%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "4.70",
%%%     date            = "19 April 2014",
%%%     time            = "12:08:54 MDT",
%%%     filename        = "cryptography.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "40693 25165 104237 1058151",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Blowfish; cipher;
%%%                        Clipper; code breaking; cracking;
%%%                        cryptanalysis; crypto; cryptobytes;
%%%                        cryptography; cryptology; cryptosystem; data
%%%                        encryption algorithm; decryption; DES;
%%%                        Diffie; digital signature; encryption;
%%%                        Hellmann; International Data Encryption
%%%                        Algorithm (IDEA); Kahn; Kerberos; key escrow;
%%%                        kleptography; PGP; Pretty Good Privacy;
%%%                        Rivest; RSA; Schneier; Smart Card;
%%%                        steganography; Twofish; Zimmermann",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is bibliography of publications on
%%%                        cryptography and related subjects for the
%%%                        years 1606--1989.  Material for years
%%%                        1990--date appears in companion
%%%                        bibliographies, cryptography1990.bib,
%%%                        cryptography2000.bib, and so on, to reduce
%%%                        the size of this bibliography.
%%%
%%%                        At version 3.29 of this file, the number of
%%%                        entries exceeded 4000, so material for the
%%%                        1990s was moved into a new file,
%%%                        cryptography1990.bib.
%%%
%%%                        The initial draft of this bibliography was
%%%                        extracted using the bibsearch utility from
%%%                        the large TeX User Group and BibNet Project
%%%                        bibliography archives, available on the
%%%                        Internet at
%%%
%%%                            ftp://ftp.math.utah.edu/pub/tex/bib
%%%                            http://www.math.utah.edu/pub/tex/bib/index-table.html
%%%
%%%                        and
%%%
%%%                            ftp://ftp.math.utah.edu/pub/bibnet
%%%                            http://www.math.utah.edu/pub/bibnet/index.html
%%%
%%%                        As of April 1999, these archives hold more
%%%                        than 231,000 bibliographic entries in BibTeX
%%%                        form.
%%%
%%%                        Those results were then augmented by entries
%%%                        for books found in the University of
%%%                        California Melvyl catalog, the Library of
%%%                        Congress catalog, and the OCLC WorldCat
%%%                        database, and by other publications found in
%%%                        the Compendex database, the OCLC Contents1st,
%%%                        Proceedings, and PapersFirst databases, and
%%%                        the MathSciNet database.
%%%
%%%                        Counterpane Systems maintains a Web site at
%%%
%%%                            http://www.counterpane.com/
%%%                            http://www.counterpane.com/publish.html
%%%
%%%                        with a substantial number of their technical
%%%                        reports and articles available in electronic
%%%                        form.
%%%
%%%                        The International Association for Cryptologic
%%%                        Research (IACR) is a ``non-profit scientific
%%%                        organization whose primary purpose is to
%%%                        further research in cryptology and related
%%%                        fields''.  It has a World-Wide Web site at
%%%
%%%                            http://www.iacr.org/index.html
%%%
%%%                        IACR publishes an email newsletter thrice
%%%                        yearly.  Back issues are available starting
%%%                        with Volume 15, Number 1, Fall 1998 at the
%%%                        above site.  It also supports a distinguished
%%%                        lecture series
%%%
%%%                            http://www.iacr.org/publications/dl/
%%%
%%%                        and a preprint server
%%%
%%%                            http://www.iacr.org/publications/preprint.html
%%%
%%%                        The Cryptography and Security Group at the
%%%                        Department of Computer Science and
%%%                        Engineering of the University of California
%%%                        at San Diego supports a World-Wide Web site,
%%%                        called the Theory of Cryptography Library, at
%%%
%%%                            http://philby.ucsd.edu/cryptolib/
%%%
%%%                        There is another site with cryptographic
%%%                        miscellanea and news articles at
%%%
%%%                            http://cryptome.org/
%%%
%%%                        There is an archive of the cryptography
%%%                        mailing list at
%%%
%%%                            http://www.mail-archive.com/cryptography%40wasabisystems.com/
%%%
%%%                        All of the cited references from all of the
%%%                        articles in the online journal CryptoBytes
%%%                        are also included, with referencedin key
%%%                        values recording the source of citations.
%%%
%%                        However, publications in the journals
%%%
%%%                            * Cryptologia,
%%%                            * Designs, Codes, and Cryptography,
%%%                            * Journal of Cryptology,
%%%                            * Journal of Discrete Mathematical
%%%                              Sciences and Cryptography
%%%
%%%                        are generally excluded, unless they are
%%%                        cross-referenced by other entries in this
%%%                        bibliography, because they are covered in
%%%                        separate companion bibliographies,
%%%                        cryptologia.bib, designscodescryptogr.bib,
%%%                        jcryptology.bib, and jdiscrmathscicrypto.bib.
%%%
%%%                        Historical note: Whitfield Diffie, Martin
%%%                        E. Hellman, and Ralph Merkle are justly
%%%                        credited with the first publicly-reported
%%%                        discovery (in 1976--78) of public-key key
%%%                        cryptography.  However, three British
%%%                        researchers, James Ellis, Clifford Cocks and
%%%                        Malcolm Williamson independently discovered
%%%                        it earlier (about 1975), but their work was
%%%                        secret until its declassification in 1997.
%%%                        See entries Ellis:1975:PKC, Diffie:1976:NDC,
%%%                        Merkle:1978:HIS, Merkle:1978:SCI.  I have not
%%%                        yet been able to locate the declassified
%%%                        reports.  Two reports by Alan Turing on
%%%                        cryptography (entries Turing:1941:APC and
%%%                        Turing:1941:SR) were similarly closely-held
%%%                        secrets, and were only declassified in 2012.
%%%
%%%                        At version 4.70, the year coverage looked
%%%                        like this:
%%%
%%%                             1606 (   3)    1741 (   0)    1876 (   0)
%%%                             1613 (   0)    1748 (   0)    1883 (   1)
%%%                             1615 (   0)    1750 (   0)    1885 (   1)
%%%                             1620 (   1)    1755 (   0)    1890 (   0)
%%%                             1621 (   3)    1756 (   0)    1891 (   0)
%%%                             1622 (   0)    1757 (   0)    1892 (   1)
%%%                             1627 (   1)    1762 (   0)    1897 (   0)
%%%                             1628 (   0)    1763 (   0)    1898 (   1)
%%%                             1630 (   0)    1765 (   0)    1900 (   1)
%%%                             1633 (   1)    1768 (   0)    1903 (   0)
%%%                             1634 (   0)    1769 (   0)    1904 (   1)
%%%                             1642 (   0)    1777 (   0)    1912 (   1)
%%%                             1644 (   2)    1779 (   0)    1914 (   0)
%%%                             1645 (   0)    1780 (   0)    1915 (   1)
%%%                             1649 (   0)    1784 (   0)    1919 (   1)
%%%                             1650 (   0)    1785 (   0)    1920 (   1)
%%%                             1651 (   0)    1786 (   0)    1921 (   1)
%%%                             1652 (   0)    1787 (   0)    1922 (   4)
%%%                             1653 (   0)    1788 (   0)    1923 (   1)
%%%                             1654 (   0)    1789 (   0)    1924 (   2)
%%%                             1655 (   0)    1790 (   0)    1925 (   1)
%%%                             1656 (   0)    1791 (   0)    1926 (   1)
%%%                             1657 (   0)    1792 (   0)    1927 (   2)
%%%                             1658 (   0)    1793 (   0)    1928 (   1)
%%%                             1659 (   0)    1794 (   0)    1929 (   2)
%%%                             1661 (   0)    1796 (   0)    1931 (   2)
%%%                             1662 (   0)    1797 (   0)    1932 (   1)
%%%                             1665 (   0)    1800 (   0)    1935 (   3)
%%%                             1666 (   1)    1801 (   0)    1936 (   2)
%%%                             1668 (   0)    1803 (   0)    1938 (   2)
%%%                             1669 (   0)    1804 (   0)    1939 (   7)
%%%                             1670 (   0)    1805 (   0)    1940 (   3)
%%%                             1671 (   0)    1806 (   0)    1941 (   5)
%%%                             1672 (   0)    1807 (   0)    1942 (   2)
%%%                             1673 (   0)    1808 (   0)    1943 (   9)
%%%                             1674 (   0)    1809 (   0)    1944 (   2)
%%%                             1675 (   0)    1810 (   0)    1945 (   6)
%%%                             1676 (   1)    1811 (   0)    1946 (   1)
%%%                             1677 (   0)    1812 (   0)    1947 (   1)
%%%                             1678 (   0)    1813 (   0)    1948 (   3)
%%%                             1679 (   0)    1814 (   0)    1949 (   1)
%%%                             1682 (   0)    1817 (   0)    1952 (   2)
%%%                             1683 (   0)    1818 (   0)    1953 (   1)
%%%                             1684 (   0)    1819 (   0)    1954 (   1)
%%%                             1685 (   0)    1820 (   0)    1955 (   4)
%%%                             1686 (   0)    1821 (   0)    1956 (   3)
%%%                             1687 (   0)    1822 (   0)    1957 (   2)
%%%                             1688 (   0)    1823 (   0)    1958 (   2)
%%%                             1689 (   0)    1824 (   0)    1959 (   1)
%%%                             1690 (   0)    1825 (   0)    1960 (   6)
%%%                             1691 (   0)    1826 (   0)    1961 (   5)
%%%                             1692 (   1)    1827 (   0)    1962 (   0)
%%%                             1693 (   0)    1828 (   0)    1963 (   3)
%%%                             1694 (   0)    1829 (   0)    1964 (   1)
%%%                             1695 (   0)    1830 (   0)    1965 (   1)
%%%                             1696 (   0)    1831 (   0)    1966 (   3)
%%%                             1697 (   0)    1832 (   0)    1967 (   9)
%%%                             1698 (   0)    1833 (   0)    1968 (   6)
%%%                             1699 (   0)    1834 (   0)    1969 (   4)
%%%                             1700 (   0)    1835 (   0)    1970 (   7)
%%%                             1701 (   0)    1836 (   0)    1971 (   4)
%%%                             1702 (   0)    1837 (   0)    1972 (   1)
%%%                             1703 (   0)    1838 (   0)    1973 (   9)
%%%                             1704 (   0)    1839 (   0)    1974 (  14)
%%%                             1705 (   0)    1840 (   0)    1975 (  16)
%%%                             1706 (   0)    1841 (   0)    1976 (  20)
%%%                             1707 (   0)    1842 (   0)    1977 (  19)
%%%                             1708 (   0)    1843 (   0)    1978 (  29)
%%%                             1709 (   0)    1844 (   0)    1979 (  49)
%%%                             1710 (   0)    1845 (   0)    1980 (  34)
%%%                             1711 (   0)    1846 (   0)    1981 (  49)
%%%                             1712 (   0)    1847 (   0)    1982 (  60)
%%%                             1713 (   0)    1848 (   0)    1983 (  70)
%%%                             1714 (   0)    1849 (   0)    1984 (  60)
%%%                             1715 (   0)    1850 (   0)    1985 ( 115)
%%%                             1716 (   0)    1851 (   0)    1986 (  66)
%%%                             1717 (   0)    1852 (   0)    1987 (  81)
%%%                             1718 (   0)    1853 (   0)    1988 ( 110)
%%%                             1719 (   0)    1854 (   0)    1989 ( 100)
%%%                             1720 (   0)    1855 (   0)    1990 (   1)
%%%                             1723 (   0)    1858 (   0)    1993 (   2)
%%%                             1726 (   0)    1861 (   0)    1996 (   1)
%%%                             1727 (   0)    1862 (   0)    1997 (   1)
%%%                             1728 (   0)    1863 (   0)    1998 (   1)
%%%                             1729 (   0)    1864 (   1)    1999 (   2)
%%%                             1731 (   0)    1866 (   0)    2001 (   1)
%%%                             1738 (   0)    1873 (   1)    2008 (   0)
%%%                             1739 (   1)    1874 (   1)    2009 (   1)
%%%                             19xx (   2)
%%%
%%%                             Article:        417
%%%                             Book:           283
%%%                             InCollection:    31
%%%                             InProceedings:  136
%%%                             Manual:          19
%%%                             MastersThesis:   39
%%%                             Misc:            13
%%%                             Periodical:       3
%%%                             PhdThesis:       12
%%%                             Proceedings:     62
%%%                             TechReport:      54
%%%                             Unpublished:      3
%%%
%%%                             Total entries: 1072
%%%
%%%                        There is a hypertext bibliography of
%%%                        classical cryptography at
%%%
%%%                            http://ourworld.compuserve.com/homepages/crypto/BIB1XX.HTM
%%%
%%%                        CIPHER, the Electronic Newsletter of the
%%%                        Technical Committee on Security and Privacy,
%%%                        A Technical Committee of the Computer Society
%%%                        of the IEEE, is available on the World-Wide
%%%                        Web at
%%%
%%%                            http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher
%%%
%%%                        with pointers to all back issues (1994--1998).
%%%
%%%                        ``CRYPTO-GRAM is a free monthly newsletter
%%%                        providing summaries, analyses, insights, and
%%%                        commentaries on cryptography and computer
%%%                        security.  To subscribe, visit
%%%
%%%                            http://www.counterpane.com/crypto-gram.html
%%%
%%%                        or send a blank message to
%%%
%%%                            crypto-gram-subscribe at chaparraltree.com
%%%
%%%                        Back issues are available on
%%%
%%%                            http://www.counterpane.com''
%%%
%%%                        CRYPTO-GRAM is a good source of news of
%%%                        recent developments in the field, and
%%%                        contains many interesting essays on aspects
%%%                        of cryptography.
%%%
%%%                        There is a Web site on steganography at
%%%
%%%                            http://www.cl.cam.ac.uk/~fapp2/steganography/
%%%
%%%                        In this bibliography, entries are sorted
%%%                        first by ascending year, and within each
%%%                        year, alphabetically by author or editor,
%%%                        and then, if necessary, by the 3-letter
%%%                        abbreviation at the end of the BibTeX
%%%                        citation tag, using the bibsort -byyear
%%%                        utility.  Year order has been chosen to
%%%                        make it easier to identify the most recent
%%%                        work.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================

@Preamble{
    "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"
  # "\ifx \undefined \cprime \def \cprime {$\mathsurround=0pt '$}\fi"
  # "\ifx \undefined \Dbar \def \Dbar {\leavevmode\raise0.2ex\hbox{--}\kern-0.5emD} \fi"
  # "\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi"
  # "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi"
  # "\ifx \undefined \operatorname \def \operatorname #1{{\rm #1}}\fi"
  # "\hyphenation{
        Aba-di
        Arch-ives
        Ding-yi
        for-ge-ry
        Go-pa-la-krish-nan
        Hi-de-ki
        Kraw-czyk
        Lands-verk
        Law-rence
        Leigh-ton
        Mich-ael
        Moell-er
        North-ridge
        para-digm
        para-digms
        Piep-rzyk
        Piv-e-teau
        Ram-kilde
        Re-tro-fit-ting
        Rich-ard
        Sho-stak
        Si-ro-mo-n-ey
        Ste-ph-en
        The-o-dore
        Tho-m-as
        Tzone-lih
        venge-ance
        Will-iam
        Ye-sh-i-va
    }"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:

@String{ack-bs =   "Bruce Schneier,
                    Counterpane Systems,
                    101 East Minnehaha Parkway,
                    Minneapolis, MN 55419,
                    e-mail: \path|schneier@counterpane.com"}

@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

@String{ack-pb =     "Preston Briggs,
                     Tera Computer Company,
                     2815 Eastlake East,
                     Seattle, WA 98102,
                     USA,
                     Tel: +1 206 325-0800,
                     e-mail: \path|preston@tera.com|"}

%%% ====================================================================
%%% Institution abbreviations:

@String{inst-COUNTERPANE-INTERNET-SECURITY = "Counterpane Internet Security"}

@String{inst-COUNTERPANE-INTERNET-SECURITY:adr = "3031 Tisch Way, Suite 100PE,
                                  San Jose, CA 95128, USA"}

@String{inst-COUNTERPANE-LABS = "Counterpane Systems"}

@String{inst-COUNTERPANE-LABS:adr = "101 East Minnehaha Parkway, Minneapolis,
                                   MN 55419"}

@String{inst-COUNTERPANE-SYSTEMS = "Counterpane Systems"}

@String{inst-COUNTERPANE-SYSTEMS:adr = "101 East Minnehaha Parkway, Minneapolis,
                                   MN 55419"}

%% Old address:
%% String{inst-COUNTERPANE-SYSTEMS:adr = "Oak Park, IL, USA"}

@String{inst-CSU                = "Colorado State University"}

@String{inst-CSU:adr            = "Fort Collins, CO, USA"}

@String{inst-IBM-WATSON         = "IBM T. J. Watson Research Center"}

@String{inst-IBM-WATSON:adr     = "Yorktown Heights, NY, USA"}

@String{inst-KENT-STATE-UNIV    = "Kent State University"}

@String{inst-KENT-STATE-UNIV:adr = "Kent, OH, USA"}

@String{inst-MIT-CS             = "Massachusetts Institute of Technology,
                                  Computer Science Lab."}

@String{inst-MIT:adr            = "Cambridge, Massachusetts"}

@String{inst-NORTHWESTERN-UNIVERSITY = "Northwestern University"}

@String{inst-NORTHWESTERN-UNIVERSITY:adr = "Evanston, IL, USA"}

@String{inst-SRC-IDA            = "Supercomputing Research Center: IDA"}

@String{inst-SRC-IDA:adr        = "Lanham, MD, USA"}

@String{inst-UC-BERKELEY-ICSI   = "International Computer Science Institute"}

@String{inst-UC-BERKELEY-ICSI:adr = "Berkeley, CA, USA"}

@String{inst-UIUC-CSRD          = "University of Illinois at Urbana-Champaign,
                                  Center for Supercomputing Research and
                                  Development"}

@String{inst-UIUC-CSRD:adr      = "Urbana, IL 61801, USA"}

@String{inst-UTK                = "University of Tennessee, Knoxville"}

@String{inst-UTK:adr            = "Knoxville, TN 37996, USA"}

%%% ====================================================================
%%% Journal abbreviations:

@String{j-ADV-ENG-SOFTWARE      = "Advances in Engineering Software"}

@String{j-ADV-IMAGING           = "Advanced Imaging"}

@String{j-ALGORITHMICA          = "Algorithmica"}

@String{j-AMER-MATH-MONTHLY     = "American Mathematical Monthly"}

@String{j-AMER-STAT             = "The American Statistician"}

@String{j-ANN-BIOMED-ENG        = "Annals of biomedical engineering"}

@String{j-ANN-HIST-COMPUT       = "Annals of the History of Computing"}

@String{j-ANN-MATH              = "Annals of Mathematics"}

@String{j-ANNALS-MATH-STAT      = "Ann. Math. Stat."}

@String{j-APPL-ALGEBRA-ENG-COMMUN-COMPUT = "Applicable algebra in engineering,
                                  communication and computing"}

@String{j-APPL-MATH-COMP        = "Applied Mathematics and Computation"}

@String{j-APPL-MATH-LETT        = "Applied Mathematics Letters"}

@String{j-APPL-NUM-MATH         = "Applied Numerical Mathematics: Transactions
                                  of IMACS"}

@String{j-APPL-STAT             = "Applied Statistics"}

@String{j-ATT-BELL-LAB-TECH-J   = "ATT Bell Lab. tech. j"}

@String{j-ATT-TECH-J            = "AT\&T Technical Journal"}

@String{j-BANK-SYST-TECHNOL     = "Bank systems + technology"}

@String{j-BELL-SYST-TECH-J      = "The Bell System Technical Journal"}

@String{j-BIT                   = "BIT"}

@String{j-BT-TECH-J             = "BT Technology Journal"}

@String{j-BULL-AUSTRAL-MATH-SOC = "Bulletin of the Australian Mathematical
                                  Society"}

@String{j-BYTE                  = "BYTE Magazine"}

@String{j-C-PLUS-PLUS-REPORT    = "C++ Report"}

@String{j-CACM                  = "Communications of the Association for
                                  Computing Machinery"}

@String{j-CCCUJ                 = "C/C++ Users Journal"}

@String{j-CG-WORLD              = "Computer Graphics World"}

@String{j-CGF                   = "Com{\-}pu{\-}ter Graphics Forum"}

@String{j-CGIP                  = "Computer Graphics and Image Processing"}

@String{j-CHIN-J-COMPUTERS      = "Chinese Journal of Computers = Chi suan chi
                                  hsueh pao"}

@String{j-CISCO-WORLD           = "Cisco World: The Independent Journal for
                                  Internetworking Professionals"}

@String{j-COLLEGE-MATH-J        = "College Mathematics Journal"}

@String{j-COMP-ARCH-NEWS        = "ACM SIGARCH Computer Architecture News"}

@String{j-COMP-COMM-REV         = "Computer Communications Review, ACM
                                  SIGCOMM"}

@String{j-COMP-GRAPHICS         = "Computer Graphics"}

@String{j-COMP-J                = "The Computer Journal"}

@String{j-COMP-LANG-MAG         = "Computer Language Magazine"}

@String{j-COMP-LANGS            = "Computer Languages"}

@String{j-COMP-LAW-SECURITY-REP = "The Computer Law and Security Report"}

@String{j-COMP-MATH-APPL        = "Computers and Mathematics with
                                  Applications"}

@String{j-COMP-NET              = "Computer Networks: The International Journal
                                   of Distributed Informatique"}

@String{j-COMP-NET-AMSTERDAM    = "Computer Networks (Amsterdam, Netherlands:
                                  1999)"}

@String{j-COMP-NET-ISDN         = "Computer Networks and ISDN Systems"}

@String{j-COMP-PHYSICS          = "Computers in physics"}

@String{j-COMP-STRUCTURES       = "Computers and Structures"}

@String{j-COMP-SURV             = "ACM Computing Surveys"}

@String{j-COMP-SYS              = "Computing Systems"}

@String{j-COMPLEX-SYSTEMS       = "Complex Systems"}

@String{j-COMPUT-COMPLEX        = "Computational complexity"}

@String{j-COMPUT-METH-PROG-BIOMED = "Computer Methods and Programs in
                                  Biomedicine"}

@String{j-COMPUT-SECUR          = "Computers and Security"}

@String{j-COMPUT-SECUR-J        = "Computer Security Journal"}

@String{j-COMPUT-SYST-ENG       = "Computing systems in engineering: an
                                  international journal"}

@String{j-COMPUT-SYST-SCI-ENG   = "Computer Systems Science and Engineering"}

@String{j-COMPUTER              = "Computer"}

@String{j-COMPUTERS-AND-GRAPHICS = "Computers and Graphics"}

@String{j-COMPUTERWORLD         = "Computerworld"}

@String{j-COMPUTING             = "Computing"}
%%%
@String{j-CONG-NUM              = "Congressus Numerantium"}

@String{j-CONN-LAW-REVIEW       = "Connecticut Law Review"}

@String{j-CRYPTOBYTES           = "CryptoBytes"}

@String{j-CRYPTOLOG             = "Cryptolog"}

@String{j-CRYPTOLOGIA           = "Cryptologia"}

@String{j-CUJ                   = "C Users Journal"}

@String{j-CVGIP                 = "Computer Vision, Graphics, and Image
                                  Processing"}

@String{j-CVGIP-GMIP            = "Computer Vision, Graphics, and Image
                                  Processing. Graphical Models and Image
                                  Processing"}

@String{j-DATAMATION            = "Datamation"}

@String{j-DDDU                  = "Dr. Dobb's Developer Update"}

@String{j-DDJ                   = "Dr. Dobb's Journal of Software Tools"}

@String{j-DEC-TECH-J            = "Digital Technical Journal of Digital
                                  Equipment Corporation"}

@String{j-DESIGN-NEWS           = "Design news"}

@String{j-DESIGNS-CODES-CRYPTOGR = "Designs, Codes, and Cryptography"}

@String{j-DISCRETE-APPL-MATH    = "Discrete Applied Mathematics"}

@String{j-DISCRETE-MATH-APPL    = "Discrete Mathematics and Applications"}

@String{j-ELECT-COMM-JAPAN-3-FUND-ELECT-SCI = "Electronics and communications
                                  in Japan. Part 3, Fundamental electronic
                                  science"}

@String{j-ELECT-LETTERS         = "Electronics Letters"}

@String{j-ELECTRONICS           = "Electronics"}

@String{j-EMBED-SYS-PROG        = "Embedded Systems Programming"}

@String{j-ENG-FRACTURE-MECH     = "Engineering fracture mechanics"}

@String{j-EPODD                 = "Electronic
                                  Pub\-lish\-ing\emdash{}Orig\-i\-na\-tion,
                                  Dissemination, and Design"}

@String{j-ETT                   = "European Transactions on
                                  Telecommunications: ETT"}

@String{j-EUR-J-OPER-RES        = "European Journal of Operational Research"}

@String{j-EUR-TRANS-TELECOMM    = "European transactions on telecommunications
                                  and related technologies"}

@String{j-EUUG-NEWSLETTER       = "EUUG Newsletter"}

@String{j-FINANC-TECH-INT-BULL  = "Financial Technology International
                                  Bulletin"}

@String{j-FUT-GEN-COMP-SYS      = "Future Generation Computer Systems"}

@String{j-GRAPH-MODELS-IMAGE-PROC = "Graphical models and image processing:
                                  GMIP"}

@String{j-HEWLETT-PACKARD-J     = "Hew\-lett-Pack\-ard Journal: technical
                                  information from the laboratories of
                                  Hew\-lett-Pack\-ard Company"}

@String{j-HIST-MATH             = "Historia Mathematica"}

@String{j-IBM-JRD               = "IBM Journal of Research and Development"}

@String{j-IBM-SYS-J             = "IBM Systems Journal"}

@String{j-IEE-CONF-PUBL         = "IEE conference publication"}

@String{j-IEE-PROC-VIS-IMAGE-SIGNAL-PROCESS = "IEE proceedings. Vision, image,
                                  and signal processing"}

@String{j-IEEE-ANN-HIST-COMPUT  = "IEEE Annals of the History of Computing"}

@String{j-IEEE-ASSP             = "IEEE Trans. ASSP"}

@String{j-IEEE-CGA              = "IEEE Computer Graphics and Applications"}

@String{j-IEEE-COMM-MAG         = "IEEE Communications Magazine"}

@String{j-IEEE-J-SEL-AREAS-COMMUN = "IEEE Journal on Selected Areas in
                                  Communications"}

@String{j-IEEE-MICRO            = "IEEE Micro"}

@String{j-IEEE-MULTIMEDIA       = "IEEE MultiMedia"}

@String{j-IEEE-PAR-DIST-TECH    = "IEEE parallel and distributed technology:
                                  systems and applications"}

@String{j-IEEE-SOFTWARE         = "IEEE Software"}

@String{j-IEEE-SPECTRUM         = "IEEE Spectrum"}

@String{j-IEEE-TRANS-COMM       = "IEEE Transactions on Communications"}

@String{j-IEEE-TRANS-COMPUT     = "IEEE Transactions on Computers"}

@String{j-IEEE-TRANS-CONSUMER-ELECTRONICS = "IEEE Transactions on Consumer
                                  Electronics"}

@String{j-IEEE-TRANS-IMAGE-PROCESS = "IEEE Transactions on Image Processing"}

@String{j-IEEE-TRANS-INF-THEORY = "IEEE Transactions on Information Theory"}

@String{j-IEEE-TRANS-NETWORKING = "IEEE\slash ACM Transactions on Networking"}

@String{j-IEEE-TRANS-PAR-DIST-SYS = "IEEE Transactions on Parallel and
                                  Distributed Systems"}

@String{j-IEEE-TRANS-PATT-ANAL-MACH-INTEL = "IEEE Transactions on Pattern
                                  Analysis and Machine Intelligence"}

@String{j-IEEE-TRANS-PROF-COMM  = "IEEE Transactions on Professional
                                  Communication"}

@String{j-IEICE-TRANS-FUND-ELECT = "IEICE Transactions on Fundamentals of
                                  Electronics Communications and Computer
                                  Sciences"}

@String{j-IJQC                  = "International Journal of Quantum Chemistry"}

@String{j-IJSAHPC               = "The International Journal of Supercomputer
                                  Applications and High Performance Computing"}

@String{j-IMAGE-VIS-COMPUT      = "Image and Vision Computing"}

@String{j-INF-COMM-TECH-LAW     = "Information \& Communications Technology
                                  Law"}

@String{j-INF-COMPUT            = "Information and Computation"}

@String{j-INF-CONTROL           = "Information and Control"}

@String{j-INF-SOC               = "The Information Society"}

@String{j-INFO-PROC-LETT        = "Information Processing Letters"}

@String{j-INFO-PROC-MAN         = "Information Processing and Management"}

@String{j-INFORMATION-WEEK      = "Information Week"}

@String{j-INT-J-BIFURC-CHAOS-APPL-SCI-ENG = "International journal of
                                  bifurcation and chaos in applied sciences and
                                  engineering"}

@String{j-INT-J-COMPUT-INF-SCI  = "International Journal of Computer and
                                  Information Sciences"}

@String{j-INT-J-COMPUT-MATH     = "International Journal of Computer
                                  Mathematics"}

@String{j-INT-J-COMPUT-SYST-SCI-ENG = "International Journal of Computer
                                  Systems Science and Engineering"}

@String{j-INT-J-ELECTRON        = "International Journal of Electronics
                                  Theoretical \& Experimental"}

@String{j-INT-J-SYST-SCI        = "International Journal of Systems Science"}

@String{j-INT-J-THEOR-PHYS      = "International Journal of Theoretical
                                  Physics"}

@String{j-INTELL-NATL-SECUR     = "Intelligence and National Security"}

@String{j-ISIS                  = "Isis"}

@String{j-J-ACM                 = "Journal of the Association for Computing
                                  Machinery"}

@String{j-J-ALG                 = "Journal of Algorithms"}

@String{j-J-COMP-SCI-TECH       = "Journal of computer science and technology"}

@String{j-J-COMP-SECUR          = "Journal of Computer Security"}

@String{j-J-COMP-SYS-SCI        = "Journal of Computer and System Sciences"}

@String{j-J-CRYPTOLOGY          = "Journal of Cryptology"}

@String{j-J-DOC                 = "Journal of Documentation"}

@String{j-J-ELECTRON-IMAGING    = "Journal of Electronic Imaging"}

@String{j-J-ENG-MECH            = "Journal of Engineering Mechanics"}

@String{j-J-MATH-PHYS           = "Journal of Mathematical Physics"}

@String{j-J-PAR-DIST-COMP       = "Journal of Parallel and Distributed
                                  Computing"}

@String{j-J-RES-NATL-INST-STAND-TECHNOL = "Journal of research of the National
                                  Institute of Standards and Technology"}

@String{j-J-SCI-IND-RES         = "Journal of Scientific and Industrial
                                  Research"}

@String{j-J-SIAM                = "Journal of the Society for Industrial and
                                  Applied Mathematics"}

@String{j-J-SUPERCOMPUTING      = "The Journal of Supercomputing"}

@String{j-J-SYMBOLIC-COMP       = "Journal of Symbolic Computation"}

@String{j-J-SYST-SOFTW          = "The Journal of Systems and Software"}

@String{j-J-UCS                 = "J.UCS: Journal of Universal Computer
                                  Science"}

@String{j-J-VIS-COMP-ANIMATION  = "The Journal of Visualization and Computer
                                  Animation"}

@String{j-JAVAWORLD             = "JavaWorld: IDG's magazine for the Java
                                  community"}

@String{j-LECT-NOTES-COMP-SCI   = "Lecture Notes in Computer Science"}

@String{j-LINEAR-ALGEBRA-APPL   = "Linear Algebra and its Applications"}

@String{j-LINUX-J               = "Linux Journal"}

@String{j-LMS-J-COMPUT-MATH     = "LMS Journal of Computation and Mathematics"}

@String{j-LOGIN                 = ";login: the USENIX Association newsletter"}

@String{j-MACUSER               = "MacUser"}

@String{j-MATH-COMP-EDU         = "Mathematics and computer education"}

@String{j-MATH-COMP-MODELLING   = "Mathematical and computer modelling"}

@String{j-MATH-COMPUT           = "Mathematics of Computation"}

@String{j-MATH-GAZ              = "The Mathematical Gazette"}

@String{j-MATH-MAG              = "Mathematics Magazine"}

@String{j-MATH-SEMESTERBER      = "Mathematische Semesterberichte"}

@String{j-MATH-SLOVACA          = "Mathematica Slovaca"}

@String{j-MATHEMATICA-J         = "Mathematica Journal"}

@String{j-MATHEMATIKA           = "Mathematika"}

@String{j-MICROELECT-RELIABILITY = "Microelectronics and Reliability"}

@String{j-N-I-A-CR              = "Newsletter of the International Association
                                  for Cryptologic Research"}

@String{j-NAMS                  = "Notices of the American Mathematical
                                  Society"}

@String{j-NORDIC-J-COMPUT       = "Nordic Journal of Computing"}

@String{j-NTT-R-D               = "NTT R\&D"}

@String{j-NUM-LIN-ALG-APPL      = "Numerical linear algebra with applications"}

@String{j-NUM-MATH              = "Numerische Mathematik"}

@String{j-NUMER-ALGORITHMS      = "Numerical Algorithms"}

@String{j-OBZORNIK-MAT-FIZ      = "Dru{\\v{s}}tvo Matematikov, Fizikov in
                                  Astronomov SRS. Obzornik za Matematiko in
                                  Fiziko"}

@String{j-OPEN-COMPUTING        = "Open Computing"}

@String{j-OPEN-SYSTEMS-TODAY    = "Open Systems Today"}

@String{j-OPER-SYS-REV          = "Operating Systems Review"}

@String{j-PARALLEL-ALGORITHMS-APPL = "Parallel Algorithms and Applications"}

@String{j-PARALLEL-COMPUTING    = "Parallel Computing"}

@String{j-PARALLEL-PROCESS-LETT = "Parallel Processing Letters"}

@String{j-PC-TECH               = "PC Techniques"}

@String{j-PERFORM-COMPUT        = "Performance Computing"}

@String{j-PHILIPS-J-RES         = "Philips Journal of Research"}

@String{j-PROC-ICASSP           = "Proceedings of the International Conference
                                  on Acoustics, Speech, and Signal Processing"}

@String{j-PROC-CAMBRIDGE-PHIL-SOC = "Proceedings of the Cambridge Philosophical
                                  Society. Mathematical and physical sciences"}

@String{j-PROC-IEEE             = "Proceedings of the IEEE"}

@String{j-PROC-SPIE             = "Proceedings of the SPIE --- The
                                  International Society for Optical
                                  Engineering"}

@String{j-SCI-AMER              = "Scientific American"}

@String{j-SCI-AMER-INT-ED       = "Scientific American [International
                                  Edition]"}

@String{j-SCI-COMPUT-PROGRAM    = "Science of Computer Programming"}

@String{j-SCIENCE               = "Science"}

@String{j-SIAM-J-ALG-DISC-METH  = "SIAM Journal on Algebraic and Discrete
                                  Methods"}

@String{j-SIAM-J-APPL-MATH      = "SIAM Journal on Applied Mathematics"}

@String{j-SIAM-J-COMPUT         = "SIAM Journal on Computing"}

@String{j-SIAM-J-DISCR-MATH     = "SIAM Journal on Discrete Mathematics"}

@String{j-SIAM-J-MAT-ANA-APPL   = "SIAM Journal on Matrix Analysis and
                                  Applications"}

@String{j-SIAM-J-NUMER-ANAL     = "SIAM Journal on Numerical Analysis"}

@String{j-SIAM-J-SCI-STAT-COMP  = "SIAM Journal on Scientific and Statistical
                                  Computing"}

@String{j-SIAM-REVIEW           = "SIAM Review"}

@String{j-SIG-PROC              = "Signal Processing"}

@String{j-SIGACT                = "ACM SIGACT News"}

@String{j-SIGADA-LETTERS        = "ACM SIGADA Ada Letters"}

@String{j-SIGCSE                = "SIGCSE Bulletin (ACM Special Interest Group
                                  on Computer Science Education)"}

@String{j-SIGMETRICS            = "ACM SIGMETRICS Performance Evaluation
                                  Review"}

@String{j-SIGMOD                = "SIGMOD Record (ACM Special Interest Group
                                  on Management of Data)"}

@String{j-SIGNUM                = "ACM SIGNUM Newsletter"}

@String{j-SIGPLAN               = "ACM SIG{\-}PLAN Notices"}

@String{j-SIGSAM                = "SIGSAM Bulletin (ACM Special Interest Group
                                  on Symbolic and Algebraic Manipulation)"}

@String{j-SMITHSONIAN           = "Smithsonian"}

@String{j-SOUTHCON              = "Southcon Conference Record"}

@String{j-SPE                   = "Soft\-ware\emdash Prac\-tice and
                                  Experience"}

@String{j-SUNSERVER             = "SunServer"}

@String{j-SUPER-REV             = "Supercomputing Review"}

@String{j-SUPERCOMPUTER         = "Supercomputer"}

@String{j-SUPERCOMPUTING-REVIEW = "Supercomputing Review"}

@String{j-SYS-ADMIN             = "Sys Admin: The Journal for UNIX Systems
                                  Administrators"}

@String{j-SYS-COMP-JAPAN        = "Systems and computers in Japan"}

@String{j-TECH-COMMUN           = "Technical Communication"}

@String{j-TELECOMMUNICATIONS-AMERICAS-ED = "Telecommunications (Americas Edition)"}

@String{j-THEOR-COMP-SCI        = "Theoretical Computer Science"}

@String{j-TOCS                  = "ACM Transactions on Computer Systems"}

@String{j-TODS                  = "ACM Transactions on Database Systems"}

@String{j-TOIS                  = "ACM Transactions on Information Systems"}

@String{j-TOMS                  = "ACM Transactions on Mathematical Software"}

@String{j-TOOIS                 = "ACM Transactions on Office Information
                                   Systems"}

@String{j-TOPLAS                = "ACM Transactions on Programming Languages
                                  and Systems"}

@String{j-TRANS-AM-NUCL-SOC     = "Transactions of the American Nuclear
                                  Society"}

@String{j-UNIX-DEVELOPER        = "UNIX Developer"}

@String{j-UNIX-WORLD            = "UNIX/world"}

@String{j-WEBSERVER             = "WebServer Magazine: For Managers of World
                                  Wide Web Sites"}

@String{j-WORD-WAYS             = "Word Ways"}

@String{j-X-RESOURCE            = "{The X Resource}"}

%%% ====================================================================
%%% Organization abbreviations:

@String{org-GENERAL-ELECTRIC    = "General Electric"}

@String{org-GENERAL-ELECTRIC:adr = "Schenectady, NY, USA"}

%%% ====================================================================
%%% Publisher abbreviations:

@String{pub-A-K-PETERS          = "A. K. Peters, Ltd."}
@String{pub-A-K-PETERS:adr      = "Wellesley, MA, USA"}

@String{pub-ACADEMIC            = "Academic Press"}
@String{pub-ACADEMIC:adr        = "New York, NY, USA"}

@String{pub-ACM                 = "ACM Press"}
@String{pub-ACM:adr             = "New York, NY 10036, USA"}

@String{pub-AEGEAN-PARK         = "Aegean Park Press"}
@String{pub-AEGEAN-PARK:adr     = "Laguna Hills, CA, USA"}

@String{pub-AFIPS               = "AFIPS Press"}
@String{pub-AFIPS:adr           = "Montvale, NJ, USA"}

@String{pub-AMS                 = "American Mathematical Society"}
@String{pub-AMS:adr             = "Providence, RI, USA"}

@String{pub-ANSI                = "American National Standards Institute"}
@String{pub-ANSI:adr            = "1430 Broadway, New York, NY 10018, USA"}

@String{pub-AP-PROFESSIONAL     = "AP Professional"}
@String{pub-AP-PROFESSIONAL:adr = "Boston, MA, USA"}

@String{pub-ARTECH              = "Artech House Inc."}
@String{pub-ARTECH:adr          = "Norwood, MA, USA"}

@String{pub-AW                  = "Ad{\-d}i{\-s}on-Wes{\-l}ey"}
@String{pub-AW:adr              = "Reading, MA, USA"}

@String{pub-BIRKHAUSER          = "Birkh{\"a}user Verlag"}
@String{pub-BIRKHAUSER:adr      = "Basel, Switzerland"}

@String{pub-BLACKWELL-SCI       = "Blackwell Scientific Publications"}
@String{pub-BLACKWELL-SCI:adr   = "Oxford, UK"}

@String{pub-CAMBRIDGE           = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr       = "Cambridge, UK"}

@String{pub-CHAPMAN-HALL        = "Chapman and Hall, Ltd."}
@String{pub-CHAPMAN-HALL:adr    = "London, UK"}

@String{pub-CLARENDON           = "Clarendon Press"}
@String{pub-CLARENDON:adr       = "Oxford, UK"}

