal = j-IEEE-TRANS-COMPUT,
volume = "C-29",
number = "4",
pages = "324--325",
month = apr,
year = "1980",
CODEN = "ITCOB4",
DOI = "http://dx.doi.org/10.1109/TC.1980.1675571",
ISSN = "0018-9340 (print), 1557-9956 (electronic)",
ISSN-L = "0018-9340",
bibdate = "Sun Jul 10 19:15:25 MDT 2011",
bibsource = "http://www.computer.org/tc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib",
URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1675571",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Computers",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}
@Book{Calvocoressi:1980:TSU,
author = "Peter Calvocoressi",
title = "Top secret ultra",
publisher = "Pantheon Books",
address = "New York, NY, USA",
pages = "132",
year = "1980",
ISBN = "0-394-51154-9",
ISBN-13 = "978-0-394-51154-2",
LCCN = "D810.C88C34 1980",
bibdate = "Tue Dec 01 08:23:32 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Misc{Diffie:1980:CAM,
author = "B. W. Diffie and M. E. Hellman and R. C. Merkle",
title = "Cryptographic Apparatus and Method",
howpublished = "US Patent No. 4,200,770A.",
day = "29",
month = apr,
year = "1980",
bibdate = "Sat Nov 29 13:44:46 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Patent filed 6 September 1977.",
URL = "https://www.google.com/patents/US4200770",
abstract = "A cryptographic system transmits a computationally
secure cryptogram over an insecure communication
channel without prearrangement of a cipher key. A
secure cipher key is generated by the conversers from
transformations of exchanged transformed signals. The
conversers each possess a secret signal and exchange an
initial transformation of the secret signal with the
other converser. The received transformation of the
other converser's secret signal is again transformed
with the receiving converser's secret signal to
generate a secure cipher key. The transformations use
non-secret operations that are easily performed but
extremely difficult to invert. It is infeasible for an
eavesdropper to invert the initial transformation to
obtain either conversers' secret signal, or duplicate
the latter transformation to obtain the secure cipher
key.",
acknowledgement = ack-nhfb,
}
@Article{Estell:1980:BW,
author = "Robert G. Estell",
title = "Benchmarks and watermarks",
journal = j-SIGMETRICS,
volume = "9",
number = "3",
pages = "39--44",
month = "Fall",
year = "1980",
CODEN = "????",
DOI = "http://doi.acm.org/10.1145/1041883.1041885",
ISSN = "0163-5999 (print), 1557-9484 (electronic)",
ISSN-L = "0163-5999",
bibdate = "Thu Jun 26 10:55:53 MDT 2008",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Historically, benchmark tests have been one of several
ways to size a computer system, and measure its
performance. Today, it is more important to test the
System Software than the machine hardware. (Thus the
term `watermark' (as on bond paper) for software
tests.) Watermarks of software suffer the same
limitations and risks as benchmarks of hardware: e.a.,
they should be supplemented with simulations, models,
and other analysis and design tools of our trade.
Perhaps most significantly, watermarks, like
benchmarks, can be biased by their creators.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGMETRICS Performance Evaluation Review",
journal-URL = "http://portal.acm.org/toc.cfm?id=J618",
}
@TechReport{Gait:1980:CST,
author = "Jason Gait",
title = "Computer science and technology: maintenance testing
for the {Data Encryption Standard}",
type = "United States. National Bureau of Standards Special
publication",
number = "500-61",
institution = pub-NBS,
address = pub-NBS:adr,
pages = "25",
year = "1980",
ISSN = "0083-1883",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Manual{Gait:1980:MTD,
author = "Jason Gait",
title = "Maintenance testing for the {Data Encryption
Standard}",
volume = "500-61",
number = "500-61",
organization = pub-NBS,
address = pub-NBS:adr,
pages = "iii + 25",
month = aug,
year = "1980",
CODEN = "XNBSAV",
LCCN = "T1.U52 no.500-61",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "NBS special publication Computer science and
technology",
acknowledgement = ack-nhfb,
govtdocnumber = "C 13.10:500-61 247",
keywords = "computers --- access control; Computers --- Access
control --- Passwords; cryptography --- data
processing; Cryptography --- Data processing; Data
encryption (Computer science); Electronic data
processing departments --- Security measures;
electronic data processing departments --- security
measures; Monte Carlo method",
}
@Manual{Gait:1980:VCH,
author = "Jason Gait",
title = "Validating the correctness of hardware implementations
of the {NBS Data Encryption Standard}",
number = "500-20",
organization = pub-USGPO,
address = pub-USGPO:adr,
pages = "iv + 40",
year = "1980",
LCCN = "C 13.10:500-20/2 Government Information U.S.",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "US\$2.25 (paperback)",
series = "NBS special publication. Computer science and
technology",
acknowledgement = ack-nhfb,
keywords = "Computers --- Access control --- Code words; computers
--- access control --- code words; computers ---
testing; Computers --- Testing; Data encryption
(Computer science); data encryption (computer science);
Monte Carlo method",
}
@Book{Garlinski:1980:EW,
author = "J{\'o}zef Garli{\'n}ski",
title = "The {Enigma} war",
publisher = "Scribner",
address = "New York, NY, USA",
pages = "xx + 219 + 8",
year = "1980",
ISBN = "0-684-15866-3",
ISBN-13 = "978-0-684-15866-2",
LCCN = "D810.S7 G32 1980",
bibdate = "Tue Sep 4 06:00:21 MDT 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
price = "US\$14.95",
acknowledgement = ack-nhfb,
remark = "Original British edition \cite{Garlinski:1979:IEW}.",
subject = "World War, 1939-1945; Secret service; Cryptography",
}
@Article{Goethals:1980:CAL,
author = "J.-M. Goethals and C. Couvreur",
title = "A cryptanalytic attack on the {Lu-Lee} public-key
cryptosystem",
journal = j-PHILIPS-J-RES,
volume = "35",
number = "4-5",
pages = "301--306",
year = "1980",
CODEN = "PHJRD9",
ISSN = "0165-5817",
ISSN-L = "0165-5817",
MRclass = "94A99",
MRnumber = "82b:94018",
MRreviewer = "Tai Yang Hwang",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Philips Journal of Research",
}
@Book{Hamming:1980:CIT,
author = "R. W. (Richard Wesley) Hamming",
title = "Coding and information theory",
publisher = pub-PH,
address = pub-PH:adr,
pages = "xii + 239",
year = "1980",
ISBN = "0-13-139139-9",
ISBN-13 = "978-0-13-139139-0",
LCCN = "QA268 .H35 1980",
bibdate = "Fri Jun 24 21:02:55 MDT 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
price = "US\$19.95",
acknowledgement = ack-nhfb,
subject = "Coding theory; Information theory",
}
@MastersThesis{Hood:1980:EFS,
author = "William Chester Hood",
title = "Encryption as a file security measure in large
operating systems",
type = "Thesis ({M.S.})",
school = "University of Tennessee, Knoxville",
address = "Knoxville, TN, USA",
pages = "iv + 116",
year = "1980",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "[103]-112.",
keywords = "Computers --- Access control.",
}
@TechReport{Knuth:1980:DLC,
author = "Donald E. Knuth",
title = "Deciphering a linear congruential encryption",
type = "Report",
number = "024800",
institution = "Department of Computer Science, Stanford University",
address = "Stanford, CA, USA",
year = "1980",
bibdate = "Wed Feb 22 13:51:32 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
remark = "Published in \cite{Knuth:1985:DLC}.",
}
@Article{Konheim:1980:ICP,
author = "Alan G. Konheim and Marian H. Mack and Robert K.
McNeill and Bryant Tuckerman and Gerald Waldbaum",
title = "The {IPS} Cryptographic Programs",
journal = j-IBM-SYS-J,
volume = "19",
number = "2",
pages = "253--283",
year = "1980",
CODEN = "IBMSA7",
ISSN = "0018-8670",
bibdate = "Wed Jan 08 16:35:07 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
abstract = "Cryptographic methods of data protection have taken on
new importance as computers have become faster and as
strong cryptographic algorithms, such as the Data
Encryption Standard (DES), have become available. But a
standard encipherment technique is only the first step
in applying cryptography in a computing center. This
paper discusses the Information Protection System
(IPS), a set of cryptographic application programs
designed to use the DES algorithm in a working
computing center. In designing IPS, several important
augmentations of DES were formulated.",
acknowledgement = ack-nhfb,
classification = "723",
fjournal = "IBM Systems Journal",
journalabr = "IBM Syst J",
keywords = "data processing; information protection system",
}
@Article{Leiss:1980:NSS,
author = "E. Leiss",
title = "A note on a signature system based on probabilistic
logic",
journal = j-INFO-PROC-LETT,
volume = "11",
number = "2",
pages = "110--113",
day = "??",
month = oct,
year = "1980",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "C4210 (Formal logic); C6130 (Data handling
techniques)",
corpsource = "Dept. of Computer Sci., Univ. of Houston, Houston, TX,
USA",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
keywords = "data privacy; digitalised signature system;
probabilistic logic; requirements",
treatment = "A Application",
}
@Article{Lu:1980:AEG,
author = "Shyue Ching Lu",
title = "Addition to: {``The existence of good cryptosystems
for key rates greater than the message redundancy''
[IEEE Trans. Inform. Theory {\bf 25} (1979), no. 4,
475--477;\ MR 80g:94069]}",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "26",
number = "1",
pages = "129--129",
year = "1980",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1980.1056129",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
MRclass = "94B99",
MRnumber = "80g:94069b",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "IEEE Transactions on Information Theory",
}
@Article{Luccio:1980:CMC,
author = "F. Luccio and S. Mazzone",
title = "A cryptosystem for multiple communication",
journal = j-INFO-PROC-LETT,
volume = "10",
number = "4--5",
pages = "180--183",
day = "5",
month = jul,
year = "1980",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Tue Nov 17 10:49:43 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See notes \cite{Meijer:1981:NCM,Hellman:1981:ACA}.",
acknowledgement = ack-nhfb,
classification = "723; B6120B (Codes); B6210L (Computer
communications); C5620 (Computer networks and
techniques); C6130 (Data handling techniques)",
corpsource = "Univ. of Pisa, Pisa, Italy",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "authentication; computer networks; cryptosystem;
cryptosystems; data transmission; encoding; multiple
communication; security of data",
treatment = "P Practical",
}
@InProceedings{Merkle:1980:PPK,
author = "R. C. Merkle",
title = "Protocols for public key cryptosystems",
crossref = "IEEE:1980:PSS",
pages = "??--??",
year = "1980",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 22]{Goldreich:1997:FMCb}.",
}
@Manual{NBS:1980:MO,
author = "{National Bureau of Standards}",
title = "{DES} Modes of Operation",
volume = "81",
organization = "U. S. Department of Commerce",
address = "Washington, DC, USA",
pages = "16",
month = dec,
year = "1980",
LCCN = "C 13.52:81",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Federal information processing standards publication",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 22]{Biham:1998:TA}.",
xxISBN = "none",
}
@Book{Pearcey:1980:EDS,
author = "T. (Trevor) Pearcey",
title = "Encryption in data systems and communication",
publisher = "Caulfield Institute of Technology. Computer Abuse
Research and Bureau (CITCARB)",
address = "Caulfield, Victoria, Australia",
pages = "99",
year = "1980",
ISBN = "0-909176-14-0",
ISBN-13 = "978-0-909176-14-3",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Cover title. At head of title: Caulfield Institute of
Technology. CITCARB. [1]-10.",
keywords = "Cryptography; Data transmission systems --- Security
measures",
}
@Article{Pomerance:1980:P,
author = "Carl Pomerance and J. L. Selfridge and Samuel S.
{Wagstaff, Jr.}",
title = "The Pseudoprimes to $ 25 \cdot 10^9 $",
journal = j-MATH-COMPUT,
volume = "35",
number = "151",
pages = "1003--1026",
month = jul,
year = "1980",
CODEN = "MCMPAF",
ISSN = "0025-5718 (paper), 1088-6842 (electronic)",
ISSN-L = "0025-5718",
MRclass = "10A40 (10-04 10A25)",
MRnumber = "82g:10030",
bibdate = "Tue Oct 13 08:06:19 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
classcodes = "B0210 (Algebra); C1110 (Algebra)",
corpsource = "Dept. of Math., Univ. of Illinois, Urbana, IL, USA",
fjournal = "Mathematics of Computation",
journal-URL = "http://www.ams.org/mcom/",
keywords = "Carmichael numbers; counting function; Lucas
sequences; mathematical analysis; primality;
pseudoprimes",
referencedin = "Referenced in \cite[Ref. 9]{Silverman:1997:FGR}.",
treatment = "T Theoretical or Mathematical",
}
@Book{Pritchard:1980:DE,
author = "John Arthur Thomas (John A. T.) Pritchard",
title = "Data encryption",
publisher = pub-NAT-COMP-CENTRE,
address = pub-NAT-COMP-CENTRE:adr,
pages = "126 (or 118??)",
year = "1980",
ISBN = "0-85012-253-8",
ISBN-13 = "978-0-85012-253-4",
LCCN = "QA76.9.A25 P7",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "and bibliographies.",
keywords = "Computers --- Access control --- Passwords.",
}
@Book{Pronzini:1980:MCC,
author = "Bill Pronzini",
title = "Mummy!: a chrestomathy of crypt-ology",
publisher = "Arbor House",
address = "New York, NY, USA",
pages = "xii + 273",
year = "1980",
ISBN = "0-87795-271-X",
ISBN-13 = "978-0-87795-271-8",
LCCN = "PN 6120.95 M77 M86 1980",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Contents: Doyle, A.C. Lot no. 249.--Poe, E.A. Some
words with a mummy.--Benson, E.F. Monkeys.--Wollheim,
D.A. Bones.--Williams, T. The vengeance of
Nitocris.--Gautier, T. The mummy's foot.--Bloch, R. The
eyes of the mummy.--Powell, T. Charlie.--Hoch, E.D. The
weekend magus.--Lansdale, J.R. The princess.--Mayhar,
A. The eagle-claw rattle.--Grant, C.L. The other
room.--Malzberg, B.N. Revelation in seven
stages.--Bibliography.",
price = "US\$10.95",
acknowledgement = ack-nhfb,
keywords = "mummies --- fiction",
}
@Article{Rivest:1980:DSC,
author = "R. L. Rivest",
title = "A description of a single-chip implementation of the
{RSA} cipher",
journal = "Lambda: the magazine of {VLSI} design",
volume = "1",
number = "3",
pages = "14--18",
month = "Fourth Quarter",
year = "1980",
CODEN = "VDESDP",
ISSN = "0273-8414",
ISSN-L = "0273-8414",
bibdate = "Thu Aug 21 06:25:34 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Shulman:1980:BRB,
author = "David Shulman",
title = "Book Review: {{\booktitle{United States diplomatic
codes and ciphers 1775--1938}}: By Ralph E. Weber.
Chicago. xviii + 633 pp. Illus. \$49.95}",
journal = j-HIST-MATH,
volume = "7",
number = "4",
pages = "452--454",
month = nov,
year = "1980",
CODEN = "HIMADS",
ISSN = "0315-0860 (print), 1090-249X (electronic)",
ISSN-L = "0315-0860",
bibdate = "Wed Jun 26 06:17:21 MDT 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/histmath.bib",
URL = "http://www.sciencedirect.com/science/article/pii/0315086080900142",
acknowledgement = ack-nhfb,
fjournal = "Historia Mathematica",
journal-URL = "http://www.sciencedirect.com/science/journal/03150860",
}
@Article{Snyder:1980:CAP,
author = "Samuel S. Snyder",
title = "Computer Advances Pioneered by Cryptologic
Organizations",
journal = j-ANN-HIST-COMPUT,
volume = "2",
number = "1",
pages = "60--70",
month = jan # "\slash " # mar,
year = "1980",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:17 MST 2002",
bibsource = "http://www.computer.org/annals/an1980/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1980/pdf/a1060.pdf;
http://www.computer.org/annals/an1980/a1060abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@MastersThesis{Sorkis:1980:USM,
author = "Michael Sorkis",
title = "Use of statistically matched codes in a data
encryption system",
type = "Thesis ({M.S.})",
school = "Southern Illinois University at Carbondale",
address = "Carbondale, IL, USA",
pages = "v + 91",
year = "1980",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography.",
}
@Book{USWD:1980:EC,
author = "{United States. War Dept} and {United States.
Adjutant-General's Office}",
title = "Elements of cryptanalysis",
publisher = pub-USGPO,
address = pub-USGPO:adr,
pages = "165",
year = "1980",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Training pamphlet; no. 3 War Dept document; no. 117
Training pamphlet (United States. War Dept.); no. 3.
Document (United States. War Dept.); no. 117",
acknowledgement = ack-nhfb,
annote = "Photocopy.",
keywords = "Ciphers; Cryptography.",
}
@Article{Voukalis:1980:DFC,
author = "D. C. Voukalis",
title = "The distance factor in cryptosystems",
journal = j-INT-J-ELECTRON,
volume = "49",
number = "1",
pages = "73--75",
year = "1980",
CODEN = "IJELA2",
ISSN = "0020-7217",
ISSN-L = "0020-7217",
MRclass = "94B99",
MRnumber = "82k:94021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "International Journal of Electronics",
}
@Article{Voukalis:1980:GSE,
author = "D. C. Voukalis",
title = "A good solution of the encryption problem using matrix
code, distance factor and {PN} sequences",
journal = "Internat. J. Electron.",
volume = "48",
number = "3",
pages = "271--274",
year = "1980",
CODEN = "IJELA2",
ISSN = "0020-7217",
MRclass = "94A99",
MRnumber = "82b:94020",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "International Journal of Electronics",
}
@MastersThesis{Wells:1980:ADB,
author = "David L. Wells",
title = "Achieving data base protection through the use of
subkey encryption",
type = "Thesis ({Doctor of Engineering})",
school = "University of Wisconsin-Milwaukee",
address = "Milwaukee, WI, USA",
pages = "131",
year = "1980",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Electronic data processing departments --- Security
measures.",
}
@Article{Williams:1980:MRP,
author = "H. C. Williams",
title = "A modification of the {RSA} public-key encryption
procedure",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "26",
number = "6",
pages = "726--729",
year = "1980",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1980.1056264",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
MRclass = "94B99 (10A25)",
MRnumber = "81k:94041",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "IEEE Transactions on Information Theory",
}
@Article{ACE:1981:RPC,
author = "{American Council on Education}",
title = "Report of the {Public Cryptography Study Group}",
journal = j-CACM,
volume = "24",
number = "7",
pages = "435--450",
month = jul,
year = "1981",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Jan 28 14:37:22 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See the opposing view in \cite{Davida:1981:CAR}.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
}
@TechReport{Ahlswede:1981:BCG,
author = "R. Ahlswede and G. Dueck",
title = "Bad codes are good ciphers",
type = "Report",
institution = "Universit{\"a}t Bielefeld",
address = "Bielefeld, Germany",
year = "1981",
bibdate = "Sat Apr 20 12:15:46 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Submitted in Nov. 1980 to the proceedings of the
International Colloquium on Information Theory, to be
held at Budapest in August 1981.",
acknowledgement = ack-nhfb,
}
@Article{Anonymous:1981:CHP,
author = "Anonymous",
title = "Corrections: {How Polish Mathematicians Deciphered the
Enigma, 3(3) 232}, {Reviews: H. H. Goldstine: A History
of Numerical Analysis, 3(3) 293}",
journal = j-ANN-HIST-COMPUT,
volume = "3",
number = "4",
pages = "407--407",
month = oct # "\slash " # dec,
year = "1981",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 01 10:35:25 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See \cite{Rejewski:1981:HPM,Salzer:1981:RHH}.",
URL = "http://dlib.computer.org/an/books/an1981/pdf/a4400.pdf",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@Book{Anonymous:1981:GIU,
author = "Anonymous",
title = "Guidelines for implementing and using the {NBS} Data
Encryption Standard",
volume = "74",
publisher = pub-NBS,
address = pub-NBS:adr,
pages = "39",
year = "1981",
ISSN = "0083-1816",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "United States. National Bureau of Standards. Federal
information processing standards publication, FIPS
PUB",
acknowledgement = ack-nhfb,
}
@Article{Asmuth:1981:EAC,
author = "C. A. Asmuth and G. R. Blakley",
title = "An efficient algorithm for constructing a cryptosystem
which is harder to break than two other cryptosystems",
journal = j-COMP-MATH-APPL,
volume = "7",
number = "6",
pages = "447--450",
year = "1981",
CODEN = "CMAPDK",
ISSN = "0898-1221 (print), 1873-7668 (electronic)",
ISSN-L = "0898-1221",
MRclass = "94B99 (68C05)",
MRnumber = "83d:94020",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Computers \& Mathematics with Applications. An
International Journal",
}
@Article{Ayoub:1981:EKR,
author = "F. Ayoub",
title = "Encryption with keyed random permutations",
journal = j-ELECT-LETTERS,
volume = "17",
number = "17",
pages = "583--585",
year = "1981",
CODEN = "ELLEAK",
ISSN = "0013-5194",
ISSN-L = "0013-5194",
MRclass = "94B25 (05A05)",
MRnumber = "82h:94023",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "Electronics Letters",
}
@Article{Baum:1981:RPC,
author = "Werner A. Baum and David H. Brandin and R. Creighton
Buck and George I. Davida and George Handelman and
Martin E. Hellman and Ira Michael Heyman and Wilfred
Kaplan and Daniel C. Schwartz",
title = "Report of the {Public Cryptography Study Group},
prepared for {American Council on Education, One Dupont
Circle, Washington, DC 20036, February 7, 1981}",
journal = j-CACM,
volume = "24",
number = "7",
pages = "435--445",
month = jul,
year = "1981",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Jan 28 14:37:22 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See the opposing view in \cite{Davida:1981:CAR}.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
}
@Book{Beesly:1981:CIW,
author = "Patrick Beesly",
title = "Cryptanalysis and its influence on the war at sea
1914--1918",
publisher = "U.S. Naval Academy",
address = "Annapolis, MD, USA",
pages = "13",
year = "1981",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Xerox copy.",
xxnote = "Check publisher??",
}
@Article{Booth:1981:ASU,
author = "K. S. Booth",
title = "Authentication of Signatures Using Public Key
Encryption",
journal = j-CACM,
volume = "24",
number = "11",
pages = "772--774",
month = nov,
year = "1981",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Sep 22 11:36:41 1994",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "One of Needham and Schroeder's proposed signature
authentication protocols is shown to fail when there is
a possibility of compromised keys: this invalidates one
of the applications of their technique. A more
elaborate mechanism is proposed which does not require
a network clock, but does require a third party to the
transaction. The latter approach is shown to be
reliable in a fairly strong sence.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
}
@Book{Brownell:1981:ODN,
author = "George A. Brownell",
title = "The origin and development of the {National Security
Agency}",
volume = "35",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "x + 98",
year = "1981",
ISBN = "0-89412-054-9",
ISBN-13 = "978-0-89412-054-1",
LCCN = "UB290 .B76 1981",
bibdate = "Mon Sep 13 06:41:04 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Edited by Wayne G. Barker. Originally published as
report of the Ad hoc Committee to Study the
Communications Intelligence Activities of the United
States, George A. Brownell, chairman.",
series = "A cryptographic series",
acknowledgement = ack-nhfb,
}
@Article{Burchard:1981:NNF,
author = "Hank Burchard",
title = "News and Notices: {Finerman and Lee Receive ACM
Awards}; Summer Positions at {Digital Computer Museum};
{CBI Fellowship 1982--1983}; {GMD} Activities in the
History of Computing; Request for Articles; {Edwards}
Speaks at {Digital Computer Museum}; Exhibit of Cipher
Machines",
journal = j-ANN-HIST-COMPUT,
volume = "3",
number = "4",
pages = "410--413",
month = oct # "\slash " # dec,
year = "1981",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:18 MST 2002",
bibsource = "http://www.computer.org/annals/an1981/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1981/pdf/a4410.pdf",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@Book{CBEMA:1981:ANS,
author = "{Computer and Business Equipment Manufacturers
Association} and {American National Standards
Institute}",
title = "{American National Standard Data Encryption
Algorithm}",
publisher = pub-ANSI,
address = pub-ANSI:adr,
pages = "16",
day = "30",
month = dec,
year = "1981",
LCCN = "????",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "ANSI X3.92-1981.",
acknowledgement = ack-nhfb,
keywords = "coding theory --- standards --- United States;
computers --- access control --- standards --- United
States; data protection --- standards --- United
States",
}
@Article{Chaum:1981:UEM,
author = "D. Chaum",
title = "Untraceable electronic mail, return addresses, and
digital pseudonyms",
journal = j-CACM,
volume = "24",
number = "2",
pages = "84--88",
month = feb,
year = "1981",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Dec 26 17:01:46 1998",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1019.html",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "information hiding; steganography",
}
@Book{Clark:1981:ECC,
author = "George C. {Clark, Jr.} and J. Bibb Cain",
title = "Error-correction coding for digital communications",
publisher = pub-PLENUM,
address = pub-PLENUM:adr,
pages = "xii + 422",
year = "1981",
ISBN = "0-306-40615-2",
ISBN-13 = "978-0-306-40615-7",
LCCN = "TK5102.5 .C52",
bibdate = "Mon Nov 30 08:53:48 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Periodical{Crypto:1981:ACP,
author = "CRYPTO",
title = "Advances in cryptology: proceedings of {CRYPTO}",
publisher = pub-PLENUM,
address = pub-PLENUM:adr,
pages = "various",
year = "1981",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Volumes for 1984 to 1989 were published in the
Springer-Verlag Lecture Notes in Computer Science
series.",
acknowledgement = ack-nhfb,
keywords = "Computers --- Access control --- Congresses;
Cryptography --- Congresses.",
}
@Article{Davida:1981:CAR,
author = "George I. Davida",
title = "The Case Against Restraints on Non-Governmental
Research in Cryptography",
journal = j-CACM,
volume = "24",
number = "7",
pages = "445--450",
month = jul,
year = "1981",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Tue Jan 28 14:39:33 1997",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "This is an opposing view published with
\cite{ACE:1981:RPC}.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
}
@Article{Davida:1981:DES,
author = "George I. Davida and David L. Wells and John B. Kam",
title = "A Database Encryption System with Subkeys",
journal = j-TODS,
volume = "6",
number = "2",
pages = "312--328",
month = jun,
year = "1981",
CODEN = "ATDSD3",
ISSN = "0362-5915 (print), 1557-4644 (electronic)",
ISSN-L = "0362-5915",
MRclass = "68B15",
MRnumber = "82f:68020",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "Compendex database; Database/Wiederhold.bib;
http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
URL = "http://www.acm.org/pubs/articles/journals/tods/1981-6-2/p312-davida/p312-davida.pdf;
http://www.acm.org/pubs/citations/journals/tods/1981-6-2/p312-davida/",
abstract = "A new cryptosystem that is suitable for database
encryption is presented. The system has the important
property of having subkeys that allow the encryption
and decryption of fields within a record. The system is
based on the Chinese Remainder Theorem.",
acknowledgement = ack-nhfb,
annote = "Subkeys allow the encryption and decryption of fields
within a record. The system is based on the Chinese
Remainder Theorem.",
classification = "723",
fjournal = "Association for Computing Machinery. Transactions on
Database Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J777",
keywords = "codes, symbolic; data base systems; data security;
databases; decryption; encryption; subkeys",
subject = "Data --- Data Encryption (E.3)",
}
@Article{Denning:1981:MKG,
author = "Dorothy E. Denning and Fred B. Schneider",
title = "Master keys for group sharing",
journal = j-INFO-PROC-LETT,
volume = "12",
number = "1",
pages = "23--25",
day = "13",
month = feb,
year = "1981",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "94B99",
MRnumber = "82d:94046",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See also note \cite{Brouwer:1982:NMK}.",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes)",
corpsource = "Computer Sci. Dept., Purdue Univ., W. Lafayette, IN,
USA",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
keywords = "Diffie and Hellman's public-key distribution scheme;
encoding; group sharing; master key; Shamir's threshold
scheme",
treatment = "T Theoretical or Mathematical",
}
@Article{Denning:1981:MMK,
author = "D. E. Denning and H. Meijer and F. B. Schneider",
title = "More on master keys for group sharing",
journal = j-INFO-PROC-LETT,
volume = "13",
number = "3",
pages = "125--126",
day = "13",
month = dec,
year = "1981",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes); C0230 (Economic, social and
political aspects of computing); C6130 (Data handling
techniques)",
corpsource = "Computer Sci. Dept., Purdue Univ., West Lafayette, IN,
USA",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
keywords = "cryptography; encryption; group sharing; master keys",
treatment = "P Practical",
}
@Article{Denning:1981:SRR,
author = "Peter J. Denning and David H. Brandin",
title = "Special Report: Report of the {Public Cryptography
Study Group}",
journal = j-CACM,
volume = "24",
number = "7",
pages = "434--434",
month = jul,
year = "1981",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Sat Feb 01 07:47:27 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
}
@Article{Gifford:1981:CSI,
author = "David K. Gifford",
title = "Cryptographic sealing for information secrecy and
authentication",
journal = j-OPER-SYS-REV,
volume = "15",
number = "5",
pages = "123--124",
month = dec,
year = "1981",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:53 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Article{Hellman:1981:ACA,
author = "M. E. Hellman",
title = "Another cryptanalytic attack on {``A cryptosystem for
multiple communication''} {[Inform. Process. Lett. {\bf
10}(4--5), 5 July 1980, pp. 180--183]}",
journal = j-INFO-PROC-LETT,
volume = "12",
number = "4",
pages = "182--183",
day = "13",
month = aug,
year = "1981",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See \cite{Luccio:1980:CMC,Meijer:1981:NCM}.",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes)",
corpsource = "Dept. of Electrical Engng., Stanford Univ., Stanford,
CA, USA",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
keywords = "authentification; cryptography; cryptosystem; data
communication systems; multiple communication; plain
text attack; security; text attack",
treatment = "T Theoretical or Mathematical",
}
@Article{Henry:1981:BJB,
author = "P. S. Henry",
title = "{B.S.T.J.} Briefs: Fast Decryption Algorithm for the
Knapsack Cryptographic System",
journal = j-BELL-SYST-TECH-J,
volume = "60",
number = "5",
pages = "767--773",
month = may # "--" # jun,
year = "1981",
CODEN = "BSTJAN",
ISSN = "0005-8580",
bibdate = "Tue Nov 9 11:15:56 MST 2010",
bibsource = "http://bstj.bell-labs.com/oldfiles/year.1981/BSTJ.1981.6005.html;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://bstj.bell-labs.com/BSTJ/images/Vol60/bstj60-5-767.pdf",
acknowledgement = ack-nhfb,
fjournal = "The Bell System Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}
@TechReport{Hershey:1981:DLP,
author = "J. E. (John E.) Hershey",
title = "The discrete logarithm public cryptographic system",
type = "NTIA report",
number = "81-81, PB82-130097",
institution = "U.S. Dept. of Commerce, National Telecommunications
and Information Administration",
address = "Washington, DC, USA (??)",
pages = "iv + 40",
month = sep,
year = "1981",
LCCN = "C 60.10: 81-81 Govt Pub",
bibdate = "Sat Nov 18 12:53:52 MST 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "cryptography; finite fields (algebra)",
}
@TechReport{IDC:1981:DE,
author = "{International Data Corporation}",
title = "Data encryption",
type = "Research memorandum",
number = "IDC \#ISPS-M81-10.",
institution = "International Data Corporation",
address = "Framingham, MA, USA",
pages = "30",
month = oct,
year = "1981",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Ingemarsson:1981:UAS,
author = "Ingemar Ingemarsson and C. K. Wong",
title = "Use Authentication Scheme for Shared Data Based on a
Trap-Door One-Way Function",
journal = j-INFO-PROC-LETT,
volume = "12",
number = "2",
pages = "63--67",
month = apr,
year = "1981",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Jan 29 09:23:05 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "723",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "data base systems",
}
@TechReport{IRD:1981:DTV,
author = "{International Resource Development, Inc.}",
title = "Data, text, and voice encryption equipment",
type = "Report",
number = "183",
institution = "IRD",
address = "30 High St., Norwalk, CT 06851, USA",
pages = "vi + 154",
year = "1981",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography equipment industry; Cryptography
equipment industry --- United States; Market surveys
--- United States.",
}
@TechReport{Juenemann:1981:DES,
author = "Robert R. Juenemann",
title = "The {Data Encryption Standard} vs. Exhaustive Search",
type = "Report",
institution = "Satellite Business Systems",
address = "McLean, VA, USA",
day = "5",
month = feb,
year = "1981",
bibdate = "Fri May 21 14:57:54 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Konheim:1981:CP,
author = "Alan G. Konheim",
title = "Cryptography, a primer",
publisher = pub-WILEY,
address = pub-WILEY:adr,
pages = "xiv + 432",
year = "1981",
ISBN = "0-471-08132-9",
ISBN-13 = "978-0-471-08132-6",
LCCN = "Z103 .K66 1981",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "A Wiley-interscience publication",
acknowledgement = ack-nhfb,
keywords = "computer security; cryptography; telecommunication ---
security measures",
}
@Article{Lamport:1981:TNP,
author = "Leslie Lamport",
title = "Technical Note: Password Authentication with Insecure
Communication",
journal = j-CACM,
volume = "24",
number = "11",
pages = "770--772",
month = nov,
year = "1981",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jan 22 06:57:19 MST 2001",
bibsource = "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Lamport81;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
oldlabel = "Lamport81",
XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Lamport81",
}
@Book{Lange:1981:TC,
author = "Andr{\'e} Lange and E. A. Soudart",
title = "Treatise on cryptography",
volume = "36",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "xvi + 168",
year = "1981",
ISBN = "0-89412-055-7 (paperback)",
ISBN-13 = "978-0-89412-055-8 (paperback)",
LCCN = "Z104.L2613 1981",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Translation of: Traite de cryptographie / par
Andr{\'e} Lange et E.-A. Soudart. ``Plus many problems
in French for the solver''",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
keywords = "cryptography",
}
@Book{Langie:1981:CSS,
author = "Andre Langie",
title = "Cryptography: a study on secret writings",
volume = "38",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "vii + 192",
year = "1981",
ISBN = "0-89412-061-1",
ISBN-13 = "978-0-89412-061-9",
LCCN = "Z104 .L28 1981",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Translation of: De la cryptographie. Reprint of an
unspecified previous ed. Bibliography: p. 158.",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
keywords = "cryptography",
}
@Book{Lauer:1981:CSC,
author = "Rudolph F. Lauer",
title = "Computer simulation of classical substitution
cryptographic systems",
volume = "32",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "xi + 111",
year = "1981",
ISBN = "0-89412-050-6",
ISBN-13 = "978-0-89412-050-3",
LCCN = "Z104 .L38 1981",
bibdate = "Sat Nov 18 12:53:52 MST 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
keywords = "basic (computer program language); cryptography;
cryptography -- computer programs; electronic data
processing -- cryptography",
}
@Article{Lieberherr:1981:UCD,
author = "K. Lieberherr",
title = "Uniform complexity and digital signatures",
journal = j-THEOR-COMP-SCI,
volume = "16",
number = "1",
pages = "99--110",
month = oct,
year = "1981",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
bibdate = "Sat Nov 22 13:36:07 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/tcs1980.bib",
acknowledgement = ack-nhfb,
classification = "C4240 (Programming and algorithm theory)",
corpsource = "Dept. of Electrical Engng. and Computer Sci.,
Princeton Univ., Princeton, NJ, USA",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975",
keywords = "computational complexity; digital signatures; security
of data; signature checking; signature production;
uniform complexity",
pubcountry = "Netherlands",
treatment = "T Theoretical or Mathematical",
}
@Article{McEliece:1981:SSR,
author = "R. J. McEliece and D. V. Sarwate",
title = "On sharing secrets and {Reed--Solomon} codes",
journal = j-CACM,
volume = "24",
number = "9",
pages = "583--584",
month = sep,
year = "1981",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
MRclass = "94B35",
MRnumber = "82h:94024",
bibdate = "Tue Dec 26 13:35:07 1995",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
}
@TechReport{Meijer:1981:DSS,
author = "Henk Meijer and Selim G. Akl",
title = "Digital signature schemes",
type = "Technical report",
number = "81-120",
institution = "Department of Computing and Information Science,
Queen's University",
address = "Kingston, ON, Canada",
pages = "10",
year = "1981",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Meijer:1981:NCM,
author = "H. Meijer",
title = "A note on {``A cryptosystem for multiple
communication''} {[Inform. Process. Lett. {\bf
10}(4--5), 5 July 1980, pp. 180--183]}",
journal = j-INFO-PROC-LETT,
volume = "12",
number = "4",
pages = "179--181",
day = "13",
month = aug,
year = "1981",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See \cite{Luccio:1980:CMC,Hellman:1981:ACA}.",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes)",
corpsource = "Dept. of Math. and Statistics, Queen's Univ.,
Kingston, Ont., Canada",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
keywords = "cryptography; cryptosystem; cyphertext; data
communication systems; multiple communication; node;
plain-text attack; secret messages; security",
treatment = "T Theoretical or Mathematical",
}
@Article{Merkle:1981:SME,
author = "Ralph C. Merkle and Martin E. Hellman",
title = "On the Security of Multiple Encryption",
journal = j-CACM,
volume = "24",
number = "7",
pages = "465--467",
month = jul,
year = "1981",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
MRclass = "68K05 (94A24 94B99)",
MRnumber = "82f:68103",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
acknowledgement = ack-nhfb,
fjournal = "Communications of the Association for Computing
Machinery",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
referencedin = "Referenced in \cite[Ref. 20]{Biham:1998:TA}.",
}
@MastersThesis{Mulherin:1981:FDE,
author = "Michael Hugh Mulherin",
title = "A file data encryption system using {Galois} fields",
volume = "52731",
type = "Thesis ({M.Sc.Cs.})",
publisher = "National Library of Canada",
school = "University of New Brunswick",
address = "Ottawa, ON, Canada",
pages = "174",
year = "1981",
ISBN = "0-315-04837-9",
ISBN-13 = "978-0-315-04837-9",
ISSN = "0227-3845",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "2 microfiche(s) (174 fr.)",
series = "Canadian theses on microfiche = Th{\`e}ses canadiennes
sur microfiche",
acknowledgement = ack-nhfb,
}
@Article{Muller:1981:SRP,
author = "Winfried B. M{\"u}ller and Wilfried N{\"o}bauer",
title = "Some remarks on public-key cryptosystems",
journal = "Studia Sci. Math. Hungar.",
volume = "16",
number = "1-2",
pages = "71--76",
year = "1981",
CODEN = "SSMHAX",
ISSN = "0081-6906",
MRclass = "94A60 (11T71)",
MRnumber = "85e:94018",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Studia Scientiarum Mathematicarum Hungarica. A
Quarterly of the Hungarian Academy of Sciences",
}
@Book{OConnell:1981:CDE,
author = "Richard O'Connell",
title = "Crypto-ease: a data encryption dictionary",
publisher = "Atlantis Editions",
address = "Philadelphia, PA, USA",
pages = "33",
year = "1981",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Computers --- Access control --- Dictionaries;
Dictionaries; Electronic data processing departments
--- Security measures",
}
@TechReport{Rabin:1981:HES,
author = "Michael O. Rabin",
title = "How to exchange secrets by oblivious transfer",
type = "Technical Report",
number = "TR-81",
institution = "Aiken Computation Laboratory, Harvard University",
address = "Cambridge, MA, USA",
year = "1981",
bibdate = "Sun Mar 11 11:14:25 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://eprint.iacr.org/2005/187.pdf",
acknowledgement = ack-nhfb,
}
@Article{Rejewski:1981:HPM,
author = "Marian Rejewski",
title = "How {Polish} Mathematicians Deciphered the {Enigma}",
journal = j-ANN-HIST-COMPUT,
volume = "3",
number = "3",
pages = "213--234",
month = jul # "\slash " # sep,
year = "1981",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:18 MST 2002",
bibsource = "http://www.computer.org/annals/an1981/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Afterwords by Cipher A. Deavours and I. J. Good. This
article was entitled ``Jak matematycy polscy
rozszyfrowz Enigmg{\c{e}}'' in the Annals of the Polish
Mathematical Society, Series II, Wiadomo{\'s}ci
Matematyczne, Volume 23, 1980, 1-28, translated by Joan
Stepenske. See minor correction
\cite{Anonymous:1981:CHP}.",
URL = "http://dlib.computer.org/an/books/an1981/pdf/a3213.pdf;
http://www.computer.org/annals/an1981/a3213abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@Article{Salzer:1981:RHH,
author = "Herbert E. Salzer and Eric A. Weiss and Henry S. Tropp
and Jane Smith and Robert W. Rector",
title = "Reviews: {H. H. Goldstine: A History of Numerical
Analysis}; {Electronics: An Age of Innovation}; {J. A.
N. Lee: Banquet Anecdotes and Conference Excerpts}; {R.
L. Wexelblat: History of Programming Languages}:
Capsule Reviews",
journal = j-ANN-HIST-COMPUT,
volume = "3",
number = "3",
pages = "289--302",
month = jul # "\slash " # sep,
year = "1981",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:18 MST 2002",
bibsource = "http://www.computer.org/annals/an1981/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See minor correction \cite{Anonymous:1981:CHP}.",
URL = "http://dlib.computer.org/an/books/an1981/pdf/a3289.pdf;
http://www.computer.org/annals/an1981/a3289abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@MastersThesis{Seshadri:1981:KPP,
author = "Raghavan Seshadri",
title = "Knapsack problems in public key encryption systems",
type = "Thesis ({M.S.})",
school = "University of Oklahoma",
address = "Norman, OK, USA",
pages = "vii + 99",
year = "1981",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@InProceedings{Sidhu:1981:APG,
author = "Deepinder P. Sidhu",
title = "Authentication Protocols for General Communication
Channels",
crossref = "IEEE:1981:CLC",
pages = "30--40",
year = "1981",
bibdate = "Sat Sep 25 20:21:07 MDT 1999",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Brookhaven Natl Lab, Upton, NY,USA",
classification = "723; 731",
conference = "6th Conference on Local Computer Networks",
conflocation = "Minneapolis, MN, USA",
journalabr = "Conf Local Comput Networks",
keywords = "authentication protocols; communication channels;
completeness; computer networks; deadlock freeness;
encryption; fifo channels; liveness; non-fifo channels;
public-key encryption",
meetingaddress = "Minneapolis, MN, USA",
sponsor = "Univ of Minn, Comput Cent, Minneapolis, USA; IEEE,
Twin Cities Chapter, USA; IEEE Comput Soc Tech Comm on
Comput Commun, Los Alamitos, Calif, USA",
}
@Book{USNBS:1981:GIU,
author = "{United States. National Bureau of Standards}",
title = "Guidelines for implementing and using the {NBS Data
Encryption Standard}: category: {ADP} operations,
subcategory: computer security",
publisher = pub-NBS,
address = pub-NBS:adr,
pages = "39",
day = "1",
month = apr,
year = "1981",
CODEN = "FIPPAT",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "FIPS Pub; 74",
acknowledgement = ack-nhfb,
keywords = "Computer networks --- Security measures --- Standards;
Computers --- Access control --- Standards; Electronic
data processing departments --- Security measures;
Standards",
}
@Article{Wegman:1981:NHF,
author = "Mark N. Wegman and J. Lawrence Carter",
title = "New Hash Functions and Their Use in Authentication and
Set Equality",
journal = j-J-COMP-SYS-SCI,
volume = "22",
number = "3",
pages = "265--279",
month = jun,
year = "1981",
CODEN = "JCSSBM",
ISSN = "0022-0000",
ISSN-L = "0022-0000",
bibdate = "Sat Jan 25 17:38:12 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
abstract = "In this paper we exhibit several new classes of hash
functions with certain desirable properties, and
introduce two novel applications for hashing which make
use of these functions. One class contains a small
number of functions, yet is almost universal2. If the
functions hash n-bit long names into m-bit indices,
then specifying a member of the class requires only
O((m + log2 log2(n)) g log2(n)) bits as compared to
O(n) bits for earlier techniques. For long names, this
is about a factor of m larger than the lower bound of $
m + \log_2 n \log_2 m $ bits. An application of this
class is a provably secure authentication technique for
sending messages over insecure lines. A second class of
functions satisfies a much stronger property than
universal2. We present the application of testing sets
for equality. The authentication technique allows the
receiver to be certain that a message is genuine. An
``enemy'' even one with infinite computer resources
cannot forge or modify a message without detection. The
set equality technique allows operations including
``add member to set,'' ``delete member from set,'' and
``test two sets for equality'' to be performed in
expected constant time and with less than a specified
probability of error.",
acknowledgement = ack-nhfb,
classification = "723",
fjournal = "Journal of Computer and System Sciences",
journal-URL = "http://www.sciencedirect.com/science/journal/00220000",
journalabr = "J Comput Syst Sci",
keywords = "computer metatheory; cryptography; hash functions",
}
@Book{Anonymous:1982:CC,
author = "Anonymous",
title = "A course in cryptanalysis",
volume = "33, 34",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
year = "1982",
ISBN = "0-89412-052-2 (vol. 1), 0-89412-053-0 (vol. 2)",
ISBN-13 = "978-0-89412-052-7 (vol. 1), 978-0-89412-053-4 (vol.
2)",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Cryptographic series",
acknowledgement = ack-nhfb,
annote = "Originally published in 1942. Revised and enlarged. v.
1. Explanatory text and short exercises; v. 2. Figures
and cipher texts.",
keywords = "Cryptography.",
}
@Misc{Anonymous:1982:ESS,
author = "Anonymous",
title = "Encryption scrambling the satellite signal for
security",
publisher = "Instant Replay",
address = "Arlington, VA, USA",
year = "1982",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "1 sound cassette (75 min.)",
acknowledgement = ack-nhfb,
annote = "At head of title: ``Space communications in the
80's.'' Presented at the Seventh Annual Conference of
the Public Service Satellite Consortium, October 19-22,
1982, Washington, DC",
keywords = "Telecommunication.",
}
@Article{Anonymous:1982:NNPa,
author = "Anonymous",
title = "News and Notices: {Pioneer Award Established by
Computer Society}; {Undergraduate Paper Competition in
Cryptology}",
journal = j-ANN-HIST-COMPUT,
volume = "4",
number = "2",
pages = "184--184",
month = apr # "\slash " # jun,
year = "1982",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:19 MST 2002",
bibsource = "http://www.computer.org/annals/an1982/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1982/pdf/a2184.pdf;
http://www.computer.org/annals/an1982/a2184abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@Book{Bamford:1982:PPR,
author = "James Bamford",
title = "The puzzle palace: a report on {America}'s most secret
agency",
publisher = pub-HOUGHTON-MIFFLIN,
address = pub-HOUGHTON-MIFFLIN:adr,
pages = "465",
year = "1982",
ISBN = "0-395-31286-8",
ISBN-13 = "978-0-395-31286-5",
LCCN = "KF7683.N32 B3",
bibdate = "Thu Jan 21 14:10:29 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "United States National Security Agency",
}
@MastersThesis{Becker:1982:EDE,
author = "Michael S. Becker",
title = "An exercise with the {Data Encryption Standard}",
type = "Master of Science, Plan II",
school = "Department of Electrical Engineering and Computer
Sciences, University of California, Berkeley",
address = "Berkeley, CA, USA",
pages = "56",
year = "1982",
LCCN = "TK7 .U5 1982:2:B-C",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Beker:1982:CSP,
author = "Henry Beker and F. C. (Frederick Charles) Piper",
title = "Cipher systems: the protection of communications",
publisher = pub-WILEY,
address = pub-WILEY:adr,
pages = "427",
year = "1982",
ISBN = "0-471-89192-4",
ISBN-13 = "978-0-471-89192-5",
LCCN = "Z104 .B39 1982",
bibdate = "Sun Nov 20 19:54:09 MST 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
remark = "According to the introduction to Fred Piper's 2005
Turing Lecture (Computer Journal 48(2), 145--156, March
2005, this is one of the first books published on the
protection of communications.",
subject = "Ciphers; Cryptography",
}
@InProceedings{Blum:1982:CFT,
author = "Manuel Blum",
title = "Coin Flipping by Telephone --- a Protocol for Solving
Impossible Problems",
crossref = "Rudolph:1982:HTI",
pages = "133--137",
year = "1982",
bibdate = "Sun Mar 11 10:10:54 2012",
bibsource = "DBLP;
http://dblp.uni-trier.de/db/conf/compcon/compcon1982.html#Blum82;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
remark = "See published article \cite{Blum:1983:CFT}.",
}
@InProceedings{Blum:1982:HGC,
author = "Manuel Blum and Silvio Micali",
title = "How to Generate Cryptographically Strong Sequences of
Pseudo-Random Bits",
crossref = "IEEE:1982:ASF",
pages = "112--117",
year = "1982",
DOI = "http://dx.doi.org/10.1109/SFCS.1982.72",
bibdate = "Wed Dec 21 06:47:00 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/focs1980.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
xxpages = "464--479",
}
@Book{Bosworth:1982:CCC,
author = "Bruce Bosworth",
title = "Codes, ciphers, and computers: an introduction to
information security",
publisher = pub-HAYDEN-BOOK,
address = pub-HAYDEN-BOOK:adr,
pages = "259",
year = "1982",
ISBN = "0-8104-5149-2",
ISBN-13 = "978-0-8104-5149-0",
LCCN = "Z103.B58 1982",
bibdate = "Sat Apr 20 11:51:26 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Brouwer:1982:NMK,
author = "Andries E. Brouwer and Peter {van Emde Boas}",
title = "A note on: {``Master keys for group sharing'' [Inform.
Process. Lett. {\bf 12} (1981), no. 1, 23--25; MR
82d:94046] by D. E. Denning and F. B. Schneider}",
journal = j-INFO-PROC-LETT,
volume = "14",
number = "1",
pages = "12--14",
day = "27",
month = mar,
year = "1982",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "94B99",
MRnumber = "83h:94019",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See \cite{Denning:1981:MKG}.",
acknowledgement = ack-nhfb,
classification = "C6130 (Data handling techniques)",
corpsource = "Dept. of Pure Math., Math. Centre, Amsterdam,
Netherlands",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
keywords = "cryptography; group keys; group sharing; master keys",
treatment = "P Practical",
}
@InProceedings{DeMillo:1982:CP,
author = "Richard A. DeMillo and Nancy A. Lynch and Michael J.
Merritt",
title = "Cryptographic protocols",
crossref = "ACM:1982:PFA",
pages = "383--400",
year = "1982",
bibdate = "Wed Feb 20 18:33:45 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Denning:1982:CDS,
author = "Dorothy Elizabeth Robling Denning",
title = "Cryptography and data security",
publisher = pub-AW,
address = pub-AW:adr,
pages = "xiii + 400",
year = "1982",
ISBN = "0-201-10150-5",
ISBN-13 = "978-0-201-10150-8",
LCCN = "QA76.9.A25 .D46 1982",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "US\$22.95",
acknowledgement = ack-nhfb,
keywords = "computers --- access control; cryptography; data
protection",
}
@Article{Diffie:1982:CTF,
author = "Whitfield Diffie",
title = "Cryptographic technology: fifteen year forecast",
journal = j-SIGACT,
volume = "14",
number = "4",
pages = "38--57",
month = "Fall--Winter",
year = "1982",
CODEN = "SIGNDM",
DOI = "http://dx.doi.org/10.1145/1008902.1008903",
ISSN = "0163-5700 (print), 1943-5827 (electronic)",
ISSN-L = "0163-5700",
bibdate = "Wed Mar 21 08:21:21 MDT 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sigact.bib",
abstract = "This paper examines the forces driving public
development of cryptography today and projects the
course of the field over the next fifteen years with
attention to the possible influence of government
regulation. This paper was prepared, under contractual
arrangements to CRC Systems, in support of the Commerce
Department (National Telecommunications and Information
Administration, Special Projects Office) response to a
White House Office of Science and Technology Policy
request that the secretaries of the Departments of
Commerce and Defense propose a national policy on
cryptography.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGACT News",
journal-URL = "http://dl.acm.org/citation.cfm?id=J697",
}
@InCollection{Diffie:1982:CVP,
author = "Whitfield Diffie",
booktitle = "Secure communications and asymmetric cryptosystems",
title = "Conventional versus public key cryptosystems",
volume = "69",
publisher = "Westview",
address = "Boulder, CO",
pages = "41--72",
year = "1982",
MRclass = "94A05",
MRnumber = "668 720",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "AAAS Sel. Sympos. Ser.",
}
@Article{Ecker:1982:MGE,
author = "A. Ecker",
title = "{{\"U}ber die mathematischen Grundlagen einiger
Chiffrierverfahren}. ({German}) [{On} the mathematical
foundations of some cryptosystems]",
journal = j-COMPUTING,
volume = "29",
number = "4",
pages = "277--287",
year = "1982",
CODEN = "CMPTA2",
ISSN = "0010-485X (print), 1436-5057 (electronic)",
ISSN-L = "0010-485X",
MRclass = "94B99 (10A10 20A05)",
MRnumber = "84d:94023",
MRreviewer = "J. H. van Lint",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Computing. Archiv f{\"u}r Informatik und Numerik",
journal-URL = "http://link.springer.com/journal/607",
language = "German",
}
@Article{Feynman:1982:SPC,
author = "Richard P. Feynman",
title = "Simulating physics with computers",
journal = j-INT-J-THEOR-PHYS,
volume = "21",
number = "6--7",
pages = "467--488",
year = "1982",
CODEN = "IJTPBM",
DOI = "http://dx.doi.org/10.1007/BF02650179",
ISSN = "0020-7748",
ISSN-L = "0020-7748",
MRclass = "68J99",
MRnumber = "658311",
bibdate = "Sat Apr 9 15:46:55 2011",
bibsource = "ftp://ftp.math.utah.edu/pub/bibnet/authors/f/feynman-richard-p.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Physics of computation, Part II (Dedham, Mass.,
1981)",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Theoretical Physics",
journal-URL = "http://link.springer.com/journal/10773",
remark = "This paper contains an early proposal for quantum
cryptography.",
xxvolume = "B2",
}
@Book{Foster:1982:CM,
author = "Caxton C. Foster",
title = "Cryptanalysis for microcomputers",
publisher = pub-HAYDEN-BOOK,
address = pub-HAYDEN-BOOK:adr,
pages = "333",
year = "1982",
ISBN = "0-8104-5174-3 (paperback)",
ISBN-13 = "978-0-8104-5174-2 (paperback)",
LCCN = "Z103.F67 1982",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "US\$14.95",
acknowledgement = ack-nhfb,
keywords = "Ciphers --- Data processing; Cryptography --- Data
processing; Microcomputers.",
}
@Article{Gabriel:1982:VPI,
author = "Richard Gabriel",
title = "{Verschl{\"u}sselungsabbildungen mit Pseudo-Inversen,
Zufallsgeneratoren und T{\"a}felungen}. ({German})
[{Encryption} mapping with pseudoinverses, random
generators and tilings]",
journal = "Kybernetika (Prague)",
volume = "18",
number = "6",
pages = "485--504",
year = "1982",
CODEN = "KYBNAI",
ISSN = "0023-5954",
MRclass = "94A60 (68P25)",
MRnumber = "85a:94023",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "Kybernetika",
language = "German",
}
@Manual{Gersho:1982:ACR,
author = "Allen Gersho",
title = "Advances in cryptography: a report on {CRYPTO} 81",
number = "82-04",
publisher = "Department of Electrical and Computer Engineering,
University of California, Santa Barbara",
address = "Santa Barbara, CA, USA",
pages = "viii + 156",
year = "1982",
LCCN = "QA76.9.A25 I14 1981",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "``Sponsored by the Data and Computer Communications
Committees of the IEEE Communications Society with the
cooperation of the Dept. of Electrical and Computer
Engineering, University of California, Santa Barbara.''
--- Verso of t.p. ``August 20, 1982.'' Includes
bibliographies.",
series = "ECE report",
acknowledgement = ack-nhfb,
keywords = "computers --- access control --- congresses;
cryptography --- congresses",
}
@Article{Gifford:1982:CSI,
author = "D. K. Gifford and A. K. Jones",
title = "Cryptographic Sealing for Information Security and
Authentication",
journal = j-CACM,
volume = "25",
number = "4",
pages = "274--286",
month = apr,
year = "1982",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "A new protection mechanism is described that provides
general primitives for protection and authentication.
The mechanism is based on the idea of sealing an object
with a key. Sealed objects are self-authenticating, and
in the absence of an appropriate set of keys, only
provide information about the size of their contents.
New keys can be freely created at any time, and keys
can also be derived from existing keys with operators
that include Key-And and Key-Or. This flexibility
allows the protection mechanism to implement common
protection mechanisms such as capabilities, access
control lists, and information flow control. The
mechanism is enforced with a synthesis of conventional
cryptography, public-key cryptography, and a threshold
scheme.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "CACM protection operating cryptography",
}
@InProceedings{Gilmour-Bryson:1982:CDT,
author = "A. Gilmour-Bryson",
title = "Coding of the depositions of the {Templars}",
crossref = "Ciampi:1982:EVS",
pages = "451--467",
year = "1982",
bibdate = "Sat Feb 17 14:59:04 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "From {\em Computing Reviews\/}: ``The article reports
on the progress of an historical study using a computer
for statistical analysis. The subject of the study is a
mass of trial depositions of the Knights Templar. The
purpose of the project is to find statistical
regularities in the large amount of testimony and to
create a model for similar studies.
The Order of the Knights Templar, founded around 1100,
was the first Christian military order. After the
Crusades, in the early fourteenth century, 127 articles
of accusation were brought against the order, including
charges of idolatry, sacrilege, and sodomy. The data
being studied are the responses of 900 men to each of
127 accusations. The article details the accusations
and the way in which the responses are being coded. The
statistical package SAS (Statistical Analysis System)
will be used. Examples of the results to be sought are:
tallies of guilty/innocent responses, tallies of
offenses committed versus seen versus heard about, and
correlations between, for example, age and other
responses. Depositions that differ markedly from the
average response will be identified.''",
acknowledgement = ack-nhfb,
keywords = "human factors; legal aspects",
review = "ACM CR 40531",
subject = "E.4 Data, CODING AND INFORMATION THEORY, Nonsecret
encoding schemes \\ G.3 Mathematics of Computing,
PROBABILITY AND STATISTICS, Statistical computing \\
J.1 Computer Applications, ADMINISTRATIVE DATA
PROCESSING, Law J Computer Applications, SOCIAL AND
BEHAVIORAL SCIENCES",
}
@InProceedings{Goldwasser:1982:PEH,
author = "Shafi Goldwasser and Silvio Micali",
title = "Probabilistic encryption \& how to play mental poker
keeping secret all partial information",
crossref = "ACM:1982:PFA",
pages = "365--377",
year = "1982",
bibdate = "Wed Feb 20 18:33:45 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Golomb:1982:SRS,
author = "S. Golomb",
title = "Shift Register Sequences",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
edition = "Revised",
pages = "xvi + 247",
year = "1982",
ISBN = "0-89412-048-4",
ISBN-13 = "978-0-89412-048-0",
LCCN = "QA267.5.S4 G6 1982",
bibdate = "Mon Nov 30 08:47:35 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Portions co-authored with Lloyd R. Welch, Richard M.