@String{pub-CRC                 = "CRC Press"}
@String{pub-CRC:adr             = "2000 N.W. Corporate Blvd., Boca Raton,
                                  FL 33431-9868, USA"}

@String{pub-CUP                 = "Cambridge University Press"}
@String{pub-CUP:adr             = "New York, NY, USA"}

@String{pub-DEKKER              = "Marcel Dekker, Inc."}
@String{pub-DEKKER:adr          = "New York, NY, USA"}

@String{pub-DOUBLEDAY           = "Doubleday"}
@String{pub-DOUBLEDAY:adr       = "New York, NY, USA"}

@String{pub-DOVER               = "Dover Publications, Inc."}
@String{pub-DOVER:adr           = "New York, NY, USA"}

@String{pub-ELSEVIER            = "Elsevier"}
@String{pub-ELSEVIER:adr        = "Amsterdam, The Netherlands"}

@String{pub-ESP                 = "Elsevier Science Publishers"}
@String{pub-ESP:adr             = "Amsterdam, The Netherlands"}

@String{pub-FREEMAN             = "W.H. Freeman"}
@String{pub-FREEMAN:adr         = "San Francisco, CA, USA and New York, NY,
                                  USA"}

@String{pub-GORDON-BREACH       = "Gordon and Breach"}
@String{pub-GORDON-BREACH:adr   = "Langhorne, PA, USA"}

@String{pub-HARPER-ROW          = "Harper \& Row"}
@String{pub-HARPER-ROW:adr      = "New York, NY, USA"}

@String{pub-HARTUNG-GORRE       = "Hartung-Gorre Verlag"}
@String{pub-HARTUNG-GORRE:adr   = "Konstanz, Switzerland"}

@String{pub-HAYDEN-BOOK         = "Hayden Book Co."}
@String{pub-HAYDEN-BOOK:adr     = "Rochelle Park, NJ, USA"}

@String{pub-HOLDEN-DAY          = "Holden-Day"}
@String{pub-HOLDEN-DAY:adr      = "San Francisco, CA, USA"}

@String{pub-HOUGHTON-MIFFLIN    = "Houghton-Mifflin"}
@String{pub-HOUGHTON-MIFFLIN:adr = "Boston, MA, USA"}

@String{pub-IBM                 = "IBM Corporation"}
@String{pub-IBM:adr             = "San Jose, CA, USA"}

@String{pub-IEE                 = "IEE"}
@String{pub-IEE:adr             = "London, UK"}

@String{pub-IEEE                = "IEEE Computer Society Press"}
@String{pub-IEEE:adr            = "1109 Spring Street, Suite 300, Silver
                                  Spring, MD 20910, USA"}

@String{pub-IMA                 = "Institute of Mathematics and its
                                  Applications"}
@String{pub-IMA:adr             = "Southend-on-Sea, UK"}

@String{pub-IOS                 = "IOS Press"}
@String{pub-IOS:adr             = "Postal Drawer 10558, Burke, VA 2209-0558,
                                  USA"}

@String{pub-ISO                 = "International Organization for
                                  Standardization"}
@String{pub-ISO:adr             = "Geneva, Switzerland"}

@String{pub-JOHNS-HOPKINS       = "The Johns Hopkins University Press"}
@String{pub-JOHNS-HOPKINS:adr   = "Baltimore, MD, USA"}

@String{pub-JW                  = "John Wiley"}
@String{pub-JW:adr              = "New York, NY, USA"}

@String{pub-KAP                 = "Kluwer Academic Publisher"}
@String{pub-KAP:adr             = "Norwell, MA, USA, and Dordrecht, The
                                  Netherlands"}

@String{pub-KLUWER              = "Kluwer Academic Publishers"}
@String{pub-KLUWER:adr          = "Dordrecht, The Netherlands"}

@String{pub-KNOPF               = "Alfred A. Knopf"}
@String{pub-KNOPF:adr           = "New York, NY, USA"}

@String{pub-MACMILLAN           = "MacMillan Publishing Company"}
@String{pub-MACMILLAN:adr       = "New York, NY, USA"}

@String{pub-MANNING             = "Manning Publications"}
@String{pub-MANNING:adr         = "Greenwich, CT, USA"}

@String{pub-MASSON              = "Masson Editeur"}
@String{pub-MASSON:adr          = "Masson, France"}

@String{pub-MATH-ASSOC-AMER     = "Mathematical Association of America"}
@String{pub-MATH-ASSOC-AMER:adr = "Washington, DC, USA"}

@String{pub-MCGRAW-HILL         = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr     = "New York, NY, USA"}

@String{pub-MILLER-FREEMAN      = "Miller Freeman Publications"}
@String{pub-MILLER-FREEMAN:adr  = "San Francisco, CA, USA"}

@String{pub-MINDQ               = "MindQ Publishing, Inc."}
@String{pub-MINDQ:adr           = "450 Springpark Place Ste. 1200, Herndon, VA
                                  20170, USA, Tel: +1 703 708-9380"}

@String{pub-MIT                 = "MIT Press"}
@String{pub-MIT:adr             = "Cambridge, MA, USA"}

@String{pub-NAP                 = "National Academy Press"}
@String{pub-NAP:adr             = "Washington, DC, USA"}

@String{pub-NAT-COMP-CENTRE     = "National Computing Centre"}
@String{pub-NAT-COMP-CENTRE:adr = "Manchester, UK"}

@String{pub-NBS                 = "U.S. National Bureau of Standards"}
@String{pub-NBS:adr             = "Gaithersburg, MD, USA"}

@String{pub-NIST                = "National Institute for Standards and
                                  Technology"}
@String{pub-NIST:adr            = "Gaithersburg, MD 20899-8900, USA"}

@String{pub-NORTH-HOLLAND       = "North-Hol{\-}land"}
@String{pub-NORTH-HOLLAND:adr   = "Amsterdam, The Netherlands"}

@String{pub-NORTON              = "W. W. Norton \& Co."}
@String{pub-NORTON:adr          = "New York, NY, USA"}

@String{pub-NTIS                = "National Technical Information Service"}
@String{pub-NTIS:adr            = "Washington, DC, USA"}

@String{pub-ORA                 = "O'Reilly \& {Associates, Inc.}"}
@String{pub-ORA:adr             = "103a Morris Street, Sebastopol, CA 95472,
                                  USA, Tel: +1 707 829 0515, and 90 Sherman
                                  Street, Cambridge, MA 02140, USA, Tel: +1
                                  617 354 5800"}

@String{pub-OXFORD              = "Oxford University Press"}
@String{pub-OXFORD:adr          = "Walton Street, Oxford OX2 6DP, UK"}

@String{pub-PEACHPIT            = "Peachpit Press, Inc."}
@String{pub-PEACHPIT:adr        = "1085 Keith Avenue, Berkeley, CA 94708, USA"}

@String{pub-PH                  = "Pren{\-}tice-Hall, Inc."}
@String{pub-PH:adr              = "Upper Saddle River, NJ 07458, USA"}

@String{pub-PHPTR               = "Pren{\-}tice-Hall PTR"}
@String{pub-PHPTR:adr           = "Upper Saddle River, NJ 07458, USA"}

@String{pub-PLENUM              = "Plenum Press"}
@String{pub-PLENUM:adr          = "New York, NY, USA; London, UK"}

@String{pub-PRINCETON          = "Princeton University Press"}
@String{pub-PRINCETON:adr      = "Princeton, NJ, USA"}

@String{pub-PROJECT-GUTENBERG   = "Project Gutenberg"}
@String{pub-PROJECT-GUTENBERG:adr = "P.O. Box 2782, Champaign, IL 61825-2782,
                                  USA"}

@String{pub-RANDOM              = "Random House"}
@String{pub-RANDOM:adr          = "New York, NY, USA"}

@String{pub-REIDEL              = "D. Reidel"}
@String{pub-REIDEL:adr          = "Dordrecht, Boston, Lancaster, Tokyo"}

@String{pub-RSA                 = "RSA Data Security, Inc."}
@String{pub-RSA:adr             = "Redwood City, CA, USA"}

@String{pub-SAMS                = "Howard W. Sams"}
@String{pub-SAMS:adr            = "Indianapolis, IN 46268, USA"}

@String{pub-SIAM                = "Society for Industrial and Applied
                                  Mathematics"}
@String{pub-SIAM:adr            = "Philadelphia, PA, USA"}

@String{pub-SIMON-SCHUSTER      = "Simon and Schuster"}
@String{pub-SIMON-SCHUSTER:adr  = "1230 Ave. of the Americas, New York, NY
                                  10020, USA"}

@String{pub-SPE                 = "Society of Petroleum Engineers"}
@String{pub-SPE:adr             = "Richardson, TX, USA"}

@String{pub-SPIE                = "Society of Photo-optical
                                  Instrumentation Engineers (SPIE)"}
@String{pub-SPIE:adr            = "Bellingham, WA, USA"}

@String{pub-SRI                 = "SRI International"}
@String{pub-SRI:adr             = "333 Ravenswood Avenue, Menlo Park, CA
                                  94025-3493, USA, Tel: +1 415 859 6387, FAX:
                                  +1 415 859-6028"}

@String{pub-STATSCI             = "StatSci, a Division of MathSoft, Inc."}
@String{pub-STATSCI:adr         = "Seattle, WA, USA"}

@String{pub-SUN                 = "Sun Microsystems"}
@String{pub-SUN:adr             = "2550 Garcia Avenue, Mountain View, CA
                                  94043, USA"}

@String{pub-SV                  = "Spring{\-}er-Ver{\-}lag"}
@String{pub-SV:adr              = "Berlin, Germany~/ Heidelberg, Germany~/
                                  London, UK~/ etc."}

@String{pub-USC-ISI             = "University of Southern California,
                                  Information Sciences Institute"}
@String{pub-USC-ISI:adr         = "Marina del Rey, CA, USA"}

@String{pub-USENIX              = "USENIX Association"}
@String{pub-USENIX:adr          = "Berkeley, CA, USA"}

@String{pub-USGPO               = "United States Government Printing Office"}
@String{pub-USGPO:adr           = "Washington, DC, USA"}

@String{pub-UTILITAS-MATH       = "Utilitas Mathematica Publishers"}
@String{pub-UTILITAS-MATH:adr   = "Winnipeg, Manitoba, Canada"}

@String{pub-VENTANA             = "Ventana Press"}
@String{pub-VENTANA:adr         = "Chapel Hill, NC, USA"}

@String{pub-WESTVIEW            = "Westview Press"}
@String{pub-WESTVIEW:adr        = "Boulder, CO, USA"}

@String{pub-WILEY               = "John Wiley and Sons, Inc."}
@String{pub-WILEY:adr           = "New York, NY, USA"}

@String{pub-WORLD-SCI           = "World Scientific Publishing Co."}
@String{pub-WORLD-SCI:adr       = "Singapore; Philadelphia, PA, USA; River
                                  Edge, NJ, USA"}

%%% ====================================================================
%%% Series abbreviations:

@String{ser-LNAI                = "Lecture Notes in Artificial Intelligence"}

@String{ser-LNCS                = "Lecture Notes in Computer Science"}

@String{ser-LNMATH              = "Lecture Notes in Mathematics"}

@String{ser-PROJECT-GUTENBERG   = "Project Gutenberg"}

@String{ser-SIGPLAN             = "ACM SIG{\-}PLAN Notices"}

%%% ====================================================================
%%% Bibliography entries:

@Book{Trithemius:1606:CGT,
  author =       "Johannes Trithemius",
  title =        "Clauis generalis triplex in libros steganographicos
                 {Iohannis Trithemij} \ldots{}",
  publisher =    "Iohannis Berneri",
  address =      "Frankfurt, Germany",
  pages =        "7 + 1",
  year =         "1606",
  LCCN =         "Z103.T84 S 1606",
  bibdate =      "Wed Apr 14 06:33:41 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Ab ipso authore conscripta \ldots{} Darmbstadij:
                 Excudebat Balthasar Hofmann, impensis Iohannis Berneri,
                 bibliop. Francof., anno 1606.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1606:CSI,
  author =       "Johannes Trithemius",
  title =        "Clauis {Steganographiae Ioannis Trithemij}, abbatis
                 {Spanheimensis}, ad Serenissimum Principem Dn.
                 {Philippum} \ldots{}",
  publisher =    "Ioannem Bernerum",
  address =      "Frankfurt, Germany",
  pages =        "70",
  year =         "1606",
  LCCN =         "Z103.T84 S 1606",
  bibdate =      "Wed Apr 14 06:14:52 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Venundatur apud Ioannem Bernerum, bibliopolam
                 Francofurtensem, anno 1606.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1606:SHE,
  author =       "Johannes Trithemius",
  title =        "Steganographia: hoc est, ars per occultam scripturam
                 animi sui voluntatem absentibus aperiendi certa",
  publisher =    "Matthiae Beckeri",
  address =      "Frankfurt, Germany",
  pages =        "8 + 180",
  year =         "1606",
  LCCN =         "Z103.T84 S 1606",
  bibdate =      "Wed Apr 14 06:18:44 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Authore \ldots{} Ioanne Trithemio \ldots{}; praefixa
                 est huic operi sua clauis, seu vera introductio ab ipso
                 authore concinnata \ldots{} nunc vero in gratiam
                 secretioris philosophiae studiosorum publici iuris
                 facta. Francofurti. Ex officina typographica Matthiae
                 Beckeri, sumptibus Ioannis Berneri, anno 1606.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Schwenter:1620:SSN,
  author =       "Daniel Schwenter",
  title =        "{Steganologia \& steganographia nova: Geheime
                 magische, naturliche Red vnd Schreibkunst, einem in der
                 nahe vnd ferrne Alsbalden oder in gewiser Zeit, so woln
                 in Schimpff als Ernst, etwas verborgens vnnd geheimes
                 zu eroffnen durch Reden, Schreiben vnd mancherley
                 Instrumenta: item wie verborgene Schrifften zu machen,
                 auffzulosen, vnd mit sonderlichen Kunsten zu
                 schreiben}",
  publisher =    "Resene Gibronte Runeclus Hanedi",
  address =      "N{\"u}rnberg, Germany",
  pages =        "16 + 299 + 5",
  year =         "1620",
  LCCN =         "KK276 .E36 1575; Z103.5",
  bibdate =      "Wed Apr 14 06:21:05 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Publication year uncertain. Publicirt vnd an Tag
                 gegeben durch Resene Gibronte Runeclus Hanedi \ldots{}
                 Nurnberg: Inn Verlegung Simon Halbmayers.",
  acknowledgement = ack-nhfb,
  annote =       "Schwenter, Daniel, 1585--1636. The Trithemius ciphers
                 were finally solved in 1998 by J. Reeds
                 \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1621:CGT,
  author =       "Johannes Trithemius",
  title =        "Clauis generalis triplex in libros steganographicos
                 {Iohannis Trithemij} \ldots{}",
  publisher =    "Balthasar Hofmann",
  address =      "Darmstadt, Germany",
  pages =        "7 + 1",
  year =         "1621",
  LCCN =         "Z103 .T84 1621",
  bibdate =      "Wed Apr 14 06:07:51 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Ab ipso authore conscripta \ldots{} Darmbstadij.
                 Excudebat Balthasar Hofmann, impensis Iohannis Berneri,
                 bibliop. Francof., anno 1621.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1621:CSI,
  author =       "Johannes Trithemius",
  title =        "Clauis Steganographiae {Ioannis Trithemij}, abbatis
                 Spanheimensis, ad Serenissimum Principem Dn.
                 {Philippum} \ldots{}",
  publisher =    "Iohannem Bernerum",
  address =      "Frankfurt, Germany",
  pages =        "64",
  year =         "1621",
  LCCN =         "Z103 .T84 1621",
  bibdate =      "Wed Apr 14 06:09:58 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Venundatur apud Iohannem Bernerum, bibliopolam
                 Francofurtensem, anno 1621.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Trithemius:1621:SHE,
  author =       "Johannes Trithemius",
  title =        "Steganographia: hoc est, ars per occultam scripturam
                 animi sui voluntatem absentibus aperiendi certa",
  publisher =    "Balthasaris Aulaeandri",
  address =      "Darmstadt, Germany",
  pages =        "8 + 152 + 2",
  year =         "1621",
  LCCN =         "Z103 .T84 1621",
  bibdate =      "Wed Apr 14 06:04:51 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Authore \ldots{} Ioanne Trithemio \ldots{}; praefixa
                 est huic operi sua clauis, seu vera introductio ab ipso
                 authore concinnata \ldots{} nunc vero in gratiam
                 secretioris philosophiae studiosorum publici iuris
                 facta. Darmbstadij. Ex officina typographica
                 Balthasaris Aulaeandri, sumptibus vero Ioannis Berneri,
                 bibliop. Francof., anno 1621",
  acknowledgement = ack-nhfb,
  annote =       "Trithemius, Johannes, 1462--1516. The Trithemius
                 ciphers were finally solved in 1998 by J. Reeds
                 \cite{Reeds:1998:SCB}.",
}

@Book{Puteanus:1627:EPC,
  author =       "Erycius Puteanus",
  title =        "{ErycI} Puteani Cryptographia Tassiana, sive,
                 Clandestina scripti",
  publisher =    "Typis Cornelii Coenesteynii",
  address =      "Louvanii",
  pages =        "18 + 2",
  year =         "1627",
  LCCN =         "Z103.5 .P88 1627",
  bibdate =      "Mon Sep 13 07:01:38 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Schwenter:1633:SSA,
  author =       "Daniel Schwenter",
  title =        "{Steganologia \& [i.e. et] steganographia aucta:
                 geheime, magische, naturliche Red vnnd Schreibkunst}",
  publisher =    "Resene Gibronte Runeclusam Hunidem",
  address =      "N{\"u}rnberg, Germany",
  pages =        "24 + 370",
  year =         "1633",
  LCCN =         "Z103 .S38 1633",
  bibdate =      "Wed Apr 14 06:28:21 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Auffs neue revidirt, an etlichen Orten corrigirt,
                 \ldots{} augirt, vnd dann zum drittenmal in Truck
                 verfertiget durch Janum Herculem de Sunde, sonst Resene
                 Gibronte Runeclusam Hunidem \ldots{}. Nurnberg, In
                 Verlegung Jeremiae Dumlers [between 1633 and 1636].",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{duCarlet:1644:CCV,
  author =       "Maistre Iean Robert {du Carlet}",
  title =        "La cryptographie: contenant vne tres-subtile manier
                 d'escrire secr{\`e}tement",
  publisher =    "Imprimeur ordinaire du Roy et R. Aurelhe, Marchand
                 libraire",
  address =      "Paris, France",
  pages =        "234 + 2",
  year =         "1644",
  LCCN =         "Z103.5 .D82 1644b",
  bibdate =      "Mon Sep 13 06:54:53 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Mersenne:1644:CPM,
  author =       "Marin Mersenne",
  title =        "Cogitata Physica-Mathematica \ldots{} [Tractatus de
                 mensuris ponderibus atque nummis \ldots{} Hydraulica
                 pneumatica; arsque navigandi. Harmonia theorica,
                 practica. Et Mechanica phaenomena. Ballistica et
                 acontismologia]",
  publisher =    "Antonii Bertier",
  address =      "Paris, France",
  pages =        "[30], 40 [24], 41--370, [16], 96, [8], 138, [34] +
                 40",
  day =          "1",
  month =        apr,
  year =         "1644",
  bibdate =      "Sat Aug 23 10:04:54 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes. This is the book that introduced the
                 conjecture that numbers of the form $ M(n) = 2^n - 1 $
                 are prime for $ n = 2, 3, 5, 7, 13, 17, 19, 31, 67,
                 127, $ and $ 257 $, but could not test this claim.
                 Euler showed in 1750 that $ M(31) $ is prime. Lucas
                 showed in 1876 that $ M(127) $ is prime. Pervouchine
                 showed in 1883 that $ M(61) $ is prime, finally
                 disproving the Mersenne conjecture. Powers in the early
                 1900s showed that $ M(89) $ and $ M(107) $ are prime,
                 both missed by Mersenne. By 1947, it was known that the
                 correct list is $ 2, 3, 5, 7, 13, 17, 19, 31, 61, 89,
                 107 $, and $ 127 $, so Mersenne had five errors in his
                 list: $ 67 $ and $ 257 $ should have been removed, and
                 $ 61, 89 $, and $ 107 $ added. By late 2001, 39
                 Mersenne primes were known, the five largest having
                 been found by massive distributed computing efforts
                 through the Great Internet Mersenne Primes Search
                 (GIMPS) project. The largest of these is $ M(13466917)
                 $, a number containing $ 4, 053, 946 $ digits.",
  URL =          "http://www.mersenne.org/prime.htm;
                 http://www.mersenne.org/status.htm",
  acknowledgement = ack-nhfb,
  annote =       "Peracta est haec impressio die 1. April. 1644.",
  keywords =     "Marin Mersenne (1588--1648)",
  language =     "Latin",
  tableofcontents = "I: De mensuris, ponderibus, & nummis Hebraicis,
                 Graecis, & Romanis ad Gallica redactis. -- II: De
                 hydraulico-pneumaticis phaenomenis. -- III: De arte
                 nautica, sev histiodromia, & hydrostatica. -- IV: De
                 musica theorica & practica. -- V: De mechanicis
                 phaenomenis. -- VI: De ballisticis, sev
                 acontismologicis phaenomenis",
}

@Book{Morland:1666:NMC,
  author =       "Sir Samuel Morland",
  title =        "A New Method of Cryptography",
  publisher =    "????",
  address =      "????",
  pages =        "12",
  year =         "1666",
  bibdate =      "Tue Jul 05 14:50:30 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Microfilm in Folger Shakespeare Library, Washington,
                 DC, USA.",
  acknowledgement = ack-nhfb,
}

@Book{Heidel:1676:JTP,
  author =       "Wolfgango Ernesto Heidel",
  title =        "{Johannis Trithemii} primo Spanheimensis deinde {Divi
                 Jacobi Peapolitani} abbatis {Steganographia}: quae
                 hucusq[ue] a nemine intellecta sed passim ut
                 supposititia, perniciosa, magica \& necromantica
                 rejecta, elusa, damnata \& sententiam inquisitionis
                 passa, nunc tandem vindicata, reserata et illustrata
                 ubi post vindicias Trithemii clarissime explicantur
                 conjurationes spirituum ex {Arabicis}, {Hebraicis},
                 {Chaldaicis} \& {Graecis} spirituum nominibus juxta
                 quosdam conglobatae, aut secundum alios ex barbaris \&
                 nihil significantibus verbis concinnatae: deinde
                 solvuntur \& exhibentur artificia nova steganographica
                 a {Trithemio} in literis ad {Arnoldum Bostium} \&
                 {Polygraphia} promissa, in hunc diem a nemine capta,
                 sed pro paradoxis \& impossibilibus habita \& summe
                 desiderata",
  publisher =    "Wormatiense, Moguntiae. Sumptibus Joannis Petri
                 Zubrodt",
  address =      "",
  pages =        "8 + 394 (or 396) + 4",
  year =         "1676",
  LCCN =         "Z103 .T84 1676",
  bibdate =      "Wed Apr 14 06:11:27 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Includes Heidel's life of Trithemius and his
                 vindication of the Steganographia.",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
}

@Book{Morrice:1692:EB,
  author =       "Roger Morrice",
  title =        "Entring Book",
  publisher =    "????",
  address =      "????",
  pages =        "1500",
  year =         "1692",
  bibdate =      "Mon Sep 15 16:32:21 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  URL =          "http://www.hist.cam.ac.uk/seminars_events/events/roger-morrice.html;
                 http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2003/08/29/ndiary29.xml",
  acknowledgement = ack-nhfb,
  remark =       "From the Cambridge Web site: ``The Morrice Project
                 exists to publish Roger Morrice's Entring Book, the
                 most important unpublished record of British political
                 and religious history of the second half of the
                 seventeenth century. The fragile, three volume, 1500
                 page manuscript of Roger Morrice's Entring Book is in
                 Dr Williams's Library, 14 Gordon Square, London, the
                 pre-eminent research library of English Protestant
                 Nonconformity. The Entring Book is 900,000 words long
                 and covers the years 1677 to 1691.''\par

                 From the Telegraph story of 29-Aug-2003: ``A remarkable
                 million-word account of life in late 17th century
                 England which is as vivid as Samuel Pepys's diary has
                 been transcribed by experts after lying largely
                 forgotten for more than three centuries.\par

                 A specialist code-breaker was brought in to crack the
                 shorthand that Roger Morrice, a Puritan minister turned
                 political journalist, used in part of the diary to stop
                 the King's agents reading it. \ldots{} \par

                 Now the transcription has been completed and six
                 volumes of Morrice's well-informed account of a
                 turbulent period during which England was ruled by
                 three different monarchs will be published in 2005.\par
                 About 40,000 words of the diary were in code and the
                 team, led by the Cambridge academic Dr Mark Goldie,
                 brought in an expert in 17th century shorthand to
                 reveal for the first time what Morrice had written.''",
  xxnote =       "Exact publication year unknown; I set it to just after
                 the years covered.",
}

@Book{Conradi:1739:CDS,
  author =       "David Arnold Conradi",
  title =        "Cryptographia denudata; sive, Ars deciferandi, quae
                 occulte scripta sunt in quocunque linguarum genere,
                 praecipue in {Germanica, Batava, Latina, Anglica,
                 Gallica, Italica, Graeca}",
  publisher =    "Apud P. Bonk",
  address =      "Lugduni Batavorum",
  pages =        "73",
  year =         "1739",
  LCCN =         "Z103 .C66",
  bibdate =      "Mon Sep 13 07:04:09 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Colaco:1864:CRO,
  author =       "F. N. Colaco",
  title =        "A cryptographia revelada, ou, Arte de traduzir e
                 decifrar as escrituras obscuras, quaesquer que sejao os
                 caracteres empregados",
  publisher =    "De Santos e Cia",
  address =      "Pernambuco",
  pages =        "93",
  year =         "1864",
  LCCN =         "Z104 .C68 1846",
  bibdate =      "Mon Sep 13 06:59:12 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  xxnote =       "Check year: Library of Congress has conflicting data:
                 1846 and 1864??",
}

@Book{S:1873:COD,
  author =       "H. S.",
  title =        "Cryptographie, ou, Divers syst{\`e}mes d'{\'e}crire
                 secr{\`e}te sp{\'e}cialement pour l'usage des cartes
                 postales: combinations alphab{\'e}tiques,
                 correspondance chiffr{\'e}e, {\'e}criture par signes:
                 divers proc{\'e}d{\'e}s pour la fabrication d'encres
                 sympathiques",
  publisher =    "G. Jousset",
  address =      "Paris, France",
  pages =        "8",
  year =         "1873",
  LCCN =         "Z104 .H16 1873",
  bibdate =      "Mon Sep 13 06:51:31 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Jevons:1874:PS,
  author =       "W. Stanley Jevons",
  title =        "The Principles of Science",
  publisher =    "????",
  address =      "????",
  pages =        "??--??",
  year =         "1874",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 7]{Odlyzko:1995:FIF}.",
}

@Article{Kerckhoffs:1883:CMF,
  author =       "Auguste Kerckhoffs (von Nieuwenhof)",
  title =        "La Cryptographie Militaire. ({French}) [{Military}
                 cryptography]",
  journal =      "Journal des Sciences Militaires",
  volume =       "??",
  number =       "??",
  pages =        "12--??",
  month =        jan,
  year =         "1883",
  bibdate =      "Thu May 16 08:07:14 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/kerckhoffs/la_cryptographie_militaire_i.htm",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced online at the indicated URL. This is one of
                 the early papers that argues for publication of
                 cryptographic algorithms, as discussed by Bruce
                 Schneier in the CRYPTO-GRAM newsletter of 15-May-2002.
                 Also discussed in \cite{Cohen:1987:IIP} in Chapter 2.1:
                 ``A Short History of Cryptography'': Cohen writes:
                 ``Kerckhoffs \ldots{} set forth six basic requirements
                 of cryptography. We note that the easily remembered key
                 is very amenable to attack, and that these rules, as
                 all others, should be questioned before placing trust
                 in them: \begin{itemize} \item ciphertext should be
                 unbreakable in practice \item the cryptosystem should
                 be convenient for the correspondents \item the key
                 should be easily remembered and changeable \item the
                 ciphertext should be transmissible by telegraph \item
                 the cipher apparatus should be easily portable \item
                 the cipher machine should be relatively easily to use
                 \end{itemize} ''",
  language =     "French",
}

@Book{Josse:1885:CSA,
  author =       "H. (Henri) Joss{\'e}",
  title =        "La cryptographie et ses applications {\`a} l'art
                 militaire",
  publisher =    "Libraire militaire de L. Baudoin",
  address =      "Paris, France",
  pages =        "103",
  year =         "1885",
  LCCN =         "Z104 .J67 1885",
  bibdate =      "Thu May 16 08:13:44 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Valerio:1892:C,
  author =       "Paul Louis Eugene Valerio",
  title =        "De la Cryptographie",
  journal =      "Journal des Sciences militares, 9th series, Paris",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  month =        dec,
  year =         "1892",
  bibdate =      "Thu Oct 31 18:47:22 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Date cited as 9th series, Dec 1892--May 1895.",
}

@Book{Hulme:1898:CHP,
  author =       "F. Edward (Frederick Edward) Hulme",
  title =        "Cryptography; or, The history, principles, and
                 practice of cipher-writing",
  publisher =    "Ward, Lock and Co., Limited",
  address =      "????",
  pages =        "192",
  year =         "1898",
  LCCN =         "Z 104 H91",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "First edition. Galland, p. 94. Bound in yellow cloth;
                 stamped in black. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Walden:1900:ADB,
  author =       "John William Henry Walden",
  title =        "{August, Duke of Braunschweig-Luneburg}: The
                 cryptomenytics and cryptography of {Gustavus Selenus}:
                 in nine books: wherein is also contained a most clear
                 elucidation of the {Steganographia}, a book at one time
                 composed in magic and enigmatic form by {Johannes
                 Trithemius}",
  publisher =    "????",
  address =      "????",
  year =         "1900",
  LCCN =         "Z103 .A95 1900",
  bibdate =      "Wed Apr 14 06:24:45 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "August, Duke of Braunschweig-Luneburg 1579--1666. The
                 Trithemius ciphers were finally solved in 1998 by J.
                 Reeds \cite{Reeds:1998:SCB}.",
}

@Article{Guarini:1904:MTT,
  author =       "Emile Guarini",
  title =        "The {Malcotti} Telecryptograph for Telegraphing Upon
                 Telephone Lines",
  journal =      j-SCI-AMER,
  volume =       "91",
  number =       "12",
  pages =        "193--194",
  day =          "17",
  month =        sep,
  year =         "1904",
  CODEN =        "SCAMAC",
  DOI =          "http://dx.doi.org/10.1038/scientificamerican09171904-193a",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:20:28 MDT 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sciam1900.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v91/n12/pdf/scientificamerican09171904-193a.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "cryptography; decryption; encryption",
}

@Article{Claudy:1912:TMS,
  author =       "C. H. Claudy",
  title =        "A Triple Mirror for Secret Signaling",
  journal =      j-SCI-AMER,
  volume =       "107",
  number =       "17",
  pages =        "346--346",
  day =          "26",
  month =        oct,
  year =         "1912",
  CODEN =        "SCAMAC",
  DOI =          "http://dx.doi.org/10.1038/scientificamerican10261912-346",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:15:12 MDT 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v107/n17/pdf/scientificamerican10261912-346.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Edwards:1915:CCT,
  author =       "E. C. Edwards",
  title =        "Cipher Codes and their Uses",
  journal =      j-SCI-AMER,
  volume =       "113",
  number =       "1",
  pages =        "9--9",
  day =          "3",
  month =        jul,
  year =         "1915",
  CODEN =        "SCAMAC",
  DOI =          "http://dx.doi.org/10.1038/scientificamerican07031915-9",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:20:13 MDT 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v113/n1/pdf/scientificamerican07031915-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Honore:1919:STS,
  author =       "F. Honore",
  title =        "The Secret Telephone, Are Sound Waves ever Visible?",
  journal =      j-SCI-AMER,
  volume =       "121",
  number =       "23",
  pages =        "555--555",
  day =          "6",
  month =        dec,
  year =         "1919",
  CODEN =        "SCAMAC",
  DOI =          "http://dx.doi.org/10.1038/scientificamerican12061919-555",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:27:45 MDT 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sciam1910.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v121/n23/pdf/scientificamerican12061919-555.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Meador:1920:KCE,
  author =       "J. E. D. Meador",
  title =        "Keeping the Camera on an Even Keel, Telephoning in
                 Cipher",
  journal =      j-SCI-AMER,
  volume =       "123",
  number =       "5",
  pages =        "107--107",
  day =          "31",
  month =        jul,
  year =         "1920",
  CODEN =        "SCAMAC",
  DOI =          "http://dx.doi.org/10.1038/scientificamerican07311920-107a",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:11:40 MDT 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v123/n5/pdf/scientificamerican07311920-107a.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Arensberg:1921:CD,
  author =       "Walter Arensberg",
  title =        "The cryptography of {Dante}",
  publisher =    pub-KNOPF,
  address =      pub-KNOPF:adr,
  pages =        "x + 494",
  year =         "1921",
  LCCN =         "PQ4406.A7",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; dante alighieri, 1265-1321 ---
                 symbolism; dante alighieri, 1265-1321 divina commedia",
}

@Article{Anonymous:1922:PUS,
  author =       "Anonymous",
  title =        "Practical Uses for the Spectroscope, Secret Radio
                 Communication",
  journal =      j-SCI-AMER,
  volume =       "127",
  number =       "4",
  pages =        "259--259",
  month =        oct,
  year =         "1922",
  CODEN =        "SCAMAC",
  DOI =          "http://dx.doi.org/10.1038/scientificamerican1022-259",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:13:39 MDT 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v127/n4/pdf/scientificamerican1022-259.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Arensberg:1922:CSP,
  author =       "Walter Arensberg",
  title =        "The cryptography of {Shakespeare}. Part one",
  publisher =    "Howard Bowen",
  address =      "Los Angeles, CA, USA",
  pages =        "ix + 280",
  year =         "1922",
  LCCN =         "PR2944.A6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "No more published. Source: Bequest of George Fabyan,
                 1940. DLC",
  acknowledgement = ack-nhfb,
  keywords =     "Shakespeare, William, 1564-1616 --- authorship ---
                 Baconian theory",
}

@Book{Budge:1922:RS,
  author =       "Sir E. A. Wallis (Ernest Alfred Wallis) Budge",
  title =        "The {Rosetta} Stone",
  publisher =    "British Museum Press",
  address =      "London, UK",
  pages =        "8 + 1",
  year =         "1922",
  LCCN =         "PJ1531.R3 1913",
  bibdate =      "Tue Dec 01 10:37:35 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted with revisions in 1935, 1950, and 1968.",
  acknowledgement = ack-nhfb,
}

@Book{Langie:1922:C,
  author =       "Andr{\'e} Langie and James Cruickshank Henderson
                 Macbeth",
  title =        "Cryptography",
  publisher =    "Constable and Company Limited",
  address =      "London, UK",
  pages =        "vii + 1 + 192",
  year =         "1922",
  LCCN =         "Z 104 L26dE",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Bibliography: p.158.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{USASC:1923:EC,
  author =       "{United States. Army. Signal Corps} and {George Fabyan
                 Collection (Library of Congress)}",
  title =        "Elements of cryptanalysis",
  number =       "3",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "vii + 157",
  year =         "1923",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Training pamphlet",
  acknowledgement = ack-nhfb,
  annote =       "LC copy is item no. 717 of the George Fabyan
                 Collection.",
  keywords =     "Ciphers; Cryptography",
}

@Book{USWarDept:1924:EC,
  author =       "{United States. War Dept}",
  title =        "Elements of cryptanalysis",
  volume =       "3",
  publisher =    "Government Printing Office",
  address =      "Washington, DC, USA",
  pages =        "vii + 157",
  year =         "1924",
  LCCN =         "Z104 .U6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Its training pamphlet",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{USWD:1924:EC,
  author =       "{United States. War Dept}",
  title =        "Elements of cryptanalysis",
  number =       "3",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "vii + 157",
  year =         "1924",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Its Training pamphlet",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography.",
}

@Book{Givierge:1925:CC,
  author =       "Marcel Givierge",
  title =        "Cours de cryptographie",
  publisher =    "Berger-Levrault",
  address =      "Paris, France",
  pages =        "ix + 304",
  year =         "1925",
  LCCN =         "Z104 .G43",
  bibdate =      "Sat Sep 25 10:58:57 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cited in \cite{Shannon:1949:CTS}.",
}

@Article{Vernam:1926:CPT,
  author =       "G. S. Vernam",
  title =        "Cipher Printing Telegraph Systems for Secret Wire and
                 Radio Telegraphic Communications",
  journal =      "Journal American Institute of Electrical Engineers",
  volume =       "{XLV}",
  number =       "??",
  pages =        "109--115",
  year =         "1926",
  bibdate =      "Sat Sep 25 11:06:06 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cited in \cite{Shannon:1949:CTS}.",
}

@Article{Russell:1927:CMS,
  author =       "Henry Norris Russell",
  title =        "Cipher Messages of the Stars",
  journal =      j-SCI-AMER,
  volume =       "137",
  number =       "2",
  pages =        "118--119",
  month =        aug,
  year =         "1927",
  CODEN =        "SCAMAC",
  DOI =          "http://dx.doi.org/10.1038/scientificamerican0827-118",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 16:15:38 MDT 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sciam1920.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v137/n2/pdf/scientificamerican0827-118.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Tippett:1927:RSN,
  author =       "L. H. C. (Leonard Henry Caleb) Tippett",
  title =        "Random sampling numbers",
  volume =       "15",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "viii + xxvi",
  year =         "1927",
  bibdate =      "Sat Aug 23 08:23:19 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in 1952. Reprinted in 1959 with a foreword
                 by Karl Pearson.",
  series =       "Tracts for computers",
  acknowledgement = ack-nhfb,
  annote =       "This may be the first known publication of tables of
                 random numbers. I found an unsubstantiated claim that
                 they were determined by taking the middle digits from
                 area measurements of English churches. See also
                 \cite{Rand:1955:MRD}.",
}

@Article{Sarton:1928:BRBn,
  author =       "George Sarton",
  title =        "Book Review: {{\booktitle{The Cipher of Roger Bacon}}
                 by William Romaine Newbold; Roland Grubb Kent}",
  journal =      j-ISIS,
  volume =       "11",
  number =       "1",
  pages =        "141--145",
  month =        sep,
  year =         "1928",
  CODEN =        "ISISA4",
  ISSN =         "0021-1753 (print), 1545-6994 (electronic)",
  ISSN-L =       "0021-1753",
  bibdate =      "Tue Jul 30 21:57:51 MDT 2013",
  bibsource =    "http://www.jstor.org/action/showPublication?journalCode=isis;
                 http://www.jstor.org/stable/i302190;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/isis1920.bib",
  URL =          "http://www.jstor.org/stable/224770",
  acknowledgement = ack-nhfb,
  fjournal =     "Isis",
  journal-URL =  "http://www.jstor.org/page/journal/isis/about.html",
}

@Book{Budge:1929:RSB,
  author =       "Sir E. A. Wallis(Ernest Alfred Wallis) Budge",
  title =        "The {Rosetta} Stone in the {British Museum}: the
                 {Greek}, {Demotic} and {Hieroglyphic} texts of the
                 decree inscribed on the {Rosetta} Stone conferring
                 additional honours on {Ptolemy V. Epiphanes (203-181
                 B.C.) \ldots{}}",
  publisher =    "British Museum Press",
  address =      "London, UK",
  pages =        "viii + 323",
  year =         "1929",
  LCCN =         "PJ1531 .R3 1929",
  bibdate =      "Tue Dec 01 10:37:35 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted with revisions in 1929, 1935, 1950, and
                 1968.",
  acknowledgement = ack-nhfb,
}

@Article{Hill:1929:CAA,
  author =       "Lester S. Hill",
  title =        "Cryptography in an Algebraic Alphabet",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "36",
  number =       "6",
  pages =        "306--312",
  month =        jun # "\slash " # jul,
  year =         "1929",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:39:12 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/page/journal/amermathmont/about.html",
}

@Article{Hill:1931:CCL,
  author =       "Lester S. Hill",
  title =        "Concerning Certain Linear Transformation Apparatus of
                 Cryptography",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "38",
  number =       "3",
  pages =        "135--154",
  month =        mar,
  year =         "1931",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:10 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/page/journal/amermathmont/about.html",
}

@Book{Yardley:1931:ABC,
  author =       "Herbert O. Yardley",
  title =        "The {American Black Chamber}",
  publisher =    "Faber \& Faber Limited",
  address =      "London, UK",
  pages =        "x + 264 + 1",
  year =         "1931",
  LCCN =         "D639.S7 Y3 1931b",
  bibdate =      "Wed Nov 15 14:21:04 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "The history and work of the Cryptographic bureau,
                 officially known as section 8 of the Military
                 intelligence division (MI-8).",
  acknowledgement = ack-nhfb,
}

@Book{Givierge:1932:CC,
  author =       "Marcel Givierge",
  title =        "Cours de cryptographie",
  publisher =    "Berger-Levrault",
  address =      "Paris, France",
  edition =      "Deuxi{\`e}me",
  pages =        "ix + 304",
  year =         "1932",
  bibdate =      "Sat Sep 25 10:58:57 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Friedman:1935:ICA,
  author =       "William F. (William Frederick) Friedman",
  title =        "The index of coincidence and its applications in
                 cryptanalysis: technical paper",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "87 + 3",
  year =         "1935",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: War Department, Office of the Chief
                 Signal Officer, Washington. Register no. 200. The
                 present paper was prepared in 1923. It is a revision of
                 an earlier paper with the same title published in 1922
                 by the Riverbank Laboratories, Geneva, Ill.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography.",
}

@Book{Friedman:1935:MCP,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis. Part 1, monoalphabetic
                 substitution systems",
  number =       "30",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "149",
  year =         "1935",
  ISBN =         "0-89412-044-1",
  ISBN-13 =      "978-0-89412-044-2",
  LCCN =         "Z103.5.F77 1992",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Four volumes.",
  series =       "Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "On cover: With new added problems for the student. (p.
                 143--149) Reprint. Originally published: Washington,
                 DC: U.S. G.P.O., between 1935 and 1945.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Communications, Military; Cryptography",
}

@Book{Kullback:1935:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis: technical
                 paper",
  publisher =    "War Dept., Office of the Chief Signal Officer: U.S.
                 G.P.O.",
  address =      "Washington, DC, USA",
  pages =        "various",
  year =         "1935",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Gylden:1936:AMC,
  author =       "Yves Gylden",
  title =        "Analysis of model {C-36} cryptograph from the
                 viewpoint of cryptanalysis",
  publisher =    "A. B. Teknik co.",
  address =      "Stockholm, Sweden",
  pages =        "22",
  year =         "1936",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Xeroxed on rectos only; unbound. Translated from the
                 French into English. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Book{Nanovic:1936:SWI,
  author =       "John Leonard Nanovic",
  title =        "Secret writing: an introduction to cryptograms,
                 ciphers and codes",
  publisher =    "D. Kemp and Co",
  address =      "New York, NY, USA",
  pages =        "x + 117 + 1",
  year =         "1936",
  LCCN =         "Z104 .N3",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also reprint \cite{Nanovic:1974:SWI}.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Gylden:1938:APV,
  author =       "Yves Gylden",
  title =        "Analysis from the point of view of cryptanalysis of
                 ``cryptograph type {C-36},'' provided with six key
                 wheels, 27 slide bars, the latter having movable
                 projections, single or multiple",
  publisher =    "A. B. Teknik co.",
  address =      "Stockholm, Sweden",
  pages =        "10",
  year =         "1938",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Xeroxed on rectos only; unbound. Translated from the
                 French into English. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Book{Kullback:1938:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis",
  publisher =    "War Department, Office of the Chief Signal Officer",
  address =      "Washington, DC, USA",
  edition =      "Revised",
  pages =        "194",
  year =         "1938",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: War Department, Office of the Chief
                 Signal Officer, Washington. ``Confidential.''
                 ``Register no. 170.''",
  keywords =     "Ciphers; Cryptography",
  remark =       "From \cite{Anscombe:2003:QCC}: ``A bookseller
                 description [of this book]: `This classic text provides
                 various statistical tests: the Chi Test, which affords
                 a quantitative measure of the degree of similarity
                 between two distributions, and the Phi Test, which
                 provides a quantitative measurement of the degree of
                 non-randomness of a distribution. Text includes
                 numerous tabulations of frequency data in other
                 languages.'.''",
}

@TechReport{Anonymous:1939:ITM,
  author =       "Anonymous",
  title =        "Introductory talk to members of the {William and Mary
                 College} cryptanalysis class",
  institution =  "William and Mary College",
  address =      "Williamsburg, VA, USA",
  pages =        "7",
  year =         "1939",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from typescript.",
}

@Book{DAgapeyeff:1939:CC,
  author =       "Alexander D'Agapeyeff",
  title =        "Codes and ciphers",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "160",
  year =         "1939",
  LCCN =         "Z104 .D3 1939",
  bibdate =      "Sat Apr 20 12:19:43 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Friedman:1939:CAC,
  author =       "William F. (William Frederick) Friedman",
  title =        "The cryptanalyst accepts a challenge",
  publisher =    "War Department, Office of the Chief Signal Officer",
  address =      "Washington, DC, USA",
  pages =        "24--36",
  year =         "1939",
  LCCN =         "????",
  bibdate =      "Wed May 11 23:30:34 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  remark =       "An article analyzed from The Signal Corps bulletin,
                 no. 103, January--March, 1939.",
  subject =      "Cryptography; Ciphers; CHR 1939; PRO Mendelsohn,
                 Charles J. (Charles Jastrow) (donor); PRO Mendelsohn,
                 Esther Jastrow (donor)",
}

@Book{Friedman:1939:MC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis",
  publisher =    "New York Public Library",
  address =      "New York, NY, USA",
  year =         "1939",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "1 microfilm reel",
  acknowledgement = ack-nhfb,
  annote =       "Titles and statements of authorship from label on
                 container. First work originally published: Washington:
                 U.S. G.P.O., 1939- 1943. 4 v. Vols. 1-2, 3rd ed. Vol.
                 3, 2nd ed. Second work originally published:
                 Washington: U.S. G.P.O., 1942. v, 316 p.",
  author-dates = "1891--1969",
  keywords =     "Cryptography.",
}

@Book{Gaines:1939:ECS,
  author =       "Helen Fouche Gaines",
  title =        "Elementary cryptanalysis: a study of ciphers and their
                 solution",
  publisher =    "American Photographic Publishing Co.",
  address =      "Boston, MA, USA",
  pages =        "vi + 230 + 1",
  year =         "1939",
  LCCN =         "Z104 .G3",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "First edition. Galland, p. 72. Inscribed by Gelett
                 Burgess. Bound in gray cloth; stamped in red; top edges
                 stained red. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Mendelsohn:1939:CC,
  author =       "Charles Jastrow Mendelsohn",
  title =        "{Cardan} on cryptography",
  publisher =    "Yeshiva College",
  address =      "New York, NY, USA",
  pages =        "157--168",
  year =         "1939",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted from Scripta mathematica, Vol. 6, No. 3,
                 October, 1939. J. S. Galland, Bibliography of \ldots{}
                 cryptology, 1945, p. 124.",
  acknowledgement = ack-nhfb,
  keywords =     "Cardano, Girolamo, 1501--1576; cryptography",
}

@Book{Pratt:1939:SUS,
  author =       "Fletcher Pratt",
  title =        "Secret and urgent: the story of codes and ciphers",
  publisher =    "Robert Hale",
  address =      "London, UK",
  pages =        "282",
  year =         "1939",
  LCCN =         "Z104 .P92 1939",
  bibdate =      "Sat Apr 20 12:05:03 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Reprinted in 1939 by the Bobbs-Merrill Company, New
                 York, NY, USA, in 1942 by Blue Ribbon Books, Garden
                 City, NY, USA, and in 1996 by Aegean Park Press, Laguna
                 Hills, CA, USA.",
  tableofcontents = "1. Sermons in Stones \\
                 2. The Element of Doubt \\
                 3. Jargon \\
                 4. Invention and Death \\
                 5. Bacon or Shakespeare? \\
                 6. Satellites of the Royal Sun \\
                 7. Kings, Thieves and Diarists \\
                 8. Failure \\
                 9. The Revival \\
                 10. Code \\
                 11. The War of Cryptographers \\
                 12. The Cryptographers' War",
}

@Book{Gaines:1940:ECS,
  author =       "Helen Fouche Gaines",
  title =        "Elementary cryptanalysis; a study of ciphers and their
                 solution",
  publisher =    pub-CHAPMAN-HALL,
  address =      pub-CHAPMAN-HALL:adr,
  pages =        "vi + 230 + 23",
  year =         "1940",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Inscription by the author pasted in. Bound in gray
                 cloth; stamped in red; top edges stained red. Dust
                 jacket.",
  keywords =     "Ciphers; Cryptography",
}

@Book{USASC:1940:CML,
  author =       "{United States Army Signal Corps}",
  title =        "Cryptanalyst's manual",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "????",
  year =         "1940",
  LCCN =         "Z104 .U33c",
  bibdate =      "Wed May 11 23:30:34 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "Prepared under the direction of the Chief Signal
                 Officer.",
  subject =      "cryptography",
}

@Book{Yardley:1940:SSA,
  author =       "Herbert O. Yardley",
  title =        "Secret service in {America}: The {American Black
                 Chamber}",
  publisher =    "Faber \& Faber Limited",
  address =      "London, UK",
  pages =        "x + 264 + 1",
  year =         "1940",
  LCCN =         "D639.S7 Y3 1940",
  bibdate =      "Wed Nov 15 14:23:09 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "The history and work of the Cryptographic bureau,
                 officially known as section 8 of the Military
                 intelligence division (MI-8).",
  acknowledgement = ack-nhfb,
}

@Book{Friedman:1941:MCP,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis. Part {IV}, Transposition and
                 fractionating systems",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "189",
  year =         "1941",
  ISBN =         "0-89412-198-7 (paperback), 0-89412-199-5 (library
                 bound)",
  ISBN-13 =      "978-0-89412-198-2 (paperback), 978-0-89412-199-9
                 (library bound)",
  LCCN =         "Z103.5.F77 1992",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Cryptographic series; 61",
  acknowledgement = ack-nhfb,
  alttitle =     "Transposition and fractionating series",
  annote =       "Reprint of a U.S. military text, originally published
                 in 1941. Declassified December 1992.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Communications, Military; Cryptography",
}

@TechReport{Turing:1941:APC,
  author =       "Alan M. Turing",
  title =        "The Applications of Probability to Cryptography",
  type =         "Report",
  institution =  "GCHQ",
  address =      "Cheltenham, UK",
  year =         "1941",
  bibdate =      "Wed Apr 25 10:25:22 2012",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Unclassified and released 23 April 2012. Date
                 uncertain, but believed to be between April 1941 and
                 April 1942.",
  URL =          "http://www.gchq.gov.uk/Press/Pages/turing-papers-released.aspx;
                 http://www.theregister.co.uk/2012/04/23/turing_papers_released/",
  acknowledgement = ack-nhfb,
}

@TechReport{Turing:1941:SR,
  author =       "Alan M. Turing",
  title =        "On Statistics of Repetitions",
  type =         "Report",
  institution =  "GCHQ",
  address =      "Cheltenham, UK",
  year =         "1941",
  bibdate =      "Wed Apr 25 10:25:22 2012",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Unclassified and released 23 April 2012. Date
                 uncertain, but believed to be between April 1941 and
                 April 1942.",
  URL =          "http://www.gchq.gov.uk/Press/Pages/turing-papers-released.aspx;
                 http://www.theregister.co.uk/2012/04/23/turing_papers_released/",
  acknowledgement = ack-nhfb,
}

@Book{Volts:1941:BC,
  author =       "James D. Volts and David Shulman",
  title =        "Bibliography of cryptography",
  publisher =    "U. S. Army",
  address =      "Cincinnati, OH. USA",
  pages =        "93",
  year =         "1941",
  LCCN =         "Z103.A1 V6 1941",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Typewritten (carbon copy) Three heavy leaves precede
                 sections II-IV (not included in pagination). This copy
                 was made especially for the United States Army from the
                 original manuscript. Third copy: pencilled note on
                 cover. Contents: pt.1. Cryptography; pt.2. Titles
                 relating indirectly to cryptography; pt.3. Rejected
                 titles; pt.4. Author index.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers --- bibliography; cryptography ---
                 bibliography",
}

@Book{Volts:1941:BCP,
  author =       "James D. Volts",
  title =        "Bibliography of cryptography: Part {I}: Cryptography",
  publisher =    "U. S. Army",
  address =      "Cincinnati, OH, USA",
  pages =        "various",
  year =         "1941",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Chronologically arranged, covering period 1518--1940,
                 and indexed by authors.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Book{Friedman:1942:MC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Military cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  edition =      "Third",
  pages =        "various",
  year =         "1942",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  alttitle =     "Restricted",
  annote =       "Each pt. has separate t.p. and numbering sequence. pt.
                 1. Monoalphabetic substitution systems --- pt. 2.
                 Simple varities of polyalphabetic substitution systems
                 --- pt. 3. Simpler varieties of aperiodic substitution
                 systems --- pt. 4. Transportation and fractionating
                 systems.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Communications, Military; Cryptography",
}

@Book{USASC:1942:ACC,
  author =       "{United States. Army. Signal Corps}",
  title =        "Articles on cryptography and cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "v + 316",
  year =         "1942",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: War Department. Office of the Chief
                 Signal Officer, Washington. ``Reprinted from the Signal
                 Corps Bulletin.''",
  keywords =     "Cryptography.",
}

@Book{Gaines:1943:ECS,
  author =       "Helen Fouche Gaines",
  title =        "Elementary cryptanalysis: a study of ciphers and their
                 solution",
  publisher =    "American Photographic Publishing Co.",
  address =      "Boston, MA, USA",
  pages =        "vi + 230 + 1",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Fourth printing. Errata slip tipped in before Preface.
                 Bound in gray cloth; stamped in red; top edges stained
                 red. Library of the American Cryptogram Association
                 (George C. Lamb Collection).",
  keywords =     "Ciphers; Cryptography.",
}

@Book{Hitt:1943:MSM,
  author =       "Parker Hitt",
  title =        "Manual for the solution of military ciphers \ldots{}
                 For use in {Donald D. Millikin}'s cryptography and
                 cryptanalysis classes",
  publisher =    "New York University Bookstore",
  address =      "New York, NY, USA",
  pages =        "viii + 101 + 22",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reprint. Galland, p. 90. Bound in blue paper wrappers;
                 printed in black. Library of the American Cryptogram
                 Association (George C. Lamb Collection).",
  keywords =     "Ciphers; Cryptography.",
}

@Book{Millikin:1943:ECCa,
  author =       "Donald D. Millikin",
  title =        "Elementary cryptography and cryptanalysis",
  volume =       "56",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "vii + 132",
  year =         "1943",
  ISBN =         "0-89412-173-1 (soft cover), 0-89412-174-X (library
                 bound)",
  ISBN-13 =      "978-0-89412-173-9 (soft cover), 978-0-89412-174-6
                 (library bound)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "``\ldots{} reproduction of a classic text written and
                 used by Donald D. Millikin to introduce cryptography
                 and cryptanalysis to college students at New York
                 University in 1943.''",
  keywords =     "Ciphers; Cryptography",
}

@Book{Millikin:1943:ECCb,
  author =       "Donald D. Millikin",
  title =        "Elementary cryptography and cryptanalysis",
  publisher =    "New York University Bookstore",
  address =      "New York, NY, USA",
  edition =      "Second",
  pages =        "vii + 132 + 1 + 28",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy",
  keywords =     "Cryptography.",
}

@Book{Millikin:1943:ECCc,
  author =       "Donald D. Millikin",
  title =        "Elementary cryptography and cryptanalysis",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Third",
  pages =        "vii + 132",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy.",
  keywords =     "Cryptography.",
}

@Book{Smith:1943:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography, the science of secret writing",
  publisher =    pub-NORTON,
  address =      pub-NORTON:adr,
  pages =        "164",
  year =         "1943",
  LCCN =         "Z104 .S5",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Wolfe:1943:FCCa,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis",
  publisher =    "Brooklyn college press",
  address =      "Brooklyn, NY, USA",
  pages =        "??",
  year =         "1943",
  LCCN =         "Z104 .W6 1943 v. 1-3 (1943)",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reproduced from type-written copy. Lesson 11 (44 numb)
                 inserted after v. 2.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Wolfe:1943:FCCb,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis",
  publisher =    "University Press",
  address =      "Ann Arbor, MI, USA",
  pages =        "various",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy.",
  keywords =     "Cryptography.",
}

@Book{Wolfe:1943:FCCc,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis",
  publisher =    "Brooklyn College Press",
  address =      "Brooklyn, NY, USA",
  pages =        "various",
  year =         "1943",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  acknowledgement = ack-nhfb,
  annote =       "Mimeographed on rectos only. Bound in printed paper
                 wrappers. Library of the American Cryptogram
                 Association (George C. Lamb Collection)",
  keywords =     "Ciphers; Cryptography",
}

@Book{Gaines:1944:CSC,
  author =       "Helen Fouche Gaines",
  title =        "Cryptanalysis: a study of ciphers and their solution",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  year =         "1944",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Codigos (Ou Codificacao)",
}

@Book{Smith:1944:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography: the science of secret writing",
  publisher =    "G. Allen and Unwin",
  address =      "London, UK",
  pages =        "164",
  year =         "1944",
  LCCN =         "Z104.S5",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@TechReport{Alexander:1945:CHG,
  author =       "C. H. O'D. Alexander",
  title =        "Cryptologic History of the German Naval Enigma",
  type =         "{GC\&CS} Report",
  number =       "HW 25/7,",
  institution =  "British National Archives",
  address =      "????",
  year =         "1945",
  bibdate =      "Thu Mar 06 16:07:17 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Galland:1945:HABa,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  publisher =    inst-NORTHWESTERN-UNIVERSITY,
  address =      inst-NORTHWESTERN-UNIVERSITY:adr,
  pages =        "viii + 11 + 209",
  year =         "1945",
  LCCN =         "Z103.A1 G3",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``Works consulted and utilized'' in preface.",
  series =       "Northwestern University studies in the humanities no.
                 10",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Book{Galland:1945:HABb,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  number =       "10",
  publisher =    "AMS Press",
  address =      "New York, NY, USA",
  pages =        "viii + 209",
  year =         "1945",
  ISBN =         "0-404-50710-7",
  ISBN-13 =      "978-0-404-50710-7",
  LCCN =         "Z103.A1G3 1970",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Northwestern University humanities series; v. 10",
  acknowledgement = ack-nhfb,
  annote =       "Bound in blue cloth; stamped in gold. Library of the
                 American Cryptogram Association (George C. Lamb
                 Collection). Master microform held by: UnM. Microfilm.
                 Ann Arbor, Mich., University Microfilms International,
                 19--. 1 reel. 35 mm.",
  keywords =     "Cryptography --- Bibliography.",
}

@Book{Galland:1945:HABc,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  volume =       "71",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "209",
  year =         "1945",
  ISBN =         "0-89412-252-5",
  ISBN-13 =      "978-0-89412-252-1",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  alttitle =     "Bibliography of the literature of cryptology",
  keywords =     "Cryptography --- Bibliography.",
}

@TechReport{Good:1945:GRT,
  author =       "I. Jack Good and Donald Michie and Geoffrey Timms",
  title =        "General Report on {Tunny}",
  type =         "{GC\&CS} report",
  number =       "HW 25/4",
  institution =  "British National Archives",
  address =      "????",
  year =         "1945",
  bibdate =      "Thu Mar 06 16:13:00 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{Shannon:1945:MTC,
  author =       "Claude Shannon",
  title =        "A Mathematical Theory of Cryptography",
  type =         "Classified report",
  institution =  "Bell Laboratories",
  address =      "Murray Hill, NJ, USA",
  day =          "1",
  month =        sep,
  year =         "1945",
  bibdate =      "Mon Nov 04 18:32:51 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "In this paper, the binary-choice measure was called
                 `alternative'; the term `bit' did not appear in print
                 until \cite{Shannon:1948:MTCa}.",
}

@Article{Landers:1946:RPR,
  author =       "A. W. Landers",
  title =        "Recent Publications: Reviews: {{\em An Historical and
                 Analytical Bibliography of the Literature of
                 Cryptology}}, by {J. S. Galland}",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "53",
  number =       "6",
  pages =        "330--331",
  month =        jun # "\slash " # jul,
  year =         "1946",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:38:13 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/page/journal/amermathmont/about.html",
}

@Book{Bond:1947:FSC,
  author =       "Raymond T. (Raymond Tostevin) Bond",
  title =        "Famous stories of code and cipher",
  publisher =    "Rinehart and Company",
  address =      "New York; Toronto",
  pages =        "xxvi + 342",
  year =         "1947",
  LCCN =         "PS648.C6 B65",
  bibdate =      "Wed Nov 25 14:08:17 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in 1965 by Collier Books.",
  acknowledgement = ack-nhfb,
}

@Article{Shannon:1948:MTCa,
  author =       "Claude Shannon",
  title =        "A Mathematical Theory of Communication",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "27",
  number =       "3",
  pages =        "379--423",
  month =        jul,
  year =         "1948",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Mon Nov 04 18:36:13 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "From the first page: ``If the base $2$ is used the
                 resulting units may be called binary digits, or more
                 briefly, {\em bits}, a word suggested by J. W.
                 Tukey.''. This is the first known printed instance of
                 the word `bit' with the meaning of binary digit.",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Article{Shannon:1948:MTCb,
  author =       "Claude Shannon",
  title =        "A Mathematical Theory of Communication (continued)",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "27",
  number =       "4",
  pages =        "623--656",
  month =        oct,
  year =         "1948",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Mon Nov 04 18:36:13 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Book{Zim:1948:CSW,
  author =       "Herbert S. Zim",
  title =        "Codes and secret writing",
  publisher =    "William Morrow",
  address =      "New York, NY, USA",
  pages =        "vi + 154",
  year =         "1948",
  LCCN =         "Z104 .Z5",
  bibdate =      "Wed Nov 25 14:13:48 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Children's book.",
}

@Article{Shannon:1949:CTS,
  author =       "Claude Shannon",
  title =        "Communication Theory of Secrecy Systems",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "28",
  number =       "4",
  pages =        "656--715",
  month =        "????",
  year =         "1949",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Sat Sep 25 10:52:04 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "A footnote on the initial page says: ``The material in
                 this paper appeared in a confidential report, `A
                 Mathematical Theory of Cryptography', dated Sept.~1,
                 1946, which has now been declassified.''.",
  URL =          "http://en.wikipedia.org/wiki/Communication_Theory_of_Secrecy_Systems;
                 http://www.cs.ucla.edu/~jkong/research/security/shannon1949.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  remark =       "The Wikipedia entry credits this paper as the
                 foundation of modern cryptography. Diffie and Hellman
                 \cite[page 653]{Diffie:1976:NDC} remark: ``Shannon
                 [this paper] showed that the one time pad systems,
                 which had been in use since the late twenties [1920s]
                 offered `perfect security' (a form of unconditional
                 security).''",
}

@Book{Andree:1952:C,
  author =       "Richard Vernon Andree",
  title =        "Cryptanalysis",
  publisher =    "Yeshiva College",
  address =      "New York, NY, USA",
  pages =        "5--16",
  year =         "1952",
  MRclass =      "09.0X",
  MRnumber =     "14,124d",
  bibdate =      "Wed Nov 25 14:18:35 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted from Scripta mathematica, Vol. 28, No. 1.
                 March, 1952.",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Article{Porges:1952:MNC,
  author =       "Arthur Porges",
  title =        "Mathematical Notes: a Continued Fraction Cipher",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "59",
  number =       "4",
  pages =        "236--236",
  month =        apr,
  year =         "1952",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:41 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/page/journal/amermathmont/about.html",
}

@Book{deVries:1953:SMC,
  author =       "M. {de Vries}",
  title =        "Statistical methods in cryptanalysis",
  publisher =    "Math. Centrum Amsterdam",
  address =      "Amsterdam, The Netherlands",
  pages =        "15",
  year =         "1953",
  MRclass =      "62.0X",
  MRnumber =     "15,974d",
  MRreviewer =   "H. Campaigne",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Rapport ZW 1953-014",
}

@TechReport{Behrens:1954:EUP,
  author =       "Carl E. Behrens",
  title =        "Effects on {U-boat} performance of intelligence from
                 decryption of {Allied} communication",
  type =         "Technical report OEG study",
  number =       "553",
  institution =  "Distributed by NTIS",
  address =      "Springfield, VA, USA",
  pages =        "various",
  year =         "1954",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "``Prepared by Operations Evaluation Group, Office of
                 the Chief of Naval Operations\ldots{}Prepared for:
                 Office of the Chief of Operations (Navy) 28 April
                 1954.'' On cover: ``distributed by Defense Technical
                 Information Center''.",
  keywords =     "Military intelligence; Military surveillance;
                 Submarine boats --- World War, 1939-1945",
}

@MastersThesis{Hoffer:1955:MAC,
  author =       "Carol M. Hoffer",
  title =        "On the mathematical approach to cryptanalysis",
  type =         "Thesis",
  school =       "University of South Dakota",
  address =      "Vermillion, SD, USA",
  pages =        "65",
  year =         "1955",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Book{Rand:1955:MRD,
  author =       "{Rand Corporation}",
  title =        "A Million Random Digits With 100,000 Normal Deviates",
  publisher =    "Free Press",
  address =      "Glencoe, IL, USA",
  pages =        "xxv + 400 + 200",
  year =         "1955",
  ISBN =         "0-02-925790-5",
  ISBN-13 =      "978-0-02-925790-6",
  LCCN =         "QA276.5 .R3",
  bibdate =      "Sat Aug 23 07:58:03 2003",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in 1966 and 2001 \cite{Rand:2001:MRD}. See
                 also \cite{Tippett:1927:RSN}.",
  acknowledgement = ack-nhfb,
}

@Book{Sawirudin:1955:PND,
  author =       "Sawirudin",
  title =        "Pegawai negeri dan {PGP} baru",
  publisher =    "Badan Penerbitan Dewan Nasional SOBSI",
  address =      "Djakarta",
  edition =      "Cet. 1.",
  pages =        "93",
  year =         "1955",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Photocopy. [S.1.: s.n., 1958?].",
  keywords =     "Indonesia --- Officials and employees --- Salaries,
                 etc.",
}

@Book{Smith:1955:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography; the science of secret writing",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "164",
  year =         "1955",
  LCCN =         "Z104 .S6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``An unabridged republication of the first edition
                 with corrections.''",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Epstein:1956:FBC,
  author =       "Sam Epstein and Beryl Epstein",
  title =        "The first book of codes and ciphers",
  publisher =    "Franklin Watts",
  address =      "New York, NY, USA",
  year =         "1956",
  LCCN =         "Z104 .E68",
  bibdate =      "Wed Nov 25 14:12:11 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Pictures by Laszlo Roth",
  acknowledgement = ack-nhfb,
  annote =       "Children's book.",
}

@Book{Friedman:1956:CCC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Codes and ciphers (cryptology)",
  publisher =    "Encyclopaedia Britannica",
  address =      "Chicago, IL, USA",
  pages =        "8",
  year =         "1956",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Caption title. ``From Encyclopaedia Britannica,
                 copyright 1956.'' Text in double columns.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography; Cryptography --- Equipment and
                 supplies; Cryptography --- History",
}

@Book{Gaines:1956:CSC,
  author =       "Helen Fouch{\'e} Gaines",
  title =        "Cryptanalysis: a study of ciphers and their solution",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "237",
  year =         "1956",
  ISBN =         "0-486-20097-3",
  ISBN-13 =      "978-0-486-20097-2",
  LCCN =         "Z104 .G3 1956",
  MRclass =      "99.0X",
  MRnumber =     "19,519g",
  MRreviewer =   "H. Campaigne",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Formerly published under the title: Elementary
                 cryptanalysis.",
  acknowledgement = ack-nhfb,
  annote =       "Unabridged and corrected edition of \ldots{} [the
                 author's] Elementary cryptanalysis.",
  keywords =     "Ciphers; Cryptography",
}

@Book{Friedman:1957:SCE,
  author =       "William F. (William Frederick) Friedman and Elizabeth
                 S. Friedman",
  title =        "The {Shakespearean} Ciphers Examined: an analysis of
                 cryptographic systems used as evidence that some author
                 other than William Shakespeare wrote the plays commonly
                 attributed to him",
  publisher =    pub-CUP,
  address =      pub-CUP:adr,
  pages =        "4 + vii--xvi + 1 + 302 + 1",
  year =         "1957",
  LCCN =         "PR2937 .F7",
  bibdate =      "Wed Nov 25 14:04:49 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
}

@Book{Gleason:1957:ECP,
  author =       "Andrew M. Gleason",
  title =        "Elementary course in probability",
  publisher =    "National Security Agency, Office of Research and
                 Development, Mathematical Research Division",
  address =      "Washington, DC, USA",
  edition =      "Second",
  pages =        "various",
  year =         "1957",
  LCCN =         "Z104 .G53 1957",
  bibdate =      "Wed May 11 23:23:17 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Revised by Walter F. Penney and Ronald E. Wyllys.",
  acknowledgement = ack-nhfb,
  subject =      "cryptography; probabilities",
}

@InCollection{Gamow:1958:CAP,
  author =       "George Gamow and Martynas Y{\c{c}}as",
  booktitle =    "{Das Universum. Unser Bild vom Weltall}. ({German})
                 [{The Universe}. {Our} picture of the {Universe}]",
  title =        "The cryptographic approach to the problem of protein
                 synthesis",
  publisher =    "????",
  address =      "Wiesbaden, Germany",
  pages =        "????",
  year =         "1958",
  LCCN =         "",
  bibdate =      "Sat Jun 02 09:24:50 2012",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/g/gamow-george.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Levine:1958:VMS,
  author =       "Jack Levine",
  title =        "Variable Matrix Substitution in Algebraic
                 Cryptography",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "65",
  number =       "3",
  pages =        "170--179",
  month =        mar,
  year =         "1958",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:38:55 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/page/journal/amermathmont/about.html",
}

@Book{Bowers:1959:DSP,
  author =       "William Maxwell Bowers",
  title =        "Digraphic substitution: the {Playfair} cipher, the
                 four square cipher",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "46",
  year =         "1959",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 1",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers.",
}

@Book{Anonymous:1960:CNH,
  author =       "Anonymous",
  title =        "Cryptanalysis, a new horizon, by {Dr. Cryptogram}
                 [pseudonym]",
  publisher =    "American Cryptogram Association",
  address =      "New York, NY, USA (??)",
  pages =        "10 + 1 + 27",
  year =         "1960",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "An address to the Annual Convention of the American
                 Cryptogram Association, 1960. Printed by a spirit
                 process on rectos only. In plastic binder. Library of
                 the American Cryptogram Association (George C. Lamb
                 Collection).",
  keywords =     "Cryptography.",
}

@Book{Bowers:1960:BC,
  author =       "William Maxwell Bowers",
  title =        "The bifid cipher",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "48",
  year =         "1960",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 2",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers.",
}

@Book{Bowers:1960:PC,
  author =       "William Maxwell Bowers and William G. Bryan",
  title =        "Practical cryptanalysis",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "??",
  year =         "1960",
  LCCN =         "Z103 .B6",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Bound in printed paper wrappers. Contents: v. 1.
                 Digraphic substitution; the playfair cypher, the four
                 square cypher.-- v. 2. The Bifid cipher. --- v. 3. The
                 Trifid cipher.-- v. 4. Cryptographic ABC'S;
                 Substitution and transposition ciphers, by William G.
                 Bryan. --- v. 5. Cryptographic ABC's; periodic ciphers,
                 miscellaneous, by William G. Bryan.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Bowers:1960:TC,
  author =       "William Maxwell Bowers",
  title =        "The trifid cipher",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  pages =        "ix + 55",
  year =         "1960",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 3",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers.",
}

@Article{Mandelbrot:1960:BRJa,
  author =       "Beno{\^\i}t Mandelbrot",
  title =        "Book Review: {John Chadwick, \booktitle{The
                 Decipherment of Linear B} (1958) Cambridge University
                 Press}",
  journal =      j-INF-CONTROL,
  volume =       "3",
  number =       "1",
  pages =        "95--96",
  month =        mar,
  year =         "1960",
  CODEN =        "IFCNA4",
  DOI =          "http://dx.doi.org/10.1016/S0019-9958(60)90347-8",
  ISSN =         "0019-9958 (print), 1878-2981 (electronic)",
  ISSN-L =       "0019-9958",
  bibdate =      "Sat Sep 8 16:48:41 MDT 2012",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/m/mandelbrot-benoit.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0019995860903478",
  acknowledgement = ack-nhfb,
  fjournal =     "Information and Control",
}

@Article{Pelta:1960:SP,
  author =       "Harold N. Pelta",
  title =        "Selfcipher: Programming",
  journal =      j-CACM,
  volume =       "3",
  number =       "2",
  pages =        "83--83",
  month =        feb,
  year =         "1960",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Nov 25 18:19:25 MST 2005",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm3.html#Pelta60;
                 http://www.acm.org/pubs/contents/journals/cacm/;
                 http://www.math.utah.edu/pub/tex/bib/cacm1960.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  oldlabel =     "Pelta60",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Pelta60",
}

@Book{Barker:1961:CSC,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of the single columnar transposition
                 cipher",
  publisher =    "C. E. Tuttle Co.",
  address =      "Rutland, VT, USA",
  pages =        "x + 1 + 140",
  year =         "1961",
  LCCN =         "Z103 Z32",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "First edition. Bound in tan cloth; stamped in black;
                 red endpapers. Dust jacket. Library of The American
                 Cryptogram Association (George C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Article{Levine:1961:SAH,
  author =       "Jack Levine",
  title =        "Some Applications of High-Speed Computers to the Case
                 $ n = 2 $ of Algebraic Cryptography",
  journal =      j-MATH-COMPUT,
  volume =       "15",
  number =       "75",
  pages =        "254--260",
  month =        jul,
  year =         "1961",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/mathcomp1960.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Article{Levine:1961:SECa,
  author =       "Jack Levine",
  title =        "Some Elementary Cryptanalysis of Algebraic
                 Cryptography",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "68",
  number =       "5",
  pages =        "411--418",
  month =        may,
  year =         "1961",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  MRclass =      "94.10",
  MRnumber =     "23 \#B2111",
  bibdate =      "Mon Jun 28 12:36:19 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/page/journal/amermathmont/about.html",
}

@Book{Levine:1961:SECb,
  author =       "Jack Levine",
  title =        "Some elementary cryptanalysis of algebraic
                 cryptography",
  publisher =    "Mathematical Association of America",
  address =      "Buffalo, NY, USA",
  pages =        "411--418",
  year =         "1961",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint from American Mathematical Monthly, vol. 68,
                 no. 5, May 1961.",
  acknowledgement = ack-nhfb,
  annote =       "Bound in blue paper wrappers; printed in black.
                 Library of the American Cryptogram Association (George
                 C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Book{Shulman:1961:GC,
  author =       "David Shulman and Joseph Weintraub",
  title =        "A glossary of cryptography",
  publisher =    "Crypto Press",
  address =      "New York, NY, USA",
  pages =        "various",
  year =         "1961",
  LCCN =         "Z103 .S48",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Handbook of cryptography; section 1",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- terminology",
}

@Book{Friedman:1963:SLC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Six lectures on cryptology",
  publisher =    "????",
  address =      "????",
  pages =        "iii + 182",
  year =         "1963",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "SRH-004.",
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography",
}

@Book{Kahn:1963:PNU,
  author =       "David Kahn",
  title =        "Plaintext in the new unabridged: an examination of the
                 definitions on cryptology in {Webster's Third New
                 International Dictionary}",
  publisher =    "Crypto Press",
  address =      "New York, NY, USA",
  pages =        "35",
  year =         "1963",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography --- Terminology; language; Webster's
                 third new international dictionary of the English",
}

@Book{Thompson:1963:SDE,
  author =       "James Westfall Thompson and Saul Kussiel Padover",
  title =        "Secret diplomacy; espionage and cryptography,
                 1500-1815",
  publisher =    "F. Ungar Pub. Co",
  address =      "New York, NY, USA",
  pages =        "290",
  year =         "1963",
  LCCN =         "JX1648 .T5 1963",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``Appendix: Cryptography'': p. 253--263. Bibliography:
                 p. 265--282.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- history; diplomacy --- history;
                 Europe --- politics and government; secret service",
}

@Book{Laffin:1964:CCS,
  author =       "John Laffin",
  title =        "Codes and ciphers: secret writing through the ages",
  publisher =    "Abelard-Schuman",
  address =      "????",
  pages =        "164",
  year =         "1964",
  LCCN =         "",
  bibdate =      "Sat Apr 20 12:01:11 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Stout:1965:DRN,
  author =       "Rex Stout",
  title =        "The Doorbell Rang: a Nero Wolfe Novel",
  publisher =    "????",
  address =      "????",
  pages =        "??",
  year =         "1965",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 5]{Rivest:1998:CWC}.",
}

@Article{Kahn:1966:MC,
  author =       "David Kahn",
  title =        "Modern Cryptology",
  journal =      j-SCI-AMER,
  volume =       "215",
  number =       "1",
  pages =        "38--46",
  month =        jul,
  year =         "1966",
  CODEN =        "SCAMAC",
  DOI =          "http://dx.doi.org/10.1038/scientificamerican0766-38",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Sat May 18 15:58:23 MDT 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sciam1960.bib",
  URL =          "http://www.nature.com/scientificamerican/journal/v215/n1/pdf/scientificamerican0766-38.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Book{Sinkov:1966:ECM,
  author =       "Abraham Sinkov",
  title =        "Elementary cryptanalysis: a mathematical approach",
  volume =       "22",
  publisher =    pub-MATH-ASSOC-AMER,
  address =      pub-MATH-ASSOC-AMER:adr,
  pages =        "ix + 222",
  year =         "1966",
  ISBN =         "0-88385-622-0",
  ISBN-13 =      "978-0-88385-622-2",
  LCCN =         "Z 104 S47 1980",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "With a supplement by Paul L. Irwin. Reissued in 1975
                 and 1980.",
  series =       "New mathematical library",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Tuchman:1966:ZT,
  author =       "Barbara W. Tuchman",
  title =        "The {Zimmermann} telegram",
  publisher =    pub-MACMILLAN,
  address =      pub-MACMILLAN:adr,
  pages =        "xii + 244",
  year =         "1966",
  LCCN =         "D511 .T77 1966",
  bibdate =      "Wed Nov 25 13:57:39 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of original 1958 edition. Kahn
                 \cite{Kahn:1996:CSS} describes this book as
                 ``recount[ing] the political effects of the most
                 important cryptogram solution in history''.",
  acknowledgement = ack-nhfb,
}

@Book{Bowers:1967:PC,
  author =       "William Maxwell Bowers and William G. Bryan",
  title =        "Practical cryptanalysis",
  publisher =    "American Cryptogrm Association",
  address =      "Greenfield, MA, USA",
  pages =        "various",
  year =         "1967",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Bound in printed paper wrappers. From the library of
                 the American Cryptogram Association. (The George C.
                 Lamb Collection.) V. I. Digraphic substitution, by
                 Bowers.-- V. II. The Bifid cipher, by Bowers.-- V. III.
                 The Trifid cipher.-- V. IV and V. ``Cryptographic
                 ABC'S'' by William G. Bryan.",
  keywords =     "Cryptography.",
}

@Article{Brillhart:1967:SFR,
  author =       "John Brillhart and J. L. Selfridge",
  title =        "Some Factorizations of $ 2^n \pm 1 $ and Related
                 Results",
  journal =      j-MATH-COMPUT,
  volume =       "21",
  number =       "97",
  pages =        "87--96",
  month =        jan,
  year =         "1967",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
}

@Book{Bryan:1967:CA,
  author =       "William G. Bryan",
  title =        "Cryptographic {ABC}'s",
  publisher =    "American Cryptogram Association",
  address =      "Greenfield, MA, USA",
  year =         "1967",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Practical cryptanalysis; v. 4, 5",
  acknowledgement = ack-nhfb,
  annote =       "v. 1. Substitution and transposition ciphers.--v. 2.
                 Periodic ciphers. Miscellaneous.",
  keywords =     "Ciphers.",
}

@Book{Farago:1967:BSS,
  author =       "Ladislas Farago",
  title =        "The broken seal: the story of {Operation Magic} and
                 the {Pearl Harbor} disaster",
  publisher =    pub-RANDOM,
  address =      pub-RANDOM:adr,
  pages =        "439",
  year =         "1967",
  LCCN =         "D742.U5 F3",
  bibdate =      "Thu Apr 29 18:01:53 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also reprint \cite{Farago:1969:BSS}.",
  acknowledgement = ack-nhfb,
}

@Book{Golomb:1967:SRS,
  author =       "S. Golomb",
  title =        "Shift Register Sequences",
  publisher =    pub-HOLDEN-DAY,
  address =      pub-HOLDEN-DAY:adr,
  pages =        "xiv + 224",
  year =         "1967",
  LCCN =         "QA267.5.S4 G6",
  bibdate =      "Mon Nov 30 08:47:35 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Portions co-authored with Lloyd R. Welch, Richard M.
                 Goldstein, and Alfred W. Hales.",
  acknowledgement = ack-nhfb,
}