Goldstein, and Alfred W. Hales.",
acknowledgement = ack-nhfb,
}
@Article{Grover:1982:CP,
author = "Derrick Grover",
title = "Cryptography: a Primer",
journal = j-COMP-J,
volume = "25",
number = "3",
pages = "400c-400",
month = aug,
year = "1982",
CODEN = "CMPJA6",
DOI = "http://dx.doi.org/10.1093/comjnl/25.3.400-c",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Dec 4 14:48:13 MST 2012",
bibsource = "http://comjnl.oxfordjournals.org/content/25/3.toc;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://comjnl.oxfordjournals.org/content/25/3/400-c.full.pdf+html",
acknowledgement = ack-nhfb,
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
}
@Article{Holland:1982:GSA,
author = "Edward R. Holland and James L. Robertson",
title = "{GUEST} --- a Signature Analysis Based Test System for
{ECL} Logic",
journal = j-HEWLETT-PACKARD-J,
volume = "33",
number = "3",
pages = "26--29",
month = mar,
year = "1982",
CODEN = "HPJOAX",
ISSN = "0018-1153",
bibdate = "Tue Mar 25 14:12:15 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hpj.bib",
abstract = "A special printed circuit board tester is developed,
the Gemini Universal ECL Signature Test (GUEST) system,
that can apply a signature analysis based tests to the
emitter coupled logic (ECL). The tester functions at
real-time clock rates up to 25 MHz and generates test
vectors algorithmically in real time by hardware for a
given unit-under-test (UUT). The hardware test vector
generation is illustrated and described, including
go\slash no go testing, fault backtracking, and
feedback loop breaking. A UUT test file is created and
verified for the accuracy of test generation.",
acknowledgement = ack-nhfb,
classcodes = "B1265B (Logic circuits); B7210B (Automatic test and
measurement systems); C5210 (Logic design methods)",
classification = "713; 721",
fjournal = "Hewlett-Packard Journal: technical information from
the laboratories of Hewlett-Packard Company",
journalabr = "Hewlett Packard J",
keywords = "automatic test equipment; ECL logic; Gemini Universal
ECL Signature; GUEST; HP 3000; logic circuits, emitter
coupled; logic testing; printed circuits; Series 64
boards; signature analysis; test system; Test system;
tester; unit-under-test (UUT)",
treatment = "P Practical",
}
@InCollection{Hoogendoorn:1982:SPK,
author = "P. J. Hoogendoorn",
booktitle = "Computational methods in number theory, {Part I}",
title = "On a secure public-key cryptosystem",
volume = "154",
publisher = "Math. Centrum",
address = "Amsterdam",
pages = "159--168",
year = "1982",
MRclass = "68P25 (94A60)",
MRnumber = "85b:68014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Math. Centre Tracts",
}
@Article{Kasami:1982:KMS,
author = "Tadao Kasami and Saburo Yamamura and Kenichi Mori",
title = "A key management scheme for end-to-end encryption and
a formal verification of its security",
journal = "Systems-Comput.-Controls",
volume = "13",
number = "3",
pages = "59--69 (1983)",
year = "1982",
CODEN = "SYCCBB",
ISSN = "0096-8765",
MRclass = "94B99",
MRnumber = "84i:94045",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "Systems-Computers-Controls. The Transactions of the
Institute of Electronics and Communication Engineers of
Japan",
}
@Article{Koyama:1982:CUM,
author = "Kenji Koyama",
title = "A cryptosystem using the master key for multi-address
communication",
journal = "Systems-Comput.-Controls",
volume = "13",
number = "5",
pages = "36--46 (1983)",
year = "1982",
CODEN = "SYCCBB",
ISSN = "0096-8765",
MRclass = "94A60 (68P25)",
MRnumber = "85f:94014",
MRreviewer = "James W. Snively, Jr.",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Systems-Computers-Controls. The Transactions of the
Institute of Electronics and Communication Engineers of
Japan",
}
@Article{Koyama:1982:MKR,
author = "Kenji Koyama",
title = "A master key for the {RSA} public-key cryptosystem",
journal = "Systems-Comput.-Controls",
volume = "13",
number = "1",
pages = "63--70 (1983)",
year = "1982",
CODEN = "SYCCBB",
ISSN = "0096-8765",
MRclass = "68P25 (94A60)",
MRnumber = "85a:68044",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Systems-Computers-Controls. The Transactions of the
Institute of Electronics and Communication Engineers of
Japan",
}
@Article{Lamport:1982:BGP,
author = "Leslie Lamport and Robert Shostak and Marshall Pease",
title = "The {Byzantine} Generals Problem",
journal = j-TOPLAS,
volume = "4",
number = "3",
pages = "382--401",
month = jul,
year = "1982",
CODEN = "ATPSDT",
ISSN = "0164-0925 (print), 1558-4593 (electronic)",
ISSN-L = "0164-0925",
bibdate = "Sat Oct 17 12:24:31 1998",
bibsource = "Compiler/bevan.bib; Compiler/Compiler.Lins.bib;
Compiler/TOPLAS.bib; Database/dbase.bib;
ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/jamstatassoc.bib;
http://www.math.utah.edu/pub/tex/bib/toplas.bib",
note = "They proved that Byzantine agreement cannot be reached
unless fewer than one-third of the processes are
faulty. This result assumes that authentication, i.e.,
the crypting of messages to make them unforgeable, is
not used. With unforgeable messages, they show that the
problem is solvable for any $ n \geq t > 0 $, where $n$
is the total number of processes and $t$ is the number
of faulty processes.",
abstract = "Reliable computer systems must handle malfunctioning
components that give conflicting information to
different parts of the system. This situation can be
expressed abstractly in terms of a group of generals of
the Byzantine army camped with their troops around an
enemy city. Communicating only by messenger, the
generals must agree upon a common battle plan. However,
one or more of them may be traitors who will try and
confuse the others. The problem is to find an algorithm
to ensure that the loyal generals will reach agreement.
It is shown that, using only oral messages, this
problem is solvable if and only if more than two-thirds
of the generals are loyal; so a single traitor can
confound two loyal generals. With unforgeable written
messages, the problem is solvable for any number of
generals and possible traitors. Applications of the
solutions to reliable computer systems are then
discussed.",
acknowledgement = ack-nhfb # " and " # ack-pb,
checked = "19940302",
fjournal = "ACM Transactions on Programming Languages and
Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J783",
keywords = "fault tolerance; interactive consistency; network
communications; network operating systems;
reliability",
source = "Dept. Library",
}
@Book{Lewin:1982:AMC,
author = "Ronald Lewin",
title = "The {American} magic: codes, ciphers, and the defeat
of {Japan}",
publisher = "Farrar Straus Giroux",
address = "New York, NY, USA",
pages = "xv + 332",
year = "1982",
ISBN = "0-374-10417-4",
ISBN-13 = "978-0-374-10417-7",
LCCN = "D810.C88 .L48",
bibdate = "Sat Apr 20 12:07:03 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Matsumoto:1982:DTL,
author = "Tsutomu Matsumoto and Tomoko Okada and Hideki Imai",
title = "Directly transformed link encryption",
journal = "Systems-Comput.-Controls",
volume = "13",
number = "6",
pages = "36--44 (1983)",
year = "1982",
CODEN = "SYCCBB",
ISSN = "0096-8765",
MRclass = "68P25 (94A60)",
MRnumber = "85a:68045",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "Systems-Computers-Controls. The Transactions of the
Institute of Electronics and Communication Engineers of
Japan",
}
@InCollection{Merkle:1982:PPK,
author = "Ralph C. Merkle",
booktitle = "Secure communications and asymmetric cryptosystems",
title = "Protocols for public key cryptosystems",
volume = "69",
publisher = "Westview",
address = "Boulder, CO",
pages = "73--104",
year = "1982",
MRclass = "94A05",
MRnumber = "668 721",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "AAAS Sel. Sympos. Ser.",
}
@Book{Merkle:1982:SAP,
author = "Ralph C. (Ralph Charles) Merkle",
title = "Secrecy, authentication, and public key systems",
volume = "18",
publisher = "UMI Research Press",
address = "Ann Arbor, MI, USA",
pages = "104",
year = "1982",
ISBN = "0-8357-1384-9",
ISBN-13 = "978-0-8357-1384-9",
LCCN = "QA76.9.A25 M47 1982",
bibdate = "Thu Jan 21 14:22:11 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Revision of the author's thesis ({Ph.D.}---Stanford
University, 1979).",
series = "Computer science. Systems programming",
acknowledgement = ack-nhfb,
}
@Book{Meyer:1982:CND,
author = "Carl H. Meyer and Stephen M. Matyas",
title = "Cryptography: a new dimension in computer data
security: a guide for the design and implementation of
secure systems",
publisher = pub-WILEY,
address = pub-WILEY:adr,
pages = "xxi + 755",
year = "1982",
ISBN = "0-471-04892-5",
ISBN-13 = "978-0-471-04892-3",
LCCN = "Z103 .M55",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "US\$39.95",
acknowledgement = ack-nhfb,
keywords = "cryptography --- handbooks, manuals, etc",
}
@InProceedings{Plumstead:1982:ISG,
author = "Joan Boyar Plumstead",
title = "Inferring a sequence generated by a linear
congruence",
crossref = "IEEE:1982:ASF",
pages = "153--159",
year = "1982",
bibdate = "Wed Jun 22 18:26:09 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Suppose it is known that $ \{ X_0, X_1, \ldots {}, X_n
\} $ is produced by a pseudo-random number generator of
the form $ X_{i + 1} = a X_i + b \bmod m $, but $a$,
$b$, and $m$ are unknown. Can one efficiently predict
the remainder of the sequence with knowledge of only a
few elements from that sequence? This question is
answered in the affirmative and an algorithm is
given.",
acknowledgement = ack-nhfb,
keywords = "algorithm design and analysis; computer science;
cryptography; data analysis; error correction;
inference algorithms; power generation; random number
generation; sections; tiles",
}
@InCollection{Randell:1982:CGC,
author = "Brian Randell",
title = "{Colossus}: Godfather of the Computer (1977)",
crossref = "Randell:1982:ODC",
pages = "349--354",
year = "1982",
bibdate = "Sun Nov 03 08:36:11 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Rhodes-Burke:1982:RSA,
author = "Robert Rhodes-Burke",
title = "Retrofitting for Signature Analysis Simplified",
journal = j-HEWLETT-PACKARD-J,
volume = "33",
number = "1",
pages = "9--16",
month = jan,
year = "1982",
CODEN = "HPJOAX",
ISSN = "0018-1153",
bibdate = "Tue Mar 25 14:12:15 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hpj.bib",
abstract = "Four versions of Microprocessor Exerciser are
introduced that make it possible to apply signature
analysis trouble-shooting techniques to
microprocessor-based products not originally designed
for signal analysis methods, by providing preprogrammed
external stimulus routines and monitoring circuits.
Model 5001A for 6800-microprocessor is illustrated and
its operating modes are described.",
acknowledgement = ack-nhfb,
classcodes = "C5130 (Microprocessor chips); C5210 (Logic design
methods)",
classification = "722; 723",
corpsource = "Hewlett--Packard Co., Palo Alto, CA, USA",
fjournal = "Hewlett-Packard Journal: technical information from
the laboratories of Hewlett-Packard Company",
journalabr = "Hewlett Packard J",
keywords = "5001A; computers, microprocessor; external; fault
location; Hewlett--Packard; logic testing;
microprocessor chips; microprocessor exerciser;
microprocessor-based systems; signature analysis;
stimulus routines; troubleshooting; troubleshooting
techniques",
treatment = "P Practical",
}
@InCollection{Rivest:1982:MOD,
author = "Ronald Rivest and Adi Shamir and Leonard M. Adleman",
booktitle = "Secure communications and asymmetric cryptosystems",
title = "A method for obtaining digital signatures and public
key cryptosystems",
volume = "69",
publisher = "Westview",
address = "Boulder, CO",
pages = "217--239",
year = "1982",
MRclass = "94A05",
MRnumber = "668 726",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "AAAS Sel. Sympos. Ser.",
}
@PhdThesis{Schaumuller-Bichl:1982:ADE,
author = "Ingrid Schaumuller-Bichl",
title = "{Zur Analyse des Data Encryption: Standard und
Synthese verwandter Chiffriersysteme}",
volume = "40",
school = "Johannes Kepler-Universit{\"a}t Linz",
address = "Linz, Austria",
pages = "168",
year = "1982",
ISBN = "3-85369-521-3",
ISBN-13 = "978-3-85369-521-0",
LCCN = "QA76.9.A25S33 1982",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Summary in English. Published by VWGO, Wien,
Austria.",
series = "Dissertationen der Johannes Kepler-Universit{\"a}t
Linz",
acknowledgement = ack-nhfb,
keywords = "Computers --- Access control --- Passwords; Data
encryption (Computer science)",
}
@InCollection{Shamir:1982:PTA,
author = "Adi Shamir",
booktitle = "23rd annual symposium on foundations of computer
science (Chicago, Ill., 1982)",
title = "A polynomial time algorithm for breaking the basic
{Merkle--Hellman} cryptosystem",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "145--152",
year = "1982",
MRclass = "68P25",
MRnumber = "780 392",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}
@Book{Shumaker:1982:RCJ,
author = "Wayne Shumaker",
title = "Renaissance curiosa: {John Dee}'s conversations with
angels, {Girolamo Cardano}'s horoscope of {Christ},
{Johannes Trithemius} and cryptography, {George
Dalgarno}'s Universal language",
volume = "8",
publisher = "Center for Medieval and Early Renaissance Studies",
address = "Binghamton, NY, USA",
pages = "207",
year = "1982",
ISBN = "0-86698-014-8",
ISBN-13 = "978-0-86698-014-2",
LCCN = "CB361 .S494 1982",
bibdate = "Mon Jul 19 08:47:18 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Intended audience: Renaissance specialists,
linguistics, students of occultism, and historians of
science.",
series = "Medieval and Renaissance texts and studies",
acknowledgement = ack-nhfb,
annote = "The Trithemius ciphers were finally solved in 1998 by
J. Reeds \cite{Reeds:1998:SCB}.",
keywords = "Cardano, Girolamo, 1501--1576; Dalgarno, George,
1626?--1687 ars signorum; Dee, John, 1527--1608 true
and faithful relation of what passed for many;
renaissance --- sources; Trithemius, Johannes,
1462--1516 steganographia; yeers between Dr. John Dee
\ldots{} and some spirits",
}
@InCollection{Simmons:1982:SAE,
author = "Gustavus J. Simmons",
booktitle = "Secure communications and asymmetric cryptosystems",
title = "Symmetric and asymmetric encryption",
volume = "69",
publisher = pub-WESTVIEW,
address = pub-WESTVIEW:adr,
pages = "241--298",
year = "1982",
MRclass = "94A05",
MRnumber = "668 727",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
series = "AAAS Sel. Sympos. Ser.",
}
@Book{Simmons:1982:SCA,
editor = "Gustavus J. Simmons",
title = "Secure communications and asymmetric cryptosystems",
volume = "69",
publisher = "Westview Press",
address = "Boulder, CO",
pages = "x + 338",
year = "1982",
ISBN = "0-86531-338-5",
ISBN-13 = "978-0-86531-338-5",
MRclass = "94-06",
MRnumber = "85i:94001",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "AAAS Selected Symposia Series",
}
@Manual{USDA:1982:SMM,
author = "{United States. Dept. of the Army}",
title = "Soldier's manual: {MOS 32G}: fixed cryptographic
equipment repairer, skill levels 1 and 2",
number = "FM 11-32G1/2",
organization = "Dept. of the Army, Headquarters",
address = "Washington, DC, USA (??)",
pages = "various",
month = may,
year = "1982",
LCCN = "D 101.20:11-32 G 1/2 Govt Pubs",
bibdate = "Sat Nov 18 12:53:52 MST 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "communications, military -- handbooks, manuals, etc.;
United States. Army -- communications systems --
maintenance and repair -- handbooks, manuals, etc;
United States. Army -- handbooks, manuals, etc",
}
@Manual{USDA:1982:TGM,
author = "{United States. Dept. of the Army}",
title = "Trainer's guide: {MOS 32G}: fixed cryptographic
equipment repairer",
number = "FM 11-32G/TG",
organization = "Dept. of the Army, Headquarters",
address = "Washington, DC, USA (??)",
pages = "35",
day = "14",
month = may,
year = "1982",
LCCN = "D 101.20:11-32 G/TG Govt Pubs",
bibdate = "Sat Nov 18 12:53:52 MST 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "communications, military -- handbooks, manuals, etc;
United States. Army -- communications systems --
maintenance and repair -- handbooks, manuals, etc;
United States. Army -- handbooks, manuals, etc",
}
@Manual{USGSA:1982:TGS,
author = "{United States. General Services Administration}",
title = "Telecommunications: general security requirements for
equipment using the {Data Encryption Standard}",
organization = "General Services Administration",
address = "Washington, DC, USA",
pages = "12",
day = "14",
month = apr,
year = "1982",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Federal Standard 1027.",
acknowledgement = ack-nhfb,
}
@Book{Warren:1982:BTC,
author = "Alexander Z. Warren",
title = "{Basic-plus} through cryptanalysis; an introduction to
structured programming",
publisher = "????",
address = "????",
pages = "100",
year = "1982",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Privately printed",
acknowledgement = ack-nhfb,
keywords = "BASIC-PLUS (Computer program language); Phillips
Academy --- Faculty",
}
@Book{Welchman:1982:HSS,
author = "Gordon Welchman",
title = "The {Hut Six} story: breaking the {Enigma} codes",
publisher = pub-MCGRAW-HILL,
address = pub-MCGRAW-HILL:adr,
pages = "ix + 326",
year = "1982",
ISBN = "0-07-069180-0",
ISBN-13 = "978-0-07-069180-3",
LCCN = "D810.C88 W44",
bibdate = "Mon Nov 4 07:46:57 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Welchman, Gordon; World War, 1939--1945 ---
cryptography; World War, 1939--1945 --- personal
narratives, British; World War, 1939--1945 --- secret
service --- Great Britain",
}
@TechReport{Wells:1982:USE,
author = "David L. Wells",
title = "The use of subkey encryption to counter traffic
analysis in communications networks",
type = "Technical report",
number = "CSE 8201",
institution = "Department of Computer Science and Engineering,
Southern Methodist University",
address = "Dallas, TX, USA",
pages = "24",
month = feb,
year = "1982",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Supported by the National Science Foundation under
grant no. MCS 8107479.",
keywords = "Computer networks.",
}
@Article{Wilkes:1982:MRJ,
author = "Maurice V. Wilkes and I. J. Good",
title = "Meetings in Retrospect: {J. G. Brainerd on the ENIAC};
{A Report on T. H. Flowers's Lecture on Colossus}",
journal = j-ANN-HIST-COMPUT,
volume = "4",
number = "1",
pages = "53--59",
month = jan # "\slash " # mar,
year = "1982",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:19 MST 2002",
bibsource = "http://www.computer.org/annals/an1982/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1982/pdf/a1053.pdf;
http://www.computer.org/annals/an1982/a1053abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@InCollection{Williams:1982:CHP,
author = "Hugh C. Williams",
booktitle = "Secure communications and asymmetric cryptosystems",
title = "Computationally ``hard'' problems as a source for
cryptosystems",
volume = "69",
publisher = "Westview",
address = "Boulder, CO",
pages = "11--39",
year = "1982",
MRclass = "94A05",
MRnumber = "668 719",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "AAAS Sel. Sympos. Ser.",
}
@InProceedings{Yao:1982:PSC,
author = "A. Yao",
title = "Protocols for Secure Computation",
crossref = "IEEE:1982:ASF",
pages = "160--164",
year = "1982",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 27]{Canetti:1997:PSL}.",
}
@InProceedings{Yao:1982:TAT,
author = "A. C. Yao",
title = "Theory and Application of Trapdoor Functions",
crossref = "IEEE:1982:ASF",
pages = "80--91",
year = "1982",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 28]{Goldreich:1997:FMCb}.",
}
@InProceedings{Adleman:1983:BGK,
author = "Leonard M. Adleman",
title = "On breaking generalized knapsack public key
cryptosystems",
crossref = "ACM:1983:PFA",
pages = "402--412",
year = "1983",
bibdate = "Thu Feb 21 06:51:34 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Misc{Adleman:1983:CCS,
author = "L. M. Adleman and R. L. Rivest and A. Shamir",
title = "Cryptographic Communications System and Method",
howpublished = "US Patent No. 4,405,829.",
day = "20",
month = sep,
year = "1983",
bibdate = "Sat Nov 29 13:42:30 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Patent filed 14 September 1977.",
URL = "https://www.google.com/patents/US4405829",
abstract = "A cryptographic communications system and method. The
system includes a communications channel coupled to at
least one terminal having an encoding device and to at
least one terminal having a decoding device. A
message-to-be-transferred is enciphered to ciphertext
at the encoding terminal by first encoding the message
as a number $M$ in a predetermined set, and then
raising that number to a first predetermined power
(associated with the intended receiver) and finally
computing the remainder, or residue, $C$, when the
exponentiated number is divided by the product of two
predetermined prime numbers (associated with the
intended receiver). The residue $C$ is the ciphertext.
The ciphertext is deciphered to the original message at
the decoding terminal in a similar manner by raising
the ciphertext to a second predetermined power
(associated with the intended receiver), and then
computing the residue, $ M'$, when the exponentiated
ciphertext is divided by the product of the two
predetermined prime numbers associated with the
intended receiver. The residue $ M'$ corresponds to the
original encoded message $M$.",
acknowledgement = ack-nhfb,
}
@Article{Akl:1983:CSP,
author = "Selim G. Akl and Peter D. Taylor",
title = "Cryptographic Solution to a Problem of Access Control
in a Hierarchy",
journal = j-TOCS,
volume = "1",
number = "3",
pages = "239--248",
month = aug,
year = "1983",
CODEN = "ACSYEC",
ISSN = "0734-2071 (print), 1557-7333 (electronic)",
ISSN-L = "0734-2071",
bibdate = "Thu Jan 14 11:18:40 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
}
@Article{Akritas:1983:CEA,
author = "A. G. Akritas and S. S. Iyengar and A. A. Rampuria",
title = "Computationally efficient algorithms for a one-time
pad scheme",
journal = j-INT-J-COMPUT-INF-SCI,
volume = "12",
number = "4",
pages = "285--316",
month = aug,
year = "1983",
CODEN = "IJCIAH",
ISSN = "0091-7036",
MRclass = "68P25 (94A99)",
MRnumber = "741 781",
bibdate = "Sat Apr 26 14:03:16 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
acknowledgement = ack-nhfb,
classification = "C6130 (Data handling techniques)",
corpsource = "Dept. of Computer Sci., Univ. of Kansas, Lawrence, KS,
USA",
fjournal = "International Journal of Computer and Information
Sciences",
keywords = "chi-square method; ciphers security; cryptography;
data processing; one-time pad scheme",
treatment = "T Theoretical or Mathematical",
}
@Article{Alpern:1983:KEU,
author = "B. Alpern and F. B. Schneider",
title = "Key exchange using keyless cryptography",
journal = j-INFO-PROC-LETT,
volume = "16",
number = "2",
pages = "79--81",
day = "26",
month = feb,
year = "1983",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes); B6210L (Computer communications);
C5620 (Computer networks and techniques); C6130 (Data
handling techniques)",
corpsource = "Dept. of Computer Sci., Cornell Univ., Ithaca, NY,
USA",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
keywords = "computer network; computer networks; cryptography;
keyless cryptography; protocols; secret keys",
treatment = "P Practical; T Theoretical or Mathematical",
}
@Book{ANSI:1983:ANS,
author = "{American National Standards Institute}",
title = "{American National Standard} for information systems:
data encryption algorithm: modes of operation",
publisher = pub-ANSI,
address = pub-ANSI:adr,
pages = "??",
year = "1983",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Bauer:1983:KDP,
author = "R. K. Bauer and T. A. Berson and R. J. Feiertag",
title = "A Key Distribution Protocol Using Event Markers",
journal = j-TOCS,
volume = "1",
number = "3",
pages = "249--255",
month = aug,
year = "1983",
CODEN = "ACSYEC",
ISSN = "0734-2071 (print), 1557-7333 (electronic)",
ISSN-L = "0734-2071",
bibdate = "Thu Jan 14 11:57:59 1999",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
}
@InProceedings{Ben-Or:1983:CSS,
author = "Michael Ben-Or and Benny Chor and Adi Shamir",
title = "On the cryptographic security of single {RSA} bits",
crossref = "ACM:1983:PFA",
pages = "421--430",
year = "1983",
bibdate = "Thu Feb 21 06:51:34 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Bertrand:1983:EGE,
author = "Gustave Bertrand",
title = "{Enigma}, or, The greatest enigma of the 1939--1945
war",
publisher = "????",
address = "????",
pages = "vi + 415",
year = "1983",
LCCN = "????",
bibdate = "Sun Dec 01 09:15:14 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "English translation by Russell Babcock Holmes of
\cite{Bertrand:1973:EOP}.",
acknowledgement = ack-nhfb,
}
@Book{Blahut:1983:TPE,
author = "Richard E. Blahut",
title = "Theory and Practice of Error Control Coding",
publisher = pub-AW,
address = pub-AW:adr,
pages = "xi + 500",
year = "1983",
ISBN = "0-201-10102-5",
ISBN-13 = "978-0-201-10102-7",
LCCN = "QA268 .B54 1983",
bibdate = "Mon Nov 30 08:52:10 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Blum:1983:CFT,
author = "Manuel Blum",
title = "Coin Flipping by Telephone --- a Protocol for Solving
Impossible Problems",
journal = j-SIGACT,
volume = "15",
number = "1",
pages = "23--27",
month = jan,
year = "1983",
CODEN = "SIGNDM",
DOI = "http://dx.doi.org/10.1145/1008908.1008911",
ISSN = "0163-5700 (print), 1943-5827 (electronic)",
ISSN-L = "0163-5700",
bibdate = "Sun Mar 11 11:37:49 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sigact.bib",
abstract = "Alice and Bob want to flip a coin by telephone. (They
have just divorced, live in different cities, want to
decide who gets the car.) Bob would not like to tell
Alice HEADS and hear Alice (at the other end of the
line) say ``Here goes \ldots{} I'm flipping the
coin\ldots{}. You lost!'' Coin-flipping in the SPECIAL
way done here has a serious purpose. Indeed, it should
prove an INDISPENSABLE TOOL of the protocol designer.
Whenever a protocol requires one of two adversaries,
say Alice, to pick a sequence of bits at random, and
whenever it serves Alice's interests best NOT to pick
her sequence of bits at random, then coin-flipping (Bob
flipping coins to Alice) as defined here achieves the
desired goal: (1) It GUARANTEES to Bob that Alice will
pick her sequence of bits at random. Her bit is 1 if
Bob flips heads to her, 0 otherwise. (2) It GUARANTEES
to Alice that Bob will not know WHAT sequence of bits
he flipped to her. Coin-flipping has already proved
useful in solving a number of problems once thought
impossible: mental poker, certified mail, and exchange
of secrets. It will certainly prove a useful tool in
solving other problems as well.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGACT News",
journal-URL = "http://dl.acm.org/citation.cfm?id=J697",
}
@Article{Blum:1983:HES,
author = "Manuel Blum",
title = "How to Exchange (Secret) Keys",
journal = j-TOCS,
volume = "1",
number = "2",
pages = "175--193",
month = may,
year = "1983",
CODEN = "ACSYEC",
ISSN = "0734-2071 (print), 1557-7333 (electronic)",
ISSN-L = "0734-2071",
bibdate = "Thu Jan 14 11:57:59 1999",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.security.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Previously published in ACM STOC '83 proceedings,
pages 440--447.",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
}
@InProceedings{Brickell:1983:EAA,
author = "E. F. Brickell and J. C. Lagarias and A. M. Odlyzko",
title = "Evaluation of the {Adleman} attack on multiply
iterated knapsack cryptosystems",
crossref = "Chaum:1983:ACP",
pages = "39--42",
year = "1983",
bibdate = "Thu Apr 04 10:06:34 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Brickell:1983:SRK,
author = "Ernest F. Brickell and Gustavus J. Simmons",
title = "A status report on knapsack based public key
cryptosystems",
journal = j-CONG-NUM,
volume = "37",
pages = "3--72",
year = "1983",
ISSN = "0384-9864",
MRclass = "94A60 (11T71)",
MRnumber = "85f:94013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Congressus Numerantium. A Conference Journal on
Numerical Themes",
}
@Article{Bromley:1983:RFM,
author = "Allan G. Bromley and Martin Campbell-Kelly and K. W.
Smillie and Eric A. Weiss and Saul Rosen and Cipher A.
Deavours",
title = "Reviews: {O. I. Franksen: Mr. Babbage, the Difference
Engine, and the Problem of Notation: An Account of the
Origin of Recursiveness and Conditionals in Computer
Programming}; {H. Lukoff: from Dits to Bits}; {I.
Asimov: Asimov's Biographical Encyclopedia of Science
and Technology}; {J. Futrelle: Thinking Machine}; {R.
M. Hord: The Illiac IV}; {C. H. Meyer and S. M. Matyas:
Cryptography}; {T. J. Peters and R. H. Waterman: In
Search of Excellence}; {J. W. Stokes: 70 Years of Radio
Tubes and Valves}; {G. Welchman: The Hut Six Story};
Capsule Reviews",
journal = j-ANN-HIST-COMPUT,
volume = "5",
number = "4",
pages = "411--427",
month = oct # "\slash " # dec,
year = "1983",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Mon Nov 04 09:22:16 2002",
bibsource = "http://www.computer.org/annals/an1983/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1983/pdf/a4411.pdf;
http://www.computer.org/annals/an1983/a4411abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@TechReport{CBEMA:1983:ANSa,
author = "{Computer and Business Equipment Manufacturers
Association} and {American National Standards
Institute}",
title = "{American National Standard for Information Systems}:
Data Link Encryption",
type = "????",
number = "ANSI X3.105-1983",
institution = pub-ANSI,
address = pub-ANSI:adr,
pages = "20",
day = "16",
month = may,
year = "1983",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Computer interfaces --- Standards; Programming
languages (Electronic computers) --- Standards",
}
@TechReport{CBEMA:1983:ANSb,
author = "{Computer and Business Equipment Manufacturers
Association} and {American National Standards
Institute}",
title = "{American National Standard for Information Systems}:
{Data Encryption Algorithm} --- Modes of Operation",
type = "????",
number = "ANSI X3.106-1983",
institution = pub-ANSI,
address = pub-ANSI:adr,
pages = "16",
day = "16",
month = may,
year = "1983",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Computer interfaces --- Standards; Programming
languages (Electronic computers) --- Standards",
}
@Article{Cesarini:1983:ACC,
author = "F. Cesarini and G. Soda",
title = "An algorithm to construct a compact {$B$}-tree in case
of ordered keys",
journal = j-INFO-PROC-LETT,
volume = "17",
number = "1",
pages = "13--16",
day = "19",
month = jul,
year = "1983",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "723; C1160 (Combinatorial mathematics); C1260
(Information theory)",
corpsource = "Istituto di Informatica e Sistemistica, Univ. of
Florence, Florence, Italy",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "compact B-tree; computer programming; construction
algorithm; cryptography; data processing --- Data
Structures; ordered keys; overflow movings; trees
(mathematics)",
treatment = "T Theoretical or Mathematical",
}
@Article{Chandler:1983:IMC,
author = "W. W. Chandler",
title = "The Installation and Maintenance of {Colossus}",
journal = j-ANN-HIST-COMPUT,
volume = "5",
number = "3",
pages = "260--262",
month = jul # "\slash " # sep,
year = "1983",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:20 MST 2002",
bibsource = "http://www.computer.org/annals/an1983/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1983/pdf/a3260.pdf;
http://www.computer.org/annals/an1983/a3260abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@InProceedings{Chaum:1983:BSU,
author = "D. Chaum",
editor = "????",
booktitle = "{Advances in Cryptology, Proceedings of CRYPTO 82}",
title = "Blind signatures for untraceable payments",
publisher = pub-PLENUM,
address = pub-PLENUM:adr,
pages = "199--203",
year = "1983",
bibdate = "Thu Sep 22 18:48:28 2016",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Coombs:1983:MC,
author = "Allen W. M. Coombs",
title = "The Making of {Colossus}",
journal = j-ANN-HIST-COMPUT,
volume = "5",
number = "3",
pages = "253--259",
month = jul # "\slash " # sep,
year = "1983",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:20 MST 2002",
bibsource = "http://www.computer.org/annals/an1983/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1983/pdf/a3253.pdf;
http://www.computer.org/annals/an1983/a3253abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@Book{DeMillo:1983:ACC,
author = "Richard A. DeMillo and others",
title = "Applied cryptology, cryptographic protocols, and
computer security models",
volume = "29",
publisher = pub-AMS,
address = pub-AMS:adr,
pages = "xi + 192",
year = "1983",
ISBN = "0-8218-0041-8",
ISBN-13 = "978-0-8218-0041-6",
ISSN = "0160-7634",
LCCN = "QA1 .A56 v.29 1981",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Expanded version of notes prepared for the AMS short
course entitled Cryptology in revolution, mathematics
and models, held in San Francisco, CA, Jan. 5--6, 1981,
by Richard A. DeMillo and others.",
series = "Proceedings of symposia in applied mathematics. AMS
short course lecture notes",
acknowledgement = ack-nhfb,
keywords = "computers --- access control; cryptography",
}
@Article{DeMillo:1983:PDS,
author = "R. DeMillo and M. Merritt",
title = "Protocols for Data Security",
journal = j-COMPUTER,
volume = "16",
number = "2",
pages = "39--50",
month = feb,
year = "1983",
CODEN = "CPTRB4",
ISSN = "0018-9162 (print), 1558-0814 (electronic)",
ISSN-L = "0018-9162",
bibdate = "Sat Dec 26 17:01:46 1998",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1004.html",
acknowledgement = ack-nhfb,
fjournal = "Computer",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
keywords = "information hiding; steganography",
}
@Article{Dolev:1983:AAB,
author = "D. Dolev and H. R. Strong",
title = "Authenticated Algorithms for {Byzantine} Agreement",
journal = j-SIAM-J-COMPUT,
volume = "12",
number = "4",
pages = "656--666",
month = "????",
year = "1983",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "68M10",
MRnumber = "85a:68004",
bibdate = "Mon Nov 29 10:59:59 MST 2010",
bibsource = "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/12/4;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
}
@Article{Ecker:1983:FSR,
author = "A. Ecker",
booktitle = "Cryptography (Burg Feuerstein, 1982)",
title = "Finite semigroups and the {RSA}-cryptosystem",
journal = j-LECT-NOTES-COMP-SCI,
volume = "149",
pages = "353--369",
year = "1983",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A99 (20M35)",
MRnumber = "84k:94019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Flowers:1983:DC,
author = "Thomas H. Flowers",
title = "The Design of {Colossus}",
journal = j-ANN-HIST-COMPUT,
volume = "5",
number = "3",
pages = "239--253",
month = jul # "\slash " # sep,
year = "1983",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:20 MST 2002",
bibsource = "http://www.computer.org/annals/an1983/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Foreword by Howard Campaigne.",
URL = "http://dlib.computer.org/an/books/an1983/pdf/a3239.pdf;
http://www.computer.org/annals/an1983/a3239abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
xxpages = "239--252",
}
@MastersThesis{Gullichsen:1983:BHS,
author = "Eric Alexander Gullichsen",
title = "Bidirectional heuristic search and spectral {S}-box
simplification for the cryptanalysis of the {NBS Data
Encryption Standard}",
volume = "64919",
type = "Thesis ({M.Sc.})",
publisher = "National Library of Canada",
school = "University of British Columbia",
address = "Ottawa, ON, Canada",
year = "1983",
ISBN = "0-315-17010-7",
ISBN-13 = "978-0-315-17010-0",
ISSN = "0227-3845",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "3 microfiches (265 fr.)",
series = "Canadian theses on microfiche = Th{\`e}ses canadiennes
sur microfiche",
acknowledgement = ack-nhfb,
}
@Book{Hodges:1983:ATE,
author = "Andrew Hodges",
title = "{Alan Turing}: the enigma",
publisher = pub-SIMON-SCHUSTER,
address = pub-SIMON-SCHUSTER:adr,
pages = "587",
year = "1983",
ISBN = "0-671-49207-1, 0-09-152130-0 (Burnett Books)",
ISBN-13 = "978-0-671-49207-6, 978-0-09-152130-1 (Burnett Books)",
LCCN = "QA29.T8 H63 1983",
bibdate = "Thu Jan 21 14:17:53 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Hunter:1983:ERA,
author = "D. G. N. Hunter and A. R. McKenzie",
title = "Experiments with Relaxation Algorithms for Breaking
Simple Substitution Ciphers",
journal = j-COMP-J,
volume = "26",
number = "1",
pages = "68--71",
month = feb,
year = "1983",
CODEN = "CMPJA6",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Mar 25 13:51:56 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classcodes = "C7890 (Other special applications of computing)",
classification = "723",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "algorithms; cipher breaking; computer programming;
cryptography; decoding; relaxation; relaxation theory;
substitution ciphers; word boundaries",
treatment = "P Practical",
}
@Article{Israel:1983:AOS,
author = "J. E. Israel and T. A. Linden",
title = "Authentication in Office System Internetworks",
journal = j-TOOIS,
volume = "1",
number = "3",
pages = "193--210",
month = jul,
year = "1983",
CODEN = "ATOSDO",
ISSN = "0734-2047",
ISSN-L = "0734-2047",
bibdate = "Sat Jan 16 16:21:56 MST 1999",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
http://liinwww.ira.uka.de/bibliography/Database/Graefe.html;
http://www.acm.org/pubs/tois/toc.html;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org:80",
abstract = "In a distributed office system, authentication data
(such as password) must be managed in such a way that
users and machines from different organizations can
easily authenticate themselves to each other. The
authentication facility must be secure, but user
convenience, decentralized administration, and a
capability for smooth, long-term evolution are also
important. In addition, the authentication arrangements
must not permit failures at a single node to cause
systemwide down time. The design used in the Xerox 8000
Series products is described. This design anticipates
applications in an open-network architecture where
there are nodes from diverse sources and one node does
not trust authentication checking done by other nodes.
Furthermore, in some offices encryption will be
required to authenticate data transmissions despite
hostile intruders on the network. Requirements and
design constraints when applying encryption for
authentication in office systems are discussed. It is
suggested that protocol standards for use in office
systems should allow unencrypted authentication as well
as two options for encrypted authentication. Issues
that will arise as an office system evolves to deal
with increasingly sophisticated threats from users of
the system are described.",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Office Information Systems",
keywords = "Authentication; Computer-communication networks; Data
encryption; Data encryption standard (DES);
Decentralized systems; Distributed systems; Ethernet;
General; Heterogeneous systems; Information systems
applications; Internetworks; Network architecture and
design; Network communications; Network protocols;
Office automation; Open architecture; Protocol
architecture; Security; Security and protection;
Standardization",
}
@Book{Kahn:1983:KCS,
author = "David Kahn",
title = "{Kahn} on codes: secrets of the new cryptology",
publisher = pub-MACMILLAN,
address = pub-MACMILLAN:adr,
pages = "viii + 343",
year = "1983",
ISBN = "0-02-560640-9",
ISBN-13 = "978-0-02-560640-1",
LCCN = "Z103 .K29 1983",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography.",
}
@Article{Kak:1983:EMP,
author = "Subhash C. Kak",
title = "Exponentiation modulo a polynomial for data security",
journal = j-INT-J-COMPUT-INF-SCI,
volume = "12",
number = "5",
pages = "337--346",
month = oct,
year = "1983",
CODEN = "IJCIAH",
ISSN = "0091-7036",
MRclass = "68P25 (94A60)",
MRnumber = "85f:68023",
bibdate = "Sat Apr 26 14:03:16 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
acknowledgement = ack-nhfb,
classification = "C6130 (Data handling techniques)",
corpsource = "Dept. of Electrical and Computer Engng., Louisiana
State Univ., Baton Rouge, LA, USA",
fjournal = "International Journal of Computer and Information
Sciences",
keywords = "cryptography; data security; encryption; exponential
modulo; public-key cryptosystem; RSA algorithm;
security of data",
treatment = "P Practical",
}
@Book{Koscielny:1983:PRD,
author = "Czeslaw Koscielny",
title = "Programowa realizacja dzialan w cialach skonczonych do
zastosowan w technice kodowania korekcyjnego i
kryptografii",
volume = "61. 11",
publisher = "Wydawn. Politechniki Wroclawskiej",
address = "Wroclaw, Poland",
pages = "115",
year = "1983",
ISBN = "????",
ISBN-13 = "????",
ISSN = "0324-9786",
LCCN = "QA76.9.A251 K6 1983",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Title on p. [2] of cover: A software approach to
computing in finite fields with applications to
error-correcting coding technique and cryptography.
Summary in English and Russian; legends and table of
contents also in English. Bibliography: p. 109--110.",
price = "zl93.00",
series = "Prace naukowe Instytutu Cybernetyki Technicznej
Politechniki Wroclawskiej; Seria Monografie",
acknowledgement = ack-nhfb,
keywords = "computer security; error-correcting codes (information
theory)",
}
@Article{Koyama:1983:MKR,
author = "Kenji Koyama",
title = "A master key for the {Rabin}'s public-key
cryptosystem",
journal = "Systems-Comput.-Controls",
volume = "14",
number = "6",
pages = "49--57 (1984)",
year = "1983",
CODEN = "SYCCBB",
ISSN = "0096-8765",
MRclass = "94A60 (68P20)",
MRnumber = "86j:94049",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Systems-Computers-Controls. The Transactions of the
Institute of Electronics and Communication Engineers of
Japan",
}
@InCollection{Lakshmivarahan:1983:APK,
author = "S. Lakshmivarahan",
booktitle = "Advances in computers, Vol. 22",
title = "Algorithms for public key cryptosystems: theory and
application",
volume = "22",
publisher = "Academic Press",
address = "New York",
pages = "45--108",
year = "1983",
MRclass = "94A60",
MRnumber = "86f:94027",
MRreviewer = "M. R{\u{a}}duic{\u{a}}",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Adv. in Comput.",
}
@Book{Levine:1983:USC,
author = "Jack Levine",
title = "{United States} cryptographic patents, 1861--1981",
publisher = "Cryptologia",
address = "Terre Haute, IN, USA",
pages = "69",
year = "1983",
ISBN = "0-9610560-0-2",
ISBN-13 = "978-0-9610560-0-1",
LCCN = "T223.Z1 .L48",
bibdate = "Sat Nov 18 12:53:52 MST 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "cryptography; patents",
}
@Article{Lomet:1983:HPU,
author = "David B. Lomet",
title = "A high performance, universal, key associative access
method",
journal = j-SIGMOD,
volume = "13",
number = "4",
pages = "120--133",
month = may,
year = "1983",
CODEN = "SRECD8",
ISSN = "0163-5808 (print), 1943-5835 (electronic)",
ISSN-L = "0163-5808",
bibdate = "Sat Mar 6 07:33:53 MST 2004",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGMOD Record",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J689",
}
@InProceedings{Massey:1983:LFC,
author = "J. L. Massey",
editor = "Edward C. van der Meulen",
booktitle = "{Proceedings of the Fourth Symposium on Information
Theory in the Benelux: held at the Brembergcentrum,
Haasrode, Belgium, May 26--27, 1983}",
title = "Logarithms in finite cycle groups -- cryptographic
issues",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "17--25",
year = "1983",
ISBN = "90-334-0690-X",
ISBN-13 = "978-90-334-0690-4",
LCCN = "Q350 S988 1983",
bibdate = "Sun Mar 11 10:44:22 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@PhdThesis{Meijer:1983:CCC,
author = "Henk Meijer",
title = "Cryptology computational complexity and applications",
volume = "65915",
type = "Thesis ({Ph.D.})",
publisher = "National Library of Canada",
school = "Queen's University",
address = "Ottawa, ON, Canada",
year = "1983",
ISBN = "0-315-18006-4",
ISBN-13 = "978-0-315-18006-2",
ISSN = "0227-3845",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "2 microfiches (179 fr.)",
series = "Canadian theses on microfiche = Th{\`e}ses canadiennes
sur microfiche",
acknowledgement = ack-nhfb,
}
@Article{Moler:1983:SVA,
author = "Cleve Moler and Donald Morrison",
title = "Singular Value Analysis of Cryptograms",
journal = j-AMER-MATH-MONTHLY,
volume = "90",
number = "2",
pages = "78--87",
month = feb,
year = "1983",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
bibdate = "Mon Jun 28 12:37:03 MDT 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@Article{Morrison:1983:SEA,
author = "D. R. Morrison",
title = "Subtractive encryptors: alternatives to the {DES}",
journal = j-SIGACT,
volume = "15",
number = "1",
pages = "67--77",
month = "Winter--Spring",
year = "1983",
CODEN = "SIGNDM",
DOI = "http://dx.doi.org/10.1145/1008908.1008919",
ISSN = "0163-5700 (print), 1943-5827 (electronic)",
ISSN-L = "0163-5700",
bibdate = "Wed Mar 21 08:21:21 MDT 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sigact.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGACT News",
journal-URL = "http://dl.acm.org/citation.cfm?id=J697",
}
@Article{Muller-Schloer:1983:MBC,
author = "C. M{\"u}ller-Schloer",
title = "A microprocessor-based cryptoprocessor",
journal = j-IEEE-MICRO,
volume = "3",
number = "5",
pages = "5--15",
month = oct,
year = "1983",
CODEN = "IEMIDZ",
DOI = "http://dx.doi.org/10.1109/MM.1983.291160",
ISSN = "0272-1732 (print), 1937-4143 (electronic)",
ISSN-L = "0272-1732",
bibdate = "Mon Apr 7 14:32:46 MDT 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
acknowledgement = ack-nhfb,
classcodes = "B6210L (Computer communications); C5250 (Microcomputer
techniques); C5620 (Computer networks and techniques)",
classification = "723",
corpsource = "Siemens AG, Munich, West Germany",
fjournal = "IEEE Micro",
journal-URL = "http://www.computer.org/csdl/mags/mi/index.html",
journalabr = "IEEE Micro",
keywords = "computers; computers, microprocessor --- Applications;
crypto processor; cryptography; cryptoprocessor; data
communication systems; data encryption standard; data
privacy; data processing; electronic envelope;
electronic mail; hardware; host-computer application
programmer; hybrid system; IEEE 796 module;
IEEE-796-bus-compatible 8086 single-board computer;
microcomputers; microprocessor-based; RSA public-key;
satellite computers; security communication system;
software interface; special purpose; system; user
interface",
treatment = "P Practical",
}
@PhdThesis{Plumstead:1983:ISP,
author = "Joan Boyar Plumstead",
title = "Inferring Sequences Produced by Pseudo-Random Number
Generators",
type = "{Ph.D.} Dissertation",
school = "Department of Computer Science, University of
California, Berkeley",
address = "Berkeley, CA, USA",
pages = "ii + 56",
month = jun,
year = "1983",
bibdate = "Wed Jun 22 18:14:45 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "To solve the problem of inferring sequences produced
by pseudo-random number generators of a particular
form, one must present an efficient inference method
which, from knowledge of some of the numbers in a
sequence, predicts the remainder of the sequence.
Pseudo-random number generators of the following forms
are considered: (1) Linear congruential method, $ X(, i
+ 1) = a X(, i) + b \bmod m $. (2) Linear congruences
with $n$ terms in the recurrence, for fixed $n$, $ X(,
i) = a(, 1) X(, i - 1) + a(, 2) X(, i - 2) + (.)(.)(.)
+ a(, n) X(, i - n) + a(, n + 1) \bmod m $. (3)
Quadratic congruences, $ X(, i + 1) = a X(, i)('2) + b
X(, i) + c \bmod m $. In each case, it is assumed that
the coefficients and the modulus are unknown. It is
also assumed that whenever an incorrect prediction
occurs, the correct value is revealed before the next
prediction is made. Sequences of the first type can be
predicted with no more than $ 2 + \log (, 2) m $
errors, sequences of the second type with no more than
$ 2 + n('2) \log (, 2) n m $ errors, and sequences of
the third type with no more than $ 4 + 3 \log (, 2)m $
errors. All of the inference methods presented are
efficient. This shows that pseudo-random number
generators in any of these forms are cryptographically
insecure.",
acknowledgement = ack-nhfb,
}
@PhdThesis{Plumstead:1983:ISPa,
author = "Joan Boyar Plumstead",
title = "Inferring Sequences Produced by Pseudo-Random Number
Generators",
type = "{Ph.D.} Dissertation",
school = "Department of Computer Science, University of
California, Berkeley",
address = "Berkeley, CA, USA",
pages = "ii + 56",
month = jun,
year = "1983",
bibdate = "Wed Jun 22 18:14:45 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
abstract = "To solve the problem of inferring sequences produced
by pseudo-random number generators of a particular
form, one must present an efficient inference method
which, from knowledge of some of the numbers in a
sequence, predicts the remainder of the sequence.
Pseudo-random number generators of the following forms
are considered: (1) Linear congruential method, $ X(, i
+ 1) = a X(, i) + b \bmod m $. (2) Linear congruences
with $n$ terms in the recurrence, for fixed $n$, $ X(,
i) = a(, 1) X(, i - 1) + a(, 2) X(, i - 2) + (.)(.)(.)
+ a(, n) X(, i - n) + a(, n + 1) \bmod m $. (3)
Quadratic congruences, $ X(, i + 1) = a X(, i)('2) + b
X(, i) + c \bmod m $. In each case, it is assumed that
the coefficients and the modulus are unknown. It is
also assumed that whenever an incorrect prediction
occurs, the correct value is revealed before the next
prediction is made. Sequences of the first type can be
predicted with no more than $ 2 + \log (, 2) m $
errors, sequences of the second type with no more than
$ 2 + n('2) \log (, 2) n m $ errors, and sequences of
the third type with no more than $ 4 + 3 \log (, 2)m $
errors. All of the inference methods presented are
efficient. This shows that pseudo-random number
generators in any of these forms are cryptographically
insecure.",
acknowledgement = ack-nhfb,
}
@Book{Price:1983:ABR,
author = "W. L. Price",
title = "Annotated bibliography of recent publications on data
security and cryptography",
volume = "35/83",
publisher = "National Physical Laboratory",
address = "Teddington, Middlesex, UK",
edition = "Sixth",
pages = "ii + 29",
year = "1983",
LCCN = "Z103.A1 P74 1983a",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprinted by permission of the Controller of Her
Britannic Majesty's Stationery Office. ``PB84-169168.''
Photocopy. Springfield, VA: National Technical
Information Service, [1983?]. 28 cm.",
series = "NPL-DITC",
acknowledgement = ack-nhfb,
keywords = "cryptography --- bibliography; data protection ---
bibliography",
}
@Article{Rivest:1983:MOD,
author = "R. L. Rivest and A. Shamir and L. Adleman",
title = "A Method for Obtaining Digital Signatures and
Public-Key Cryptosystems",
journal = j-CACM,
volume = "26",
number = "1",
pages = "96--99",
month = jan,
year = "1983",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu Sep 22 11:37:34 1994",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "An encryption method is presented with the novel
property that publicly revealing an encryption key does
not thereby reveal the corresponding decryption key.
This has two important consequences: (1) Couriers or
other secure means are not needed to transmit keys,
since a message can be enciphered using an encryption
key publicly revealed by the intended recipient. Only
he can decipher the message, since only he knows the
corresponding decryption key. (2) A message can be
``signed'' using a privately held decryption key.
Anyone can verify this signature using the
corresponding publicly revealed encryption key.
Signatures cannot be forged, and a signer cannot later
deny the validity of his signature. This has obvious
applications in ``electronic mail'' and ``electronic
funds transfer'' systems. A message is encrypted by
representing it as a number $M$, raising $M$ to a
publicly specified power $e$, and then taking the
remainder when the result is divided by the publicly
specified product, $n$, of two large secret prime
numbers $p$ and $q$. Decryption is similar; only a
different, secret, power $d$ is used, where $ e * d = =
1 (\mbox {mod}(p - 1)*(q - 1)) $. The security of the
system rests in part on the difficulty of factoring the
published divisor, n.",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
}
@TechReport{Rivest:1983:RET,
author = "Ronald L. Rivest and Alan T. Sherman",
title = "Randomized encryption techniques",
type = "Technical report",
number = "MIT/LCS/TM-234",
institution = "Massachusetts Institute of Technology, Laboratory for
Computer Science",
address = "Cambridge, MA, USA",
pages = "20",
year = "1983",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Schell:1983:SPA,
author = "K. J. Schell",
title = "Security Printers Application of Lasers",
journal = "Proceedings of SPIE --- The International Society for
Optical Engineering",
volume = "396",
pages = "131--140",
year = "1983",
CODEN = "PSISDG",
ISBN = "0-89252-431-6",
ISBN-13 = "978-0-89252-431-0",
ISSN = "0277-786X (print), 1996-756X (electronic)",
LCCN = "TA1673 .A38 1983",
bibdate = "Mon May 11 18:28:54 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Industrial application of lasers in the graphic
industry is increasing. Examples are typesetting, color
separation and laser dot generating, laser printing,
laser gravure, laser plate making, etc. Application of
laser technology in the area of security printers had a
rather slow start but is speeding up rapidly. Encoding
credit cards by laser and holography are examples of
the application of lasers in this field. We summarize
known industrial applications of lasers in the graphic
industries and report about the applications of lasers
in the detection of a coded watermark. A step repeat
holographic laser camera for the production of
holograms in dichromatic gelatine is described.",
acknowledgement = ack-nhfb,
affiliation = "Joh. Enschede \& Sons, Security Printers, Haarlem,
Neth",
affiliationaddress = "Joh. Enschede \& Sons, Security Printers,
Haarlem, Neth",
classification = "722; 743; 744; 745",
conference = "Advances in Laser Scanning and Recording.",
journalabr = "Proceedings of SPIE - The International Society for
Optical Engineering",
keywords = "coded watermark reacting; graphic industry laser
applications; graphic methods; holographic step and
repeat camera; Laser Applications; laser printing;
reflection holography; security printers' laser
applications; typesetting",
meetingaddress = "Geneva, Switz",
sponsor = "SPIE, Bellingham, WA, USA",
}
@Article{Schobi:1983:FAT,
author = "P. Sch{\"o}bi and J. L. Massey",
booktitle = "Cryptography (Burg Feuerstein, 1982)",
title = "Fast authentication in a trapdoor-knapsack public key
cryptosystem",
journal = j-LECT-NOTES-COMP-SCI,
volume = "149",
pages = "289--306",
year = "1983",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94B99",
MRnumber = "84i:94047",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Shamir:1983:ECT,
author = "Adi Shamir",
title = "Embedding Cryptographic Trapdoors in Arbitrary
Knapsack Systems",
journal = j-INFO-PROC-LETT,
volume = "17",
number = "2",
pages = "77--79",
day = "24",
month = aug,
year = "1983",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "94A60",
MRnumber = "85e:94019",
MRreviewer = "Tai Yang Hwang",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
acknowledgement = ack-nhfb,
classification = "723; C1260 (Information theory); C1290Z (Other
applications of systems theory); C6130 (Data handling
techniques)",
corpsource = "Dept. of Appl. Maths., Weizmann Inst. of Sci.,
Rehovot, Israel",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "arbitrary knapsack systems; cryptographic trapdoors;
cryptography; information theory; modular
multiplications; operations research; public-key
cryptography",
treatment = "P Practical; T Theoretical or Mathematical",
}
@Article{Shamir:1983:GCS,
author = "Adi Shamir",
title = "On the Generation of Cryptographically Strong
Pseudorandom Sequences",
journal = j-TOCS,
volume = "1",
number = "1",
pages = "38--44",
month = feb,
year = "1983",
CODEN = "ACSYEC",
ISSN = "0734-2071 (print), 1557-7333 (electronic)",
ISSN-L = "0734-2071",
bibdate = "Thu Jan 14 11:57:59 1999",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
keywords = "TOCS",
}
@Article{Sicherman:1983:AQR,
author = "George L. Sicherman and Wiebren {De Jonge} and Reind
P. {Van De Riet}",
title = "Answering Queries without Revealing Secrets",
journal = j-TODS,
volume = "8",
number = "1",
pages = "41--59",
month = mar,
year = "1983",
CODEN = "ATDSD3",
ISSN = "0362-5915 (print), 1557-4644 (electronic)",
ISSN-L = "0362-5915",
bibdate = "Sat Apr 14 10:34:48 MDT 2001",
bibsource = "Compendex database; Database/Graefe.bib;
Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/tods.bib;
Misc/is.bib",
note = "Also published in/as: reprinted in deJonge thesis,
Jun. 1985.",
URL = "http://www.acm.org/pubs/articles/journals/tods/1983-8-1/p41-sicherman/p41-sicherman.pdf;
http://www.acm.org/pubs/citations/journals/tods/1983-8-1/p41-sicherman/",
abstract = "Question-answering systems must often keep certain
information secret. This can be accomplished, for
example, by sometimes refusing to answer a query. Here
the danger of revealing a secret by refusing to answer
a query is investigated. First several criteria that
can be used to decide whether or not to answer a query
are developed. First several criteria that can be used
to decide whether or not to answer a query are
developed. Then it is shown which of these criteria are
safe if the questioner knows nothing at all about what
is kept secret. Furthermore, it is proved that one of
these criteria is safe even if the user of the system
knows which information is to be kept secret.",
acknowledgement = ack-nhfb,
acmcrnumber = "8404-296",
classification = "723",
fjournal = "ACM Transactions on Database Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J777",
keywords = "database systems, statistical security TODS; keeping
secrets; refusal to answer; strategy",
subject = "Information Systems --- Models and Principles ---
Systems and Information Theory (H.1.1): {\bf Value of
information}; Information Systems --- Models and
Principles --- User/Machine Systems (H.1.2);
Information Systems --- Information Storage and
Retrieval --- Systems and Software (H.3.4): {\bf
Current awareness systems (selective dissemination of
information--SDI)**}; Information Systems ---
Information Storage and Retrieval --- Systems and
Software (H.3.4): {\bf Question-answering (fact
retrieval) systems**}; Computing Methodologies ---
Artificial Intelligence --- Deduction and Theorem
Proving (I.2.3): {\bf Answer/reason extraction}",
}
@MastersThesis{Sieminski:1983:SBB,
author = "Gregory C. Sieminski",
title = "The search for a balance between scientific freedom
and national security: a case study of cryptology",
type = "Thesis ({M.S.})",
school = "Defense Intelligence College",
address = "Washington, DC, USA",
pages = "v + 73",
month = nov,
year = "1983",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography; Intellectual freedom; National security
--- United States",
}
@Article{Silverman:1983:RVS,
author = "Jonathan M. Silverman",
title = "Reflections on the verification of the security of an
operating system kernel",
journal = j-OPER-SYS-REV,
volume = "17",
number = "5",
pages = "143--154",
month = oct,
year = "1983",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:54 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@InProceedings{Simmons:1983:PPS,
author = "G. J. Simmons",
title = "The Prisoners' Problem and the Subliminal Channel",
crossref = "Chaum:1983:ACP",
pages = "51--67",
year = "1983",
bibdate = "Sat Dec 26 17:01:46 1998",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1001.html",
acknowledgement = ack-nhfb,
keywords = "information hiding; steganography",
}
@Article{Smith:1983:HCR,
author = "J. W. Smith and S. S. {Wagstaff, Jr.}",
booktitle = "Proceedings of the fourteenth Southeastern conference
on combinatorics, graph theory and computing (Boca
Raton, Fla., 1983)",
title = "How to crack an {RSA} cryptosystem",
journal = j-CONG-NUM,
volume = "40",
pages = "367--373",
year = "1983",
ISSN = "0384-9864",
MRclass = "94A60",
MRnumber = "86d:94020",
MRreviewer = "S. Guia{\c{s}}u",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Congressus Numerantium. A Conference Journal on
Numerical Themes",
}
@Article{Smith:1983:PKC,
author = "John Smith",
title = "Public Key Cryptography: An Introduction to a Powerful
Cryptographic System for Use on Microcomputers",
journal = j-BYTE,
volume = "7",
number = "??",
pages = "198--218",
month = Jan,
year = "1983",
CODEN = "BYTEDJ",
ISSN = "0360-5280",
ISSN-L = "0360-5280",
bibsource = "/usr/local/src/bib/bibliography/Misc/security.1.bib;
/usr/local/src/bib/bibliography/Theory/ProbAlgs.bib;
http://www.math.utah.edu/pub/tex/bib/byte1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "This is a simple exposition of public key
cryptography.",
acknowledgement = ack-nhfb,
fjournal = "BYTE Magazine",
keywords = "algorithms; computer security; cryptography; RSA",
ort = "Ordner Sicherheit",
}
@TechReport{USGSA:1983:ISR,
author = "{United States. General Services Administration} and
{National Communications System (U.S.). Office of
Technology and Standards} and {National Institute of
Standards and Technology (U. S.)}",
title = "Interoperability and security requirements for use of
the {Data Encryption Standard} in the physical layer of
data communications",
institution = "General Services Administration, Office of Information
Resources Management",
address = "Washington, DC, USA",
pages = "4",
day = "3",
month = aug,
year = "1983",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Federal standard 1026. Federal information processing
standards publication, FIPS PUB 139",
acknowledgement = ack-nhfb,
keywords = "Computers --- Access control --- Standards.",
}
@Periodical{USNBS:1983:FPD,
author = "{United States. National Bureau of Standards}",
title = "{FIPS} Pub 46: {Data Encryption Standard}. {FIPS}
publication change notice",
publisher = "U.S. Department of Commerce, National Bureau of
Standards",
address = "Washinton, DC, USA",
pages = "various",
year = "1983",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Electronic data processing departments --- Security
measures; Standards",
}
@Book{USWD:1983:EC,
author = "{United States. War Dept} and {United States.