@Book{Kahn:1967:CSSa,
  author =       "David Kahn",
  title =        "The codebreakers: the story of secret writing",
  publisher =    pub-MACMILLAN,
  address =      pub-MACMILLAN:adr,
  pages =        "xvi + 1164",
  year =         "1967",
  LCCN =         "Z103 .K28",
  bibdate =      "Tue Dec 01 08:31:37 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/index-table-c.html#cryptography",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1000.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Book{Kahn:1967:CSSb,
  author =       "David Kahn",
  title =        "The codebreakers: the story of secret writing",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  pages =        "xvi + 1164",
  year =         "1967",
  LCCN =         "Z103 .K28 1967",
  bibdate =      "Tue Dec 01 08:35:10 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Kullback:1967:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis",
  number =       "14",
  publisher =    "National Archives",
  address =      "Washington, DC, USA",
  edition =      "Revised",
  pages =        "iii + 194",
  year =         "1967",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Technical literature series monograph",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
  remark =       "From \cite{Anscombe:2003:QCC}: ``A bookseller
                 description [of this book]: `This classic text provides
                 various statistical tests: the Chi Test, which affords
                 a quantitative measure of the degree of similarity
                 between two distributions, and the Phi Test, which
                 provides a quantitative measurement of the degree of
                 non-randomness of a distribution. Text includes
                 numerous tabulations of frequency data in other
                 languages.'.''",
}

@Book{Monge:1967:NMC,
  author =       "Alf Monge and O. G. Landsverk",
  title =        "Norse medieval cryptography in runic carvings",
  publisher =    "Norseman Press",
  address =      "Glendale, CA, USA",
  pages =        "224",
  year =         "1967",
  LCCN =         "E105 .M65",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Includes bibliographies.",
  acknowledgement = ack-nhfb,
  keywords =     "America --- discovery and exploration --- Norse;
                 cryptography; runes",
}

@Article{Ayoub:1968:EEK,
  author =       "F. Ayoub",
  title =        "Erratum: Encryption with keyed random permutations",
  journal =      j-ELECT-LETTERS,
  volume =       "17",
  number =       "??",
  pages =        "??--??",
  month =        feb,
  year =         "1968",
  CODEN =        "ELLEAK",
  DOI =          "http://dx.doi.org/10.1049/el:19810541",
  ISSN =         "0013-5194 (print), 1350-911X (electronic)",
  ISSN-L =       "0013-5194",
  bibdate =      "Fri Dec 30 16:39:43 MST 2011",
  bibsource =    "http://www.computer.org/tc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4246020",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220",
  fjournal =     "Electronics Letters",
}

@Article{Ayoub:1968:EKR,
  author =       "F. Ayoub",
  title =        "Encryption with keyed random permutations",
  journal =      j-ELECT-LETTERS,
  volume =       "17",
  number =       "??",
  pages =        "583--585",
  month =        feb,
  year =         "1968",
  CODEN =        "ELLEAK",
  DOI =          "http://dx.doi.org/10.1049/el:19810411",
  ISSN =         "0013-5194 (print), 1350-911X (electronic)",
  ISSN-L =       "0013-5194",
  bibdate =      "Fri Dec 30 16:39:40 MST 2011",
  bibsource =    "http://www.computer.org/tc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4245887",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2220",
  fjournal =     "Electronics Letters",
}

@Book{Sinkov:1968:ECMa,
  author =       "Abraham Sinkov",
  title =        "Elementary cryptanalysis: a mathematical approach",
  volume =       "22",
  publisher =    pub-RANDOM,
  address =      pub-RANDOM:adr,
  pages =        "ix + 189",
  year =         "1968",
  LCCN =         "QA11 .N5 v.22",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "New mathematical library",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Sinkov:1968:ECMb,
  author =       "Abraham Sinkov",
  title =        "Elementary cryptanalysis: a mathematical approach",
  volume =       "22",
  publisher =    pub-MATH-ASSOC-AMER,
  address =      pub-MATH-ASSOC-AMER:adr,
  pages =        "ix + 222",
  year =         "1968",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "New mathematical library",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Wilkes:1968:TSCa,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  volume =       "5",
  publisher =    "Macdonald and Co.",
  address =      "London, UK",
  pages =        "vii + 102",
  year =         "1968",
  ISBN =         "0-356-02426-1",
  ISBN-13 =      "978-0-356-02426-4",
  LCCN =         "QA76.5 .W523 1968b",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Macdonald computer monographs",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography.",
  subject =      "Time-sharing computer systems",
}

@Book{Wilkes:1968:TSCb,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  volume =       "5",
  publisher =    "American Elsevier Pub. Co.",
  address =      "New York, NY, USA",
  pages =        "102",
  year =         "1968",
  LCCN =         "QA76.5 .W523",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Computer monograph series",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography.",
  subject =      "Time-sharing computer systems",
}

@Book{Farago:1969:BSS,
  author =       "Ladislas Farago",
  title =        "The broken seal: the story of {Operation Magic} and
                 the {Pearl Harbor} disaster",
  publisher =    "Mayflower",
  address =      "London, UK",
  pages =        "415",
  year =         "1969",
  LCCN =         "D742.U5 F3",
  bibdate =      "Wed Nov 25 14:00:32 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of \cite{Farago:1967:BSS}.",
  acknowledgement = ack-nhfb,
}

@Book{Knuth:1969:SNM,
  author =       "Donald E. Knuth",
  title =        "Semi\-nu\-mer\-i\-cal Algorithms",
  volume =       "2",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xi + 624",
  year =         "1969",
  ISBN =         "0-201-03802-1",
  ISBN-13 =      "978-0-201-03802-6",
  LCCN =         "QA76.5 .K57",
  bibdate =      "Wed Dec 15 15:47:38 1993",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See pages 248--250.",
  price =        "US\$19.75",
  series =       "The Art of Computer Programming",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Handschuh:1998:SCC}.",
}

@Article{VanTassel:1969:ACT,
  author =       "Dennie {Van Tassel}",
  title =        "Advanced Cryptographic Techniques for Computers",
  journal =      j-CACM,
  volume =       "12",
  number =       "12",
  pages =        "664--665",
  month =        dec,
  year =         "1969",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Mar 24 21:38:51 MST 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.math.utah.edu/pub/tex/bib/cacm1960.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Cryptographic techniques which can be used to maintain
                 the confidentiality of information processed by
                 computers are dealt with. Special emphasis is paid to
                 the unique characteristics of computer files that make
                 many cryptographic methods of little use. Relative
                 security, costs, and preferred methods are included in
                 this paper.",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "San Jose State Coll., CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "ciphers secrecy systems; codes; computational
                 linguistics; confidential information processing;
                 cryptanalysis; cryptographic; security of data;
                 security systems",
}

@Book{Winterbotham:1969:SP,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "Secret and personal",
  publisher =    "Kimber",
  address =      "London, UK",
  pages =        "192",
  year =         "1969",
  ISBN =         "0-7183-0321-0",
  ISBN-13 =      "978-0-7183-0321-1",
  LCCN =         "D810.S7 W48; D810.S7 W73",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
  subject =      "World War, 1939--1945; Secret service; Great Britain",
}

@Book{Galland:1970:HAB,
  author =       "Joseph Stanislaus Galland",
  title =        "An historical and analytical bibliography of the
                 literature of cryptology",
  number =       "10",
  publisher =    "AMS Press",
  address =      "New York, NY, USA",
  pages =        "viii + 209",
  year =         "1970",
  ISBN =         "0-404-50710-7",
  ISBN-13 =      "978-0-404-50710-7",
  LCCN =         "Z103.A1 G3 1970",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Northwestern University studies in the humanities",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Article{Gingerich:1970:BRB,
  author =       "Owen Gingerich",
  title =        "Book Review: {{\booktitle{The Codebreakers. The Story
                 of Secret Writing}} by David Kahn}",
  journal =      j-ISIS,
  volume =       "61",
  number =       "3",
  pages =        "405--406",
  month =        "Autumn",
  year =         "1970",
  CODEN =        "ISISA4",
  ISSN =         "0021-1753 (print), 1545-6994 (electronic)",
  ISSN-L =       "0021-1753",
  bibdate =      "Tue Jul 30 21:28:42 MDT 2013",
  bibsource =    "http://www.jstor.org/action/showPublication?journalCode=isis;
                 http://www.jstor.org/stable/i302289;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/isis1970.bib",
  URL =          "http://www.jstor.org/stable/229701",
  acknowledgement = ack-nhfb,
  fjournal =     "Isis",
  journal-URL =  "http://www.jstor.org/page/journal/isis/about.html",
}

@Book{Marsh:1970:CSS,
  author =       "D. C. B. Marsh",
  title =        "Cryptology as a senior seminar topic",
  publisher =    "Mathematical Association of America",
  address =      "Buffalo, NY, USA",
  pages =        "761--764",
  year =         "1970",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint from American Mathematical Monthly, vol. 77,
                 no. 7, August-September, 1970.",
  acknowledgement = ack-nhfb,
  annote =       "Library of the American Cryptogram Association (George
                 C. Lamb Collection).",
  keywords =     "Cryptography.",
}

@Article{Marsh:1970:MEC,
  author =       "D. C. B. Marsh",
  title =        "Mathematical Education: Cryptology as a Senior Seminar
                 Topic",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "77",
  number =       "7",
  pages =        "761--764",
  month =        aug # "\slash " # sep,
  year =         "1970",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:02 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/page/journal/amermathmont/about.html",
}

@Book{Stark:1970:INT,
  author =       "Harold M. Stark",
  title =        "An introduction to number theory",
  publisher =    "Markham Publishing Company",
  address =      "Chicago, IL, USA",
  pages =        "x + 347",
  year =         "1970",
  ISBN =         "0-8410-1014-5",
  ISBN-13 =      "978-0-8410-1014-7",
  LCCN =         "QA241 .S72",
  bibdate =      "Fri Jun 24 14:24:21 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Markham mathematics series",
  acknowledgement = ack-nhfb,
  subject =      "Number theory",
}

@Manual{USDOS:1970:BC,
  author =       "{United States. Dept. of the Army}",
  title =        "Basic cryptanalysis",
  type =         "Field Manual",
  number =       "FM 34-40-2",
  organization = pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "various",
  day =          "13",
  month =        sep,
  year =         "1970",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  alttitle =     "TM 32-220 20 August 1970.",
  keywords =     "Cryptography --- Military aspects --- Handbooks,
                 manuals, etc; Security systems --- Military aspects ---
                 Handbooks, manuals, etc; United States. --- Army ---
                 Handbooks, manuals, etc",
}

@Book{Wolfe:1970:SWC,
  author =       "James Raymond Wolfe",
  title =        "Secret writing: the craft of the cryptographer",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "192",
  year =         "1970",
  LCCN =         "652.8 W",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Explains the distinction between ciphers and codes and
                 describes their past and present use in secret
                 communications.",
  acknowledgement = ack-nhfb,
  annote =       "High-school level book.",
  keywords =     "ciphers; cryptography",
}

@Article{Campaigne:1971:REC,
  author =       "H. H. Campaigne",
  title =        "Reviews: {{\em Elementary Cryptanalysis --- A
                 Mathematical Approach}}, by {Abraham Sinkov}",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "78",
  number =       "4",
  pages =        "423--423",
  month =        apr,
  year =         "1971",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:36:19 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/page/journal/amermathmont/about.html",
}

@Book{DAgapeyeff:1971:CC,
  author =       "Alexander D'Agapeyeff",
  title =        "Codes and ciphers",
  publisher =    "Gryphon Books",
  address =      "Ann Arbor, MI, USA",
  pages =        "160",
  year =         "1971",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "Z103 .D35 1971",
  bibdate =      "Sat Apr 20 13:40:57 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of \cite{DAgapeyeff:1939:CC}.",
  acknowledgement = ack-nhfb,
}

@Article{Hammer:1971:SSC,
  author =       "Carl Hammer",
  title =        "Signature Simulation and Certain Cryptographic Codes",
  journal =      j-CACM,
  volume =       "14",
  number =       "1",
  pages =        "3--14",
  month =        jan,
  year =         "1971",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Three cyphers allegedly authored by Thomas Jefferson
                 Beale in 1822 have been the subject of intensive study
                 for over 100 years. Generations of cryptanalysts have
                 expended untold man-years, thus far without success,
                 attempting tode code them; vast armies of fortune
                 hunters and treasure seekers have devoted Herculean
                 labors to digging up the rolling hills of Virginia
                 trying to locate the promised bonanza. \par

                 The history of pertinent activities would fill volumes,
                 yet serious students of cryptography have always had
                 nagging doubts about the cyphers' authenticity. It has
                 been alleged that the ``known solution'' to Cypher
                 Number Two: 115, 73, 24, 818, 37, 52, 49, \ldots{} (``I
                 have deposited in the County of Bedford about four
                 miles from Buford's in an excavation or vault
                 \ldots{}'') with the aid of an unsanitized version of
                 the Declaration of Independence was merely a superb,
                 imaginative, and grandiose hoax perpetrated ages ago
                 for whatever reasons. Modern computer technology could
                 obviously perform signature analyses the process of
                 encoding itself so as to yield new clues and deeper
                 insights into their construction. For the benefit of
                 the uninitiated, the encoding method used in the second
                 cypher employs a specified document whose words are
                 simply numbered consecutively, and first letters of
                 these words are sought out at random to match the
                 letters of these words are sought out at random to
                 match the letters of the clear text or message.
                 \par

                 The sequence of numbers corresponding to these matches
                 is then written down as the final code. While
                 primitive, the process has the advantage of relative
                 security until the source document becomes known; at
                 that moment the cypher can be decoded even by second
                 graders. The work now completed with the help of our
                 UNIVAC 1108 includes numerous analytical studies of the
                 Beale cyphers and various types of simulations.
                 \par

                 For example, we have turned the entire process of
                 simulated encoding by various schemes over to the
                 machine and analyzed the signatures of these synthetic
                 codes; we have also encoded various messages by hand,
                 using different texts and a variety of methods to
                 obtain their signatures. These simulations provide
                 convincing evidence that the signatures are both
                 process and data dependent; they indicate also very
                 strongly that Mr. Beale's cyphers are for real and that
                 it is merely a matter of time before someone finds the
                 correct source document and locates the right vault in
                 the common-wealth of Virginia.",
  acknowledgement = ack-nhfb,
  classcodes =   "B6120B (Codes); C6130 (Data handling techniques)",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "Beale Cyphers codes; codes; computer applications;
                 computer signature simulation; cryptanalysis; cyphers;
                 Declaration of Independence; decoding; encoding; Magna
                 Carta; numerical cryptographic codes; pseudotext;
                 results analysis; signature; simulation; Thomas
                 Jefferson Beale; treasure site identification",
  treatment =    "A Application",
}

@Book{Smith:1971:CSS,
  author =       "Laurence Dwight Smith",
  title =        "Cryptography, the science of secret writing",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "164",
  year =         "1971",
  ISBN =         "0-486-20247-X",
  ISBN-13 =      "978-0-486-20247-1",
  LCCN =         "Z 104 S65c 1971",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``This Dover edition, first published in 1955, is an
                 unabridged and corrected republication of the work
                 originally published by W. W. Norton and Company in
                 1943.'' ``Copyright renewed 1971.'' Bibliography: p.
                 156.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Wilkes:1972:TSC,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  volume =       "5",
  publisher =    "Macdonald and Co.",
  address =      "London, UK",
  edition =      "Second",
  pages =        "ix + 149",
  year =         "1972",
  ISBN =         "0-444-19583-1 (Elsevier)",
  ISBN-13 =      "978-0-444-19583-8 (Elsevier)",
  LCCN =         "QA76.5 .W523 1972",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Computer monographs",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography.",
  subject =      "Time-sharing computer systems",
}

@Book{Bertrand:1973:EOP,
  author =       "Gustave Bertrand",
  title =        "{Enigma}; ou, La plus grande {\'e}nigme de la guerre
                 1939--1945",
  publisher =    "Plon",
  address =      "Paris, France",
  pages =        "295 + 2 + 16",
  year =         "1973",
  LCCN =         "????",
  bibdate =      "Sun Dec 01 09:15:14 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  language =     "French",
}

@Article{Chesson:1973:CC,
  author =       "F. W. (Frederick William) Chesson",
  title =        "Computers and cryptology",
  journal =      j-DATAMATION,
  volume =       "??",
  number =       "??",
  pages =        "62--77",
  month =        jan,
  year =         "1973",
  CODEN =        "DTMNAT",
  ISSN =         "0011-6963",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Datamation",
}

@Article{Feistel:1973:CCP,
  author =       "Horst Feistel",
  title =        "Cryptography and Computer Privacy",
  journal =      j-SCI-AMER,
  volume =       "228",
  number =       "5",
  pages =        "15--23",
  month =        may,
  year =         "1973",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Database/Wiederhold.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sciam.bib",
  acknowledgement = ack-nhfb,
  annote =       "Survey of cryptography for data bases.",
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "code security; computer privacy; cryptography",
  referencedin = "Referenced in \cite[Ref. 14]{Biham:1998:TA}.",
}

@Book{Futrelle:1973:BTM,
  author =       "Jacques Futrelle",
  title =        "Best ``{Thinking Machine}'' detective stories",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "ix + 241",
  year =         "1973",
  ISBN =         "0-486-20537-1",
  ISBN-13 =      "978-0-486-20537-3",
  LCCN =         "PS3511.U98 B4",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  contents =     "The problem of cell 13.--The crystal gazer.--The
                 scarlet thread.--The flaming phantom.--The problem of
                 the stolen Rubens.--The missing necklace.--The phantom
                 motor.--The brown coat.--His perfect alibi.--The lost
                 radium.--Kidnapped Baby Blake, millionaire.--The fatal
                 cipher.",
  keywords =     "detective and mystery stories",
}

@Article{Geffe:1973:HPD,
  author =       "P. Geffe",
  title =        "How to protect data with ciphers that are really hard
                 to break",
  journal =      j-ELECTRONICS,
  volume =       "46",
  number =       "1",
  pages =        "99--101",
  year =         "1973",
  ISSN =         "0883-4989",
  bibdate =      "Mon Nov 30 08:58:36 1998",
  bibsource =    "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This cipher was later broken by
                 \cite{Siegenthaler:1985:DCS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Electronics",
}

@Book{Higenbottam:1973:CC,
  author =       "Frank Higenbottam",
  title =        "Codes and ciphers",
  publisher =    "English Universities Press",
  address =      "London, UK",
  pages =        "180 (est.)",
  year =         "1973",
  ISBN =         "0-340-12493-8",
  ISBN-13 =      "978-0-340-12493-2",
  LCCN =         "????",
  bibdate =      "Sat Apr 20 12:10:26 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Knuth:1973:ACP,
  author =       "Donald E. Knuth",
  title =        "The Art of Computer Programming, Vol. 2: Seminumerical
                 Algorithms",
  publisher =    "Addison-Wesley",
  address =      "Reading, MA",
  edition =      "Second",
  pages =        "??",
  year =         "1973",
  ISBN =         "0-201-03809-9, 0-201-03822-6",
  ISBN-13 =      "978-0-201-03809-5, 978-0-201-03822-4",
  LCCN =         "QA76.6 .K641 1973",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Citation has year as 1981, but that appears to be
                 incorrect.",
  referencedin = "Referenced in \cite[Ref. 14]{Kaliski:1995:SUR}.",
}

@Article{Lampson:1973:NCP,
  author =       "Butler W. Lampson",
  title =        "A Note on the Confinement Problem",
  journal =      j-CACM,
  volume =       "16",
  number =       "10",
  pages =        "613--615",
  month =        oct,
  year =         "1973",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1014.html",
  abstract =     "This note explores the problem of confining a program
                 during its execution so that it cannot transmit
                 information to any other program except its caller. A
                 set of examples attempts to stake out the boundaries of
                 the problem. Necessary conditions for a solution are
                 stated and informally justified.",
  acknowledgement = ack-nhfb,
  annote =       "Prevention of privacy leaks between programs.",
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "723",
  corpsource =   "Xerox Palo Alto Res. Center, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "computer systems programming; confinement; information
                 hiding; leakage of data; operating systems (computers);
                 privacy; proprietary program; protection; security;
                 security of data; steganography",
  treatment =    "P Practical",
}

@Book{Norman:1973:SWB,
  author =       "Bruce Norman",
  title =        "Secret warfare: the battle of codes and ciphers",
  publisher =    "David and Charles,",
  address =      "Newton Abbot, UK",
  pages =        "187",
  year =         "1973",
  ISBN =         "0-7153-6223-2",
  ISBN-13 =      "978-0-7153-6223-5",
  LCCN =         "Z103 .N67",
  bibdate =      "Sat Apr 20 12:02:52 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Borucki:1974:MNN,
  author =       "L. J. Borucki and J. B. Diaz",
  title =        "Mathematical Notes: a Note on Primes, with Arbitrary
                 Initial or Terminal Decimal Ciphers, in {Dirichlet}
                 Arithmetic Progressions",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "81",
  number =       "9",
  pages =        "1001--1002",
  month =        nov,
  year =         "1974",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:37:41 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/page/journal/amermathmont/about.html",
}

@Article{Evans:1974:UAS,
  author =       "Arthur {Evans, Jr.} and William Kantrowitz and Edwin
                 Weiss",
  title =        "A User Authentication Scheme Not Requiring Secrecy in
                 the Computer",
  journal =      j-CACM,
  volume =       "17",
  number =       "8",
  pages =        "437--442",
  month =        aug,
  year =         "1974",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 06:38:18 MST 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm17.html#EvansKW74;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "In many computer operating systems a user
                 authenticates himself by entering a secret password
                 known solely to himself and the system. The system
                 compares this password with one recorded in a Password
                 Table which is available to only the authentication
                 program. The integrity of the system depends on keeping
                 the table secret. In this paper a password scheme is
                 presented which does not require secrecy in the
                 computer. All aspects of the system, including all
                 relevant code and data bases, may be known by anyone
                 attempting to intrude. The scheme is based on using a
                 function H which the would-be intruder is unable to
                 invert. This function is applied to the user's password
                 and the result compared to a table entry, a match being
                 interpreted as authentication of the user. The intruder
                 may know all about H and have access to the table, but
                 he can penetrate the system only if he can invert H to
                 determine an input that produces a given output. This
                 paper discusses issues surrounding selection of a
                 suitable H.",
  acknowledgement = ack-nhfb,
  annote =       "Password protection by irreversible transformation",
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "722; 723",
  corpsource =   "MIT, Lexington, MA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "authentication; computer operating systems;
                 cryptology; engineering problems; human; invert; one
                 way encryption; operating system security; operating
                 systems (computers); password scheme; security;
                 security of data; user authentication scheme",
  oldlabel =     "EvansKW74",
  treatment =    "A Application; T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/EvansKW74",
}

@Article{Friedman:1974:ETR,
  author =       "Theodore D. Friedman and Lance J. Hoffman",
  title =        "Execution Time Requirements for Encipherment
                 Programs",
  journal =      j-CACM,
  volume =       "17",
  number =       "8",
  pages =        "445--449",
  month =        aug,
  year =         "1974",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See letter \cite{McCarthy:1975:AFP}.",
  abstract =     "The time taken to decipher 20,000 words of data by
                 four additive methods on a Control Data 6400 computer
                 was measured using assembly language and Fortran
                 routines. Standard deviations were computed for 100
                 runs by each method, and from this the range of error
                 at the 95 percent confidence level was calculated. The
                 time required for selecting and fetching the plaintext
                 data and for storing the ciphertext was separately
                 measured (the ``null transformation''), and was then
                 compared with the times required by each enciphering
                 method. The enciphering processes required at least
                 four times as much cpu time when programmed in
                 Fortran.",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "723",
  corpsource =   "Univ. California, Berkeley, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "additive ciphers; assembly language; cpu;
                 cryptography; cryptology; data processing; double key
                 encipherment; enciphering time coefficient;
                 encipherment programs; errors; execution time;
                 experiments; Fortran; null; one word key; operating
                 systems (computers); privacy transformations;
                 protection; pseudo random key; security; security of
                 data; time; transformation",
  treatment =    "A Application; T Theoretical or Mathematical; X
                 Experimental",
}

@Book{Kahn:1974:C,
  author =       "David Kahn",
  title =        "The codebreakers",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  edition =      "Abridged",
  pages =        "xvi + 576",
  year =         "1974",
  ISBN =         "0-297-76785-2",
  ISBN-13 =      "978-0-297-76785-5",
  LCCN =         "Z103 .K28 1974",
  bibdate =      "Thu Jul 23 17:02:35 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/master.bib",
  acknowledgement = ack-nhfb,
}

@Book{Nanovic:1974:SWI,
  author =       "Nanovic, John L. (John Leonard)",
  title =        "Secret writing: an introduction to cryptograms,
                 ciphers, and codes",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  pages =        "x + 117",
  year =         "1974",
  ISBN =         "0-486-23062-7",
  ISBN-13 =      "978-0-486-23062-7",
  LCCN =         "Z104.N35 1974",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of the 1936 edition \cite{Nanovic:1936:SWI}.",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptograms; cryptography",
}

@Article{Pollard:1974:TFP,
  author =       "J. Pollard",
  title =        "Theorems on factorization and primality testing",
  journal =      j-PROC-CAMBRIDGE-PHIL-SOC,
  volume =       "76",
  pages =        "521--528",
  year =         "1974",
  CODEN =        "PCPSA4",
  ISSN =         "0008-1981",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the Cambridge Philosophical Society.
                 Mathematical and physical sciences",
  referencedin = "Referenced in \cite[Ref. 18]{Kaliski:1995:SUR}.",
}

@Article{Purdy:1974:HSL,
  author =       "George B. Purdy",
  title =        "A High Security Log-in Procedure",
  journal =      j-CACM,
  volume =       "17",
  number =       "8",
  pages =        "442--445",
  month =        aug,
  year =         "1974",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "The protection of time sharing systems from
                 unauthorized users is often achieved by the use of
                 passwords. By using one-way ciphers to code the
                 passwords, the risks involved with storing the
                 passwords in the computer can be avoided. The selection
                 of a suitable one-way cipher is discussed. It is
                 suggested that for this purpose polynomials over a
                 prime modulus are superior to one-way ciphers derived
                 from Shannon codes.",
  acknowledgement = ack-nhfb,
  annote =       "Password protection by irreversible cryptographic
                 transformation",
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "722; 723",
  corpsource =   "Univ. Illinois, Urbana-Champaign, IL, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "code; computer operating systems; cryptography; data
                 processing --- Security of Data; one way ciphers;
                 operating systems; operating systems (computers);
                 passwords; security; security of data; time sharing
                 systems",
  treatment =    "A Application; T Theoretical or Mathematical",
}

@Manual{Richards:1974:SWP,
  author =       "Sheila R. Richards",
  title =        "Secret writing in the public records: {Henry
                 VIII--George II}",
  publisher =    "H.M.S.O.",
  address =      "London",
  pages =        "x + 173 + 4 plates",
  year =         "1974",
  ISBN =         "0-11-440054-7",
  ISBN-13 =      "978-0-11-440054-5",
  LCCN =         "DA310 .G681 1974",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Contains one hundred documents, all but one of which
                 are written wholly or partially in cipher and are now
                 deciphered and printed in full for the first time.
                 Includes letters in French or Italian, with a summary
                 in English.",
  price =        "UK\pounds4.50",
  acknowledgement = ack-nhfb,
  keywords =     "Great Britain --- history --- 18th Century ---
                 sources; Great Britain --- history --- stuarts,
                 1603--1714 --- sources; Great Britain --- history ---
                 Tudors, 1485--1603 --- sources",
}

@TechReport{Rivest:1974:AAR,
  author =       "Ronald L. Rivest",
  title =        "Analysis of Associative Retrieval Algorithms",
  type =         "Technical Report",
  number =       "TR.54",
  institution =  "Institut de la Recherche en Informatique et
                 Automatique, now Institut National de Recherche en
                 Informatique et Automatique (INRIA)",
  address =      "Domaine de Voluceau --- Rocquencourt --- B.P. 105,
                 78153 Le Chesnay Cedex, France",
  pages =        "??",
  month =        feb,
  year =         "1974",
  bibdate =      "Thu Jul 21 09:32:07 1994",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "Also published in/as: Stanford CSD report 74-415. Also
                 published in/as: SIAM Journal for Computing,
                 Springer-Verlag (Heidelberg, FRG and New York NY,
                 USA)-Verlag, 1976, with mod. title.",
  acknowledgement = ack-nhfb,
  annote =       "Combinatorial hashing for retrieval.",
}

@InProceedings{Rivest:1974:HCA,
  author =       "R. L. Rivest",
  title =        "On hash-coding algorithms for partial-match
                 retrieval",
  crossref =     "IEEE:1974:ASS",
  pages =        "95--103",
  year =         "1974",
  bibdate =      "Mon Jul 18 10:06:22 1994",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
}

@Misc{Thomas:1974:RPS,
  author =       "R. Thomas",
  title =        "{RFC 644}: On the problem of signature authentication
                 for network mail",
  day =          "22",
  month =        jul,
  year =         "1974",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Status: UNKNOWN. Not online.",
  URL =          "ftp://ftp.internic.net/rfc/rfc644.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc644.txt",
  acknowledgement = ack-nhfb,
  online =       "no",
  status =       "UNKNOWN",
}

@Book{Winterbotham:1974:US,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Ultra} secret",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  pages =        "xiii + 199",
  year =         "1974",
  ISBN =         "0-297-76832-8",
  ISBN-13 =      "978-0-297-76832-6",
  LCCN =         "D810.C88 W56",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  subject =      "Winterbotham, F. W; (Frederick William); World War,
                 1939--1945; Cryptography; Secret service; Great
                 Britain; Personal narratives, British; Enigma cipher
                 system",
  subject-dates = "1897--1990",
}

@Book{Winterbotham:1974:USF,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Ultra} secret: the first account of the most
                 astounding cryptanalysis coup of {World War II} --- how
                 the {British} broke the {German} code and read most of
                 the signals between {Hitler} and his generals
                 throughout the war",
  publisher =    pub-HARPER-ROW,
  address =      pub-HARPER-ROW:adr,
  pages =        "xiii + 199",
  year =         "1974",
  ISBN =         "0-06-014678-8",
  ISBN-13 =      "978-0-06-014678-8",
  LCCN =         "D810.C95 W73 1974",
  bibdate =      "Fri May 13 06:39:10 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
  subject =      "Winterbotham, F. W; (Frederick William); World War,
                 1939-1945; Cryptography; Secret service; Great Britain;
                 Personal narratives, English",
}

@Book{Barker:1975:CSS,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of the simple substitution cipher with
                 word divisions using non-pattern word lists",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "20 + 108",
  year =         "1975",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "Z103 .B3",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Bound in gray paper wrappers; printed in black and
                 gray. The George C. Lamb Collection.",
  keywords =     "ciphers; Ciphers; Cryptography; cryptography",
}

@InProceedings{Bayer:1975:EST,
  author =       "Rudolf Bayer and J. K. Metzger",
  title =        "On the Encipherment of Search Trees and Random Access
                 Files",
  crossref =     "Kerr:1975:PIC",
  pages =        "452--452",
  year =         "1975",
  bibdate =      "Fri Jan 12 07:50:25 MST 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.vldb.org/dblp/db/conf/vldb/vldb75.html",
  URL =          "http://www.vldb.org/dblp/db/conf/vldb/BayerM75.html",
  acknowledgement = ack-nhfb,
  authorurl =    "http://www.vldb.org/dblp/db/indices/a-tree/b/Bayer:Rudolf.html;
                 http://www.vldb.org/dblp/db/indices/a-tree/m/Metzger:J=_K=.html",
}

@MastersThesis{Blatman:1975:MMC,
  author =       "Peter Blatman",
  title =        "Method of modern cryptanalysis: research project",
  type =         "Thesis ({M.S. in Electrical Engineering})",
  school =       "Department of Electrical Engineering and Computer
                 Sciences, University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "various",
  month =        jun,
  year =         "1975",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "computer sciences --- dissertations; dissertations,
                 academic --- UCB --- Electrical Engineering ---
                 1971--1980; University of California, Berkeley. Dept.
                 of Electrical Engineering and Computer Sciences",
}

@Article{Brillhart:1975:NPC,
  author =       "John Brillhart and D. H. Lehmer and J. L. Selfridge",
  title =        "New primality criteria and factorizations of $ 2^m \pm
                 1 $",
  journal =      j-MATH-COMPUT,
  volume =       "29",
  number =       "130",
  pages =        "620--647",
  month =        apr,
  year =         "1975",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "B0210 (Algebra); C1110 (Algebra)",
  corpsource =   "Dept. Math., Univ. Arizona, Tucson, AZ, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "divisibility properties; factorizations; Fermat's
                 theorem; hyperbola; Lucas sequences; Mersenne numbers;
                 number theory; primality criteria; search bound",
  referencedin = "Referenced in \cite[Ref. 2]{Silverman:1997:FGR}.",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Coppersmith:1975:GCA,
  author =       "Don Coppersmith and Edna Grossman",
  title =        "Generators for Certain Alternating Groups with
                 Applications to Cryptography",
  journal =      j-SIAM-J-APPL-MATH,
  volume =       "29",
  number =       "4",
  pages =        "624--627",
  month =        dec,
  year =         "1975",
  CODEN =        "SMJMAP",
  ISSN =         "0036-1399 (print), 1095-712X (electronic)",
  ISSN-L =       "0036-1399",
  bibdate =      "Thu Oct 15 18:16:06 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/siamjapplmath.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classification = "B0210 (Algebra); C1110 (Algebra); C6130 (Data
                 handling techniques)",
  corpsource =   "Dept. of Math. Sci., IBM Thomas J. Watson Res. Center,
                 Yorktown Heights, NY, USA",
  fjournal =     "SIAM Journal on Applied Mathematics",
  journal-URL =  "http://epubs.siam.org/siap",
  keywords =     "alternating groups; block ciphers; computer
                 encipherment of data; cryptography; data handling;
                 group theory; permutations; security; security of data;
                 subgroups",
  treatment =    "A Application; T Theoretical or Mathematical",
}

@Misc{Ellis:1975:PKC,
  author =       "James Ellis and Clifford Cocks and Malcolm
                 Williamson",
  title =        "Public-key Cryptography",
  howpublished = "Classified reports (titles uncertain) at Government
                 Communications Headquarters (GCHQ), Cheltenham, UK.",
  year =         "1975",
  bibdate =      "Wed Apr 25 10:41:58 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Work declassified in 1997. Awarded the 100th IEEE
                 Milestone Award for the first discovery (albeit long
                 secret) of public-key cryptography.",
  URL =          "http://www.gchq.gov.uk/Press/Pages/100th-IEEE-milestone-award.aspx",
  acknowledgement = ack-nhfb,
}

@Book{Hardy:1975:ITN,
  author =       "Godfrey H. Hardy and Edward M. Wright",
  title =        "An Introduction to the Theory of Numbers",
  publisher =    pub-CLARENDON,
  address =      pub-CLARENDON:adr,
  edition =      "Fourth",
  pages =        "421",
  year =         "1975",
  ISBN =         "0-19-853310-7 (invalid checksum??)",
  ISBN-13 =      "978-0-19-853310-8",
  LCCN =         "????",
  bibdate =      "Fri Jun 24 12:32:14 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Jones:1975:ESP,
  author =       "Anita K. Jones and Richard J. Lipton",
  title =        "The enforcement of security policies for computation",
  journal =      j-OPER-SYS-REV,
  volume =       "9",
  number =       "5",
  pages =        "197--206",
  month =        nov,
  year =         "1975",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{McCarthy:1975:AFP,
  author =       "John McCarthy",
  title =        "{ACM Forum}: {Proposed} Criterion for a Cipher to be
                 Probable-Word-Proof",
  journal =      j-CACM,
  volume =       "18",
  number =       "2",
  pages =        "131--132",
  month =        feb,
  year =         "1975",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 26 10:24:13 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Friedman:1974:ETR}.",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@PhdThesis{Neat:1975:NCC,
  author =       "Charlie Edmund Neat",
  title =        "A new computer cryptography: the Expanded Character
                 Set {(ECS)} cipher",
  school =       "Engineering, University of California, Los Angeles",
  address =      "Los Angeles, CA, USA",
  pages =        "xxi + 203",
  year =         "1975",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; computers --- access control; dissertations,
                 academic --- ucla --- engineering; electronic data
                 processing --- security measures",
}

@TechReport{Pless:1975:ESC,
  author =       "Vera Pless",
  title =        "Encryption schemes for computer confidentially [sic]",
  type =         "MAC technical memorandum",
  number =       "63",
  institution =  "Massachusetts Institute of Technology, Project MAC",
  address =      "Cambridge, MA, USA",
  pages =        "19",
  year =         "1975",
  LCCN =         "QA76.9.A25 P55",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Research done under ARPA Order no.2095, ONR Contract
                 no. N00014-70-A-0362-0006 and IBM Contract 82280.",
  acknowledgement = ack-nhfb,
  annote =       "Research supported by the Advanced Research Projects
                 Agency under ARPA Order No. 2095 monitored by ONR
                 Contract No. N00014-70-A-0362-0006, and in part by IBM
                 Contract 82280. 18-19.",
  keywords =     "Computers; electronic data processing departments;
                 security measures",
}

@Article{Schroeder:1975:ESK,
  author =       "Michael D. Schroeder",
  title =        "Engineering a security kernel for {Multics}",
  journal =      j-OPER-SYS-REV,
  volume =       "9",
  number =       "5",
  pages =        "25--32",
  month =        nov,
  year =         "1975",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Wilkes:1975:TSC,
  author =       "M. V. (Maurice Vincent) Wilkes",
  title =        "Time-sharing computer systems",
  publisher =    "Macdonald and Jane's",
  address =      "London, UK",
  edition =      "Third",
  pages =        "ii + 166",
  year =         "1975",
  ISBN =         "0-444-19525-4 (American Elsevier)",
  ISBN-13 =      "978-0-444-19525-8 (American Elsevier)",
  LCCN =         "QA76.53 .W54 1975",
  bibdate =      "Sun Mar 11 09:46:15 MDT 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Computer monographs",
  acknowledgement = ack-nhfb,
  remark =       "According to \cite{Koblitz:1987:CNT}, this book
                 describes a one-way function invented by Roger Needham
                 for password encryption, a precursor to public-key
                 cryptography. Fragment on page 148 seems to be the
                 location.",
  subject =      "Time-sharing computer systems",
}

@Book{Winterbotham:1975:US,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Ultra} secret",
  publisher =    "Dell",
  address =      "New York, NY, USA",
  pages =        "286",
  year =         "1975",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "D810.C88 W56 1976",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
}

@MastersThesis{Worth:1975:CMA,
  author =       "Vivian I. Worth",
  title =        "Cryptology: mathematical applications",
  type =         "Thesis ({M.S.})",
  school =       "Central Missouri State University",
  address =      "Warrensburg, MO, USA",
  pages =        "iv + 63",
  year =         "1975",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Book{Anonymous:1976:CCA,
  author =       "Anonymous",
  title =        "Cryptography and cryptanalysis articles",
  volume =       "5",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "v + 144",
  year =         "1976",
  ISBN =         "0-89412-003-4",
  ISBN-13 =      "978-0-89412-003-9",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Article{Bayer:1976:EST,
  author =       "R. Bayer and J. K. Metzger",
  title =        "On the Encipherment of Search Trees and Random Access
                 Files",
  journal =      j-TODS,
  volume =       "1",
  number =       "1",
  pages =        "37--52",
  month =        mar,
  year =         "1976",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Sat Apr 14 10:34:48 MDT 2001",
  bibsource =    "Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Also published in \cite[p.~508--510]{Kerr:1975:PIC}.",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1976-1-1/p37-bayer/p37-bayer.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1976-1-1/p37-bayer/",
  abstract =     "The securing of information in indexed, random access
                 files by means of privacy transformations must be
                 considered as a problem distinct from that for
                 sequential files. Not only must processing overhead due
                 to encrypting be considered, but also threats to
                 encipherment arising from updating and the file
                 structure itself must be countered. A general
                 encipherment scheme is proposed for files maintained in
                 a paged structure in secondary storage. This is applied
                 to the encipherment of indexes organized as $B$-trees;
                 a $B$-tree is a particular type of multiway search
                 tree. Threats to the encipherment of $B$-trees,
                 especially relating to updating, are examined, and
                 countermeasures are proposed for each. In addition, the
                 effect of encipherment on file access and update, on
                 paging mechanisms, and on files related to the
                 enciphered index are discussed. Many of the concepts
                 presented may be readily transferred to other forms of
                 multiway index trees and to binary search trees.",
  acknowledgement = ack-nhfb,
  annote =       "Trees versus hashing as his 1974 IFIP paper?",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "",
  subject =      "Software --- Operating Systems --- Security and
                 Protection (D.4.6): {\bf Access controls}; Software ---
                 Operating Systems --- Security and Protection (D.4.6):
                 {\bf Cryptographic controls}",
}

@Book{Budge:1976:RSB,
  author =       "Sir E. A. Wallis (Ernest Alfred Wallis) Budge",
  title =        "The {Rosetta} stone in the {British Museum}: the
                 {Greek}, demotic, and hieroglyphic texts of the decree
                 inscribed on the {Rosetta} stone conferring additional
                 honours on {Ptolemy V Epiphanes (203-181 B.C.)} with
                 {English} translations and a short history of the
                 decipherment of the {Egyptian} hieroglyphs, and an
                 appendix containing translations of the stelae of {San
                 (Tanis)} and {Tall al-Maskhutah}",
  publisher =    "AMS Press",
  address =      "New York, NY, USA",
  pages =        "325 + 22",
  year =         "1976",
  ISBN =         "0-404-11362-1",
  ISBN-13 =      "978-0-404-11362-9",
  LCCN =         "PJ1531.R5 B8 1976",
  bibdate =      "Tue Dec 01 10:45:33 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Diffie:1976:NDC,
  author =       "Whitfield Diffie and Martin E. Hellman",
  title =        "New Directions in Cryptography",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-22",
  number =       "6",
  pages =        "644--654",
  month =        nov,
  year =         "1976",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1976.1055638",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  referencedin = "Referenced in \cite[Ref. 8]{Kaliski:1995:SUR},
                 \cite[Ref. 8]{Goldreich:1997:FMCb}, \cite[Ref.
                 1]{Wiener:1998:PCP}, \cite[Ref. 3]{Handschuh:1998:SCC},
                 \cite[Ref. 2]{Haber:1995:HDD}.",
  remark =       "This important paper, the first public description of
                 public-key cryptography (see also
                 \cite{Merkle:1978:SCI,Ellis:1975:PKC}), begins with the
                 prescient statement ``We stand today on the brink of a
                 revolution in cryptography.'' and ends with ``Thomas
                 Jefferson, a cryptographic amateur, invented a system
                 which was still in use in World War II [2, pp.
                 192--195], while the most noted cryptographic system of
                 the twentieth century, the rotor machine, was invented
                 simultaneously by four separate people, all amateurs
                 [2, pp. 415, 420, 422--424]. We hope this will inspire
                 others to work in this fascinating area in which
                 participation has been discouraged in the recent past
                 by a nearly total government monopoly.'' Their
                 reference [2] is \cite{Kahn:1967:CSSa}.",
}

@Book{Friedman:1976:AMC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Advanced military cryptography",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "113",
  year =         "1976",
  ISBN =         "0-89412-011-5",
  ISBN-13 =      "978-0-89412-011-4",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Continuation of Elementary military cryptography,
                 Aegean Park Press, 1976.",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "ciphers; cryptography",
}

@Book{Friedman:1976:CCA,
  author =       "William Frederick (William Frederick) Friedman",
  title =        "Cryptography and cryptanalysis articles",
  volume =       "5--6",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "??",
  year =         "1976",
  LCCN =         "Z103 .C79 1976",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "ciphers --- addresses, essays, lectures; cryptography
                 --- addresses, essays, lectures; Cryptography.",
}

@Book{Friedman:1976:EC,
  author =       "William F. (William Frederick) Friedman",
  title =        "Elements of cryptanalysis",
  volume =       "3",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "172",
  year =         "1976",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography",
}

@Book{Friedman:1976:EMC,
  author =       "William Frederick Friedman",
  title =        "Elementary military cryptography",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "86",
  year =         "1976",
  ISBN =         "0-89412-010-7",
  ISBN-13 =      "978-0-89412-010-7",
  LCCN =         "Z104 .F8740 1976",
  bibdate =      "Fri Feb 16 11:46:14 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "On cover: Formerly Special text no. 165 (1935)",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "ciphers; cryptography",
}

@Book{Friedman:1976:ZTJ,
  author =       "William F. (William Frederick) Friedman and Charles
                 Jastrow Mendelsohn",
  title =        "The {Zimmermann} telegram of {January 16, 1917}, and
                 its cryptographic background",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "33",
  year =         "1976",
  ISBN =         "0-89412-009-3",
  ISBN-13 =      "978-0-89412-009-1",
  LCCN =         "D511 .F683 1976",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "World War, 1914--1918 -- causes; Zimmermann, Arthur,
                 1864--1940",
}

@Article{Griffiths:1976:AMR,
  author =       "Patricia P. Griffiths and Bradford W. Wade",
  title =        "An Authorization Mechanism for a Relational Database
                 System",
  journal =      j-TODS,
  volume =       "1",
  number =       "3",
  pages =        "242--255",
  month =        sep,
  year =         "1976",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Sat Apr 14 10:34:48 MDT 2001",
  bibsource =    "Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
                 http://www.math.utah.edu/pub/tex/bib/tods.bib",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1976-1-3/p242-griffiths/p242-griffiths.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1976-1-3/p242-griffiths/",
  abstract =     "A multiuser database system must selectively permit
                 users to share data, while retaining the ability to
                 restrict data access. There must be a mechanism to
                 provide protection and security, permitting information
                 to be accessed only by properly authorized users.
                 Further, when tables or restricted views of tables are
                 created and destroyed dynamically, the granting,
                 authentication, and revocation of authorization to use
                 them must also be dynamic. Each of these issues and
                 their solutions in the context of the relational
                 database management system System R are discussed.
                 \par

                 When a database user creates a table, he is fully and
                 solely authorized to perform upon it actions such as
                 read, insert, update, and delete. He may explicitly
                 grant to any other user any or all of his privileges on
                 the table. In addition he may specify that that user is
                 authorized to further grant these privileges to still
                 other users. The result is a directed graph of granted
                 privileges originating from the table creator.\par

                 At some later time a user A may revoke some or all of
                 the privileges which he previously granted to another
                 user B. This action usually revokes the entire subgraph
                 of the grants originating from A's grant to B. It may
                 be, however, that B will still possess the revoked
                 privileges by means of a grant from another user C, and
                 therefore some or all of B's grants should not be
                 revoked. This problem is discussed in detail, and an
                 algorithm for detecting exactly which of B's grants
                 should be revoked is presented.",
  acknowledgement = ack-nhfb,
  annote =       "Defines a dynamic authorization mechanism. A database
                 user can grant or revoke privileges (such as to read,
                 insert, or delete) on a file that he has created.
                 Furthermore, he can authorize others to grant these
                 same privileges. The database management system keeps
                 track of a directed graph, emanating from the creator
                 of granted privileges.",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "access control; authorization; data dependent
                 authorization; database systems; privacy; protection in
                 databases; revocation of authorization; security",
  subject =      "Information Systems --- Database Management ---
                 Systems (H.2.4): {\bf Relational databases};
                 Information Systems --- Database Management --- Systems
                 (H.2.4); Information Systems --- Database Management
                 --- General (H.2.0): {\bf Security, integrity, and
                 protection**}",
}

@InProceedings{Guy:1976:HFN,
  author =       "R. K. Guy",
  title =        "How to factor a number",
  crossref =     "Hartnell:1976:PFM",
  pages =        "49--89",
  year =         "1976",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Odlyzko:1995:FIF}.",
}

@Article{Harrison:1976:POS,
  author =       "Michael A. Harrison and Walter L. Ruzzo and Jeffrey D.
                 Ullman",
  title =        "Protection in Operating Systems",
  journal =      j-CACM,
  volume =       "19",
  number =       "8",
  pages =        "461--471",
  month =        aug,
  year =         "1976",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68A99",
  MRnumber =     "54 14474",
  MRreviewer =   "George I. Davida",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "A model of protection mechanisms in computing systems
                 is presented and its appropriateness is argued. The
                 ``safety'' problem for protection systems under this
                 model is to determine in a given situation whether a
                 subject can acquire a particular right to an object. In
                 restricted cases, it can be shown that this problem is
                 decidable; i.e., there is an algorithm to determine
                 whether a system in a particular configuration is safe.
                 In general, and under surprisingly weak assumptions, it
                 cannot be decided if a situation is safe. Various
                 implications of this fact are discussed.",
  acknowledgement = ack-nhfb,
  classcodes =   "C4210 (Formal logic); C4220 (Automata theory); C6150J
                 (Operating systems)",
  classification = "721; 723",
  corpsource =   "Univ. of California, Berkeley, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "(computers); automata theory --- Turing Machines;
                 computability and decidability; computer operating
                 systems --- Design; computer security; data processing;
                 decidability; operating systems; protection; protection
                 systems; security model; security of data; Turing
                 machine; Turing machines",
  ort =          "ordner sicherheit",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@Book{Kullback:1976:SMC,
  author =       "Solomon Kullback",
  title =        "Statistical methods in cryptanalysis",
  volume =       "4",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Revised",
  pages =        "v + 206",
  year =         "1976",
  LCCN =         "Z104 .K84",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography; cryptography --- statistical
                 methods",
}

@Book{Macalister:1976:SLI,
  author =       "Robert Alexander Stewart Macalister and John Sampson",
  title =        "The secret languages of {Ireland}: {Ogham},
                 {Hisperic}, {Bearlagair na Saer}, {Bog-Latin}, and
                 cryptography, with special reference to the origin and
                 nature of the {Shelta} language; partly based upon
                 collections and manuscripts of the late {John Sampson};
                 with an {English}-jargon vocabulary",
  publisher =    "APA-Philo Press",
  address =      "Amsterdam, The Netherlands",
  pages =        "x + 284",
  year =         "1976",
  ISBN =         "90-6022-276-8",
  ISBN-13 =      "978-90-6022-276-8",
  LCCN =         "PM9001 .M2 1976",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprint of the 1937 ed. published by the Cambridge
                 University Press, Cambridge, England.",
  acknowledgement = ack-nhfb,
  keywords =     "cant; Druids and Druidism; Irish language --- history;
                 Irish language --- writing; Shelta",
}

@MastersThesis{Marion:1976:ANB,
  author =       "Bruce Phillip Marion",
  title =        "Analysis of {National Bureau of Standards Data
                 Encryption Algorithm}",
  type =         "Thesis ({Engineer})",
  school =       "Department of Electrical Engineering, Stanford
                 University",
  address =      "Stanford, CA, USA",
  pages =        "v + 46",
  year =         "1976",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cipher and telegraph codes --- Data processing;
                 Electronic data processing departments --- Security
                 measures",
}

@Article{Miller:1976:RHT,
  author =       "G. L. Miller",
  title =        "{Reimann}'s hypothesis and tests for primality",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "13",
  pages =        "300--317",
  year =         "1976",
  CODEN =        "JCSSBM",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
  referencedin = "Referenced in \cite[Ref. 16]{Kaliski:1995:SUR}.",
}

@MastersThesis{Mitchell:1976:EAD,
  author =       "James Melvin Mitchell",
  title =        "Encryption algorithm for data security based on a
                 polyalphabetic substitution scheme and a pseudo-random
                 number generator",
  type =         "Thesis ({M.S.})",
  school =       "University of Tennessee, Knoxville",
  address =      "Knoxville, TN, USA",
  pages =        "v + 83",
  year =         "1976",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sambur:1976:SEM,
  author =       "M. R. Sambur and N. S. Jayant",
  title =        "Speech Encryption by Manipulations of {LPC}
                 Parameters",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "55",
  number =       "9",
  pages =        "1373--1388",
  month =        nov,
  year =         "1976",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Tue Nov 9 11:15:56 MST 2010",
  bibsource =    "http://bstj.bell-labs.com/oldfiles/year.1976/BSTJ.1976.5509.html;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://bstj.bell-labs.com/BSTJ/images/Vol55/bstj55-9-1373.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Book{Shulman:1976:ABC,
  author =       "David Shulman",
  title =        "An annotated bibliography of cryptography",
  volume =       "37",
  publisher =    "Garland Pub.",
  address =      "New York, NY, USA",
  pages =        "388",
  year =         "1976",
  ISBN =         "0-8240-9974-5",
  ISBN-13 =      "978-0-8240-9974-9",
  LCCN =         "Z103.A1 S58",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Garland reference library of the humanities",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography",
}

@Book{Barker:1977:CHC,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of the {Hagelin} cryptograph",
  volume =       "17",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "xi + 223",
  year =         "1977",
  ISBN =         "0-89412-022-0",
  ISBN-13 =      "978-0-89412-022-0",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Claimed in \cite{} to be the main published work on
                 the Hagelin M-209 machine.",
  keywords =     "ciphers; Ciphers; Cryptography; cryptography",
}

@Book{Bell:1977:IVU,
  author =       "Ernest L. Bell",
  title =        "An initial view of {Ultra} as an {American} weapon",
  publisher =    "T S U Press,",
  address =      "Keene, NH, USA",
  pages =        "iii + 110",
  year =         "1977",
  LCCN =         "D810.C88 B45",
  bibdate =      "Mon May 08 07:14:10 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  xxISBN =       "none",
}

@Book{Clark:1977:MWBa,
  author =       "Ronald William Clark",
  title =        "The man who broke {Purple}: the life of {Colonel
                 William F. Friedman}, who deciphered the {Japanese}
                 code in {World War II}",
  publisher =    "Little, Brown",
  address =      "Boston, MA, USA",
  pages =        "ix + 271",
  year =         "1977",
  ISBN =         "0-316-14595-5",
  ISBN-13 =      "978-0-316-14595-4",
  LCCN =         "UB290 .C58 1977",
  bibdate =      "Thu Mar 29 18:43:38 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Friedman, William F (William Frederick);
                 Cryptographers; United States; Biography",
  subject-dates = "1891--1969",
}

@Book{Clark:1977:MWBb,
  author =       "Ronald William Clark",
  title =        "The man who broke {Purple}: the life of the world's
                 greatest cryptologist, {Colonel William F. Friedman}",
  publisher =    "Weidenfeld and Nicolson",
  address =      "London, UK",
  pages =        "xi + 212 + 4",
  year =         "1977",
  ISBN =         "0-297-77279-1",
  ISBN-13 =      "978-0-297-77279-8",
  LCCN =         "UB290 .C58 1977b",
  bibdate =      "Thu Mar 29 18:43:38 MDT 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Friedman, William F (William Frederick);
                 Cryptographers; United States; Biography",
  subject-dates = "1891--1969",
}

@Article{Diffie:1977:ECN,
  author =       "Whitfield Diffie and Martin E. Hellman",
  title =        "Exhaustive Cryptanalysis of the {NBS Data Encryption
                 Standard}",
  journal =      j-COMPUTER,
  volume =       "10",
  number =       "6",
  pages =        "74--84",
  month =        jun,
  year =         "1977",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
                 http://www.math.utah.edu/pub/tex/bib/computer.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "The article deals with data encryption standard
                 adopted by the National Bureau of Standards, providing
                 a basic argument concerning the standard's inadequate
                 level of security. Cost-effective ways are recommended
                 to avoid the problem.",
  acknowledgement = ack-nhfb,
  classification = "722; 902",
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  journalabr =   "Computer",
  keywords =     "cryptanalysis; data processing; standards",
  referencedin = "Referenced in \cite[Ref. 12]{Biham:1998:TA}.",
}

@Article{Feiertag:1977:PMS,
  author =       "R. J. Feiertag and K. N. Levitt and L. Robinson",
  title =        "Proving multilevel security of a system design",
  journal =      j-OPER-SYS-REV,
  volume =       "11",
  number =       "5",
  pages =        "57--65",
  month =        nov,
  year =         "1977",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Manual{Gait:1977:VCH,
  author =       "Jason Gait",
  title =        "Validating the correctness of hardware implementations
                 of the {NBS Data Encryption Standard}",
  volume =       "500-20",
  organization = pub-NBS,
  address =      pub-NBS:adr,
  pages =        "iv + 40",
  month =        nov,
  year =         "1977",
  CODEN =        "XNBSAV",
  LCCN =         "T1.U52 no.500-20",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "NBS special publication, computer science and
                 technology",
  acknowledgement = ack-nhfb,
  govtdocnumber = "0 13.10:500-20",
  keywords =     "computers --- access control --- code words; Computers
                 --- Access control --- Passwords; computers --- access
                 control --- passwords; Computers --- Testing; computers
                 --- testing; Data encryption (Computer science); data
                 encryption (computer science); Monte Carlo method",
}

@Article{Gardner:1977:MG,
  author =       "M. Gardner",
  title =        "Mathematical games",
  journal =      j-SCI-AMER,
  pages =        "120--124",
  month =        aug,
  year =         "1977",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  referencedin = "Referenced in \cite[Ref. 5]{Odlyzko:1995:FIF},
                 \cite[Ref. 2]{Anonymous:1996:RF}.",
}

@Article{Kak:1977:SEU,
  author =       "S. C. Kak and N. S. Jayant",
  title =        "On Speech Encryption Using Waveform Scrambling",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "56",
  number =       "5",
  pages =        "781--808",
  month =        may # "--" # jun,
  year =         "1977",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Tue Nov 9 11:15:56 MST 2010",
  bibsource =    "http://bstj.bell-labs.com/oldfiles/year.1977/BSTJ.1977.5605.html;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://bstj.bell-labs.com/BSTJ/images/Vol56/bstj56-5-781.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@Book{Katzan:1977:SDE,
  author =       "Harry {Katzan, Jr.}",
  title =        "The Standard Data Encryption Algorithm",
  publisher =    "Petrocelli Books",
  address =      "New York, NY, USA",
  pages =        "viii + 134",
  year =         "1977",
  ISBN =         "0-89433-016-0",
  ISBN-13 =      "978-0-89433-016-2",
  LCCN =         "QA76.9 .A25K37",
  bibdate =      "Wed Sep 28 08:01:24 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computer security --- Passwords; Data encryption
                 (Computer science)",
}

@Manual{NBS:1977:DES,
  author =       "{National Bureau of Standards}",
  title =        "Data Encryption Standard",
  volume =       "46",
  organization = "U. S. Department of Commerce",
  address =      "Washington, DC, USA",
  pages =        "18",
  month =        jan,
  year =         "1977",
  LCCN =         "JK468.A8 A31 no.46",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Federal information processing standards publication",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 21]{Biham:1998:TA}.",
  xxISBN =       "none",
}

@Book{Pierce:1977:SSP,
  author =       "Clayton C. Pierce",
  title =        "Secret and secure: privacy, cryptography, and secure
                 communication",
  publisher =    "Pierce",
  address =      "Ventura, CA, USA",
  pages =        "iv + 84",
  year =         "1977",
  LCCN =         "Z103.P531",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Article{Pless:1977:ESC,
  author =       "Vera S. Pless",
  title =        "Encryption schemes for computer confidentiality",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-26",
  number =       "11",
  pages =        "1133--1136",
  year =         "1977",
  CODEN =        "ITCOB4",
  DOI =          "http://dx.doi.org/10.1109/TC.1977.1674759",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  MRclass =      "94A10",
  MRnumber =     "57 \#5410",
  MRreviewer =   "A. T. Amin",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Rabin:1977:DS,
  author =       "M. O. Rabin",
  editor =       "Richard A. DeMillo and others",
  booktitle =    "Foundations of Secure Computation: Papers presented at
                 a 3 day workshop held at Georgia Institute of
                 Technology, Atlanta, October 1977",
  title =        "Digitalized Signatures",
  publisher =    "Academic Press",
  address =      "New York",
  pages =        "x + 404",
  year =         "1977",
  ISBN =         "0-12-210350-5",
  ISBN-13 =      "978-0-12-210350-6",
  LCCN =         "QA76.9.A25 F66",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 26]{Goldreich:1997:FMCb}.",
}

@Article{Rejewski:1977:ATP,
  author =       "Marian Rejewski",
  title =        "An application of the theory of permutations in
                 breaking the {Enigma} cipher",
  journal =      "Applications of Mathematicae, Polish Academy of
                 Sciences",
  volume =       "16",
  number =       "??",
  pages =        "543--559",
  month =        "????",
  year =         "1977",
  bibdate =      "Sun Dec 01 09:58:13 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Sacco:1977:MC,
  author =       "Luigi Sacco",
  title =        "Manual of cryptography",
  volume =       "14",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "x + 193",
  year =         "1977",
  ISBN =         "0-89412-016-6",
  ISBN-13 =      "978-0-89412-016-9",
  LCCN =         "Z104 .S313 1977",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: Manuale di crittografia. Bibliography:
                 p. viii.",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers; cryptography",
}

@Book{Sinnott:1977:CTC,
  author =       "Robert Sinnott",
  title =        "A catalogue of titles on chess, checkers, and
                 cryptology in the library of the {United States
                 Military Academy, West Point, New York}",
  publisher =    "????",
  address =      "Norwell, MA, USA",
  pages =        "35",
  year =         "1977",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Photostatic copy, partly of typescript, partly of
                 printed matter.",
  keywords =     "Checkers --- Bibliography --- Catalogs; Chess ---
                 Bibliography --- Catalogs; Cryptography ---
                 Bibliography --- Catalogs.",
}

@Book{USNBS:1977:DES,
  author =       "{United States. National Bureau of Standards}",
  title =        "{Data Encryption Standard}",
  volume =       "46",
  publisher =    pub-NBS,
  address =      pub-NBS:adr,
  pages =        "18",
  year =         "1977",
  LCCN =         "JK468.A8 A31 no.46",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Federal Information Processing Standards publication",
  acknowledgement = ack-nhfb,
  annote =       "Cover title.",
  keywords =     "Computers --- Access control --- Standards.",
}

@Book{Anonymous:1978:ODA,
  author =       "Anonymous",
  title =        "The origin and development of the {Army Security
                 Agency}, 1917--1947",
  volume =       "16",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "51",
  year =         "1978",
  ISBN =         "0-89412-025-5",
  ISBN-13 =      "978-0-89412-025-1",
  LCCN =         "UB290 .O75 1978",
  bibdate =      "Mon Sep 13 06:43:57 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A cryptographic series",
  acknowledgement = ack-nhfb,
}

@TechReport{Chaum:1978:ICP,
  author =       "D. L. Chaum and R. S. Fabry",
  title =        "Implementing capability-based protection using
                 encryption",
  type =         "Technical Report",
  number =       "UCB/ERL M78/46",
  institution =  "University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  edition =      "July 17, 1978",
  pages =        "i + 9",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "This work was partially supported by the National
                 Science Foundation Center.",
  keywords =     "Computer networks --- Access control; Computers ---
                 Access control; Cryptography",
}

@Article{Ehrsam:1978:CKM,
  author =       "William F. Ehrsam and Stephen M. Matyas and Carl H.
                 Meyer and Walter L. Tuchman",
  title =        "A Cryptographic Key Management Scheme for Implementing
                 the {Data Encryption Standard}",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "106--125",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Data being transmitted through a communications
                 network can be protected by cryptography. In a data
                 processing environment, cryptography is implemented by
                 an algorithm which utilizes a secret key, or sequence
                 of bits. Any key-controlled cryptographic algorithm,
                 such as the Data Encryption Standard, requires a
                 protocol for the management of its cryptographic keys.
                 The complexity of the key management protocol
                 ultimately depends on the level of functional
                 capability provided by the cryptographic system. This
                 paper discusses a possible key management scheme that
                 provides the support necessary to protect
                 communications between individual end users (end-to-end
                 encryption) and that also can be used to protect data
                 stored or transported on removable media.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@MastersThesis{Funk:1978:DUS,
  author =       "Mark Robert Funk",
  title =        "A digital ultrasound system for data collection,
                 imaging, and tissue signature analysis",
  type =         "Thesis ({M.S.})",
  school =       "Department of Electrical Engineering, Michigan State
                 University",
  address =      "East Lansing, MI 48824, USA",
  pages =        "vii + 141",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Tissues --- Analysis; Ultrasonics in biology ---
                 Automation; Ultrasonics in biology.",
}

@Article{Gaines:1978:SSP,
  author =       "R. Stockton Gaines and Norman Z. Shapiro",
  title =        "Some security principles and their application to
                 computer security",
  journal =      j-OPER-SYS-REV,
  volume =       "12",
  number =       "3",
  pages =        "19--28",
  month =        jul,
  year =         "1978",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:44 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Gait:1978:EEP,
  author =       "Jason Gait",
  title =        "Easy entry: the password encryption problem",
  journal =      j-OPER-SYS-REV,
  volume =       "12",
  number =       "3",
  pages =        "54--60",
  month =        jul,
  year =         "1978",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:44 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Givierge:1978:CC,
  author =       "Marcel Givierge",
  title =        "Course in cryptography",
  volume =       "19",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "164",
  year =         "1978",
  ISBN =         "0-89412-028-X",
  ISBN-13 =      "978-0-89412-028-2",
  LCCN =         "",
  bibdate =      "Sat Sep 25 11:01:24 2004",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "English translation of \cite{Givierge:1932:CC}",
  series =       "A cryptographic series",
  acknowledgement = ack-nhfb,
}

@Article{Herlestam:1978:CRS,
  author =       "Tore Herlestam",
  title =        "Critical remarks on some public-key cryptosystems",
  journal =      j-BIT,
  volume =       "18",
  number =       "4",
  pages =        "493--496",
  month =        dec,
  year =         "1978",
  CODEN =        "NBITAB",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/BF01932028",
  ISSN =         "0006-3835 (print), 1572-9125 (electronic)",
  ISSN-L =       "0006-3835",
  MRclass =      "94B99",
  MRnumber =     "80b:94033",
  MRreviewer =   "M. C. Cheng",
  bibdate =      "Wed Jan 4 18:52:15 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=18&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/bit.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=18&issue=4&spage=493",
  fjournal =     "BIT; Nordisk Tidskrift for Informationsbehandling
                 (BIT)",
  journal-URL =  "http://link.springer.com/journal/10543",
}

@Book{Jones:1978:WWB,
  author =       "R. V. (Reginald Victor) Jones",
  title =        "The wizard war: {British} scientific intelligence,
                 1939-1945",
  publisher =    "Coward, McCann and Geoghegan",
  address =      "New York, NY, USA",
  pages =        "xx + 556 + 16",
  year =         "1978",
  ISBN =         "0-698-10896-5",
  ISBN-13 =      "978-0-698-10896-7",
  LCCN =         "D810.C88 J66 1978",
  bibdate =      "Thu Aug 9 14:32:26 MDT 2012",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/h/heisenberg-werner.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$12.95",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939-1945; Cryptography; Secret service;
                 Great Britain; Jones, R. V; (Reginald Victor); Personal
                 narratives, British",
  subject-dates = "1911--",
  tableofcontents = "Part 1. The men who went first \\
                 Friends and rivals \\
                 The Clarendon laboratory 1936-1938 \\
                 Inferior red 1936-1938 \\
                 Exile \\
                 The day before war broke out \\
                 The secret weapon \\
                 The Oslo report \\
                 A plan for intelligence \\
                 The phoney war \\
                 The crooked leg \\
                 Reflections \\
                 The fortunes of major Wintle \\
                 The fifth column \\
                 The Edda revived \\
                 Knickebein Jammed- and photographed \\
                 The X-apparatus \\
                 Coventry \\
                 Target no. 54 \\
                 The atrocious crime \\
                 Wotan's other eye \\
                 Retrospect and prospect \\
                 Part 2. Freya \\
                 Beams on the wane \\
                 Jay \\
                 Wurzburg \\
                 The Bruneval raid \\
                 The Baedeker beams \\
                 El Hatto \\
                 Pineapple \\
                 The Kammhuber line \\
                 Lichtenstein \\
                 Window \\
                 Hamburg \\
                 Heavy water \\
                 Revelations from the secret service \\
                 Full stretch \\
                 Peenem{\"u}nde \\
                 FZG 76 \\
                 The Americans convinced \\
                 Flames: problems of bomber command \\
                 The baby blitz \\
                 D-Day \\
                 V-1 \\
                 V-2 \\
                 V-3 \\
                 Bomber triumph \\
                 Nuclear energy \\
                 A.D.I. (science) overseas \\
                 The year of madness \\
                 German generals and staff colleges \\
                 Swords into ploughshares, bombs into saucers \\
                 Exeunt",
}

@InCollection{Kam:1978:SDS,
  author =       "John B. Kam and George I. Davida",
  booktitle =    "Foundations of secure computation (Workshop, Georgia
                 Inst. Tech., Atlanta, Ga., 1977)",
  title =        "A structured design of substitution-permutation
                 encryption network",
  publisher =    "Academic Press",
  address =      "New York",
  pages =        "95--113",
  year =         "1978",
  MRclass =      "68B15 (68H05 94A99 94B15)",
  MRnumber =     "80b:68031",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
}

@Article{Lennon:1978:CAI,
  author =       "Richard E. Lennon",
  title =        "Cryptography Architecture for Information Security",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "138--150",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Information being transferred from point to point over
                 a public communications carrier or stored on portable
                 media can be protected, by the use of cryptography,
                 from accidental or intentional disclosure. Control
                 functions are required to ensure synchronization of the
                 process. In a communications environment, the control
                 functions become logically part of the network
                 architecture. IBM's Systems Network Architecture (SNA)
                 has been extended to allow the use of cryptography when
                 sensitive information is being processed. Architectural
                 similarities for the file environment are discussed.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "computer networks; data processing",
}

@Book{Lewin:1978:UGW,
  author =       "Ronald Lewin",
  title =        "{Ultra} goes to war: the first account of {World War
                 II}'s greatest secret based on official documents",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "397 + 6",
  year =         "1978",
  ISBN =         "0-07-037453-8",
  ISBN-13 =      "978-0-07-037453-9",
  LCCN =         "D810.S7 L43 1978; D810.S7L43",
  bibdate =      "Fri May 13 08:13:27 MDT 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  price =        "US\$12.95",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939-1945; Secret service; Great Britain",
}

@Article{Matyas:1978:GDI,
  author =       "Stephen M. Matyas and Carl H. Meyer",
  title =        "Generation, Distribution, and Installation of
                 Cryptographic Keys",
  journal =      j-IBM-SYS-J,
  volume =       "17",
  number =       "2",
  pages =        "126--137",
  year =         "1978",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "A key controlled cryptographic system requires a
                 mechanism for the safe and secure generation,
                 distribution, and installation of its cryptographic
                 keys. Possible key generation, distribution, and
                 installation procedures are discussed for the key
                 management scheme presented in an accompanying paper.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing",
}

@Article{Merkle:1978:HIS,
  author =       "Ralph Merkle and Martin E. Hellman",
  title =        "Hiding Information and Signatures in Trap Door
                 Knapsacks",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "24",
  number =       "5",
  pages =        "525--530",
  year =         "1978",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1978.1055927",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Thu Jan 21 14:42:38 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Merkle:1978:SCI,
  author =       "Ralph C. Merkle",
  title =        "Secure Communications Over Insecure Channels",
  journal =      j-CACM,
  volume =       "21",
  number =       "4",
  pages =        "294--299",
  month =        apr,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 25 13:26:09 MST 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "According to traditional conceptions of cryptographic
                 security, it is necessary to transmit a key, by secret
                 means, before encrypted messages can be sent securely.
                 This paper shows that it is possible to select a key
                 over open communications channels in such a fashion
                 that communications security can be maintained. A
                 method is described which forces any enemy to expend an
                 amount of work which increases as the square of the
                 work required of the two communicants to select the
                 key. The method provides a logically new kind of
                 protection against the passive eaves dropper. It
                 suggests that further research on this topic will be
                 highly rewarding, both in a theoretical and a practical
                 sense.",
  acknowledgement = ack-nhfb,
  annote =       "This article was originally submitted August 1975; was
                 the publication delay due to U.S. Government security
                 reviews?",
  classcodes =   "C5600 (Data communication equipment and techniques);
                 C6130 (Data handling techniques)",
  classification = "723",
  corpsource =   "Dept. of Electrical Engng. and Computer Sci., Univ. of
                 California, Berkeley, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "communications channels; communications security;
                 computer network security; cryptographic security;
                 cryptography; cryptology; data communication systems;
                 data processing; insecure channels; key distribution;
                 open; passive eavesdropper; passive eavesdropping;
                 protection; public key cryptosystem; Security; security
                 of data; wiretap",
  treatment =    "T Theoretical or Mathematical",
}

@TechReport{Needham:1978:UEAa,
  author =       "R. M. (Roger Michael) Needham and Michael D.
                 Schroeder",
  title =        "Using encryption for authentication in large networks
                 of computers",
  number =       "CSL-78-4",
  institution =  "Xerox Palo Alto Research Center",
  address =      "Palo Alto, CA, USA",
  pages =        "??",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted June 1982.",
  acknowledgement = ack-nhfb,
}

@Article{Needham:1978:UEAb,
  author =       "Roger M. Needham and Michael D. Schroeder",
  title =        "Using Encryption for Authentication in Large Networks
                 of Computers",
  journal =      j-CACM,
  volume =       "21",
  number =       "12",
  pages =        "993--999",
  month =        dec,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 07:07:33 MST 2001",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm21.html#NeedhamS78;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Use of encryption to achieve authenticated
                 communication in computer networks is discussed.
                 Example protocols are presented for the establishment
                 of authenticated connections, for the management of
                 authenticated mail, and for signature verification and
                 document integrity guarantee. Both conventional and
                 public-key encryption algorithms are considered as the
                 basis for protocols.",
  acknowledgement = ack-nhfb,
  classcodes =   "C5620 (Computer networks and techniques); C6130 (Data
                 handling techniques)",
  classification = "723",
  corpsource =   "Xerox Palo Alto Res. Center, Palo Alto, CA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "authenticated communication; computer networks; data
                 processing --- Security of Data; document integrity;
                 encryption; guarantee; protocols; public key encryption
                 algorithms; security of data; signature verification",
  oldlabel =     "NeedhamS78",
  treatment =    "P Practical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/NeedhamS78",
}

@Article{Nilsson:1978:OST,
  author =       "Arne Nilsson and Rolf Blom and Harald Wesemeyer and S.
                 Hellstrom",
  title =        "On overflow systems in telephone networks: general
                 service times in the secondary group",
  journal =      "Ericsson technics",
  volume =       "34",
  number =       "2",
  publisher =    "Telefonaktiebolaget L. M. Ericsson",
  address =      "Stockholm, Sweden",
  pages =        "48--128",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Caption title.",
  keywords =     "Computer networks; Computers --- Access control;
                 Electrets; Encryption methods in data networks;
                 Telephone systems",
}

@Book{Oakley:1978:RPC,
  author =       "Howard T. Oakley",
  title =        "The {Riverbank} publications on cryptology",
  publisher =    "????",
  address =      "Washington, DC, USA",
  pages =        "324--330",
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Fabyan, George, --- 1867-1936; Friedman,
                 William F. --- (William Frederick), --- 1891-1969;
                 Publication (Riverbank Laboratories); Riverbank
                 Laboratories. --- Dept. of Ciphers",
}

@Article{Payne:1978:OEN,
  author =       "W. H. Payne and K. L. McMillen",
  title =        "Orderly Enumeration of Nonsingular Binary Matrices
                 Applied to Text Encryption",
  journal =      j-CACM,
  volume =       "21",
  number =       "4",
  pages =        "259--263",
  month =        apr,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68C05",
  MRnumber =     "80h:68031",
  MRreviewer =   "P. E. O'Neil",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  abstract =     "Nonsingular binary matrices of order N, i.e.,
                 nonsingular over the field left brace 0,1 right brace,
                 and an initial segment of the natural numbers are
                 placed in one-to-one correspondence. Each natural
                 number corresponds to two intermediate vectors. These
                 vectors are mapped into a nonsingular binary matrix.
                 Examples of complete enumeration of all 2 multiplied by
                 2 and 3 multiplied by 3 nonsingular binary matrices
                 were produced by mapping the intermediate vectors to
                 the matrices. The mapping has application to the Vernam
                 encipherment method using pseudorandom number
                 sequences. A bit string formed from bytes of text of a
                 data encryption key can be used as a representation of
                 a natural number. This natural number is transformed to
                 a nonsingular binary matrix. Key leverage is obtained
                 by using the matrix as a ``seed'' in a shift register
                 sequence pseudorandom number generator.",
  acknowledgement = ack-nhfb,
  classcodes =   "C4140 (Linear algebra); C6130 (Data handling
                 techniques)",
  classification = "723",
  corpsource =   "Washington State Univ., Pullman, WA, USA",
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "binary sequences; bit string; computer programming;
                 data encryption key; encoding; enumeration; mapped;
                 matrix algebra; natural number; nonsingular binary
                 matrices; pseudorandom number; sequences; text editing;
                 text encryption; Vernam encipherment method",
  oldlabel =     "PayneM78",
  treatment =    "A Application; T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/PayneM78",
}

@Article{Pollard:1978:MCM,
  author =       "J. M. Pollard",
  title =        "{Monte Carlo} Methods for Index Computation $ (\bmod
                 p) $",
  journal =      j-MATH-COMPUT,
  volume =       "32",
  number =       "143",
  pages =        "918--924",
  month =        jul,
  year =         "1978",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Mon Jul 19 08:06:24 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "C1140G (Monte Carlo methods)",
  corpsource =   "Math. Dept., Plessey Telecommunications Res.,
                 Maidenhead, UK",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "factorisation of; index computation; integers; Monte
                 Carlo methods",
  referencedin = "Referenced in \cite[Ref. 7]{Wiener:1998:PCP} and
                 \cite[Ref. 8]{Escott:1999:AEC}.",
  treatment =    "T Theoretical or Mathematical",
}

@Unpublished{Reeds:1978:HCM,
  author =       "J. Reeds and D. Ritchie and R. Morris",
  title =        "The {Hagelin} Cypher Machine ({M-209}): Cryptanalysis
                 from Ciphertext Alone",
  year =         "1978",
  bibdate =      "Thu Apr 29 18:08:31 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Submitted to the journal Cryptologia, but never
                 published. For the story behind the suppression of
                 publication, see \cite{Ritchie:19xx:DCW}. Internal
                 technical memoranda TM 78-1271-10, TM 78-1273-2.",
  acknowledgement = ack-nhfb,
}

@Article{Rivest:1978:MOD,
  author =       "Ronald L. Rivest and Adi Shamir and Leonard M.
                 Adleman",
  title =        "A Method for Obtaining Digital Signatures and Public
                 Key Cryptosystems",
  journal =      j-CACM,
  volume =       "21",
  number =       "2",
  pages =        "120--126",
  month =        feb,
  year =         "1978",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "94A05",
  MRnumber =     "83m:94003",
  MRreviewer =   "J. L. Selfridge",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Ai/nonmono.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "The basics of trap-door functions and the famous RSA
                 public key cryptosystem are presented in this paper.",
  abstract =     "An encryption method is presented with the novel
                 property that publicly revealing an encryption key does
                 not thereby reveal the corresponding decryption key.
                 This has two important consequences: (1) Couriers or
                 other secure means are not needed to transmit keys,
                 since a message can be enciphered using an encryption
                 key publicly revealed by the intended recipient. (2) A
                 message can be ``signed'' using a privately held
                 decryption key. Anyone can verify this signature using
                 the corresponding publicly revealed encryption key.
                 Signatures cannot be forged, and a signer cannot later
                 deny the validity of his signature.",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  classification = "723",
  corpsource =   "Dept. of Math., MIT, Cambridge, MA, USA",
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  journalabr =   "Commun ACM",
  keywords =     "computer programming; cryptography; cryptosystems;
                 data handling; data processing --- Security of Data;
                 decryption key; digital signatures; encryption key;
                 number theory; operating protection; RSA; security;
                 security of data",
  referencedin = "Referenced in \cite[Ref. 12]{Handschuh:1998:SCC},
                 \cite[Ref. 21]{Kaliski:1995:SUR}, \cite[Ref.
                 5]{Haber:1995:HDD}, \cite[Ref. 8]{Wiener:1998:PCP},
                 \cite[Ref. 27]{Goldreich:1997:FMCb}.",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Saltzer:1978:DS,
  author =       "Jerome H. Saltzer",
  title =        "On digital signatures",
  journal =      j-OPER-SYS-REV,
  volume =       "12",
  number =       "2",
  pages =        "12--14",
  month =        apr,
  year =         "1978",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:39 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Book{Stark:1978:INT,
  author =       "Harold M. Stark",
  title =        "An introduction to number theory",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "x + 347",
  year =         "1978",
  ISBN =         "0-262-69060-8",
  ISBN-13 =      "978-0-262-69060-7",
  LCCN =         "QA241 .S72 1978",
  bibdate =      "Fri Jun 24 14:19:16 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Originally published in \cite{Stark:1970:INT}.",
  subject =      "Number theory",
  xxnote =       "Some library catalogs give year as 1981.",
}

@Manual{USCSC:1978:CSD,
  author =       "{United States. Civil Service Commission}",
  title =        "Computer security and the {Data Encryption Standard}:
                 proceedings of the {Conference on Computer Security and
                 the Data Encryption Standard held at the National
                 Bureau of Standards in Gaithersburg, Maryland, on
                 February 15, 1977}",
  number =       "500-27",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "viii + 125",
  year =         "1978",
  LCCN =         "T1.U52 no.500- 27",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "NBS special publication. Computer science and
                 technology",
  acknowledgement = ack-nhfb,
  keywords =     "computer security --- passwords; data encryption
                 (computer science)",
}