Adjutant-General's Office}",
title = "Elements of cryptanalysis",
publisher = pub-USGPO,
address = pub-USGPO:adr,
pages = "165",
year = "1983",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "United States. War Dept. Training pamphlet no. 3. War
Dept document no. 117",
acknowledgement = ack-nhfb,
annote = "Master microform held by: UnM. OP 66639. Microfilm.
Ann Arbor, Mich.: University Microfilms International,
19--. 1 reel; 35 mm.",
keywords = "Ciphers; Cryptography.",
}
@Article{Voydock:1983:SMH,
author = "Victor L. Voydock and Stephen T. Kent",
title = "Security Mechanisms in High-Level Network Protocols",
journal = j-COMP-SURV,
volume = "15",
number = "2",
pages = "135--171",
month = jun,
year = "1983",
CODEN = "CMSVAN",
DOI = "http://doi.acm.org/10.1145/356909.356913",
ISSN = "0360-0300 (print), 1557-7341 (electronic)",
ISSN-L = "0360-0300",
bibdate = "Thu Jun 19 09:32:27 MDT 2008",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
http://www.acm.org/pubs/contents/journals/surveys/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "The implications of adding security mechanisms to
high-level network protocols operating in an
open-system environment are analyzed. First the threats
to security that may arise in such an environment are
described, and then a set of goals for communications
security measures is established. This is followed by a
brief description of the two basic approaches to
communications security, link-oriented measures and
end-to-end measures, which concludes that end-to-end
measures are more appropriate in an open-system
environment. Next, relevant properties of data
encryption --- the fundamental technique on which all
communications security mechanisms are based --- are
discussed. The remainder of the paper describes how
end-to-end measures can be used to achieve each of the
security goals previously established.",
acknowledgement = ack-nhfb,
classification = "723",
fjournal = "ACM Computing Surveys",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J204",
keywords = "security os networks, computer networks",
}
@InProceedings{Wagner:1983:F,
author = "Neal R. Wagner",
title = "Fingerprinting",
crossref = "IEEE:1983:PSS",
pages = "18--22",
year = "1983",
bibdate = "Sat Dec 26 17:01:46 1998",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1030.html",
acknowledgement = ack-nhfb,
keywords = "information hiding; steganography",
}
@Article{Willett:1983:TKS,
author = "Michael Willett",
title = "Trapdoor Knapsacks without Superincreasing Structure",
journal = j-INFO-PROC-LETT,
volume = "17",
number = "1",
pages = "7--11",
day = "19",
month = jul,
year = "1983",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "94A60 (68P20)",
MRnumber = "85e:94020",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "723; C0230 (Economic, social and political aspects
of computing); C1260 (Information theory); C1290
(Applications of systems theory)",
corpsource = "Dept. of Math., Univ. of North Carolina, Greensboro,
NC, USA",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "computer programming; cryptography; information
theory; knapsacks; Merkle--Hellman public-key schemes;
operations research; polynomial-time algorithm;
superincreasing structure; trapdoor",
treatment = "T Theoretical or Mathematical",
}
@Article{Williams:1983:PAP,
author = "M. H. Williams",
title = "The problem of absolute privacy",
journal = j-INFO-PROC-LETT,
volume = "17",
number = "3",
pages = "169--171",
day = "5",
month = oct,
year = "1983",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "723; C6150J (Operating systems)",
corpsource = "Computer Sci. Dept., Heriot-Watt Univ., Edinburgh,
UK",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "computer operating systems; data privacy; data
processing --- Security of Data; data security; file
protection; operating systems (computers); security of
data",
treatment = "G General Review; P Practical",
}
@InProceedings{Winternitz:1983:POW,
author = "Robert S. Winternitz",
title = "Producing a One-Way Hash Function from {DES}",
crossref = "Chaum:1983:ACP",
pages = "203--207",
year = "1983",
bibdate = "Thu Oct 31 18:48:13 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
acknowledgement = ack-nhfb,
}
@Book{Wolfe:1983:FCC,
author = "Jack Martin Wolfe",
title = "A first course in cryptanalysis [!]",
publisher = "Brooklyn College Press",
address = "Brooklyn",
pages = "various",
year = "1983",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Three volumes.",
acknowledgement = ack-nhfb,
annote = "Reproduced from type-written copy. Mimeographed on
rectos only. Bound in printed paper wrappers. Library
of the American Cryptogram Association (George C. Lamb
Collection) Master microform held by: UnM. Microfilm.
Ann Arbor, Mich., University Microfilms International,
19--. reels. 35 mm.",
keywords = "Ciphers; Cryptography",
}
@Book{Yardley:1983:CBC,
author = "Herbert O. Yardley",
title = "The {Chinese Black Chamber}: an adventure in
espionage",
publisher = pub-HOUGHTON-MIFFLIN,
address = pub-HOUGHTON-MIFFLIN:adr,
pages = "xxiv + 225",
year = "1983",
ISBN = "0-395-34648-7",
ISBN-13 = "978-0-395-34648-8",
LCCN = "DS777.533.S65 Y37 1983",
bibdate = "Tue Dec 01 10:58:49 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Chinese title: Chung-kuo hei shih.",
price = "US\$13.95",
acknowledgement = ack-nhfb,
}
@InProceedings{Alexi:1984:RRB,
author = "W. Alexi and B. Chor and O. Goldreich and C. P.
Schnorr",
title = "{RSA\slash Rabin} Bits are {$ 1 / 2 + 1 \mbox {Poly}
(\log N) $} Secure",
crossref = "IEEE:1984:ASF",
pages = "449--457",
year = "1984",
bibdate = "Thu Apr 5 06:13:39 MDT 2001",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Anonymous:1984:ESC,
author = "Anonymous",
title = "{EDP} security: communications, database, end user,
encryption: advanced security concepts",
number = "3",
publisher = "FTP",
address = "Port Jefferson Station, NY, USA",
pages = "various",
year = "1984",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "FTP technical library EDP security",
acknowledgement = ack-nhfb,
}
@Article{Apostolico:1984:PMM,
author = "A. Apostolico and R. Giancarlo",
title = "Pattern matching machine implementation of a fast test
for unique decipherability",
journal = j-INFO-PROC-LETT,
volume = "18",
number = "3",
pages = "155--158",
day = "30",
month = mar,
year = "1984",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "B6140C (Optical information, image and video signal
processing); C1160 (Combinatorial mathematics); C1250
(Pattern recognition); C1260 (Information theory)",
corpsource = "ISI, Univ. of Salerno, Salerno, Italy",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
keywords = "codes; fast implementation; graph theory; pattern
matching machine; pattern recognition; Sardinas-
Patterson-Even test; unique decipherability",
treatment = "N New Development; T Theoretical or Mathematical",
}
@Book{Barker:1984:CSG,
author = "Wayne G. Barker",
title = "Cryptanalysis of shift-register generated stream
cipher systems",
volume = "39",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "ix + 247",
year = "1984",
ISBN = "0-89412-062-X",
ISBN-13 = "978-0-89412-062-6",
LCCN = "Z 104 B37 1984",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
annote = "Spine title: Cryptanalysis --- stream cipher
systems.",
keywords = "Ciphers; Cryptography",
}
@Article{Blum:1984:HGC,
author = "Manuel Blum and Silvio Micali",
title = "How to Generate Cryptographically Strong Sequences of
Pseudo-Random Bits",
journal = j-SIAM-J-COMPUT,
volume = "13",
number = "4",
pages = "850--864",
month = "????",
year = "1984",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "68P25 (65C10 68Q20)",
MRnumber = "86a:68021",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
referencedin = "Referenced in \cite[Ref. 7]{Goldreich:1997:FMCb}.",
}
@InProceedings{Blum:1984:IUC,
author = "Manuel Blum",
title = "Independent Unbiased Coin Flips from a Correlated
Biased Source: a Finite State {Markov} Chain",
crossref = "IEEE:1984:ASF",
pages = "425--433",
year = "1984",
bibdate = "Thu Feb 02 17:24:58 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Boyer:1984:PCR,
author = "Robert S. Boyer and J. Strother Moore",
title = "Proof checking the {RSA} public key encryption
algorithm",
journal = j-AMER-MATH-MONTHLY,
volume = "91",
number = "3",
pages = "181--189",
year = "1984",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
MRclass = "68P25 (68T15 94A60)",
MRnumber = "85k:68024",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/amermathmonthly1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
acknowledgement = ack-nhfb,
fjournal = "The American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@InCollection{Brickell:1984:EAA,
author = "E. F. Brickell and J. C. Lagarias and A. M. Odlyzko",
booktitle = "Advances in cryptology (Santa Barbara, Calif., 1983)",
title = "Evaluation of the {Adleman} attack on multiply
iterated knapsack cryptosystems (abstract)",
publisher = "Plenum",
address = "New York",
pages = "39--42",
year = "1984",
MRclass = "94A60 (11T71)",
MRnumber = "799 719",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}
@Article{Burton:1984:RPKa,
author = "Charles E. Burton",
title = "{RSA}: a Public Key Cryptography System Part {I}",
journal = j-DDJ,
volume = "9",
number = "3",
pages = "16--??",
month = mar,
year = "1984",
CODEN = "DDJOEB",
ISSN = "1044-789X",
bibdate = "Thu Jan 9 09:35:43 MST 1997",
bibsource = "Compendex database;
http://www.ddj.com/index/author/index.htm;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib;
http://www.math.utah.edu/pub/tex/bib/fortran2.bib",
acknowledgement = ack-nhfb,
classification = "723; 921",
fjournal = "Dr. Dobb's Journal of Software Tools",
journalabr = "Dr Dobb's J",
keywords = "computer programming --- Algorithms; computer
programming languages --- Fortran; computer programs;
computers, microprocessor --- Applications;
cryptography; modulo arithmetic; multi precision
arithmetic; public key system (PKS); Rational Fortran
(RATFOR)",
pagecount = "22p between p 16 and 43",
}
@Article{Burton:1984:RPKb,
author = "Charles E. Burton",
title = "{RSA}: a Public Key Cryptography System Part {II}",
journal = j-DDJ,
volume = "9",
number = "4",
pages = "32--??",
month = apr,
year = "1984",
CODEN = "DDJOEB",
ISSN = "1044-789X",
bibdate = "Thu Jan 9 09:35:43 MST 1997",
bibsource = "Compendex database;
http://www.ddj.com/index/author/index.htm;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
acknowledgement = ack-nhfb,
classification = "723",
fjournal = "Dr. Dobb's Journal of Software Tools",
journalabr = "Dr Dobb's J",
keywords = "computer programs; data processing; public key
cryptography",
pagecount = "20p between p 32 and 59",
}
@Article{Coppersmith:1984:FEL,
author = "D. Coppersmith",
title = "Fast evaluations of logarithms in fields of
characteristic two",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "IT-30",
number = "4",
pages = "587--594",
month = "????",
year = "1984",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1984.1056941",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
bibdate = "Sun Mar 11 10:29:59 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Information Theory",
}
@Article{Denning:1984:DSR,
author = "Dorothy E. Denning",
title = "Digital Signatures with {RSA} and Other Public-Key
Cryptosystems",
journal = j-CACM,
volume = "27",
number = "4",
pages = "388--392",
month = apr,
year = "1984",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
MRclass = "68P25",
MRnumber = "784 134",
bibdate = "Tue Dec 26 13:35:07 1995",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the Association for Computing
Machinery",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
}
@InCollection{Denning:1984:FEA,
author = "Dorothy E. Denning",
booktitle = "Advances in cryptology (Santa Barbara, Calif., 1983)",
title = "Field encryption and authentication",
publisher = pub-PLENUM,
address = pub-PLENUM:adr,
pages = "231--247",
year = "1984",
MRclass = "94A60",
MRnumber = "86j:94044",
MRreviewer = "Evangelos Kranakis",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
}
@Book{Franksen:1984:MBS,
author = "Ole Immanuel Franksen",
title = "{Mr. Babbage}'s secret: the tale of a cypher and
{APL}",
publisher = "Strandberg",
address = "Birkerod, Denmark",
pages = "319",
year = "1984",
ISBN = "87-87200-86-4",
ISBN-13 = "978-87-87200-86-8",
LCCN = "Z103.B2 F72 1984",
bibdate = "Mon Nov 4 07:46:57 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "APL (computer program language); Babbage, Charles,
1791--1871; ciphers --- history; cryptographers ---
Great Britain --- biography; cryptography --- history",
}
@Article{Frederickson:1984:PRT,
author = "P. Frederickson and R. Hiromoto and T. L. Jordan and
B. Smith and T. Warnock",
title = "Pseudo-random trees in {Monte Carlo}",
journal = j-PARALLEL-COMPUTING,
volume = "1",
number = "2",
pages = "175--180",
month = dec,
year = "1984",
CODEN = "PACOEJ",
ISSN = "0167-8191 (print), 1872-7336 (electronic)",
ISSN-L = "0167-8191",
bibdate = "Mon Apr 14 11:08:33 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/parallelcomputing.bib",
acknowledgement = ack-nhfb,
classification = "C1140G (Monte Carlo methods); C7300 (Natural
sciences computing); C7400 (Engineering computing)",
corpsource = "Los Alamos Nat. Lab., Los Alamos, NM, USA",
fjournal = "Parallel Computing",
journal-URL = "http://www.sciencedirect.com/science/journal/01678191/",
keywords = "digital simulation; Lehmer pseudorandom number
generator; MIMD architecture; Monte Carlo methods;
Monte Carlo simulations; parallel; parallel computers;
processing; pseudorandom trees; random number
generation; reproducibility; SIMD architecture;
supercomputer; trees (mathematics)",
treatment = "P Practical",
}
@Article{Goldwasser:1984:PE,
author = "Shafi Goldwasser and Silvio Micali",
title = "Probabilistic Encryption",
journal = j-J-COMP-SYS-SCI,
volume = "28",
number = "2",
pages = "270--299",
year = "1984",
CODEN = "JCSSBM",
ISSN = "0022-0000",
ISSN-L = "0022-0000",
MRclass = "94A60 (11T71 68P25 68Q25)",
MRnumber = "86j:94047",
MRreviewer = "J. C. Lagarias",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
note = "See also preliminary version in 14th STOC, 1982.",
acknowledgement = ack-nhfb,
fjournal = "Journal of Computer and System Sciences",
journal-URL = "http://www.sciencedirect.com/science/journal/00220000",
referencedin = "Referenced in \cite[Ref. 18]{Goldreich:1997:FMCb}.",
}
@PhdThesis{Goldwasser:1984:PET,
author = "Shafrira Goldwasser",
title = "Probabilistic encryption: theory and applications",
type = "Thesis ({Ph. D. in Computer Science})",
school = "Department of Computer Science, University of
California, Berkeley",
address = "Berkeley, CA, USA",
pages = "iv + 63",
month = dec,
year = "1984",
LCCN = "T7.6 .G628",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Photocopy. Ann Arbor, Mich.: University Microfilms
International, 1986. 22 cm.",
keywords = "Computers --- Access control; Cryptography;
dissertations; dissertations, academic --- UCB ---
computer science --- 1981--1990; University of
California, Berkeley. Computer Science Division",
}
@InProceedings{Grollmann:1984:CMP,
author = "J. Grollmann and A. L. Selman",
title = "Complexity Measures for Public-Key Cryptosystems",
crossref = "IEEE:1984:ASF",
pages = "495--503",
year = "1984",
bibdate = "Thu Apr 5 06:13:39 MDT 2001",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@MastersThesis{Grundler:1984:DEH,
author = "Edward James Grundler",
title = "A data encryption hardware software package",
type = "Project (M.S.)",
school = "California State University, Sacramento.",
address = "Sacramento, CA, USA",
pages = "vii + 81",
year = "1984",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Electronic data processing departments --- Security
measures.",
}
@Article{Haddon:1984:BRS,
author = "Bruce K. Haddon",
title = "Book review of ``{Security, IFIP\slash Sec'83:
proceedings of the first security conference''
North-Holland Publishing Co. 1983}",
journal = j-OPER-SYS-REV,
volume = "18",
number = "3",
pages = "14--14",
month = jul,
year = "1984",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:45 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See \cite{Feak:1983:SIS}.",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Article{Haskett:1984:PAU,
author = "James A. Haskett",
title = "Pass-Algorithms: a User Validation Scheme Based on
Knowledge of Secret Algorithms",
journal = j-CACM,
volume = "27",
number = "8",
pages = "777--781",
year = "1984",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jan 22 06:48:51 MST 2001",
bibsource = "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Haskett84;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "cryptography",
oldlabel = "Haskett84",
XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Haskett84",
}
@TechReport{IRD:1984:DTV,
author = "{International Resource Development, Inc.}",
title = "Data, text, and voice encryption equipment",
type = "Report",
number = "630",
institution = "International Resource Development",
address = "6 Prowitt St., Norwalk, CT 06855, USA",
pages = "vi + 184",
year = "1984",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography equipment industry --- United States;
Market surveys --- United States.",
}
@Misc{Johns:1984:RAS,
author = "M. St. Johns",
title = "{RFC 912}: Authentication service",
day = "1",
month = sep,
year = "1984",
bibdate = "Thu Oct 16 09:34:09 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}. Status:
UNKNOWN.",
URL = "ftp://ftp.internic.net/rfc/rfc912.txt;
ftp://ftp.internic.net/rfc/rfc931.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc912.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt",
acknowledgement = ack-nhfb,
format = "TXT=4544 bytes",
obsoletedby = "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}.",
online = "yes",
status = "UNKNOWN",
}
@InCollection{Jurgensen:1984:SRI,
author = "H. J{\"u}rgensen and D. E. Matthews",
booktitle = "Advances in cryptology (Santa Barbara, Calif., 1983)",
title = "Some results on the information theoretic analysis of
cryptosystems",
publisher = "Plenum",
address = "New York",
pages = "303--356",
year = "1984",
MRclass = "94A60 (68Q25 94A17)",
MRnumber = "87b:94038",
MRreviewer = "James W. Snively, Jr.",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}
@Article{Kahn:1984:COS,
author = "D. Kahn",
title = "Cryptology and the origins of spread spectrum",
journal = j-IEEE-SPECTRUM,
volume = "21",
number = "9",
pages = "70--80",
month = sep,
year = "1984",
CODEN = "IEESAM",
ISSN = "0018-9235 (print), 1939-9340 (electronic)",
ISSN-L = "0018-9235",
bibdate = "Sat Dec 26 17:01:46 1998",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1009.html",
acknowledgement = ack-nhfb,
fjournal = "IEEE Spectrum",
keywords = "information hiding; steganography",
}
@Article{Kak:1984:MPK,
author = "S. C. Kak",
title = "On the method of puzzles for key distribution",
journal = j-INT-J-COMPUT-INF-SCI,
volume = "13",
number = "2",
pages = "103--109",
month = apr,
year = "1984",
CODEN = "IJCIAH",
ISSN = "0091-7036",
bibdate = "Sat Apr 26 12:20:22 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes); C6130 (Data handling techniques)",
corpsource = "Dept. of Electr. and Comput. Eng., Louisiana State
Univ., Baton Rouge, LA, USA",
fjournal = "International Journal of Computer and Information
Sciences",
keywords = "codes; cryptography; key distribution; nested puzzles
method; public channel; puzzles; work advantage",
treatment = "P Practical",
}
@MastersThesis{Kaliski:1984:AWA,
author = "Burton Stephen {Kaliski, Jr.}",
title = "Analysis of {Wyner}'s analog encryption scheme",
type = "Thesis ({B.S.})",
school = "Department of Electrical Engineering and Computer
Science, Massachusetts Institute of Technology",
address = "Cambridge, MA, USA",
pages = "97",
year = "1984",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Supervised by Ronald L. Rivest.",
acknowledgement = ack-nhfb,
}
@Article{Kothari:1984:CMW,
author = "S. Kothari and S. Lakshmivarahan",
title = "On the concealability of messages by the {Williams}
public-key encryption scheme",
journal = j-COMP-MATH-APPL,
volume = "10",
number = "1",
pages = "15--24",
year = "1984",
CODEN = "CMAPDK",
ISSN = "0898-1221 (print), 1873-7668 (electronic)",
ISSN-L = "0898-1221",
MRclass = "94A60",
MRnumber = "85e:94017",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "Computers \& Mathematics with Applications. An
International Journal",
}
@Book{Kozaczuk:1984:EHGa,
author = "W{\l}adys{\l}aw Kozaczuk",
title = "{Enigma}: how the {German} machine cipher was broken,
and how it was read by the {Allies} in {World War
Two}",
publisher = "Arms and Armour",
address = "London, UK",
pages = "xiv + 348",
year = "1984",
ISBN = "0-85368-640-8",
ISBN-13 = "978-0-85368-640-8",
LCCN = "D810.C88 K6813 1984b",
bibdate = "Mon Nov 4 07:46:57 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Translation of: W kregu Enigmy.",
acknowledgement = ack-nhfb,
keywords = "World War, 1939--1945 --- cryptography",
}
@Book{Kozaczuk:1984:EHGb,
author = "W{\l}adys{\l}aw Kozaczuk",
title = "{Enigma}: How the {German} Machine Cipher Was Broken,
and How It Was Read by the {Allies} in {World War
Two}",
publisher = "University Publications of America",
address = "Frederick, MD, USA",
pages = "xiv + 348",
year = "1984",
ISBN = "0-89093-547-5",
ISBN-13 = "978-0-89093-547-7",
LCCN = "D810.C88 K6813 1984",
bibdate = "Mon Nov 4 07:46:57 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Edited and translated by Christopher Kasparek, from
the original Polish edition, {\em W kr{\c{e}}gu
Enigma}, Ksi{\c{a}}{\d{z}}ka i Wiedza, Warsaw, 1979.",
price = "US\$24.00",
series = "Foreign intelligence book series",
acknowledgement = ack-nhfb,
keywords = "machine ciphers; World War, 1939--1945 ---
cryptography",
}
@InCollection{Lagarias:1984:KPK,
author = "J. C. Lagarias",
booktitle = "Advances in cryptology (Santa Barbara, Calif., 1983)",
title = "Knapsack public key cryptosystems and {Diophantine}
approximation (extended abstract)",
publisher = "Plenum",
address = "New York",
pages = "3--23",
year = "1984",
MRclass = "94A60 (11T71)",
MRnumber = "86j:94050",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}
@Article{Lagarias:1984:PAS,
author = "J. C. Lagarias",
booktitle = "Automata, languages and programming (Antwerp, 1984)",
title = "Performance analysis of {Shamir}'s attack on the basic
{Merkle--Hellman} knapsack cryptosystem",
journal = j-LECT-NOTES-COMP-SCI,
volume = "172",
pages = "312--323",
year = "1984",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "68P25",
MRnumber = "784 259",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Landwehr:1984:SMM,
author = "Carl E. Landwehr and Constance L. Heitmeyer and John
McLean",
title = "A Security Model for Military Message System",
journal = j-TOCS,
volume = "2",
number = "3",
pages = "198--222",
month = aug,
year = "1984",
CODEN = "ACSYEC",
ISSN = "0734-2071 (print), 1557-7333 (electronic)",
ISSN-L = "0734-2071",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold/1984.bib;
ftp://ftp.ira.uka.de/pub/bibliography/Misc/bibsec.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
}
@InCollection{Lidl:1984:PPR,
author = "Rudolf Lidl and Winfried B. M{\"u}ller",
booktitle = "Advances in cryptology (Santa Barbara, Calif., 1983)",
title = "Permutation polynomials in {RSA}-cryptosystems",
publisher = "Plenum",
address = "New York",
pages = "293--301",
year = "1984",
MRclass = "94A60 (11T06)",
MRnumber = "86i:94040",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}
@TechReport{NCSOTS:1984:ISR,
author = "{National Communications System (U.S.). Office of
Technology and Standards}",
title = "Interoperability and security requirements for use of
the {Data Encryption Standard} in the physical layer of
data communications",
type = "Federal standard",
number = "1026",
institution = "General Services Administration, Office of Information
Resources Management",
address = "Washington, DC, USA",
pages = "various",
day = "3",
month = aug,
year = "1984",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
govtdocnumber = "GS 2.8/3:1026 563",
keywords = "Cryptography --- Standards --- United States;
Government information --- Standards --- United
States",
}
@InProceedings{Nobauer:1984:CRS,
author = "Rupert N{\"o}bauer",
title = "Cryptanalysis of the {R{\'e}dei}-scheme",
crossref = "Eigenthaler:1984:CGA",
pages = "255--264",
year = "1984",
MRclass = "94A60 (11T71)",
MRnumber = "87b:94040",
bibdate = "Tue Feb 9 11:14:49 MST 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Odlyzko:1984:CAM,
author = "Andrew M. Odlyzko",
title = "Cryptanalytic attacks on the multiplicative knapsack
cryptosystem and on {Shamir}'s fast signature scheme",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "IT-30",
number = "4",
pages = "594--601",
year = "1984",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1984.1056942",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
MRclass = "94A60 (68P20)",
MRnumber = "86i:94041",
MRreviewer = "Tai Yang Hwang",
bibdate = "Mon Jul 19 07:08:40 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.research.att.com/~amo/doc/arch/knapsack.attacks.pdf;
http://www.research.att.com/~amo/doc/arch/knapsack.attacks.ps;
http://www.research.att.com/~amo/doc/arch/knapsack.attacks.troff",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Information Theory",
xxtitle = "Cryptanalytic attacks on the multiplicative knapsack
cryptosystem and on {Shamir's} signature scheme",
}
@Article{Ozarow:1984:WTC,
author = "Lawrence H. Ozarow and Aaron D. Wyner",
title = "Wire-tap channel {II}",
journal = j-ATT-BELL-LAB-TECH-J,
volume = "63",
number = "10 part 1",
pages = "2135--2157",
year = "1984",
CODEN = "ABLJER",
ISSN = "0748-612X",
bibdate = "Fri Nov 12 09:17:39 2010",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "In this paper we study a communication system in which
an unauthorized intruder is able to intercept a subset
of the transmitted symbols, and it is desired to
maximize the intruder's uncertainty about the data
without the use of an encryption key (either public or
private).",
acknowledgement = ack-nhfb,
fjournal = "AT\&T Bell Laboratories Technical Journal",
keywords = "computers --- data communication systems",
subject = "conditional entropy; intruder's uncertainty;
unauthorized intruder; wire-tap channel",
topic = "data processing",
}
@Article{Rao:1984:JEE,
author = "T. R. N. Rao",
title = "Joint encryption and error correction schemes",
journal = j-COMP-ARCH-NEWS,
volume = "12",
number = "3",
pages = "240--241",
month = jun,
year = "1984",
CODEN = "CANED2",
ISSN = "0163-5964 (print), 1943-5851 (electronic)",
ISSN-L = "0163-5964",
bibdate = "Fri May 12 09:40:54 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGARCH Computer Architecture News",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J89",
}
@Article{Reeds:1984:FSU,
author = "James A. Reeds and Peter J. Weinberger",
title = "File Security and the {UNIX} System {\tt crypt}
Command",
journal = j-ATT-BELL-LAB-TECH-J,
volume = "63",
number = "8 part 2",
pages = "1673--1683",
month = oct,
year = "1984",
CODEN = "ABLJER",
ISSN = "0748-612X",
bibdate = "Fri Nov 12 09:17:39 2010",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprinted in \cite[pp.~93--103]{ATT:1986:AUS}.",
abstract = "Sufficiently large files encrypted with the UNIX
system {\tt crypt} command can be deciphered in a few
hours by algebraic techniques and human interaction. We
outline such a decryption method and show it to be
applicable to a proposed strengthened algorithm as
well. We also discuss the role of encryption in file
security.",
acknowledgement = ack-nhfb,
fjournal = "AT\&T Bell Laboratories Technical Journal",
keywords = "computer systems, digital",
subject = "crypt command; encryption; file security; UNIX
system",
topic = "data processing",
}
@Article{Rivest:1984:HEE,
author = "Ronald L. Rivest and Adi Shamir",
title = "How to Expose an Eavesdropper",
journal = j-CACM,
volume = "27",
number = "4",
pages = "393--395",
month = apr,
year = "1984",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Mon Jan 27 13:18:33 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
}
@Article{Routh:1984:PAA,
author = "Richard LeRoy Routh",
title = "A proposal for an architectural approach which
apparently solves all known software-based internal
computer security problems",
journal = j-OPER-SYS-REV,
volume = "18",
number = "3",
pages = "31--39",
month = jul,
year = "1984",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:45 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Article{Saltzer:1984:EEA,
author = "J. H. Saltzer and D. P. Reed and D. D. Clark",
key = "Saltzer et al.",
title = "End-to-End Arguments in System Design",
journal = j-TOCS,
volume = "2",
number = "4",
pages = "277--288",
month = nov,
year = "1984",
CODEN = "ACSYEC",
ISSN = "0734-2071 (print), 1557-7333 (electronic)",
ISSN-L = "0734-2071",
bibdate = "Wed Mar 6 11:12:06 1985",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
ftp://ftp.ira.uka.de/pub/bibliography/Misc/digital.library.bib;
ftp://ftp.ira.uka.de/pub/bibliography/Os/os.bib;
ftp://ftp.ira.uka.de/pub/bibliography/SE/dependability.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "This paper presents a design principle that helps
guide placement of functions among the modules of a
distributed computer system. The principle, called the
end-to-end argument, suggests that functions placed at
low levels of a system may be redundant or of little
value when compared with the cost of providing them at
that low level. Examples discussed in the paper include
bit-error recovery, security using encryption,
duplicate message suppression, recovery from system
crashes, and delivery acknowledgement. Low-level
mechanisms to support these functions are justified
only as performed enhancements.",
acknowledgement = ack-nhfb,
comments = "Argues that you should put functionality at the higher
app layers, rather than at low layers. Includes a
security example",
entered-by = "Andreas Paepcke",
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
keywords = "data communication; design; design principles;
protocol design; TOCS",
}
@Book{Schroeder:1984:NTS,
author = "M. R. (Manfred Robert) Schroeder",
title = "Number theory in science and communication: with
applications in cryptography, physics, biology, digital
information, and computing",
volume = "7",
publisher = pub-SV,
address = pub-SV:adr,
pages = "xvi + 324",
year = "1984",
ISBN = "0-387-12164-1",
ISBN-13 = "978-0-387-12164-2",
LCCN = "QA241 .S318 1984",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Springer series in information sciences",
acknowledgement = ack-nhfb,
keywords = "number theory",
}
@Article{Shamir:1984:CCV,
author = "A. Shamir and C. P. Schnorr",
title = "Cryptanalysis of Certain Variants of {Rabin}'s
Signature Scheme",
journal = j-INFO-PROC-LETT,
volume = "19",
number = "3",
pages = "113--115",
day = "19",
month = oct,
year = "1984",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "68P25 (94A60)",
MRnumber = "86e:68029",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
acknowledgement = ack-nhfb,
classification = "723; C6130 (Data handling techniques)",
corpsource = "Dept. of Appl. Math., Weizmann Inst. of Sci., Rehovot,
Israel",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "cleartext attacks; cryptanalysis; cryptography;
digital signatures; natural perturbation techniques;
protect; Rabin's signature scheme",
treatment = "T Theoretical or Mathematical",
}
@Article{Shamir:1984:PTA,
author = "Adi Shamir",
title = "A polynomial-time algorithm for breaking the basic
{Merkle--Hellman} cryptosystem",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "30",
number = "5",
pages = "699--704",
year = "1984",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1984.1056964",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
MRclass = "94A60",
MRnumber = "86m:94032",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "IEEE Transactions on Information Theory",
}
@Article{Siegenthaler:1984:CIN,
author = "T. Siegenthaler",
title = "Correlation-Immunity of Nonlinear Combining Functions
for Cryptographic Applications",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "IT-30",
number = "5",
pages = "776--780",
year = "1984",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1984.1056949",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
bibdate = "Mon Nov 30 09:02:43 1998",
bibsource = "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Information Theory",
}
@Article{Simmons:1984:HID,
author = "G. J. Simmons",
title = "How to Insure that Data Acquired to Verify Treaty
Compliance are Trustworthy",
journal = j-PROC-IEEE,
volume = "76",
number = "5",
pages = "621--627",
month = may,
year = "1984",
CODEN = "IEEPAD",
ISSN = "0018-9219",
ISSN-L = "0018-9219",
bibdate = "Sat Dec 26 17:01:46 1998",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1003.html",
acknowledgement = ack-nhfb,
fjournal = "Proceedings of the IEEE",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5",
keywords = "information hiding; steganography",
}
@Misc{StJohns:1984:RAS,
author = "M. {St. Johns}",
title = "{RFC 912}: Authentication service",
day = "1",
month = sep,
year = "1984",
bibdate = "Thu Oct 16 09:34:09 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}. Status:
UNKNOWN.",
URL = "ftp://ftp.internic.net/rfc/rfc912.txt;
ftp://ftp.internic.net/rfc/rfc931.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc912.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
format = "TXT=4544 bytes",
obsoletedby = "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}.",
online = "yes",
status = "UNKNOWN",
}
@Article{Summers:1984:OCS,
author = "R. C. Summers",
title = "An Overview of Computer Security",
journal = j-IBM-SYS-J,
volume = "23",
number = "4",
pages = "309--325",
year = "1984",
CODEN = "IBMSA7",
ISSN = "0018-8670",
bibdate = "Wed Jan 08 16:35:07 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Presented is an overview of computer security,
including concepts, techniques, and measures relating
to the protection of computing systems and the
information they maintain against deliberate or
accidental threats. Motivations for security measures
are discussed. Security strategies are considered.
Actions and events that threaten security are
described, along with technical problems that can
prevent the computer from adequately dealing with
threats. Security models are surveyed. Specific
technical and administrative measures for promoting
security are described. Among the technical measures
discussed are design of secure systems, hardware and
operating systems, identification of users, encryption,
and access control packages. Administrative measures
include personnel, physical security of the computing
system, and auditing.",
acknowledgement = ack-nhfb,
affiliation = "IBM, Los Angeles Scientific Cent, Los Angeles, CA,
USA",
affiliationaddress = "IBM, Los Angeles Scientific Cent, Los Angeles,
CA, USA",
classification = "723; 731",
fjournal = "IBM Systems Journal",
journalabr = "IBM Syst J",
keywords = "data processing; encryption; process control ---
Computer Applications; security measures; security
model; Security of Data; security threat sources",
}
@Article{Thersites:1984:IKE,
author = "Joan Thersites and John A. Thomas",
title = "An Infinite Key Encryption System",
journal = j-DDJ,
volume = "9",
number = "8",
pages = "44--??",
month = aug,
year = "1984",
CODEN = "DDJOEB",
ISSN = "1044-789X",
bibdate = "Mon Sep 2 09:09:39 MDT 1996",
bibsource = "http://www.ddj.com/index/author/index.htm;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Dr. Dobb's Journal of Software Tools",
xxnote = "??Check author order??",
}
@Article{Thomas:1984:IKE,
author = "John A. Thomas and Joan Thersites",
title = "Infinite Key Encryption System",
journal = j-DDJ,
volume = "9",
number = "8",
pages = "44--??",
month = aug,
year = "1984",
CODEN = "DDJOEB",
ISSN = "1044-789X",
bibdate = "Thu Jan 9 09:35:43 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
acknowledgement = ack-nhfb,
classification = "723",
fjournal = "Dr. Dobb's Journal of Software Tools",
journalabr = "Dr Dobb's J",
keywords = "codes, symbolic; computer programs; computers,
microcomputer; cryptography; data processing; file
encryption; infinite key encryption system; program
code; Security of Data",
pagecount = "35p between p 44 and 85",
}
@Article{Thompson:1984:RTT,
author = "Ken Thompson",
title = "Reflections on Trusting Trust",
journal = j-CACM,
volume = "27",
number = "8",
pages = "761--763",
month = aug,
year = "1984",
CODEN = "CACMA2",
DOI = "http://doi.acm.org/10.1145/358198.358210",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1028.html",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "information hiding; security; steganography; unix",
remark = "This is part two of the 1983 Turing Award Lecture.",
}
@Book{TI:1984:TTU,
author = "{Texas Instruments Inc}.",
title = "{TMS7500 TMS75C00} user's guide, data encryption
device: 8-bit microcomputer family",
publisher = "Texas Instruments",
address = "Dallas, TX, USA",
pages = "various",
year = "1984",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "SPNU004",
keywords = "Microcomputers; TMS7500 (Computer).",
}
@Manual{USGSAOIRM:1984:ISR,
author = "{United States. General Services Administration.
Office of Information Resources Management}",
title = "Interoperability and security requirements for use of
the {Data Encryption Standard} in the physical layer of
data communications",
number = "1026",
publisher = "General Services Administration",
address = "Office of Information Resources Management",
pages = "various",
year = "1984",
LCCN = "GS 2.8/3:1026 Govt Pubs",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Cover title. ``August 3, 1983.'' ``FSC TELE.''",
series = "Federal standard",
acknowledgement = ack-nhfb,
keywords = "cryptography --- standards --- United States;
government information --- standards --- United
States",
}
@Article{Voydock:1984:SMT,
author = "Victor L. Voydock and Stephen T. Kent",
title = "Security Mechanisms in a Transport Layer Protocol",
journal = j-COMP-NET,
volume = "8",
number = "5--6",
pages = "433--449",
month = oct # "\slash " # dec,
year = "1984",
CODEN = "CNETDP",
ISSN = "0376-5075",
ISSN-L = "0376-5075",
bibdate = "Sat Sep 25 20:21:07 MDT 1999",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Microcom Inc, Norwood, MA, USA",
classification = "723; 902",
fjournal = "Computer Networks",
journalabr = "Comput Networks",
keywords = "Communication Systems; computer architecture ---
Standards; computer networks; computers --- Data; data
encryption standard; data processing --- Security of
Data; Protocols; security; transport layer protocol",
}
@InProceedings{Wah:1984:RAM,
author = "P. K. S. Wah and M. Z. Wang",
editor = "{IEEE}",
booktitle = "{1984 International Zurich Seminar on Digital
Communications: applications of source coding, channel
coding and secrecy coding: March 6--8, 1984,
Z{\"u}rich, Switzerland, Swiss Federal Institute of
Technology: proceedings}",
title = "Realization and application of the {Massey--Omura}
lock",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "175--182",
year = "1984",
LCCN = "TK7881.5 I65 1984",
bibdate = "Sun Mar 11 10:47:07 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "IEEE catalog number 84CH1998-4.",
acknowledgement = ack-nhfb,
bookpages = "xi + 201",
}
@Article{Winternitz:1984:SOH,
author = "Robert S. Winternitz",
title = "Secure One-Way Hash Function Built from {DES}",
journal = "Proceedings of the Symposium on Security and Privacy",
pages = "88--90",
year = "1984",
CODEN = "PSSPEO",
ISBN = "0-8186-0532-4",
ISBN-13 = "978-0-8186-0532-1",
LCCN = "QA76.9.A25 S95 1984",
bibdate = "Tue May 12 09:47:14 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
note = "IEEE Service Cent. Piscataway, NJ, USA.",
acknowledgement = ack-nhfb,
classification = "723; 902",
conference = "Proceedings of the 1984 Symposium on Security and
Privacy.",
journalabr = "Proc Symp Secur Privacy",
keywords = "authentication of information; data encryption
standard (des); data processing; digital message
signing for security and efficiency; encryption
algorithms; randomly chosen block cipher; secure
one-way hash function",
meetingaddress = "Oakland, CA, USA",
sponsor = "IEEE Computer Soc, Technical Committee on Security \&
Privacy, Los Alamitos, Calif, USA; IEEE, New York, NY,
USA",
}
@InProceedings{Akl:1985:FPR,
author = "Selim G. Akl and Henk Meijer",
title = "A Fast Pseudo Random Permutation Generator With
Applications to Cryptology",
crossref = "Blakley:1985:ACP",
pages = "269--275",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=269",
acknowledgement = ack-nhfb,
}
@InProceedings{Anonymous:1985:BM,
author = "Anonymous",
title = "Back matter",
crossref = "Blakley:1985:ACP",
pages = "??--??",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=??",
acknowledgement = ack-nhfb,
}
@TechReport{Anonymous:1985:DEA,
author = "Anonymous",
title = "Data encryption algorithm: Electronic funds transfer:
requirements for interfaces",
institution = "????",
address = "????",
pages = "16",
year = "1985",
ISBN = "0-7262-3764-7",
ISBN-13 = "978-0-7262-3764-5",
bibdate = "Wed Sep 28 07:58:30 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@TechReport{Aruliah:1985:PIE,
author = "A. A. Aruliah and G. I. Parkin and Brian A. Wichmann",
title = "A {Pascal} implementation of the {DES} encryption
algorithm including cipher block chaining",
type = "NPL report",
number = "DITC 61/85",
institution = "National Physical Laboratory, Division of Information
Technology and Computing",
address = "Teddington, Middlesex, UK",
pages = "37",
year = "1985",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography; Electronic data processing; Pascal
(Computer program language)",
}
@InProceedings{Beker:1985:KMS,
author = "Henry Beker and Michael Walker",
title = "Key Management for Secure Electronic Funds Transfer in
a Retail Environment",
crossref = "Blakley:1985:ACP",
pages = "401--410",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=401",
acknowledgement = ack-nhfb,
}
@Book{Beker:1985:SSC,
author = "Henry Beker and F. C. (Frederick Charles) Piper",
title = "Secure speech communications",
volume = "3",
publisher = pub-ACADEMIC,
address = pub-ACADEMIC:adr,
pages = "xi + 267",
year = "1985",
ISBN = "0-12-084780-9",
ISBN-13 = "978-0-12-084780-8",
LCCN = "TK5102.5 .B354 1985",
bibdate = "Fri Nov 25 08:37:47 MST 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
series = "Microelectronics and signal processing",
acknowledgement = ack-nhfb,
subject = "Scrambling systems (Telecommunication)",
}
@InProceedings{Bennett:1985:UQC,
author = "Charles H. Bennett and Gilles Brassard",
title = "An Update on Quantum Cryptography",
crossref = "Blakley:1985:ACP",
pages = "475--480",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=475",
acknowledgement = ack-nhfb,
}
@Article{Birrell:1985:SCU,
author = "Andrew D. Birrell",
title = "Secure Communication Using Remote Procedure Calls",
journal = j-TOCS,
volume = "3",
number = "1",
pages = "1--14",
month = feb,
year = "1985",
CODEN = "ACSYEC",
ISSN = "0734-2071",
ISSN-L = "0734-2071",
bibdate = "Thu Jan 14 06:47:30 MST 1999",
bibsource = "Compendex database; http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org:80/pubs/citations/journals/tocs/1985-3-1/p1-birrell/",
abstract = "Research on encryption-based secure communication
protocols has reached a stage where it is feasible to
construct end-to-end secure protocols. The design of
such a protocol, built as part of a remote procedure
call package, is described. The security abstraction
presented to users of the package, the authentication
mechanisms, and the protocol for encrypting and
verifying remote calls are also described.",
acknowledgement = ack-nhfb,
affiliationaddress = "Xerox Corp",
classification = "723",
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
journalabr = "ACM Trans Comput Syst",
keywords = "computer networks; cryptography; design;
experimentation; Protocols; remote procedure calls;
secure communication; security",
subject = "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
Protection, Cryptographic controls. {\bf C.2.0}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, General, Security and protection (e.g.,
firewalls). {\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
Protocol architecture.",
}
@InProceedings{Blake:1985:CLG,
author = "I. F. Blake and R. C. Mullin and S. A. Vanstone",
title = "Computing Logarithms in {$ {\rm GF}(2^n) $}",
crossref = "Blakley:1985:ACP",
pages = "73--82",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=73",
acknowledgement = ack-nhfb,
}
@InProceedings{Blakley:1985:ITF,
author = "G. R. Blakley",
title = "Information Theory without the Finiteness Assumption,
{I}: Cryptosystems as Group-Theoretic Objects",
crossref = "Blakley:1985:ACP",
pages = "314--338",
year = "1985",
MRclass = "94A60 (20F99)",
MRnumber = "87c:94034",
MRreviewer = "D. Lieberman",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=314",
acknowledgement = ack-nhfb,
}
@InProceedings{Blakley:1985:SRS,
author = "G. R. Blakley and Catherine Meadows",
title = "Security of Ramp Schemes",
crossref = "Blakley:1985:ACP",
pages = "242--268",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=242",
acknowledgement = ack-nhfb,
}
@InProceedings{Blum:1985:EPP,
author = "Manuel Blum and Shafi Goldwasser",
title = "An Efficient Probabilistic Public-Key Encryption
Scheme Which Hides All Partial Information",
crossref = "Blakley:1985:ACP",
pages = "289--302",
year = "1985",
MRclass = "94A60",
MRnumber = "87e:94029",
MRreviewer = "Willi Meier",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=289",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 6]{Goldreich:1997:FMCb}.",
xxpages = "289--299",
}
@Article{Book:1985:CRE,
author = "Ronald V. Book and Friedrich Otto",
title = "Cancellation Rules and Extended Word Problems",
journal = j-INFO-PROC-LETT,
volume = "20",
number = "1",
pages = "5--11",
day = "2",
month = jan,
year = "1985",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "68Q45 (03D03)",
MRnumber = "87d:68054",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of California, Santa Barbara, Dep of Mathematics,
Santa Barbara, CA, USA",
affiliationaddress = "Univ of California, Santa Barbara, Dep of
Mathematics, Santa Barbara, CA, USA",
classification = "721; B6120B (Codes); B6150 (Communication system
theory)",
corpsource = "Dept. of Maths., California Univ., Santa Barbara, CA,
USA",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "automata theory; cancellation rules; Church--Rosser
property; computer metatheory; congruences;
cryptography; extended word problems; Formal Languages;
formal model; name-stamp protocols; protocols; public
key encryption; rewriting process; secure network
communication; Thue systems",
treatment = "T Theoretical or Mathematical",
}
@Article{Book:1985:SNP,
author = "R. V. Book and F. Otto",
title = "On the security of name-stamp protocols",
journal = j-THEOR-COMP-SCI,
volume = "39",
number = "2-3",
pages = "319--325",
month = aug,
year = "1985",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
bibdate = "Sat Nov 22 13:29:49 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
acknowledgement = ack-nhfb,
classification = "C5620 (Computer networks and techniques); C6130
(Data handling techniques)",
corpsource = "Dept. of Math., California Univ., Santa Barbara, CA,
USA",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975",
keywords = "cryptography; name-stamp protocols; p-parity cascade
protocols; protocols; security; two-party cascade
protocols",
pubcountry = "Netherlands A15",
treatment = "T Theoretical or Mathematical",
}
@Article{Book:1985:SNS,
author = "R. V. Book and F. Otto",
title = "On the security of name-stamp protocols",
journal = j-THEOR-COMP-SCI,
volume = "39",
number = "2-3",
pages = "319--325",
month = aug,
year = "1985",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
bibdate = "Sat Nov 22 13:29:49 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "C5620 (Computer networks and techniques); C6130
(Data handling techniques)",
corpsource = "Dept. of Math., California Univ., Santa Barbara, CA,
USA",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975",
keywords = "cryptography; name-stamp protocols; p-parity cascade
protocols; protocols; security; two-party cascade
protocols",
pubcountry = "Netherlands A15",
treatment = "T Theoretical or Mathematical",
}
@Article{Book:1985:VTA,
author = "R. V. Book and F. Otto",
title = "On the verifiability of two-party algebraic
protocols",
journal = j-THEOR-COMP-SCI,
volume = "40",
number = "2-3",
pages = "101--130",
month = "????",
year = "1985",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
bibdate = "Sat Nov 22 13:29:49 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
acknowledgement = ack-nhfb,
classification = "B6210L (Computer communications); C5620 (Computer
networks and techniques); C6130 (Data handling
techniques)",
corpsource = "Dept. of Math., California Univ., Santa Barbara, CA,
USA",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975",
keywords = "communication protocols; cryptography; protocols;
public-key cryptosystems; two-party algebraic
protocols; verifiability",
pubcountry = "Netherlands A02",
treatment = "P Practical; T Theoretical or Mathematical",
}
@Article{Bounas:1985:DDS,
author = "Adam C. Bounas",
title = "Direct determination of a ``seed'' binary matrix",
journal = j-INFO-PROC-LETT,
volume = "20",
number = "1",
pages = "47--50",
day = "2",
month = jan,
year = "1985",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "94A60 (94A15)",
MRnumber = "86g:94038",
MRreviewer = "S. Guia{\c{s}}u",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliationaddress = "Greek Atomic Energy Commission, Computer Science
Dep, Attiki, Greece",
classification = "723; 922; B6120B (Codes); C6130 (Data handling
techniques)",
corpsource = "Dept. of Comput. Sci., Min. of Res. and Technol.,
Greek Atomic Energy Comm., Attiki, Greece",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "binary matrix; cryptography; data transformation;
generalized feedback shift register pseudorandom number
generator; keys; mathematical statistics --- Random
Number Generation; pseudorandom number generators;
random number generation; seed matrices; seed matrix;
stream enciphering",
treatment = "T Theoretical or Mathematical",
}
@InProceedings{Brickell:1985:BIK,
author = "Ernest F. Brickell",
title = "Breaking Iterated Knapsacks",
crossref = "Blakley:1985:ACP",
pages = "342--358",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=342",
acknowledgement = ack-nhfb,
}
@Article{Burton:1985:EAC,
author = "Charles E. Burton",
title = "An Enhanced {ADFGVX} Cipher System",
journal = j-DDJ,
volume = "10",
number = "2",
pages = "48--??",
month = feb,
year = "1985",
CODEN = "DDJOEB",
ISSN = "1044-789X",
bibdate = "Thu Jan 9 09:35:43 MST 1997",
bibsource = "Compendex database;
http://www.ddj.com/index/author/index.htm;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
acknowledgement = ack-nhfb,
classification = "723",
fjournal = "Dr. Dobb's Journal of Software Tools",
journalabr = "Dr Dobb's J",
keywords = "ADFGVX cipher; computer programs; cryptography; data
processing; decrypted text; encrypted messages;
information theory --- Data Compression; Security of
Data",
pagecount = "19p between p 48 and 70",
}
@Article{Chan:1985:NMP,
author = "B. Chan and H. Meijer",
title = "A note on the method of puzzles for key distribution",
journal = j-INT-J-COMPUT-INF-SCI,
volume = "14",
number = "4",
pages = "221--223",
month = aug,
year = "1985",
CODEN = "IJCIAH",
ISSN = "0091-7036",
bibdate = "Sat Apr 26 12:20:22 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes); C1260 (Information theory)",
corpsource = "Dept. of Comput. and Inf. Sci., Queens Univ.,
Kingston, Ont., Canada",
fjournal = "International Journal of Computer and Information
Sciences",
keywords = "cryptography; error correction codes; key
distribution; linear error correcting codes; public key
cryptosystem; puzzles; security of data",
treatment = "T Theoretical or Mathematical",
}
@InProceedings{Chaum:1985:HKS,
author = "David Chaum",
title = "How to Keep a Secret Alive Extensible Partial Key, Key
Safeguarding, and Threshold Systems",
crossref = "Blakley:1985:ACP",
pages = "481--485",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=481",
acknowledgement = ack-nhfb,
}
@InProceedings{Chaum:1985:NSC,
author = "David Chaum",
title = "New Secret Codes Can Prevent a Computerized Big
Brother",
crossref = "Blakley:1985:ACP",
pages = "432--433",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=432",
acknowledgement = ack-nhfb,
}
@Article{Chaum:1985:SIT,
author = "David Chaum",
title = "Security without identification: transaction systems
to make big brother obsolete",
journal = j-CACM,
volume = "28",
number = "10",
pages = "1030--1044",
month = oct,
year = "1985",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
http://www.acm.org/pubs/toc/;
http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/index-table-c.html#cacm1980",
URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4373.html;
http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1022.html",
abstract = "The large-scale automated transaction systems of the
near future can be designed to protect the privacy and
maintain the security of both individuals and
organizations.",
acknowledgement = ack-nhfb,
annote = "Extensive article on use of random, transient personal
id's. A digital pseudonym with each organization.",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "design; human factors; information hiding; security;
steganography",
referencedin = "Referenced in \cite[Ref. 4]{Kaliski:1995:SUR}.",
review = "ACM CR 8608-0693",
subject = "{\bf C.2.0}: Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Security and
protection. {\bf E.3}: Data, DATA ENCRYPTION. {\bf
J.1}: Computer Applications, ADMINISTRATIVE DATA
PROCESSING, Financial. {\bf K.4.1}: Computing Milieux,
COMPUTERS AND SOCIETY, Public Policy Issues, Privacy.
{\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
Social Issues, Abuse and crime involving computers.",
}
@InProceedings{Chen:1985:RGE,
author = "Su-shing Chen",
title = "On Rotation Group and Encryption of Analog Signals",
crossref = "Blakley:1985:ACP",
pages = "95--100",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=95",
acknowledgement = ack-nhfb,
}
@InProceedings{Chor:1985:KTP,
author = "Benny Chor and Ronald L. Rivest",
title = "A Knapsack Type Public Key Cryptosystem Based On
Arithmetic in Finite Fields (preliminary draft)",
crossref = "Blakley:1985:ACP",
pages = "54--65",
year = "1985",
MRclass = "94A60",
MRnumber = "820 013",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See also revised version in \cite{Chor:1988:KTP}.",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=54",
acknowledgement = ack-nhfb,
}
@InProceedings{Chor:1985:RRL,
author = "Benny Chor and Oded Goldreich",
title = "{RSA\slash Rabin} least significant bits are {$ \frac
{1}{2} + \frac {1}{{\rm poly}(\log N)} $} secure
(extended abstract)",
crossref = "Blakley:1985:ACP",
pages = "303--313",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=303",
acknowledgement = ack-nhfb,
}
@InProceedings{Chor:1985:VSS,
author = "B. Chor and S. Goldwasser and S. Micali and B.
Awerbuch",
title = "Verifiable Secret Sharing and Achieving Simultaneity
in the Presence of Faults",
crossref = "IEEE:1985:FOC",
pages = "383--395 (or 335--344??)",
year = "1985",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 7]{Canetti:1997:PSL},
\cite[Ref. 6]{Gemmell:1997:ITC}.",
xxtitle = "Verifiable Secret Sharing and Achieving Simultaneous
Broadcast",
}
@Article{Coppersmith:1985:AF,
author = "D. Coppersmith and J. H. Davenport",
title = "An Application of Factoring",
journal = j-J-SYMBOLIC-COMP,
volume = "1",
number = "2",
pages = "241--243",
month = jun,
year = "1985",
CODEN = "JSYCEH",
ISSN = "0747-7171 (print), 1095-855X (electronic)",
ISSN-L = "0747-7171",
MRclass = "11T71 (11Y16 68Q40)",
MRnumber = "87b:11125",
MRreviewer = "Kevin S. McCurley",
bibdate = "Sat May 10 15:54:09 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/jsymcomp.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Symbolic Computation",
journal-URL = "http://www.sciencedirect.com/science/journal/07477171",
keywords = "Factorization, Logarithms, Cryptography, SCRATCHPAD",
}
@InProceedings{Davies:1985:MAA,
author = "Donald Watts Davies",
title = "A Message Authenticator Algorithm Suitable for a
Mainframe Computer",
crossref = "Blakley:1985:ACP",
pages = "393--400",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=393",
acknowledgement = ack-nhfb,
}
@InProceedings{Davio:1985:EHS,
author = "Marc Davio and Yvo Desmedt and Jo Goubert and Frank
Hoornaert and Jean-Jacques Quisquater",
title = "Efficient hardware and software implementations for
the {DES}",
crossref = "Blakley:1985:ACP",
pages = "144--146",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=144",
acknowledgement = ack-nhfb,
}
@Article{Davis:1985:NRI,
author = "J. A. Davis and D. B. Holdridge",
title = "New results on integer factorizations",
journal = j-CONG-NUM,
volume = "46",
pages = "65--78",
year = "1985",
ISSN = "0384-9864",
MRclass = "11Y05 (94A60)",
MRnumber = "86f:11098",
bibdate = "Tue Feb 9 11:14:49 MST 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Proceedings of the fourteenth Manitoba conference on
numerical mathematics and computing (Winnipeg, Man.,
1984).",
acknowledgement = ack-nhfb,
fjournal = "Congressus Numerantium",
}
@InProceedings{Davis:1985:UFS,
author = "J. A. Davis and D. B. Holdridge",
title = "An Update on Factorization at {Sandia National
Laboratories}",
crossref = "Blakley:1985:ACP",
pages = "114--114",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=114",
acknowledgement = ack-nhfb,
}
@Book{Dawson:1985:COL,
author = "M. J. Dawson",
title = "Cryptanalysis of ornithological literature",
volume = "4",
publisher = "Oriel Stringer",
address = "Brighton",
pages = "40",
year = "1985",
ISBN = "0-948122-04-8 (paperback)",
ISBN-13 = "978-0-948122-04-0 (paperback)",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Caliologists' series",
acknowledgement = ack-nhfb,
keywords = "Birds --- Great Britain --- Nests; Great Britain ---
Birds --- Nests",
}
@Book{Deavours:1985:MCM,
author = "Cipher A. Deavours and Louis Kruh",
title = "Machine cryptography and modern cryptanalysis",
publisher = pub-ARTECH,
address = pub-ARTECH:adr,
pages = "xiv + 258",
year = "1985",
ISBN = "0-89006-161-0",
ISBN-13 = "978-0-89006-161-9",
LCCN = "Z103 .D431 1985",
MRclass = "94A60 (01A60 94-03)",
MRnumber = "87h:94017",
MRreviewer = "Harriet Fell",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "The Artech House telecom library",
acknowledgement = ack-nhfb,
keywords = "Cryptography; Machine ciphers; World War, 1939--1945
--- Cryptography.",
}
@InProceedings{Delsarte:1985:FCM,
author = "P. Delsarte and Y. Desmedt and A. Odlyzko and P.