@Book{USCSSC:1978:USN,
  author =       "{United States. Congress. Senate. Select Committee on
                 Intelligence}",
  title =        "Unclassified summary --- involvement of {NSA} in the
                 development of the {Data Encryption Standard}: staff
                 report of the {Senate Select Committee on Intelligence,
                 United States Senate}",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "ii + 4",
  month =        apr,
  year =         "1978",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: 95th Congress, 2d session. Committee
                 print.",
  keywords =     "Cryptography; Data encryption (Computer science);
                 United States. --- National Security Agency",
}

@Book{Winterbotham:1978:NC,
  author =       "F. W. (Frederick William) Winterbotham",
  title =        "The {Nazi} connection",
  publisher =    pub-HARPER-ROW,
  address =      pub-HARPER-ROW:adr,
  pages =        "222",
  year =         "1978",
  ISBN =         "0-06-014686-9",
  ISBN-13 =      "978-0-06-014686-3",
  LCCN =         "D810.S8 .W538 1978",
  bibdate =      "Fri May 13 08:14:55 MDT 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 melvyl.cdlib.org:210/CDL90",
  acknowledgement = ack-nhfb,
  author-dates = "1897--1990",
  subject =      "Winterbotham, F. W; (Frederick William); World War,
                 1939-1945; Secret service; Great Britain; Spies;
                 Biography; Germany; Personal narratives, British",
  subject-dates = "1897--1990",
}

@InProceedings{Adleman:1979:SAD,
  author =       "L. M. Adleman",
  title =        "A subexponential algorithm for the discrete
                 logarithm",
  crossref =     "IEEE:1979:ASF",
  pages =        "55--60",
  year =         "1979",
  DOI =          "http://dx.doi.org/10.1109/SFCS.1979.2",
  bibdate =      "Sun Mar 11 10:27:21 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@PhdThesis{Andelman:1979:MLE,
  author =       "Dov Andelman",
  title =        "Maximum likelihood estimation applied to
                 cryptanalysis",
  type =         "Thesis ({Ph.D.})",
  school =       "Stanford University",
  address =      "Stanford, CA, USA",
  pages =        "viii + 167",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Estimation theory; Maxima and minima.",
}

@Book{Barker:1979:CEC,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of an enciphered code problem: where an
                 ``additive'' method of encipherment has been used",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "vii + 174",
  year =         "1979",
  ISBN =         "0-89412-037-9",
  ISBN-13 =      "978-0-89412-037-4",
  LCCN =         "Z103 .B333",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@Book{Barker:1979:HCCa,
  editor =       "Wayne G. Barker",
  title =        "The history of codes and ciphers in the {United
                 States} during {World War I}",
  volume =       "20",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "263",
  year =         "1979",
  ISBN =         "0-89412-031-X",
  ISBN-13 =      "978-0-89412-031-2",
  LCCN =         "D639.C75 H57 1979",
  bibdate =      "Mon Sep 13 06:32:02 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
}

@Book{Barker:1979:HCCb,
  editor =       "Wayne G. Barker",
  title =        "The history of codes and ciphers in the {United
                 States} during the period between the {World Wars}",
  volume =       "22, 54",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "various",
  year =         "1979",
  ISBN =         "0-89412-039-5 (part 1), 0-89412-165-0 (part 2)",
  ISBN-13 =      "978-0-89412-039-8 (part 1), 978-0-89412-165-4 (part
                 2)",
  LCCN =         "UB290 .H47 1979",
  bibdate =      "Mon Sep 13 06:37:57 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Two volumes. This book was written about 1946 by the
                 Historical Section of the Army Security Agency",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
}

@Article{Blakley:1979:RSA,
  author =       "G. R. Blakley and I. Borosh",
  title =        "{Rivest--Shamir--Adleman} public key cryptosystems do
                 not always conceal messages",
  journal =      j-COMP-MATH-APPL,
  volume =       "5",
  number =       "3",
  pages =        "169--178",
  year =         "1979",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94B99 (10A25 94A24)",
  MRnumber =     "81e:94026",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigcse.bib",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
  remark =       "This paper points out that the some keys in the RSA
                 may fail to encrypt: instead, they produce an output
                 ciphertext that is identical to the input plaintext.
                 See also \cite{Smith:1979:UFM,Bergmann:2009:DKR}",
}

@InProceedings{Blakley:1979:SCK,
  author =       "G. R. Blakley",
  title =        "Safeguarding cryptographic keys",
  crossref =     "Merwin:1979:NCC",
  pages =        "313--317",
  year =         "1979",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 3]{Canetti:1997:PSL},
                 \cite[Ref. 2]{Gemmell:1997:ITC}.",
  xxauthor =     "R. Blakley",
}

@Article{Bright:1979:QRN,
  author =       "Herbert S. Bright and Richard L. Enison",
  title =        "Quasi-Random Number Sequences from a Long-Period {TLP}
                 Generator with Remarks on Application to Cryptography",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "357--370",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Sep 19 21:17:11 1994",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@MastersThesis{Chaum:1979:UEM,
  author =       "David Chaum",
  title =        "Untraceable electronic mail, return addresses, and
                 digital pseudonyms",
  type =         "Thesis ({M.S. in Computer Science})",
  school =       "University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  month =        jun,
  year =         "1979",
  bibdate =      "Mon Dec 28 13:41:04 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Culik:1979:SIS,
  author =       "K. {Culik, II} and H. A. Maurer",
  title =        "Secure Information Storage and Retrieval Using New
                 Results in Cryptography",
  journal =      j-INFO-PROC-LETT,
  volume =       "8",
  number =       "4",
  pages =        "181--186",
  day =          "30",
  month =        apr,
  year =         "1979",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68B15 (68H05)",
  MRnumber =     "80h:68010",
  MRreviewer =   "James W. Snively, Jr.",
  bibdate =      "Tue Nov 17 10:49:43 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C6130 (Data handling techniques)",
  corpsource =   "Dept. of Computer Sci., Univ. of Waterloo, Waterloo,
                 Ont., Canada",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "cryptography; data processing --- Security of Data;
                 encoding; information retrieval; information retrieval
                 systems; information storage; information systems;
                 security of data",
}

@Article{Denning:1979:EOS,
  author =       "Peter J. Denning",
  title =        "Editor's Overview --- Special Section on Data
                 Encryption",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "283--283",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "http://doi.acm.org/10.1145/356789.356791",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Denning:1979:SPC,
  author =       "Dorothy E. Denning",
  title =        "Secure Personal Computing in an Insecure Network",
  journal =      j-CACM,
  volume =       "22",
  number =       "8",
  pages =        "476--482",
  month =        aug,
  year =         "1979",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68A05 (68B15 94A99)",
  MRnumber =     "80d:68010",
  bibdate =      "Mon Jan 22 06:35:06 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm22.html#Denning79;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "Computer Sci. Dept., Purdue Univ., West Lafayette, IN,
                 USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "communication links; confidential data; confidential
                 files; encoding; encryption; insecure network; secure
                 personal computing; security of data",
  oldlabel =     "Denning79",
  treatment =    "P Practical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Denning79",
}

@TechReport{Dreher:1979:PSC,
  author =       "Felix F. Dreher",
  title =        "Privacy and security in computer based systems using
                 encryption",
  type =         "Pittsburg State University. School of Business
                 monograph series",
  number =       "7",
  institution =  "Pittsburg State University. Gladys A. Kelce School of
                 Business and Economics.",
  address =      "Pittsburg, KS, USA",
  pages =        "8",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Cover title.",
  keywords =     "Computers --- Access control; Electronic data
                 processing departments --- Security measures",
}

@Book{Garey:1979:CIG,
  author =       "Michael R. Garey and David S. Johnson",
  title =        "Computers and Intractability: a Guide to the Theory of
                 {NP}-Completeness",
  publisher =    pub-FREEMAN,
  address =      pub-FREEMAN:adr,
  pages =        "x + 338",
  year =         "1979",
  ISBN =         "0-7167-1045-5, 0-7167-1044-7",
  ISBN-13 =      "978-0-7167-1045-5, 978-0-7167-1044-8",
  bibdate =      "Sun Mar 11 10:56:42 2012",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/subjects/acc-stab-num-alg.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Garlinski:1979:IEW,
  author =       "J{\'o}zef Garli{\'n}ski",
  title =        "Intercept: the {Enigma} war",
  publisher =    "J. M. Dent",
  address =      "London, UK",
  pages =        "xx + 219 + 8",
  year =         "1979",
  ISBN =         "0-460-04337-4",
  ISBN-13 =      "978-0-460-04337-3",
  LCCN =         "D810.C88 G37",
  bibdate =      "Tue Sep 4 07:56:36 MDT 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939-1945; Cryptography",
}

@Book{Hardy:1979:ITN,
  author =       "G. H. (Godfrey Harold) Hardy and Edward Maitland
                 Wright",
  title =        "An introduction to the theory of numbers",
  publisher =    pub-CLARENDON,
  address =      pub-CLARENDON:adr,
  edition =      "Fifth",
  pages =        "xvi + 426",
  year =         "1979",
  ISBN =         "0-19-853170-2, 0-19-853171-0 (paperback)",
  ISBN-13 =      "978-0-19-853170-8, 978-0-19-853171-5 (paperback)",
  LCCN =         "QA241 .H28 1979",
  bibdate =      "Fri Jun 24 12:34:44 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  author-dates = "1877--1947",
  subject =      "Number theory",
}

@Article{Hellman:1979:MPK,
  author =       "Martin E. Hellman",
  title =        "The Mathematics of Public-Key Cryptography",
  journal =      j-SCI-AMER,
  volume =       "241",
  number =       "2",
  pages =        "146--157 (Intl. ed. 130--139)",
  month =        aug,
  year =         "1979",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Tue May 19 18:01:43 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C6130 (Data handling techniques);
                 C6160 (Database management systems (DBMS))",
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "computer privacy; cryptography; electronic
                 communications; encoding; encryption; knapsack problem;
                 mathematics; P-NP problem; public key cryptography;
                 public-key cryptosystem; random numbers; security of
                 data; trap-door one-way functions",
  treatment =    "T Theoretical or Mathematical",
}

@Manual{Hinsley:1979:BISa,
  author =       "F. H. (Francis Harry) Hinsley and E. E. Thomas",
  title =        "{British} intelligence in the {Second World War}: its
                 influence on strategy and operations",
  publisher =    "H.M. Stationery Office",
  address =      "London, UK",
  pages =        "various",
  year =         "1979",
  ISBN =         "0-11-630933-4 (vol. 1)",
  ISBN-13 =      "978-0-11-630933-4 (vol. 1)",
  LCCN =         "D810.S7 H49 1979b v.1-2 (1979--1981)",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Vol. 3, pt. 2 has additional author C. A. G.
                 Simkins.",
  price =        "UK\pounds10.00 (vol. 1)",
  series =       "History of the Second World War",
  acknowledgement = ack-nhfb,
  keywords =     "Great Britain --- history --- George VI, 1936--1952;
                 World War, 1939--1945 --- secret service --- Great
                 Britain",
}

@Book{Hinsley:1979:BISb,
  author =       "F. H. (Francis Harry) Hinsley and Michael Eliot
                 Howard",
  title =        "{British} intelligence in the {Second World War}: its
                 influence on strategy and operations",
  publisher =    pub-CUP,
  address =      pub-CUP:adr,
  pages =        "various",
  year =         "1979",
  ISBN =         "0-521-22940-5 (vol. 1)",
  ISBN-13 =      "978-0-521-22940-1 (vol. 1)",
  LCCN =         "D810.S7 H47 1979b",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Vols. 3-4 in series: History of the Second World War.
                 Vol. 4 has subtitle: Security and counter-intelligence;
                 Vol. 5 has subtitle: Strategic deception.",
  acknowledgement = ack-nhfb,
  contents =     "v. 1-3. Its influence on strategy and operations ---
                 v. 5. Strategic deception",
  keywords =     "World War, 1939--1945; World War, 1939--1945 ---
                 secret service --- Great Britain",
}

@Book{IRD:1979:DVE,
  author =       "{International Resource Development, Inc.}",
  title =        "Data and voice encryption",
  publisher =    "International Resource Development",
  address =      "New Canaan, CT, USA",
  pages =        "iv + 124",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography equipment industry --- United States;
                 Market surveys --- United States.",
}

@Article{Kahn:1979:CGP,
  author =       "David Kahn",
  title =        "Cryptology goes public",
  journal =      "Foreign affairs (Council on Foreign Relations)",
  volume =       "58",
  number =       "1",
  publisher =    "Council on Foreign Relations",
  address =      "New York, NY, USA",
  pages =        "141--159",
  month =        "Fall",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Caption title. Detached from Foreign affairs, v. 58,
                 no. 1, fall 1979.",
  keywords =     "Ciphers; Cryptography",
}

@Article{Kam:1979:SDS,
  author =       "John B. Kam and George I. Davida",
  title =        "Structured design of substitution-permutation
                 encryption networks",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "28",
  number =       "10",
  pages =        "747--753",
  year =         "1979",
  CODEN =        "ITCOB4",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  MRclass =      "68B15 (68H05)",
  MRnumber =     "80h:68013",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Institute of Electrical and Electronics Engineers.
                 Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Knoble:1979:AEO,
  author =       "H. D. Knoble",
  title =        "{Algorithm 536}: An Efficient One-Way Enciphering
                 Algorithm [{Z}]",
  journal =      j-TOMS,
  volume =       "5",
  number =       "1",
  pages =        "108--111",
  month =        mar,
  year =         "1979",
  CODEN =        "ACMSCU",
  DOI =          "http://doi.acm.org/10.1145/355815.355823",
  ISSN =         "0098-3500 (print), 1557-7295 (electronic)",
  ISSN-L =       "0098-3500",
  bibdate =      "Sat Aug 27 23:58:53 1994",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Mathematical Software",
  journal-URL =  "http://portal.acm.org/toc.cfm?idx=J782",
}

@Article{Knoble:1979:EOW,
  author =       "H. D. Knoble and C. {Forney, Jr.} and F. S. Bader",
  title =        "An Efficient One-Way Enciphering Algorithm",
  journal =      j-TOMS,
  volume =       "5",
  number =       "1",
  pages =        "97--107",
  month =        mar,
  year =         "1979",
  CODEN =        "ACMSCU",
  DOI =          "http://doi.acm.org/10.1145/355815.355822",
  ISSN =         "0098-3500 (print), 1557-7295 (electronic)",
  ISSN-L =       "0098-3500",
  bibdate =      "Sat Aug 27 23:13:25 1994",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Mathematical Software",
  journal-URL =  "http://portal.acm.org/toc.cfm?idx=J782",
}

@Article{Leighton:1979:BRB,
  author =       "Albert C. Leighton",
  title =        "Book Review: {{\booktitle{An annotated bibliography of
                 cryptography}}: By David Shulman. Garland Reference
                 Library of the Humanities, Vol. 37 New York\slash
                 London (Garland Publishing Inc.). 1976. xvi + 372 pp.
                 illus. \$35.00}",
  journal =      j-HIST-MATH,
  volume =       "6",
  number =       "2",
  pages =        "213--218",
  month =        may,
  year =         "1979",
  CODEN =        "HIMADS",
  ISSN =         "0315-0860 (print), 1090-249X (electronic)",
  ISSN-L =       "0315-0860",
  bibdate =      "Wed Jun 26 06:17:09 MDT 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/histmath.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0315086079900934",
  acknowledgement = ack-nhfb,
  fjournal =     "Historia Mathematica",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03150860",
}

@Article{Lempel:1979:CT,
  author =       "Abraham Lempel",
  title =        "Cryptology in Transition",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "285--303",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "http://doi.acm.org/10.1145/356789.356792",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lu:1979:EGC,
  author =       "Shyue Ching Lu",
  title =        "The existence of good cryptosystems for key rates
                 greater than the message redundancy",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "25",
  number =       "4",
  pages =        "475--477",
  year =         "1979",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1979.1056061",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94B99",
  MRnumber =     "80g:94069a",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@MastersThesis{Ma:1979:RAD,
  author =       "Robert Ma",
  title =        "Review and analysis of the {Data Encryption
                 Standard}",
  type =         "Master of Science, Plan II.",
  school =       "Department of Electrical Engineering and Computer
                 Sciences, University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "70",
  year =         "1979",
  LCCN =         "TK7 .U5 1979:1:M-N",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Matyas:1979:DSO,
  author =       "Stephen M. Matyas",
  title =        "Digital Signatures --- an Overview",
  journal =      j-COMP-NET,
  volume =       "3",
  number =       "2",
  pages =        "87--94",
  month =        apr,
  year =         "1979",
  CODEN =        "CNETDP",
  ISSN =         "0376-5075",
  ISSN-L =       "0376-5075",
  bibdate =      "Sat Sep 25 18:04:41 MDT 1999",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Kingston, NY",
  classification = "723",
  fjournal =     "Computer Networks",
  journalabr =   "Comput Networks",
  keywords =     "data processing; digital signatures",
}

@Article{Peleg:1979:BSC,
  author =       "Shmuel Peleg and Azriel Rosenfeld",
  title =        "Breaking Substitution Ciphers Using a Relaxation
                 Algorithm",
  journal =      j-CACM,
  volume =       "22",
  number =       "11",
  pages =        "598--605",
  month =        nov,
  year =         "1979",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 07:12:05 MST 2001",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
                 http://dblp.uni-trier.de/db/journals/cacm/cacm22.html#PelegR79;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C1230 (Artificial intelligence)",
  corpsource =   "Univ. of Maryland, College Park, MD, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "artificial intelligence; computer security;
                 cryptography; decoding; joint letter probabilities;
                 letters; plaintext; relaxation; relaxation algorithm;
                 substitution ciphers; updating scheme",
  oldlabel =     "PelegR79",
  ort =          "ordner sicherheit",
  treatment =    "T Theoretical or Mathematical",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/PelegR79",
}

@Article{Popek:1979:ESC,
  author =       "Gerald J. Popek and Charles S. Kline",
  title =        "Encryption and Secure Computer Networks",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "331--356",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "http://doi.acm.org/10.1145/356789.356794",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@InCollection{Reeds:1979:CMC,
  author =       "James Reeds",
  booktitle =    "Information linkage between applied mathematics and
                 industry (Proc. First Annual Workshop, Naval
                 Postgraduate School, Monterey, Calif., 1978)",
  title =        "Cracking a multiplicative congruential encryption
                 algorithm",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "467--472",
  year =         "1979",
  MRclass =      "94B99 (65C10)",
  MRnumber =     "80h:94040",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
}

@Article{Rivest:1979:CRC,
  author =       "Ronald L. Rivest",
  title =        "Critical remarks on: {``Critical remarks on some
                 public-key cryptosystems'' [BIT {\bf 18}(4), 1978, pp.
                 493--496; MR 80b:94033 ] by Tore Herlestam}",
  journal =      j-BIT,
  volume =       "19",
  number =       "2",
  pages =        "274--275",
  month =        jun,
  year =         "1979",
  CODEN =        "NBITAB",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/BF01930859",
  ISSN =         "0006-3835 (print), 1572-9125 (electronic)",
  ISSN-L =       "0006-3835",
  MRclass =      "94B99 (68B99)",
  MRnumber =     "80m:94070",
  MRreviewer =   "M. C. Cheng",
  bibdate =      "Wed Jan 4 18:52:16 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=19&issue=2;
                 http://www.math.utah.edu/pub/tex/bib/bit.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Herlestam:1978:CRS}.",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=19&issue=2&spage=274",
  acknowledgement = ack-nhfb,
  fjournal =     "BIT; Nordisk Tidskrift for Informationsbehandling
                 (BIT)",
  journal-URL =  "http://link.springer.com/journal/10543",
}

@Article{Rubin:1979:DSC,
  author =       "F. Rubin",
  title =        "Decrypting a Stream Cipher Based on {J}--{K}
                 Flip-Flops",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-28",
  number =       "7",
  pages =        "483--487",
  month =        jul,
  year =         "1979",
  CODEN =        "ITCOB4",
  DOI =          "http://dx.doi.org/10.1109/TC.1979.1675392",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 11 06:49:39 MDT 2011",
  bibsource =    "http://www.computer.org/tc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/ieeetranscomput1970.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1675392",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Shamir:1979:HSS,
  author =       "Adi Shamir",
  title =        "How to Share a Secret",
  journal =      j-CACM,
  volume =       "22",
  number =       "11",
  pages =        "612--613",
  month =        nov,
  year =         "1979",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "94B99 (68E99)",
  MRnumber =     "80g:94070",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/security.1.bib;
                 http://www.math.utah.edu/pub/tex/bib/cacm1970.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "protection against loss of keys by dividing the data
                 into pieces.",
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "MIT, Cambridge, MA, USA",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "computer security; cryptographic systems;
                 cryptography; encoding; key management; robust key
                 management schemes; security breaches; security of
                 data",
  ort =          "ordner sicherheit",
  referencedin = "Referenced in \cite[Ref. 38]{Gemmell:1997:ITC},
                 \cite[Ref. 26]{Canetti:1997:PSL}.",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@InProceedings{Simmons:1979:CCA,
  author =       "Gustavus J. Simmons",
  booktitle =    "Proceedings of the Eighth Manitoba Conference on
                 Numerical Mathematics and Computing (Univ. Manitoba,
                 Winnipeg, Man., 1978)",
  title =        "Computational complexity and asymmetric encryption",
  publisher =    pub-UTILITAS-MATH,
  address =      pub-UTILITAS-MATH:adr,
  pages =        "65--93",
  year =         "1979",
  MRclass =      "68B15 (68C25 94B99)",
  MRnumber =     "80h:68017",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  series =       "Congress. Numer., XXII",
}

@InProceedings{Simmons:1979:HID,
  author =       "G. J. Simmons",
  editor =       "{IEEE}",
  booktitle =    "IEEE EASCON '79, Washington, DC, 1979",
  title =        "How to Insure that Data Acquired to Verify Treaty
                 Compliance are Trustworthy",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "661--662",
  year =         "1979",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Thu Jan 21 14:46:12 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Simmons:1979:SAE,
  author =       "Gustavus J. Simmons",
  title =        "Symmetric and Asymmetric Encryption",
  journal =      j-COMP-SURV,
  volume =       "11",
  number =       "4",
  pages =        "305--330",
  month =        dec,
  year =         "1979",
  CODEN =        "CMSVAN",
  DOI =          "http://doi.acm.org/10.1145/356789.356793",
  ISSN =         "0010-4892",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:25:45 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Smith:1979:UFM,
  author =       "Donald R. Smith and James T. Palmer",
  title =        "Universal fixed messages and the
                 {Rivest--Shamir--Adleman} cryptosystem",
  journal =      j-MATHEMATIKA,
  volume =       "26",
  number =       "1",
  pages =        "44--52",
  year =         "1979",
  CODEN =        "MTKAAB",
  ISSN =         "0025-5793",
  MRclass =      "94B99",
  MRnumber =     "80m:94071",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigcse.bib",
  fjournal =     "Mathematika. A Journal of Pure and Applied
                 Mathematics",
  remark =       "This paper points out that the some keys in the RSA
                 may fail to encrypt: instead, they produce an output
                 ciphertext that is identical to the input plaintext.
                 See also \cite{Blakley:1979:RSA,Bergmann:2009:DKR}",
}

@Article{Snyder:1979:IUC,
  author =       "Samuel S. Snyder",
  title =        "Influence of {U.S. Cryptologic Organizations} on the
                 digital computer industry",
  journal =      j-J-SYST-SOFTW,
  volume =       "1",
  number =       "1",
  pages =        "87--102",
  month =        "????",
  year =         "1979",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed Sep 8 07:38:41 MDT 2010",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Tuchman:1979:HPN,
  author =       "W. Tuchman",
  title =        "{Hellman} presents no shortcut solutions to {DES}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "16",
  number =       "7",
  pages =        "40--41",
  month =        jul,
  year =         "1979",
  CODEN =        "IEESAM",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  referencedin = "Referenced in \cite[Ref. 25]{Biham:1998:TA}.",
}

@TechReport{USNA:1979:CS,
  author =       "{United States. National Archives and Records
                 Service}",
  title =        "Cryptology studies",
  type =         "Records of the National Security Agency",
  number =       "RG457",
  institution =  "National Archives of the United States",
  address =      "Washington, DC, USA",
  pages =        "??",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "reel 1. Studies SRH002-007.--reel 2. Studies SRM026,
                 SRM028-037.-- reel 3. Studies SRH-001, SRH-038.",
  keywords =     "Ciphers; Cryptography; World War, 1939-1945 ---
                 Cryptography.",
}

@Book{USNSG:1979:IRW,
  author =       "{United States. Naval Security Group}",
  title =        "Intelligence reports on the war in the {Atlantic},
                 1942--1945: the account of the war in the {Atlantic}
                 from {Dec. 1942} to {May 1945} as seen through and
                 influenced by decryption of {German} naval radio
                 traffic: [guide]",
  publisher =    "Michael Glazier",
  address =      "Wilmington, DE, USA",
  pages =        "6",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Microfilm (positive). v. 1. Allied communication
                 intelligence and the battle of the Atlantic.--v.2.
                 U-boat operations.--v. 3. German naval communications
                 intelligence.--v. 4. Technical intelligence from Allied
                 C.I. Released by the Department of the Navy, Naval
                 Security Group Command Headquarters. v. 1. Allied
                 communication intelligence and the battle of the
                 Atlantic.--v.2. U-boat operations.--v. 3. German naval
                 communications intelligence.--v. 4. Technical
                 intelligence from Allied C.I.",
  keywords =     "Cipher and telegraph codes; Germany. --- Kriegsmarine
                 --- Communication systems; World War, 1939--1945 ---
                 Atlantic Ocean; World War, 1939--1945 ---
                 Communications, Military; World War, 1939--1945 ---
                 Cryptography; World War, 1939--1945 --- Naval
                 operations, American; World War, 1939--1945 --- Naval
                 operations, German; World War, 1939-1945 --- Atlantic
                 Ocean",
}

@Book{Weber:1979:USD,
  author =       "Ralph Edward Weber",
  title =        "{United States} Diplomatic Codes and Ciphers,
                 1775--1938",
  publisher =    "Precedent Publishing",
  address =      "Chicago, IL, USA",
  pages =        "xviii + 633",
  year =         "1979",
  ISBN =         "0-913750-20-4",
  ISBN-13 =      "978-0-913750-20-9",
  LCCN =         "Z103 .W4",
  bibdate =      "Tue Dec 01 10:53:24 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$49.95",
  acknowledgement = ack-nhfb,
}

@Article{Williams:1979:CAA,
  author =       "P. W. Williams and D. Woodhead",
  title =        "Computer assisted analysis of cryptic crosswords",
  journal =      j-COMP-J,
  volume =       "22",
  number =       "1",
  pages =        "67--70",
  month =        feb,
  year =         "1979",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/compj1970.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C7830D (Computer games)",
  corpsource =   "Computation Dept., Univ. of Manchester, Manchester,
                 UK",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "BNF type definition; computer analysis program;
                 cryptic crosswords; games of skill; language LACROSS;
                 personal computing",
  treatment =    "A Application; P Practical",
}

@Article{Williams:1979:SRC,
  author =       "H. C. Williams and B. Schmid",
  title =        "Some remarks concerning the {M.I.T.} public-key
                 cryptosystem",
  journal =      j-BIT,
  volume =       "19",
  number =       "4",
  pages =        "525--538",
  month =        dec,
  year =         "1979",
  CODEN =        "BITTEL, NBITAB",
  DOI =          "http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/BF01931269",
  ISSN =         "0006-3835 (print), 1572-9125 (electronic)",
  ISSN-L =       "0006-3835",
  MRclass =      "94B99",
  MRnumber =     "80m:94072",
  bibdate =      "Wed Jan 4 18:52:16 MST 2006",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0006-3835&volume=19&issue=4;
                 http://www.math.utah.edu/pub/tex/bib/bit.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0006-3835&volume=19&issue=4&spage=525",
  acknowledgement = ack-nhfb,
  fjournal =     "BIT; Nordisk Tidskrift for Informationsbehandling
                 (BIT)",
  journal-URL =  "http://link.springer.com/journal/10543",
  referencedin = "Referenced in \cite[Ref. 25]{Kaliski:1995:SUR}.",
}

@Manual{Zeidler:1979:DDE,
  author =       "Howard M. Zeidler",
  title =        "Digital data encryption",
  organization = pub-SRI,
  address =      pub-SRI:adr,
  pages =        "20",
  year =         "1979",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Guidelines - SRI International, Business Intelligence
                 Program; no. 1044 Guidelines (Business Intelligence
                 Program (SRI International)); no. 1044",
  acknowledgement = ack-nhfb,
  annote =       "Cover title.",
  keywords =     "Computers --- Access control --- Passwords; Data
                 encryption (Computer science)",
}

@PhdThesis{Andelman:1980:MLE,
  author =       "Dov Andelman",
  title =        "Maximum likelihood estimation applied to
                 cryptanalysis",
  type =         "Thesis ({Ph.D.})",
  school =       "Department of Electrical Engineering, Stanford
                 University",
  address =      "Stanford, CA, USA",
  pages =        "viii + 167",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Maxima and minima.",
}

@TechReport{Anonymous:1980:ACS,
  author =       "Anonymous",
  title =        "An Assessment of civil sector uses of digital data
                 encryption",
  number =       "",
  institution =  "Department of Engineering and Public Policy,
                 Department of Social Sciences and School of Urban and
                 Public Affairs, Carnegie-Mellon University",
  address =      "Pittsburgh, PA, USA",
  pages =        "128",
  month =        nov,
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Draft version produced in April 1980, final revised
                 version produced November 1980.",
  keywords =     "Computers --- Access control; Digital communications;
                 Electronic data processing departments --- Security
                 measures.",
}

@Book{Bennett:1980:UWN,
  author =       "Ralph Francis Bennett",
  title =        "{Ultra} in the {West}: the {Normandy} campaign,
                 1944--45",
  publisher =    "Scribner",
  address =      "New York, NY, USA",
  pages =        "xvi + 336",
  year =         "1980",
  ISBN =         "0-684-16704-2",
  ISBN-13 =      "978-0-684-16704-6",
  LCCN =         "D756.5.N6 B44 1980",
  bibdate =      "Mon May 8 07:06:44 MDT 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$17.50",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Campaigns; France; Normandy;
                 Cryptography; Secret Service; Great Britain; Normandy
                 (France); History",
}

@Article{Berstis:1980:SPD,
  author =       "Viktors Berstis",
  title =        "Security and protection of data in the {IBM
                 System\slash 38}",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "8",
  number =       "3",
  pages =        "245--252",
  year =         "1980",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 16:54:57 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Book:1980:UDC,
  author =       "R. V. Book and Sai Choi Kwan",
  title =        "On Uniquely Decipherable Codes with Two Codewords",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-29",
  number =       "4",
  pages =        "324--325",
  month =        apr,
  year =         "1980",
  CODEN =        "ITCOB4",
  DOI =          "http://dx.doi.org/10.1109/TC.1980.1675571",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 10 19:15:25 MDT 2011",
  bibsource =    "http://www.computer.org/tc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1675571",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Book{Calvocoressi:1980:TSU,
  author =       "Peter Calvocoressi",
  title =        "Top secret ultra",
  publisher =    "Pantheon Books",
  address =      "New York, NY, USA",
  pages =        "132",
  year =         "1980",
  ISBN =         "0-394-51154-9",
  ISBN-13 =      "978-0-394-51154-2",
  LCCN =         "D810.C88C34 1980",
  bibdate =      "Tue Dec 01 08:23:32 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Estell:1980:BW,
  author =       "Robert G. Estell",
  title =        "Benchmarks and watermarks",
  journal =      j-SIGMETRICS,
  volume =       "9",
  number =       "3",
  pages =        "39--44",
  month =        "Fall",
  year =         "1980",
  CODEN =        "????",
  DOI =          "http://doi.acm.org/10.1145/1041883.1041885",
  ISSN =         "0163-5999 (print), 1557-9484 (electronic)",
  ISSN-L =       "0163-5999",
  bibdate =      "Thu Jun 26 10:55:53 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Historically, benchmark tests have been one of several
                 ways to size a computer system, and measure its
                 performance. Today, it is more important to test the
                 System Software than the machine hardware. (Thus the
                 term `watermark' (as on bond paper) for software
                 tests.) Watermarks of software suffer the same
                 limitations and risks as benchmarks of hardware: e.a.,
                 they should be supplemented with simulations, models,
                 and other analysis and design tools of our trade.
                 Perhaps most significantly, watermarks, like
                 benchmarks, can be biased by their creators.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMETRICS Performance Evaluation Review",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J618",
}

@TechReport{Gait:1980:CST,
  author =       "Jason Gait",
  title =        "Computer science and technology: maintenance testing
                 for the {Data Encryption Standard}",
  type =         "United States. National Bureau of Standards Special
                 publication",
  number =       "500-61",
  institution =  pub-NBS,
  address =      pub-NBS:adr,
  pages =        "25",
  year =         "1980",
  ISSN =         "0083-1883",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Manual{Gait:1980:MTD,
  author =       "Jason Gait",
  title =        "Maintenance testing for the {Data Encryption
                 Standard}",
  volume =       "500-61",
  number =       "500-61",
  organization = pub-NBS,
  address =      pub-NBS:adr,
  pages =        "iii + 25",
  month =        aug,
  year =         "1980",
  CODEN =        "XNBSAV",
  LCCN =         "T1.U52 no.500-61",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "NBS special publication Computer science and
                 technology",
  acknowledgement = ack-nhfb,
  govtdocnumber = "C 13.10:500-61 247",
  keywords =     "computers --- access control; Computers --- Access
                 control --- Passwords; cryptography --- data
                 processing; Cryptography --- Data processing; Data
                 encryption (Computer science); Electronic data
                 processing departments --- Security measures;
                 electronic data processing departments --- security
                 measures; Monte Carlo method",
}

@Manual{Gait:1980:VCH,
  author =       "Jason Gait",
  title =        "Validating the correctness of hardware implementations
                 of the {NBS Data Encryption Standard}",
  number =       "500-20",
  organization = pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "iv + 40",
  year =         "1980",
  LCCN =         "C 13.10:500-20/2 Government Information U.S.",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$2.25 (paperback)",
  series =       "NBS special publication. Computer science and
                 technology",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Code words; computers
                 --- access control --- code words; computers ---
                 testing; Computers --- Testing; Data encryption
                 (Computer science); data encryption (computer science);
                 Monte Carlo method",
}

@Book{Garlinski:1980:EW,
  author =       "J{\'o}zef Garli{\'n}ski",
  title =        "The {Enigma} war",
  publisher =    "Scribner",
  address =      "New York, NY, USA",
  pages =        "xx + 219 + 8",
  year =         "1980",
  ISBN =         "0-684-15866-3",
  ISBN-13 =      "978-0-684-15866-2",
  LCCN =         "D810.S7 G32 1980",
  bibdate =      "Tue Sep 4 06:00:21 MDT 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$14.95",
  acknowledgement = ack-nhfb,
  remark =       "Original British edition \cite{Garlinski:1979:IEW}.",
  subject =      "World War, 1939-1945; Secret service; Cryptography",
}

@Article{Goethals:1980:CAL,
  author =       "J.-M. Goethals and C. Couvreur",
  title =        "A cryptanalytic attack on the {Lu-Lee} public-key
                 cryptosystem",
  journal =      j-PHILIPS-J-RES,
  volume =       "35",
  number =       "4-5",
  pages =        "301--306",
  year =         "1980",
  CODEN =        "PHJRD9",
  ISSN =         "0165-5817",
  ISSN-L =       "0165-5817",
  MRclass =      "94A99",
  MRnumber =     "82b:94018",
  MRreviewer =   "Tai Yang Hwang",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Philips Journal of Research",
}

@Book{Hamming:1980:CIT,
  author =       "R. W. (Richard Wesley) Hamming",
  title =        "Coding and information theory",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "xii + 239",
  year =         "1980",
  ISBN =         "0-13-139139-9",
  ISBN-13 =      "978-0-13-139139-0",
  LCCN =         "QA268 .H35 1980",
  bibdate =      "Fri Jun 24 21:02:55 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$19.95",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Information theory",
}

@MastersThesis{Hood:1980:EFS,
  author =       "William Chester Hood",
  title =        "Encryption as a file security measure in large
                 operating systems",
  type =         "Thesis ({M.S.})",
  school =       "University of Tennessee, Knoxville",
  address =      "Knoxville, TN, USA",
  pages =        "iv + 116",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "[103]-112.",
  keywords =     "Computers --- Access control.",
}

@TechReport{Knuth:1980:DLC,
  author =       "Donald E. Knuth",
  title =        "Deciphering a linear congruential encryption",
  type =         "Report",
  number =       "024800",
  institution =  "Department of Computer Science, Stanford University",
  address =      "Stanford, CA, USA",
  year =         "1980",
  bibdate =      "Wed Feb 22 13:51:32 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  remark =       "Published in \cite{Knuth:1985:DLC}.",
}

@Article{Konheim:1980:ICP,
  author =       "Alan G. Konheim and Marian H. Mack and Robert K.
                 McNeill and Bryant Tuckerman and Gerald Waldbaum",
  title =        "The {IPS} Cryptographic Programs",
  journal =      j-IBM-SYS-J,
  volume =       "19",
  number =       "2",
  pages =        "253--283",
  year =         "1980",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/ibmsysj.bib",
  abstract =     "Cryptographic methods of data protection have taken on
                 new importance as computers have become faster and as
                 strong cryptographic algorithms, such as the Data
                 Encryption Standard (DES), have become available. But a
                 standard encipherment technique is only the first step
                 in applying cryptography in a computing center. This
                 paper discusses the Information Protection System
                 (IPS), a set of cryptographic application programs
                 designed to use the DES algorithm in a working
                 computing center. In designing IPS, several important
                 augmentations of DES were formulated.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; information protection system",
}

@Article{Leiss:1980:NSS,
  author =       "E. Leiss",
  title =        "A note on a signature system based on probabilistic
                 logic",
  journal =      j-INFO-PROC-LETT,
  volume =       "11",
  number =       "2",
  pages =        "110--113",
  day =          "??",
  month =        oct,
  year =         "1980",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "C4210 (Formal logic); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Computer Sci., Univ. of Houston, Houston, TX,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "data privacy; digitalised signature system;
                 probabilistic logic; requirements",
  treatment =    "A Application",
}

@Article{Lu:1980:AEG,
  author =       "Shyue Ching Lu",
  title =        "Addition to: {``The existence of good cryptosystems
                 for key rates greater than the message redundancy''
                 [IEEE Trans. Inform. Theory {\bf 25} (1979), no. 4,
                 475--477;\ MR 80g:94069]}",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "26",
  number =       "1",
  pages =        "129--129",
  year =         "1980",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1980.1056129",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94B99",
  MRnumber =     "80g:94069b",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Luccio:1980:CMC,
  author =       "F. Luccio and S. Mazzone",
  title =        "A cryptosystem for multiple communication",
  journal =      j-INFO-PROC-LETT,
  volume =       "10",
  number =       "4--5",
  pages =        "180--183",
  day =          "5",
  month =        jul,
  year =         "1980",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Nov 17 10:49:43 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See notes \cite{Meijer:1981:NCM,Hellman:1981:ACA}.",
  acknowledgement = ack-nhfb,
  classification = "723; B6120B (Codes); B6210L (Computer
                 communications); C5620 (Computer networks and
                 techniques); C6130 (Data handling techniques)",
  corpsource =   "Univ. of Pisa, Pisa, Italy",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "authentication; computer networks; cryptosystem;
                 cryptosystems; data transmission; encoding; multiple
                 communication; security of data",
  treatment =    "P Practical",
}

@InProceedings{Merkle:1980:PPK,
  author =       "R. C. Merkle",
  title =        "Protocols for public key cryptosystems",
  crossref =     "IEEE:1980:PSS",
  pages =        "??--??",
  year =         "1980",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 22]{Goldreich:1997:FMCb}.",
}

@Manual{NBS:1980:MO,
  author =       "{National Bureau of Standards}",
  title =        "{DES} Modes of Operation",
  volume =       "81",
  organization = "U. S. Department of Commerce",
  address =      "Washington, DC, USA",
  pages =        "16",
  month =        dec,
  year =         "1980",
  LCCN =         "C 13.52:81",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Federal information processing standards publication",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 22]{Biham:1998:TA}.",
  xxISBN =       "none",
}

@Book{Pearcey:1980:EDS,
  author =       "T. (Trevor) Pearcey",
  title =        "Encryption in data systems and communication",
  publisher =    "Caulfield Institute of Technology. Computer Abuse
                 Research and Bureau (CITCARB)",
  address =      "Caulfield, Victoria, Australia",
  pages =        "99",
  year =         "1980",
  ISBN =         "0-909176-14-0",
  ISBN-13 =      "978-0-909176-14-3",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Cover title. At head of title: Caulfield Institute of
                 Technology. CITCARB. [1]-10.",
  keywords =     "Cryptography; Data transmission systems --- Security
                 measures",
}

@Article{Pomerance:1980:P,
  author =       "Carl Pomerance and J. L. Selfridge and Samuel S.
                 {Wagstaff, Jr.}",
  title =        "The Pseudoprimes to $ 25 \cdot 10^9 $",
  journal =      j-MATH-COMPUT,
  volume =       "35",
  number =       "151",
  pages =        "1003--1026",
  month =        jul,
  year =         "1980",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  MRclass =      "10A40 (10-04 10A25)",
  MRnumber =     "82g:10030",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "B0210 (Algebra); C1110 (Algebra)",
  corpsource =   "Dept. of Math., Univ. of Illinois, Urbana, IL, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "Carmichael numbers; counting function; Lucas
                 sequences; mathematical analysis; primality;
                 pseudoprimes",
  referencedin = "Referenced in \cite[Ref. 9]{Silverman:1997:FGR}.",
  treatment =    "T Theoretical or Mathematical",
}

@Book{Pritchard:1980:DE,
  author =       "John Arthur Thomas (John A. T.) Pritchard",
  title =        "Data encryption",
  publisher =    pub-NAT-COMP-CENTRE,
  address =      pub-NAT-COMP-CENTRE:adr,
  pages =        "126 (or 118??)",
  year =         "1980",
  ISBN =         "0-85012-253-8",
  ISBN-13 =      "978-0-85012-253-4",
  LCCN =         "QA76.9.A25 P7",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "and bibliographies.",
  keywords =     "Computers --- Access control --- Passwords.",
}

@Book{Pronzini:1980:MCC,
  author =       "Bill Pronzini",
  title =        "Mummy!: a chrestomathy of crypt-ology",
  publisher =    "Arbor House",
  address =      "New York, NY, USA",
  pages =        "xii + 273",
  year =         "1980",
  ISBN =         "0-87795-271-X",
  ISBN-13 =      "978-0-87795-271-8",
  LCCN =         "PN 6120.95 M77 M86 1980",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Contents: Doyle, A.C. Lot no. 249.--Poe, E.A. Some
                 words with a mummy.--Benson, E.F. Monkeys.--Wollheim,
                 D.A. Bones.--Williams, T. The vengeance of
                 Nitocris.--Gautier, T. The mummy's foot.--Bloch, R. The
                 eyes of the mummy.--Powell, T. Charlie.--Hoch, E.D. The
                 weekend magus.--Lansdale, J.R. The princess.--Mayhar,
                 A. The eagle-claw rattle.--Grant, C.L. The other
                 room.--Malzberg, B.N. Revelation in seven
                 stages.--Bibliography.",
  price =        "US\$10.95",
  acknowledgement = ack-nhfb,
  keywords =     "mummies --- fiction",
}

@Article{Shulman:1980:BRB,
  author =       "David Shulman",
  title =        "Book Review: {{\booktitle{United States diplomatic
                 codes and ciphers 1775--1938}}: By Ralph E. Weber.
                 Chicago. xviii + 633 pp. Illus. \$49.95}",
  journal =      j-HIST-MATH,
  volume =       "7",
  number =       "4",
  pages =        "452--454",
  month =        nov,
  year =         "1980",
  CODEN =        "HIMADS",
  ISSN =         "0315-0860 (print), 1090-249X (electronic)",
  ISSN-L =       "0315-0860",
  bibdate =      "Wed Jun 26 06:17:21 MDT 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/histmath.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0315086080900142",
  acknowledgement = ack-nhfb,
  fjournal =     "Historia Mathematica",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03150860",
}

@Article{Snyder:1980:CAP,
  author =       "Samuel S. Snyder",
  title =        "Computer Advances Pioneered by Cryptologic
                 Organizations",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "2",
  number =       "1",
  pages =        "60--70",
  month =        jan # "\slash " # mar,
  year =         "1980",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:17 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1980/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1980/pdf/a1060.pdf;
                 http://www.computer.org/annals/an1980/a1060abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@MastersThesis{Sorkis:1980:USM,
  author =       "Michael Sorkis",
  title =        "Use of statistically matched codes in a data
                 encryption system",
  type =         "Thesis ({M.S.})",
  school =       "Southern Illinois University at Carbondale",
  address =      "Carbondale, IL, USA",
  pages =        "v + 91",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Book{USWD:1980:EC,
  author =       "{United States. War Dept} and {United States.
                 Adjutant-General's Office}",
  title =        "Elements of cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "165",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Training pamphlet; no. 3 War Dept document; no. 117
                 Training pamphlet (United States. War Dept.); no. 3.
                 Document (United States. War Dept.); no. 117",
  acknowledgement = ack-nhfb,
  annote =       "Photocopy.",
  keywords =     "Ciphers; Cryptography.",
}

@Article{Voukalis:1980:DFC,
  author =       "D. C. Voukalis",
  title =        "The distance factor in cryptosystems",
  journal =      j-INT-J-ELECTRON,
  volume =       "49",
  number =       "1",
  pages =        "73--75",
  year =         "1980",
  CODEN =        "IJELA2",
  ISSN =         "0020-7217",
  ISSN-L =       "0020-7217",
  MRclass =      "94B99",
  MRnumber =     "82k:94021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "International Journal of Electronics",
}

@Article{Voukalis:1980:GSE,
  author =       "D. C. Voukalis",
  title =        "A good solution of the encryption problem using matrix
                 code, distance factor and {PN} sequences",
  journal =      "Internat. J. Electron.",
  volume =       "48",
  number =       "3",
  pages =        "271--274",
  year =         "1980",
  CODEN =        "IJELA2",
  ISSN =         "0020-7217",
  MRclass =      "94A99",
  MRnumber =     "82b:94020",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "International Journal of Electronics",
}

@MastersThesis{Wells:1980:ADB,
  author =       "David L. Wells",
  title =        "Achieving data base protection through the use of
                 subkey encryption",
  type =         "Thesis ({Doctor of Engineering})",
  school =       "University of Wisconsin-Milwaukee",
  address =      "Milwaukee, WI, USA",
  pages =        "131",
  year =         "1980",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Electronic data processing departments --- Security
                 measures.",
}

@Article{Williams:1980:MRP,
  author =       "H. C. Williams",
  title =        "A modification of the {RSA} public-key encryption
                 procedure",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "26",
  number =       "6",
  pages =        "726--729",
  year =         "1980",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1980.1056264",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94B99 (10A25)",
  MRnumber =     "81k:94041",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{ACE:1981:RPC,
  author =       "{American Council on Education}",
  title =        "Report of the {Public Cryptography Study Group}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "435--450",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jan 28 14:37:22 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See the opposing view in \cite{Davida:1981:CAR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@TechReport{Ahlswede:1981:BCG,
  author =       "R. Ahlswede and G. Dueck",
  title =        "Bad codes are good ciphers",
  type =         "Report",
  institution =  "Universit{\"a}t Bielefeld",
  address =      "Bielefeld, Germany",
  year =         "1981",
  bibdate =      "Sat Apr 20 12:15:46 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Submitted in Nov. 1980 to the proceedings of the
                 International Colloquium on Information Theory, to be
                 held at Budapest in August 1981.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:1981:CHP,
  author =       "Anonymous",
  title =        "Corrections: {How Polish Mathematicians Deciphered the
                 Enigma, 3(3) 232}, {Reviews: H. H. Goldstine: A History
                 of Numerical Analysis, 3(3) 293}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "4",
  pages =        "407--407",
  month =        oct # "\slash " # dec,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 01 10:35:25 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Rejewski:1981:HPM,Salzer:1981:RHH}.",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a4400.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{Anonymous:1981:GIU,
  author =       "Anonymous",
  title =        "Guidelines for implementing and using the {NBS} Data
                 Encryption Standard",
  volume =       "74",
  publisher =    pub-NBS,
  address =      pub-NBS:adr,
  pages =        "39",
  year =         "1981",
  ISSN =         "0083-1816",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "United States. National Bureau of Standards. Federal
                 information processing standards publication, FIPS
                 PUB",
  acknowledgement = ack-nhfb,
}

@Article{Asmuth:1981:EAC,
  author =       "C. A. Asmuth and G. R. Blakley",
  title =        "An efficient algorithm for constructing a cryptosystem
                 which is harder to break than two other cryptosystems",
  journal =      j-COMP-MATH-APPL,
  volume =       "7",
  number =       "6",
  pages =        "447--450",
  year =         "1981",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94B99 (68C05)",
  MRnumber =     "83d:94020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
}

@Article{Ayoub:1981:EKR,
  author =       "F. Ayoub",
  title =        "Encryption with keyed random permutations",
  journal =      j-ELECT-LETTERS,
  volume =       "17",
  number =       "17",
  pages =        "583--585",
  year =         "1981",
  CODEN =        "ELLEAK",
  ISSN =         "0013-5194",
  ISSN-L =       "0013-5194",
  MRclass =      "94B25 (05A05)",
  MRnumber =     "82h:94023",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Electronics Letters",
}

@Article{Baum:1981:RPC,
  author =       "Werner A. Baum and David H. Brandin and R. Creighton
                 Buck and George I. Davida and George Handelman and
                 Martin E. Hellman and Ira Michael Heyman and Wilfred
                 Kaplan and Daniel C. Schwartz",
  title =        "Report of the {Public Cryptography Study Group},
                 prepared for {American Council on Education, One Dupont
                 Circle, Washington, DC 20036, February 7, 1981}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "435--445",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jan 28 14:37:22 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See the opposing view in \cite{Davida:1981:CAR}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Beesly:1981:CIW,
  author =       "Patrick Beesly",
  title =        "Cryptanalysis and its influence on the war at sea
                 1914--1918",
  publisher =    "U.S. Naval Academy",
  address =      "Annapolis, MD, USA",
  pages =        "13",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Xerox copy.",
  xxnote =       "Check publisher??",
}

@Article{Booth:1981:ASU,
  author =       "K. S. Booth",
  title =        "Authentication of Signatures Using Public Key
                 Encryption",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "772--774",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Sep 22 11:36:41 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "One of Needham and Schroeder's proposed signature
                 authentication protocols is shown to fail when there is
                 a possibility of compromised keys: this invalidates one
                 of the applications of their technique. A more
                 elaborate mechanism is proposed which does not require
                 a network clock, but does require a third party to the
                 transaction. The latter approach is shown to be
                 reliable in a fairly strong sence.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Brownell:1981:ODN,
  author =       "George A. Brownell",
  title =        "The origin and development of the {National Security
                 Agency}",
  volume =       "35",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "x + 98",
  year =         "1981",
  ISBN =         "0-89412-054-9",
  ISBN-13 =      "978-0-89412-054-1",
  LCCN =         "UB290 .B76 1981",
  bibdate =      "Mon Sep 13 06:41:04 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Edited by Wayne G. Barker. Originally published as
                 report of the Ad hoc Committee to Study the
                 Communications Intelligence Activities of the United
                 States, George A. Brownell, chairman.",
  series =       "A cryptographic series",
  acknowledgement = ack-nhfb,
}

@Article{Burchard:1981:NNF,
  author =       "Hank Burchard",
  title =        "News and Notices: {Finerman and Lee Receive ACM
                 Awards}; Summer Positions at {Digital Computer Museum};
                 {CBI Fellowship 1982--1983}; {GMD} Activities in the
                 History of Computing; Request for Articles; {Edwards}
                 Speaks at {Digital Computer Museum}; Exhibit of Cipher
                 Machines",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "4",
  pages =        "410--413",
  month =        oct # "\slash " # dec,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:18 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1981/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a4410.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{CBEMA:1981:ANS,
  author =       "{Computer and Business Equipment Manufacturers
                 Association} and {American National Standards
                 Institute}",
  title =        "{American National Standard Data Encryption
                 Algorithm}",
  publisher =    pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "16",
  day =          "30",
  month =        dec,
  year =         "1981",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "ANSI X3.92-1981.",
  acknowledgement = ack-nhfb,
  keywords =     "coding theory --- standards --- United States;
                 computers --- access control --- standards --- United
                 States; data protection --- standards --- United
                 States",
}

@Article{Chaum:1981:UEM,
  author =       "D. Chaum",
  title =        "Untraceable electronic mail, return addresses, and
                 digital pseudonyms",
  journal =      j-CACM,
  volume =       "24",
  number =       "2",
  pages =        "84--88",
  month =        feb,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1019.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "information hiding; steganography",
}

@Book{Clark:1981:ECC,
  author =       "George C. {Clark, Jr.} and J. Bibb Cain",
  title =        "Error-correction coding for digital communications",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  pages =        "xii + 422",
  year =         "1981",
  ISBN =         "0-306-40615-2",
  ISBN-13 =      "978-0-306-40615-7",
  LCCN =         "TK5102.5 .C52",
  bibdate =      "Mon Nov 30 08:53:48 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Periodical{Crypto:1981:ACP,
  author =       "CRYPTO",
  title =        "Advances in cryptology: proceedings of {CRYPTO}",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  pages =        "various",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Volumes for 1984 to 1989 were published in the
                 Springer-Verlag Lecture Notes in Computer Science
                 series.",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Congresses;
                 Cryptography --- Congresses.",
}

@Article{Davida:1981:CAR,
  author =       "George I. Davida",
  title =        "The Case Against Restraints on Non-Governmental
                 Research in Cryptography",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "445--450",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jan 28 14:39:33 1997",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This is an opposing view published with
                 \cite{ACE:1981:RPC}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Davida:1981:DES,
  author =       "George I. Davida and David L. Wells and John B. Kam",
  title =        "A Database Encryption System with Subkeys",
  journal =      j-TODS,
  volume =       "6",
  number =       "2",
  pages =        "312--328",
  month =        jun,
  year =         "1981",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  MRclass =      "68B15",
  MRnumber =     "82f:68020",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "Compendex database; Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1981-6-2/p312-davida/p312-davida.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1981-6-2/p312-davida/",
  abstract =     "A new cryptosystem that is suitable for database
                 encryption is presented. The system has the important
                 property of having subkeys that allow the encryption
                 and decryption of fields within a record. The system is
                 based on the Chinese Remainder Theorem.",
  acknowledgement = ack-nhfb,
  annote =       "Subkeys allow the encryption and decryption of fields
                 within a record. The system is based on the Chinese
                 Remainder Theorem.",
  classification = "723",
  fjournal =     "Association for Computing Machinery. Transactions on
                 Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "codes, symbolic; data base systems; data security;
                 databases; decryption; encryption; subkeys",
  subject =      "Data --- Data Encryption (E.3)",
}

@Article{Denning:1981:MKG,
  author =       "Dorothy E. Denning and Fred B. Schneider",
  title =        "Master keys for group sharing",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "1",
  pages =        "23--25",
  day =          "13",
  month =        feb,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94B99",
  MRnumber =     "82d:94046",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also note \cite{Brouwer:1982:NMK}.",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes)",
  corpsource =   "Computer Sci. Dept., Purdue Univ., W. Lafayette, IN,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "Diffie and Hellman's public-key distribution scheme;
                 encoding; group sharing; master key; Shamir's threshold
                 scheme",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Denning:1981:MMK,
  author =       "D. E. Denning and H. Meijer and F. B. Schneider",
  title =        "More on master keys for group sharing",
  journal =      j-INFO-PROC-LETT,
  volume =       "13",
  number =       "3",
  pages =        "125--126",
  day =          "13",
  month =        dec,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C0230 (Economic, social and
                 political aspects of computing); C6130 (Data handling
                 techniques)",
  corpsource =   "Computer Sci. Dept., Purdue Univ., West Lafayette, IN,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "cryptography; encryption; group sharing; master keys",
  treatment =    "P Practical",
}

@Article{Denning:1981:SRR,
  author =       "Peter J. Denning and David H. Brandin",
  title =        "Special Report: Report of the {Public Cryptography
                 Study Group}",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "434--434",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 01 07:47:27 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Gifford:1981:CSI,
  author =       "David K. Gifford",
  title =        "Cryptographic sealing for information secrecy and
                 authentication",
  journal =      j-OPER-SYS-REV,
  volume =       "15",
  number =       "5",
  pages =        "123--124",
  month =        dec,
  year =         "1981",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:53 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Hellman:1981:ACA,
  author =       "M. E. Hellman",
  title =        "Another cryptanalytic attack on {``A cryptosystem for
                 multiple communication''} {[Inform. Process. Lett. {\bf
                 10}(4--5), 5 July 1980, pp. 180--183]}",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "4",
  pages =        "182--183",
  day =          "13",
  month =        aug,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Luccio:1980:CMC,Meijer:1981:NCM}.",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes)",
  corpsource =   "Dept. of Electrical Engng., Stanford Univ., Stanford,
                 CA, USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "authentification; cryptography; cryptosystem; data
                 communication systems; multiple communication; plain
                 text attack; security; text attack",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Henry:1981:BJB,
  author =       "P. S. Henry",
  title =        "{B.S.T.J.} Briefs: Fast Decryption Algorithm for the
                 Knapsack Cryptographic System",
  journal =      j-BELL-SYST-TECH-J,
  volume =       "60",
  number =       "5",
  pages =        "767--773",
  month =        may # "--" # jun,
  year =         "1981",
  CODEN =        "BSTJAN",
  ISSN =         "0005-8580",
  bibdate =      "Tue Nov 9 11:15:56 MST 2010",
  bibsource =    "http://bstj.bell-labs.com/oldfiles/year.1981/BSTJ.1981.6005.html;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://bstj.bell-labs.com/BSTJ/images/Vol60/bstj60-5-767.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Bell System Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
}

@TechReport{Hershey:1981:DLP,
  author =       "J. E. (John E.) Hershey",
  title =        "The discrete logarithm public cryptographic system",
  type =         "NTIA report",
  number =       "81-81, PB82-130097",
  institution =  "U.S. Dept. of Commerce, National Telecommunications
                 and Information Administration",
  address =      "Washington, DC, USA (??)",
  pages =        "iv + 40",
  month =        sep,
  year =         "1981",
  LCCN =         "C 60.10: 81-81 Govt Pub",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; finite fields (algebra)",
}

@TechReport{IDC:1981:DE,
  author =       "{International Data Corporation}",
  title =        "Data encryption",
  type =         "Research memorandum",
  number =       "IDC \#ISPS-M81-10.",
  institution =  "International Data Corporation",
  address =      "Framingham, MA, USA",
  pages =        "30",
  month =        oct,
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ingemarsson:1981:UAS,
  author =       "Ingemar Ingemarsson and C. K. Wong",
  title =        "Use Authentication Scheme for Shared Data Based on a
                 Trap-Door One-Way Function",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "2",
  pages =        "63--67",
  month =        apr,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Jan 29 09:23:05 MST 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "data base systems",
}

@TechReport{IRD:1981:DTV,
  author =       "{International Resource Development, Inc.}",
  title =        "Data, text, and voice encryption equipment",
  type =         "Report",
  number =       "183",
  institution =  "IRD",
  address =      "30 High St., Norwalk, CT 06851, USA",
  pages =        "vi + 154",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography equipment industry; Cryptography
                 equipment industry --- United States; Market surveys
                 --- United States.",
}

@TechReport{Juenemann:1981:DES,
  author =       "Robert R. Juenemann",
  title =        "The {Data Encryption Standard} vs. Exhaustive Search",
  type =         "Report",
  institution =  "Satellite Business Systems",
  address =      "McLean, VA, USA",
  day =          "5",
  month =        feb,
  year =         "1981",
  bibdate =      "Fri May 21 14:57:54 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Konheim:1981:CP,
  author =       "Alan G. Konheim",
  title =        "Cryptography, a primer",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xiv + 432",
  year =         "1981",
  ISBN =         "0-471-08132-9",
  ISBN-13 =      "978-0-471-08132-6",
  LCCN =         "Z103 .K66 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "A Wiley-interscience publication",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; telecommunication ---
                 security measures",
}

@Article{Lamport:1981:TNP,
  author =       "Leslie Lamport",
  title =        "Technical Note: Password Authentication with Insecure
                 Communication",
  journal =      j-CACM,
  volume =       "24",
  number =       "11",
  pages =        "770--772",
  month =        nov,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 06:57:19 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm24.html#Lamport81;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  oldlabel =     "Lamport81",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Lamport81",
}

@Book{Lange:1981:TC,
  author =       "Andr{\'e} Lange and E. A. Soudart",
  title =        "Treatise on cryptography",
  volume =       "36",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "xvi + 168",
  year =         "1981",
  ISBN =         "0-89412-055-7 (paperback)",
  ISBN-13 =      "978-0-89412-055-8 (paperback)",
  LCCN =         "Z104.L2613 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: Traite de cryptographie / par
                 Andr{\'e} Lange et E.-A. Soudart. ``Plus many problems
                 in French for the solver''",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Langie:1981:CSS,
  author =       "Andre Langie",
  title =        "Cryptography: a study on secret writings",
  volume =       "38",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "vii + 192",
  year =         "1981",
  ISBN =         "0-89412-061-1",
  ISBN-13 =      "978-0-89412-061-9",
  LCCN =         "Z104 .L28 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: De la cryptographie. Reprint of an
                 unspecified previous ed. Bibliography: p. 158.",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography",
}

@Book{Lauer:1981:CSC,
  author =       "Rudolph F. Lauer",
  title =        "Computer simulation of classical substitution
                 cryptographic systems",
  volume =       "32",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "xi + 111",
  year =         "1981",
  ISBN =         "0-89412-050-6",
  ISBN-13 =      "978-0-89412-050-3",
  LCCN =         "Z104 .L38 1981",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "basic (computer program language); cryptography;
                 cryptography -- computer programs; electronic data
                 processing -- cryptography",
}

@Article{Lieberherr:1981:UCD,
  author =       "K. Lieberherr",
  title =        "Uniform complexity and digital signatures",
  journal =      j-THEOR-COMP-SCI,
  volume =       "16",
  number =       "1",
  pages =        "99--110",
  month =        oct,
  year =         "1981",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:36:07 MST 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/tcs1980.bib",
  acknowledgement = ack-nhfb,
  classification = "C4240 (Programming and algorithm theory)",
  corpsource =   "Dept. of Electrical Engng. and Computer Sci.,
                 Princeton Univ., Princeton, NJ, USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "computational complexity; digital signatures; security
                 of data; signature checking; signature production;
                 uniform complexity",
  pubcountry =   "Netherlands",
  treatment =    "T Theoretical or Mathematical",
}

@Article{McEliece:1981:SSR,
  author =       "R. J. McEliece and D. V. Sarwate",
  title =        "On sharing secrets and {Reed--Solomon} codes",
  journal =      j-CACM,
  volume =       "24",
  number =       "9",
  pages =        "583--584",
  month =        sep,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "94B35",
  MRnumber =     "82h:94024",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@TechReport{Meijer:1981:DSS,
  author =       "Henk Meijer and Selim G. Akl",
  title =        "Digital signature schemes",
  type =         "Technical report",
  number =       "81-120",
  institution =  "Department of Computing and Information Science,
                 Queen's University",
  address =      "Kingston, ON, Canada",
  pages =        "10",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Meijer:1981:NCM,
  author =       "H. Meijer",
  title =        "A note on {``A cryptosystem for multiple
                 communication''} {[Inform. Process. Lett. {\bf
                 10}(4--5), 5 July 1980, pp. 180--183]}",
  journal =      j-INFO-PROC-LETT,
  volume =       "12",
  number =       "4",
  pages =        "179--181",
  day =          "13",
  month =        aug,
  year =         "1981",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Luccio:1980:CMC,Hellman:1981:ACA}.",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes)",
  corpsource =   "Dept. of Math. and Statistics, Queen's Univ.,
                 Kingston, Ont., Canada",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "cryptography; cryptosystem; cyphertext; data
                 communication systems; multiple communication; node;
                 plain-text attack; secret messages; security",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Merkle:1981:SME,
  author =       "Ralph C. Merkle and Martin E. Hellman",
  title =        "On the Security of Multiple Encryption",
  journal =      j-CACM,
  volume =       "24",
  number =       "7",
  pages =        "465--467",
  month =        jul,
  year =         "1981",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68K05 (94A24 94B99)",
  MRnumber =     "82f:68103",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
                 http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  referencedin = "Referenced in \cite[Ref. 20]{Biham:1998:TA}.",
}

@MastersThesis{Mulherin:1981:FDE,
  author =       "Michael Hugh Mulherin",
  title =        "A file data encryption system using {Galois} fields",
  volume =       "52731",
  type =         "Thesis ({M.Sc.Cs.})",
  publisher =    "National Library of Canada",
  school =       "University of New Brunswick",
  address =      "Ottawa, ON, Canada",
  pages =        "174",
  year =         "1981",
  ISBN =         "0-315-04837-9",
  ISBN-13 =      "978-0-315-04837-9",
  ISSN =         "0227-3845",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "2 microfiche(s) (174 fr.)",
  series =       "Canadian theses on microfiche = Th{\`e}ses canadiennes
                 sur microfiche",
  acknowledgement = ack-nhfb,
}

@Article{Muller:1981:SRP,
  author =       "Winfried B. M{\"u}ller and Wilfried N{\"o}bauer",
  title =        "Some remarks on public-key cryptosystems",
  journal =      "Studia Sci. Math. Hungar.",
  volume =       "16",
  number =       "1-2",
  pages =        "71--76",
  year =         "1981",
  CODEN =        "SSMHAX",
  ISSN =         "0081-6906",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "85e:94018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Studia Scientiarum Mathematicarum Hungarica. A
                 Quarterly of the Hungarian Academy of Sciences",
}

@Book{OConnell:1981:CDE,
  author =       "Richard O'Connell",
  title =        "Crypto-ease: a data encryption dictionary",
  publisher =    "Atlantis Editions",
  address =      "Philadelphia, PA, USA",
  pages =        "33",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Dictionaries;
                 Dictionaries; Electronic data processing departments
                 --- Security measures",
}

@TechReport{Rabin:1981:HES,
  author =       "Michael O. Rabin",
  title =        "How to exchange secrets by oblivious transfer",
  type =         "Technical Report",
  number =       "TR-81",
  institution =  "Aiken Computation Laboratory, Harvard University",
  address =      "Cambridge, MA, USA",
  year =         "1981",
  bibdate =      "Sun Mar 11 11:14:25 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://eprint.iacr.org/2005/187.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Rejewski:1981:HPM,
  author =       "Marian Rejewski",
  title =        "How {Polish} Mathematicians Deciphered the {Enigma}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "3",
  pages =        "213--234",
  month =        jul # "\slash " # sep,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:18 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1981/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Afterwords by Cipher A. Deavours and I. J. Good. This
                 article was entitled ``Jak matematycy polscy
                 rozszyfrowz Enigmg{\c{e}}'' in the Annals of the Polish
                 Mathematical Society, Series II, Wiadomo{\'s}ci
                 Matematyczne, Volume 23, 1980, 1-28, translated by Joan
                 Stepenske. See minor correction
                 \cite{Anonymous:1981:CHP}.",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a3213.pdf;
                 http://www.computer.org/annals/an1981/a3213abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Salzer:1981:RHH,
  author =       "Herbert E. Salzer and Eric A. Weiss and Henry S. Tropp
                 and Jane Smith and Robert W. Rector",
  title =        "Reviews: {H. H. Goldstine: A History of Numerical
                 Analysis}; {Electronics: An Age of Innovation}; {J. A.
                 N. Lee: Banquet Anecdotes and Conference Excerpts}; {R.
                 L. Wexelblat: History of Programming Languages}:
                 Capsule Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "3",
  number =       "3",
  pages =        "289--302",
  month =        jul # "\slash " # sep,
  year =         "1981",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:18 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1981/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See minor correction \cite{Anonymous:1981:CHP}.",
  URL =          "http://dlib.computer.org/an/books/an1981/pdf/a3289.pdf;
                 http://www.computer.org/annals/an1981/a3289abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@MastersThesis{Seshadri:1981:KPP,
  author =       "Raghavan Seshadri",
  title =        "Knapsack problems in public key encryption systems",
  type =         "Thesis ({M.S.})",
  school =       "University of Oklahoma",
  address =      "Norman, OK, USA",
  pages =        "vii + 99",
  year =         "1981",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Sidhu:1981:APG,
  author =       "Deepinder P. Sidhu",
  title =        "Authentication Protocols for General Communication
                 Channels",
  crossref =     "IEEE:1981:CLC",
  pages =        "30--40",
  year =         "1981",
  bibdate =      "Sat Sep 25 20:21:07 MDT 1999",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Brookhaven Natl Lab, Upton, NY,USA",
  classification = "723; 731",
  conference =   "6th Conference on Local Computer Networks",
  conflocation = "Minneapolis, MN, USA",
  journalabr =   "Conf Local Comput Networks",
  keywords =     "authentication protocols; communication channels;
                 completeness; computer networks; deadlock freeness;
                 encryption; fifo channels; liveness; non-fifo channels;
                 public-key encryption",
  meetingaddress = "Minneapolis, MN, USA",
  sponsor =      "Univ of Minn, Comput Cent, Minneapolis, USA; IEEE,
                 Twin Cities Chapter, USA; IEEE Comput Soc Tech Comm on
                 Comput Commun, Los Alamitos, Calif, USA",
}

@Book{USNBS:1981:GIU,
  author =       "{United States. National Bureau of Standards}",
  title =        "Guidelines for implementing and using the {NBS Data
                 Encryption Standard}: category: {ADP} operations,
                 subcategory: computer security",
  publisher =    pub-NBS,
  address =      pub-NBS:adr,
  pages =        "39",
  day =          "1",
  month =        apr,
  year =         "1981",
  CODEN =        "FIPPAT",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "FIPS Pub; 74",
  acknowledgement = ack-nhfb,
  keywords =     "Computer networks --- Security measures --- Standards;
                 Computers --- Access control --- Standards; Electronic
                 data processing departments --- Security measures;
                 Standards",
}

@Article{Wegman:1981:NHF,
  author =       "Mark N. Wegman and J. Lawrence Carter",
  title =        "New Hash Functions and Their Use in Authentication and
                 Set Equality",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "22",
  number =       "3",
  pages =        "265--279",
  month =        jun,
  year =         "1981",
  CODEN =        "JCSSBM",
  ISSN =         "0022-0000",
  ISSN-L =       "0022-0000",
  bibdate =      "Sat Jan 25 17:38:12 MST 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  abstract =     "In this paper we exhibit several new classes of hash
                 functions with certain desirable properties, and
                 introduce two novel applications for hashing which make
                 use of these functions. One class contains a small
                 number of functions, yet is almost universal2. If the
                 functions hash n-bit long names into m-bit indices,
                 then specifying a member of the class requires only
                 O((m + log2 log2(n)) g log2(n)) bits as compared to
                 O(n) bits for earlier techniques. For long names, this
                 is about a factor of m larger than the lower bound of $
                 m + \log_2 n \log_2 m $ bits. An application of this
                 class is a provably secure authentication technique for
                 sending messages over insecure lines. A second class of
                 functions satisfies a much stronger property than
                 universal2. We present the application of testing sets
                 for equality. The authentication technique allows the
                 receiver to be certain that a message is genuine. An
                 ``enemy'' even one with infinite computer resources
                 cannot forge or modify a message without detection. The
                 set equality technique allows operations including
                 ``add member to set,'' ``delete member from set,'' and
                 ``test two sets for equality'' to be performed in
                 expected constant time and with less than a specified
                 probability of error.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
  journalabr =   "J Comput Syst Sci",
  keywords =     "computer metatheory; cryptography; hash functions",
}

@Book{Anonymous:1982:CC,
  author =       "Anonymous",
  title =        "A course in cryptanalysis",
  volume =       "33, 34",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  year =         "1982",
  ISBN =         "0-89412-052-2 (vol. 1), 0-89412-053-0 (vol. 2)",
  ISBN-13 =      "978-0-89412-052-7 (vol. 1), 978-0-89412-053-4 (vol.
                 2)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Originally published in 1942. Revised and enlarged. v.
                 1. Explanatory text and short exercises; v. 2. Figures
                 and cipher texts.",
  keywords =     "Cryptography.",
}

@Misc{Anonymous:1982:ESS,
  author =       "Anonymous",
  title =        "Encryption scrambling the satellite signal for
                 security",
  publisher =    "Instant Replay",
  address =      "Arlington, VA, USA",
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "1 sound cassette (75 min.)",
  acknowledgement = ack-nhfb,
  annote =       "At head of title: ``Space communications in the
                 80's.'' Presented at the Seventh Annual Conference of
                 the Public Service Satellite Consortium, October 19-22,
                 1982, Washington, DC",
  keywords =     "Telecommunication.",
}

@Article{Anonymous:1982:NNPa,
  author =       "Anonymous",
  title =        "News and Notices: {Pioneer Award Established by
                 Computer Society}; {Undergraduate Paper Competition in
                 Cryptology}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "4",
  number =       "2",
  pages =        "184--184",
  month =        apr # "\slash " # jun,
  year =         "1982",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:19 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1982/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1982/pdf/a2184.pdf;
                 http://www.computer.org/annals/an1982/a2184abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{Bamford:1982:PPR,
  author =       "James Bamford",
  title =        "The puzzle palace: a report on {America}'s most secret
                 agency",
  publisher =    pub-HOUGHTON-MIFFLIN,
  address =      pub-HOUGHTON-MIFFLIN:adr,
  pages =        "465",
  year =         "1982",
  ISBN =         "0-395-31286-8",
  ISBN-13 =      "978-0-395-31286-5",
  LCCN =         "KF7683.N32 B3",
  bibdate =      "Thu Jan 21 14:10:29 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "United States National Security Agency",
}

@MastersThesis{Becker:1982:EDE,
  author =       "Michael S. Becker",
  title =        "An exercise with the {Data Encryption Standard}",
  type =         "Master of Science, Plan II",
  school =       "Department of Electrical Engineering and Computer
                 Sciences, University of California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "56",
  year =         "1982",
  LCCN =         "TK7 .U5 1982:2:B-C",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Beker:1982:CSP,
  author =       "Henry Beker and F. C. (Frederick Charles) Piper",
  title =        "Cipher systems: the protection of communications",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "427",
  year =         "1982",
  ISBN =         "0-471-89192-4",
  ISBN-13 =      "978-0-471-89192-5",
  LCCN =         "Z104 .B39 1982",
  bibdate =      "Sun Nov 20 19:54:09 MST 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "According to the introduction to Fred Piper's 2005
                 Turing Lecture (Computer Journal 48(2), 145--156, March
                 2005, this is one of the first books published on the
                 protection of communications.",
  subject =      "Ciphers; Cryptography",
}

@InProceedings{Blum:1982:CFT,
  author =       "Manuel Blum",
  title =        "Coin Flipping by Telephone --- a Protocol for Solving
                 Impossible Problems",
  crossref =     "Rudolph:1982:HTI",
  pages =        "133--137",
  year =         "1982",
  bibdate =      "Sun Mar 11 10:10:54 2012",
  bibsource =    "DBLP;
                 http://dblp.uni-trier.de/db/conf/compcon/compcon1982.html#Blum82;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "See published article \cite{Blum:1983:CFT}.",
}

@InProceedings{Blum:1982:HGC,
  author =       "Manuel Blum and Silvio Micali",
  title =        "How to Generate Cryptographically Strong Sequences of
                 Pseudo-Random Bits",
  crossref =     "IEEE:1982:ASF",
  pages =        "112--117",
  year =         "1982",
  DOI =          "http://dx.doi.org/10.1109/SFCS.1982.72",
  bibdate =      "Wed Dec 21 06:47:00 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/focs1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  xxpages =      "464--479",
}

@Book{Bosworth:1982:CCC,
  author =       "Bruce Bosworth",
  title =        "Codes, ciphers, and computers: an introduction to
                 information security",
  publisher =    pub-HAYDEN-BOOK,
  address =      pub-HAYDEN-BOOK:adr,
  pages =        "259",
  year =         "1982",
  ISBN =         "0-8104-5149-2",
  ISBN-13 =      "978-0-8104-5149-0",
  LCCN =         "Z103.B58 1982",
  bibdate =      "Sat Apr 20 11:51:26 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brouwer:1982:NMK,
  author =       "Andries E. Brouwer and Peter {van Emde Boas}",
  title =        "A note on: {``Master keys for group sharing'' [Inform.
                 Process. Lett. {\bf 12} (1981), no. 1, 23--25; MR
                 82d:94046] by D. E. Denning and F. B. Schneider}",
  journal =      j-INFO-PROC-LETT,
  volume =       "14",
  number =       "1",
  pages =        "12--14",
  day =          "27",
  month =        mar,
  year =         "1982",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94B99",
  MRnumber =     "83h:94019",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Denning:1981:MKG}.",
  acknowledgement = ack-nhfb,
  classification = "C6130 (Data handling techniques)",
  corpsource =   "Dept. of Pure Math., Math. Centre, Amsterdam,
                 Netherlands",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "cryptography; group keys; group sharing; master keys",
  treatment =    "P Practical",
}

@InProceedings{DeMillo:1982:CP,
  author =       "Richard A. DeMillo and Nancy A. Lynch and Michael J.
                 Merritt",
  title =        "Cryptographic protocols",
  crossref =     "ACM:1982:PFA",
  pages =        "383--400",
  year =         "1982",
  bibdate =      "Wed Feb 20 18:33:45 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Denning:1982:CDS,
  author =       "Dorothy Elizabeth Robling Denning",
  title =        "Cryptography and data security",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xiii + 400",
  year =         "1982",
  ISBN =         "0-201-10150-5",
  ISBN-13 =      "978-0-201-10150-8",
  LCCN =         "QA76.9.A25 .D46 1982",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$22.95",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control; cryptography; data
                 protection",
}

@Article{Diffie:1982:CTF,
  author =       "Whitfield Diffie",
  title =        "Cryptographic technology: fifteen year forecast",
  journal =      j-SIGACT,
  volume =       "14",
  number =       "4",
  pages =        "38--57",
  month =        "Fall--Winter",
  year =         "1982",
  CODEN =        "SIGNDM",
  DOI =          "http://dx.doi.org/10.1145/1008902.1008903",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 08:21:21 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "This paper examines the forces driving public
                 development of cryptography today and projects the
                 course of the field over the next fifteen years with
                 attention to the possible influence of government
                 regulation. This paper was prepared, under contractual
                 arrangements to CRC Systems, in support of the Commerce
                 Department (National Telecommunications and Information
                 Administration, Special Projects Office) response to a
                 White House Office of Science and Technology Policy
                 request that the secretaries of the Departments of
                 Commerce and Defense propose a national policy on
                 cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@InCollection{Diffie:1982:CVP,
  author =       "Whitfield Diffie",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Conventional versus public key cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "41--72",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 720",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@Article{Ecker:1982:MGE,
  author =       "A. Ecker",
  title =        "{{\"U}ber die mathematischen Grundlagen einiger
                 Chiffrierverfahren}. ({German}) [{On} the mathematical
                 foundations of some cryptosystems]",
  journal =      j-COMPUTING,
  volume =       "29",
  number =       "4",
  pages =        "277--287",
  year =         "1982",
  CODEN =        "CMPTA2",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  MRclass =      "94B99 (10A10 20A05)",
  MRnumber =     "84d:94023",
  MRreviewer =   "J. H. van Lint",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Computing. Archiv f{\"u}r Informatik und Numerik",
  journal-URL =  "http://link.springer.com/journal/607",
  language =     "German",
}

@Article{Feynman:1982:SPC,
  author =       "Richard P. Feynman",
  title =        "Simulating physics with computers",
  journal =      j-INT-J-THEOR-PHYS,
  volume =       "21",
  number =       "6--7",
  pages =        "467--488",
  year =         "1982",
  CODEN =        "IJTPBM",
  DOI =          "http://dx.doi.org/10.1007/BF02650179",
  ISSN =         "0020-7748",
  ISSN-L =       "0020-7748",
  MRclass =      "68J99",
  MRnumber =     "658311",
  bibdate =      "Sat Apr 9 15:46:55 2011",
  bibsource =    "ftp://ftp.math.utah.edu/pub/bibnet/authors/f/feynman-richard-p.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Physics of computation, Part II (Dedham, Mass.,
                 1981)",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Theoretical Physics",
  journal-URL =  "http://link.springer.com/journal/10773",
  remark =       "This paper contains an early proposal for quantum
                 cryptography.",
  xxvolume =     "B2",
}

@Book{Foster:1982:CM,
  author =       "Caxton C. Foster",
  title =        "Cryptanalysis for microcomputers",
  publisher =    pub-HAYDEN-BOOK,
  address =      pub-HAYDEN-BOOK:adr,
  pages =        "333",
  year =         "1982",
  ISBN =         "0-8104-5174-3 (paperback)",
  ISBN-13 =      "978-0-8104-5174-2 (paperback)",
  LCCN =         "Z103.F67 1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$14.95",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers --- Data processing; Cryptography --- Data
                 processing; Microcomputers.",
}

@Article{Gabriel:1982:VPI,
  author =       "Richard Gabriel",
  title =        "{Verschl{\"u}sselungsabbildungen mit Pseudo-Inversen,
                 Zufallsgeneratoren und T{\"a}felungen}. ({German})
                 [{Encryption} mapping with pseudoinverses, random
                 generators and tilings]",
  journal =      "Kybernetika (Prague)",
  volume =       "18",
  number =       "6",
  pages =        "485--504",
  year =         "1982",
  CODEN =        "KYBNAI",
  ISSN =         "0023-5954",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "85a:94023",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Kybernetika",
  language =     "German",
}

@Manual{Gersho:1982:ACR,
  author =       "Allen Gersho",
  title =        "Advances in cryptography: a report on {CRYPTO} 81",
  number =       "82-04",
  publisher =    "Department of Electrical and Computer Engineering,
                 University of California, Santa Barbara",
  address =      "Santa Barbara, CA, USA",
  pages =        "viii + 156",
  year =         "1982",
  LCCN =         "QA76.9.A25 I14 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "``Sponsored by the Data and Computer Communications
                 Committees of the IEEE Communications Society with the
                 cooperation of the Dept. of Electrical and Computer
                 Engineering, University of California, Santa Barbara.''
                 --- Verso of t.p. ``August 20, 1982.'' Includes
                 bibliographies.",
  series =       "ECE report",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control --- congresses;
                 cryptography --- congresses",
}

@Article{Gifford:1982:CSI,
  author =       "D. K. Gifford and A. K. Jones",
  title =        "Cryptographic Sealing for Information Security and
                 Authentication",
  journal =      j-CACM,
  volume =       "25",
  number =       "4",
  pages =        "274--286",
  month =        apr,
  year =         "1982",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "A new protection mechanism is described that provides
                 general primitives for protection and authentication.
                 The mechanism is based on the idea of sealing an object
                 with a key. Sealed objects are self-authenticating, and
                 in the absence of an appropriate set of keys, only
                 provide information about the size of their contents.
                 New keys can be freely created at any time, and keys
                 can also be derived from existing keys with operators
                 that include Key-And and Key-Or. This flexibility
                 allows the protection mechanism to implement common
                 protection mechanisms such as capabilities, access
                 control lists, and information flow control. The
                 mechanism is enforced with a synthesis of conventional
                 cryptography, public-key cryptography, and a threshold
                 scheme.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "CACM protection operating cryptography",
}

@InProceedings{Gilmour-Bryson:1982:CDT,
  author =       "A. Gilmour-Bryson",
  title =        "Coding of the depositions of the {Templars}",
  crossref =     "Ciampi:1982:EVS",
  pages =        "451--467",
  year =         "1982",
  bibdate =      "Sat Feb 17 14:59:04 1996",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "From {\em Computing Reviews\/}: ``The article reports
                 on the progress of an historical study using a computer
                 for statistical analysis. The subject of the study is a
                 mass of trial depositions of the Knights Templar. The
                 purpose of the project is to find statistical
                 regularities in the large amount of testimony and to
                 create a model for similar studies.