Piret",
title = "Fast cryptanalysis of the {Matsumoto--Imai} public key
scheme",
crossref = "Beth:1985:ACP",
pages = "142--149",
year = "1985",
DOI = "http://dx.doi.org/10.1007/3-540-39757-4_14",
MRclass = "94A60",
MRnumber = "87c:94037",
bibdate = "Mon Jul 19 07:03:50 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.research.att.com/~amo/doc/arch/break.mi.scheme.pdf;
http://www.research.att.com/~amo/doc/arch/break.mi.scheme.ps;
http://www.research.att.com/~amo/doc/arch/break.mi.scheme.troff",
acknowledgement = ack-nhfb,
}
@InProceedings{Desmedt:1985:DOI,
author = "Yvo Desmedt and Jean-Jacques Quisquater and Marc
Davio",
title = "Dependence of output on input in {DES}: Small
avalanche characteristics",
crossref = "Blakley:1985:ACP",
pages = "359--376",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=359",
acknowledgement = ack-nhfb,
}
@Book{DRC:1985:AAN,
author = "{Datapro Research Corporation}",
title = "All about network access control and data encryption
devices: with in-depth analyses of leading devices",
publisher = "Datapro Research Corporation",
address = "Delran, NJ, USA",
pages = "65",
month = jun,
year = "1985",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Special report prepared by editors of Datapro's
monthly loose-leaf services.",
keywords = "Computers --- Access control; Electronic data
processing.",
}
@TechReport{Ecker:1985:STS,
author = "Allen Ecker",
title = "Satellite television, signal encryption and the future
of broadband distribution",
type = "Seminar notes",
institution = "Communications Forum, Massachusetts Institute of
Technology",
address = "Cambridge, MA, USA",
pages = "13",
day = "19",
month = sep,
year = "1985",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{El-Gamal:1985:PCS,
author = "T. El-Gamal",
title = "A public-key cryptosystem and a signature scheme based
on discrete logarithms",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "IT-31",
number = "4",
pages = "469--472",
year = "1985",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1985.1057074",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Information Theory",
referencedin = "Referenced in \cite[Ref. 4]{Handschuh:1998:SCC}.",
}
@Article{ElGamal:1985:PKCa,
author = "Taher ElGamal",
title = "A public key cryptosystem and a signature scheme based
on discrete logarithms",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "IT-31",
number = "4",
pages = "469--472",
year = "1985",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1985.1057074",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
MRclass = "94A60 (11T71)",
MRnumber = "86j:94045",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "IEEE Transactions on Information Theory",
}
@InProceedings{ElGamal:1985:PKCb,
author = "Taher ElGamal",
title = "A Public Key Cryptosystem and a Signature Scheme Based
on Discrete Logarithms",
crossref = "Blakley:1985:ACP",
pages = "10--18",
year = "1985",
MRclass = "94A60 (11T71 68P25)",
MRnumber = "87b:94037",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=10",
acknowledgement = ack-nhfb,
}
@Article{ElGamal:1985:STA,
author = "Taher ElGamal",
title = "A subexponential-time algorithm for computing discrete
logarithms over {$ {\rm GF}(p^2) $}",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "IT-31",
number = "4",
pages = "473--481",
year = "1985",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1985.1057075",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
bibdate = "Sun Mar 11 10:34:00 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Information Theory",
}
@InProceedings{Even:1985:CSW,
author = "Shimon Even",
title = "On the complexity of some word problems that arise in
testing the security of protocols",
crossref = "Apostolico:1985:CAW",
pages = "299--314",
year = "1985",
MRclass = "68Q25 (68P25 94A60)",
MRnumber = "87a:68080",
bibdate = "Tue Feb 9 11:14:49 MST 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Even:1985:PCC,
author = "S. Even and O. Goldreich",
title = "On the Power of Cascade Ciphers",
journal = j-TOCS,
volume = "3",
number = "2",
pages = "108--116",
month = may,
year = "1985",
CODEN = "ACSYEC",
ISSN = "0734-2071",
ISSN-L = "0734-2071",
bibdate = "Thu Jan 14 06:47:30 MST 1999",
bibsource = "Compendex database; http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org:80/pubs/citations/journals/tocs/1985-3-2/p108-even/",
abstract = "The unicity distance of a cascade of random ciphers,
with respect to known plaintext attack, is shown to be
the sum of the key lengths. At time-space trade-off for
the exhaustive cracking of a cascade of ciphers is
shown. The structure of the set of permutations
realized by a cascade is studied; it is shown that only
l. 2**k exhaustive experiments are necessary to
determine the behavior of a cascade of l stages, each
having k key bits. It is concluded that the cascade of
random ciphers is not a random cipher. Yet, it is shown
that, with probability, the number of permutations
realizable by a cascade of l random ciphers, each
having k key bits, is 2**l**k. Next, it is shown that
two stages are not worse than one, by a simple
reduction of the cracking problem of any of the stages
to the cracking problem of the cascade. Finally, it is
shown that proving a nonpolynomial lower bound on the
cracking problem of long cascades is a hard task, since
such a bound implies that P does not equal NP.",
acknowledgement = ack-nhfb,
affiliationaddress = "Technion-Israel Inst of Technology, Haifa, Isr",
classification = "723",
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
journalabr = "ACM Trans Comput Syst",
keywords = "algorithms; cascade ciphers; cryptography; data
encryption; data processing --- Security of Data;
random ciphers; security; theory; unicity distance",
subject = "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
Protection. {\bf E.3} Data, DATA ENCRYPTION.",
}
@Article{Even:1985:RPS,
author = "Shimon Even and Oded Goldreich and Abraham Lempel",
title = "A randomized protocol for signing contracts",
journal = j-CACM,
volume = "28",
number = "6",
pages = "637--647",
month = jun,
year = "1985",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
MRclass = "68P25",
MRnumber = "800 680",
bibdate = "Fri Apr 5 10:03:00 MST 1996",
bibsource = "http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3818.html",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "security; theory; verification",
review = "ACM CR 8512-1137",
subject = "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption
standard (DES). {\bf E.3}: Data, DATA ENCRYPTION,
Public key cryptosystems. {\bf C.2.2}: Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Protocols. {\bf H.4.3}: Information Systems,
INFORMATION SYSTEMS APPLICATIONS, Communications
Applications, Electronic mail. {\bf J.1}: Computer
Applications, ADMINISTRATIVE DATA PROCESSING,
Financial.",
}
@InProceedings{Fairfield:1985:LDE,
author = "R. C. Fairfield and A. Matusevich and J. Plany",
title = "An {LSI Digital Encryption Processor (DEP)}",
crossref = "Blakley:1985:ACP",
pages = "115--143",
year = "1985",
MRclass = "94A60",
MRnumber = "820 017",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=115",
acknowledgement = ack-nhfb,
}
@InProceedings{Fairfield:1985:LRN,
author = "R. C. Fairfield and R. L. Mortenson and K. B.
Coulthart",
title = "An {LSI} Random Number Generator ({RNG})",
crossref = "Blakley:1985:ACP",
pages = "203--230",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=203",
acknowledgement = ack-nhfb,
}
@InProceedings{Fortune:1985:PP,
author = "Steven Fortune and Michael Merritt",
title = "Poker Protocols",
crossref = "Blakley:1985:ACP",
pages = "454--464",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=454",
acknowledgement = ack-nhfb,
}
@MastersThesis{Franklin:1985:MID,
author = "Matthew Keith Franklin",
title = "Mathematical investigations of the {Data Encryption
Standard}",
type = "Thesis ({M.A. in Mathematics})",
school = "Department of Mathematics, University of California,
Berkeley",
address = "Berkeley, CA, USA",
pages = "36",
month = may,
year = "1985",
LCCN = "C 2 930 522",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "University of California, Berkeley --- dissertations
--- mathematics",
}
@Book{Franksen:1985:MBS,
author = "Ole Immanuel Franksen",
title = "{Mr. Babbage}'s secret: the tale of a cypher and
{APL}",
publisher = pub-PH,
address = pub-PH:adr,
pages = "319",
year = "1985",
ISBN = "0-13-604729-7",
ISBN-13 = "978-0-13-604729-2",
LCCN = "Z103.B2 F721 1985",
bibdate = "Mon Nov 4 07:46:57 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "APL (computer program language); Babbage, Charles,
1791--1871; ciphers --- history; cryptographers ---
Great Britain --- biography; cryptography --- history",
}
@Book{Gleason:1985:ECP,
author = "Andrew M. Gleason and Walter F. Penney and Ronald E.
Wyllys",
title = "Elementary course in probability for the
cryptanalyst",
volume = "41",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
edition = "Revised",
pages = "????",
year = "1985",
ISBN = "0-89412-072-7",
ISBN-13 = "978-0-89412-072-5",
LCCN = "Z104 .G53 1985",
bibdate = "Wed May 11 23:23:17 MDT 2011",
bibsource = "fsz3950.oclc.org:210/WorldCat;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
subject = "Probabilities; Cryptography",
}
@InProceedings{Goldreich:1985:CAR,
author = "Oded Goldreich and Shafi Goldwasser and Silvio
Micali",
title = "On the Cryptographic Applications of Random Functions
(Extended Abstract)",
crossref = "Blakley:1985:ACP",
pages = "276--288",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=276",
acknowledgement = ack-nhfb,
}
@InProceedings{Goldwasser:1985:PSS,
author = "Shafi Goldwasser and Silvio Micali and Ronald L.
Rivest",
title = "A ``Paradoxical'' Solution to the Signature Problem",
crossref = "Blakley:1985:ACP",
pages = "467--467",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=467",
acknowledgement = ack-nhfb,
}
@Article{Goodman:1985:NTK,
author = "R. M. F. Goodman and A. J. McAuley",
booktitle = "Advances in cryptology (Paris, 1984)",
title = "A new trapdoor knapsack public key cryptosystem",
journal = j-LECT-NOTES-COMP-SCI,
volume = "209",
pages = "150--158",
year = "1985",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60",
MRnumber = "87c:94038",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@InProceedings{Gordon:1985:SPE,
author = "John A. Gordon",
title = "Strong primes are easy to find",
crossref = "Beth:1985:ACP",
pages = "216--223",
year = "1985",
DOI = "http://dx.doi.org/10.1007/3-540-39757-4_19",
bibdate = "Sun Mar 11 10:24:54 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
remark = "A {\em strong prime\/} $p$ is a prime that satisfies
three conditions: (1) $ p = 1 \bmod r $, (2) $ p = (s -
1) \bmod s $, and (3) $ r = 1 \bmod t $, where $r$,
$s$, and $t$ are all large random primes of a given
number of bits.",
}
@InProceedings{Haastad:1985:CST,
author = "J. H{\aa}stad and A. Shamir",
title = "The cryptographic security of truncated linearly
related variables",
crossref = "ACM:1985:PSA",
pages = "356--362",
year = "1985",
bibdate = "Wed Feb 20 18:33:46 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.acm.org/pubs/contents/proceedings/series/stoc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/articles/proceedings/stoc/22145/p356-hastad/p356-hastad.pdf;
http://www.acm.org/pubs/citations/proceedings/stoc/22145/p356-hastad/",
acknowledgement = ack-nhfb,
}
@Manual{Hardy:1985:ECC,
author = "John M. Hardy and Dorothy W. Fuller and Douglas R.
Long and Jane C. Hartin and Faye Davis",
title = "Electronic cryptographic communications equipment
specialist {(AFSC 30650)}",
number = "CDC 30650",
organization = "Extension Course Institute, Air University",
address = "????",
pages = "various",
year = "1985",
LCCN = "D 301.26/17-2:30650 2 8502 Govt Pubs; Other Govt Docs
numbers: D 301.26/17-2:30650 04 8502;",
bibdate = "Sat Nov 18 12:53:52 MST 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "``30650 -2 8502''--Vol. 2. ``30650 04 8502''--Vol. 4.
``CDC 30650.'' Description based in vol. 2.
Bibliography: vol. 2, p. 153. Contents: v. 2. Advanced
electronics / [prepared by John M. Hardy; edited by
Dorothy W. Fuller] -- v. 4. Maintenance practices and
test equipment / [prepared by John M. Hardy, Douglas R.
Long; edited by Jane C. Hartin, Faye Davis].",
keywords = "cryptography -- handbooks, manuals, etc; electronics
in military engineering -- handbooks, manuals, etc;
United States. Air Force -- handbooks, manuals, etc",
}
@InProceedings{Hoornaert:1985:EHI,
author = "Frank Hoornaert and Jo Goubert and Yvo Desmedt",
title = "Efficient hardware implementation of the {DES}",
crossref = "Blakley:1985:ACP",
pages = "147--173",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=147",
acknowledgement = ack-nhfb,
}
@Article{Hunter:1985:ARK,
author = "D. G. N. Hunter",
title = "{Algorithm 121}: {RSA} key calculation in {Ada}",
journal = j-COMP-J,
volume = "28",
number = "3",
pages = "343--348",
month = jul,
year = "1985",
CODEN = "CMPJA6",
DOI = "http://dx.doi.org/10.1093/comjnl/28.3.343",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
MRclass = "94A60 (94-04)",
MRnumber = "86j:94048",
bibdate = "Tue Dec 4 14:48:18 MST 2012",
bibsource = "http://comjnl.oxfordjournals.org/content/28/3.toc;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/",
note = "See note \cite{Wichmann:1987:NAR}.",
URL = "http://comjnl.oxfordjournals.org/content/28/3/343.full.pdf+html;
http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/343.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/344.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/345.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/346.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/347.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/348.tif",
acknowledgement = ack-nhfb,
classcodes = "C6130 (Data handling techniques)",
corpsource = "Stand. Telecommun. Labs. Ltd., Harlow, UK",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "16-bit microcomputers; Ada; Ada listings; assembly
code; cryptography; encryption programs; exponentiation
operation; finite arithmetic; general purpose
arithmetic packages; multiple precision arithmetic;
packages; RSA key calculation in",
treatment = "T Theoretical or Mathematical",
}
@Article{Kak:1985:EEC,
author = "Subhash C. Kak",
title = "Encryption and error-correction coding using {$D$}
sequences",
journal = j-IEEE-TRANS-COMPUT,
volume = "34",
number = "9",
pages = "803--809",
year = "1985",
CODEN = "ITCOB4",
ISSN = "0018-9340 (print), 1557-9956 (electronic)",
ISSN-L = "0018-9340",
MRclass = "94A60 (68P20)",
MRnumber = "86k:94028",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "Institute of Electrical and Electronics Engineers.
Transactions on Computers",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}
@InProceedings{Kaliski:1985:WAE,
author = "Burt S. Kaliski",
title = "{Wyner}'s Analog Encryption Scheme: Results of a
Simulation",
crossref = "Blakley:1985:ACP",
pages = "83--94",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=83",
acknowledgement = ack-nhfb,
}
@Article{Karger:1985:ADA,
author = "Paul A. Karger",
title = "Authentication and Discretionary Access Control in
Computer Networks",
journal = j-COMP-NET-ISDN,
volume = "10",
number = "1",
pages = "27--37",
month = aug,
year = "1985",
CODEN = "CNISE9",
ISSN = "0169-7552 (print), 1879-2324 (electronic)",
ISSN-L = "0169-7552",
bibdate = "Sat Sep 25 23:08:50 MDT 1999",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Digital Equipment Corp, Littleton, MA, USA",
classification = "723",
fjournal = "Computer Networks and ISDN Systems",
journal-URL = "http://www.sciencedirect.com/science/journal/01697552",
journalabr = "Comput Networks ISDN Syst",
keywords = "access control; authentication; computer networks;
data processing --- Security of Data; data security;
digital network architecture; network security",
}
@Article{Knuth:1985:DLC,
author = "Donald E. Knuth",
title = "Deciphering a linear congruential encryption",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "IT-31",
number = "1",
pages = "49--52",
month = jan,
year = "1985",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/TIT.1985.1056997",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
MRclass = "94A60",
MRnumber = "87c:94040",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
note = "Russian translation, to appear.",
fjournal = "IEEE Transactions on Information Theory",
subject = "G.3 Mathematics of Computing, PROBABILITY AND
STATISTICS, Random number generation E Data, DATA
ENCRYPTION",
}
@InProceedings{Konheim:1985:CAE,
author = "Alan G. Konheim",
title = "Cryptanalysis of {ADFGVX} Encipherment Systems
(extended abstract)",
crossref = "Blakley:1985:ACP",
pages = "339--341",
year = "1985",
MRclass = "94A60",
MRnumber = "820 027",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=339",
acknowledgement = ack-nhfb,
}
@InProceedings{Kothari:1985:GLT,
author = "S. C. Kothari",
title = "Generalized Linear Threshold Scheme",
crossref = "Blakley:1985:ACP",
pages = "231--241",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=231",
acknowledgement = ack-nhfb,
}
@Article{Lagarias:1985:SLD,
author = "J. C. Lagarias and A. M. Odlyzko",
title = "Solving Low-Density Subset Sum Problems",
journal = j-J-ACM,
volume = "32",
number = "1",
pages = "229--246",
month = jan,
year = "1985",
CODEN = "JACOAH",
ISSN = "0004-5411",
ISSN-L = "0004-5411",
bibdate = "Wed Jan 15 18:12:53 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/jacm.bib",
note = "Preliminary version in {\em Proc. 24th IEEE
Foundations Computer Science Symp.}, pp. 1--10, 1983.",
URL = "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2461.html",
abstract = "The subset sum problem is to decide whether or not a
0-1 integer programming problem which is NP-complete,
has a solution. The difficulty of solving it is the
basis of public-key cryptosystems of knapsack type. An
algorithm is proposed that searches for a solution when
given an instance of the subset sum problem. This
algorithm always halts in polynomial time but does not
always find a solution when one exists. It converts the
problem to one of finding a particular short vector in
a lattice, and then uses a lattice basis reduction
algorithm to attempt to find this short vector. The
performance of the proposed algorithm is analyzed.",
acknowledgement = ack-nhfb,
affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
classification = "721; 722; 723",
fjournal = "Journal of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J401",
journalabr = "J Assoc Comput Mach",
keywords = "Algorithms; algorithms; automata theory --- Theorem
Proving; computer programming; computers, digital ---
Special Purpose Application; cryptography ---
Applications; data encryption; discrete mathematics;
integer lattice; measurement; public-key cryptosystems;
security; subset sum problems; theory; verification",
subject = "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
and Problems, Number-theoretic computations. {\bf E.3}:
Data, DATA ENCRYPTION. {\bf G.1.6}: Mathematics of
Computing, NUMERICAL ANALYSIS, Optimization, Integer
programming. {\bf G.2.m}: Mathematics of Computing,
DISCRETE MATHEMATICS, Miscellaneous.",
}
@MastersThesis{Lassek:1985:CCA,
author = "Teresa A. Lassek",
title = "Cryptology and the computer age",
type = "Thesis ({Honors})",
school = "University of Nebraska at Omaha",
address = "Omaha, NE, USA",
pages = "58",
year = "1985",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Computers --- Access control; Cryptography; Data
protection",
}
@InProceedings{Leighton:1985:HBC,
author = "Albert C. Leighton and Stephen M. Matyas",
title = "The History of Book Ciphers",
crossref = "Blakley:1985:ACP",
pages = "101--113",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=101",
acknowledgement = ack-nhfb,
}
@InProceedings{Leung:1985:SCT,
author = "A. K. Leung and S. E. Tavares",
title = "Sequence Complexity as a Test for Cryptographic
Systems",
crossref = "Blakley:1985:ACP",
pages = "468--474",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=468",
acknowledgement = ack-nhfb,
}
@InProceedings{Levin:1985:OWF,
author = "L. A. Levin",
title = "One-way functions and pseudorandom generators",
crossref = "ACM:1985:PSA",
pages = "363--365",
year = "1985",
bibdate = "Wed Feb 20 18:33:46 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.acm.org/pubs/contents/proceedings/series/stoc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/articles/proceedings/stoc/22145/p363-levin/p363-levin.pdf;
http://www.acm.org/pubs/citations/proceedings/stoc/22145/p363-levin/",
acknowledgement = ack-nhfb,
}
@Article{Lidl:1985:CBP,
author = "R. Lidl",
booktitle = "Advances in cryptology (Paris, 1984)",
title = "On cryptosystems based on polynomials and finite
fields",
journal = j-LECT-NOTES-COMP-SCI,
volume = "209",
pages = "10--15",
year = "1985",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60 (11T71)",
MRnumber = "87c:94041",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Mackinnon:1985:OAA,
author = "S. J. Mackinnon and P. D. Taylor and H. Meijer and S.
G. Akl",
title = "An Optimal Algorithm for Assigning Cryptographic Keys
to Control Access in a Hierarchy",
journal = j-IEEE-TRANS-COMPUT,
volume = "C-34",
number = "9",
pages = "797--802",
month = sep,
year = "1985",
CODEN = "ITCOB4",
DOI = "http://dx.doi.org/10.1109/TC.1985.1676635",
ISSN = "0018-9340 (print), 1557-9956 (electronic)",
ISSN-L = "0018-9340",
bibdate = "Sun Jul 10 08:33:28 MDT 2011",
bibsource = "http://www.computer.org/tc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib",
URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1676635",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Computers",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}
@Article{McIvor:1985:SC,
author = "R. McIvor",
title = "Smart cards",
journal = j-SCI-AMER,
volume = "253",
number = "5",
pages = "130--137",
month = nov,
year = "1985",
CODEN = "SCAMAC",
ISSN = "0036-8733 (print), 1946-7087 (electronic)",
ISSN-L = "0036-8733",
bibdate = "Mon May 18 08:08:24 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "B1265 (Digital electronics); C7120 (Financial
computing)",
fjournal = "Scientific American",
journal-URL = "http://www.nature.com/scientificamerican",
keywords = "credit cards; digital IC; digital integrated circuits;
EFTS; microelectronic chip; smart cards",
treatment = "G General Review",
}
@TechReport{Meijer:1985:MEN,
author = "Henk Meijer",
title = "Multiplication-permutation encryption networks",
type = "Technical report",
number = "85-171",
institution = "Department of Computing and Information Science,
Queen's University",
address = "Kingston, Ont., Canada",
pages = "15",
year = "1985",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Supported by the Natural Sciences and Engineering
Research Council of Canada.",
keywords = "Cryptography.",
}
@MastersThesis{Miller:1985:PES,
author = "Jay I. Miller",
title = "A private-key encryption system based on plane
geometry",
type = "Thesis ({M.S. in Computer Science})",
school = "University of Wisconsin-Milwaukee",
address = "Milwaukee, WI, USA",
pages = "iv + 33 + 115",
year = "1985",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography; Data protection; Geometry, Plane.",
}
@Article{Montgomery:1985:MMT,
author = "Peter L. Montgomery",
title = "Modular Multiplication Without Trial Division",
journal = j-MATH-COMPUT,
volume = "44",
number = "170",
pages = "519--521",
month = apr,
year = "1985",
CODEN = "MCMPAF",
DOI = "http://dx.doi.org/10.1090/S0025-5718-1985-0777282-X",
ISSN = "0025-5718 (print), 1088-6842 (electronic)",
ISSN-L = "0025-5718",
MRclass = "11Y16",
MRnumber = "86e:11121",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/mathcomp1980.bib;
JSTOR database",
URL = "http://www.ams.org/journals/mcom/1985-44-170/S0025-5718-1985-0777282-X/",
acknowledgement = ack-nhfb,
classcodes = "C1160 (Combinatorial mathematics); C5230 (Digital
arithmetic methods); C6130 (Data handling techniques)",
corpsource = "Syst. Dev. Corp., Santa Monica, CA, USA",
fjournal = "Mathematics of Computation",
journal-URL = "http://www.ams.org/mcom/",
keywords = "digital arithmetic; integer; integer arithmetic;
modular arithmetic; modular multiplication;
multiplication; N-residue; N-residue arithmetic; number
theory",
referencedin = "Referenced in \cite[Ref. 8]{Handschuh:1998:SCC}.",
treatment = "T Theoretical or Mathematical",
}
@Manual{NIST:1985:FPC,
author = "{NIST}",
title = "{FIPS PUB} 113: Computer Data Authentication",
organization = "National Institute of Standards and Technology
(formerly National Bureau of Standards)",
address = "Gaithersburg, MD, USA",
pages = "??",
day = "30",
month = may,
year = "1985",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 7]{Kaliski:1995:MAM}.",
}
@Book{NIST:1985:FPSa,
author = "{National Institute of Standards and Technology}",
title = "{FIPS PUB 112}: Standard for Password Usage",
publisher = pub-NIST,
address = pub-NIST:adr,
day = "30",
month = may,
year = "1985",
bibdate = "Mon Nov 27 08:37:27 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.itl.nist.gov/fipspubs/fip112.htm",
abstract = "The document specifies basic security criteria for two
different uses of passwords in an ADP system, (1)
personal identity authentication and (2) data access
authorization. It establishes the basic criteria for
the design, implementation and use of a password system
in those systems where passwords are used. It
identifies fundamental ADP management functions
pertaining to passwords and specifies some user actions
required to satisfy these functions. In addition, it
specifies several technical features which may be
implemented in an ADP system in order to support a
password system. An implementation schedule is
established for compliance with the Standard. Numerous
guidelines are provided in the Appendices for managers
and users seeking to comply with the Standard.",
acknowledgement = ack-nhfb,
keywords = "computer security; data security; passphrase;
password; personal identification; systems security.",
}
@Book{NIST:1985:FPSb,
author = "{National Institute of Standards and Technology}",
title = "{FIPS PUB 113}: Standard for Computer Data
Authentication",
publisher = pub-NIST,
address = pub-NIST:adr,
day = "30",
month = may,
year = "1985",
bibdate = "Mon Nov 27 08:37:27 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.itl.nist.gov/fipspubs/fip113.htm",
abstract = "his publication specifies a standard to be used by
Federal organizations which require that the integrity
of computer data be cryptographically authenticated. In
addition, it may be used by any organization whenever
cryptographic authentication is desired. Cryptographic
authentication of data during transmission between
electronic components or while in storage is necessary
to maintain the integrity of the information
represented by the data. The standard specifies a
cryptographic authentication algorithm for use in ADP
systems and networks. The authentication algorithm
makes use of the Data Encryption Standard (DES)
cryptographic algorithm as defined in Federal
Information Processing Standard 46 (FIPS PUB 46).",
acknowledgement = ack-nhfb,
keywords = "authentication; cryptography; data authentication
algorithm; Data Authentication Algorithm (DAA); Data
Encryption Standard (DES); data integrity; Federal
Information Processing Standard (FIPS)",
}
@InProceedings{Nobauer:1985:CRS,
author = "Rupert N{\"o}bauer",
booktitle = "Contributions to general algebra, 3 (Vienna, 1984)",
title = "Cryptanalysis of the {R{\'e}dei}-scheme",
publisher = "H{\"o}lder-Pichler-Tempsky",
address = "Vienna, Austria",
pages = "255--264",
year = "1985",
MRclass = "94A60 (11T71)",
MRnumber = "87b:94040",
bibdate = "Sat Oct 26 10:21:29 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}
@InProceedings{Odlyzko:1985:DLF,
author = "A. M. Odlyzko",
title = "Discrete logarithms in finite fields and their
cryptographic significance",
crossref = "Beth:1985:ACP",
pages = "224--314",
year = "1985",
DOI = "http://dx.doi.org/10.1007/3-540-39757-4_20",
bibdate = "Mon Jul 19 07:05:35 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.research.att.com/~amo/doc/arch/discrete.logs.pdf;
http://www.research.att.com/~amo/doc/arch/discrete.logs.ps;
http://www.research.att.com/~amo/doc/arch/discrete.logs.troff",
acknowledgement = ack-nhfb,
}
@InProceedings{Ong:1985:ESS,
author = "H. Ong and C. P. Schnorr and A. Shamir",
title = "Efficient Signature Schemes Based on Polynomial
Equations (preliminary version)",
crossref = "Blakley:1985:ACP",
pages = "37--46",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=37",
acknowledgement = ack-nhfb,
}
@MastersThesis{Parthasarathy:1985:DSG,
author = "Aiyaswamy Parthasarathy",
title = "Digital signature generator for cryptographic
applications",
type = "Thesis ({M.S.})",
school = "South Dakota School of Mines and Technology",
address = "Rapid City, SD, USA",
pages = "148",
year = "1985",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Code generators --- Computer programs; Communication
--- Code words; Cryptography --- Computer programs;
Generators (Computer programs); Telecommunication ---
Code words",
}
@PhdThesis{Peralta:1985:TRN,
author = "Rene Caupolican Peralta",
title = "Three results in number theory and cryptography: a new
algorithm to compute square roots modulo a prime
number; On the bit complexity of the discrete
logarithm; {A} framework for the study of
cryptoprotocols",
type = "Thesis ({Ph.D.})",
school = "Department of Computer Science, University of
California, Berkeley",
address = "Berkeley, CA, USA",
pages = "52",
month = dec,
year = "1985",
LCCN = "????",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "dissertations; dissertations, academic --- UCB ---
computer science --- 1981--1990; University of
California, Berkeley. computer science division --",
}
@InProceedings{Proctor:1985:SSC,
author = "Norman Proctor",
title = "A Self-Synchronizing Cascaded Cipher System with
Dynamic Control of Error Propagation",
crossref = "Blakley:1985:ACP",
pages = "174--190",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=174",
acknowledgement = ack-nhfb,
}
@InProceedings{Reeds:1985:NPR,
author = "J. A. Reeds and J. L. Manferdelli",
title = "{DES} has no Per Round Linear Factors",
crossref = "Blakley:1985:ACP",
pages = "377--389",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=377",
acknowledgement = ack-nhfb,
}
@Article{Reischuk:1985:NSB,
author = "R. Reischuk",
title = "A new solution to the {Byzantine} generals problem",
journal = j-INF-CONTROL,
pages = "23--42",
year = "1985",
CODEN = "IFCNA4",
ISSN = "0019-9958 (print), 1878-2981 (electronic)",
ISSN-L = "0019-9958",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Information and Control",
referencedin = "Referenced in \cite[Ref. 25]{Canetti:1997:PSL}.",
}
@InProceedings{Rivest:1985:RCP,
author = "Ronald L. Rivest",
title = "{RSA} chips (past\slash present\slash future)",
crossref = "Beth:1985:ACP",
pages = "159--163",
year = "1985",
DOI = "http://dx.doi.org/10.1007/3-540-39757-4_16",
bibdate = "Sun Mar 11 10:23:55 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@InProceedings{Ruggiu:1985:CCT,
author = "G. Ruggiu",
title = "Cryptology and complexity theories",
crossref = "Beth:1985:ACP",
pages = "3--9",
year = "1985",
DOI = "http://dx.doi.org/10.1007/3-540-39757-4_1",
bibdate = "Sun Mar 11 10:18:50 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@InCollection{Salomaa:1985:PKC,
author = "Arto Salomaa",
booktitle = "Parcella '84 (Berlin, 1984)",
title = "On a public-key cryptosystem based on parallel
rewriting",
volume = "25",
publisher = "Akademie-Verlag",
address = "Berlin",
pages = "209--214",
year = "1985",
MRclass = "68P25 (68Q50 94A60)",
MRnumber = "832 881",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Math. Res.",
}
@Book{Serpell:1985:CES,
author = "S. C. Serpell",
title = "Cryptographic equipment security: a code of practice",
publisher = "Institution of Electronic and Radio Engineers",
address = "London, UK",
pages = "25",
year = "1985",
ISBN = "0-903748-62-2 (paperback)",
ISBN-13 = "978-0-903748-62-9 (paperback)",
LCCN = "Z103.S47 1985",
bibdate = "Sat Nov 18 12:53:52 MST 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "cryptography -- equipment and supplies",
}
@InProceedings{Serpell:1985:PES,
author = "S. C. Serpell and C. B. Brookson and B. L. Clark",
title = "A Prototype Encryption System Using Public Key",
crossref = "Blakley:1985:ACP",
pages = "3--9",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=3",
acknowledgement = ack-nhfb,
}
@InProceedings{Shamir:1985:IBC,
author = "Adi Shamir",
title = "Identity-Based Cryptosystems and Signature Schemes",
crossref = "Blakley:1985:ACP",
pages = "47--53",
year = "1985",
MRclass = "94A60",
MRnumber = "820 012",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=47",
acknowledgement = ack-nhfb,
}
@Article{Siegenthaler:1985:DCS,
author = "T. Siegenthaler",
title = "Decrypting a Class of Stream Ciphers Using Ciphertext
Only",
journal = j-IEEE-TRANS-COMPUT,
volume = "C34",
pages = "81--85",
year = "1985",
CODEN = "ITCOB4",
ISSN = "0018-9340 (print), 1557-9956 (electronic)",
ISSN-L = "0018-9340",
bibdate = "Mon Nov 30 08:57:18 1998",
bibsource = "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "This paper breaks the cipher of
\cite{Geffe:1973:HPD}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Computers",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}
@InProceedings{Simmons:1985:ATC,
author = "Gustavus J. Simmons",
title = "Authentication Theory\slash Coding Theory",
crossref = "Blakley:1985:ACP",
pages = "411--431",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=411",
acknowledgement = ack-nhfb,
}
@InProceedings{Simmons:1985:SCD,
author = "Gustavus J. Simmons",
title = "The Subliminal Channel and Digital Signatures",
crossref = "Beth:1985:ACP",
pages = "364--378",
year = "1985",
DOI = "http://dx.doi.org/10.1007/3-540-39757-4_25",
bibdate = "Sat Dec 26 17:01:46 1998",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1002.html",
acknowledgement = ack-nhfb,
keywords = "information hiding; steganography",
}
@Article{Singh:1985:IPS,
author = "Kamaljit Singh",
title = "On improvements to password security",
journal = j-OPER-SYS-REV,
volume = "19",
number = "1",
pages = "53--60",
month = jan,
year = "1985",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:34 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Article{Smillie:1985:RFM,
author = "K. W. Smillie and F. L. Bauer and Ralph Erskine and
Henry S. Tropp",
title = "Reviews: {O. I. Franksen, Mr. Babbage's Secret}; {F.
H. Hinsley, British Intelligence in the Second World
War}; {T. M. Thompson, From Error-Correcting Codes
Through Sphere Packings to Simple Groups}; Capsule
Reviews",
journal = j-ANN-HIST-COMPUT,
volume = "7",
number = "2",
pages = "185--191",
month = apr # "\slash " # jun,
year = "1985",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:22 MST 2002",
bibsource = "http://www.computer.org/annals/an1985/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1985/pdf/a2185.pdf;
http://www.computer.org/annals/an1985/a2185abs.htm",
acknowledgement = ack-nhfb,
annote = "The Thompson book review describes Hamming's July 1947
work in developing error-correcting codes, and
Shannon's later use of them in work on information
theory.",
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@Misc{StJohns:1985:RAS,
author = "M. {St. Johns}",
title = "{RFC 931}: Authentication server",
day = "1",
month = jan,
year = "1985",
bibdate = "Fri Oct 17 17:15:44 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Obsoleted RFC1413 \cite{Johns:1993:RIP}. Obsoletes
RFC0912 \cite{Johns:1984:RAS}. Status: UNKNOWN.",
URL = "ftp://ftp.internic.net/rfc/rfc912.txt;
ftp://ftp.internic.net/rfc/rfc931.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc912.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt",
acknowledgement = ack-nhfb,
format = "TXT=8982 bytes",
obsoletedby = "Obsoleted RFC1413 \cite{Johns:1993:RIP}.",
obsoletes = "Obsoletes RFC0912 \cite{Johns:1984:RAS}.",
online = "yes",
status = "UNKNOWN",
}
@Article{Tao:1985:FAP,
author = "Ren Ji Tao and Shi Hua Chen",
title = "A finite automaton public key cryptosystem and digital
signatures",
journal = j-CHIN-J-COMPUTERS,
volume = "8",
number = "6",
pages = "401--409",
year = "1985",
CODEN = "JIXUDT",
ISSN = "0254-4164",
MRclass = "94A60 (68P25)",
MRnumber = "87c:94045",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Chinese Journal of Computers. Jisuanji Xuebao",
}
@InProceedings{Tedrick:1985:FES,
author = "Tom Tedrick",
title = "Fair Exchange of Secrets (extended abstract)",
crossref = "Blakley:1985:ACP",
pages = "434--438",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=434",
acknowledgement = ack-nhfb,
}
@TechReport{USGSA:1985:ISR,
author = "{United States. General Services Administration} and
{National Communications System (U.S.). Office of
Technology and Standards} and {National Institute of
Standards and Technology (U. S.)}",
title = "Interoperability and security requirements for use of
the {Data Encryption Standard} with {CCITT} group 3
facsimile equipment",
institution = "General Services Administration, Office of Information
Resources Management",
address = "Washington, DC, USA",
pages = "2",
day = "4",
month = apr,
year = "1985",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Federal standard 1028. {Federal} information
processing standards publication, {FIPS PUB} 141",
acknowledgement = ack-nhfb,
keywords = "Computers --- Access control --- Standards; Facsimile
transmission --- Standards.",
}
@Article{Vamos:1985:BRB,
author = "T. Vamos",
title = "Book Review: {{\booktitle{Mr. Babbage's secret. The
tale of a cypher --- and APL}}: Ole Immanuel
Franksen}",
journal = "Automatica",
volume = "21",
number = "5",
pages = "616",
month = sep,
year = "1985",
CODEN = "????",
DOI = "http://dx.doi.org/10.1016/0005-1098(85)90013-5",
ISSN = "????",
bibdate = "Mon Jan 14 21:51:21 MST 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.sciencedirect.com/science/article/pii/0005109885900135",
acknowledgement = ack-nhfb,
}
@InProceedings{Vazirani:1985:ESP,
author = "Umesh V. Vazirani and Vijay V. Vazirani",
title = "Efficient and Secure Pseudo-Random Number Generation
(Extended Abstract)",
crossref = "Blakley:1985:ACP",
pages = "193--202",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=193",
acknowledgement = ack-nhfb,
}
@InProceedings{Vogel:1985:LCC,
author = "Rainer Vogel",
title = "On the linear complexity of cascaded sequences",
crossref = "Beth:1985:ACP",
pages = "99--109",
year = "1985",
DOI = "http://dx.doi.org/10.1007/3-540-39757-4_11",
bibdate = "Mon Nov 30 09:03:36 1998",
bibsource = "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@InProceedings{Wagner:1985:PKC,
author = "Neal R. Wagner and Marianne R. Magyarik",
title = "A Public-Key Cryptosystem Based on the Word Problem",
crossref = "Blakley:1985:ACP",
pages = "19--36",
year = "1985",
MRclass = "94A60",
MRnumber = "87b:94042",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=19",
acknowledgement = ack-nhfb,
}
@Article{Weiss:1985:RCM,
author = "Eric A. Weiss and Henry S. Tropp and Ralph Erskine and
John A. N. Lee and Gwen Bell and M. R. Williams",
title = "Reviews: {The Computer Museum} and {J. Bernstein,
Three Degrees Above Zero: Bell Labs in the Information
Age} and {D. R. Hartree, Calculating Machines: Recent
and Prospective Developments and Their Impact on
Mathematical Physics, and, Calculating Instruments and
Machines} and {W. Kozaczuk, Enigma: How the German
Machine Cipher Was Broken and How It Was Read by the
Allies in World War Two} and {S. Levy, Hackers} and {A.
Osborne and J. Dvorak, Hypergrowth: The Rise and Fall
of Osborne Computer Corporation} and {E. W. Pugh,
Memories that Shaped an Industry} and Capsule Reviews",
journal = j-ANN-HIST-COMPUT,
volume = "7",
number = "3",
pages = "258--277",
month = jul # "\slash " # sep,
year = "1985",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:22 MST 2002",
bibsource = "http://www.computer.org/annals/an1985/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1985/pdf/a3258.pdf;
http://www.computer.org/annals/an1985/a3258abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@InProceedings{Williams:1985:SPK,
author = "H. C. Williams",
title = "Some Public-Key Crypto-Functions as Intractable as
Factorization",
crossref = "Blakley:1985:ACP",
pages = "66--70",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=66",
acknowledgement = ack-nhfb,
}
@InProceedings{Yung:1985:CSP,
author = "Mordechai Yung",
title = "Cryptoprotocols: Subscription to a Public Key, The
Secret Blocking and The Multi-Player Mental Poker Game
(extended abstract)",
crossref = "Blakley:1985:ACP",
pages = "439--453",
year = "1985",
bibdate = "Thu Feb 23 08:43:57 MST 2012",
bibsource = "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=439",
acknowledgement = ack-nhfb,
}
@Article{Yung:1985:SUK,
author = "Mordechai M. Yung",
title = "A secure and useful ``keyless cryptosystem''",
journal = j-INFO-PROC-LETT,
volume = "21",
number = "1",
pages = "35--38",
day = "10",
month = jul,
year = "1985",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "68P25",
MRnumber = "810 097",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
acknowledgement = ack-nhfb,
affiliationaddress = "Columbia Univ, Dep of Computer Science, New
York, NY, USA",
classification = "723; B6120B (Codes); C6130 (Data handling
techniques)",
corpsource = "Dept. of Comput. Sci., Columbia Univ., New York, NY,
USA",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "authentication; communication environments;
cryptography; data transmission; encryption; key
generation protocol; keyless cryptography; protocol;
protocols; security",
pubcountry = "Netherlands A08",
treatment = "P Practical",
}
@Article{Andrew:1986:CSI,
author = "Christopher Andrew",
title = "Codebreaking and Signals Intelligence",
journal = j-INTELL-NATL-SECUR,
volume = "1",
number = "1",
pages = "1--??",
year = "1986",
ISSN = "0268-4527 (print), 1743-9019 (electronic)",
ISSN-L = "0268-4527",
bibdate = "Wed Jan 16 10:21:32 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Intelligence and National Security",
journal-URL = "http://www.tandfonline.com/loi/fint20",
}
@Article{Andrew:1986:TCB,
author = "Christopher Andrew and Keith Neilson",
title = "{Tsarist} Codebreakers and {British} Codes",
journal = j-INTELL-NATL-SECUR,
volume = "1",
number = "1",
pages = "6--??",
year = "1986",
ISSN = "0268-4527 (print), 1743-9019 (electronic)",
ISSN-L = "0268-4527",
bibdate = "Wed Jan 16 10:21:32 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Intelligence and National Security",
journal-URL = "http://www.tandfonline.com/loi/fint20",
}
@Book{ATT:1986:AUS,
author = "AT{\&T}",
key = "ATT",
title = "{AT\&T UNIX} System Readings and Applications",
volume = "II",
publisher = pub-PH,
address = pub-PH:adr,
pages = "xii + 324",
year = "1986",
ISBN = "0-13-939845-7",
ISBN-13 = "978-0-13-939845-2",
LCCN = "QA76.76.O63 U553 1986",
bibdate = "Sat Oct 28 08:25:58 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
xxnote = "NB: special form AT{\&T} required to get correct
alpha-style labels.",
}
@Article{Benois:1986:CSE,
author = "Mich{\`e}le Benois and Jacques Sakarovitch",
title = "On the Complexity of Some Extended Word Problems
Defined by Cancellation Rules",
journal = j-INFO-PROC-LETT,
volume = "23",
number = "6",
pages = "281--287",
day = "3",
month = dec,
year = "1986",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "68Q45 (03D03 03D15 03D40 20M05 68Q25)",
MRnumber = "88d:68046",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
acknowledgement = ack-nhfb,
affiliationaddress = "IMAG Grenoble, St. Martin d'Heres, Fr",
classification = "721; 723; C4220 (Automata theory); C4240
(Programming and algorithm theory)",
corpsource = "IMAG Grenoble, St. Martin d'Heres, France",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "algorithm; algorithms; automata theory; automaton
recognising; cancellation rules; complexity bounds;
computational complexity; computer programming ---
Algorithms; cryptography; descendants; extended word
problems; Formal Languages; languages; public key
encryption; regular set; theory; Thue systems;
verification",
pubcountry = "Netherlands A02",
subject = "F.1.1 Theory of Computation, COMPUTATION BY ABSTRACT
DEVICES, Models of Computation, Automata \\ F.4.2
Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
LANGUAGES, Grammars and Other Rewriting Systems, Thue
systems",
treatment = "T Theoretical or Mathematical",
}
@Article{Birnbaum:1986:VPS,
author = "Martha Birnbaum and Larry A. Cohen and Frank X.
Welsh",
title = "Voice password system for access security",
journal = j-ATT-TECH-J,
volume = "65",
number = "5",
pages = "68--74",
month = sep,
year = "1986",
CODEN = "ATJOEM",
ISSN = "8756-2324",
bibdate = "Fri Nov 12 13:09:16 2010",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "A voice password system for access security using
speaker verification technology has been designed for
use over dial-up telephone lines. The voice password
system (VPS) can provide secure access to telephone
networks, computers, rooms, and buildings. It also has
application in office automation systems, electronic
funds transfer, and 'Smart Cards' (interactive
computers embedded in credit-card-sized packages). As
increasing attention is focused on access security in
the public, private, and government sectors, the voice
password system can provide a timely solution to the
security dilemma. The VPS uses modes of communication
available to almost everyone (the human voice and the
telephone). A user calls the VPS, enters his or her
identification number (ID) by touch-tone telephone, and
then speaks a password. This is usually a phrase or
sentence of about seven syllables.",
acknowledgement = ack-nhfb,
fjournal = "AT\&T Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
keywords = "data processing --- security of data; telephone
interference",
subject = "access security; speaker verification technology;
Voice Password System (VPS)",
topic = "speech",
}
@Book{Boyd:1986:CPC,
author = "Waldo T. Boyd",
title = "Cryptology and the personal computer: with programming
in {Basic}",
volume = "47",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "157",
year = "1986",
ISBN = "0-89412-145-6 (hardcover), 0-89412-144-8 (paperback)",
ISBN-13 = "978-0-89412-145-6 (hardcover), 978-0-89412-144-9
(paperback)",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic Series",
acknowledgement = ack-nhfb,
keywords = "Cryptography.",
}
@InProceedings{Brickell:1986:CKC,
author = "Ernest F. Brickell",
title = "The cryptanalysis of knapsack cryptosystems",
crossref = "Ringeisen:1986:ADM",
pages = "3--23",
year = "1986",
MRclass = "94A60 (11T71 90C09)",
MRnumber = "90f:94026",
MRreviewer = "Harald Niederreiter",
bibdate = "Tue Feb 9 11:14:49 MST 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Brooke:1986:BRB,
author = "N. Michael Brooke",
title = "Book Review: {{\booktitle{Mr. Babbage's secret: the
tale of a Cypher --- and APL}}: O. I. Franksen.
Strandbergs Forlag, Denmark (1984). 320 pp. Dkr.
320.00. ISBN: 87-872-0086-4}",
journal = j-INFO-PROC-MAN,
volume = "22",
number = "1",
pages = "67--68",
month = "????",
year = "1986",
CODEN = "IPMADK",
DOI = "http://dx.doi.org/10.1016/0306-4573(86)90018-X",
ISSN = "0306-4573 (print), 1873-5371 (electronic)",
ISSN-L = "0306-4573",
bibdate = "Mon Jan 14 21:51:21 MST 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.sciencedirect.com/science/article/pii/030645738690018X",
acknowledgement = ack-nhfb,
fjournal = "Information Processing and Management",
}
@Article{Chang:1986:DKL,
author = "C. C. Chang",
title = "On the Design of a Key-Lock-Pair Mechanism in
Information Protection Systems",
journal = j-BIT,
volume = "26",
number = "4",
pages = "410--417",
year = "1986",
CODEN = "BITTEL, NBITAB",
ISSN = "0006-3835 (print), 1572-9125 (electronic)",
ISSN-L = "0006-3835",
bibdate = "Thu Nov 12 18:12:56 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "BIT (Nordisk tidskrift for informationsbehandling)",
journal-URL = "http://link.springer.com/journal/10543",
}
@Article{Chapman:1986:NFS,
author = "J. W. M. Chapman",
title = "No Final Solution: a Survey of the Cryptanalytical
Capabilities of {German} Military Agencies, 1926--35",
journal = j-INTELL-NATL-SECUR,
volume = "1",
number = "1",
pages = "13--??",
year = "1986",
ISSN = "0268-4527 (print), 1743-9019 (electronic)",
ISSN-L = "0268-4527",
bibdate = "Wed Jan 16 10:21:32 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Intelligence and National Security",
journal-URL = "http://www.tandfonline.com/loi/fint20",
}
@Article{Chaum:1986:CRN,
author = "David Chaum and Jan-Hendrik Evertse",
booktitle = "Advances in cryptology---CRYPTO '85 (Santa Barbara,
Calif., 1985)",
title = "Cryptanalysis of {DES} with a reduced number of
rounds: sequences of linear factors in block ciphers",
journal = j-LECT-NOTES-COMP-SCI,
volume = "218",
publisher = pub-SV,
address = pub-SV:adr,
pages = "192--211",
year = "1986",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60",
MRnumber = "88a:94023",
MRreviewer = "Albrecht Beutelspacher",
bibdate = "Sat Oct 26 10:21:29 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@Book{Chor:1986:TIP,
author = "Ben-Zion Chor",
title = "Two issues in public key cryptography: {RSA} bit
security and a new knapsack type system",
publisher = pub-MIT,
address = pub-MIT:adr,
pages = "78",
year = "1986",
ISBN = "0-262-03121-3",
ISBN-13 = "978-0-262-03121-9",
LCCN = "TK5102.5 .C4781 1986",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Originally presented as the author's thesis (doctoral
--- MIT, 1985)",
series = "ACM distinguished dissertations",
acknowledgement = ack-nhfb,
keywords = "cryptography; telecommunication --- security
measures",
}
@Article{Ciarcia:1986:BHD,
author = "Steve Ciarcia",
title = "Build a Hardware Data Encryptor",
journal = j-BYTE,
volume = "11",
number = "??",
pages = "??--??",
month = "??",
year = "1986",
CODEN = "BYTEDJ",
ISSN = "0360-5280",
ISSN-L = "0360-5280",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "BYTE Magazine",
}
@Article{Coppersmith:1986:DL,
author = "Don Coppersmith and Andrew M. Odlyzko and Richard
Schroeppel",
title = "Discrete logarithms in {$ {\rm GF}(p) $}",
journal = j-ALGORITHMICA,
volume = "1",
number = "1",
pages = "1--15",
year = "1986",
CODEN = "ALGOEJ",
ISSN = "0178-4617 (print), 1432-0541 (electronic)",
ISSN-L = "0178-4617",
MRclass = "11T71 (11Y16)",
MRnumber = "MR833115 (87g:11167)",
MRreviewer = "Jacques Calmet",
bibdate = "Mon Jan 22 05:26:07 MST 2001",
bibsource = "dblp-journals-algorithmica.bib;
http://dblp.uni-trier.de/db/journals/algorithmica/algorithmica1.html#CoppersmithOS86;
http://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
acknowledgement = ack-nhfb,
fjournal = "Algorithmica. An International Journal in Computer
Science",
journal-URL = "http://link.springer.com/journal/453",
oldlabel = "CoppersmithOS86",
XMLdata = "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/algorithmica/CoppersmithOS86",
}
@Book{Courville:1986:MCC,
author = "Joseph B. Courville",
title = "Manual for cryptanalysis of the columnar double
transposition cipher: a study of cryptanalysis",
publisher = "J. B. Courville",
address = "10240 Virginia Ave, South Gate, CA, 90280, USA",
pages = "iv + 91",
year = "1986",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Ciphers; Cryptography",
}
@InProceedings{deJonge:1986:ASR,
author = "W. {de Jonge} and D. Chaum",
title = "Attacks on some {RSA} signatures",
crossref = "Williams:1986:ACC",
pages = "18--27",
year = "1986",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 6]{Kaliski:1995:SUR}.",
}
@Article{Denniston:1986:GCC,
author = "A. G. Denniston",
title = "The {Government Code and Cypher School} Between the
{Wars}",
journal = j-INTELL-NATL-SECUR,
volume = "1",
number = "1",
pages = "48--??",
year = "1986",
ISSN = "0268-4527 (print), 1743-9019 (electronic)",
ISSN-L = "0268-4527",
bibdate = "Wed Jan 16 10:21:32 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Intelligence and National Security",
journal-URL = "http://www.tandfonline.com/loi/fint20",
}
@InProceedings{Desmedt:1986:CTA,
author = "Y. G. Desmedt and A. M. Odlyzko",
title = "A chosen text attack on the {RSA} cryptosystem and
some discrete logarithm schemes",
crossref = "Williams:1986:ACC",
pages = "516--522",
year = "1986",
bibdate = "Mon Jul 19 07:00:30 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.research.att.com/~amo/doc/arch/rsa.attack.pdf;
http://www.research.att.com/~amo/doc/arch/rsa.attack.ps;
http://www.research.att.com/~amo/doc/arch/rsa.attack.troff",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 7]{Kaliski:1995:SUR}.",
}
@Article{Franksen:1986:SHM,
author = "O. I. Franksen",
title = "The secret hobby of {Mr. Babbage}",
journal = "Systems Anal. Modelling Simulation",
volume = "3",
number = "2",
pages = "183--194",
year = "1986",
ISSN = "0232-9298",
MRclass = "01A55 (94-03)",
MRnumber = "846173 (87h:01035)",
MRreviewer = "Garry J. Tee",
bibdate = "Tue Jan 15 11:49:13 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Systems Analysis Modelling Simulation. Journal of
Mathematical Modelling and Simulation in Systems
Analysis",
}
@Book{Gleason:1986:ECP,
author = "Andrew M. Gleason",
title = "Elementary course in probability for the
cryptanalyst",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "????",
year = "1986",
ISBN = "0-89412-098-0",
ISBN-13 = "978-0-89412-098-5",
LCCN = "????",
bibdate = "Wed May 11 23:23:17 MDT 2011",
bibsource = "fsz3950.oclc.org:210/WorldCat;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Goldreich:1986:HCR,
author = "Oded Goldreich and Shafi Goldwasser and Silvio
Micali",
title = "How to Construct Random Functions",
journal = j-J-ACM,
volume = "33",
number = "4",
pages = "792--807",
month = oct,
year = "1986",
CODEN = "JACOAH",
ISSN = "0004-5411",
ISSN-L = "0004-5411",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/jacm.bib",
note = "A computational complexity measure of the randomness
of functions is introduced, and, assuming the existence
of one-way functions, a pseudo-random function
generator is presented.",
URL = "http://www.acm.org/pubs/toc/Abstracts/0004-5411/6503.html",
abstract = "A constructive theory of randomness for functions,
based on computational complexity, is developed, and a
pseudorandom function generator is presented. The
generator is a deterministic polynomial-time algorithm
that transforms pairs (g, r), where g is any one-way
function and r is a random k-bit string, to
polynomial-time computable functions that cannot be
distinguished from random functions by any
probabilistic polynomial-time algorithm that asks and
receives the value of a function at arguments of its
choice. The result has applications in cryptography,
random constructions, and complexity theory.",
acknowledgement = ack-nhfb,
affiliationaddress = "MIT, Cambridge, MA, USA",
classification = "723; 922",
fjournal = "Journal of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J401",
journalabr = "J Assoc Comput Mach",
keywords = "algorithms; computational complexity; computer
metatheory; computer programming --- Algorithms;
cryptography; probability; pseudorandom function
generator; random functions; Random Processes;
security; theory",
referencedin = "Referenced in \cite[Ref. 14]{Goldreich:1997:FMCb}.",
subject = "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
ABSTRACT DEVICES, Complexity Classes. {\bf F.1.1}:
Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
Models of Computation. {\bf F.1.2}: Theory of
Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
Computation, Probabilistic computation. {\bf G.3}:
Mathematics of Computing, PROBABILITY AND STATISTICS,
Probabilistic algorithms (including Monte Carlo). {\bf
G.3}: Mathematics of Computing, PROBABILITY AND
STATISTICS, Random number generation.",
}
@Book{Hamming:1986:CIT,
author = "R. W. (Richard Wesley) Hamming",
title = "Coding and information theory",
publisher = pub-PH,
address = pub-PH:adr,
edition = "Second",
pages = "xii + 259",
year = "1986",
ISBN = "0-13-139072-4",
ISBN-13 = "978-0-13-139072-0",
LCCN = "QA268 .H35 1986",
bibdate = "Fri Jun 24 21:02:55 MDT 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
price = "US\$36.95",
acknowledgement = ack-nhfb,
subject = "Coding theory; Information theory",
}
@Book{IEE:1986:CEC,
author = "{IEE}",
title = "Colloquium on {``Encryption for Cable and DBS'':
Wednesday, 19 February 1986}",
volume = "1986/24",
publisher = "Institution of Electrical Engineers",
address = "London, UK",
pages = "various",
year = "1986",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Imai:1986:AMC,
author = "Hideki Imai and Tsutomu Matsumoto",
booktitle = "Algebraic algorithms and error correcting codes
(Grenoble, 1985)",
title = "Algebraic methods for constructing asymmetric
cryptosystems",
journal = j-LECT-NOTES-COMP-SCI,
volume = "229",
pages = "108--119",
year = "1986",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60",
MRnumber = "88f:94031",
MRreviewer = "Willi Meier",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Jeffery:1986:GCC,
author = "Keith Jeffery",
title = "The {Government Code and Cypher School}; {A}
Memorandum by {Lord Curzon}",
journal = j-INTELL-NATL-SECUR,
volume = "1",
number = "3",
pages = "454--??",
year = "1986",
ISSN = "0268-4527 (print), 1743-9019 (electronic)",
ISSN-L = "0268-4527",
bibdate = "Wed Jan 16 10:21:32 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Intelligence and National Security",
journal-URL = "http://www.tandfonline.com/loi/fint20",
}
@MastersThesis{Jones:1986:DEB,
author = "John W. Jones",
title = "Data encryption based on the logarithm problem",
type = "Thesis ({M.A.Sc.})",
publisher = "National Library of Canada",
school = "University of Ottawa",
address = "Ottawa, ON, Canada",
year = "1986",
ISBN = "0-315-33330-8",
ISBN-13 = "978-0-315-33330-7",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "2 microfiches (103 fr.)",
series = "Canadian theses = Th{\`e}ses canadiennes",
acknowledgement = ack-nhfb,
}
@Article{Koopman:1986:OES,
author = "Raymond F. Koopman",
title = "The orders of equidistribution of subsequences of some
asymptotically random sequences",
journal = j-CACM,
volume = "29",
number = "8",
pages = "802--806",
month = aug,
year = "1986",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu May 30 09:41:10 MDT 1996",
bibsource = "http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6431.html",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
review = "ACM CR 8704-0294",
subject = "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
STATISTICS, Random number generation. {\bf G.2.1}:
Mathematics of Computing, DISCRETE MATHEMATICS,
Combinatorics. {\bf F.2.1}: Theory of Computation,
ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
Numerical Algorithms and Problems. {\bf E.3}: Data,
DATA ENCRYPTION.",
}
@Book{Kranakis:1986:PC,
author = "Evangelos Kranakis",
title = "Primality and cryptography",
publisher = pub-WILEY,
address = pub-WILEY:adr,
pages = "xv + 235",
year = "1986",
ISBN = "0-471-90934-3",
ISBN-13 = "978-0-471-90934-7",
LCCN = "TK5102.5 .K661 1986",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "US\$38.00",
series = "Wiley-Teubner series in computer science",
acknowledgement = ack-nhfb,
keywords = "cryptography; numbers, prime; telecommunication ---
security measures",
}
@InProceedings{Luby:1986:PRP,
author = "M. Luby and C. Rackoff",
title = "Pseudo-random permutation generators and cryptographic
composition",
crossref = "ACM:1986:PEA",
pages = "356--363",
year = "1986",
bibdate = "Wed Feb 20 18:33:46 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.acm.org/pubs/contents/proceedings/series/stoc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://www.acm.org/pubs/articles/proceedings/stoc/12130/p356-luby/p356-luby.pdf;
http://www.acm.org/pubs/citations/proceedings/stoc/12130/p356-luby/",
acknowledgement = ack-nhfb,
}
@Book{Mevis:1986:SCP,
author = "Howard Mevis and Janet Plant",
title = "Satellite communications: a practical guide to
satellite {TV} encryption with tips on installing
decoders, solving reception problems, and upgrading
{TVROs}",
publisher = "American Hospital Association, Media Center",
address = "Chicago, IL, USA",
pages = "25",
year = "1986",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Telecommunications",
}
@InProceedings{Miller:1986:UEC,
author = "V. S. Miller",
title = "Uses of Elliptic Curves in Cryptography",
crossref = "Williams:1986:ACC",
pages = "417--426",
year = "1986",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 5]{Wiener:1998:PCP},
\cite[Ref. 7]{Handschuh:1998:SCC}.",
xxnote = "Check pages: one reference has 417--428??",
xxtitle = "Use of Elliptic Curves in Cryptography",
}
@Article{Milner-Barry:1986:ADL,
author = "P. S. Milner-Barry",
title = "{`Action This Day'}: The Letter from {Bletchley Park}
Cryptanalysts to the {Prime Minister}, {21 October
1941}",
journal = j-INTELL-NATL-SECUR,
volume = "1",
number = "2",
pages = "??--??",
year = "1986",
ISSN = "0268-4527 (print), 1743-9019 (electronic)",
ISSN-L = "0268-4527",
bibdate = "Wed Jan 16 10:21:32 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Intelligence and National Security",
journal-URL = "http://www.tandfonline.com/loi/fint20",
}
@Article{Mullender:1986:DCD,
author = "S. J. Mullender and A. S. Tanenbaum",
title = "The design of a capability-based distributed operating
system",
journal = j-COMP-J,
volume = "29",
number = "4",
pages = "289--299",
month = aug,
year = "1986",
CODEN = "CMPJA6",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Mar 25 13:51:56 MST 1997",
bibsource = "Compendex database; Distributed/amoeba.bib;
Distributed/clusters.bib;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/;
Misc/IMMD_IV.bib",
URL = "http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/289.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/290.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/291.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/292.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/293.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/294.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/295.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/296.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/297.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/298.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/299.tif",
abstract = "Fifth-generation computer systems will use large
numbers of processors to achieve high performance. In
this paper a capability-based operating system designed
for this environment is discussed. Capability-based
operating systems have traditionally required large,
complex kernels to manage the use of capabilities. In
our proposal, capability management is done entirely by
user programs without giving up any of the protection
aspects normally associated with capabilities. The
basic idea is to use one-way functions and encryption
to protect sensitive information. Various aspects of
the proposed system are discussed.",
acknowledgement = ack-nhfb,
affiliation = "Cent for Mathematics \& Computer Science, Amsterdam,
Neth",
affiliationaddress = "Cent for Mathematics \& Computer Science,
Amsterdam, Neth",
classcodes = "C6130 (Data handling techniques); C6150J (Operating
systems)",
classification = "722; 723",
corpsource = "Centre for Math. and Comput. Sci., Amsterdam,
Netherlands",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "(computers); Amoeba Capabilities; capability
management; capability-based distributed operating
systems; capability-based operating system; computer
networks --- Protocols; computer operating systems;
computer systems, digital --- Distributed;
cryptography; data protection; distributed; distributed
processing; encryption; fifth generation systems;
fifth-generation computers; information; operating
system; operating systems; sensitive; user programs",
treatment = "P Practical",
}
@Article{Muller:1986:CDS,
author = "Winfried B. M{\"u}ller and Rupert N{\"o}bauer",
booktitle = "Advances in cryptology---EUROCRYPT '85 (Linz, 1985)",
title = "Cryptanalysis of the {Dickson}-scheme",
journal = j-LECT-NOTES-COMP-SCI,
volume = "219",
publisher = pub-SV,
address = pub-SV:adr,
pages = "50--61",
year = "1986",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60 (11T71 11Y16)",
MRnumber = "851 582",
bibdate = "Sat Oct 26 10:21:29 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Niederreiter:1986:KTC,
author = "H. Niederreiter",
title = "Knapsack-type cryptosystems and algebraic coding
theory",
journal = "Problems Control Inform. Theory/Problemy Upravlen.
Teor. Inform.",
volume = "15",
number = "2",
pages = "159--166",
year = "1986",
CODEN = "PUTIAI",
ISSN = "0370-2529",
MRclass = "94A60 (11K55 11T71 94B05)",
MRnumber = "88a:94025",
MRreviewer = "Willi Meier",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Problems of Control and Information Theory. Problemy
Upravlenija i Teorii Informacii",
}
@Article{ONeil:1986:ETM,
author = "Patrick E. O'Neil",
title = "The {Escrow} Transactional Method",
journal = j-TODS,
volume = "11",
number = "4",
pages = "405--430",
month = dec,
year = "1986",
CODEN = "ATDSD3",
ISSN = "0362-5915 (print), 1557-4644 (electronic)",
ISSN-L = "0362-5915",
bibdate = "Sat Apr 14 10:34:48 MDT 2001",
bibsource = "Compendex database; Database/Graefe.bib;
Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/articles/journals/tods/1986-11-4/p405-o_neil/p405-o_neil.pdf;
http://www.acm.org/pubs/citations/journals/tods/1986-11-4/p405-o_neil/;
http://www.acm.org/pubs/toc/Abstracts/tods/7265.html",
abstract = "A method is presented for permitting record updates by
long-lived transactions without forbidding simultaneous
access by other users to records modified. Earlier
methods presented separately by Gawlick and Reuter are
comparable but concentrate on ``hot-spot'' situations,
where even short transactions cannot lock frequently
accessed fields without causing bottlenecks. The Escrow
Method offered here is designed to support nonblocking
record updates by transactions that are ``long lived''
and thus require long periods to complete.
Recoverability of intermediate results prior to commit
thus becomes a design goal, so that updates as of a
given time can be guaranteed against memory or media
failure while still retaining the prerogative to abort.
This guarantee basically completes phase one of a
two-phase commit, and several advantages result: (1) As
with Gawlick's and Reuter's methods, high-concurrency
items in the database will not act as a bottleneck; (2)
transaction commit of different updates can be
performed asynchronously, allowing natural distributed
transactions; indeed, distributed transactions in the
presence of delayed messages or occasional line
disconnection become feasible in a way that we argue
will tie up minimal resources for the purpose intended;
and (3) it becomes natural to allow for human
interaction in the middle of a transaction without loss
of concurrent access or any special difficulty for the
application programmer. The Escrow Method, like
Gawlick's Fast Path and Reuter's Method, requires the
database system to be an ``expert'' about the type of
transactional updates performed, most commonly updates
involving incremental changes to aggregate quantities.
However, the Escrow Method is extendable to other types
of updates.",
acknowledgement = ack-nhfb,
affiliation = "Computer Corp of America, Cambridge, MA, USA",
affiliationaddress = "Computer Corp of America, Cambridge, MA, USA",
annote = "For aggregate values (counts, sum) concurrency control
can use soft tolerances and keep them in escrow",
classification = "723",
fjournal = "ACM Transactions on Database Systems",
generalterms = "Algorithms; Design; Performance; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J777",
keywords = "database systems; design; escrow transactional method;
long-lived transactions; multiuser environment, locking
quantities, not variables TODS, algorithms; nested
transactions; performance; theory; two-phase commit",
subject = "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
Management, Concurrency. {\bf D.4.1}: Software,
OPERATING SYSTEMS, Process Management, Deadlocks. {\bf
H.2.2}: Information Systems, DATABASE MANAGEMENT,
Physical Design, Recovery and restart. {\bf H.2.4}:
Information Systems, DATABASE MANAGEMENT, Systems,
Distributed systems. {\bf H.2.4}: Information Systems,
DATABASE MANAGEMENT, Systems, Escrow. {\bf H.2.4}:
Information Systems, DATABASE MANAGEMENT, Systems,
Transaction processing.",
}
@InProceedings{Pfitzmann:1986:NUO,
author = "A. Pfitzmann and M. Waidner",
title = "Networks Without User Observability --- Design
Options",
crossref = "Pichler:1986:ACE",
pages = "????",
year = "1986",
bibdate = "Sat Dec 26 17:01:46 1998",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1020.html",
acknowledgement = ack-nhfb,
keywords = "information hiding; steganography",
}
@MastersThesis{Roy:1986:CBI,
author = "Marc Paul Roy",
title = "A {CMOS} bit-slice implementation of the {RSA} public
key encryption algorithm",
type = "Thesis ({M.Sc.(Eng.)})",
publisher = "National Library of Canada",
school = "Queen's University",
address = "Ottawa, ON, Canada",
year = "1986",
ISBN = "0-315-30418-9",
ISBN-13 = "978-0-315-30418-5",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "3 microfiches (210 fr.)",
series = "Canadian theses = Th{\`e}ses canadiennes",
acknowledgement = ack-nhfb,
}
@Article{Rytter:1986:SCU,
author = "Wojciech Rytter",
title = "The Space Complexity of the Unique Decipherability
Problem",
journal = j-INFO-PROC-LETT,
volume = "23",
number = "1",
pages = "1--3",
day = "20",
month = jul,
year = "1986",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliationaddress = "Univ of Salerno, Italy",
classification = "723; C4210 (Formal logic); C4240 (Programming and
algorithm theory)",
corpsource = "Inst. of Inf., Warsaw Univ., Poland",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "algorithms; alphabet; code-set; codewords;
computational complexity; computer metatheory;
decomposition; formal languages; graph accessibility
problem; languages; nonunique decipherability; space
complexity; theory; unique decipherability problem;
uniquely decipherable; verification",
pubcountry = "Netherlands A01",
subject = "F.1.1 Theory of Computation, COMPUTATION BY ABSTRACT
DEVICES, Models of Computation, Automata \\ F.4.3
Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
LANGUAGES, Formal Languages, Algebraic language theory
\\ D.3.3 Software, PROGRAMMING LANGUAGES, Language
Constructs, Abstract data types",
treatment = "T Theoretical or Mathematical",
}
@Article{Salomaa:1986:PCB,
author = "A. Salomaa and S. Yu",
title = "On a public-key cryptosystem based on iterated
morphisms and substitutions",
journal = j-THEOR-COMP-SCI,
volume = "48",
number = "2-3",
pages = "283--296",
month = "????",
year = "1986",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
bibdate = "Sat Nov 22 13:29:49 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes); C1260 (Information theory); C4210
(Formal logic); C4290 (Other computer theory)",
corpsource = "Dept. of Math., Turku Univ., Finland",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975",
keywords = "backward determinism; context-free languages;
cryptoanalysis; cryptography; DT0L system; growth;
iterated morphisms; L systems; mathematics; plaintext
blocksize; preprocessing; Salomaa-Welzl public-key
cryptosystem; substitutions",
pubcountry = "Netherlands A09",
treatment = "T Theoretical or Mathematical",
}
@Article{Salomaa:1986:PKC,
author = "Arto Salomaa and Sheng Yu",
title = "On a public-key cryptosystem based on iterated
morphisms and substitutions",
journal = j-THEOR-COMP-SCI,
volume = "48",
number = "2-3",
pages = "283--296 (1987)",
year = "1986",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
MRclass = "68Q99 (68P25 68Q45 94A60)",
MRnumber = "88j:68143",
MRreviewer = "J{\"u}rgen Dassow",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975",
}
@Article{Sansom:1986:BRC,
author = "Robert Sansom",
title = "Book Review: {{\em Computer Security: A Global
Challenge --- Proceedings of the Second IFIP
International Conference on Computer Security,
IFIP\slash Sec'84, Toronto, Ontario, Canada, 10--12
September, 1984\/}: (Elsevier Science Publishing Co.
1984)}",
journal = j-OPER-SYS-REV,
volume = "20",
number = "3",
pages = "9--9",
month = jul,
year = "1986",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:45 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Article{Scacchitti:1986:CT,
author = "Fred A. Scacchitti",
title = "The Cryptographer's Toolbox",
journal = j-DDJ,
volume = "11",
number = "5",
pages = "58--??",
month = may,
year = "1986",
CODEN = "DDJOEB",
ISSN = "1044-789X",
bibdate = "Mon Sep 2 09:09:39 MDT 1996",
bibsource = "http://www.ddj.com/index/author/index.htm;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Dr. Dobb's Journal of Software Tools",
}
@Book{Schroeder:1986:NTS,
author = "M. R. (Manfred Robert) Schroeder",
title = "Number theory in science and communication: with
applications in cryptography, physics, digital
information, computing, and self-similarity",
volume = "7",
publisher = pub-SV,
address = pub-SV:adr,
edition = "Second enlarged",
pages = "xix + 374",
year = "1986",
ISBN = "0-387-15800-6",
ISBN-13 = "978-0-387-15800-6",
LCCN = "QA241 .S3181 1986",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Springer series in information sciences",
acknowledgement = ack-nhfb,
keywords = "number theory",
}
@Book{Sears:1986:SWK,
author = "Peter Sears",
title = "Secret writing: keys to the mysteries of reading and
writing",
publisher = "Teachers and Writers Collaborative",
address = "New York, NY, USA",
pages = "xv + 160",
year = "1986",
ISBN = "0-915924-86-2 (paperback)",
ISBN-13 = "978-0-915924-86-8 (paperback)",
LCCN = "Z 103.3 S4 1986 Resources for Teaching--2nd Floor",
bibdate = "Wed Nov 25 14:23:25 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Discusses secret writing, ciphers, and the processes
of creating and deciphering secret or difficult
languages. Includes thinking and writing exercises.",
price = "US\$9.95",
acknowledgement = ack-nhfb,
keywords = "ciphers --- juvenile literature; cryptography ---
juvenile literature; language and languages ---
juvenile literature",
}
@InProceedings{Shamir:1986:SPS,
author = "A. Shamir",
title = "The search for provably secure identification
schemes",
crossref = "Gleason:1987:PIC",
volume = "2",
pages = "1488--1495",
year = "1986",
bibdate = "Sun Mar 11 11:15:35 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
ZMnumber = "Zbl 0685.94004",
acknowledgement = ack-nhfb,
}
@PhdThesis{Sherman:1986:CVT,
author = "Alan T. Sherman",
title = "Cryptology and {VLSI} (a two-part dissertation). {I},
{II}, Detecting and exploiting algebraic weaknesses in
cryptosystems. Algorithms for placing modules on a
custom {VLSI} chip",
type = "Thesis ({Ph.D.})",
number = "MIT/LCS/TR-381",
school = "Laboratory for Computer Science, Massachusetts
Institute of Technology",
address = "Cambridge, MA, USA",
pages = "221",
month = oct,
year = "1986",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Supervised by Ronald Linn Rivest",
acknowledgement = ack-nhfb,
keywords = "Algorithms; Cryptography --- Data processing;
Integrated circuits --- Very large scale integration",
}
@InCollection{Siromoney:1986:PKC,
author = "Rani Siromoney and Gift Siromoney",
booktitle = "Workshop on Mathematics of Computer Algorithms
(Madras, 1986)",
title = "A public key cryptosystem that defies cryptanalysis",
volume = "111",
publisher = "Inst. Math. Sci.",
address = "Madras",
pages = "D.3.17, 4",
year = "1986",
MRclass = "68P25",
MRnumber = "970 342",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "IMS Rep.",
}
@Article{Smillie:1986:RWA,
author = "K. W. Smillie and Ralph Erskine",
title = "Reviews: {W. Aspray, Should the Term Fifth Generation
Computers Be Banned?}; {C. A. Deavours and L. Kruh,
Machine Cryptography and Modern Cryptanalysis}; Capsule
Reviews",
journal = j-ANN-HIST-COMPUT,
volume = "8",
number = "2",
pages = "199--200, 202, 204--205",
month = apr # "\slash " # jun,
year = "1986",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:23 MST 2002",
bibsource = "http://www.computer.org/annals/an1986/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1986/pdf/a2199.pdf;
http://www.computer.org/annals/an1986/a2199abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@Article{Smith:1986:GCC,
author = "G. W. Smith and J. B. H. {Du Boulay}",
title = "The generation of cryptic crossword clues",
journal = j-COMP-J,
volume = "29",
number = "3",
pages = "282--284",
month = jun,
year = "1986",
CODEN = "CMPJA6",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Mar 25 13:51:56 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Logica UK Ltd, London, Engl",
affiliationaddress = "Logica UK Ltd, London, Engl",
classcodes = "C7820 (Humanities computing); C7830D (Computer
games)",
classification = "723",
corpsource = "Logica UK Ltd., London, UK",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "clue insertion; compilation; computer programming;
computer software; crossword; crossword clue
generation; crossword compilation; cryptic clues;
cryptic crossword; entertainment; games of skill;
linguistics",
treatment = "P Practical",
}
@Article{Tao:1986:TVF,
author = "Ren Ji Tao and Shi Hua Chen",
title = "Two varieties of finite automaton public key
cryptosystem and digital signatures",
journal = j-J-COMP-SCI-TECH,
volume = "1",
number = "1",
pages = "9--18",
year = "1986",
CODEN = "JCTEEM",
ISSN = "1000-9000",
ISSN-L = "1000-9000",
MRclass = "68P25 (94A60)",
MRnumber = "88e:68025",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Journal of Computer Science and Technology",
}
@Article{Thomas:1986:SDE,
author = "John A. Thomas",
title = "Survey of Data Encryption in {DOL}",
journal = j-DDJ,
volume = "11",
number = "6",
pages = "16--??",
month = jun,
year = "1986",
CODEN = "DDJOEB",
ISSN = "1044-789X",
bibdate = "Mon Sep 2 09:09:39 MDT 1996",
bibsource = "http://www.ddj.com/index/author/index.htm;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Dr. Dobb's Journal of Software Tools",
}
@Article{Valiant:1986:NED,
author = "L. G. Valiant and V. V. Vazirani",
title = "{NP} is as easy as detecting unique solutions",
journal = j-THEOR-COMP-SCI,
volume = "47",
number = "1",
pages = "85--93",
month = "????",
year = "1986",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
bibdate = "Sat Nov 22 13:29:49 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
acknowledgement = ack-nhfb,
classification = "C4240 (Programming and algorithm theory)",
corpsource = "Aiken Comput. Lab., Harvard Univ., Cambridge, MA,
USA",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975",
keywords = "computational complexity; cryptography; D/sup p/-hard
problems; NP-complete problem; NP-hard problems;
parity; randomized polynomial time reducibility; SAT;
unique solutions",
pubcountry = "Netherlands A07",
treatment = "T Theoretical or Mathematical",
}
@MastersThesis{Vandeberg:1986:ICS,
author = "Ronald D. Vandeberg",
title = "Implementation of a coprocessing system to support
data encryption",
type = "Thesis ({M.S. in Computer Science})",
school = "University of Wisconsin-Milwaukee",
address = "Milwaukee, WI, USA",
pages = "112",
year = "1986",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography; Data protection",
}
@Article{vanTilburg:1986:DBK,
author = "Johan van Tilburg and Dick E. Boekee",
booktitle = "Advances in cryptology---CRYPTO '85 (Santa Barbara,
Calif., 1985)",
title = "Divergence bounds on key equivocation and error
probability in cryptanalysis",
journal = j-LECT-NOTES-COMP-SCI,
volume = "218",
publisher = pub-SV,
address = pub-SV:adr,
pages = "489--513",
year = "1986",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60",
MRnumber = "851 437",
bibdate = "Sat Oct 26 10:21:29 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@Book{Wang:1986:UEA,
author = "Yuedong Wang",
title = "Using encryption for authentication in local area
networks",
publisher = "????",
address = "????",
pages = "??",
year = "1986",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@InProceedings{Webster:1986:DB,
author = "A. F. Webster and Stafford E. Tavares",
title = "On the design of {S}-boxes",
crossref = "Williams:1986:ACC",
pages = "523--534",
year = "1986",
bibdate = "Wed May 13 15:56:46 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Welchman:1986:PBB,
author = "G. Welchman",
title = "From {Polish Bomba} to {British Bombe}. {The} Birth of
{Ultra}",
journal = j-INTELL-NATL-SECUR,
volume = "1",
number = "1",
pages = "71--110",
month = "????",
year = "1986",
ISSN = "0268-4527 (print), 1743-9019 (electronic)",
ISSN-L = "0268-4527",
bibdate = "Sun Dec 01 10:02:58 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Intelligence and National Security",
journal-URL = "http://www.tandfonline.com/loi/fint20",
}
@Article{Wiedemann:1986:QC,
author = "D. Wiedemann",
title = "Quantum cryptography",
journal = j-SIGACT,
volume = "18",
number = "2",
pages = "48--51",
month = sep # "\slash " # mar,
year = "1986--1987",
CODEN = "SIGNDM",
DOI = "http://dx.doi.org/10.1145/24652.24654",
ISSN = "0163-5700 (print), 1943-5827 (electronic)",
ISSN-L = "0163-5700",
bibdate = "Wed Mar 21 08:21:23 MDT 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sigact.bib",
abstract = "An idea of Stephen Wiesner [1] is expanded to give a
method of public key distribution which is provably
secure under the principles of quantum mechanics. It
appears that this scheme could actually be implemented
in favorable environments.",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGACT News",
journal-URL = "http://dl.acm.org/citation.cfm?id=J697",
}
@Book{Williams:1986:CTU,
author = "John J. Williams",
title = "Cryptanalysis techniques: the ultimate decryption
manual",
publisher = "Consumertronics Co.",
address = "Alamogordo, NM, USA",
pages = "11 + 3 + 1",
year = "1986",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Ciphers --- Data processing; Cryptography --- Data
processing.",
}
@InCollection{Williams:1986:PKE,
author = "H. C. Williams",
booktitle = "Advances in cryptology---CRYPTO '85 (Santa Barbara,
Calif., 1985)",
title = "An {$ M^3 $} public-key encryption scheme",
volume = "218",
publisher = pub-SV,
address = pub-SV:adr,
pages = "358--368",
year = "1986",
MRclass = "94A60 (68P25)",
MRnumber = "851 427",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
series = "Lecture Notes in Comput. Sci.",
}
@InProceedings{Yao:1986:HGE,
author = "A. C. Yao",
title = "How to Generate and Exchange Secrets",
crossref = "IEEE:1986:ASF",
pages = "162--167",
year = "1986",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 29]{Goldreich:1997:FMCb}.",
}
@InCollection{Adleman:1987:PRD,
author = "Leonard Adleman",
title = "Pre-{RSA} Days: History and Lessons",
crossref = "Ashenhurst:1987:ATA",
pages = "??--??",
year = "1987",
DOI = "http://dx.doi.org/10.1145/1283920.1961904",
bibdate = "Tue Jun 21 11:01:04 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "ACM Turing Award lecture.",
acknowledgement = ack-nhfb,
}
@InProceedings{Agnew:1987:RSC,
author = "G. B. Agnew",
title = "Random Sources for Cryptographic Systems",
crossref = "Chaum:1987:ACE",
pages = "77--81",
year = "1987",
bibdate = "Thu Feb 23 10:04:54 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
}
@Article{Ahituv:1987:PED,
author = "Niv Ahituv and Yeheskel Lapid and Seev Neumann",
title = "Processing encrypted data",
journal = j-CACM,
volume = "30",
number = "9",
pages = "777--780",
month = sep,
year = "1987",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu May 30 09:41:10 MDT 1996",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30404.html",
acknowledgement = ack-nhfb,
annote = "Limit to operation is integer modular addition.",
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "algorithms; security",
review = "ACM CR 8812-0933",
subject = "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption
standard (DES). {\bf E.3}: Data, DATA ENCRYPTION,
Public key cryptosystems.",
}
@Book{Anonymous:1987:EVE,
author = "Anonymous",
title = "{Enigma} variations: encryption, emc\slash rfi, emp:
1987 conference proceedings",
publisher = "Osprey Exhibitions",
address = "Watford, England",
pages = "v + 243",
year = "1987",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Computers --- Access control --- Congresses;
Cryptography --- Congresses; Data protection ---
Congresses.",
}
@InProceedings{Barrett:1987:IRS,
author = "Paul Barrett",
title = "Implementing the {Rivest}, {Shamir} and {Adleman}
public-key encryption algorithm on a standard digital
signal processor",
crossref = "Odlyzko:1987:ACC",
pages = "311--323",
year = "1987",
MRclass = "94A60",
MRnumber = "88i:94015",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 1]{Handschuh:1998:SCC}.",
}
@Article{Bracha:1987:ERR,
author = "Gabriel Bracha",
title = "An $ {O}(\log n) $ Expected Rounds Randomized
{Byzantine} Generals Protocol",
journal = j-J-ACM,
volume = "34",
number = "4",
pages = "910--920",
month = oct,
year = "1987",
CODEN = "JACOAH",
ISSN = "0004-5411",
ISSN-L = "0004-5411",
bibdate = "Wed Jan 15 18:12:53 MST 1997",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/jacm.bib",
URL = "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42229.html",
abstract = "Byzantine Generals protocols enable processes to
broadcast messages reliably in the presence of faulty
processes. These protocols are run in a system that
consists of n processes, t of which are faulty. The
protocols are conducted in synchronous rounds of
message exchange. It is shown that, in the absence of
eavesdropping, without using cryptography, for any
epsilon greater than 0 and t equals n/(3 plus epsilon),
there is a randomized protocol with O(log n) expected
number of rounds. If cryptographic methods are allowed,
then, for epsilon greater than 0 and t equals n/(2 plus
epsilon), there is a randomized protocol with O(log n)
expected number of rounds. This is an improvement on
the lower bound of t plus 1 rounds required for
deterministic protocols, and on a previous result of
t/log n expected number of rounds for randomized
noncryptographic protocols.",
acknowledgement = ack-nhfb,
affiliationaddress = "Cornell Univ, Ithaca, NY, USA",
classification = "722; 723",
fjournal = "Journal of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J401",
journalabr = "J Assoc Comput Mach",
keywords = "algorithms; computer networks --- Protocols; computer
programming --- Algorithms; computer systems, digital;
consensus protocols; cryptography; Distributed;
distributed algorithms; parallel algorithms; randomized
Byzantine generals protocol; reliability; theory;
verification",
subject = "{\bf C.2.2}: Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf G.3}: Mathematics of Computing, PROBABILITY AND
STATISTICS, Probabilistic algorithms (including Monte
Carlo). {\bf F.2.2}: Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems. {\bf G.1.0}: Mathematics of
Computing, NUMERICAL ANALYSIS, General, Parallel
algorithms. {\bf G.2.1}: Mathematics of Computing,
DISCRETE MATHEMATICS, Combinatorics, Permutations and
combinations.",
}
@TechReport{Brassard:1987:IMC,
author = "Gilles Brassard",
title = "Introduction to modern cryptology",
type = "Publication",
number = "606",
institution = "Universit{\'e} de Montreal, D{\`e}partement
d'Informatique et de Recherche Op{\`e}rationnelle",
address = "Montr{\'e}al, Qu{\'e}bec, Canada",
pages = "56",
year = "1987",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Revised version, February 1987. Supported in part by
Canada NSERC.",
keywords = "Cryptography.",
}
@TechReport{Campbell:1987:MBC,
author = "Q. G. Campbell",
title = "Meteor burst communications protocols --- The history
and role of computing technology in radio communication
via meteor trails",
type = "Technical Report",
number = "246",
institution = "University of Newcastle upon Tyne",
address = "Newcastle upon Tyne, UK",
pages = "??--??",
month = nov,
year = "1987",
bibdate = "Sat Dec 26 17:01:46 1998",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1007.html",
acknowledgement = ack-nhfb,
keywords = "information hiding; steganography",
}
@InProceedings{Chaum:1987:DPD,
author = "David Chaum and Jan-Hendrik Everse and Jeroem van de
Graaf and Ren{\'e} Peralta",
title = "Demonstrating possession of a discrete logarithm
without revealing it",
crossref = "Odlyzko:1987:ACC",
pages = "200--212",
year = "1987",
DOI = "http://dx.doi.org/10.1007/3-540-47721-7_14",
bibdate = "Sun Mar 11 11:11:23 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Book{Cohen:1987:IIP,
author = "Fred Cohen",
title = "Introductory Information Protection",
publisher = "????",
address = "????",
pages = "????",
year = "1987",
ISBN = "????",
ISBN-13 = "????",
LCCN = "????",
bibdate = "Thu May 16 08:16:54 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://all.net/books/ip/",
acknowledgement = ack-nhfb,
annote = "Possibly unpublished: not found in University of
California MELVYL, U.S. Library of Congress, and
numerous European library catalogs. Available
electronically at the indicated URL.",
}
@MastersThesis{Cominsky:1987:CAP,
author = "Isabeth Cominsky",
title = "Cryptology: ancient problem modern solutions",
type = "Thesis ({M.S.})",
school = "State University of New York, College of Technology at
Utica/Rome",
address = "Utica/Rome, NY, USA",
pages = "iv + 91",
year = "1987",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Gives a basic background in cryptology, its current
techniques (algorithms), and examines security and
authentication. Examines relationship between
cryptology and computer science.",
keywords = "Ciphers; Cryptography",
}
@Article{Coppersmith:1987:C,
author = "D. Coppersmith",
title = "Cryptography",
journal = j-IBM-JRD,
volume = "31",
number = "2",
pages = "244--248",
month = mar,
year = "1987",
CODEN = "IBMJAE",
ISSN = "0018-8646 (print), 2151-8556 (electronic)",
ISSN-L = "0018-8646",
MRclass = "94A60 (11T71)",
MRnumber = "88c:94019",
bibdate = "Tue Mar 25 14:26:59 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
abstract = "This paper is concerned with two aspects of
cryptography in which the author has been working. One
is the Data Encryption Standard (DES), developed at IBM
and now in wide use for commercial cryptographic
applications. This is a `private key' system; the
communicants share a secret key, and the eavesdropper
will succeed if he can guess this key among its
quadrillions of possibilities. The other is the
Diffie--Hellman key exchange protocol, a typical
`public key' cryptographic system. Its security is
based on the difficulty of taking `discrete logarithms'
(reversing the process of exponentiation in a finite
field). We describe the system and some analytic
attacks against it.",
acknowledgement = ack-nhfb,
affiliation = "IBM, Yorktown Heights, NY, USA",
affiliationaddress = "IBM, Yorktown Heights, NY, USA",
classcodes = "C6130 (Data handling techniques)",
classification = "723; 902",
conference = "Math and Comput",
corpsource = "IBM Thomas J. Watson Res. Center, Yorktown Heights,
NY, USA",
fjournal = "IBM Journal of Research and Development",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
journalabr = "IBM J Res Dev",
keywords = "cryptography; data encryption standard; Data
Encryption Standard; Diffie--Hellman key exchange
protocol; discrete logarithms; eavesdropper;
exponentiation; IBM; private key; public key; secret
key; security; security of data; standards",
meetingaddress = "Yorktown Heights, NY, USA",
meetingdate = "Dec 1985",
meetingdate2 = "12/85",
treatment = "P Practical",
}
@Article{Crilly:1987:BPB,
author = "Tony Crilly and Shekhar Nandy",
title = "The Birthday Problem for Boys and Girls",
journal = j-MATH-GAZ,
volume = "71",
number = "455",
pages = "19--22",
month = mar,
year = "1987",
CODEN = "MAGAAS",
ISSN = "0025-5572",
bibdate = "Wed Oct 31 13:22:46 2007",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://links.jstor.org/sici?sici=0025-5572%28198703%292%3A71%3A455%3C19%3ATBPFBA%3E2.0.CO%3B2-7",
acknowledgement = ack-nhfb,
fjournal = "Mathematical Gazette",
journal-URL = "http://www.m-a.org.uk/jsp/index.jsp?lnk=620",
keywords = "Birthday Paradox",
remark = "The authors reexamine the Birthday Paradox in a
variant described as ``If the group consists of an
equal number of boys and girls, what should be the
corresponding minimum group size if we are interested
in a boy and a girl sharing a birthday?''\par The
answer is that at least one of the $r$ boys and one of
the $r$ girls will share a birthday is $ P(r) = 1 - (1
/ 365)^{2r} \sum {k = 1r}(365 - k)^r {}^{365P}_k S(r,
k) $, where the $ S(r, k) $ is the Stirling numbers of
the second kind, and ${}^{365P}_k = 365 ! / (365 - k)!$
is the number of ways that $k$ specific subsets of
girls with birthdays in $k$ days can fall in the $ 365$
days.",
}
@Book{Deavours:1987:CPI,
author = "Cipher A. Deavours",
title = "Cryptanalytic programs for the {IBM PC}",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "44",
year = "1987",
bibdate = "Mon Nov 23 12:36:43 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
keywords = "Cryptography.; IBM Personal Computer.",
}
@Book{Deavours:1987:CYT,
editor = "Cipher A. Deavours and David Kahn and Louis Kruh and
Greg Mellen",
title = "Cryptology yesterday, today, and tomorrow",
publisher = pub-ARTECH,
address = pub-ARTECH:adr,
pages = "xi + 519",
year = "1987",
ISBN = "0-89006-253-6",
ISBN-13 = "978-0-89006-253-1",
LCCN = "Z103.C76 1987",
bibdate = "Tue Dec 01 14:29:11 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "First volume of selected papers from issues of
Cryptologia.",
price = "US\$60.00",
series = "The Artech House communication and electronic defense
library",
acknowledgement = ack-nhfb,
annote = "Continued by: Cryptology, machines, history, and
methods.",
keywords = "Ciphers; Cryptography",
}
@InProceedings{deJonge:1987:SVR,
author = "Wiebren {de Jonge} and David Chaum",
title = "Some variations on {RSA} signatures \& their
security",
crossref = "Odlyzko:1987:ACC",
pages = "49--59",
year = "1987",
MRclass = "94A60 (68P25)",
MRnumber = "89b:94025",
MRreviewer = "Do Long Van",
bibdate = "Tue Feb 9 11:14:49 MST 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@MastersThesis{Elvin:1987:CWW,
author = "Robert Scott Elvin",
title = "A cryptanalysis of the {World War II German Enigma}
cipher machine",
type = "Thesis ({M.Sc.C.S.})",
publisher = "National Library of Canada",
school = "University of New Brunswick",
address = "Ottawa, ON, Canada",
year = "1987",
ISBN = "0-315-39876-0",
ISBN-13 = "978-0-315-39876-4",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "2 microfiches (104 fr.)",
series = "Canadian theses = Th{\`e}ses canadiennes",
acknowledgement = ack-nhfb,
}
@InProceedings{Feldman:1987:PSN,
author = "P. Feldman",
title = "A Practical Scheme for Non-Interactive Verifiable
Secret Sharing",
crossref = "IEEE:1987:ASF",
pages = "427--437",
year = "1987",
bibdate = "Thu Dec 03 07:01:52 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 15]{Gemmell:1997:ITC},
\cite[Ref. 13]{Canetti:1997:PSL}.",
}
@Article{Ferris:1987:WBC,
author = "John Ferris",
title = "{Whitehall}'s {Black Chamber}: {British} Cryptology
and the {Government Code and Cypher School}, 1919--29",
journal = j-INTELL-NATL-SECUR,
volume = "2",
number = "1",
pages = "54--??",
year = "1987",
ISSN = "0268-4527 (print), 1743-9019 (electronic)",
ISSN-L = "0268-4527",
bibdate = "Wed Jan 16 10:21:32 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Intelligence and National Security",
journal-URL = "http://www.tandfonline.com/loi/fint20",
}
@InProceedings{Fiat:1987:HPY,
author = "A. Fiat and A. Shamir",
title = "How to prove yourself: Practical solutions to
identification and signature problems",
crossref = "Odlyzko:1987:ACC",
pages = "181--187",
year = "1987",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 5]{Handschuh:1998:SCC}.",
}
@Book{Friedman:1987:ICA,
author = "William F. (William Frederick) Friedman",
title = "The index of coincidence and its applications in
cryptanalysis",
volume = "49",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "95",
year = "1987",
ISBN = "0-89412-137-5 (soft cover), 0-89412-138-3 (library
bound)",
ISBN-13 = "978-0-89412-137-1 (soft cover), 978-0-89412-138-8
(library bound)",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A cryptographic series",
acknowledgement = ack-nhfb,
author-dates = "1891--1969",
keywords = "Ciphers; Cryptography; Probabilities.",
}
@Article{Galil:1987:PEA,
author = "Zvi Galil and Moti Yung",
title = "Partitioned encryption and achieving simultaneity by
partitioning",
journal = j-INFO-PROC-LETT,
volume = "26",
number = "2",
pages = "81--88",
day = "19",
month = oct,
year = "1987",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "68M10 (68M15 68P25 68Q99)",
MRnumber = "88k:68014",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/infoproc.bib;
MathSciNet database",
acknowledgement = ack-nhfb,
affiliationaddress = "Columbia Univ, New York, NY, USA",
classification = "723; C4240 (Programming and algorithm theory); C5620
(Computer networks and techniques)",
corpsource = "Dept. of Comput. Sci., Columbia Univ. New York, NY,
USA",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "computational complexity; computer systems, digital
--- Distributed; cryptographic protocols; cryptography;
distributed processing; fault tolerant computing;
fault-tolerant distributed computing; partitioned
encryption; partitioned secret sharing; probabilistic
encryption; probabilistic public-key encryption;
protocols; security; simultaneous broadcast;
standardization; theory; verification",
pubcountry = "Netherlands A06",
subject = "E.3 Data, DATA ENCRYPTION, Public key cryptosystems
\\
D.4.6 Software, OPERATING SYSTEMS, Security and
Protection, Cryptographic controls",
treatment = "T Theoretical or Mathematical",
}
@InProceedings{Goldreich:1987:HPM,
author = "O. Goldreich and S. Micali and A. Wigderson",
title = "How to Play any Mental Game --- {A} Completeness
Theorem for Protocols with Honest Majority",
crossref = "ACM:1987:PNA",
pages = "218--229",
year = "1987",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 23]{Gemmell:1997:ITC},
\cite[Ref. 17]{Goldreich:1997:FMCb}, \cite[Ref.
19]{Canetti:1997:PSL}.",
}
@Article{Guan:1987:CAP,
author = "Puhua Guan",
title = "Cellular automaton public-key cryptosystem",
journal = j-COMPLEX-SYSTEMS,
volume = "1",
number = "1",
pages = "51--56",
year = "1987",
ISSN = "0891-2513",
MRclass = "94A60 (68P25 68Q80)",
MRnumber = "88j:94030",
MRreviewer = "Harriet Fell",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Complex Systems",
journal-URL = "http://www.nature.com/scientificamerican",
}
@Article{Haastad:1987:OWP,
author = "Johan H{\aa}stad",
title = "One-way permutations in {$ {\rm NC}^0 $}",
journal = j-INFO-PROC-LETT,
volume = "26",
number = "3",
pages = "153--155",
day = "23",
month = nov,
year = "1987",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "68Q15 (68Q05)",
MRnumber = "89h:68051",
MRreviewer = "J. C. Lagarias",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
acknowledgement = ack-nhfb,
affiliationaddress = "MIT, Cambridge, MA, USA",
classification = "723; C4240 (Programming and algorithm theory)",
corpsource = "Lab. for Comput. Sci., MIT, Cambridge, MA, USA",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "computable; computational complexity; computer
systems, digital --- Parallel Processing; cryptography;
inverting permutations; NC/sup 0/ circuits; one-way
permutations; p-completeness; P-hard; parallel
algorithms; parallel computation; permutations; theory;
verification",
pubcountry = "Netherlands A07",
subject = "G.2.2 Mathematics of Computing, DISCRETE MATHEMATICS,
Graph Theory, Path and circuit problems \\ G.2.1
Mathematics of Computing, DISCRETE MATHEMATICS,
Combinatorics, Permutations and combinations \\ F.1.1
Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
Models of Computation, Bounded-action devices",
treatment = "T Theoretical or Mathematical",
xxtitle = "One-way permutations in ${NC}_0$",
}
@Article{Hammer:1987:EUH,
author = "Joseph Hammer and Dinesh G. Sarvate",
title = "Encryption using {Hungarian} rings",
journal = j-DISCRETE-APPL-MATH,
volume = "16",
number = "2",
pages = "151--155",
year = "1987",
CODEN = "DAMADU",
ISSN = "0166-218X",
ISSN-L = "0166-218X",
MRclass = "94B25 (05A05)",
MRnumber = "87k:94018",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "Discrete Applied Mathematics. Combinatorial
Algorithms, Optimization and Computer Science",
}
@Article{Herzberg:1987:PPS,
author = "Amir Herzberg and Shlomit S. Pinter",
title = "Public Protection of Software",
journal = j-TOCS,
volume = "5",
number = "4",
pages = "371--393",
month = nov,
year = "1987",
CODEN = "ACSYEC",
ISSN = "0734-2071",
ISSN-L = "0734-2071",
bibdate = "Thu Jan 14 06:47:30 MST 1999",
bibsource = "Compendex database; http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org:80/pubs/citations/journals/tocs/1987-5-4/p371-herzberg/",
abstract = "One of the overwhelming problems that software
producers must contend with is the unauthorized use and
distribution of their products. Copyright laws
concerning software are rarely enforced, thereby
causing major losses to the software companies.
Technical means of protecting software from illegal
duplication are required, but the available means are
imperfect. We present protocols that enable software
protection, without causing substantial overhead in
distribution and maintenance. The protocols may be
implemented by a conventional cryptosystem, such as the
DES, or by a public key cryptosystem, such as the RSA.
Both implementations are proved to satisfy required
security criteria.",
acknowledgement = ack-nhfb,
affiliationaddress = "Technion-Israel Inst of Technology, Isr",
classification = "723",
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
journalabr = "ACM Trans Comput Syst",
keywords = "algorithms; computer software; cryptographic
protocols; cryptography; design; Protection; public key
cryptosystems; security; security protocols; single key
cryptosystems",
subject = "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
Protection, Cryptographic controls. {\bf K.5.1}
Computing Milieux, LEGAL ASPECTS OF COMPUTING,
Hardware/Software Protection. {\bf E.3} Data, DATA
ENCRYPTION, Public key cryptosystems. {\bf D.4.6}
Software, OPERATING SYSTEMS, Security and Protection.",
}
@InProceedings{Hollis:1987:TCA,
author = "J. B. Hollis",
title = "A technique for communicating {AVL} traffic by
subliminal data signalling over a speech radio
channel",
crossref = "Muraszko:1987:CVR",
pages = "13/1--13/5",
year = "1987",
bibdate = "Mon Dec 28 13:17:10 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@TechReport{IRD:1987:DTV,
author = "{International Resource Development, Inc.}",
title = "Data, text and voice encryption worldwide markets",
type = "Report",
number = "727",
institution = "International Resource Development",
address = "6 Prowitt St., Norwalk, CT 06855, USA",
pages = "vii + 197",
month = feb,
year = "1987",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography equipment industry; Market surveys.",
}
@InProceedings{Ito:1987:SSS,
author = "M. Ito and A. Saito and T. Nishizeki",
title = "Secret sharing schemes realizing general access
structures",
crossref = "IEEE:1987:IIG",
pages = "99--102",
year = "1987",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 25]{Gemmell:1997:ITC}.",
}
@Book{Jackson:1987:NTS,
author = "T. H. Jackson",
title = "From number theory to secret codes",
publisher = "Hilger",
address = "Bristol, UK",
pages = "vi + 86",
year = "1987",
ISBN = "0-85274-077-8 (paperback), 0-85274-078-6",
ISBN-13 = "978-0-85274-077-4 (paperback), 978-0-85274-078-1",
LCCN = "Z104 .J3 1987",
bibdate = "Sat Apr 20 12:24:59 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Jung:1987:IRC,
author = "Achim Jung",
title = "Implementing the {RSA} Cryptosystem",
journal = j-COMPUT-SECUR,
volume = "6",
number = "4",
pages = "342--350",
month = aug,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 25 17:38:12 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
abstract = "Techniques for a software implementation of the RSA
cryptosystem are presented. They allow both space and
time requirements of the RSA scheme to be minimized. A
hash function to be used in connection with the
cryptosystem is presented; this function avoids
weaknesses of other hash functions published
previously. Performance results of several
implementations are given, which show that the RSA
algorithm is acceptably fast for a large number of
applications.",
acknowledgement = ack-nhfb,
affiliationaddress = "Technische Hochschule Darmstadt, Darmstadt, West
Ger",
classification = "723",
fjournal = "Computers and Security",
journalabr = "Comput Secur",
keywords = "computer programming --- Algorithms; computer
software; cryptography; cryptosystem; digital
signatures; hash functions; primality tests",
}
@InProceedings{Karger:1987:LDP,
author = "P. Karger",
title = "Limiting the damage potential of discretionary
{Trojan} horses",
crossref = "IEEE:1987:PIS",
pages = "32--37",
year = "1987",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 30]{Gemmell:1997:ITC}.",
}
@Article{Kawai:1987:LAI,
author = "Satoru Kawai",
title = "Local authentication in insecure environments",
journal = j-INFO-PROC-LETT,
volume = "25",
number = "3",
pages = "171--174",
day = "29",
month = may,
year = "1987",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
acknowledgement = ack-nhfb,
affiliationaddress = "Univ of Tokyo, Tokyo, Jpn",
classification = "723; B6120B (Codes); C6130 (Data handling
techniques)",
corpsource = "Dept. of Inf. Sci., Tokyo Univ., Japan",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "codebreaking; cryptography; data processing ---
Security of Data; faking; insecure environments; local
authentication; local authentication mechanism; public
key cryptosystem; system information; theory; user
identifiers",
pubcountry = "Netherlands A07",
subject = "E.3 Data, DATA ENCRYPTION, Public key cryptosystems
\\
E.3 Data, DATA ENCRYPTION, Data encryption standard
(DES)",
treatment = "T Theoretical or Mathematical",
}
@Article{Knuth:1987:CT,
author = "Donald E. Knuth",
title = "{$N$}-ciphered texts",
journal = j-WORD-WAYS,
volume = "20",
number = "??",
pages = "173--174, 191--192",
year = "1987",
ISSN = "0043-7980",
bibdate = "Sat Mar 23 15:46:24 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Word Ways",
}
@Book{Koblitz:1987:CNT,
author = "Neal Koblitz",
title = "A course in number theory and cryptography",
volume = "114",
publisher = pub-SV,
address = pub-SV:adr,
pages = "208",
year = "1987",
ISBN = "0-387-96576-9",
ISBN-13 = "978-0-387-96576-5",
LCCN = "QA241 .K6721 1987",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "US\$29.80",
series = "Graduate texts in mathematics",
acknowledgement = ack-nhfb,
keywords = "cryptography; number theory",
}
@Article{Koblitz:1987:ECC,
author = "Neal Koblitz",
title = "Elliptic Curve Cryptosystems",
journal = j-MATH-COMPUT,
volume = "48",
number = "177",
pages = "203--209",
month = jan,
year = "1987",
CODEN = "MCMPAF",
ISSN = "0025-5718 (paper), 1088-6842 (electronic)",
ISSN-L = "0025-5718",
MRclass = "94A60 (11T71 11Y16 68P25)",
MRnumber = "88b:94017",
MRreviewer = "Harald Niederreiter",
bibdate = "Tue Oct 13 08:06:19 MDT 1998",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/mathcomp1980.bib;
JSTOR database",
acknowledgement = ack-nhfb,
classcodes = "B0250 (Combinatorial mathematics); B6120B (Codes);
C1160 (Combinatorial mathematics); C1260 (Information
theory)",
corpsource = "Dept. of Math., Washington Univ., Seattle, WA, USA",
fjournal = "Mathematics of Computation",
journal-URL = "http://www.ams.org/mcom/",
keywords = "cryptography; cryptosystems; cyclic; elliptic curve;
elliptic curves over finite fields; global point; group
theory; key cryptosystems; multiplicative group;
nonsmoothness; number theory; primitive points; public;
subgroup",
referencedin = "Referenced in \cite[Ref. 3]{Wiener:1998:PCP}.",
treatment = "T Theoretical or Mathematical",
}
@Article{Kuchlin:1987:PKE,
author = "W. K{\"u}chlin",
title = "Public key encryption",
journal = j-SIGSAM,
volume = "21",
number = "3",
pages = "69--73",
month = aug,
year = "1987",
CODEN = "SIGSBZ",
ISSN = "0163-5824 (print), 1557-9492 (electronic)",
ISSN-L = "0163-5824",
bibdate = "Fri Feb 8 18:26:59 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "SIGSAM Bulletin",
issue = "81",
keywords = "theory",
subject = "E.3 Data, DATA ENCRYPTION, Public key cryptosystems",
}
@Book{Leary:1987:CSM,
author = "Penn Leary",
title = "The Cryptographic {Shakespeare}: a monograph wherein
the poems and plays attributed to {William Shakespeare}
are proven to contain the enciphered name of the
concealed author, {Francis Bacon}",
publisher = "Westchester House",
address = "Omaha, NE, USA",
pages = "272",
year = "1987",
ISBN = "0-9617917-0-5",
ISBN-13 = "978-0-9617917-0-4",
LCCN = "PR2944 .L38 1987",
bibdate = "Mon Nov 30 10:07:37 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Lenstra:1987:FIE,
author = "H. W. {Lenstra, Jr.}",
title = "Factoring integers with elliptic curves",
journal = j-ANN-MATH,
volume = "126",
number = "3",
pages = "649--673",
year = "1987",
CODEN = "ANMAAH",
ISSN = "0003-486X (print), 1939-8980 (electronic)",
ISSN-L = "0003-486X",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://www.jstor.org/stable/1971363",
acknowledgement = ack-nhfb,
fjournal = "Annals of Mathematics",
referencedin = "Referenced in \cite[Ref. 15]{Kaliski:1995:SUR}.",
}
@Article{Litant:1987:BRC,
author = "Thomas F. Litant",
title = "Book Review: {{\em Computer Security: the Practical
Issues in a Troubled World}, (Elsevier Science
Publishers, Amsterdam 1985)}",
journal = j-OPER-SYS-REV,
volume = "21",
number = "1",
pages = "3--5",
month = jan,
year = "1987",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:35 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Article{Luciano:1987:CCC,
author = "Dennis Luciano and Gordon Prichett",
title = "Cryptology: from {Caesar} ciphers to public-key
cryptosystems",
journal = j-COLLEGE-MATH-J,
volume = "18",
number = "1",
pages = "2--17",
year = "1987",
ISSN = "0746-8342",
ISSN-L = "0746-8342",
MRclass = "94A60 (00A08 11T71)",
MRnumber = "88e:94025",
MRreviewer = "E. F. Assmus, Jr.",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "The College Mathematics Journal",
}
@Article{MacPherson:1987:CUN,
author = "B. Nelson MacPherson",
title = "The Compromise of {US Navy} Cryptanalysis After the
{Battle of Midway}",
journal = j-INTELL-NATL-SECUR,
volume = "2",
number = "2",
pages = "320--??",
year = "1987",
ISSN = "0268-4527 (print), 1743-9019 (electronic)",
ISSN-L = "0268-4527",
bibdate = "Wed Jan 16 10:21:32 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Intelligence and National Security",
journal-URL = "http://www.tandfonline.com/loi/fint20",
}
@Book{Marayati:1987:AWA,
author = "Muhammad Marayati and Muhammad Hassan Tayyan and Yahya
Mir 'Alam",
title = "'Ilm al-ta'miyah wa-istikhraj al-mu'amma 'inda
al-'Arab",
publisher = "Majma' al-Lughah al-'Arabiyah bi-Dimashq",
address = "Damascus, Syria",
pages = "various",
year = "1987",
LCCN = "Z103.4.A65 M37 1987",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Abstract in English. Title on added t.p.: Origins of
Arab cryptography and cryptanalysis. Contents: al-juz'
1. Dirasat wa-tahqiq li-rasa'il al-Kindi wa-Ibn 'Adlan
wa-Ibn al-Durayhim.",
acknowledgement = ack-nhfb,
keywords = "cryptography --- Arab countries --- history",
}
@Article{Maulucci:1987:HAC,
author = "Ruth A. Maulucci and J. A. N. Lee",
title = "Happenings: {The 25th Anniversary of Committee X3};
{The Code-Breaking Computers of 1944}",
journal = j-ANN-HIST-COMPUT,
volume = "9",
number = "3/4",
pages = "345--356",
month = jul # "\slash " # sep,
year = "1987",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:24 MST 2002",
bibsource = "http://www.computer.org/annals/an1987/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1987/pdf/a3345.pdf;
http://www.computer.org/annals/an1987/a3345abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@Article{Micali:1987:NSP,
author = "Silvio Micali and Charles Rackoff and Bob Sloan",
title = "The notion of security for probabilistic cryptosystems
(extended abstract)",
journal = j-LECT-NOTES-COMP-SCI,
volume = "263",
pages = "381--392",
year = "1987",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60",
MRnumber = "907 101",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
remark = "Published in \cite{Odlyzko:1987:ACC}.",
}
@InProceedings{Millen:1987:CCC,
author = "Jonathan K. Millen",
title = "Covert Channel Capacity",
crossref = "IEEE:1987:PIS",
pages = "60--66",
year = "1987",
bibdate = "Sat Dec 26 17:01:46 1998",
bibsource = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1016.html",
acknowledgement = ack-nhfb,
keywords = "information hiding; steganography",
}
@Misc{Mills:1987:RDP,
author = "D. L. Mills",
title = "{RFC 1004}: Distributed-protocol authentication
scheme",
day = "1",
month = apr,
year = "1987",
bibdate = "Thu Oct 16 09:34:09 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Status: EXPERIMENTAL.",
URL = "ftp://ftp.internic.net/rfc/rfc1004.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc1004.txt",
acknowledgement = ack-nhfb,
format = "TXT=21402 bytes",
online = "yes",
status = "EXPERIMENTAL",
}
@Article{Needham:1987:AR,
author = "R. M. Needham and M. D. Schroeder",
title = "Authentication revisited",
journal = j-OPER-SYS-REV,
volume = "21",
number = "1",
pages = "7--7",
month = jan,
year = "1987",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:35 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@InProceedings{Odlyzko:1987:CCD,
author = "A. M. Odlyzko",
title = "On the complexity of computing discrete logarithms and
factoring integers",
crossref = "Cover:1987:OPC",
pages = "113--116",
year = "1987",
bibdate = "Mon Jul 19 06:55:53 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.research.att.com/~amo/doc/arch/factoring.logs.pdf;
http://www.research.att.com/~amo/doc/arch/factoring.logs.ps;
http://www.research.att.com/~amo/doc/arch/factoring.logs.troff",
acknowledgement = ack-nhfb,
}
@InCollection{Orton:1987:VIP,
author = "G. A. Orton and M. P. Roy and P. A. Scott and L. E.
Peppard and S. E. Tavares",
booktitle = "Advances in cryptology---CRYPTO '86 (Santa Barbara,
Calif., 1986)",
title = "{VLSI} implementation of public-key encryption
algorithms",
volume = "263",
publisher = pub-SV,
address = pub-SV:adr,
pages = "277--301",
year = "1987",
MRclass = "94A60",
MRnumber = "88k:94024",
MRreviewer = "Harald Niederreiter",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
series = "Lecture Notes in Comput. Sci.",
}
@Article{Otway:1987:ETM,
author = "Dave Otway and Owen Rees",
title = "Efficient and timely mutual authentication",
journal = j-OPER-SYS-REV,
volume = "21",
number = "1",
pages = "8--10",
month = jan,
year = "1987",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:35 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Book{Patterson:1987:MCC,
author = "Wayne Patterson",
title = "Mathematical cryptology for computer scientists and
mathematicians",
publisher = "Rowman and Littlefield",
address = "Totowa, NJ, USA",
pages = "xxii + 312",
year = "1987",
ISBN = "0-8476-7438-X",
ISBN-13 = "978-0-8476-7438-1",
LCCN = "Z103 .P351 1987",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "US\$29.50",
acknowledgement = ack-nhfb,
keywords = "Cryptography.",
}
@Article{Pfitzmann:1987:NUO,
author = "Andreas Pfitzmann and Michael Waidner",
title = "Networks Without User Observability",
journal = j-COMPUT-SECUR,
volume = "6",
number = "2",
pages = "158--166",
month = apr,
year = "1987",
CODEN = "CPSEDU",
ISSN = "0167-4048",
ISSN-L = "0167-4048",
bibdate = "Mon Dec 28 14:30:59 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.semper.org/sirene/publ/PfWa_86anonyNetze.html",
acknowledgement = ack-nhfb,
fjournal = "Computers and Security",
}
@Article{Rao:1987:PKA,
author = "T. R. N. Rao and Kil-Hyun Nam",
title = "Private-key algebraic-coded cryptosystems",
journal = j-LECT-NOTES-COMP-SCI,
volume = "263",
pages = "35--48",
year = "1987",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60 (11T71)",
MRnumber = "88j:94031",
MRreviewer = "Rudolf Lidl",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
remark = "Published in \cite{Odlyzko:1987:ACC}.",
}
@Misc{RFC0989,
author = "J. Linn",
title = "{RFC 989}: Privacy enhancement for {Internet}
electronic mail: Part {I}: Message encipherment and
authentication procedures",
day = "1",
month = feb,
year = "1987",
bibdate = "Thu Oct 16 09:34:09 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Obsoleted by RFC1040, RFC1113 \cite{RFC1040,RFC1113}.
Status: UNKNOWN.",
URL = "ftp://ftp.internic.net/rfc/rfc1040.txt;
ftp://ftp.internic.net/rfc/rfc1113.txt;
ftp://ftp.internic.net/rfc/rfc989.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc1040.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc1113.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc989.txt",
acknowledgement = ack-nhfb,
format = "TXT=63934 bytes",
obsoletedby = "Obsoleted by RFC1040, RFC1113
\cite{RFC1040,RFC1113}.",
online = "yes",
status = "UNKNOWN",
}
@Article{Rihaczek:1987:T,
author = "Karl Rihaczek",
title = "{Teletrust}",
journal = j-COMP-NET-ISDN,
volume = "13",
number = "3",
pages = "235--239",
year = "1987",
CODEN = "CNISE9",
ISSN = "0169-7552",
ISSN-L = "0169-7552",
bibdate = "Sat Sep 25 23:08:50 MDT 1999",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "GMD, Darmstadt, West Ger",
classification = "723",
fjournal = "Computer Networks and ISDN Systems",
journal-URL = "http://www.sciencedirect.com/science/journal/01697552",
journalabr = "Comput Networks ISDN Syst",
keywords = "computer networks; cryptography; data processing,
business --- Security of Data; electronic funds
transfer; teletrust",
}
@InCollection{Rivest:1987:EDR,
author = "Ronald L. Rivest",
title = "The Eary Days of {RSA}: History and Lessons",
crossref = "Ashenhurst:1987:ATA",
pages = "??--??",
year = "1987",
DOI = "http://dx.doi.org/10.1145/1283920.1961920",
bibdate = "Tue Jun 21 11:01:04 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "ACM Turing Award lecture.",
acknowledgement = ack-nhfb,
}
@InCollection{Shamir:1987:CSS,
author = "Adi Shamir",
title = "Cryptography: State of the science",
crossref = "Ashenhurst:1987:ATA",
pages = "??--??",
year = "1987",
DOI = "http://dx.doi.org/10.1145/1283920.1961903",
bibdate = "Tue Jun 21 11:01:04 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "ACM Turing Award lecture.",
acknowledgement = ack-nhfb,
}
@PhdThesis{Sherman:1987:CVT,
author = "Alan T. Sherman",
title = "Cryptology and {VLSI} (a two-part dissertation). {I},
{II}, Detecting and exploiting algebraic weaknesses in
cryptosystems. Algorithms for placing modules on a
custom {VLSI} chip",
type = "Thesis ({Ph.D.})",
school = "Department of Electrical Engineering and Computer
Science, Massachusetts Institute of Technology",
address = "Cambridge, MA, USA",
pages = "221",
year = "1987",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Supervised by Ronald Linn Rivest.",
acknowledgement = ack-nhfb,
}
@Article{Silverman:1987:MPQ,
author = "Robert D. Silverman",
title = "The Multiple Polynomial Quadratic Sieve",
journal = j-MATH-COMPUT,
volume = "48",
number = "177",
pages = "329--339",
month = jan,
year = "1987",
CODEN = "MCMPAF",
ISSN = "0025-5718 (paper), 1088-6842 (electronic)",
ISSN-L = "0025-5718",
MRclass = "11Y05",
MRnumber = "88c:11079",
MRreviewer = "Torleiv Kl{\o}ve",
bibdate = "Tue Oct 13 08:06:19 MDT 1998",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/mathcomp1980.bib;
JSTOR database",
acknowledgement = ack-nhfb,
classcodes = "C1160 (Combinatorial mathematics)",
corpsource = "MITRE Corp., Bedford, MA, USA",
fjournal = "Mathematics of Computation",
journal-URL = "http://www.ams.org/mcom/",
keywords = "algorithms; large-integer factoring; multiple
polynomial quadratic; number theory; parallel; parallel
algorithms; Pomerance quadratic sieve; sieve",
treatment = "T Theoretical or Mathematical",
}
@InProceedings{Stern:1987:SLC,
author = "J. Stern",
title = "Secret linear congruential generators are not
cryptographically secure",
crossref = "IEEE:1987:ASF",
pages = "421--426",
year = "1987",
bibdate = "Wed Dec 21 07:47:04 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/focs1980.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
}
@Article{Stripp:1987:BJC,
author = "Alan J. Stripp",
title = "Breaking {Japanese} Codes",
journal = j-INTELL-NATL-SECUR,
volume = "2",
number = "4",
pages = "135--??",
year = "1987",
ISSN = "0268-4527 (print), 1743-9019 (electronic)",
ISSN-L = "0268-4527",
bibdate = "Wed Jan 16 10:21:32 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Intelligence and National Security",
journal-URL = "http://www.tandfonline.com/loi/fint20",
}
@Article{Subramanian:1987:DTP,
author = "K. G. Subramanian and Rani Siromoney and P. Jeyanthi
Abisha",
title = "A {D0L-T0L} public key cryptosystem",
journal = j-INFO-PROC-LETT,
volume = "26",
number = "2",
pages = "95--97",
day = "19",
month = oct,
year = "1987",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "68P25 (68Q45)",
MRnumber = "89k:68036",
MRreviewer = "James W. Snively, Jr.",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "C4210 (Formal logic); C4240 (Programming and
algorithm theory); C6130 (Data handling techniques)",
corpsource = "Dept. of Math., Madras Christian Coll., India",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
keywords = "algorithms; computational complexity; cryptography;
D0L; decryption; design; formal language; formal
languages; languages; NP-complete problem; public key
cryptosystem; T0L; theory; trapdoor information",
pubcountry = "Netherlands A08",
subject = "F.4.2 Theory of Computation, MATHEMATICAL LOGIC AND
FORMAL LANGUAGES, Grammars and Other Rewriting Systems,
Parallel rewriting systems \\ E.3 Data, DATA
ENCRYPTION, Public key cryptosystems",
treatment = "T Theoretical or Mathematical",
}
@InCollection{Thompson:1987:RTT,
author = "Ken Thompson",
title = "Reflections on trusting trust",
crossref = "Ashenhurst:1987:ATA",
pages = "??--??",
year = "1987",
DOI = "http://dx.doi.org/10.1145/1283920.1283940",
bibdate = "Tue Jun 21 11:01:04 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "ACM Turing Award lecture.",
acknowledgement = ack-nhfb,
}
@Book{USGAOPEMD:1987:PDD,
author = "{United States. General Accounting Office. Program
Evaluation and Methodology Division}",
title = "Privacy data: the {Data Encryption Standard} provides
valuable protection",
publisher = "The Division",
address = "Washington, DC, USA",
pages = "80",
year = "1987",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Transfer paper - Program Evaluation and Methodology
Division; 8 Transfer paper (United States. General
Accounting Office. Program Evaluation and Methodology
Division); 8",
acknowledgement = ack-nhfb,
annote = "Cover title. ``March 1987.''",
keywords = "Data protection.",
}
@Article{VanHeurck:1987:TNS,
author = "Philippe {Van Heurck}",
title = "{TRASEX}: national security system for {EFTs} in
{Belgium}",
journal = j-COMP-NET-ISDN,
volume = "14",
number = "2--5",
pages = "389--395",
year = "1987",
CODEN = "CNISE9",
ISSN = "0169-7552",
ISSN-L = "0169-7552",
bibdate = "Sat Sep 25 23:08:50 MDT 1999",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Cent for Interbank Research in Informatics",
affiliationaddress = "Brussels, Belg",
classification = "718; 723",
fjournal = "Computer Networks and ISDN Systems",
journal-URL = "http://www.sciencedirect.com/science/journal/01697552",
journalabr = "Comput Networks ISDN Syst",
keywords = "Authentication; Computer Programming--Algorithms;
Cryptography; Data Transmission; Electronic Funds
Transfer; Key Management; Message Authentication
Algorithm; Smart Card; Trasec",
}
@MastersThesis{Waber:1987:VEC,
author = "John James Waber",
title = "Voice encryption for cellular telephones",
type = "Thesis ({M.S.})",
school = "University of Colorado",
address = "Boulder, CO, USA",
pages = "x + 124",
year = "1987",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "[120]-124.",
keywords = "Cellular radio; Eavesdropping; Privacy, Right of ---
United States; Radiotelephone",
}
@TechReport{Wheeler:1987:BE,
author = "David Wheeler",
title = "Block encryption",
type = "Technical report",
number = "120",
institution = "Computer Laboratory, University of Cambridge",
address = "Cambridge, Cambridgeshire, UK",
pages = "4",
year = "1987",
LCCN = "QA76.9.A25W48 1987",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "computers --- access control; cryptography;
Cryptography.",
}
@Article{Wichmann:1987:NAR,
author = "B. A. Wichmann",
title = "Note on {Algorithm 121}: {RSA} key calculation in
{Ada}",
journal = j-COMP-J,
volume = "30",
number = "3",
pages = "276--276",
month = jun,
year = "1987",
CODEN = "CMPJA6",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Fri Oct 06 17:31:18 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_30/Issue_03/",
note = "See \cite{Hunter:1985:ARK}.",
URL = "http://www3.oup.co.uk/computer_journal/hdb/Volume_30/Issue_03/tiff/276.tif",
acknowledgement = ack-nhfb,
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
}
@Article{Wortmann:1987:BRB,
author = "J. C. Wortmann",
title = "Book Review: {{\booktitle{Mr. Babbage's secret: The
tale of a Cypher --- and APL}}: Strandberg,
{Birker{\o}d,} (Denmark) 1984, 319 pages}",
journal = j-EUR-J-OPER-RES,
volume = "29",
number = "2",
pages = "216",
month = may,
year = "1987",
CODEN = "EJORDT",
ISSN = "0377-2217 (print), 1872-6860 (electronic)",
ISSN-L = "0377-2217",
bibdate = "Mon Jan 14 21:51:21 MST 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.sciencedirect.com/science/article/pii/0221787901184",
acknowledgement = ack-nhfb,
fjournal = "European Journal of Operational Research",
}
@Article{Adams:1988:SRC,
author = "Carlisle M. Adams and Henk Meijer",
booktitle = "Advances in cryptology---CRYPTO '87 (Santa Barbara,
CA, 1987)",
title = "Security-related comments regarding {McEliece}'s
public-key cryptosystem",
journal = j-LECT-NOTES-COMP-SCI,
volume = "293",
pages = "224--228",
year = "1988",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60 (94B05)",
MRnumber = "956 653",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@InProceedings{Agnew:1988:RSC,
author = "G. B. Agnew",
title = "Random Sources for Cryptographic Systems",
crossref = "Chaum:1987:ACE",
pages = "77--81",
year = "1988",
bibdate = "Thu Feb 23 10:04:54 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
}
@Article{Alexi:1988:RRF,
author = "Werner Alexi and Benny Z. Chor and Oded Goldreich and
Claus-P. Schnorr",
title = "{RSA} and {Rabin} Functions: Certain Parts are as Hard
as the Whole",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "194--209",
month = apr,
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "11Y11 (11T71 11Y16 68P25 68Q15 94A60)",
MRnumber = "89j:11120",
MRreviewer = "Melvin M. Sweet",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
referencedin = "Referenced in \cite[Ref. 1]{Johnson:1996:AEE},
\cite[Ref. 1]{Kaliski:1995:SUR}.",
}
@Article{Anonymous:1988:ERH,
author = "Anonymous",
title = "Errata: {Reviews: Hartree: Calculating Machines:
Recent and Prospective Developments and Their Impact on
Mathematical Physics and Calculating Instruments and
Machines, 10(1) 93}",
journal = j-ANN-HIST-COMPUT,
volume = "10",
number = "3",
pages = "234--234",
month = jul # "\slash " # sep,
year = "1988",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:13 MST 2002",
bibsource = "http://www.computer.org/annals/an1988/;
http://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
http://www.math.utah.edu/pub/tex/bib/annhistcomput.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See \cite{Aspray:1988:RCD}.",
URL = "http://dlib.computer.org/an/books/an1988/pdf/a3234.pdf;
http://www.computer.org/annals/an1988/a3234abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@Book{ANSI:1988:FIE,
author = "{American National Standards Institute} and {American
Bankers Association. Secretariat}",
title = "Financial institution encryption of wholesale
financial messages: {X9}.23",
publisher = "American Bankers Association",
address = "Washington, DC, USA",
pages = "vii + 28",
year = "1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "``ANSI X9.23-1988'' ``Approved May 16, l988''
``Developed by the Accredited Standards Committee on
Financial Services, X9, operating under the procedures
of the American National Standards Institute.",
keywords = "Financial institutions --- Standards.",
}
@Article{Aspray:1988:RCD,
author = "William Aspray and Maurice V. Wilkes and Albert C.
Lewis and Greg Mellen and Harold Chucker and Robert V.
D. Campbell and Wendy Wilkins and G. J. Tee and Ernest
Braun and Arthur L. Norberg",
title = "Reviews: {Carpenter and Doran (eds.): A. M. Turing's
ACE Report of 1946 and Other Papers}; {Masani (ed.):
Norbert Wiener: Collected Works with Commentaries};
{Kozaczuk: Enigma: How the German Machine Cipher Was
Broken and How It Was Read by the Allies in World War
Two}; {Worthy: William C. Norris: Portrait of a
Maverick}; {Harvard Computation Laboratory: A Manual of
Operation for the Automatic Sequence Controlled
Calculator}; {Proceedings of a Symposium on Large-Scale
Digital Calculating Machinery}; {Gardner: The Mind's
New Science: A History of the Cognitive Revolution};
{Hartree: Calculating Machines: Recent and Prospective
Developments and Their Impact on Mathematical Physics
and Calculating Instruments and Machines}; {McLean and
Rowland: The Inmos Saga}; {Pennings and Buifendam
(eds.): New Technology as Organizational Innovation:
The Development and Diffusion of Microelectronics};
Other Literature",
journal = j-ANN-HIST-COMPUT,
volume = "10",
number = "1",
pages = "80--97",
month = jan # "\slash " # mar,
year = "1988",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:12 MST 2002",
bibsource = "http://www.computer.org/annals/an1988/;
http://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See minor erratum \cite{Anonymous:1988:ERH}: Hartree
as a mathematical physicist, not a physical chemist.",
URL = "http://dlib.computer.org/an/books/an1988/pdf/a1080.pdf;
http://www.computer.org/annals/an1988/a1080abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@Article{Bach:1988:HGF,
author = "Eric Bach",
title = "How to generate factored random numbers",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "179--193",
month = "????",
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "11Y16 (11Y11 68Q25)",
MRnumber = "89e:11082",
MRreviewer = "Claus-Peter Schnorr",
bibdate = "Thu Apr 09 08:30:16 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
}
@InProceedings{Barker:1988:ECT,
author = "W. C. Barker and P. Cochrane and M. Branstad",
title = "Embedding cryptography into a {Trusted Mach} system",
crossref = "IEEE:1988:FAC",
pages = "379--383",
year = "1988",
bibdate = "Sun Sep 29 06:28:50 MDT 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/mach.bib",
acknowledgement = ack-nhfb,
affiliation = "Trusted Inf. Syst. Inc., Glenwood, MD, USA",
classification = "B6210L (Computer communications); B7930 (Military
communications); C5620 (Computer networks and
techniques); C6130 (Data handling techniques); C6150J
(Operating systems)",
keywords = "Embedded cryptorelated functions; Embedded network
security prototype; Embedding cryptography; Management
secure data network systems; Protocols; TCP/IP; TIS
prototype; Transport control protocol/internet
protocol; Trusted Information Systems; Trusted Mach
operating system; Unclassified cryptography",
thesaurus = "Computer networks; Cryptography; Data communication
systems; Network operating systems; Protocols",
}
@Book{Beckett:1988:IC,
author = "Brian Beckett",
title = "Introduction to cryptology",
publisher = pub-BLACKWELL-SCI,
address = pub-BLACKWELL-SCI:adr,
pages = "xiv + 344",
year = "1988",
ISBN = "0-632-01836-4 (paperback), 0-632-02243-4 (hardcover)",
ISBN-13 = "978-0-632-01836-9 (paperback), 978-0-632-02243-4
(hardcover)",
LCCN = "QA76.9.A25 B431 1988",
bibdate = "Thu Apr 29 18:01:20 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See \cite{Beckett:1997:ICP}.",
price = "UK\pounds14.95 (paperback), UK\pounds35.00
(hardcover)",
series = "Professional and industrial computing series",
acknowledgement = ack-nhfb,
keywords = "computer security; cryptography; data protection",
}
@InProceedings{Ben-Or:1988:CTN,
author = "M. Ben-Or and S. Goldwasser and A. Wigderson",
title = "Completeness Theorems for Noncryptographic
Fault-Tolerant Distributed Computations",
crossref = "ACM:1988:PTA",
pages = "1--10",
year = "1988",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 2]{Canetti:1997:PSL}.",
}
@InProceedings{Ben-Or:1988:MIP,
author = "M. Ben-Or and S. Goldwasser and J. Kilian and A.
Wigderson",
title = "Multi-Prover Interactive Proofs: How to Remove
Intractability",
crossref = "ACM:1988:PTA",
pages = "113--131",
year = "1988",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 5]{Goldreich:1997:FMCb}.",
}
@Article{Bennett:1988:PAP,
author = "Charles H. Bennett and Gilles Brassard and Jean-Marc
Robert",
title = "Privacy amplification by public discussion",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "210--229",
month = "????",
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "94A40 (94A13 94A60)",
MRnumber = "89c:94028",
MRreviewer = "Thomas Beth",
bibdate = "Thu Apr 09 08:30:16 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
}
@TechReport{Bishop:1988:AFDa,
author = "Matt Bishop",
title = "An application of a fast {Data Encryption Standard}
implementation",
type = "Technical report",
number = "PCS-TR 88-138",
institution = "Department of Mathematics and Computer Science,
Dartmouth College",
address = "Hanover, NH, USA",
pages = "25",
year = "1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Computer science.",
}
@InProceedings{Bishop:1988:AFDb,
author = "Matt Bishop",
title = "An Application of a Fast Data Encryption Standard
Implementation",
crossref = "USENIX:1988:CSSb",
volume = "1",
number = "3",
pages = "221--254",
month = "Summer",
year = "1988",
bibdate = "Fri Oct 18 07:24:24 MDT 1996",
bibsource = "ftp://ftp.uu.net/library/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Dartmouth College",
}
@Article{Bishop:1988:AFDc,
author = "Matt Bishop",
title = "An Application of a Fast {Data Encryption Standard}
Implementation",
journal = j-COMP-SYS,
volume = "1",
number = "3",
pages = "221--254",
month = "Summer",
year = "1988",
CODEN = "CMSYE2",
ISSN = "0895-6340",
bibdate = "Fri Sep 13 09:01:18 MDT 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/compsys.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Dartmouth Coll., NH, USA",
classification = "C6130 (Data handling techniques); C6150J (Operating
systems)",
fjournal = "Computing Systems",
keywords = "Fast Data Encryption Standard implementation;
Security; UNIX password encryption",
thesaurus = "Cryptography; Standards; Unix",
}
@TechReport{Bishop:1988:FEP,
author = "Matt Bishop",
title = "The fast encryption package",
institution = "Research Institute for Advanced Computer Science",
address = "Moffett Field, CA, USA",
pages = "various",
year = "1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "RIACS memorandum 88.3, NASA contractor report NASA
CR-185397",
acknowledgement = ack-nhfb,
annote = "Distributed to depository libraries in microfiche.
Microfiche. [Washington, DC?: National Aeronautics and
Space Administration], 1989. 1 microfiche.",
govtdocnumber = "NAS 1.26:185397 830-H-14 (MF)",
keywords = "Computers --- Access control --- Passwords.",
}
@Article{Bishop:COMPSYS-1-3-221,
author = "Matt Bishop",
title = "An Application of a Fast Data Encryption Standard
Implementation",
journal = j-COMP-SYS,
volume = "1",
number = "3",
pages = "221--254",
month = "Summer",
year = "1988",
CODEN = "CMSYE2",
ISSN = "0895-6340",
bibdate = "Fri Sep 13 09:01:18 MDT 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Dartmouth Coll., NH, USA",
classification = "C6130 (Data handling techniques); C6150J (Operating
systems)",
fjournal = "Computing Systems",
keywords = "Fast Data Encryption Standard implementation;
Security; UNIX password encryption",
thesaurus = "Cryptography; Standards; Unix",
}
@Article{Blakley:1988:CBA,
author = "G. R. Blakley and William Rundell",
booktitle = "Advances in cryptology---CRYPTO '87 (Santa Barbara,
CA, 1987)",
title = "Cryptosystems based on an analog of heat flow",
journal = j-LECT-NOTES-COMP-SCI,
volume = "293",
pages = "306--329",
year = "1988",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60 (35K70 35R25 35R30 68P25)",
MRnumber = "89i:94028",
MRreviewer = "Gottfried Anger",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@InProceedings{Blum:1988:NIZ,
author = "Manuel Blum and Paul Feldman and Silvio Micali",
title = "Non-interactive zero-knowledge and its applications",
crossref = "ACM:1988:PTA",
pages = "103--112",
year = "1988",
DOI = "http://dx.doi.org/10.1145/62212.62222",
bibdate = "Sun Mar 11 11:08:22 2012",
bibdate = "Wed Feb 20 18:33:47 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.acm.org/pubs/contents/proceedings/series/stoc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/stoc1980.bib",
URL = "http://www.acm.org/pubs/articles/proceedings/stoc/62212/p103-blum/p103-blum.pdf;
http://www.acm.org/pubs/citations/proceedings/stoc/62212/p103-blum/",
acknowledgement = ack-nhfb,
}
@Book{Boyd:1988:CCB,
author = "Waldo T. Boyd",
title = "Computer cryptology: beyond decoder rings",
publisher = pub-PH,
address = pub-PH:adr,
pages = "xv + 268",
year = "1988",
ISBN = "0-13-166133-7 (paperback)",
ISBN-13 = "978-0-13-166133-2 (paperback)",
LCCN = "Z103 .B65 1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "US\$21.95",
acknowledgement = ack-nhfb,
keywords = "Ciphers --- Data processing; ciphers --- data
processing; cryptography --- data processing;
Cryptography --- Data processing; Data processing ---
Applications of cryptology",
}
@Book{Brassard:1988:MCT,
author = "Gilles Brassard",
title = "Modern cryptology: a tutorial",
volume = "325",
publisher = pub-SV,
address = pub-SV:adr,
pages = "vi + 107",
year = "1988",
CODEN = "LNCSD9",
DOI = "????",
ISBN = "0-387-96842-3",
ISBN-13 = "978-0-387-96842-1",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
LCCN = "Z103 .B721 1988",
bibdate = "Wed Feb 14 06:00:56 MST 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/lncs.bib",
series = ser-LNCS,
URL = "http://link.springer-ny.com/link/service/series/0558/tocs/t0325.htm;
http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=325",
acknowledgement = ack-nhfb,
keywords = "computers --- access control; cryptography; data
transmission systems --- security measures",
}
@InCollection{Brickell:1988:CKC,
author = "Ernest F. Brickell",
booktitle = "Applications of discrete mathematics (Clemson, SC,
1986)",
title = "The cryptanalysis of knapsack cryptosystems",
publisher = pub-SIAM,
address = pub-SIAM:adr,
pages = "3--23",
year = "1988",
MRclass = "94A60 (11T71 90C09)",
MRnumber = "90f:94026",
MRreviewer = "Harald Niederreiter",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}
@Article{Brickell:1988:CSR,
author = "Ernest F. Brickell and Andrew M. Odlyzko",
title = "Cryptanalysis: a Survey of Recent Results",
journal = j-PROC-IEEE,
volume = "76",
number = "5",
pages = "578--593",
month = may,
year = "1988",
CODEN = "IEEPAD",
DOI = "http://dx.doi.org/10.1109/5.4443",
ISSN = "0018-9219 (print), 1558-2256 (electronic)",
ISSN-L = "0018-9219",
bibdate = "Sun Mar 11 10:50:52 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "In spite of the progress in computational complexity,
it is still true that cryptosystems are tested by
subjecting them to cryptanalytic attacks by experts.
Most of the cryptosystems that have been publicly
proposed in the last decade have been broken. This
paper outlines a selection of the attacks that have
been used and explains some of the basic tools
available to cryptanalyst. Attacks on knapsack
cryptosystems, congruential generators, and a variety
of two key secrecy and signature schemes are discussed.
There is also a brief discussion of the status of the
security of cryptosystems for which there is no known
feasible attack, such as the RSA, discrete
exponentiation, and DES cryptosystems.",
acknowledgement = ack-nhfb,
fjournal = "Proceedings of the IEEE",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5",
keywords = "code breaking; congruential generators; cryptanalytic
attacks; cryptosystem testing; data security; DES
system; discrete exponentiation; knapsack
cryptosystems; RSA system; signature schemes; two key
secrecy scheme",
}
@Article{Buchholz:1988:CQDc,
author = "Werner Buchholz and Maurice V. Wilkes and Alfred W.
{Van Sinderen} and C. J. {Fern, Jr.} and W. L. van der
Poel",
title = "Comments, Queries, and Debate: {Babbage} and the
{Colossus}; {Babbage} and {Bowditch}; {Two Early
European Computers}; {Early Dutch Computer}",
journal = j-ANN-HIST-COMPUT,
volume = "10",
number = "3",
pages = "218--221",
month = jul # "\slash " # sep,
year = "1988",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:13 MST 2002",
bibsource = "http://www.computer.org/annals/an1988/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1988/pdf/a3218.pdf;
http://www.computer.org/annals/an1988/a3218abs.htm",
acknowledgement = ack-nhfb,
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}
@MastersThesis{Cammack:1988:MDE,
author = "William Ervin Cammack",
title = "Methods of data encryption and a random polygraphic
cipher algorithm for {ASCII} files",
type = "Thesis",
school = "University of Southern Mississippi",
address = "Hattiesburg, MS, USA",
pages = "vi + 108",
year = "1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Data protection --- Computer programs; Machine ciphers
--- Design and construction.",
}
@TechReport{Carroll:1988:CC,
author = "John M. Carroll and Lynda E. Robbins",
title = "Computer cryptanalysis",
type = "Report",
number = "223",
institution = "Department of Computer Science, University of Western
Ontario",
address = "London, UK",
pages = "55",
year = "1988",
ISBN = "0-7714-1070-0",
ISBN-13 = "978-0-7714-1070-3",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@InCollection{Chan:1988:IEC,
author = "Yeng Kit Chan and Rudolf Lidl",
booktitle = "Contributions to general algebra, 6",
title = "On implementing elliptic curve cryptosystems",
publisher = "H{\"o}lder-Pichler-Tempsky",
address = "Vienna",
pages = "155--166",
year = "1988",
MRclass = "94A60 (11T71 14G15)",
MRnumber = "91k:94027",
MRreviewer = "Kaisa Nyberg",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}
@InProceedings{Chaum:1988:MUS,
author = "D. Chaum and C. Crepeau and I. Damg{\aa}rd",
title = "Multiparty Unconditionally Secure Protocols",
crossref = "ACM:1988:PTA",
pages = "11--19",
year = "1988",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 6]{Canetti:1997:PSL}.",
}
@Article{Chor:1988:KTP,
author = "Benny Chor and Ronald L. Rivest",
title = "A knapsack-type public key cryptosystem based on
arithmetic in finite fields",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "IT-34",
number = "5, part 1",
pages = "901--909",
year = "1988",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/18.21214",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
MRclass = "94A60 (11T71)",
MRnumber = "89k:94043",
MRreviewer = "Min Qiang Huang",
bibdate = "Tue Feb 9 11:14:49 MST 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Information Theory",
}
@Article{Chor:1988:UBS,
author = "Benny Chor and Oded Goldreich",
title = "Unbiased bits from sources of weak randomness and
probabilistic communication complexity",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "230--261",
month = "????",
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "68Q25",
MRnumber = "89e:68044",
MRreviewer = "Claus-Peter Schnorr",
bibdate = "Thu Apr 09 08:30:16 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
}
@Book{Christoffersson:1988:CUH,
author = "Per Christoffersson and Viiveke Fak",
title = "Crypto users' handbook: a guide for implementors of
cryptographic protection in computer systems",
publisher = pub-ELSEVIER,
address = pub-ELSEVIER:adr,
pages = "vii + 93",
year = "1988",
ISBN = "0-444-70484-1",
ISBN-13 = "978-0-444-70484-9",
LCCN = "QA76.9.A25 C821 1988",
bibdate = "Sat Nov 18 12:53:52 MST 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "computer security; cryptography",
}
@Book{Deavours:1988:BPS,
author = "Cipher A. Deavours",
title = "Breakthrough '32: the {Polish} solution of the
Enigma",
volume = "51",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "v + 85",
year = "1988",
ISBN = "0-89412-152-9 (paperback)",
ISBN-13 = "978-0-89412-152-4 (paperback)",
LCCN = "????",
bibdate = "Mon Nov 23 12:36:43 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "A Cryptographic series",
acknowledgement = ack-nhfb,
keywords = "BASIC (Computer program language); Cryptography --
Data processing.; Machine ciphers -- Data processing.",
}
@MastersThesis{Demirdogen:1988:FDM,
author = "A. Caner Demirdogen",
title = "Flaw detection methods based on digital signature
analysis for rotating machinery quality control",
type = "Thesis ({M.S.})",
school = "Tennessee Technological University",
address = "Cookeville, TN, USA",
pages = "xii + 189",
year = "1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Machinery --- Quality control; Mechanics, Analytic;
Vibration",
}
@Article{denBoer:1988:CF,
author = "Bert den Boer",
booktitle = "Advances in cryptology---EUROCRYPT '88 (Davos, 1988)",
title = "Cryptanalysis of {F.E.A.L}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "330",
publisher = pub-SV,
address = pub-SV:adr,
pages = "293--299",
year = "1988",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60",
MRnumber = "90f:94025",
MRreviewer = "Shimshon Berkovits",
bibdate = "Sat Oct 26 10:21:29 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@InProceedings{Desmedt:1988:SGC,
author = "Y. Desmedt",
title = "Society and group-oriented cryptography: a new
concept",
crossref = "Pomerance:1988:ACC",
pages = "120--127",
year = "1988",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 8]{Gemmell:1997:ITC}.",
}
@MastersThesis{Dieringer:1988:TAE,
author = "Jeffrey A. Dieringer",
title = "Tools for analog encryption",
type = "Thesis ({M.S. in Computer Science})",
school = "University of Wisconsin-Milwaukee",
address = "Milwaukee, WI, USA",
pages = "vi + 93",
year = "1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Bibliography: leaf 34.",
keywords = "Computers --- Access control; Cryptography.",
}
@Article{Diffie:1988:FTY,
author = "Whitfield Diffie",
title = "The First Ten Years of Public-Key Cryptography",
journal = j-PROC-IEEE,
volume = "76",
pages = "560--576",
year = "1988",
CODEN = "IEEPAD",
ISSN = "0018-9219",
ISSN-L = "0018-9219",
bibdate = "Thu Jan 21 14:30:23 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Garfinkel \cite[378]{Garfinkel:1995:PPGa} calls this a
``tour-de-force history of public key cryptography,
with revealing commentaries''.",
fjournal = "Proceedings of the IEEE",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5",
}
@MastersThesis{Falk:1988:DST,
author = "Adam Falk",
title = "{DBMS} security through encryption",
type = "Thesis ({M.S.})",
school = "San Francisco State University",
address = "San Francisco, CA, USA",
pages = "xii + 295",
year = "1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Data base management.",
}
@Article{Frieze:1988:RTI,
author = "Alan M. Frieze and Johan H{\aa}stad and Ravi Kannan
and Jeffrey C. Lagarias and Adi Shamir",
title = "Reconstructing truncated integer variables satisfying
linear congruences",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "262--280",
month = "????",
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "11Y16 (11T71 94A60)",
MRnumber = "89d:11115",
MRreviewer = "Harald Niederreiter",
bibdate = "Thu Apr 09 08:30:16 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
}
@MastersThesis{Gamble:1988:IDL,
author = "Robert Oscar Gamble",
title = "Investigation of discrete logarithmic encryption
algorithms",
type = "Thesis ({M.S.})",
school = "University of South Carolina",
address = "Columbia, SC, USA",
pages = "ii + 50",
year = "1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Algorithms.",
}
@InProceedings{Girault:1988:GBA,
author = "Marc Girault and Robert Cohen and Mireille Campana",
title = "A generalized birthday attack",
crossref = "Gunther:1988:ACE",
pages = "129--156",
year = "1988",
MRclass = "94A60",
MRnumber = "90f:94029",
MRreviewer = "Shimshon Berkovits",
bibdate = "Tue Feb 9 11:14:49 MST 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Goldwasser:1988:DSS,
author = "Shafi Goldwasser and Silvio Micali and Ronald L.
Rivest",
title = "A Digital Signature Scheme Secure Against Adaptive
Chosen-Message Attacks",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "281--308",
month = apr,
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "94A60 (11T71)",
MRnumber = "89e:94009",
MRreviewer = "Harald Niederreiter",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
referencedin = "Referenced in \cite[Ref. 20]{Goldreich:1997:FMCb}.",
}
@Article{Grollmann:1988:CMP,
author = "Joachim Grollmann and Alan L. Selman",
title = "Complexity measures for public-key cryptosystems",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "309--335",
month = "????",
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "68Q15 (11T71 68P25 94A60)",
MRnumber = "89h:68050",
MRreviewer = "J. C. Lagarias",
bibdate = "Thu Apr 09 08:30:16 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
}
@InProceedings{Gunther:1988:ASG,
author = "C. Gunther",
title = "Alternating Step Generators Controlled by {de Bruijn}
Sequences",
crossref = "Chaum:1988:ACE",
pages = "5--14",
year = "1988",
bibdate = "Mon Nov 30 09:01:14 1998",
bibsource = "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Haastad:1988:SSM,
author = "Johan H{\aa}stad",
title = "Solving simultaneous modular equations of low degree",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "336--341",
month = apr,
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "68Q25 (11T71 11Y16 68P25 94A60)",
MRnumber = "89e:68049",
MRreviewer = "Eric Bach",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
referencedin = "Referenced in \cite[Ref. 6]{Johnson:1996:AEE},
\cite[Ref. 12]{Kaliski:1995:SUR}.",
}
@Article{He:1988:SDK,
author = "Jing Min He and Kai Cheng Lu",
title = "The security and design of knapsack public key
cryptosystems",
journal = "J. Tsinghua Univ.",
volume = "28",
number = "1",
pages = "89--97",
year = "1988",
CODEN = "QDXKE8",
ISSN = "1000-0054",
MRclass = "94A60 (68P25)",
MRnumber = "89m:94011",
MRreviewer = "Zhao Zhi Zhang",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Journal of Tsinghua University. Science and
Technology. Qinghua Daxue Xuebao. Ziran Kexue Ban",
}
@Article{Hogan:1988:PIS,
author = "Carole B. Hogan",
title = "Protection imperfect: the security of some computing
environments",
journal = j-OPER-SYS-REV,
volume = "22",
number = "3",
pages = "7--27",
month = jul,
year = "1988",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:46 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See note \cite{Wells:1988:NAI}.",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Article{Huang:1988:APE,
author = "Min Qiang Huang",
title = "An attack to {Pless}' encryption scheme",
journal = "Kexue Tongbao (English Ed.)",
volume = "33",
number = "11",
pages = "885--889",
year = "1988",
ISSN = "0250-7862",
MRclass = "94A60",
MRnumber = "89k:94045",
MRreviewer = "Zhao Zhi Zhang",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "Chinese Academy of Science. Kexue Tongbao (Science
Bulletin). A Monthly Journal of Science. English
Edition",
}
@InCollection{Hule:1988:RCW,
author = "Harald Hule and Winfried B. M{\"u}ller",
booktitle = "Contributions to general algebra, 6",
title = "On the {RSA}-cryptosystem with wrong keys",
publisher = "H{\"o}lder-Pichler-Tempsky",
address = "Vienna",
pages = "103--109",
year = "1988",
MRclass = "94A60",
MRnumber = "91h:94026",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}
@Article{Huthnance:1988:UPP,
author = "E. Dennis Huthnance and Joe Warndof",
title = "On using primes for public key encryption systems",
journal = j-APPL-MATH-LETT,
volume = "1",
number = "3",
pages = "225--227",
year = "1988",
CODEN = "AMLEEL",
ISSN = "0893-9659",
ISSN-L = "0893-9659",
MRclass = "94A60 (11T71 68P25)",
MRnumber = "89k:94046",
MRreviewer = "Eric Bach",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
acknowledgement = ack-nhfb,
fjournal = "Applied Mathematics Letters. An International Journal
of Rapid Publication",
journal-URL = "http://www.sciencedirect.com/science/journal/08939659",
}
@TechReport{IRD:1988:DTV,
author = "{International Resource Development, Inc.}",
title = "Data, text and voice encryption worldwide markets",
type = "Report",
number = "754",
institution = "International Resource Development",
address = "New Canaan, Conn., U.S.A. (21 Locust Ave., New Canaan
06840)",
pages = "viii + 285",
year = "1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "``December 1988.''",
keywords = "Cryptography equipment industry; Market surveys.",
}
@Periodical{JCryptology:1988:JCJ,
key = "Journal of cryptology",
title = "Journal of cryptology: the journal of the
{International Association for Cryptologic Research}",
publisher = "Springer International",
address = "New York, NY, USA",
pages = "various",
year = "1988",
CODEN = "JOCREQ",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Appears three times a year.",
URL = "http://link.springer.de/link/service/journals/00145/index.htm",
acknowledgement = ack-nhfb,
alttitle = "Journal of cryptology",
keywords = "Cryptography --- Periodicals.",
}
@Article{Kannan:1988:PFN,
author = "R. Kannan and A. K. Lenstra and L. Lov{\'a}sz",
title = "Polynomial factorization and nonrandomness of bits of
algebraic and some transcendental numbers",
journal = j-MATH-COMPUT,
volume = "50",
number = "181",
pages = "235--250",
month = jan,
year = "1988",
CODEN = "MCMPAF",
ISSN = "0025-5718 (paper), 1088-6842 (electronic)",
ISSN-L = "0025-5718",
MRclass = "68Q20 (11A51 11A63 11J99 11Y16 68Q25)",
MRnumber = "89j:68061",
bibdate = "Tue Oct 13 08:06:19 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/mathcomp1980.bib;
JSTOR database",
acknowledgement = ack-nhfb,
classcodes = "B0210 (Algebra); B0250 (Combinatorial mathematics);
B6120B (Codes); C1110 (Algebra); C1160 (Combinatorial
mathematics); C1260 (Information theory); C4240
(Programming and algorithm theory)",
corpsource = "Dept. of Comput. Sci., Carnegie-Mellon Univ.,
Pittsburg, PA, USA",
fjournal = "Mathematics of Computation",
journal-URL = "http://www.ams.org/mcom/",
keywords = "algebraic numbers; binary expansions; computational
complexity; cryptography; nonrandomness; number theory;
polynomial factorisation; polynomial time algorithms;
polynomials; random number generation; secure
pseudorandom sequences; transcendental numbers",
treatment = "T Theoretical or Mathematical",
}
@Article{Karp:1988:SDN,
author = "Bennett C. Karp and L. Kirk Barker and Larry D.
Nelson",
title = "The {Secure Data Network System}",
journal = j-ATT-TECH-J,
volume = "67",
number = "3",
pages = "19--27",
month = may,
year = "1988",
CODEN = "ATJOEM",
ISSN = "8756-2324",
bibdate = "Fri Nov 12 13:09:16 2010",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/bstj1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Providing security for data communications is quite
complex, especially in contrast to traditional security
systems for voice communications. The Secure Data
Network Systems (SDNS), a joint program of the U. S.
government and telecommunications and computer industry
representatives, is developing security standards for
data networking. The SDNS program is incorporating
security into the Open Systems Interconnection (OSI)
framework to ensure interoperability and compatibility
of equipment and services. SDNS functionality will be
built into or added onto communications equipment such
as personal computers, workstations, and host
computers, and will provide security services such as
confidentiality, integrity, authentication, access
control, and sender nonrepudiation. Both real-time and
store-and-forward communications will be supported.",
acknowledgement = ack-nhfb,
fjournal = "AT\&T Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
keywords = "computer networks; data communication systems;
security of data; standards",
subject = "access control; data networking; Open Systems
Interconnection (OSI); Secure Data Network System
(SDNS); security services; security standards",
topic = "data processing",
}
@TechReport{Kemp:1988:EEF,
author = "Elizabeth A. Kemp",
title = "Encryption in electronic funds transfer applications",
type = "Massey computer science report",
number = "88/2",
institution = "Computer Science Department, Massey University",
address = "Palmerston North, NZ",
pages = "16",
month = dec,
year = "1988",
ISSN = "0112-630X",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "To protect the data sent through financial networks,
encryption and message authentication are essential.
Both the PIN and the transaction details are at risk in
ATM and EFTPOS systems. The Data Encryption Algorithm
can be used to encrypt PINs and generate a message
authentication code that can be verified by the
receiving party. Since the same key is required for
both encryption and decryption, there is the problem of
distributing it safely to both ends of the
communication line. This difficulty can be resolved
either by using public key cryptography or by
implementing the Transaction Key scheme proposed in
Australia.",
acknowledgement = ack-nhfb,
keywords = "Automated tellers; Electronic data processing
departments --- Security measures; Identification
numbers, Personal.",
}
@InProceedings{Kilian:1988:FCO,
author = "Joe Kilian",
title = "Founding cryptography on oblivious transfer",
crossref = "ACM:1988:PTA",
pages = "20--31",
year = "1988",
bibdate = "Wed Feb 20 18:33:47 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.acm.org/pubs/contents/proceedings/series/stoc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/articles/proceedings/stoc/62212/p20-kilian/p20-kilian.pdf;
http://www.acm.org/pubs/citations/proceedings/stoc/62212/p20-kilian/",
acknowledgement = ack-nhfb,
}
@Article{Kurosawa:1988:CSP,
author = "K. Kurosawa and K. Matsu",
title = "Cryptographically secure pseudorandom sequence
generator based on reciprocal number cryptosystem",
journal = j-ELECT-LETTERS,
volume = "24",
number = "1",
pages = "16--17",
day = "7",
month = jan,
year = "1988",
CODEN = "ELLEAK",
DOI = "http://dx.doi.org/10.1049/el:19880011",
ISSN = "0013-5194 (print), 1350-911X (electronic)",
ISSN-L = "0013-5194",
bibdate = "Fri Dec 30 16:39:46 MST 2011",
bibsource = "http://www.computer.org/tc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8134",
acknowledgement = ack-nhfb,
book-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220",
fjournal = "Electronics Letters",
}
@Article{Lagarias:1988:UEP,
author = "Jeffrey C. Lagarias and James A. Reeds",
title = "Unique extrapolation of polynomial recurrences",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "342--362",
month = "????",
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "11B37 (11T71 11Y16 94A60)",
MRnumber = "89c:11025",
MRreviewer = "Harald Niederreiter",
bibdate = "Thu Apr 09 08:30:16 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
}
@Article{Lee:1988:OSM,
author = "P. J. Lee and E. F. Brickell",
booktitle = "Advances in cryptology---EUROCRYPT '88 (Davos, 1988)",
title = "An observation on the security of {McEliece}'s
public-key cryptosystem",
journal = j-LECT-NOTES-COMP-SCI,
volume = "330",
pages = "275--280",
year = "1988",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94B05 (94A60)",
MRnumber = "994 669",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Lioen:1988:OMA,
author = "W. Lioen and H. {te Riele} and D. Winter",
title = "Optimization of the {MPQS-factoring} algorithm on the
{Cyber 205} and the {NEC SX-2}",
journal = j-SUPERCOMPUTER,
volume = "5",
number = "4",
pages = "42--50",
month = jul,
year = "1988",
CODEN = "SPCOEL",
ISSN = "0168-7875",
bibdate = "Wed Mar 18 08:37:01 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/supercom.bib",
acknowledgement = ack-nhfb,
affiliation = "Centre for Math. and Comput. Sci., Amsterdam,
Netherlands",
classification = "C1180 (Optimisation techniques)",
corpsource = "Centre for Math. and Comput. Sci., Amsterdam,
Netherlands",
fjournal = "Supercomputer",
keywords = "CDC Cyber 205; cryptography; FORTRAN listings; large
integer factorisation; MPQS-factoring algorithm;
multiple polynomial version; NEC SX-2; optimisation;
parallel algorithms; quadratic sieve algorithm",
pubcountry = "Netherlands",
treatment = "P Practical",
}
@Article{Long:1988:DLH,
author = "Douglas L. Long and Avi Wigderson",
title = "The discrete logarithm hides $ {O}({\rm log} \, n) $
bits",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "363--372",
month = "????",
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "68P25 (68Q30)",
MRnumber = "89e:68026",
MRreviewer = "Evangelos Kranakis",
bibdate = "Thu Apr 09 08:30:16 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
}
@Article{Luby:1988:HCP,
author = "Michael Luby and Charles Rackoff",
title = "How to construct pseudorandom permutations from
pseudorandom functions",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "373--386",
month = "????",
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "68P25 (65C10 68Q15 68Q25 94A60)",
MRnumber = "89i:68025",
bibdate = "Thu Apr 09 08:30:16 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
}
@InProceedings{Matsumoto:1988:PQP,
author = "Tsutomu Matsumoto and Hideki Imai",
title = "Public quadratic polynomial-tuples for efficient
signature-verification and message encryption",
crossref = "Gunther:1988:ACE",
pages = "419--453",
year = "1988",
MRclass = "94A60 (11T71)",
MRnumber = "90d:94008",
MRreviewer = "Harriet Fell",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
acknowledgement = ack-nhfb,
keywords = "Computers --- Access control --- Congresses;
Cryptography --- Congresses.",
}
@Article{Micali:1988:NSP,
author = "Silvio Micali and Charles Rackoff and Bob Sloan",
title = "The notion of security for probabilistic
cryptosystems",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "412--426",
month = "????",
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "94A60 (68P25 68Q99)",
MRnumber = "89k:94051",
MRreviewer = "Do Long Van",
bibdate = "Thu Apr 09 08:30:16 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
}
@Article{Michener:1988:TSK,
author = "John R. Michener",
title = "A tool for secret key cryptography",
journal = j-DDJ,
volume = "13",
number = "8",
pages = "50--52, 55, 96",
month = aug,
year = "1988",
CODEN = "DDJOEB",
ISSN = "0888-3076",
bibdate = "Tue Sep 10 09:30:19 MDT 1996",
bibsource = "http://www.ddj.com/index/author/index.htm;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
acknowledgement = ack-nhfb,
classification = "C0310D (Installation management); C6110 (Systems
analysis and programming); C6130 (Data handling
techniques)",
fjournal = "Dr. Dobb's Journal of Software Tools",
keywords = "C program; Commercial software packages;
Cryptanalysis; Cryptographic algorithm; Cryptographic
secret key system; Data compaction; Generalized rotor
operator technique; Proprietary algorithms; Secret key
cryptographic systems; Sophisticated statistical
tools",
thesaurus = "C listings; Cryptography; Data handling; DP
management; Programming",
}
@TechReport{Morain:1988:IGP,
author = "F. Morain",
title = "Implementation of the {Goldwasser-Killian-Atkin}
Primality Testing Algorithm",
institution = "Institut de la Recherche en Informatique et
Automatique, now Institut National de Recherche en
Informatique et Automatique (INRIA)",
address = "Domaine de Voluceau, Rocquencourt, B.P. 105, 78153 Le
Chesnay Cedex, France",
pages = "??",
year = "1988",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Project ALGO, INRIA.",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 8]{Silverman:1997:FGR}.",
}
@Article{Muftic:1988:SMC,
author = "Sead Muftic",
title = "Security Mechanisms for Computer Networks. Current
Results of the {CEC COST-11 ter} Project",
journal = j-COMP-NET-ISDN,
volume = "15",
number = "1",
pages = "67--71",
year = "1988",
CODEN = "CNISE9",
ISSN = "0169-7552",
ISSN-L = "0169-7552",
bibdate = "Sat Sep 25 23:08:50 MDT 1999",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Iris-Energoinvest, Sarajevo, Yugosl",
classification = "723",
fjournal = "Computer Networks and ISDN Systems",
journal-URL = "http://www.sciencedirect.com/science/journal/01697552",
journalabr = "Comput Networks ISDN Syst",
keywords = "access control; computer networks; COST-11 ter
project; cryptography; data processing --- Security of
Data; security mechanisms",
}
@Article{Mullin:1988:ONB,
author = "R. C. Mullin and I. M. Onyszchuk and S. A. Vanstone
and R. M. Wilson",
title = "Optimal normal bases in {$ \mathrm {GF}(p^n) $}",
journal = j-DISCRETE-APPL-MATH,
volume = "22",
number = "2",
pages = "149--161",
year = "1988--1989",
CODEN = "DAMADU",
ISSN = "0166-218X",
ISSN-L = "0166-218X",
bibdate = "Fri Jun 24 21:13:00 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Discrete Applied Mathematics",
}
@Article{Nakamura:1988:DRM,
author = "Yasuhiro Nakamura and Kineo Matsui",
title = "Dual reduction method of random keys for encryption by
graph transformation",
journal = "Mem. Nat. Defense Acad.",
volume = "28",
number = "1",
pages = "39--51",
year = "1988",
CODEN = "MDPCAW",
ISSN = "0388-4112",
MRclass = "68P25 (94A60)",
MRnumber = "91a:68054",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "Memoirs of the National Defense Academy. Mathematics,
Physics, Chemistry and Engineering",
}
@InCollection{Nemetz:1988:RLS,
author = "T. Nemetz and J. Ureczky",
booktitle = "Probability theory and mathematical statistics with
applications (Visegr{\'a}d, 1985)",
title = "A random linear secret-key encryption",
publisher = pub-REIDEL,
address = pub-REIDEL:adr,
pages = "171--180",
year = "1988",
MRclass = "94B05 (94A60)",
MRnumber = "89e:94013",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
}
@InProceedings{Neuman:1988:AUE,
author = "B. Clifford Neuman and Jennifer G. Steiner",
title = "Authentication of Unknown Entities on an Insecure
Network of Untrusted Workstations",
crossref = "USENIX:1988:PFU",
pages = "10--11",
day = "29--30",
month = aug,
year = "1988",
bibdate = "Fri Oct 18 07:24:24 MDT 1996",
bibsource = "ftp://ftp.uu.net/library/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Abstract only.",
acknowledgement = ack-nhfb,
affiliation = "Massachusetts Institute of Technology",
}
@Article{Niederreiter:1988:SNC,
author = "Harald Niederreiter",
title = "Some new cryptosystems based on feedback shift
register sequences",
journal = "Math. J. Okayama Univ.",
volume = "30",
pages = "121--149",
year = "1988",
CODEN = "MJOKAP",
ISSN = "0030-1566",
MRclass = "94A60 (11T71)",
MRnumber = "90a:94039",
MRreviewer = "Wende Chen",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Mathematical Journal of Okayama University",
}
@Article{Nobauer:1988:CPK,
author = "Rupert N{\"o}bauer",
title = "Cryptanalysis of a public-key cryptosystem based on
{Dickson}-polynomials",
journal = j-MATH-SLOVACA,
volume = "38",
number = "4",
pages = "309--323",
year = "1988",
CODEN = "MASLDM",
ISSN = "0139-9918",
ISSN-L = "0139-9918",
MRclass = "94A60 (11T71)",
MRnumber = "90c:94024",
MRreviewer = "Hans K. Kaiser",
bibdate = "Tue Feb 9 11:14:49 MST 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Mathematica Slovaca",
xxISSN = "0025-5173",
}
@Article{Okamoto:1988:DMS,
author = "Tatsuaki Okamoto",
title = "A Digital Multisignature Scheme using Bijective
Public-Key Cryptosystems",
journal = j-TOCS,
volume = "6",
number = "4",
pages = "432--441",
month = nov,
year = "1988",
CODEN = "ACSYEC",
ISSN = "0734-2071",
ISSN-L = "0734-2071",
bibdate = "Thu Jan 14 06:47:30 MST 1999",
bibsource = "Compendex database; http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org:80/pubs/citations/journals/tocs/1988-6-4/p432-okamoto/",
abstract = "A new digital multisignature scheme using bijective
public-key cryptosystems that overcomes the problems of
previous signature schemes used for multisignatures is
proposed. The principal features of this scheme are (1)
the length of a multisignature message is nearly
equivalent to that for a single signature message; (2)
by using a one-way hash function, multisignature
generation and verification are processed in an
efficient manner; (3) the order of signing is not
restricted; and (4) this scheme can be constructed on
any bijective public-key cryptosystem as well as the
RSA scheme. In addition, it is shown that the new
scheme is considered as safe as the public-key
cryptosystem used in this new scheme. Some variations
based on the scheme are also presented.",
acknowledgement = ack-nhfb,
affiliation = "NTT",
affiliationaddress = "Yokosuka, Jpn",
classification = "723",
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
journalabr = "ACM Trans Comput Syst",
keywords = "Bijective Public-Key Cryptosystems; Computer-Based
Message Systems; Cryptography; Digital Multisignature
Scheme; Electronic Mail; One-Way Hash Function;
security",
subject = "{\bf E.3} Data, DATA ENCRYPTION, Public key
cryptosystems.",
}
@Article{OShea:1988:CDU,
author = "G. O'Shea",
title = "Controlling the dependency of user access control
mechanisms on correctness of user identification",
journal = j-COMP-J,
volume = "31",
number = "6",
pages = "503--509",
month = dec,
year = "1988",
CODEN = "CMPJA6",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Mar 25 13:51:56 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classcodes = "C6130 (Data handling techniques)",
classification = "723; C6130 (Data handling techniques)",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "Authentication Mechanisms; Biometric Authentication;
Cryptography; Data Structures; identity verification;
Identity verification, Data Processing; Password
Techniques; security of data; user access control; User
Access Control; User access control; user
identification; User Identification; User
identification; user identity; User identity",
thesaurus = "Security of data",
treatment = "P Practical",
}
@Article{Pomerance:1988:PAF,
author = "Carl Pomerance and J. W. Smith and Randy Tuler",
title = "A pipeline architecture for factoring large integers
with the quadratic sieve algorithm",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "387--403",
month = "????",
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "11Y05 (11A51 11Y16 68M05 94A60)",
MRnumber = "89f:11168",
MRreviewer = "Sun Qi",
bibdate = "Thu Apr 09 08:30:16 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
referencedin = "Referenced in \cite[Ref. 13]{Odlyzko:1995:FIF}.",
}
@Article{Qin:1988:RSS,
author = "Bin Qin and Howard A. Sholl and Reda A. Ammar",
title = "{RTS}: a System to Simulate the Real Time Cost
Behaviour of Parallel Computations",
journal = j-SPE,
volume = "18",
number = "10",
pages = "967--985",
month = oct,
year = "1988",
CODEN = "SPEXBL",
ISSN = "0038-0644 (print), 1097-024X (electronic)",
ISSN-L = "0038-0644",
bibdate = "Sat May 31 13:36:16 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/spe.bib",
acknowledgement = ack-nhfb,
fjournal = "Software---Practice and Experience",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X",
}
@InProceedings{Raleigh:1988:CDP,
author = "T. M. Raleigh and R. W. Underwood",
title = "{CRACK}: a Distributed Password Advisor",
crossref = "USENIX:1988:USWa",
institution = "Bellcore",
pages = "12--13",
year = "1988",
bibdate = "Wed Aug 13 10:48:45 MDT 1997",
bibsource = "ftp://ftp.uu.net/library/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/usenix1980.bib;
http://www.usenix.org/cgi-bin/sortbib.pl?-sA",
note = "Abstract only.",
acknowledgement = ack-nhfb,
affiliation = "Bellcore",
}
@Article{Reif:1988:EPP,
author = "J. H. Reif and J. D. Tygar",
title = "Efficient parallel pseudorandom number generation",
journal = j-SIAM-J-COMPUT,
volume = "17",
number = "2",
pages = "404--411",
month = "????",
year = "1988",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "68Q25 (65C10 68Q10)",
MRnumber = "89k:68072",
bibdate = "Thu Apr 09 08:30:16 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
note = "Special issue on cryptography.",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
}
@Misc{RFC1040,
author = "J. Linn",
title = "{RFC 1040}: Privacy enhancement for {Internet}
electronic mail: Part {I}: Message encipherment and
authentication procedures",
day = "1",
month = jan,
year = "1988",
bibdate = "Thu Oct 16 09:34:09 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Obsoleted by RFC1113 \cite{RFC1113}. Obsoletes RFC0989
\cite{RFC0989}. Status: UNKNOWN.",
URL = "ftp://ftp.internic.net/rfc/rfc1040.txt;
ftp://ftp.internic.net/rfc/rfc1113.txt;
ftp://ftp.internic.net/rfc/rfc989.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc1040.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc1113.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc989.txt",
acknowledgement = ack-nhfb,
format = "TXT=76276 bytes",
obsoletedby = "Obsoleted by RFC1113 \cite{RFC1113}.",
obsoletes = "Obsoletes RFC0989 \cite{RFC0989}.",
online = "yes",
status = "UNKNOWN",
}
@Article{Sandhu:1988:CIT,
author = "Ravinderpal S. Sandhu",
title = "Cryptographic implementation of a tree hierarchy for
access control",
journal = j-INFO-PROC-LETT,
volume = "27",
number = "2",
pages = "95--98",
day = "29",
month = feb,
year = "1988",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
acknowledgement = ack-nhfb,
affiliationaddress = "Ohio State Univ, Columbus, OH, USA",
classification = "723; 921; C4240 (Programming and algorithm theory);
C6130 (Data handling techniques)",
corpsource = "Dept. of Comput. and Inf. Sci., Ohio State Univ.,
Columbus, OH, USA",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "access control; cryptographic key; cryptography;
cryptosystems; design; mathematical techniques ---
Trees; one-way function; privileged security class;
rooted tree; security; theory; tree hierarchy; trees
(mathematics)",
pubcountry = "Netherlands A08",
subject = "D.4.6 Software, OPERATING SYSTEMS, Security and
Protection, Access controls \\ D.4.6 Software,
OPERATING SYSTEMS, Security and Protection,
Cryptographic controls \\ E.3 Data, DATA ENCRYPTION",
treatment = "T Theoretical or Mathematical",
}
@InProceedings{Sedlak:1988:RCP,
author = "H. Sedlak",
title = "The {RSA} cryptographic Processor: The First High
Speed One-Chip Solution",
crossref = "Pomerance:1988:ACC",
pages = "95--105",
year = "1988",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 14]{Handschuh:1998:SCC}.",
}
@Article{Sharp:1988:DCO,
author = "R. L. Sharp",
title = "Design of a certifiable one-way data-flow device",
journal = j-ATT-TECH-J,
volume = "67",
number = "3",
pages = "44--52",
month = may,
year = "1988",
CODEN = "ATJOEM",
ISSN = "8756-2324",
bibdate = "Fri Nov 12 13:09:16 2010",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/bstj1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Describes a possible design for a device that would
allow two hosts or networks of different security
sensitivities (for example, top secret and secret) to
be connected so that information can move from the
low-sensitivity system to the high-sensitivity system.
The primary challenge was to allow return protocol
messages from the high-sensitivity system while not
permitting an unacceptable covert channel. Covert
channels, as they relate to intersystem communication,
are described to give a better idea of the problem.",
acknowledgement = ack-nhfb,
fjournal = "AT\&T Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
keywords = "data communication equipment; protocols; security of
data",
subject = "covert channels; certifiable one-way data-flow device;
security sensitivities; top secret; secret;
low-sensitivity system; high-sensitivity system; return
protocol messages; intersystem communication",
}
@Book{Simmons:1988:SSC,
author = "G. J. Simmons",
title = "Special section on cryptology",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "533--627",
year = "1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
in = "Institute of Electrical and Electronics Engineers.
Proceedings of the IEEE. v. 76, no. 5 0018-9219
(OCoLC)1753228 (DLC) 86645263 (DLC)sn 80000610",
}
@InCollection{Siromoney:1988:CPL,
author = "R. Siromoney and K. G. Subramanian and Jeyanthi
Abisha",
booktitle = "Syntactic and structural pattern recognition
(Barcelona and Sitges, 1986)",
title = "Cryptosystems for picture languages",
volume = "45",
publisher = pub-SV,
address = pub-SV:adr,
pages = "315--332",
year = "1988",
MRclass = "68P25 (68Q45)",
MRnumber = "1 012 152",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "NATO Adv. Sci. Inst. Ser. F Comput. Systems Sci.",
}
@InProceedings{Steiner:1988:KAS,
author = "Jennifer G. Steiner and Clifford Neuman and Jeffrey I.
Schiller",
title = "{Kerberos}: An Authentication Service for Open Network
Systems",
crossref = "USENIX:1988:UCPb",
pages = "191--202",
month = "Winter",
year = "1988",
bibdate = "Fri Oct 18 07:24:24 MDT 1996",
bibsource = "ftp://ftp.uu.net/library/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/usenix1980.bib",
acknowledgement = ack-nhfb,
affiliation = "MIT Project Athena",
}
@Article{Stevens:1988:CPR,
author = "A. Stevens",
title = "{C} programming: off and running \ldots{}",
journal = j-DDJ,
volume = "13",
number = "8",
pages = "98, 101--102, 104, 106--107, 109--110, 113",
month = aug,
year = "1988",
CODEN = "DDJOEB",
ISSN = "0888-3076",
bibdate = "Tue Sep 10 09:30:19 MDT 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
acknowledgement = ack-nhfb,
classification = "C6110 (Systems analysis and programming); C6130
(Data handling techniques); C6140D (High level
languages)",
fjournal = "Dr. Dobb's Journal of Software Tools",
keywords = "Braces; C constructs; C language preprocessors; C
programming practices; Code indenting; Decryption
program",
thesaurus = "C language; C listings; Cryptography; Programming",
}
@Misc{SuperMacSoftware:1988:SDE,
author = "{SuperMac Software}",
title = "{Sentinel Data} encryption utility",
publisher = "SuperMac Software",
address = "Mountain View, CA, USA",
edition = "Version 2.",
pages = "various",
year = "1988",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Title from disk label. Includes Disklock Utility.
Summary: Sentinel offers a variety of methods to
encrypt data in documents. System requirements:
Macintosh 512K Enhanced, Plus, SE and II; 3.5-inch or
hard disk; Macintosh System Software. Macintosh.",
keywords = "Encryption.",
}
@Article{Terry:1988:MSV,
author = "Douglas B. Terry and Daniel C. Swinehart",
title = "Managing Stored Voice in the {Etherphone} System",
journal = j-TOCS,
volume = "6",
number = "1",
pages = "3--27",
month = feb,
year = "1988",
CODEN = "ACSYEC",
ISSN = "0734-2071",
ISSN-L = "0734-2071",
bibdate = "Thu Jan 14 06:47:30 MST 1999",
bibsource = "Compendex database; http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org:80/pubs/citations/journals/tocs/1988-6-1/p3-terry/",
abstract = "The voice manager in the Etherphone system provides
facilities for recording, editing, and playing stored
voice in a distributed personal-computing environment.
To facilitate sharing, the voice manager stores voice
on a special voice file server that is accessible via
the local internet. Operations for editing a passage of
recorded voice simply build persistent data structures
to represent the edited voice. These data structures,
implementing an abstraction called voice ropes, are
stored in a server database and consist of lists of
intervals within voice files. Clients refer to voice
ropes solely by reference. Interests, additional
persistent data structures maintained by the server,
provide a sort of directory service for managing the
voice ropes that have been created as well as a
reliable reference-counting mechanism, permitting the
garbage collection of voice ropes that are no longer
needed.",
acknowledgement = ack-nhfb,
affiliationaddress = "XEROX Palo Alto Research Cent, Palo Alto, CA,
USA",
classification = "718; 723",
conference = "1987 ACM\slash SIGOPS Symposium on Operating Systems
Principles.",
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
keywords = "computer networks; computer operating systems;
computer systems, digital --- Distributed; data
processing --- Data Structures; design; digital
communication systems; electronic mail; Etherphone
system; management; performance; security; voice
editing; voice file server; voice manager; Voice/Data
Integrated Services",
sponsor = "ACM, Special Interest Group on Operating Systems, New
York, NY, USA",
subject = "{\bf H.4.3} Information Systems, INFORMATION SYSTEMS
APPLICATIONS, Communications Applications. {\bf D.4.2}
Software, OPERATING SYSTEMS, Storage Management,
Allocation/deallocation strategies. {\bf D.4.2}
Software, OPERATING SYSTEMS, Storage Management,
Storage hierarchies. {\bf D.4.3} Software, OPERATING
SYSTEMS, File Systems Management. {\bf D.4.6} Software,
OPERATING SYSTEMS, Security and Protection, Access
controls. {\bf D.4.6} Software, OPERATING SYSTEMS,
Security and Protection, Cryptographic controls. {\bf
E.2} Data, DATA STORAGE REPRESENTATIONS. {\bf H.2.8}
Information Systems, DATABASE MANAGEMENT, Database
Applications. {\bf H.4.3} Information Systems,
INFORMATION SYSTEMS APPLICATIONS, Communications
Applications, Electronic mail. {\bf C.2.4} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Distributed Systems.",
}
@Article{Tsujii:1988:PKC,
author = "Shigeo Tsujii and Toshiya Itoh and Atsushi Fujioka and
Kaoru Kurosawa and Tsutomu Matsumoto",
title = "A public-key cryptosystem based on the difficulty of
solving a system of nonlinear equations",
journal = j-SYS-COMP-JAPAN,
volume = "19",
number = "2",
pages = "10--18",
year = "1988",
CODEN = "SCJAEP",
ISSN = "0882-1666",
ISSN-L = "0882-1666",
MRclass = "94A60 (11T71)",
MRnumber = "89g:94026",
MRreviewer = "Zhen Fu Cao",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Systems and Computers in Japan",
}
@TechReport{USDA:1988:CED,
author = "{United States. Dept. of the Army}",
title = "Cryptographic equipment destroyer, incendiary,
{TH1\slash TH4}, {M1A1}, {M1A2}, and {M2A1}: ammunition
surveillance procedures",
type = "Department of the Army supply bulletin",
number = "SB 742-1375-94-801",
institution = "Dept. of the Army, Headquarters",
address = "Washington, DC, USA (??)",
pages = "various",
day = "6",
month = apr,
year = "1988",
LCCN = "D 101.15:742-1375-94-801 Govt Pubs",
bibdate = "Sat Nov 18 12:53:52 MST 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Supersedes SB 742-1375-94-3, 21 March 1974",
acknowledgement = ack-nhfb,
keywords = "cryptography -- United States -- equipment and
supplies -- handbooks,; demolition, military --
handbooks, manuals, etc; manuals, etc; United States.
army -- handbooks, manuals, etc",
}
@Book{USNBS:1988:DES,
author = "{United States. National Bureau of Standards}",
title = "{Data Encryption Standard}",
number = "46-1",
publisher = pub-NTIS,
address = pub-NTIS:adr,
pages = "16",
year = "1988",
LCCN = "JK468.A8 A31 no.46 1988",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Category: ADP operations; subcategory: computer
security. Supersedes FIPS PUB 46, 1977 January 15.
Shipping list no.: 88-367-P. Reaffirmed 1988 January
22.",
series = "Federal Information Processing Standards publication",
acknowledgement = ack-nhfb,
annote = "Cover title. Category: ADP operations; subcategory:
computer security. ``Supersedes FIPS PUB 46, 1977
January 15.'' Shipping list no.: 88-367-P. ``Reaffirmed
1988 January 22.''",
govtdocnumber = "C 13.52:46-1 248-D",
keywords = "Electronic data processing departments --- Security
measures",
}
@Article{Vallee:1988:HBO,
author = "Brigitte Vall{\'e}e and Marc Girault and Philippe
Toffin",
booktitle = "Advances in cryptology---EUROCRYPT '88 (Davos, 1988)",
title = "How to break {Okamoto}'s cryptosystem by reducing
lattice bases",
journal = j-LECT-NOTES-COMP-SCI,
volume = "330",
pages = "281--291",
year = "1988",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "94A60 (11H55 11T71)",
MRnumber = "90f:94035",
MRreviewer = "Rudolf Lidl",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@Book{vanTilborg:1988:IC,
author = "Henk C. A. {van Tilborg}",
title = "An introduction to cryptology",
volume = "SECS 52",
publisher = pub-KLUWER,
address = pub-KLUWER:adr,
pages = "x + 170",
year = "1988",
ISBN = "0-89838-271-8",
ISBN-13 = "978-0-89838-271-6",
LCCN = "Z103 .T541 1988",
bibdate = "Mon Oct 16 11:21:00 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "US\$45.00",
series = "The Kluwer international series in engineering and
computer science; Communications and information
theory",
acknowledgement = ack-nhfb,
annote = "[159]-164.",
keywords = "Cryptographie; Cryptographie --- Informatique;
Cryptography; Cryptography --- Data processing;
Cryptology",
}
@Article{Vassiliadis:1988:PEA,
author = "Stamatis Vassiliadis and Michael Putrino and Eric M.
Schwarz",
title = "Parallel Encrypted Array Multipliers",
journal = j-IBM-JRD,
volume = "32",
number = "4",
pages = "536--551",
month = jul,
year = "1988",
CODEN = "IBMJAE",
ISSN = "0018-8646 (print), 2151-8556 (electronic)",
ISSN-L = "0018-8646",
bibdate = "Tue Mar 25 14:26:59 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
abstract = "An algorithm for direct two's-complement and
sign-magnitude parallel multiplication is described.
The partial product matrix representing the
multiplication is converted to an equivalent matrix by
encryption. Its reduction, producing the final result,
needs no specialized adders and can be added with any
parallel array addition technique. It contains no
negative terms and no extra `correction' rows; in
addition, it produces the multiplication with fewer
than the minimal number of rows required for a direct
multiplication process.",
acknowledgement = ack-nhfb,
affiliation = "IBM, Syst. Products Div.",
affiliationaddress = "IBM, Endicott, NY, USA",
classcodes = "C5230 (Digital arithmetic methods)",
classification = "721; 723; 921; C5230 (Digital arithmetic methods)",
corpsource = "IBM, Syst. Products Div., Endicott, NY, USA",
fjournal = "IBM Journal of Research and Development",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
journalabr = "IBM J Res Dev",
keywords = "computer metatheory; computers, digital; cryptography;
digital arithmetic; direct multiplication; Direct
two's-complement; direct two's-complement; encrypted
array; Encryption; encryption; equivalent matrix;
Equivalent matrix; mathematical techniques --- Matrix
Algebra; matrix algebra; multiplication; Multiplying
Circuits; parallel array addition; Parallel array
addition technique; parallel array addition technique;
parallel multiplication; partial product matrix;
Partial product matrix; product matrix; sign-magnitude
parallel; Sign-magnitude parallel multiplication;
two's-complement",
thesaurus = "Cryptography; Digital arithmetic; Matrix algebra",
treatment = "P Practical",
}
@Article{Webb:1988:NPK,
author = "W. A. Webb",
title = "A nonlinear public key cryptosystem",
journal = j-COMP-MATH-APPL,
volume = "15",
number = "2",
pages = "81--84",
year = "1988",
CODEN = "CMAPDK",
ISSN = "0898-1221 (print), 1873-7668 (electronic)",
ISSN-L = "0898-1221",
MRclass = "94A60",
MRnumber = "940 071",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Computers \& Mathematics with Applications. An
International Journal",
}
@Article{Weiss:1988:BOP,
author = "Eric A. Weiss",
title = "Biographies: Oh, Pioneers!",
journal = j-ANN-HIST-COMPUT,
volume = "10",
number = "4",
pages = "348--361",
month = oct # "\slash " # dec,
year = "1988",
CODEN = "AHCOE5",
ISSN = "0164-1239",
bibdate = "Fri Nov 1 15:29:13 MST 2002",
bibsource = "http://www.computer.org/annals/an1988/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://dlib.computer.org/an/books/an1988/pdf/a4348.pdf;
http://www.computer.org/annals/an1988/a4348abs.htm",
acknowledgement = ack-nhfb,
annote = "This paper contains a brief summary of the
contributions of 261 individuals to the development of
computing.",
fjournal = "Annals of the History of Computing",
journal-URL = "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
keywords = "A. Porter; Aard van Wijngaarden; Adin D. Falkoff; Alan
J. Perlis; Alan Kay; Alan M. Turing; Allen Newell;
Allen W. M. Coombes; Alonzo Church; Alston Scott
Householder; Amedee Mannheim; Andrei P. Ershov; Andrew
Donald Booth; Andrew Fluegelman; Arnold A. Cohen;
Arthur C. Clarke; Arthur Lee Samuel; Arthur Walter
Burks; Arturo Rosenblueth; Augusta Ada King (nee
Gordon); B. M. Derfee; Blaise Pascal; Bob O. Evans;
Brian Havens; Brian Josephson; Brian Randell; Bruce G.
Oldfield; C. Gordon Bell; C. J. Date; C. Sheldon
Roberts; Carl Adam Petri; Carver Mead; Charles A.
Phillips; Charles Antony Richard Hoare; Charles
Babbage; Charles Bachman; Charles Xavier Thomas (Thomas
de Colmar); Christopher S. Strachey; Clair D. Lake;
Claude Elwood Shannon; Clifford E. Berry; Cuthbert C.
Hurd; D. W. Davies; Dana Scott; Daniel Delbert
McCracken; David J. Wheeler; David Packard; David
Sarnoff; Dennis M. Ritchie; Derrick Henry Lehmer;
Dionysius Lardner; Donald Ervin Knuth; Donald Lewis
Shell; Donald Michie; Donn B. Parker; Dorr E. Felt;
Douglas R. Hartree; E. H. Lennaerts; E. T. Irons; Earl
R. Larson; Edgar F. Codd; Edmund C. Berkeley; Edsger W.
Dijkstra; Edward E. Feigenbaum; Edward Joseph
McCluskey; Edward L. (Ted) Glaser; Emil L. Post; Ernest
R. Moore; Erwin Tomash; Eugene Kleiner; Fairchild Eight
(Julius Blank, Victor H. Grinich, Jean A. Hoerni,
Eugene Kleiner, Jay T. Last, Gordon E. Moore, Robert N.
Noyce, and C. Sheldon Roberts); Fernando J.
Corbat{\'o}; Fletcher Jones; Frances Elizabeth (Betty)
Snyder Holberton; Francis Joseph Murray; Frank E.
Hamilton; Frank Gray; Frank Rosenblatt; Frederic
Calland Williams; Frederick P. Brooks, Jr.; Friedrich
L. Bauer; G. B. Grant; G. Truman Hunter; Gene M.
Amdahl; Georg and Edvard Scheub; George Bernard
Dantzig; George Boole; George Elmer Forsythe; George H.
Philbrick; George Robert Stibitz; Gerald M. Weinberg;
Gerard Salton; Gordon E. Moore; Gottfried Wilhelm
Leibniz; Grace Murray Hopper; Harlan D. Mills; Harlan
L. Herrick; Harold Chestnut; Harry Douglas Huskey;
Harry H. Goode; Heinz Rutishauser; Helmut Schreyer;
Henry Briggs; Henry P. Babbage; Herbert A. Simon;
Herbert Leo Gelernter; Herbert R. J. Grosch; Herbert S.
Bright; Herman Heine Goldstine; Herman Hollerith;
Herman Lukoff; Howard Bromberg; Howard Hathaway Aiken;
I. J. Good; Irven Travis; Isaac L. Auerbach; Ivan
Edward Sutherland; J. Daniel Cougar; J. Presper Eckert,
Jr.; Jack St. Clair Kilby; Jack Tramiel; Jackson
Granholm [``kludge'']; James Hardy Wilkinson; James M.
Henry; James William Cooley; Jan Aleksander Rajchman;
Jay T. Last; Jay W. Forrester; Jean A. Hoerni; Jean E.
Sammet; Jeffrey Chuan Chu; Jerrier A. Haddad; Jim
Pommerene; John Bardeen; John Burns; John C. McPherson;
John Clifford Shaw; John Diebold; John George Kemeny;
John Grist Brainerd; John H. Curtiss; John McCarthy;
John Napier; John Powers; John R. Pierce; John Todd;
John Vincent Atanasoff; John von Neumann; John Warner
Backus; John Weber Carr, III; John Wilder Tukey; John
William Mauchly; Johnathan Swift; Joseph Carl Robnett
Licklider; Joseph Chedaker; Joseph Clement; Joseph
Frederick Traub; Joseph Marie Jacquard; Joseph
Weizenbaum; Jules I. Schwartz; Julian Bigelow; Julius
Blank; Karl Karlstrom; Ken Thompson; Kenneth Eugene
Iverson; Kenneth H. Olsen; Konrad Zuse; L. F. Meabrea;
Lejaren A. Hiller; Leonardo of Pisa a.k.a. Fibonacci;
Leonardo Torres y Quevedo; Leslie John Comrie; Lord
Kelvin (William Thomson); Louis Couffignal; Lynn
Conway; L{\'e}on Boll{\'e}e; Marian Rejewski; Marvin L.
Minsky; Maurice Howard Halstead; Maurice V. Wilkes; Max
Palevsky; Maxwell H. A. Newman; Michael O. Rabin;
Michael Woodger; Mina Rees; Mitchell D. Kapor; Mohammed
ibn Musa Al-Khowarizmi; Morton Michael Astrahan;
Nathaniel Rochester; Nicholas Constantine Metropolis;
Niklaus Wirth; Noam Chomsky; Nolan Bushnell; Norbert
Wiener; Oliver G. Selfridge; Orrin Edison Taulbee; Paul
Allen; Percy Ludgate; Perry O. Crawford; Peter Naur;
Ralph E. Gomory; Richard Clippinger; Richard Courant;
Richard Ernest Bellman; Richard J. Canning; Richard M.
Bloch; Richard P. Feynman; Richard Snyder; Richard V.
D. Campbell; Richard Wesley Hamming; Robert H. Dennard;
Robert N. Noyce; Robert R. Everett; Robert S. Barton;
Robert Sarnoff; Robert W. Bemer; Robert W. Floyd; Roy
Nutt; S. B. Williams; Samuel H. Caldwell; Samuel
Morland; Samuel N. Alexander; Saul Rosen; Seymour
Papert; Seymour R. Cray; Sidney Fernbach; Stanley Gill;
Stephen A. Cook; Stephen Frank Baldwin; Stephen
Wozniak; Steven Jobs; T. Vincent Learson; Thomas Eugene
Kurtz; Thomas H. Flowers; Thomas J. Watson, Jr.; Thomas
J. Watson, Sr.; Thomas Kite Sharpless; Tom Kilburn;
Vannevar E Bush; Victor H. Grinich; Vladimar Zworykin;
W. J. Deerhake; W. Renwick; W. T. Odhner; Wallace J,
Eckert; Walter Pitts; Warren Sturgis McCulloch; Warren
Weaver; Wassily Leontieff; Watson Davis; Werner
Buchholz; Wilhelm Schikard; William C. Norris; William
F. McClelland; William Gates; William Hewlett; William
Leybourn; William Orchard-Hays; William Oughtred;
William P. Heising; William Seward Burroughs",
remark = "Norbert Wiener appears incorrectly as Norbert Weiner
in this article.",
}
@Article{Wells:1988:NAI,
author = "Codie Wells",
title = "A Note on {``Protection Imperfect''}",
journal = j-OPER-SYS-REV,
volume = "22",
number = "4",
pages = "35--35",
month = oct,
year = "1988",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:51 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See \cite{Hogan:1988:PIS}.",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Book{Welsh:1988:CC,
author = "Dominic Welsh",
title = "Codes and cryptography",
publisher = pub-OXFORD,
address = pub-OXFORD:adr,
pages = "ix + 257",
year = "1988",
ISBN = "0-19-853288-1 (hardcover), 0-19-853287-3 (paperback)",
ISBN-13 = "978-0-19-853288-0 (hardcover), 978-0-19-853287-3
(paperback)",
LCCN = "Z103 .W461 1988",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "UK\pounds30.00, US\$60.00 (hardcover), UK\pounds15.00
(paperback)",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@Article{Adams:1989:SRC,
author = "Carlisle M. Adams and Henk Meijer",
title = "Security-related comments regarding {McEliece}'s
public-key cryptosystem",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "IT-35",
number = "2",
pages = "454--455",
year = "1989",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/18.32140",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
MRclass = "94A60",
MRnumber = "999 658",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "IEEE Transactions on Information Theory",
}
@Article{Anonymous:1989:SZS,
author = "Anonymous",
title = "The safety zone (security products for
microcomputers)",
journal = j-BYTE,
volume = "14",
number = "6",
pages = "290--291",
month = jun,
year = "1989",
CODEN = "BYTEDJ",
ISSN = "0360-5280",
ISSN-L = "0360-5280",
bibdate = "Thu Sep 12 17:54:09 MDT 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "C5590 (Other peripheral equipment); C6130 (Data
handling techniques)",
fjournal = "BYTE Magazine",
keywords = "Access control; Add on boards; Audit trails; Boot
protection; DOS compatibility; Encryption; Macintosh
compatibility; Passwork protection; Security features;
Software packages; Virus protection",
thesaurus = "Add-on boards; Apple computers; Computer peripheral
equipment; IBM computers; Personal computing; Security
of data; Software packages",
}
@InProceedings{Bar-Ilan:1989:NFC,
author = "J. Bar-Ilan and D. Beaver",
title = "Non-Cryptographic Fault-Tolerant Computing in a
Constant Number of Rounds",
crossref = "ACM:1989:PEA",
pages = "201--209",
year = "1989",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 1]{Canetti:1997:PSL}.",
}
@Article{Bateman:1989:NMC,
author = "P. T. Bateman and J. L. Selfridge and S. S. {Wagstaff,
Jr.}",
title = "The new {Mersenne} conjecture",
journal = j-AMER-MATH-MONTHLY,
volume = "96",
number = "2",
pages = "125--128",
month = feb,
year = "1989",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
MRclass = "11A51 (11Y11)",
MRnumber = "90c:11009",
MRreviewer = "Neville Robbins",
bibdate = "Wed Dec 3 17:17:33 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See letter to the editor \cite{Mullin:1989:LEN}. The
authors state: {\sc New Mersenne Conjecture}. {\em If
two of the following statements about an odd positive
integer $p$ are true, then the third one is also true.
(a) $ p = 2^k \pm 1 $ or $ p = 4^k \pm 3 $. (b) $ M_p (
= 2^p - 1) $ is prime. (c) $ (2^p + 1) / 3 $ is
prime.}",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@InCollection{Beale:1989:EUR,
author = "M. Beale and M. F. Monaghan",
booktitle = "Cryptography and coding (Cirencester, 1986)",
title = "Encryption using random {Boolean} functions",
volume = "20",
publisher = pub-OXFORD,
address = pub-OXFORD:adr,
pages = "219--230",
year = "1989",
MRclass = "94A60",
MRnumber = "1 030 555",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
series = "Inst. Math. Appl. Conf. Ser. New Ser.",
}
@Article{Bennett:1989:EQC,
author = "C. H. Bennett and G. Brassard",
title = "Experimental quantum cryptography: the dawn of a new
era for quantum cryptography: the experimental
prototype is working",
journal = j-SIGACT,
volume = "20",
number = "4",
pages = "78--80",
month = nov,
year = "1989",
CODEN = "SIGNDM",
DOI = "http://dx.doi.org/10.1145/74074.74087",
ISSN = "0163-5700 (print), 1943-5827 (electronic)",
ISSN-L = "0163-5700",
bibdate = "Wed Mar 21 09:45:50 MDT 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sigact.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGACT News",
journal-URL = "http://dl.acm.org/citation.cfm?id=J697",
}
@Book{Bennett:1989:UMS,
author = "Ralph Francis Bennett",
title = "{Ultra} and {Mediterranean} strategy 1941--1945",
publisher = "H. Hamilton",
address = "London, UK",
pages = "496",
year = "1989",
ISBN = "0-241-12687-8",
ISBN-13 = "978-0-241-12687-5",
LCCN = "D766 .B46x 1989b",
bibdate = "Mon May 8 07:06:05 MDT 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "World War, 1939--1945; Campaigns; Mediterranean
Region; Secret service; Great Britain; Cryptography",
}
@Manual{Bishop:1989:FEP,
author = "Matt Bishop",
title = "The fast encryption package",
number = "185397",
publisher = "Research Institute for Advanced Computer Science",
address = "Moffett Field, CA, USA",
pages = "??",
year = "1989",
LCCN = "NAS 1.26:185397 Govt Pubs",
bibdate = "Mon Oct 19 08:50:31 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Microfiche.",
series = "NASA-CR",
acknowledgement = ack-nhfb,
keywords = "computers --- access control --- passwords",
}
@InProceedings{Bishop:1989:USS,
author = "M. Bishop",
title = "{UNIX} security in a supercomputing environment",
crossref = "ACM:1989:PSN",
pages = "693--698",
year = "1989",
bibdate = "Wed Apr 15 19:32:44 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "C6130 (Data handling techniques); C6150J (Operating
systems)",
corpsource = "Dept. of Math. and Comput. Sci., Dartmouth Coll.,
Hanover, NH, USA",
keywords = "access control lists; integrity mechanisms; parallel
processing; security of data; supercomputing
environment; system administration functions; Unix;
UNIX security; user authentication; working
prototypes",
sponsororg = "ACM; IEEE",
treatment = "P Practical",
}
@Article{Blanchard:1989:CSS,
author = "F. Blanchard",
title = "Certain sofic systems engendered codes",
journal = j-THEOR-COMP-SCI,
volume = "68",
number = "3",
pages = "253--265",
day = "12",
month = nov,
year = "1989",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
bibdate = "Sat Nov 22 13:29:49 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes); C1160 (Combinatorial mathematics);
C4210 (Formal logic)",
corpsource = "Lab. de Probabilit{\'e}s, Paris 6 Univ., France",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975",
keywords = "circular codes; codes; concatenation; encoding; finite
deciphering delay; first return code; local codes;
rational code; right-resolving cover; set theory; sofic
system; state space; unique splitting",
language = "French",
pubcountry = "Netherlands",
treatment = "T Theoretical or Mathematical",
}
@Article{Boyar:1989:ISPa,
author = "Joan Boyar",
title = "Inferring Sequences Produced by Pseudo-Random Number
Generators",
journal = j-J-ACM,
volume = "36",
number = "1",
pages = "129--141",
month = jan,
year = "1989",
CODEN = "JACOAH",
ISSN = "0004-5411",
ISSN-L = "0004-5411",
bibdate = "Wed Jan 15 18:12:53 MST 1997",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/jacm.bib",
URL = "http://www.acm.org/pubs/toc/Abstracts/0004-5411/59305.html;
http://www.imada.sdu.dk/~joan/",
abstract = "In this paper, efficient algorithms are given for
inferring sequences produced by pseudo-random number
generators of a certain form. Using this general
method, specific examples of generators having this
form, the linear congruential method, linear
congruences with $n$ terms in the recurrence, and
quadratic congruences are shown to be cryptographically
insecure.",
acknowledgement = ack-nhfb,
affiliationaddress = "Chicago, IL, USA",
classification = "723; 922",
fjournal = "Journal of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J401",
journalabr = "J Assoc Comput Mach",
keywords = "algorithms; Computer Programming --- Algorithms;
Cryptography; cryptography; inductive inference; linear
congruential method; Mathematical Statistics;
Pseudorandom Number Generators; Random Number
Generation; security; Sequence Inferring Algorithms;
Theory of Computation",
remark = "Early publications, including 1983 Berkeley Ph.D.
dissertation, as Joan B. Plumstead.",
subject = "{\bf E.3}: Data, DATA ENCRYPTION. {\bf F.2.1}: Theory
of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Numerical Algorithms and Problems. {\bf
G.3}: Mathematics of Computing, PROBABILITY AND
STATISTICS, Random number generation.",
}
@Article{Boyar:1989:ISPb,
author = "Joan Boyar",
title = "Inferring sequences produced by a linear congruential
generator missing low-order bits",
journal = j-J-CRYPTOLOGY,
volume = "1",
number = "3",
pages = "177--184",
month = "????",
year = "1989",
CODEN = "JOCREQ",
DOI = "http://dx.doi.org/10.1007/BF02252875",
ISSN = "0933-2790 (print), 1432-1378 (electronic)",
ISSN-L = "0933-2790",
MRclass = "94A60 (11B50 11T71 11Y16 65C10)",
MRnumber = "1007218 (90g:94012)",
MRreviewer = "Min Qiang Huang",
bibdate = "Wed Dec 21 07:59:46 2011",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/jcryptology.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
acknowledgement = ack-nhfb,
affiliation = "Univ of Chicago",
affiliationaddress = "Chicago, IL, USA",
classification = "723; 922",
fjournal = "Journal of Cryptology",
journal-URL = "http://link.springer.com/journal/145",
journalabr = "J Cryptol",
keywords = "Computer Programming--Algorithms; Cryptography; Linear
Congruential Method; Mathematical Statistics--Random
Number Generation; Pseudorandom Number Generators",
}
@Article{Brassard:1989:CCa,
author = "Gilles Brassard",
title = "Cryptology column",
journal = j-SIGACT,
volume = "20",
number = "3",
pages = "15--19",
month = jul,
year = "1989",
CODEN = "SIGNDM",
DOI = "http://dx.doi.org/10.1145/70642.70643",
ISSN = "0163-5700 (print), 1943-5827 (electronic)",
ISSN-L = "0163-5700",
bibdate = "Wed Mar 21 09:45:50 MDT 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sigact.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGACT News",
journal-URL = "http://dl.acm.org/citation.cfm?id=J697",
}
@Article{Brassard:1989:CCb,
author = "G. Brassard",
title = "Cryptology --- column 2",
journal = j-SIGACT,
volume = "20",
number = "4",
pages = "13--13",
month = nov,
year = "1989",
CODEN = "SIGNDM",
DOI = "http://dx.doi.org/10.1145/74074.74075",
ISSN = "0163-5700 (print), 1943-5827 (electronic)",
ISSN-L = "0163-5700",
bibdate = "Wed Mar 21 09:45:50 MDT 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sigact.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM SIGACT News",
journal-URL = "http://dl.acm.org/citation.cfm?id=J697",
}
@TechReport{Burrows:1989:LAa,
author = "Michael Burrows and Martin Abadi and Roger Needham",
title = "A Logic of Authentication",
number = "39",
institution = "Digital Equipment Corporation, Systems Research
Centre",
pages = "48",
day = "28",
month = feb,
year = "1989",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
abstract = "Questions of belief are essential in analyzing
protocols for authentication in distributed computing
systems. In this paper we motivate, set out, and
exemplify a logic specifically designed for this
analysis; we show how various protocols differ subtly
with respect to the required initial assumptions of the
participants and their final beliefs. Our formalism has
enabled us to isolate and express these differences
with a precision that was not previously possible. It
has drawn attention to features of protocols of which
we and their authors were previously unaware, and
allowed us to suggest improvements to the protocols.
The reasoning about some protocols has been
mechanically verified. This paper starts with an
informal account of the problem, goes on to explain the
formalism to be used, and gives examples of its
application to protocols from the literature, both with
conventional shared-key cryptography and with
public-key cryptography. Some of the examples are
chosen because of their practical importance, while
others serve to illustrate subtle points of the logic
and to explain how we use it. We discuss extensions of
the logic motivated by actual practice -- for example,
in order to account for the use of hash functions in
signatures. The final sections contain a formal
semantics of the logic and some conclusions.",
acknowledgement = ack-nhfb,
}
@Article{Burrows:1989:LAb,
author = "M. Burrows and M. Abadi and R. Needham",
title = "A logic of authentication",
journal = j-OPER-SYS-REV,
volume = "23",
number = "5",
pages = "1--13",
month = dec,
year = "1989",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 12:47:29 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Book{Callimahos:1989:TAZ,
author = "Lambros D. Callimahos",
title = "Traffic Analysis and the {Zendian} Problem: an
exercise in communications intelligence operations",
publisher = pub-AEGEAN-PARK,
address = pub-AEGEAN-PARK:adr,
pages = "256",
year = "1989",
ISBN = "0-89412-162-6, 0-89412-161-8 (paperback)",
ISBN-13 = "978-0-89412-162-3, 978-0-89412-161-6 (paperback)",
LCCN = "????",
bibdate = "Tue Dec 01 11:01:51 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Chor:1989:SCT,
author = "Benny Chor and Michael Merritt and David B. Shmoys",
title = "Simple Constant-Time Consensus Protocols in Realistic
Failure Models",
journal = j-J-ACM,
volume = "36",
number = "3",
pages = "591--614",
month = jul,
year = "1989",
CODEN = "JACOAH",
ISSN = "0004-5411",
ISSN-L = "0004-5411",
bibdate = "Wed Jan 15 18:12:53 MST 1997",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Distributed/CCR.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "{\bf Review: Computing Reviews}, June 1990.",
URL = "http://www.acm.org/pubs/toc/Abstracts/0004-5411/65956.html",
abstract = "Using simple protocols, it is shown how to achieve
consensus in constant expected time, within a variety
of fail-stop and omission failure models.
Significantly, the strongest models considered are
completely asynchronous. All of the results are based
on distributively flipping a coin, which is usable by a
significant majority of the processors. Finally, a
nearly matching lower bound is also given for
randomized protocols for consensus.",
acknowledgement = ack-nhfb,
affiliationaddress = "Haifa, Isr",
classification = "722; 723",
fjournal = "Journal of the Association for Computing Machinery",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J401",
journalabr = "J Assoc Comput Mach",
keywords = "agreement problem; algorithms; Computer Systems,
Digital; consensus problem; Consensus Protocols;
cryptography; Distributed; Distributed Computing;
Distributed Systems; Failure Analysis; Failure Models;
fault tolerance; Lower Bounds; performance; Randomized
Protocols; reliability; security; theory",
subject = "{\bf C.2.2}: Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.4}: Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.",
}
@PhdThesis{Chuang:1989:NES,
author = "Ta-Fu Chuang",
title = "Non-homomorphic encryption schemes and properties of
{Chinese} remainder theorem",
type = "Thesis ({Ph.D.} in Engineering)",
school = "University of Wisconsin-Milwaukee",
address = "Milwaukee, WI, USA",
pages = "vi + 58",
year = "1989",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Cryptography; Data protection.",
}
@TechReport{Coppersmith:1989:AID,
author = "D. Coppersmith",
title = "Analysis of {ISO/CCITT} Document {X}.509 Annex {D}",
type = "Internal Memo.",
institution = "IBM T. J. Watson Center",
address = "Yorktown Heights, NY, USA",
pages = "??",
day = "11",
month = jun,
year = "1989",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 5]{Kaliski:1995:SUR}.",
}
@Book{Deavours:1989:CMH,
editor = "Cipher A. Deavours and David Kahn and others",
title = "Cryptology: machines, history, \& methods",
publisher = pub-ARTECH,
address = pub-ARTECH:adr,
pages = "x + 508",
year = "1989",
ISBN = "0-89006-399-0",
ISBN-13 = "978-0-89006-399-6",
LCCN = "Z103 .C75 1989",
bibdate = "Sat Nov 21 11:43:43 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Second volume of selected papers from issues of
Cryptologia.",
acknowledgement = ack-nhfb,
keywords = "Ciphers; ciphers; cryptography; Cryptography;
Cryptology",
}
@Book{Denning:1989:EET,
author = "Dorothy Elizabeth Robling Denning and William E.
{Baugh, Jr.}",
title = "Encryption and evolving technologies: tools of
organized crime and terrorism",
publisher = "National Strategy Information Center",
address = "Washington, DC, USA",
pages = "ii + 52",
year = "1989",
ISSN = "1093-7269",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "US Working Group on Organized Crime monograph series",
acknowledgement = ack-nhfb,
keywords = "Computer crimes --- United States; Data encryption
(Computer science); Terrorism.",
}
@Article{Dror:1989:SCG,
author = "Asael Dror",
title = "Secret Codes (any good data security system must rely
on encryption)",
journal = j-BYTE,
volume = "14",
number = "6",
pages = "267--270",
month = jun,
year = "1989",
CODEN = "BYTEDJ",
ISSN = "0360-5280",
ISSN-L = "0360-5280",
bibdate = "Thu Sep 12 17:54:09 MDT 1996",
bibsource = "/usr/local/src/bib/bibliography/Misc/security.1.bib;
http://www.math.utah.edu/pub/tex/bib/byte1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Wisdom Software, San Francisco, CA, USA",
classification = "B6120B (Codes); C0230 (Economic, social and
political aspects); C6130 (Data handling techniques)",
fjournal = "BYTE Magazine",
keywords = "Analytical cryptoanalysis; Authenticity; Code
breaking; Conventional cryptosystems; Data security
system; Date Encryption; Digital signature; Encryption;
Public key cryptosystem; Public key encryption; RSA
public key system; Statistical cryptoanalysis",
thesaurus = "Cryptography",
}
@Article{Er:1989:NAG,
author = "M. C. Er",
title = "A new algorithm for generating binary trees using
rotations",
journal = j-COMP-J,
volume = "32",
number = "5",
pages = "470--473",
month = oct,
year = "1989",
CODEN = "CMPJA6",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
MRclass = "68P05 (68R10)",
MRnumber = "1 018 458",
bibdate = "Tue Mar 25 13:51:56 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_05/",
URL = "http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_05/tiff/470.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_05/tiff/471.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_05/tiff/472.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_05/tiff/473.tif",
acknowledgement = ack-nhfb,
affiliation = "Dept. of Comput. Sci., Western Australia Univ.,
Nedlands, WA, Australia",
classcodes = "C4240 (Programming and algorithm theory); C1160
(Combinatorial mathematics)",
classification = "C1160 (Combinatorial mathematics); C4240
(Programming and algorithm theory)",
corpsource = "Dept. of Comput. Sci., Western Australia Univ.,
Nedlands, WA, Australia",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "admissible; algorithm theory; codewords; Codewords;
cryptography; generation binary trees; Generation
binary trees; rotational; Rotational admissible;
rotations; Rotations; trees (mathematics); Zerling
algorithms",
thesaurus = "Algorithm theory; Cryptography; Trees [mathematics]",
treatment = "P Practical",
}
@MastersThesis{Frankel:1989:TIC,
author = "Yair Frankel",
title = "Two issues in cryptology: algebraic analysis of {DES}
and a shared public key system",
type = "Thesis ({M.S. in Computer Science})",
school = "University of Wisconsin-Milwaukee",
address = "Milwaukee, WI, USA",
pages = "ix + 32",
year = "1989",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Computers --- Access control; Cryptography",
}
@Book{Gaj:1989:GCM,
author = "Kris Gaj",
title = "{German} Cipher Machine {Enigma} --- Methods of
Breaking",
publisher = "Wydawnictwa Komunikacji i Lacznosci",
address = "Warszawa, Poland",
pages = "????",
year = "1989",
ISBN = "????",
ISBN-13 = "????",
LCCN = "????",
bibdate = "Sun Dec 01 09:28:04 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
language = "Polish",
}
@InProceedings{Goldreich:1989:HCP,
author = "O. Goldreich and L. A. Levin",
title = "A hard-core predicate for all one-way functions",
crossref = "ACM:1989:PTF",
pages = "25--32",
year = "1989",
bibdate = "Wed Feb 20 18:33:47 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.acm.org/pubs/contents/proceedings/series/stoc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/articles/proceedings/stoc/73007/p25-goldreich/p25-goldreich.pdf;
http://www.acm.org/pubs/citations/proceedings/stoc/73007/p25-goldreich/",
acknowledgement = ack-nhfb,
keywords = "cryptography",
}
@Article{Goldwasser:1989:KCI,
author = "Shafi Goldwasser and Silvio Micali and Charles
Rackoff",
title = "The Knowledge Complexity of Interactive Proof
Systems",
journal = j-SIAM-J-COMPUT,
volume = "18",
number = "1",
pages = "186--208",
month = feb,
year = "1989",
CODEN = "SMJCAT",
ISSN = "0097-5397 (print), 1095-7111 (electronic)",
ISSN-L = "0097-5397",
MRclass = "68T15 (03F07 68Q15 94A60)",
MRnumber = "90f:68157",
MRreviewer = "Robert M. Baer",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
abstract = "Usually, a proof of a theorem contains more knowledge
than the mere fact that the theorem is true. For
instance, to prove that a graph is Hamiltonian it
suffices to exhibit a Hamiltonian tour in it; however,
this seems to contain more knowledge than the single
bit Hamiltonian\slash non-Hamiltonian. In this paper a
computational complexity theory of the `knowledge'
contained in a proof is developed. Zero-knowledge
proofs are defined as those proofs that convey no
additional knowledge other than the correctness of the
proposition in question. Examples of zero-knowledge
proof systems are given for the languages of quadratic
residuosity and quadratic nonresiduosity. These are the
first examples of zero-knowledge proofs for languages
not known to be efficiently recognizable.",
acknowledgement = ack-nhfb,
affiliationaddress = "Cambridge, MA, USA",
classification = "721; 722; 723",
fjournal = "SIAM Journal on Computing",
journal-URL = "http://epubs.siam.org/sicomp",
journalabr = "SIAM J Comput",
keywords = "Artificial Intelligence --- Applications; Automata
Theory; Complexity of Algorithms; Computer Systems,
Digital --- Interactive Operation; Cryptography;
Interactive Proof Systems; Theorem Proving",
referencedin = "Referenced in \cite[Ref. 19]{Goldreich:1997:FMCb}.",
}
@Article{Gong:1989:SCB,
author = "Li Gong",
title = "On security in capability-based systems",
journal = j-OPER-SYS-REV,
volume = "23",
number = "2",
pages = "56--60",
month = apr,
year = "1989",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:40 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Book{Hardjono:1989:TCB,
author = "Thomas Hardjono and Jennifer Seberry",
title = "Towards the cryptanalysis of {Bahasa Indonesia} and
{Malaysia}",
volume = "2",
publisher = "Centre for Commuter Security Research",
address = "Canberra, Australia",
pages = "vi + 148",
year = "1989",
ISBN = "0-7317-0091-0",
ISBN-13 = "978-0-7317-0091-2",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "CCSR Tutorial Series in Computer Security",
acknowledgement = ack-nhfb,
keywords = "Cryptography.",
}
@MastersThesis{Hersch:1989:DSA,
author = "Jeffrey Stuart Hersch",
title = "Digital signature analysis of radar reflections for
the assessment of concrete bridge deck deterioration",
type = "Thesis ({M.S.})",
school = "Massachusetts Institute of Technology, Department of
Civil Engineering",
address = "Cambridge, MA, USA",
pages = "165",
year = "1989",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Supervised by Kenneth R. Maser and Alexander Slocum.",
acknowledgement = ack-nhfb,
}
@InProceedings{Impagliazzo:1989:ECS,
author = "Russell Impagliazzo and Moni Naor",
title = "Efficient cryptographic schemes provably as secure as
subset sum",
crossref = "IEEE:1989:ASF",
pages = "236--241",
year = "1989",
ISBN = "0-8186-1982-1",
ISBN-13 = "978-0-8186-1982-3",
LCCN = "QA 76 S979 1989",
bibdate = "Tue May 12 09:49:52 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
abstract = "Very efficient constructions, based on the
intractability of the subset sum problem for certain
dimensions, are shown for a pseudorandom generator and
for a universal one-way hash function. (Pseudorandom
generators can be used for private key encryption, and
universal one-way hash functions for signature
schemes). The increase in efficiency in the
construction is due to the fact that many bits can be
generated\slash hashed with one application of the
assumed one-way function. All the constructions can be
implemented in NC using an optimal number of
processors.",
acknowledgement = ack-nhfb,
affiliation = "Univ of California, Berkeley, CA, USA",
classification = "723",
keywords = "Cryptography; Hash Functions; Private Key Encryption;
Pseudorandom Generators; Signature Schemes; Subset Sum
Security; Universal One Way Rash Functions",
}
@InProceedings{Impagliazzo:1989:LPC,
author = "R. Impagliazzo and S. Rudich",
title = "Limits on the Provable Consequences of One-Way
Permutations",
crossref = "ACM:1989:PTF",
pages = "44--61",
year = "1989",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 21]{Goldreich:1997:FMCb}.",
}
@InProceedings{Impagliazzo:1989:OWF,
author = "R. Impagliazzo and M. Luby",
title = "One-way functions are essential for complexity based
cryptography",
crossref = "IEEE:1989:ASF",
pages = "230--235",
year = "1989",
bibdate = "Thu Apr 5 06:13:40 MDT 2001",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@MastersThesis{Johnson:1989:BDC,
author = "Michael Paul Johnson",
title = "Beyond {DES}: data compression and the {MPJ}
encryption algorithm",
type = "Thesis ({M.S.})",
school = "University of Colorado at Colorado Springs",
address = "Colorado Springs, CO, USA",
pages = "viii + 127",
year = "1989",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Computers --- Security measures; Cryptography;
Electronic digital computers --- Security measures.",
}
@Article{Kari:1989:CBP,
author = "Jarkko Kari",
booktitle = "Machines, languages, and complexity (Smolenice,
1988)",
title = "A cryptosystem based on propositional logic",
journal = j-LECT-NOTES-COMP-SCI,
volume = "381",
pages = "210--219",
year = "1989",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
MRclass = "68Q15 (03B05 03D15 68P25)",
MRnumber = "91d:68038",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Kari:1989:OCP,
author = "Jarkko Kari",
title = "Observations concerning a public-key cryptosystem
based on iterated morphisms",
journal = j-THEOR-COMP-SCI,
volume = "66",
number = "1",
pages = "45--53",
day = "2",
month = aug,
year = "1989",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
MRclass = "68Q45 (68P25)",
MRnumber = "91a:68163",
MRreviewer = "Rani Siromoney",
bibdate = "Sat Nov 22 13:29:49 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes); C6130 (Data handling techniques)",
corpsource = "Dept. of Math., Turku Univ., Finland",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975",
keywords = "cryptography; cryptotext; decryption key; iterated
morphisms; NP-hard problem; plaintext; public-key
cryptosystem; substitutions",
pubcountry = "Netherlands",
treatment = "P Practical",
}
@InProceedings{Kearns:1989:CLL,
author = "M. Kearns and L. G. Valiant",
title = "Cryptographic limitations on learning {Boolean}
formulae and finite automata",
crossref = "ACM:1989:PTF",
pages = "433--444",
year = "1989",
bibdate = "Wed Feb 20 18:33:47 MST 2002",
bibsource = "http://portal.acm.org/;
http://www.acm.org/pubs/contents/proceedings/series/stoc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/articles/proceedings/stoc/73007/p433-kearns/p433-kearns.pdf;
http://www.acm.org/pubs/citations/proceedings/stoc/73007/p433-kearns/",
acknowledgement = ack-nhfb,
}
@TechReport{Kemmerer:1989:AEP,
author = "Richard A. Kemmerer",
title = "Analyzing encryption protocols using formal
verification techniques",
type = "Technical report",
number = "TRCS 89-4",
institution = "Department of Computer Science, College of
Engineering, University of California, Santa Barbara",
address = "Santa Barbara, CA, USA",
pages = "23",
year = "1989",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "``This report will appear in IEEE Journal on Selected
Areas in Communication.'' ``February 1989.'' Abstract:
``This paper presents an approach to analyzing
encryption protocols using machine aided formal
verification techniques. The properties that the
protocol should preserve are expressed as state
invariants and the theorems that must be proved to
guarantee that the cryptographic facility satisfies the
invariants are automatically generated by the
verification system.'' A formal specification of an
example system is presented, and several weaknesses
that were revealed by attempting to formally verify and
test the specification are discussed.``",
keywords = "Computer programs --- Verification.",
}
@Article{Kerr:1989:SNM,
author = "S. Kerr",
title = "A secret no more (security and encryption)",
journal = j-DATAMATION,
volume = "35",
number = "13",
pages = "53--55",
month = jul,
year = "1989",
CODEN = "DTMNAT",
ISSN = "0011-6963",
bibdate = "Sat Sep 14 12:10:21 MDT 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes); C0230 (Economic, social and
political aspects); C0310D (Installation management)",
fjournal = "Datamation",
keywords = "Commercial COMSEC Endorsement Program; Corporate
security; Data Encryption Standard; DES; National
Security Agency; Viruses",
language = "English",
pubcountry = "USA",
thesaurus = "DP management; Security of data",
}
@Article{Kim:1989:PRP,
author = "Su Hee Kim and Carl Pomerance",
title = "The probability that a random probable prime is
composite",
journal = j-MATH-COMPUT,
volume = "53",
number = "188",
pages = "721--741",
month = oct,
year = "1989",
CODEN = "MCMPAF",
ISSN = "0025-5718 (paper), 1088-6842 (electronic)",
ISSN-L = "0025-5718",
MRclass = "11Y11 (11A51)",
MRnumber = "90e:11190",
MRreviewer = "Samuel S. Wagstaff, Jr.",
bibdate = "Tue Oct 13 08:06:19 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
classcodes = "C1160 (Combinatorial mathematics); C1140Z (Other and
miscellaneous)",
corpsource = "Dept. of Comp. Sci., Univ. of Southern Univ.,
Columbia, SC, USA",
fjournal = "Mathematics of Computation",
journal-URL = "http://www.ams.org/mcom/",
keywords = "composite number; Erd{\H{o}}s; explicit inequalities;
number theory; probability; random odd number; random
probable prime",
referencedin = "Referenced in \cite[Ref. 5]{Silverman:1997:FGR}.",
treatment = "T Theoretical or Mathematical",
}
@Article{Klein:1989:STR,
author = "Shmuel T. Klein and Abraham Bookstein and Scott
Deerwester",
title = "Storing Text Retrieval Systems on {CD-ROM}.
Compression and Encryption Considerations",
journal = j-TOIS,
volume = "7",
number = "3",
pages = "230--245",
month = jul,
year = "1989",
CODEN = "ATISET",
ISSN = "1046-8188",
ISSN-L = "0734-2047",
bibdate = "Sat Jan 16 19:04:41 MST 1999",
bibsource = "Compendex database;
http://www.acm.org/pubs/tois/toc.html;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Special Issue on Research and Development in
Information Retrieval.",
URL = "http://www.acm.org:80",
abstract = "The emergence of the CD-ROM as a storage medium for
full-text databases raises the question of the maximum
size database that can be contained by this medium. As
an example, the problem of storing the Tr{\'e}sor de la
Langue Fran{\c{c}}aise on a CD-ROM is examined.
Pertinent approaches to compression of the various
files are reviewed, and the compression of the text is
related to the problem of data encryption:
Specifically, it is shown that, under simple models of
text generation, Huffman encoding produces a bit-string
indistinguishable from a representation of coin
flips.",
acknowledgement = ack-nhfb,
affiliation = "Univ of Chicago",
affiliationaddress = "Chicago, IL, USA",
classification = "723; 741; 903",
conference = "SIGIR Conference on Research and Development in
Information Retrieval",
fjournal = "ACM Transactions on Information Systems",
journalabr = "ACM Trans Inf Syst",
keywords = "cd-rom; Cryptography; Data Encryption; Data Storage,
Optical; Full-Text Storage; Huffman Coding; Information
Retrieval Systems --- Database Systems; Information
Theory --- Data Compression; Storage Devices; Text
Retrieval Systems",
meetingaddress = "Cambridge, MA, USA",
meetingdate = "Jun 1989",
meetingdate2 = "06/89",
wwwtitle = "String Text Retrieval Systems on {CD-ROM}: Compression
and Encryption Considerations",
}
@Article{Kochanski:1989:HSI,
author = "Martin Kochanski",
title = "How safe is it? (computer security)",
journal = j-BYTE,
volume = "14",
number = "6",
pages = "257--264",
month = jun,
year = "1989",
CODEN = "BYTEDJ",
ISSN = "0360-5280",
ISSN-L = "0360-5280",
bibdate = "Thu Sep 12 17:54:09 MDT 1996",
bibsource = "/usr/local/src/bib/bibliography/Misc/security.1.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Bus. Simulations Ltd., London, UK",
classification = "C0230 (Economic, social and political aspects);
C0310D (Installation management); C6130 (Data handling
techniques)",
fjournal = "BYTE Magazine",
keywords = "Access control; Appropriate security; Computer
networks; Computer security; Encryption methods;
Microcomputers; Network security; Passwords; Security
measures; Standards; Transparent encryption;
Validation",
thesaurus = "Computer networks; Microcomputer applications;
Security of data; Standards",
}
@Article{Konheim:1989:RMC,
author = "Alan G. Konheim",
title = "Reviews: {{\em Mathematical Cryptology for Computer
Scientists and Mathematicians}}, by {Wayne Patterson};
{{\em A Course in Number Theory and Cryptography}}, by
{Neal Koblitz}",
journal = j-AMER-MATH-MONTHLY,
volume = "96",
number = "4",
pages = "374--375",
month = apr,
year = "1989",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
bibdate = "Mon Jun 28 12:39:24 MDT 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
JSTOR database",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@TechReport{Kordes:1989:UMC,
author = "F. L. G. Kordes and J. J. Schuurman",
title = "The use of {MEBAS} in creating a simulation
environment for compression and encryption",
type = "Report",
number = "NLR TP 89130 U",
institution = "National Lucht-en Ruimtevaartlaboratorium",
address = "Amsterdam, The Netherlands",
pages = "69",
year = "1989",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Cover title.",
keywords = "Algorithms --- Testing; Computer simulation ---
Testing; Data compression (Computer science)",
}
@Article{Laih:1989:NTS,
author = "Chi Sung Laih and Jau Yien Lee and Lein Harn",
title = "A new threshold scheme and its application in
designing the conference key distribution
cryptosystem",
journal = j-INFO-PROC-LETT,
volume = "32",
number = "3",
pages = "95--99",
day = "24",
month = aug,
year = "1989",
CODEN = "IFPLAT",
ISSN = "0020-0190 (print), 1872-6119 (electronic)",
ISSN-L = "0020-0190",
MRclass = "68P25",
MRnumber = "1 013 918",
bibdate = "Wed Nov 11 12:16:26 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
acknowledgement = ack-nhfb,
affiliation = "Natl Chen Kung Univ",
affiliationaddress = "Tainan, Taiwan",
classification = "718; 723; B6120B (Codes)",
corpsource = "Dept. of Electr. Eng., Nat. Chen Kung Univ., Tainan,
Taiwan",
fjournal = "Information Processing Letters",
journal-URL = "http://www.sciencedirect.com/science/journal/00200190",
journalabr = "Inf Process Lett",
keywords = "abnegation incidents; betrayal incidents; conference
key distribution cryptosystem; cross-product;
Cryptography; cryptography; Data Processing ---
Security of Data; Data Processing--Security of Data;
multiple users; N-dimensional vector space; property
protection; single-system master key; Threshold Scheme;
threshold scheme",
treatment = "T Theoretical or Mathematical",
}
@Article{Landau:1989:SSC,
author = "Charles R. Landau",
title = "Security in a secure capability-based system",
journal = j-OPER-SYS-REV,
volume = "23",
number = "4",
pages = "2--4",
month = oct,
year = "1989",
CODEN = "OSRED8",
ISSN = "0163-5980",
ISSN-L = "0163-5980",
bibdate = "Sat Aug 26 08:55:51 MDT 2006",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Operating Systems Review",
}
@Article{Leclerc:1989:CRM,
author = "Matthias Leclerc",
title = "{Chinesische Reste und moderne Kryptographie}.
{(German) [Chinese remainders and modern
cryptography]}",
journal = j-MATH-SEMESTERBER,
volume = "36",
number = "2",
pages = "257--267",
year = "1989",
CODEN = "????",
ISSN = "0720-728X",
ISSN-L = "0720-728X",
MRclass = "11Y16 (11T71 94A60)",
MRnumber = "91d:11163",
MRreviewer = "Albrecht Beutelspacher",
bibdate = "Tue Feb 9 11:14:49 MST 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Mathematische Semesterberichte",
language = "German",
}
@InProceedings{Lee:1989:WBL,
author = "T. Paul Lee and R. E. Barkley",
title = "A Watermark-based Lazy Buddy System for Kernel Memory
Allocation",
crossref = "USENIX:1989:UCPb",
institution = "AT\&T Bell Laboratories",
pages = "1--13",
month = "Summer",
year = "1989",
bibdate = "Wed Aug 13 10:48:45 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.usenix.org/cgi-bin/sortbib.pl?-sA",
acknowledgement = ack-nhfb,
}
@InProceedings{Lee:1989:WLB,
author = "T. Paul Lee and R. E. Barkley",
title = "A Watermark-based Lazy Buddy System for Kernel Memory
Allocation",
crossref = "USENIX:1989:PSU",
pages = "1--13",
month = "Summer",
year = "1989",
bibdate = "Tue Feb 20 15:42:13 MST 1996",
bibsource = "ftp://ftp.uu.net/library/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "AT\&T Bell Laboratories",
}
@Article{Lu:1989:SCI,
author = "W. P. Lu and M. K. Sundareshan",
title = "Secure Communication in {Internet} Environments: a
Hierarchical Key Management Scheme for {End-to-End}
Encryption",
journal = j-IEEE-TRANS-COMM,
volume = "37",
number = "10",
pages = "1014--1023",
day = "1",
month = oct,
year = "1989",
CODEN = "IECMBT",
DOI = "http://dx.doi.org/10.1109/26.41153",
ISSN = "0090-6778 (print), 1558-0857 (electronic)",
ISSN-L = "0090-6778",
bibdate = "Tue Jun 18 10:48:45 MDT 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
UnCover library database",
acknowledgement = ack-nhfb,
fjournal = "IEEE Transactions on Communications",
}
@Article{Mastrovito:1989:VDM,
author = "E. D. Mastrovito",
title = "{VLSI} designs for multiplication over finite fields
{$ \mathrm {GF}(2^m) $}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "357",
pages = "397--309",
year = "1989",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Jun 24 21:09:00 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
fjournal = "Lecture Notes in Computer Science",
}
@Book{Mendelsohn:1989:CWI,
editor = "John Mendelsohn",
title = "Covert warfare: intelligence, counterintelligence, and
military deception during the {World War II} era",
publisher = "Garland",
address = "New York, NY, USA",
pages = "????",
year = "1989",
ISBN = "0-8240-7950-7 (vol. 1)",
ISBN-13 = "978-0-8240-7950-5 (vol. 1)",
LCCN = "D810.S7 C66 1989",
bibdate = "Mon May 8 07:05:46 MDT 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
price = "US\$60.00",
acknowledgement = ack-nhfb,
subject = "World War, 1939--1945; Secret service; Sources",
}
@Article{Mitchell:1989:MDS,
author = "C. Mitchell",
title = "Multi-destination secure electronic mail",
journal = j-COMP-J,
volume = "32",
number = "1",
pages = "13--15",
month = feb,
year = "1989",
CODEN = "CMPJA6",
DOI = "http://dx.doi.org/10.1093/comjnl/32.1.13",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Dec 4 14:48:26 MST 2012",
bibsource = "Compendex database; Distributed/CCR.bib;
http://comjnl.oxfordjournals.org/content/32/1.toc;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/",
URL = "http://comjnl.oxfordjournals.org/content/32/1/13.full.pdf+html;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/tiff/13.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/tiff/14.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_01/tiff/15.tif",
abstract = "Electronic mail messages are often sent to more than
one destination; this gives rise to problems when
security is required. A recent draft for a standard for
securing electronic mail messages suggests a novel
mechanism for solving the problem. Unfortunately, as
shown herein, the solution is flawed and can allow the
construction of fake messages which will pass the
authenticity tests. [{\it Ed. Note}: This article
describes problems in RFC 989 which are believed to
have been fixed by RFC 1040]",
acknowledgement = ack-nhfb,
affiliation = "Hewlett--Packard Labs.",
affiliationaddress = "Bristol, Engl",
classcodes = "B6210G (Electronic mail); C6130 (Data handling
techniques)",
classification = "723; 902; B6210G (Electronic mail); C6130 (Data
handling techniques)",
corpsource = "Hewlett--Packard Labs., Bristol, UK",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "authenticity tests; Authenticity tests; Cryptography;
electronic mail; Electronic Mail; fake; Fake messages;
messages; multidestination mail; Multidestination
Message Authentication, Multidestination mail; secure
electronic mail; Secure Electronic Mail; Secure
electronic mail; security of data; standards;
Standards",
thesaurus = "Electronic mail; Security of data; Standards",
treatment = "P Practical",
}
@Article{Mitchell:1989:RHF,
author = "Chris Mitchell and Dave Rush and Michael Walker",
title = "A Remark on Hash Functions for Message
Authentication",
journal = j-COMPUT-SECUR,
volume = "8",
number = "1",
pages = "55--58",
day = "1",
month = feb,
year = "1989",
CODEN = "CPSEDU",
ISSN = "0167-4048",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 25 17:38:12 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib; UnCover
library database",
abstract = "This paper considers the use of hash functions for
message authentication. It is shown that a proposed
method for using hash functions does not provide a
secure non-repudiation service.",
acknowledgement = ack-nhfb,
affiliation = "Hewlett--Packard Ltd",
affiliationaddress = "Bristol, Engl",
classification = "723",
fjournal = "Computers and Security",
journalabr = "Comput Secur",
keywords = "Computer Networks --- Protection; Cryptography; Hash
Functions; Message Authentication",
}
@Book{Mulligan:1989:UMA,
editor = "Timothy Mulligan",
title = "{ULTRA}, {MAGIC}, and the {Allies}",
volume = "1",
publisher = "Garland",
address = "New York, NY, USA",
pages = "(various)",
year = "1989",
ISBN = "0-8240-7950-7",
ISBN-13 = "978-0-8240-7950-5",
LCCN = "D810.S7 C66 1989 vol. 1; D810.C88",
bibdate = "Mon May 8 07:05:46 MDT 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
price = "US\$60.00",
series = "Covert warfare",
acknowledgement = ack-nhfb,
subject = "World War, 1939--1945; Cryptography; Sources; Secret
service; Great Britain; United States",
}
@Article{Mullin:1989:LEN,
author = "Albert A. Mullin",
title = "Letter to the editor: {``The new Mersenne conjecture''
[Amer. Math. Monthly {\bf 96} (1989), no. 2, 125--128,
MR 90c:11009] by P. T. Bateman, J. L. Selfridge and S.
S. Wagstaff, Jr}",
journal = j-AMER-MATH-MONTHLY,
volume = "96",
number = "6",
pages = "511--511",
month = "????",
year = "1989",
CODEN = "AMMYAE",
ISSN = "0002-9890 (print), 1930-0972 (electronic)",
ISSN-L = "0002-9890",
MRclass = "11A51 (11Y11)",
MRnumber = "90f:11008",
MRreviewer = "Neville Robbins",
bibdate = "Wed Dec 3 17:17:33 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See \cite{Bateman:1989:NMC}. Conjectures that ``$ M_n
( = 2^n - 1) $ is the product of two distinct primes
only if $n$ is either a prime $p$ or the square of a
prime $q$, in which case precisely one prime factor of
$ M_n $ is Mersenne, vis. $ M_q $.''",
acknowledgement = ack-nhfb,
fjournal = "American Mathematical Monthly",
journal-URL = "http://www.jstor.org/page/journal/amermathmont/about.html",
}
@TechReport{Naik:1989:CDS,
author = "Varsha Naik",
title = "Cryptology in data security environment: what should
be the new trend?",
institution = "????",
address = "????",
pages = "63",
year = "1989",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Typescript.",
keywords = "Cryptography; Data protection; Electronic data
processing departments --- Security measures",
}
@InProceedings{Naor:1989:UOH,
author = "Moni Naor and Moti Yung",
title = "Universal one-way hash functions and their
cryptographic applications",
crossref = "ACM:1989:PTF",
pages = "33--43",
year = "1989",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
abstract = "We define a Universal One-Way Hash Function family, a
new primitive which enables the compression of elements
in the function domain. The main property of this
primitive is that given an element x in the domain, it
is computationally hard to find a different domain
element which collides with x. We prove constructively
that universal one-way hash functions exist if any 1-1
one-way functions exist. Among the various applications
of the primitive is a One-Way based Secure Digital
Signature Scheme, a system which is based on the
existence of any 1-1 One-Way Functions and is secure
against the most general attack known. Previously, all
provably secure signature schemes were based on the
stronger mathematical assumption that trapdoor one-way
functions exist.",
acknowledgement = ack-nhfb,
affiliation = "Univ of California",
affiliationaddress = "Berkeley, CA, USA",
classification = "723",
conference = "Proceedings of the Twenty First Annual ACM Symposium
on Theory of Computing",
conferenceyear = "1989",
keywords = "Computer Metatheory; Cryptography; Digital Signatures;
Hash Functions; One Way Functions",
meetingabr = "Proc Twenty First Annu ACM Symp Theory Comput",
meetingaddress = "Seattle, WA, USA",
meetingdate = "May 15--17 1989",
meetingdate2 = "05/15--17/89",
referencedin = "Referenced in \cite[Ref. 25]{Goldreich:1997:FMCb}.",
sponsor = "ACM, Special Interest Group for Automata and
Computability Theory; SC New York, NY, USA; IEEE,
Computer Soc, Los Alamitos, CA, USA",
xxtitle = "Universal One-Way Hash Functions and their
Cryptographic Application",
}
@InProceedings{Naor:1989:UOW,
author = "M. Naor and M. Yung",
title = "Universal one-way hash functions and their
cryptographic applications",
crossref = "ACM:1989:PTF",
pages = "33--43",
year = "1989",
bibdate = "Wed Feb 20 18:33:47 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "http://www.acm.org/pubs/articles/proceedings/stoc/73007/p33-naor/p33-naor.pdf;
http://www.acm.org/pubs/citations/proceedings/stoc/73007/p33-naor/",
acknowledgement = ack-nhfb,
}
@TechReport{Nissan:1989:AIM,
author = "Ephraim Nissan",
title = "Artificial intelligence for a metatheory of
interpretation. ({A} knowledge-analysis of Bernardini
Marzolla's Indoglottal interpretation of Etruscan: For
a metamodel of interpretation)",
number = "Report, 133 p. (available from the author)",
institution = "CMS, Univ. of Greenwich, Woolwich, London, UK",
year = "1989",
bibsource = "ftp://ftp.math.utah.edu/pub/bibnet/authors/e/ephraim-nissan.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
keywords = "Prakrit hypothesis formation decipher theory formation
scientific discourse cultural dynamics Pre-Roman Italy
blackboard opportunistic reasoning",
}
@MastersThesis{Norris-Saucedo:1989:DAD,
author = "Steven Joseph Norris-Saucedo",
title = "Development and application of data encryption using a
data shuffling technique",
type = "Thesis ({M.S.})",
school = "Department of Electrical Engineering, University of
Colorado at Denver",
address = "Denver, CO, USA",
pages = "vii + 94",
year = "1989",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Bibliography: leaf 47.",
keywords = "Computers --- Access control; Cryptography; Data
transmission systems --- Security measures",
}
@Book{Pfleeger:1989:SC,
author = "Charles P. Pfleeger",
title = "Security in computing",
publisher = pub-PH,
address = pub-PH:adr,
pages = "xxi + 538",
year = "1989",
ISBN = "0-13-798943-1",
ISBN-13 = "978-0-13-798943-0",
LCCN = "QA76.9.A25 P45 1989",
bibdate = "Thu Dec 14 18:03:54 MST 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
subject = "Computer security; Data protection; Privacy, Right
of",
}
@Article{Popentiu:1989:SRK,
author = "Fl. Popen{\c{t}}iu",
title = "A survey of recent knapsack cryptosystems",
journal = "Bul. Inst. Politehn. Bucure{\c{s}}ti Ser. Electron.",
volume = "51",
pages = "83--90",
year = "1989",
MRclass = "94A60 (90C09)",
MRnumber = "91d:94014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Buletinul Institutului Politehnic Bucure{\c{s}}ti.
Seria Electronic{\v{a}}",
}
@TechReport{Posch:1989:AEA,
author = "K. C. Posch and R. Posch",
title = "Approaching encryption at {ISDN} speed using partial
parallel modulus multiplication",
type = "IIG report",
number = "276",
institution = "Institutes for Information Processing Graz",
address = "Graz, Austria",
pages = "9",
month = nov,
year = "1989",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
abstract = "Public key systems using modulus arithmetic are quite
safe mechanisms for a variety of cryptographic
applications. Their main problem is the very long
integer arithmetic. In cryptosystems usually
serial-parallel multiplication is employed.
Serial-parallel multiplication slows down the
encryption to the order of k, where k is log[subscript
2]n, and n is the modulus. The approach presented in
this paper demonstrates a method of using parallel
multiplication schemes at the order of log(k) in
combination with incomplete modulus reduction. This
method calls for redundant number representations. With
this background, the problem of designing a quasi
optimal scheme fitting into a defined chip area is
elaborated. The two methods, the partial parallel
multiplication in redundant number representations and
incomplete modulus reduction at fully completed
multiplication steps only, seem to allow for RSA
encryption at ISDN speed and higher.",
acknowledgement = ack-nhfb,
keywords = "Integrated circuits --- Very large scale integration;
Parallel processing (Electronic computers)",
}
@InProceedings{Preneel:1989:CHB,
author = "Bart Preneel and Antoon Bosselaers and Rene Govaerts
and Joos Vandewalle",
booktitle = "Proceedings 1989 International Carnahan Conference on
Security Technology (Oct 3--5 1989: Zurich,
Switzerland)",
title = "Collision-free hashfunctions based on blockcipher
algorithms",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "203--210",
year = "1989",
bibdate = "Sat Jan 25 17:38:12 MST 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
note = "IEEE catalog number 89CH2774-8.",
abstract = "The use of collision-free hash functions in signature
and message authentication schemes is addressed.
Applications of hash functions are described, and an
overview of proposed hash functions is given. Methods
of attack on hash functions are examined, and the
properties a hash function must satisfy to be useful
for cryptographic applications are set forth. A fast
and secure proposal is made for a $ 2 n $-bit
collision-free hash function based on an $n$-bit
encryption algorithm. In case of the DES (Data
Encryption Standard) the length of the results is 128
bits, which suffices to thwart a birthday attack.",
acknowledgement = ack-nhfb,
affiliation = "Katholieke Univ Leuven, Lab ESAT, Heverlee, Belg",
classification = "718; 723",
conference = "Proceedings: 1989 International Carnahan Conference on
Security Technology",
conferenceyear = "1989",
keywords = "Cryptographic Protocols; Cryptography --- Design; Data
Compression; Data Transmission --- Security Systems;
Encryption Algorithm; Hash Functions; Information
Theory; Message Authentication; Signature
Verification",
meetingabr = "Proc 1989 Int Carnahan Conf Secur",
meetingaddress = "Zurich, Switzerland",
meetingdate = "Oct 3--5 1989",
meetingdate2 = "10/3--5/1989",
publisherinfo = "IEEE Service Center",
sponsor = "Schweizerischer Electrotechnischer Verein (SEV),
Switzerland",
}
@InProceedings{Quisquater:1989:BHF,
author = "J. J. Quisquater and M. Girault",
title = "$ 2 n $-Bit Hash-Functions Using $n$-Bit Symmetric
Block Cipher Algorithms",
crossref = "Quisquater:1989:ACE",
pages = "??",
year = "1989",
bibdate = "Sat Jul 16 17:49:05 1994",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Rabin:1989:EDI,
author = "Michael O. Rabin",
title = "Efficient Dispersal of Information for Security, Load
Balancing, and Fault Tolerance",
journal = j-J-ACM,
volume = "36",
number = "2",
pages = "335--348",
month = apr,
year = "1989",
CODEN = "JACOAH",
ISSN = "0004-5411",
ISSN-L = "0004-5411",
bibdate = "Wed Jan 15 18:12:53 MST 1997",
bibsource = "Compendex database;
ftp://ftp.ira.uka.de/pub/bibliography/Theory/JACM.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/toc/Abstracts/0004-5411/62050.html",
abstract = "An information dispersal algorithm (IDA) is developed
that breaks a file F of length L $=$ \$VBAR@F\$VBAR
into n pieces F${}_i$, 1 $ l e q $ i $ l e q $ n, each
of length \$VBAR@F${}_i$ \$VBAR $=$ L/m, so that all m
pieces suffice for reconstructing F. Dispersal and
reconstruction are computationally efficient. The sum
of the lengths \$VBAR@F${}_i$ \$VBAR is (n/m)\$DOT@L.
Since n/m can be chosen to be close to 1, the IDA is
space efficient. IDA has numerous applications to
secure and reliable storage of information in computer
networks and even on single disks, to fault-tolerant
and efficient transmission of information in networks,
and to communications between processors in parallel
computers. For the latter problem provably
time-efficient and highly fault-tolerant routing on the
n-cube is achieved, using just constant size buffers.",
acknowledgement = ack-nhfb,
affiliationaddress = "Cambridge, MA, USA",
classification = "722; 723",
fjournal = "Journal of the Association for Computing Machinery",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J401",
journalabr = "J Assoc Comput Mach",
keywords = "algorithms; Codes, Symbolic --- Encoding; Computer
Fault Tolerance; Computer Programming --- Algorithms;
Computer Security; Computer Systems, Digital; design;
Distributed; Distributed Computing; fault tolerance;
Information Dispersal Algorithm; Load Balancing;
parallel computers; performance; reliability; routing
of data; security; storage of data; theory;
Verification",
subject = "{\bf C.2.0}: Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Security and
protection. {\bf E.4}: Data, CODING AND INFORMATION
THEORY. {\bf E.3}: Data, DATA ENCRYPTION. {\bf D.4.3}:
Software, OPERATING SYSTEMS, File Systems Management,
Distributed file systems. {\bf D.4.5}: Software,
OPERATING SYSTEMS, Reliability, Fault-tolerance. {\bf
D.4.6}: Software, OPERATING SYSTEMS, Security and
Protection. {\bf C.2.4}: Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
{\bf F.2.2}: Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout.",
}
@InProceedings{Rabin:1989:VSS,
author = "T. Rabin and M. Ben-Or",
title = "Verifiable secret sharing and multiparty protocols
with honest majority",
crossref = "ACM:1989:PEA",
pages = "73--85",
year = "1989",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 37]{Gemmell:1997:ITC}.",
}
@Article{Rao:1989:PKA,
author = "T. R. N. Rao and Kil-Hyun Nam",
title = "Private-key algebraic-code encryptions",
journal = j-IEEE-TRANS-INF-THEORY,
volume = "IT-35",
number = "4",
pages = "829--833",
year = "1989",
CODEN = "IETTAW",
DOI = "http://dx.doi.org/10.1109/18.32159",
ISSN = "0018-9448 (print), 1557-9654 (electronic)",
ISSN-L = "0018-9448",
MRclass = "94A60 (11T71 94B05)",
MRnumber = "91b:94041",
MRreviewer = "Eric Bach",
bibdate = "Fri Oct 25 18:39:09 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
MathSciNet database",
fjournal = "IEEE Transactions on Information Theory",
}
@Misc{RFC1113,
author = "J. Linn",
title = "{RFC 1113}: Privacy enhancement for {Internet}
electronic mail: Part {I} --- message encipherment and
authentication procedures",
day = "1",
month = aug,
year = "1989",
bibdate = "Thu Oct 16 09:34:09 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Obsoleted by RFC1421 \cite{RFC1421}. Obsoletes
RFC0989, RFC1040 \cite{RFC0989,RFC1040}. Status:
HISTORIC.",
URL = "ftp://ftp.internic.net/rfc/rfc1040.txt;
ftp://ftp.internic.net/rfc/rfc1113.txt;
ftp://ftp.internic.net/rfc/rfc1421.txt;
ftp://ftp.internic.net/rfc/rfc989.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc1040.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc1113.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc1421.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc989.txt",
acknowledgement = ack-nhfb,
format = "TXT=89293 bytes",
obsoletedby = "Obsoleted by RFC1421 \cite{RFC1421}.",
obsoletes = "Obsoletes RFC0989, RFC1040 \cite{RFC0989,RFC1040}.",
online = "yes",
status = "HISTORIC",
}
@Article{Saks:1989:RNP,
author = "Michael Saks",
title = "A robust noncryptographic protocol for collective coin
flipping",
journal = j-SIAM-J-DISCR-MATH,
volume = "2",
number = "2",
pages = "240--244",
month = may,
year = "1989",
CODEN = "SJDMEC",
ISSN = "0895-4801 (print), 1095-7146 (electronic)",
ISSN-L = "0895-4801",
MRclass = "90D15 (05A99 90C39 90D42)",
MRnumber = "90g:90210",
MRreviewer = "J. C. Hwang",
bibdate = "Thu Apr 9 15:09:27 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/siamjdiscrmath.bib",
acknowledgement = ack-nhfb,
fjournal = "SIAM Journal on Discrete Mathematics",
journal-URL = "http://epubs.siam.org/sidma",
}
@Article{Satyanarayanan:1989:ISL,
author = "M. Satyanarayanan",
title = "Integrating Security in a Large Distributed System",
journal = j-TOCS,
volume = "7",
number = "3",
pages = "247--280",
month = aug,
year = "1989",
CODEN = "ACSYEC",
ISSN = "0734-2071",
ISSN-L = "0734-2071",
bibdate = "Thu Jan 14 06:47:30 MST 1999",
bibsource = "Compendex database; http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org:80/pubs/citations/journals/tocs/1989-7-3/p247-satyanarayanan/",
abstract = "Andrew is a distributed computing environment that is
a synthesis of the personal computing and timesharing
paradigms. When mature, it is expected to encompass
over 5,000 workstations spanning the Carnegie Mellon
University campus. This paper examines the security
issues that arise in such an environment and describes
the mechanisms that have been developed to address
them. These mechanisms include the logical and physical
separation of servers and clients, support for secure
communication at the remote procedure call level, a
distributed authentication service, a file-protection
scheme that combines access lists with UNIX mode bits,
and the use of encryption as a basic building block.
The paper also discusses the assumptions underlying
security in Andrew and analyzes the vulnerability of
the system. Usage experience reveals that resource
control, particularly of workstation CPU cycles, is
more important than originally anticipated and that the
mechanisms available to address this issue are
rudimentary.",
acknowledgement = ack-nhfb,
affiliation = "Carnegie Mellon Univ",
affiliationaddress = "Pittsburgh, PA, USA",
classification = "722; 723",
fjournal = "ACM Transactions on Computer Systems",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J774",
journalabr = "ACM Trans Comput Syst",
keywords = "algorithms; Andrew Distributed Computing Environment;
Computer Security; Computer Systems, Digital;
Computers, Personal; Cryptography; design; Distributed;
security; Time Sharing",
subject = "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
Protection. {\bf C.0} Computer Systems Organization,
GENERAL, Andrew. {\bf D.4.3} Software, OPERATING
SYSTEMS, File Systems Management, Distributed file
systems. {\bf C.2.4} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
{\bf E.3} Data, DATA ENCRYPTION, Data encryption
standard (DES)**.",
}
@MastersThesis{Saunders:1989:IDE,
author = "Barry Ferguson Saunders",
title = "Insection and decryption: {Edgar Poe}'s {{\em The gold
bug}} and the diagnostic gaze",
type = "Thesis ({M.A.})",
school = "University of North Carolina at Chapel Hill",
address = "Chapel Hill, NC, USA",
pages = "x + 116",
year = "1989",
bibdate = "Mon Jul 19 08:48:51 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "Poe, Edgar Allen, --- 1809-1849. --- Gold bug.",
}
@Book{Seberry:1989:CIC,
author = "Jennifer Seberry and Josef Pieprzyk",
title = "Cryptography: an introduction to computer security",
publisher = pub-PH,
address = pub-PH:adr,
pages = "viii + 375",
year = "1989",
ISBN = "0-13-194986-1",
ISBN-13 = "978-0-13-194986-7",
LCCN = "QA76.9.A25 S371 1989",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Prentice Hall advances in computer science series",
acknowledgement = ack-nhfb,
keywords = "computer security; cryptography",
}
@Article{Seeley:1989:PCG,
author = "Donn Seeley",
title = "Password cracking: a game of wits",
journal = j-CACM,
volume = "32",
number = "6",
pages = "700--703",
month = jun,
year = "1989",
CODEN = "CACMA2",
ISSN = "0001-0782 (print), 1557-7317 (electronic)",
ISSN-L = "0001-0782",
bibdate = "Thu May 30 09:41:10 MDT 1996",
bibsource = "http://www.acm.org/pubs/toc/;
http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
URL = "http://www.acm.org/pubs/toc/Abstracts/0001-0782/63529.html",
acknowledgement = ack-nhfb,
fjournal = "Communications of the ACM",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J79",
keywords = "algorithms; security",
review = "ACM CR 9006-0478",
subject = "{\bf C.2.0}: Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Security and
protection. {\bf D.4.6}: Software, OPERATING SYSTEMS,
Security and Protection, Cryptographic controls. {\bf
K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
Social Issues, Abuse and crime involving computers.",
}
@Article{Shawe-Taylor:1989:BRB,
author = "John Shawe-Taylor",
title = "Book Review: {{\booktitle{Cryptography: an
introduction to computer security}}, by Jennifer
Seberry and Josef Pieprzyk. Prentice-Hall
International, Hemel Hempstead, United Kingdom, 1988,
Price \pounds 17.95 (paperback), ISBN 0-7248-0274-6}",
journal = j-SCI-COMPUT-PROGRAM,
volume = "12",
number = "3",
pages = "259--260",
month = sep,
year = "1989",
CODEN = "SCPGD4",
ISSN = "0167-6423 (print), 1872-7964 (electronic)",
ISSN-L = "0167-6423",
bibdate = "Tue Dec 3 07:20:49 MST 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/scicomputprogram.bib;
http://www.sciencedirect.com/science/journal/01676423",
URL = "http://www.sciencedirect.com/science/article/pii/0167642389900063",
acknowledgement = ack-nhfb,
fjournal = "Science of Computer Programming",
journal-URL = "http://www.sciencedirect.com/science/journal/01676423",
}
@TechReport{Shepherd:1989:CSS,
author = "S. J. Shepherd and P. W. Sanders",
title = "A Comprehensive Security Service - Functional
Specification",
type = "IBM Internal Document",
institution = "IBM (United Kingdom Laboratories)",
address = "Hursley Park, Winchester, UK",
month = may,
year = "1989",
bibdate = "Mon Nov 30 07:01:52 1998",
bibsource = "http://www.eeng.brad.ac.uk/Research/crypto_pubs.html;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Stephenson:1989:PPM,
author = "Peter Stephenson",
title = "Personal and private (microcomputer security)",
journal = j-BYTE,
volume = "14",
number = "6",
pages = "285--288",
month = jun,
year = "1989",
CODEN = "BYTEDJ",
ISSN = "0360-5280",
ISSN-L = "0360-5280",
bibdate = "Thu Sep 12 17:54:09 MDT 1996",
bibsource = "/usr/local/src/bib/bibliography/Misc/security.1.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
classification = "C0230 (Economic, social and political aspects);
C0310D (Installation management); C6130 (Data handling
techniques)",
fjournal = "BYTE Magazine",
keywords = "Add-in board; Comspec II; Electronic file cabinet;
File Encrypt; Immune system; MailSafe; SecretDisk II;
Security program; Viral contamination; Watchdog",
thesaurus = "Personal computing; Security of data",
}
@Book{Stoll:1989:CET,
author = "Clifford Stoll",
title = "The Cuckoo's Egg: Tracking a Spy Through the Maze of
Computer Espionage",
publisher = pub-DOUBLEDAY,
address = pub-DOUBLEDAY:adr,
pages = "vi + 326",
year = "1989",
ISBN = "0-385-24946-2",
ISBN-13 = "978-0-385-24946-1",
LCCN = "UB271.R92 S47 1989",
bibdate = "Fri Apr 2 09:17:51 1993",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/internet.bib",
note = "A spy novel, except it's true: a first person account
by a down- on-his-luck Berkeley astronomer who with
others tracked down a KGB network spy. Despite its
necessary concentration on cracking, still a readable
introduction to what the Internet is about.",
price = "US\$19.95",
acknowledgement = ack-jsq,
}
@Book{Stripp:1989:CFE,
author = "Alan Stripp",
title = "Codebreaker in the {Far East}",
publisher = "F. Cass",
address = "London, England",
pages = "xiv + 204",
year = "1989",
ISBN = "0-7146-3363-1",
ISBN-13 = "978-0-7146-3363-3",
LCCN = "D810.C88 S76 1989",
bibdate = "Thu Mar 24 03:58:30 MST 2005",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
series = "Cass series--studies in intelligence",
acknowledgement = ack-nhfb,
subject = "Stripp, Alan, ; World War, 1939--1945; Cryptography;
World War, 1939--1945; Personal narratives, English;
World War, 1939--1945; Campaigns; Burma",
subject-dates = "1924--",
}
@Article{Sun:1989:TKE,
author = "Qi Sun and Rong Xiao",
title = "Two kinds of elliptic curves over {$ F_q $} used to
set up cryptosystems",
journal = "Sichuan Daxue Xuebao",
volume = "26",
number = "1",
pages = "39--43",
year = "1989",
CODEN = "SCTHAO",
ISSN = "0490-6756",
MRclass = "11T71 (11D25 14G15 94A60)",
MRnumber = "90m:11199",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
fjournal = "Journal of Sichuan University. Natural Science
Edition. Sichuan Daxue Xuebao. Ziran Kexue Ban",
}
@Article{Tsudik:1989:DAI,
author = "G. Tsudik",
title = "Datagram Authentication in {Internet} Gateways:
Implications of Fragmentation and Dynamic Routing",
journal = j-IEEE-J-SEL-AREAS-COMMUN,
volume = "7",
number = "4",
pages = "499--??",
day = "1",
month = may,
year = "1989",
CODEN = "ISACEM",
ISSN = "0733-8716",
ISSN-L = "0733-8716",
bibdate = "Tue Jun 18 10:48:45 MDT 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
UnCover library database",
acknowledgement = ack-nhfb,
fjournal = "IEEE Journal on Selected Areas in Communications",
}
@Manual{USDOA:1989:BC,
author = "{United States. Dept. of the Army} and {United States
Army Intelligence School}",
title = "Basic cryptanalysis",
organization = "United States Army Intelligence School",
address = "Fort Devens, Ma.",
edition = "Coordinating draft.",
pages = "various",
year = "1989",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "FM; 34-40-2 United States. Dept. of the Army. Field
manual; 34-40-2",
acknowledgement = ack-nhfb,
annote = "``31 March 1989'' Cover title.",
keywords = "Cryptography --- Military aspects --- Handbooks,
manuals, etc; Security systems --- Military aspects ---
Handbooks, manuals, etc; United States. --- Army ---
Handbooks, manuals, etc",
}
@InProceedings{Vallee:1989:HGR,
author = "Brigitte Vall{\'e}e and Marc Girault and Philippe
Toffin",
title = "How to guess $l$ th roots modulo $n$ by reducing
lattice bases",
crossref = "Mora:1989:AAA",
pages = "427--442",
year = "1989",
MRclass = "11Y16 (11H06 68P25)",
MRnumber = "90k:11168",
MRreviewer = "Istv{\'a}n Ga{\'a}l",
bibdate = "Tue Feb 9 11:14:49 MST 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@MastersThesis{Watler:1989:VAC,
author = "Miguel Watler",
title = "{VLSI} architectures and circuits for {RSA}
encryption",
type = "Thesis ({M.Sc.})",
publisher = "National Library of Canada",
school = "Queen's University",
address = "Ottawa, ON, Canada",
pages = "137",
year = "1989",
ISBN = "0-315-53412-5",
ISBN-13 = "978-0-315-53412-4",
LCCN = "????",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Canadian theses = Th{\`e}ses canadiennes",
acknowledgement = ack-nhfb,
}
@Book{Welsh:1989:CC,
author = "Dominic Welsh",
title = "Codes and cryptography",
publisher = pub-OXFORD,
address = pub-OXFORD:adr,
pages = "ix + 257",
year = "1989",
ISBN = "0-19-853287-3 (paperback)",
ISBN-13 = "978-0-19-853287-3 (paperback)",
LCCN = "Z 103 W46 1989",
bibdate = "Sat Oct 17 16:25:07 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Reprinted with corrections.",
series = "Oxford science publications",
acknowledgement = ack-nhfb,
keywords = "ciphers; cryptography",
}
@Book{Winterbotham:1989:US,
author = "F. W. (Frederick William) Winterbotham",
title = "The {Ultra} spy",
publisher = "Macmillan",
address = "London, UK",
pages = "258 + 8",
year = "1989",
ISBN = "0-333-51425-4",
ISBN-13 = "978-0-333-51425-2",
LCCN = "UB271.G72 W564 1989",
bibdate = "Fri May 13 08:14:55 MDT 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
melvyl.cdlib.org:210/CDL90",
price = "US\$12.95",
acknowledgement = ack-nhfb,
author-dates = "1897--1990",
subject = "Intelligence officers; Great Britain; Biography;
Espionage, British; History; 20th century; World War,
1939-1945; Cryptography; Personal narratives, British;
Winterbotham, F. W; (Frederick William)",
}
@Book{Wrixon:1989:CCS,
author = "Fred B. Wrixon",
title = "Codes, ciphers, and secret language",
publisher = "Harrap",
address = "London, UK",
pages = "266",
year = "1989",
ISBN = "0-245-54880-7",
ISBN-13 = "978-0-245-54880-2",
LCCN = "Z103 .W77 1989b",
bibdate = "Sat Apr 20 11:59:26 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Article{Yu:1989:DEB,
author = "K. W. Yu and T. L. Yu",
title = "Data encryption based upon time reversal
transformations",
journal = j-COMP-J,
volume = "32",
number = "3",
pages = "241--245",
month = jun,
year = "1989",
CODEN = "CMPJA6",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Mar 25 13:51:56 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
affiliation = "Dept. of Appl. Sci., Hong Kong Polytech., Hong Kong",
classcodes = "B6120B (Codes); C6130 (Data handling techniques)",
classification = "B6120B (Codes); C6130 (Data handling techniques)",
corpsource = "Dept. of Appl. Sci., Hong Kong Polytech., Hong Kong",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "computer network; Computer network; confidential data;
Confidential data; conservative system; Conservative
system; cryptography; data encryption model; Data
encryption model; dynamics; Dynamics; incomprehensible
form; Incomprehensible form; iterations; Iterations;
iterative methods; mechanical system; Mechanical
system; second order equations; Second order equations;
time reversal; Time reversal transformations;
transformations",
thesaurus = "Cryptography; Iterative methods",
treatment = "T Theoretical or Mathematical",
}
@Misc{Johns:1993:RIP,
author = "M. St. Johns",
title = "{RFC 1413}: Identification Protocol",
month = jan,
year = "1993",
bibdate = "Thu Oct 16 09:34:09 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Obsoletes RFC0931 \cite{StJohns:1985:RAS}. Status:
PROPOSED STANDARD.",
URL = "ftp://ftp.internic.net/rfc/rfc1413.txt;
ftp://ftp.internic.net/rfc/rfc931.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc1413.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
format = "TXT=16291 bytes",
obsoletes = "Obsoletes RFC0931 \cite{StJohns:1985:RAS}.",
online = "yes",
status = "PROPOSED STANDARD",
}
@Misc{RFC1421,
author = "J. Linn",
title = "{RFC 1421}: Privacy Enhancement for {Internet}
Electronic Mail: Part {I}: Message Encryption and
Authentication Procedures",
month = feb,
year = "1993",
bibdate = "Thu Oct 16 09:34:09 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Obsoletes RFC1113 \cite{RFC1113}. Status: PROPOSED
STANDARD.",
URL = "ftp://ftp.internic.net/rfc/rfc1113.txt;
ftp://ftp.internic.net/rfc/rfc1421.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc1113.txt;
ftp://ftp.math.utah.edu/pub/rfc/rfc1421.txt",
acknowledgement = ack-nhfb,
format = "TXT=103894 bytes",
obsoletes = "Obsoletes RFC1113 \cite{RFC1113}.",
online = "yes",
status = "PROPOSED STANDARD",
}
@Book{Kahn:1996:CSS,
author = "David Kahn",
title = "The codebreakers: the story of secret writing",
publisher = "Scribner",
address = "New York, NY, USA",
edition = "Revised",
pages = "xviii + 1181",
year = "1996",
ISBN = "0-684-83130-9",
ISBN-13 = "978-0-684-83130-5",
LCCN = "Z103 .K28 1996",
bibdate = "Thu Apr 29 18:02:15 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/master.bib",
note = "See \cite{Tuchman:1966:ZT}.",
acknowledgement = ack-nhfb,
}
@Book{Beckett:1997:ICP,
author = "Brian Beckett",
title = "Introduction to cryptolology and {PC} security",
publisher = pub-MCGRAW-HILL,
address = pub-MCGRAW-HILL:adr,
pages = "viii + 356",
year = "1997",
ISBN = "0-07-709235-X (hardback)",
ISBN-13 = "978-0-07-709235-1 (hardback)",
LCCN = "QA76.9.A25 B43 1997",
bibdate = "Thu Oct 31 17:34:21 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Updated edition of {\em Introduction to cryptology\/}
\cite{Beckett:1988:IC}.",
acknowledgement = ack-nhfb,
keywords = "computer security; cryptography; data protection",
}
@Article{Plimmer:1998:MIW,
author = "Beryl Plimmer",
title = "Machines invented for {WW II} code breaking",
journal = j-SIGCSE,
volume = "30",
number = "4",
pages = "37--40",
month = dec,
year = "1998",
CODEN = "SIGSD3",
DOI = "http://dx.doi.org/10.1145/306286.306309",
ISSN = "0097-8418",
ISSN-L = "0097-8418",
bibdate = "Sat Nov 17 16:56:35 MST 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/sigcse.bib",
abstract = "In 1944 a computer was commissioned at Bletchley Park
in England. This computer was designed specifically to
find the settings used by German cipher machines to
encrypt messages, which it did very effectively. Before
``Colossus'' the Polish and British military had
developed mechanical machines to aid with cryptography.
All of this work was top secret and only with the
recent release of documents has the true significance
of these machines and the people who created them been
appreciated.",
acknowledgement = ack-nhfb,
fjournal = "SIGCSE Bulletin (ACM Special Interest Group on
Computer Science Education)",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J688",
}
@InProceedings{deRaadt:1999:COO,
author = "Theo de Raadt and Niklas Hallqvist and Artur Grabowski
and Angelos D. Keromytis and Niels Provos",
title = "Cryptography in {OpenBSD}: An Overview",
crossref = "USENIX:1999:UAT",
pages = "93--101",
year = "1999",
bibdate = "Thu Feb 24 11:35:57 2000",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://www.openbsd.org/papers/crypt-paper.ps",
acknowledgement = ack-nhfb,
keywords = "/dev/arandom; /dev/random; /dev/srandom; /dev/urandom;
arc4random(); bcrypt(); IPsec; MD5; nonrepeating random
numbers; S/KEY one-time password system; SHA1; SSL",
}
@Unpublished{Rejewski:19xx:EMH,
author = "Marian Rejewski",
title = "{Enigma} (1930--40). Method and history of solving the
{German} machine cipher",
year = "19xx",
bibdate = "Sun Dec 01 09:59:56 2013",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Unpublished manuscript in Polish",
acknowledgement = ack-nhfb,
language = "Polish",
}
@Unpublished{Ritchie:19xx:DCW,
author = "Dennis M. Ritchie",
title = "Dabbling in the Cryptographic World --- {A} Story",
year = "19xx",
bibdate = "Thu Apr 29 18:06:00 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "This undated note describes the interesting history
behind the non-publication of a paper
\cite{Reeds:1978:HCM} on the Hagelin cypher machine
(M-209), submitted to the journal Cryptologia, because
of shadowy suggestions of a ``retired gentleman from
Virginia''.",
URL = "http://www.cs.bell-labs.com/~dmr/crypt.html",
acknowledgement = ack-nhfb,
}
@Book{Rand:2001:MRD,
author = "{Rand Corporation}",
title = "A Million Random Digits With 100,000 Normal Deviates",
publisher = "Rand Corporation",
address = "Santa Monica, CA, USA",
pages = "xxv + 400 + 200",
year = "2001",
ISBN = "0-8330-3047-7",
ISBN-13 = "978-0-8330-3047-4",
LCCN = "QA276.25 .M55 2001",
bibdate = "Sat Aug 23 07:58:03 2003",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "See also \cite{Rand:1955:MRD}.",
acknowledgement = ack-nhfb,
}
@Article{Bergmann:2009:DKR,
author = "Seth D. Bergmann",
title = "Degenerate keys for {RSA} encryption",
journal = j-SIGCSE,
volume = "41",
number = "2",
pages = "95--98",
month = jun,
year = "2009",
CODEN = "SIGSD3",
DOI = "http://dx.doi.org/10.1145/1595453.1595483",
ISSN = "0097-8418",
ISSN-L = "0097-8418",
bibdate = "Sat Nov 17 15:44:23 MST 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
http://www.math.utah.edu/pub/tex/bib/sigcse.bib",
abstract = "Some keys for the RSA public key cryptosystem fail to
encrypt all possible plaintext messages. A necessary
and sufficient condition for these degenerate keys is
given. The probability of choosing such a key, when
choosing keys at random, is presented. The impact of
degenerate keys in an academic setting is discussed.",
acknowledgement = ack-nhfb,
fjournal = "SIGCSE Bulletin (ACM Special Interest Group on
Computer Science Education)",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J688",
remark = "This paper points out that the some keys in the RSA
may fail to encrypt: instead, they produce an output
ciphertext that is identical to the input plaintext.
See also \cite{Blakley:1979:RSA,Smith:1979:UFM}",
}
%%% ====================================================================
%%% Cross-referenced entries must come last:
@Proceedings{IEEE:1974:ASS,
editor = "{IEEE}",
booktitle = "15th Annual Symposium on Switching and Automata
Theory, October 14--16, 1974, the University of New
Orleans",
title = "15th Annual Symposium on Switching and Automata
Theory, October 14--16, 1974, the University of New
Orleans",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "v + 211",
year = "1974",
bibdate = "Fri Sep 16 12:07:41 1994",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "Session I: --- A Two-dimensional Generating System
Modeling Growth By Binary Cell Division --- on the
Power of Multiplication in Random Access Machines ---
the Equivalence Problem For Regular Expressions Over
One Letter in Elementary --- P-complete Problems and
Approximate Solutions --- Approximate Algorithms For
the Traveling Salesperson Problem Session II: ---
Relationships Between Monadic Recursion Schemes and
Deterministic Context-free Languages --- Recursive
Schemes, Algebraic Trees and Deterministic Languages
--- Initial Algebra Semantics --- Axiomatic Equivalence
of Programs With Structured Variables --- Janov Schemas
Augmented By A Pushdown Memory Session III: --- on
Hash-coding Algorithms For Partial-match Retrieval ---
Bounds on the Complexity of the Longest Common
Subsequence Problem --- Bounds on Selection Networks
--- on the Computational Complexity of Finding the
Maxima of A Set of Vectors --- on Self-organizing
Sequential Search Heuristics --- Operations on Sparse
Relations and Efficient Algorithms For Grammar Problems
Session IV: --- Minimization of Fanout in Switching
Networks --- Combinatorial Complexity of Some Monotone
Functions --- on Boolean Functions Having Maximal
Number of Subfunction Classes --- A Comparative Study
of Models of Parallel Computation --- the Recursive
Equivalence of the Reachability Problem and the
Liveness Problem Session V: --- Non-complex Sequences:
Characterization and Examples --- Two-way Deterministic
Pushdown Automata Languages and Some Open Problems in
the Theory of Computation --- `natural' Properties of
Flowchart Complexity Measures --- Skeletal Lr Parsing
--- Characterization of Context-free Grammatical
Families.",
descriptor = "Deterministische Sprache, Funktion, Grammatik,
Komplexitaet, Kontextfreie Sprache, Monotone Funktion,
P-complete, Parallelverarbeitung, Parser,
Rekursionsschema, Semantik, Sprache,
Travelling-salesman, Zellteilung",
}
@Proceedings{Kerr:1975:PIC,
editor = "Douglas S. Kerr",
booktitle = "Proceedings of the International Conference on Very
Large Data Bases, Framingham, {MA}, {USA}, September
22--24, 1975",
title = "Proceedings of the International Conference on Very
Large Data Bases, Framingham, {MA}, {USA}, September
22--24, 1975",
publisher = pub-ACM,
address = pub-ACM:adr,
pages = "viii + 592",
year = "1975",
ISBN = "????",
ISBN-13 = "????",
ISSN = "0278-2596",
LCCN = "QA76.9.D3 I55 1975",
bibdate = "Tue Nov 05 09:31:50 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
price = "US\$15.00",
acknowledgement = ack-nhfb,
}
@Proceedings{Hartnell:1976:PFM,
editor = "B. L. Hartnell and H. C. Williams",
booktitle = "Proceedings of the Fifth Manitoba Conference on
Numerical Mathematics, October 1--4, 1975",
title = "Proceedings of the Fifth Manitoba Conference on
Numerical Mathematics, October 1--4, 1975",
volume = "16",
publisher = "Utilitas Mathematica Publishers",
address = "Winnipeg, MN, Canada",
pages = "",
year = "1976",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Congressus Numerantium",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 6]{Odlyzko:1995:FIF}.",
}
@Proceedings{Branstad:1977:RWC,
editor = "Dennis K. Branstad and Jason Gait and Stuart Katzke",
booktitle = "Report of the Workshop on Cryptography in Support of
Computer Security, held at the {National Bureau of
Standards, September 21--22, 1976}",
title = "Report of the Workshop on Cryptography in Support of
Computer Security, held at the {National Bureau of
Standards, September 21--22, 1976}",
publisher = pub-NBS,
address = pub-NBS:adr,
pages = "iv + 52",
year = "1977",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
annote = "``NBSIR 77-1291.'' ``Workshop was organized to obtain
expert opinions on \ldots{} the proposed Data
Encryption Standard.'' Photocopy. Springfield, Va.:
National Technical Information Service, U.S. Dept of
Commerce. --- iv, 57 p; 28 cm. ``PB-271 744.''",
keywords = "Computers --- Access control --- Congresses;
Cryptography --- Congresses.",
}
@Proceedings{Anonymous:1978:CSD,
editor = "Anonymous",
booktitle = "Computer security and the {Data Encryption Standard}:
proceedings of the Conference on Computer Security and
the Data Encryption Standard held at the National
Bureau of Standards in Gaithersburg, Maryland, on
February 15, 1977",
title = "Computer security and the {Data Encryption Standard}:
proceedings of the Conference on Computer Security and
the Data Encryption Standard held at the National
Bureau of Standards in Gaithersburg, Maryland, on
February 15, 1977",
volume = "500-27",
publisher = pub-USGPO,
address = pub-USGPO:adr,
pages = "viii + 125",
year = "1978",
bibdate = "Mon Oct 19 08:47:56 MDT 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "NBS special publication, computer science and
technology",
acknowledgement = ack-nhfb,
annote = "Microfiche. Springfield, Va.: National Technical
Information Services, 1978. 2 microfiches; 11 x 15 cm.
(PB-277 695)",
keywords = "Computers --- Access control --- Passwords.",
}
@Proceedings{IEEE:1979:ASF,
editor = "{IEEE}",
booktitle = "20th Annual Symposium on Foundations of Computer
Science: Oct. 29--31, 1979, San Juan, Puerto Rico",
title = "20th Annual Symposium on Foundations of Computer
Science: Oct. 29--31, 1979, San Juan, Puerto Rico",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "vii + 431",
year = "1979",
CODEN = "ASFPDV",
ISBN = "????",
ISBN-13 = "????",
ISSN = "0272-5428",
LCCN = "QA267 .S95 1979; TK7885.A1 S92 1979",
bibdate = "Thu Dec 3 07:11:18 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
keywords = "algorithms --- congresses; computational complexity
--- congresses; electronic data processing ---
congresses; electronic digital computers ---
programming --- congresses; machine theory ---
congresses",
}
@Proceedings{Merwin:1979:NCC,
editor = "Richard E. Merwin and Jacqueline T. Zanca and Merlin.
Smith",
booktitle = "1979 National Computer Conference: June 4--7, 1979,
New York, New York",
title = "1979 National Computer Conference: June 4--7, 1979,
New York, New York",
volume = "48",
publisher = pub-AFIPS,
address = pub-AFIPS:adr,
pages = "1095",
year = "1979",
bibdate = "Fri Nov 20 15:54:39 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "AFIPS Conference proceedings",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL}.",
}
@Proceedings{IEEE:1980:PSS,
editor = "{IEEE}",
booktitle = "Proceedings of the 1980 Symposium on Security and
Privacy, April 14--16, 1980 Oakland, California",
title = "Proceedings of the 1980 Symposium on Security and
Privacy, April 14--16, 1980 Oakland, California",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "viii + 167",
year = "1980",
LCCN = "QA76.9.A25S95 1980",
bibdate = "Tue Nov 24 06:54:24 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 22]{Goldreich:1997:FMCb}.",
xxISBN = "none",
}
@Proceedings{IEEE:1981:CLC,
editor = "{IEEE}",
booktitle = "6th Conference on Local Computer Networks, Hilton Inn,
Minneapolis, Minnesota, October 12--14, 1981",
title = "6th Conference on Local Computer Networks, Hilton Inn,
Minneapolis, Minnesota, October 12--14, 1981",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "v + 111",
year = "1981",
CODEN = "CLCPDN",
LCCN = "TK 5105.5 C66 1981",
bibdate = "Sat Sep 25 20:21:07 MDT 1999",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "IEEE catalog no. 81CH1690-7.",
acknowledgement = ack-nhfb,
classification = "723",
conference = "6th Conference on Local Computer Networks",
conflocation = "Minneapolis, MN, USA",
journalabr = "Conf Local Comput Networks",
keywords = "computer networks; control; distributed computer
systems; local networks; network architecture; network
design; performance; protocols; simulation",
meetingaddress = "Minneapolis, MN, USA",
pagecount = "111",
sponsor = "Univ of Minn, Comput Cent, Minneapolis, USA; IEEE,
Twin Cities Chapter, USA; IEEE Comput Soc Tech Comm on
Comput Commun, Los Alamitos, Calif, USA",
xxISBN = "none",
}
@Proceedings{ACM:1982:PFA,
editor = "{ACM}",
booktitle = "Proceedings of the fourteenth annual {ACM} Symposium
on Theory of Computing, San Francisco, California, May
5--7, 1982",
title = "Proceedings of the fourteenth annual {ACM} Symposium
on Theory of Computing, San Francisco, California, May
5--7, 1982",
publisher = pub-ACM,
address = pub-ACM:adr,
pages = "v + 408",
year = "1982",
ISBN = "0-89791-070-2",
ISBN-13 = "978-0-89791-070-5",
LCCN = "QA75.5 .A14 1982",
bibdate = "Thu Dec 3 07:11:18 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "ACM order no. 508820.",
acknowledgement = ack-nhfb,
keywords = "computational complexity --- congresses; programming
(electronic computers) --- congresses",
}
@Proceedings{Ciampi:1982:EVS,
editor = "Constantino Ciampi and A. A. Martino",
booktitle = "Edited versions of selected papers from the
International Conference on ``Logic, Informatics,
Law,'' Florence, Italy, April 6--10, 1981",
title = "Edited versions of selected papers from the
International Conference on ``Logic, Informatics,
Law,'' Florence, Italy, April 6--10, 1981",
publisher = pub-ESP,
address = pub-ESP:adr,
pages = "various",
year = "1982",
ISBN = "0-444-86413-X (set), 0-444-86414-8 (vol. 1),
0-444-86415-6 (vol. 2)",
ISBN-13 = "978-0-444-86413-0 (set), 978-0-444-86414-7 (vol. 1),
978-0-444-86415-4 (vol. 2)",
LCCN = "K662.I4 I58",
bibdate = "Wed May 22 10:09:08 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "Two volumes. Vol. 1: Artificial intelligence and legal
information systems. Vol. 2: Deontic logic,
computational linguistics, and legal information
systems.",
acknowledgement = ack-nhfb,
}
@Proceedings{IEEE:1982:ASF,
editor = "{IEEE}",
key = "IEEE-FOCS'82",
booktitle = "23rd annual Symposium on Foundations of Computer
Science, November 3--5, 1982, Chicago, Illinois",
title = "23rd annual Symposium on Foundations of Computer
Science, November 3--5, 1982, Chicago, Illinois",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "vii + 387",
year = "1982",
CODEN = "ASFPDV",
ISBN = "????",
ISBN-13 = "????",
ISSN = "0272-5428",
LCCN = "QA76.6 .S95 1982",
bibdate = "Thu Dec 3 07:11:18 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "IEEE catalog no. 82CH1806-9. IEEE Computer Society
order no. 440.",
acknowledgement = ack-nhfb,
keywords = "electronic data processing --- congresses; electronic
digital computers --- programming --- congresses;
machine theory --- congresses",
}
@Proceedings{IEEE:1982:CFP,
editor = "IEEE",
booktitle = "{COMPCON Fall '82: Proceedings of the 25th
International Conference of the Institute of Electrical
and Electronics Engineers Computer Society, Capitol
Hilton Hotel, Washington, DC, 1982}",
title = "{COMPCON Fall '82: Proceedings of the 25th
International Conference of the Institute of Electrical
and Electronics Engineers Computer Society, Capitol
Hilton Hotel, Washington, DC, 1982}",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "xix + 727",
year = "1982",
ISBN = "????",
ISBN-13 = "????",
LCCN = "QA76.5 I578 1982",
bibdate = "Sun Mar 11 09:59:44 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "IEEE catalog no. 82CH1796-2.",
acknowledgement = ack-nhfb,
}
@Book{Randell:1982:ODC,
editor = "Brian Randell",
booktitle = "The Origins of Digital Computers: Selected Papers",
title = "The Origins of Digital Computers: Selected Papers",
publisher = pub-SV,
address = pub-SV:adr,
edition = "Third",
pages = "x + 580",
year = "1982",
ISBN = "0-387-11319-3, 3-540-11319-3",
ISBN-13 = "978-0-387-11319-7, 978-3-540-11319-5",
LCCN = "TK7885.A5 O741 1982",
bibdate = "Sun Nov 03 08:28:47 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "Texts and monographs in computer science",
acknowledgement = ack-nhfb,
}
@Proceedings{Rudolph:1982:HTI,
editor = "James G. Rudolph",
booktitle = "{High technology in the information industry: digest
of papers\slash Compcon spring 82, February 22--25;
twenty-fourth IEEE computer society international
conference, Jack Tar Hotel, San Francisco,
California}",
title = "{High technology in the information industry: digest
of papers\slash Compcon spring 82, February 22--25;
twenty-fourth IEEE computer society international
conference, Jack Tar Hotel, San Francisco,
California}",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "xvi + 418",
year = "1982",
ISBN = "????",
ISBN-13 = "????",
LCCN = "TK7885.A1 C53 1982",
bibdate = "Sun Mar 11 10:01:46 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "IEEE catalog number 82CH1739-2.",
acknowledgement = ack-nhfb,
bookpages = "xvi + 418",
}
@Proceedings{ACM:1983:PFA,
editor = "{ACM}",
booktitle = "Proceedings of the fifteenth annual {ACM} Symposium on
Theory of Computing, Boston, Massachusetts, April
25--27, 1983",
title = "Proceedings of the fifteenth annual {ACM} Symposium on
Theory of Computing, Boston, Massachusetts, April
25--27, 1983",
publisher = pub-ACM,
address = pub-ACM:adr,
pages = "v + 487",
year = "1983",
ISBN = "0-89791-099-0",
ISBN-13 = "978-0-89791-099-6",
LCCN = "QA75.5.A14 1983",
bibdate = "Thu Dec 3 07:11:18 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "ACM order no. 508830.",
acknowledgement = ack-nhfb,
annote = "Sponsored by the ACM Special Interest Group for
Automata and Computability Theory.",
keywords = "computational complexity --- congresses; electronic
digital computers --- programming --- congresses",
}
@Proceedings{Beth:1983:CPW,
editor = "Thomas Beth",
booktitle = "Cryptography: proceedings of the Workshop on
Cryptography, Burg Feuerstein, Germany, March 29--April
2, 1982",
title = "Cryptography: proceedings of the Workshop on
Cryptography, Burg Feuerstein, Germany, March 29--April
2, 1982",
volume = "149",
publisher = pub-SV,
address = pub-SV:adr,
pages = "viii + 402",
year = "1983",
CODEN = "LNCSD9",
ISBN = "0-387-11993-0 (paperback)",
ISBN-13 = "978-0-387-11993-9 (paperback)",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
LCCN = "Z102.5 .C78 1983",
bibdate = "Fri Apr 12 07:14:48 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/lncs.bib",
price = "DM43.00",
series = ser-LNCS,
acknowledgement = ack-nhfb,
keywords = "cryptography --- congresses",
}
@Proceedings{Chaum:1983:ACP,
editor = "David Chaum",
booktitle = "Advances in Cryptology: Proceedings of {CRYPTO} '83
(1983: University of California, Santa Barbara)",
title = "Advances in Cryptology: Proceedings of {CRYPTO} '83
(1983: University of California, Santa Barbara)",
publisher = pub-PLENUM,
address = pub-PLENUM:adr,
pages = "xii + 395",
year = "1983",
ISBN = "0-306-41637-9",
ISBN-13 = "978-0-306-41637-8",
LCCN = "QA76.9.A25 C791 1983",
bibdate = "Sat Sep 17 10:24:07 1994",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
note = "Proceedings of a Workshop on the Theory and
Application of Cryptographic Techniques, held August
21--24, 1983, at the University of California, in Santa
Barbara, California.",
acknowledgement = ack-nhfb,
}
@Proceedings{Feak:1983:SIS,
editor = "Viiveke F{\^e}ak",
booktitle = "{Security, IFIP/Sec'83: proceedings of the First
Security Conference, Stockholm, Sweden, 16--19 May
1983}",
title = "{Security, IFIP/Sec'83: proceedings of the First
Security Conference, Stockholm, Sweden, 16--19 May
1983}",
publisher = pub-NORTH-HOLLAND,
address = pub-NORTH-HOLLAND:adr,
pages = "xxxvi + 328",
year = "1983",
ISBN = "0-444-86669-8 (Elsevier)",
ISBN-13 = "978-0-444-86669-1 (Elsevier)",
LCCN = "QA76.9.A25 S4 1983",
bibdate = "Sat Aug 26 16:08:38 MDT 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
z3950.loc.gov:7090/Voyager",
acknowledgement = ack-nhfb,
meetingname = "Security Conference (1st : 1983 : Stockholm, Sweden)",
remark = "Organized by Swedish Society for Information
Processing (SSI) under the auspices of the
International Federation for Information Processing
(IFIP).",
subject = "Computer security; Congresses; Electronic data
processing departments; Security measures",
}
@Proceedings{IEEE:1983:PSS,
editor = "{IEEE}",
booktitle = "Proceedings of the 1983 Symposium on Security and
Privacy, April 25--27, 1983, Oakland, California",
title = "Proceedings of the 1983 Symposium on Security and
Privacy, April 25--27, 1983, Oakland, California",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "viii + 163",
year = "1983",
ISBN = "0-8186-0467-0 (paperback), 0-8186-4467-2 (microfiche),
0-8186-8467-4 (hardcover)",
ISBN-13 = "978-0-8186-0467-6 (paperback), 978-0-8186-4467-2
(microfiche), 978-0-8186-8467-8 (hardcover)",
LCCN = "QA76.9.A25 S95 1983",
bibdate = "Mon Dec 28 07:28:19 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Proceedings{Eigenthaler:1984:CGA,
editor = "G. Eigenthaler and H. K. Kaiser and W. B. M{\"u}ller
and W. N{\"o}bauer.",
booktitle = "Contributions to general algebra, 3. Proceedings of
the Vienna conference held in Vienna, June 21--24,
1984",
title = "Contributions to general algebra, 3. Proceedings of
the Vienna conference held in Vienna, June 21--24,
1984",
publisher = "H{\"o}lder-Pichler-Tempsky",
address = "Vienna, Austria",
pages = "415",
year = "1984",
ISBN = "3-209-00591-5, 3-519-02762-3",
ISBN-13 = "978-3-209-00591-5, 978-3-519-02762-1",
LCCN = "????",
bibdate = "Tue Feb 9 14:44:52 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Proceedings{IEEE:1984:ASF,
editor = "{IEEE}",
booktitle = "25th annual Symposium on Foundations of Computer
Science, October 24--26, 1984, Singer Island, Florida",
title = "25th annual Symposium on Foundations of Computer
Science, October 24--26, 1984, Singer Island, Florida",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "xii + 518",
year = "1984",
CODEN = "ASFPDV",
ISBN = "0-8186-8591-3, 0-8186-0591-X (paperback),
0-8186-4591-1 (microfiche)",
ISBN-13 = "978-0-8186-8591-0, 978-0-8186-0591-8 (paperback),
978-0-8186-4591-4 (microfiche)",
ISSN = "0272-5428",
LCCN = "QA 76 S979 1984",
bibdate = "Thu Dec 3 07:11:18 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "IEEE catalog no. 84CH2085-9.",
acknowledgement = ack-nhfb,
keywords = "electronic data processing --- congresses; electronic
digital computers --- programming --- congresses;
machine theory --- congresses",
}
@Proceedings{ACM:1985:PSA,
editor = "{ACM}",
booktitle = "Proceedings of the seventeenth annual {ACM} Symposium
on Theory of Computing, Providence, Rhode Island, May
6--8, 1985",
title = "Proceedings of the seventeenth annual {ACM} Symposium
on Theory of Computing, Providence, Rhode Island, May
6--8, 1985",
publisher = pub-ACM,
address = pub-ACM:adr,
pages = "vi + 484",
year = "1985",
ISBN = "0-89791-151-2 (paperback)",
ISBN-13 = "978-0-89791-151-1 (paperback)",
LCCN = "QA 76.6 A13 1985",
bibdate = "Thu Dec 3 07:11:18 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
note = "ACM order no. 508850.",
acknowledgement = ack-nhfb,
keywords = "computational complexity --- congresses; electronic
digital computers --- programming --- congresses",
}
@Proceedings{Apostolico:1985:CAW,
editor = "Alberto Apostolico and Zvi Galil",
booktitle = "Combinatorial algorithms on words (Maratea, Italy,
June 18--22, 1984)",
title = "Combinatorial algorithms on words (Maratea, Italy,
June 18--22, 1984)",
volume = "12",
publisher = pub-SV,
address = pub-SV:adr,
pages = "viii + 361",
year = "1985",
ISBN = "0-387-15227-X",
ISBN-13 = "978-0-387-15227-1",
LCCN = "QA164 .N35 1984",
bibdate = "Tue Feb 9 14:47:04 1999",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
series = "{NATO} Adv. Sci. Inst. Ser. {F}: Comput. Systems
Sci.,",
acknowledgement = ack-nhfb,
}
@Proceedings{Beth:1985:ACP,
editor = "Thomas Beth and N. Cot and I. Ingemarsson",
booktitle = "{Advances in cryptology: proceedings of EUROCRYPT 84,
a Workshop on the Theory and Application of
Cryptographic Techniques, Paris, France, April 9--11,
1984}",
title = "{Advances in cryptology: proceedings of EUROCRYPT 84,
a Workshop on the Theory and Application of
Cryptographic Techniques, Paris, France, April 9--11,
1984}",
volume = "209",
publisher = pub-SV,
address = pub-SV:adr,
pages = "vii + 489",
year = "1985",
CODEN = "LNCSD9",
DOI = "????",
ISBN = "0-387-16076-0 (USA)",
ISBN-13 = "978-0-387-16076-4 (USA)",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
LCCN = "QA76.9.A25 E951 1984",
bibdate = "Fri Apr 12 07:14:49 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/index-table-l#lncs;
http://www.math.utah.edu/pub/tex/bib/lncs.bib",
note = "Held at the University of Paris, Sorbonne.",
series = ser-LNCS,
URL = "http://link.springer-ny.com/link/service/series/0558/tocs/t0209.htm;
http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=209",
acknowledgement = ack-nhfb,
keywords = "computers --- access control --- congresses;
cryptography --- congresses; data transmission systems
--- security measures --- congresses; information
hiding; steganography",
}
@Proceedings{Blakley:1985:ACP,
editor = "George Robert Blakley and David Chaum",
booktitle = "{Advances in Cryptology: Proceedings of CRYPTO 84}",
title = "{Advances in Cryptology: Proceedings of CRYPTO 84}",
volume = "196",
publisher = pub-SV,
address = pub-SV:adr,
pages = "ix + 491",
year = "1985",
CODEN = "LNCSD9",
DOI = "http://dx.doi.org/10.1007/3-540-39568-7",
ISBN = "0-387-15658-5; 3-540-39568-7",
ISBN-13 = "978-0-387-15658-3; 978-3-540-39568-3",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
LCCN = "QA76.9.A25 C791 1984; QA267.A1 L43 no.196",
bibdate = "Thu Feb 23 08:39:06 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
note = "CRYPTO 84: a Workshop on the Theory and Application of
Cryptographic Techniques, held at the University of
California, Santa Barbara, August 19--22, 1984,
sponsored by the International Association for
Cryptologic Research.",
series = ser-LNCS,
URL = "http://link.springer-ny.com/link/service/series/0558/tocs/t0196.htm;
http://www.springerlink.com/content/cemajg0qmeev/;
http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=196",
acknowledgement = ack-nhfb,
keywords = "computers --- access control --- congresses;
cryptography --- congresses",
referencedin = "Referenced in \cite[Ref. 6]{Goldreich:1997:FMCb}.",
}
@Proceedings{IEEE:1985:FOC,
editor = "IEEE",
key = "IEEE-FOCS'85",
booktitle = "26th annual Symposium on Foundations of Computer
Science, October 21--23, 1985, Portland, {OR}",
title = "26th annual Symposium on Foundations of Computer
Science, October 21--23, 1985, Portland, {OR}",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "xii + 552",
year = "1985",
ISBN = "0-8186-0644-4 (paperback), 0-8186-4644-6 (microfiche),
0-8186-8644-8 (hardcover)",
ISBN-13 = "978-0-8186-0644-1 (paperback), 978-0-8186-4644-7
(microfiche), 978-0-8186-8644-3 (hardcover)",
LCCN = "QA 76 S979 1985",
bibdate = "Sat Sep 17 10:24:15 1994",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
referencedin = "Referenced in \cite[Ref. 6]{Gemmell:1997:ITC},
\cite[Ref. 7]{Canetti:1997:PSL}.",
}
@Proceedings{ACM:1986:PEA,
editor = "{ACM}",
booktitle = "{Proceedings of the Eighteenth annual ACM Symposium on
Theory of Computing, Berkeley, California, May 28--30,
1986}",
title = "{Proceedings of the Eighteenth annual ACM Symposium on
Theory of Computing, Berkeley, California, May 28--30,
1986}",
publisher = pub-ACM,
address = pub-ACM:adr,
pages = "v + 461",
year = "1986",
ISBN = "0-89791-193-8",
ISBN-13 = "978-0-89791-193-1",
LCCN = "QA 76.6 A13 1986",
bibdate = "Thu Dec 3 07:11:18 MST 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
note = "ACM order number 508860.",
acknowledgement = ack-nhfb,
bookpages = "v + 461",
keywords = "computational complexity --- congresses; programming
(electronic computers) --- congresses",
}
@Proceedings{IEEE:1986:ASF,
editor = "IEEE",
key = "IEEE-FOCS'86",
booktitle = "27th annual Symposium on Foundations of Computer
Science, October 27--29, 1986, Toronto, ON, Canada",
title = "27th annual Symposium on Foundations of Computer
Science, October 27--29, 1986, Toronto, {ON}, Canada",
publisher = pub-IEEE,
address = pub-IEEE:adr,
pages = "xiv + 517",
year = "1986",
ISBN = "0-8186-0740-8 (paperback), 0-8186-4740-X (microfiche),
0-8186-8740-1 (casebound)",
ISBN-13 = "978-0-8186-0740-0 (paperback), 978-0-8186-4740-6
(microfiche), 978-0-8186-8740-2 (casebound)",
LCCN = "QA 76 S979 1986; TK7885.A1 S92 1986",
bibdate = "Thu Dec 03 06:55:33 1998",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
acknowledgement = ack-nhfb,
}
@Proceedings{Pichler:1986:ACE,
editor = "Franz Pichler",
booktitle = "Advances in cryptology: Eurocrypt 85: proceedings of a
workshop on the theory and application of cryptographic
techniques, Linz, Austria, April, 1985",
title = "Advances in cryptology: Eurocrypt 85: proceedings of a
workshop on the theory and application of cryptographic
techniques, Linz, Austria, April, 1985",
volume = "219",
publisher = pub-SV,
address = pub-SV:adr,
pages = "ix + 280",
year = "1986",
CODEN = "LNCSD9",
ISBN = "0-387-16468-5 (USA)",
ISBN-13 = "978-0-387-16468-7 (USA)",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
LCCN = "QA76.9.A25 E961 1985",
bibdate = "Fri Apr 12 07:27:14 1996",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
http://www.math.utah.edu/pub/tex/bib/index-table-l#lncs;
http://www.math.utah.edu/pub/tex/bib/lncs.bib",
note = "``The workshop was sponsored by International
Association for Cryptologic Research \ldots{} [et
al.]''--T.p. verso.",
series = ser-LNCS,
acknowledgement = ack-nhfb,
keywords = "computers --- access control --- congresses;
cryptography --- congresses; data transmission systems
--- security measures --- congresses; information
hiding; steganography",
}
@Proceedings{Ringeisen:1986:ADM,
editor = "Richard D. Ringeisen and Fred S. Roberts",
booktitle = "Applications of discrete mathematics. Proceedings of
the Third SIAM Conference on Discrete Mathematics held
at Clemson University, Clemson, South Carolina, May
14--16, 1986",
title = "Applications of discrete mathematics. Proceedings of
the Third {SIAM} Conference on Discrete Mathematics