                 The Order of the Knights Templar, founded around 1100,
                 was the first Christian military order. After the
                 Crusades, in the early fourteenth century, 127 articles
                 of accusation were brought against the order, including
                 charges of idolatry, sacrilege, and sodomy. The data
                 being studied are the responses of 900 men to each of
                 127 accusations. The article details the accusations
                 and the way in which the responses are being coded. The
                 statistical package SAS (Statistical Analysis System)
                 will be used. Examples of the results to be sought are:
                 tallies of guilty/innocent responses, tallies of
                 offenses committed versus seen versus heard about, and
                 correlations between, for example, age and other
                 responses. Depositions that differ markedly from the
                 average response will be identified.''",
  acknowledgement = ack-nhfb,
  keywords =     "human factors; legal aspects",
  review =       "ACM CR 40531",
  subject =      "E.4 Data, CODING AND INFORMATION THEORY, Nonsecret
                 encoding schemes \\ G.3 Mathematics of Computing,
                 PROBABILITY AND STATISTICS, Statistical computing \\
                 J.1 Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Law J Computer Applications, SOCIAL AND
                 BEHAVIORAL SCIENCES",
}

@InProceedings{Goldwasser:1982:PEH,
  author =       "Shafi Goldwasser and Silvio Micali",
  title =        "Probabilistic encryption \& how to play mental poker
                 keeping secret all partial information",
  crossref =     "ACM:1982:PFA",
  pages =        "365--377",
  year =         "1982",
  bibdate =      "Wed Feb 20 18:33:45 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Golomb:1982:SRS,
  author =       "S. Golomb",
  title =        "Shift Register Sequences",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Revised",
  pages =        "xvi + 247",
  year =         "1982",
  ISBN =         "0-89412-048-4",
  ISBN-13 =      "978-0-89412-048-0",
  LCCN =         "QA267.5.S4 G6 1982",
  bibdate =      "Mon Nov 30 08:47:35 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Portions co-authored with Lloyd R. Welch, Richard M.
                 Goldstein, and Alfred W. Hales.",
  acknowledgement = ack-nhfb,
}

@Article{Grover:1982:CP,
  author =       "Derrick Grover",
  title =        "Cryptography: a Primer",
  journal =      j-COMP-J,
  volume =       "25",
  number =       "3",
  pages =        "400c-400",
  month =        aug,
  year =         "1982",
  CODEN =        "CMPJA6",
  DOI =          "http://dx.doi.org/10.1093/comjnl/25.3.400-c",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Dec 4 14:48:13 MST 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/25/3.toc;
                 http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/25/3/400-c.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Holland:1982:GSA,
  author =       "Edward R. Holland and James L. Robertson",
  title =        "{GUEST} --- a Signature Analysis Based Test System for
                 {ECL} Logic",
  journal =      j-HEWLETT-PACKARD-J,
  volume =       "33",
  number =       "3",
  pages =        "26--29",
  month =        mar,
  year =         "1982",
  CODEN =        "HPJOAX",
  ISSN =         "0018-1153",
  bibdate =      "Tue Mar 25 14:12:15 MST 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/hpj.bib",
  abstract =     "A special printed circuit board tester is developed,
                 the Gemini Universal ECL Signature Test (GUEST) system,
                 that can apply a signature analysis based tests to the
                 emitter coupled logic (ECL). The tester functions at
                 real-time clock rates up to 25 MHz and generates test
                 vectors algorithmically in real time by hardware for a
                 given unit-under-test (UUT). The hardware test vector
                 generation is illustrated and described, including
                 go\slash no go testing, fault backtracking, and
                 feedback loop breaking. A UUT test file is created and
                 verified for the accuracy of test generation.",
  acknowledgement = ack-nhfb,
  classcodes =   "B1265B (Logic circuits); B7210B (Automatic test and
                 measurement systems); C5210 (Logic design methods)",
  classification = "713; 721",
  fjournal =     "Hewlett-Packard Journal: technical information from
                 the laboratories of Hewlett-Packard Company",
  journalabr =   "Hewlett Packard J",
  keywords =     "automatic test equipment; ECL logic; Gemini Universal
                 ECL Signature; GUEST; HP 3000; logic circuits, emitter
                 coupled; logic testing; printed circuits; Series 64
                 boards; signature analysis; test system; Test system;
                 tester; unit-under-test (UUT)",
  treatment =    "P Practical",
}

@InCollection{Hoogendoorn:1982:SPK,
  author =       "P. J. Hoogendoorn",
  booktitle =    "Computational methods in number theory, {Part I}",
  title =        "On a secure public-key cryptosystem",
  volume =       "154",
  publisher =    "Math. Centrum",
  address =      "Amsterdam",
  pages =        "159--168",
  year =         "1982",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85b:68014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Math. Centre Tracts",
}

@Article{Kasami:1982:KMS,
  author =       "Tadao Kasami and Saburo Yamamura and Kenichi Mori",
  title =        "A key management scheme for end-to-end encryption and
                 a formal verification of its security",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "3",
  pages =        "59--69 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "94B99",
  MRnumber =     "84i:94045",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@Article{Koyama:1982:CUM,
  author =       "Kenji Koyama",
  title =        "A cryptosystem using the master key for multi-address
                 communication",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "5",
  pages =        "36--46 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "85f:94014",
  MRreviewer =   "James W. Snively, Jr.",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@Article{Koyama:1982:MKR,
  author =       "Kenji Koyama",
  title =        "A master key for the {RSA} public-key cryptosystem",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "1",
  pages =        "63--70 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85a:68044",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@Article{Lamport:1982:BGP,
  author =       "Leslie Lamport and Robert Shostak and Marshall Pease",
  title =        "The {Byzantine} Generals Problem",
  journal =      j-TOPLAS,
  volume =       "4",
  number =       "3",
  pages =        "382--401",
  month =        jul,
  year =         "1982",
  CODEN =        "ATPSDT",
  ISSN =         "0164-0925 (print), 1558-4593 (electronic)",
  ISSN-L =       "0164-0925",
  bibdate =      "Sat Oct 17 12:24:31 1998",
  bibsource =    "Compiler/bevan.bib; Compiler/Compiler.Lins.bib;
                 Compiler/TOPLAS.bib; Database/dbase.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/jamstatassoc.bib;
                 http://www.math.utah.edu/pub/tex/bib/toplas.bib",
  note =         "They proved that Byzantine agreement cannot be reached
                 unless fewer than one-third of the processes are
                 faulty. This result assumes that authentication, i.e.,
                 the crypting of messages to make them unforgeable, is
                 not used. With unforgeable messages, they show that the
                 problem is solvable for any $ n \geq t > 0 $, where $n$
                 is the total number of processes and $t$ is the number
                 of faulty processes.",
  abstract =     "Reliable computer systems must handle malfunctioning
                 components that give conflicting information to
                 different parts of the system. This situation can be
                 expressed abstractly in terms of a group of generals of
                 the Byzantine army camped with their troops around an
                 enemy city. Communicating only by messenger, the
                 generals must agree upon a common battle plan. However,
                 one or more of them may be traitors who will try and
                 confuse the others. The problem is to find an algorithm
                 to ensure that the loyal generals will reach agreement.
                 It is shown that, using only oral messages, this
                 problem is solvable if and only if more than two-thirds
                 of the generals are loyal; so a single traitor can
                 confound two loyal generals. With unforgeable written
                 messages, the problem is solvable for any number of
                 generals and possible traitors. Applications of the
                 solutions to reliable computer systems are then
                 discussed.",
  acknowledgement = ack-nhfb # " and " # ack-pb,
  checked =      "19940302",
  fjournal =     "ACM Transactions on Programming Languages and
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J783",
  keywords =     "fault tolerance; interactive consistency; network
                 communications; network operating systems;
                 reliability",
  source =       "Dept. Library",
}

@Book{Lewin:1982:AMC,
  author =       "Ronald Lewin",
  title =        "The {American} magic: codes, ciphers, and the defeat
                 of {Japan}",
  publisher =    "Farrar Straus Giroux",
  address =      "New York, NY, USA",
  pages =        "xv + 332",
  year =         "1982",
  ISBN =         "0-374-10417-4",
  ISBN-13 =      "978-0-374-10417-7",
  LCCN =         "D810.C88 .L48",
  bibdate =      "Sat Apr 20 12:07:03 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Matsumoto:1982:DTL,
  author =       "Tsutomu Matsumoto and Tomoko Okada and Hideki Imai",
  title =        "Directly transformed link encryption",
  journal =      "Systems-Comput.-Controls",
  volume =       "13",
  number =       "6",
  pages =        "36--44 (1983)",
  year =         "1982",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85a:68045",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@InCollection{Merkle:1982:PPK,
  author =       "Ralph C. Merkle",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Protocols for public key cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "73--104",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 721",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@Book{Merkle:1982:SAP,
  author =       "Ralph C. (Ralph Charles) Merkle",
  title =        "Secrecy, authentication, and public key systems",
  volume =       "18",
  publisher =    "UMI Research Press",
  address =      "Ann Arbor, MI, USA",
  pages =        "104",
  year =         "1982",
  ISBN =         "0-8357-1384-9",
  ISBN-13 =      "978-0-8357-1384-9",
  LCCN =         "QA76.9.A25 M47 1982",
  bibdate =      "Thu Jan 21 14:22:11 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Revision of the author's thesis ({Ph.D.}---Stanford
                 University, 1979).",
  series =       "Computer science. Systems programming",
  acknowledgement = ack-nhfb,
}

@Book{Meyer:1982:CND,
  author =       "Carl H. Meyer and Stephen M. Matyas",
  title =        "Cryptography: a new dimension in computer data
                 security: a guide for the design and implementation of
                 secure systems",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xxi + 755",
  year =         "1982",
  ISBN =         "0-471-04892-5",
  ISBN-13 =      "978-0-471-04892-3",
  LCCN =         "Z103 .M55",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$39.95",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- handbooks, manuals, etc",
}

@InProceedings{Plumstead:1982:ISG,
  author =       "Joan Boyar Plumstead",
  title =        "Inferring a sequence generated by a linear
                 congruence",
  crossref =     "IEEE:1982:ASF",
  pages =        "153--159",
  year =         "1982",
  bibdate =      "Wed Jun 22 18:26:09 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Suppose it is known that $ \{ X_0, X_1, \ldots {}, X_n
                 \} $ is produced by a pseudo-random number generator of
                 the form $ X_{i + 1} = a X_i + b \bmod m $, but $a$,
                 $b$, and $m$ are unknown. Can one efficiently predict
                 the remainder of the sequence with knowledge of only a
                 few elements from that sequence? This question is
                 answered in the affirmative and an algorithm is
                 given.",
  acknowledgement = ack-nhfb,
  keywords =     "algorithm design and analysis; computer science;
                 cryptography; data analysis; error correction;
                 inference algorithms; power generation; random number
                 generation; sections; tiles",
}

@InCollection{Randell:1982:CGC,
  author =       "Brian Randell",
  title =        "{Colossus}: Godfather of the Computer (1977)",
  crossref =     "Randell:1982:ODC",
  pages =        "349--354",
  year =         "1982",
  bibdate =      "Sun Nov 03 08:36:11 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Rhodes-Burke:1982:RSA,
  author =       "Robert Rhodes-Burke",
  title =        "Retrofitting for Signature Analysis Simplified",
  journal =      j-HEWLETT-PACKARD-J,
  volume =       "33",
  number =       "1",
  pages =        "9--16",
  month =        jan,
  year =         "1982",
  CODEN =        "HPJOAX",
  ISSN =         "0018-1153",
  bibdate =      "Tue Mar 25 14:12:15 MST 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/hpj.bib",
  abstract =     "Four versions of Microprocessor Exerciser are
                 introduced that make it possible to apply signature
                 analysis trouble-shooting techniques to
                 microprocessor-based products not originally designed
                 for signal analysis methods, by providing preprogrammed
                 external stimulus routines and monitoring circuits.
                 Model 5001A for 6800-microprocessor is illustrated and
                 its operating modes are described.",
  acknowledgement = ack-nhfb,
  classcodes =   "C5130 (Microprocessor chips); C5210 (Logic design
                 methods)",
  classification = "722; 723",
  corpsource =   "Hewlett--Packard Co., Palo Alto, CA, USA",
  fjournal =     "Hewlett-Packard Journal: technical information from
                 the laboratories of Hewlett-Packard Company",
  journalabr =   "Hewlett Packard J",
  keywords =     "5001A; computers, microprocessor; external; fault
                 location; Hewlett--Packard; logic testing;
                 microprocessor chips; microprocessor exerciser;
                 microprocessor-based systems; signature analysis;
                 stimulus routines; troubleshooting; troubleshooting
                 techniques",
  treatment =    "P Practical",
}

@InCollection{Rivest:1982:MOD,
  author =       "Ronald Rivest and Adi Shamir and Leonard M. Adleman",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "A method for obtaining digital signatures and public
                 key cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "217--239",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 726",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@PhdThesis{Schaumuller-Bichl:1982:ADE,
  author =       "Ingrid Schaumuller-Bichl",
  title =        "{Zur Analyse des Data Encryption: Standard und
                 Synthese verwandter Chiffriersysteme}",
  volume =       "40",
  school =       "Johannes Kepler-Universit{\"a}t Linz",
  address =      "Linz, Austria",
  pages =        "168",
  year =         "1982",
  ISBN =         "3-85369-521-3",
  ISBN-13 =      "978-3-85369-521-0",
  LCCN =         "QA76.9.A25S33 1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Summary in English. Published by VWGO, Wien,
                 Austria.",
  series =       "Dissertationen der Johannes Kepler-Universit{\"a}t
                 Linz",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Passwords; Data
                 encryption (Computer science)",
}

@InCollection{Shamir:1982:PTA,
  author =       "Adi Shamir",
  booktitle =    "23rd annual symposium on foundations of computer
                 science (Chicago, Ill., 1982)",
  title =        "A polynomial time algorithm for breaking the basic
                 {Merkle--Hellman} cryptosystem",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "145--152",
  year =         "1982",
  MRclass =      "68P25",
  MRnumber =     "780 392",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Book{Shumaker:1982:RCJ,
  author =       "Wayne Shumaker",
  title =        "Renaissance curiosa: {John Dee}'s conversations with
                 angels, {Girolamo Cardano}'s horoscope of {Christ},
                 {Johannes Trithemius} and cryptography, {George
                 Dalgarno}'s Universal language",
  volume =       "8",
  publisher =    "Center for Medieval and Early Renaissance Studies",
  address =      "Binghamton, NY, USA",
  pages =        "207",
  year =         "1982",
  ISBN =         "0-86698-014-8",
  ISBN-13 =      "978-0-86698-014-2",
  LCCN =         "CB361 .S494 1982",
  bibdate =      "Mon Jul 19 08:47:18 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Intended audience: Renaissance specialists,
                 linguistics, students of occultism, and historians of
                 science.",
  series =       "Medieval and Renaissance texts and studies",
  acknowledgement = ack-nhfb,
  annote =       "The Trithemius ciphers were finally solved in 1998 by
                 J. Reeds \cite{Reeds:1998:SCB}.",
  keywords =     "Cardano, Girolamo, 1501--1576; Dalgarno, George,
                 1626?--1687 ars signorum; Dee, John, 1527--1608 true
                 and faithful relation of what passed for many;
                 renaissance --- sources; Trithemius, Johannes,
                 1462--1516 steganographia; yeers between Dr. John Dee
                 \ldots{} and some spirits",
}

@InCollection{Simmons:1982:SAE,
  author =       "Gustavus J. Simmons",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Symmetric and asymmetric encryption",
  volume =       "69",
  publisher =    pub-WESTVIEW,
  address =      pub-WESTVIEW:adr,
  pages =        "241--298",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 727",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  series =       "AAAS Sel. Sympos. Ser.",
}

@Book{Simmons:1982:SCA,
  editor =       "Gustavus J. Simmons",
  title =        "Secure communications and asymmetric cryptosystems",
  volume =       "69",
  publisher =    "Westview Press",
  address =      "Boulder, CO",
  pages =        "x + 338",
  year =         "1982",
  ISBN =         "0-86531-338-5",
  ISBN-13 =      "978-0-86531-338-5",
  MRclass =      "94-06",
  MRnumber =     "85i:94001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Selected Symposia Series",
}

@Manual{USDA:1982:SMM,
  author =       "{United States. Dept. of the Army}",
  title =        "Soldier's manual: {MOS 32G}: fixed cryptographic
                 equipment repairer, skill levels 1 and 2",
  number =       "FM 11-32G1/2",
  organization = "Dept. of the Army, Headquarters",
  address =      "Washington, DC, USA (??)",
  pages =        "various",
  month =        may,
  year =         "1982",
  LCCN =         "D 101.20:11-32 G 1/2 Govt Pubs",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "communications, military -- handbooks, manuals, etc.;
                 United States. Army -- communications systems --
                 maintenance and repair -- handbooks, manuals, etc;
                 United States. Army -- handbooks, manuals, etc",
}

@Manual{USDA:1982:TGM,
  author =       "{United States. Dept. of the Army}",
  title =        "Trainer's guide: {MOS 32G}: fixed cryptographic
                 equipment repairer",
  number =       "FM 11-32G/TG",
  organization = "Dept. of the Army, Headquarters",
  address =      "Washington, DC, USA (??)",
  pages =        "35",
  day =          "14",
  month =        may,
  year =         "1982",
  LCCN =         "D 101.20:11-32 G/TG Govt Pubs",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "communications, military -- handbooks, manuals, etc;
                 United States. Army -- communications systems --
                 maintenance and repair -- handbooks, manuals, etc;
                 United States. Army -- handbooks, manuals, etc",
}

@Manual{USGSA:1982:TGS,
  author =       "{United States. General Services Administration}",
  title =        "Telecommunications: general security requirements for
                 equipment using the {Data Encryption Standard}",
  organization = "General Services Administration",
  address =      "Washington, DC, USA",
  pages =        "12",
  day =          "14",
  month =        apr,
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Federal Standard 1027.",
  acknowledgement = ack-nhfb,
}

@Book{Warren:1982:BTC,
  author =       "Alexander Z. Warren",
  title =        "{Basic-plus} through cryptanalysis; an introduction to
                 structured programming",
  publisher =    "????",
  address =      "????",
  pages =        "100",
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Privately printed",
  acknowledgement = ack-nhfb,
  keywords =     "BASIC-PLUS (Computer program language); Phillips
                 Academy --- Faculty",
}

@Book{Welchman:1982:HSS,
  author =       "Gordon Welchman",
  title =        "The {Hut Six} story: breaking the {Enigma} codes",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "ix + 326",
  year =         "1982",
  ISBN =         "0-07-069180-0",
  ISBN-13 =      "978-0-07-069180-3",
  LCCN =         "D810.C88 W44",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Welchman, Gordon; World War, 1939--1945 ---
                 cryptography; World War, 1939--1945 --- personal
                 narratives, British; World War, 1939--1945 --- secret
                 service --- Great Britain",
}

@TechReport{Wells:1982:USE,
  author =       "David L. Wells",
  title =        "The use of subkey encryption to counter traffic
                 analysis in communications networks",
  type =         "Technical report",
  number =       "CSE 8201",
  institution =  "Department of Computer Science and Engineering,
                 Southern Methodist University",
  address =      "Dallas, TX, USA",
  pages =        "24",
  month =        feb,
  year =         "1982",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Supported by the National Science Foundation under
                 grant no. MCS 8107479.",
  keywords =     "Computer networks.",
}

@Article{Wilkes:1982:MRJ,
  author =       "Maurice V. Wilkes and I. J. Good",
  title =        "Meetings in Retrospect: {J. G. Brainerd on the ENIAC};
                 {A Report on T. H. Flowers's Lecture on Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "4",
  number =       "1",
  pages =        "53--59",
  month =        jan # "\slash " # mar,
  year =         "1982",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:19 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1982/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1982/pdf/a1053.pdf;
                 http://www.computer.org/annals/an1982/a1053abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@InCollection{Williams:1982:CHP,
  author =       "Hugh C. Williams",
  booktitle =    "Secure communications and asymmetric cryptosystems",
  title =        "Computationally ``hard'' problems as a source for
                 cryptosystems",
  volume =       "69",
  publisher =    "Westview",
  address =      "Boulder, CO",
  pages =        "11--39",
  year =         "1982",
  MRclass =      "94A05",
  MRnumber =     "668 719",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "AAAS Sel. Sympos. Ser.",
}

@InProceedings{Yao:1982:PSC,
  author =       "A. Yao",
  title =        "Protocols for Secure Computation",
  crossref =     "IEEE:1982:ASF",
  pages =        "160--164",
  year =         "1982",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 27]{Canetti:1997:PSL}.",
}

@InProceedings{Yao:1982:TAT,
  author =       "A. C. Yao",
  title =        "Theory and Application of Trapdoor Functions",
  crossref =     "IEEE:1982:ASF",
  pages =        "80--91",
  year =         "1982",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 28]{Goldreich:1997:FMCb}.",
}

@InProceedings{Adleman:1983:BGK,
  author =       "Leonard M. Adleman",
  title =        "On breaking generalized knapsack public key
                 cryptosystems",
  crossref =     "ACM:1983:PFA",
  pages =        "402--412",
  year =         "1983",
  bibdate =      "Thu Feb 21 06:51:34 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Akl:1983:CSP,
  author =       "Selim G. Akl and Peter D. Taylor",
  title =        "Cryptographic Solution to a Problem of Access Control
                 in a Hierarchy",
  journal =      j-TOCS,
  volume =       "1",
  number =       "3",
  pages =        "239--248",
  month =        aug,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:18:40 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@Article{Akritas:1983:CEA,
  author =       "A. G. Akritas and S. S. Iyengar and A. A. Rampuria",
  title =        "Computationally efficient algorithms for a one-time
                 pad scheme",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "12",
  number =       "4",
  pages =        "285--316",
  month =        aug,
  year =         "1983",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  MRclass =      "68P25 (94A99)",
  MRnumber =     "741 781",
  bibdate =      "Sat Apr 26 14:03:16 MDT 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "C6130 (Data handling techniques)",
  corpsource =   "Dept. of Computer Sci., Univ. of Kansas, Lawrence, KS,
                 USA",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "chi-square method; ciphers security; cryptography;
                 data processing; one-time pad scheme",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Alpern:1983:KEU,
  author =       "B. Alpern and F. B. Schneider",
  title =        "Key exchange using keyless cryptography",
  journal =      j-INFO-PROC-LETT,
  volume =       "16",
  number =       "2",
  pages =        "79--81",
  day =          "26",
  month =        feb,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); B6210L (Computer communications);
                 C5620 (Computer networks and techniques); C6130 (Data
                 handling techniques)",
  corpsource =   "Dept. of Computer Sci., Cornell Univ., Ithaca, NY,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "computer network; computer networks; cryptography;
                 keyless cryptography; protocols; secret keys",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@Book{ANSI:1983:ANS,
  author =       "{American National Standards Institute}",
  title =        "{American National Standard} for information systems:
                 data encryption algorithm: modes of operation",
  publisher =    pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "??",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bauer:1983:KDP,
  author =       "R. K. Bauer and T. A. Berson and R. J. Feiertag",
  title =        "A Key Distribution Protocol Using Event Markers",
  journal =      j-TOCS,
  volume =       "1",
  number =       "3",
  pages =        "249--255",
  month =        aug,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:57:59 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/misc.1.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@InProceedings{Ben-Or:1983:CSS,
  author =       "Michael Ben-Or and Benny Chor and Adi Shamir",
  title =        "On the cryptographic security of single {RSA} bits",
  crossref =     "ACM:1983:PFA",
  pages =        "421--430",
  year =         "1983",
  bibdate =      "Thu Feb 21 06:51:34 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Bertrand:1983:EGE,
  author =       "Gustave Bertrand",
  title =        "{Enigma}, or, The greatest enigma of the 1939--1945
                 war",
  publisher =    "????",
  address =      "????",
  pages =        "vi + 415",
  year =         "1983",
  LCCN =         "????",
  bibdate =      "Sun Dec 01 09:15:14 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "English translation by Russell Babcock Holmes of
                 \cite{Bertrand:1973:EOP}.",
  acknowledgement = ack-nhfb,
}

@Book{Blahut:1983:TPE,
  author =       "Richard E. Blahut",
  title =        "Theory and Practice of Error Control Coding",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  pages =        "xi + 500",
  year =         "1983",
  ISBN =         "0-201-10102-5",
  ISBN-13 =      "978-0-201-10102-7",
  LCCN =         "QA268 .B54 1983",
  bibdate =      "Mon Nov 30 08:52:10 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Blum:1983:CFT,
  author =       "Manuel Blum",
  title =        "Coin Flipping by Telephone --- a Protocol for Solving
                 Impossible Problems",
  journal =      j-SIGACT,
  volume =       "15",
  number =       "1",
  pages =        "23--27",
  month =        jan,
  year =         "1983",
  CODEN =        "SIGNDM",
  DOI =          "http://dx.doi.org/10.1145/1008908.1008911",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Sun Mar 11 11:37:49 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "Alice and Bob want to flip a coin by telephone. (They
                 have just divorced, live in different cities, want to
                 decide who gets the car.) Bob would not like to tell
                 Alice HEADS and hear Alice (at the other end of the
                 line) say ``Here goes \ldots{} I'm flipping the
                 coin\ldots{}. You lost!'' Coin-flipping in the SPECIAL
                 way done here has a serious purpose. Indeed, it should
                 prove an INDISPENSABLE TOOL of the protocol designer.
                 Whenever a protocol requires one of two adversaries,
                 say Alice, to pick a sequence of bits at random, and
                 whenever it serves Alice's interests best NOT to pick
                 her sequence of bits at random, then coin-flipping (Bob
                 flipping coins to Alice) as defined here achieves the
                 desired goal: (1) It GUARANTEES to Bob that Alice will
                 pick her sequence of bits at random. Her bit is 1 if
                 Bob flips heads to her, 0 otherwise. (2) It GUARANTEES
                 to Alice that Bob will not know WHAT sequence of bits
                 he flipped to her. Coin-flipping has already proved
                 useful in solving a number of problems once thought
                 impossible: mental poker, certified mail, and exchange
                 of secrets. It will certainly prove a useful tool in
                 solving other problems as well.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Blum:1983:HES,
  author =       "Manuel Blum",
  title =        "How to Exchange (Secret) Keys",
  journal =      j-TOCS,
  volume =       "1",
  number =       "2",
  pages =        "175--193",
  month =        may,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:57:59 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.security.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Previously published in ACM STOC '83 proceedings,
                 pages 440--447.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@InProceedings{Brickell:1983:EAA,
  author =       "E. F. Brickell and J. C. Lagarias and A. M. Odlyzko",
  title =        "Evaluation of the {Adleman} attack on multiply
                 iterated knapsack cryptosystems",
  crossref =     "Chaum:1983:ACP",
  pages =        "39--42",
  year =         "1983",
  bibdate =      "Thu Apr 04 10:06:34 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brickell:1983:SRK,
  author =       "Ernest F. Brickell and Gustavus J. Simmons",
  title =        "A status report on knapsack based public key
                 cryptosystems",
  journal =      j-CONG-NUM,
  volume =       "37",
  pages =        "3--72",
  year =         "1983",
  ISSN =         "0384-9864",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "85f:94013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Congressus Numerantium. A Conference Journal on
                 Numerical Themes",
}

@Article{Bromley:1983:RFM,
  author =       "Allan G. Bromley and Martin Campbell-Kelly and K. W.
                 Smillie and Eric A. Weiss and Saul Rosen and Cipher A.
                 Deavours",
  title =        "Reviews: {O. I. Franksen: Mr. Babbage, the Difference
                 Engine, and the Problem of Notation: An Account of the
                 Origin of Recursiveness and Conditionals in Computer
                 Programming}; {H. Lukoff: from Dits to Bits}; {I.
                 Asimov: Asimov's Biographical Encyclopedia of Science
                 and Technology}; {J. Futrelle: Thinking Machine}; {R.
                 M. Hord: The Illiac IV}; {C. H. Meyer and S. M. Matyas:
                 Cryptography}; {T. J. Peters and R. H. Waterman: In
                 Search of Excellence}; {J. W. Stokes: 70 Years of Radio
                 Tubes and Valves}; {G. Welchman: The Hut Six Story};
                 Capsule Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "4",
  pages =        "411--427",
  month =        oct # "\slash " # dec,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Mon Nov 04 09:22:16 2002",
  bibsource =    "http://www.computer.org/annals/an1983/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a4411.pdf;
                 http://www.computer.org/annals/an1983/a4411abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@TechReport{CBEMA:1983:ANSa,
  author =       "{Computer and Business Equipment Manufacturers
                 Association} and {American National Standards
                 Institute}",
  title =        "{American National Standard for Information Systems}:
                 Data Link Encryption",
  type =         "????",
  number =       "ANSI X3.105-1983",
  institution =  pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "20",
  day =          "16",
  month =        may,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computer interfaces --- Standards; Programming
                 languages (Electronic computers) --- Standards",
}

@TechReport{CBEMA:1983:ANSb,
  author =       "{Computer and Business Equipment Manufacturers
                 Association} and {American National Standards
                 Institute}",
  title =        "{American National Standard for Information Systems}:
                 {Data Encryption Algorithm} --- Modes of Operation",
  type =         "????",
  number =       "ANSI X3.106-1983",
  institution =  pub-ANSI,
  address =      pub-ANSI:adr,
  pages =        "16",
  day =          "16",
  month =        may,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computer interfaces --- Standards; Programming
                 languages (Electronic computers) --- Standards",
}

@Article{Cesarini:1983:ACC,
  author =       "F. Cesarini and G. Soda",
  title =        "An algorithm to construct a compact {$B$}-tree in case
                 of ordered keys",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "1",
  pages =        "13--16",
  day =          "19",
  month =        jul,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C1160 (Combinatorial mathematics); C1260
                 (Information theory)",
  corpsource =   "Istituto di Informatica e Sistemistica, Univ. of
                 Florence, Florence, Italy",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "compact B-tree; computer programming; construction
                 algorithm; cryptography; data processing --- Data
                 Structures; ordered keys; overflow movings; trees
                 (mathematics)",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Chandler:1983:IMC,
  author =       "W. W. Chandler",
  title =        "The Installation and Maintenance of {Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "3",
  pages =        "260--262",
  month =        jul # "\slash " # sep,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:20 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1983/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a3260.pdf;
                 http://www.computer.org/annals/an1983/a3260abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Coombs:1983:MC,
  author =       "Allen W. M. Coombs",
  title =        "The Making of {Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "3",
  pages =        "253--259",
  month =        jul # "\slash " # sep,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:20 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1983/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a3253.pdf;
                 http://www.computer.org/annals/an1983/a3253abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Book{DeMillo:1983:ACC,
  author =       "Richard A. DeMillo and others",
  title =        "Applied cryptology, cryptographic protocols, and
                 computer security models",
  volume =       "29",
  publisher =    pub-AMS,
  address =      pub-AMS:adr,
  pages =        "xi + 192",
  year =         "1983",
  ISBN =         "0-8218-0041-8",
  ISBN-13 =      "978-0-8218-0041-6",
  ISSN =         "0160-7634",
  LCCN =         "QA1 .A56 v.29 1981",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Expanded version of notes prepared for the AMS short
                 course entitled Cryptology in revolution, mathematics
                 and models, held in San Francisco, CA, Jan. 5--6, 1981,
                 by Richard A. DeMillo and others.",
  series =       "Proceedings of symposia in applied mathematics. AMS
                 short course lecture notes",
  acknowledgement = ack-nhfb,
  keywords =     "computers --- access control; cryptography",
}

@Article{DeMillo:1983:PDS,
  author =       "R. DeMillo and M. Merritt",
  title =        "Protocols for Data Security",
  journal =      j-COMPUTER,
  volume =       "16",
  number =       "2",
  pages =        "39--50",
  month =        feb,
  year =         "1983",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1004.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "information hiding; steganography",
}

@Article{Dolev:1983:AAB,
  author =       "D. Dolev and H. R. Strong",
  title =        "Authenticated Algorithms for {Byzantine} Agreement",
  journal =      j-SIAM-J-COMPUT,
  volume =       "12",
  number =       "4",
  pages =        "656--666",
  month =        "????",
  year =         "1983",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68M10",
  MRnumber =     "85a:68004",
  bibdate =      "Mon Nov 29 10:59:59 MST 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/12/4;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Article{Ecker:1983:FSR,
  author =       "A. Ecker",
  booktitle =    "Cryptography (Burg Feuerstein, 1982)",
  title =        "Finite semigroups and the {RSA}-cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "149",
  pages =        "353--369",
  year =         "1983",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A99 (20M35)",
  MRnumber =     "84k:94019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Flowers:1983:DC,
  author =       "Thomas H. Flowers",
  title =        "The Design of {Colossus}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "5",
  number =       "3",
  pages =        "239--253",
  month =        jul # "\slash " # sep,
  year =         "1983",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:20 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1983/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Foreword by Howard Campaigne.",
  URL =          "http://dlib.computer.org/an/books/an1983/pdf/a3239.pdf;
                 http://www.computer.org/annals/an1983/a3239abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
  xxpages =      "239--252",
}

@MastersThesis{Gullichsen:1983:BHS,
  author =       "Eric Alexander Gullichsen",
  title =        "Bidirectional heuristic search and spectral {S}-box
                 simplification for the cryptanalysis of the {NBS Data
                 Encryption Standard}",
  volume =       "64919",
  type =         "Thesis ({M.Sc.})",
  publisher =    "National Library of Canada",
  school =       "University of British Columbia",
  address =      "Ottawa, ON, Canada",
  year =         "1983",
  ISBN =         "0-315-17010-7",
  ISBN-13 =      "978-0-315-17010-0",
  ISSN =         "0227-3845",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "3 microfiches (265 fr.)",
  series =       "Canadian theses on microfiche = Th{\`e}ses canadiennes
                 sur microfiche",
  acknowledgement = ack-nhfb,
}

@Book{Hodges:1983:ATE,
  author =       "Andrew Hodges",
  title =        "{Alan Turing}: the enigma",
  publisher =    pub-SIMON-SCHUSTER,
  address =      pub-SIMON-SCHUSTER:adr,
  pages =        "587",
  year =         "1983",
  ISBN =         "0-671-49207-1, 0-09-152130-0 (Burnett Books)",
  ISBN-13 =      "978-0-671-49207-6, 978-0-09-152130-1 (Burnett Books)",
  LCCN =         "QA29.T8 H63 1983",
  bibdate =      "Thu Jan 21 14:17:53 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hunter:1983:ERA,
  author =       "D. G. N. Hunter and A. R. McKenzie",
  title =        "Experiments with Relaxation Algorithms for Breaking
                 Simple Substitution Ciphers",
  journal =      j-COMP-J,
  volume =       "26",
  number =       "1",
  pages =        "68--71",
  month =        feb,
  year =         "1983",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "C7890 (Other special applications of computing)",
  classification = "723",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "algorithms; cipher breaking; computer programming;
                 cryptography; decoding; relaxation; relaxation theory;
                 substitution ciphers; word boundaries",
  treatment =    "P Practical",
}

@Article{Israel:1983:AOS,
  author =       "J. E. Israel and T. A. Linden",
  title =        "Authentication in Office System Internetworks",
  journal =      j-TOOIS,
  volume =       "1",
  number =       "3",
  pages =        "193--210",
  month =        jul,
  year =         "1983",
  CODEN =        "ATOSDO",
  ISSN =         "0734-2047",
  ISSN-L =       "0734-2047",
  bibdate =      "Sat Jan 16 16:21:56 MST 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://liinwww.ira.uka.de/bibliography/Database/Graefe.html;
                 http://www.acm.org/pubs/tois/toc.html;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80",
  abstract =     "In a distributed office system, authentication data
                 (such as password) must be managed in such a way that
                 users and machines from different organizations can
                 easily authenticate themselves to each other. The
                 authentication facility must be secure, but user
                 convenience, decentralized administration, and a
                 capability for smooth, long-term evolution are also
                 important. In addition, the authentication arrangements
                 must not permit failures at a single node to cause
                 systemwide down time. The design used in the Xerox 8000
                 Series products is described. This design anticipates
                 applications in an open-network architecture where
                 there are nodes from diverse sources and one node does
                 not trust authentication checking done by other nodes.
                 Furthermore, in some offices encryption will be
                 required to authenticate data transmissions despite
                 hostile intruders on the network. Requirements and
                 design constraints when applying encryption for
                 authentication in office systems are discussed. It is
                 suggested that protocol standards for use in office
                 systems should allow unencrypted authentication as well
                 as two options for encrypted authentication. Issues
                 that will arise as an office system evolves to deal
                 with increasingly sophisticated threats from users of
                 the system are described.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Office Information Systems",
  keywords =     "Authentication; Computer-communication networks; Data
                 encryption; Data encryption standard (DES);
                 Decentralized systems; Distributed systems; Ethernet;
                 General; Heterogeneous systems; Information systems
                 applications; Internetworks; Network architecture and
                 design; Network communications; Network protocols;
                 Office automation; Open architecture; Protocol
                 architecture; Security; Security and protection;
                 Standardization",
}

@Book{Kahn:1983:KCS,
  author =       "David Kahn",
  title =        "{Kahn} on codes: secrets of the new cryptology",
  publisher =    pub-MACMILLAN,
  address =      pub-MACMILLAN:adr,
  pages =        "viii + 343",
  year =         "1983",
  ISBN =         "0-02-560640-9",
  ISBN-13 =      "978-0-02-560640-1",
  LCCN =         "Z103 .K29 1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@Article{Kak:1983:EMP,
  author =       "Subhash C. Kak",
  title =        "Exponentiation modulo a polynomial for data security",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "12",
  number =       "5",
  pages =        "337--346",
  month =        oct,
  year =         "1983",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "85f:68023",
  bibdate =      "Sat Apr 26 14:03:16 MDT 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "C6130 (Data handling techniques)",
  corpsource =   "Dept. of Electrical and Computer Engng., Louisiana
                 State Univ., Baton Rouge, LA, USA",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "cryptography; data security; encryption; exponential
                 modulo; public-key cryptosystem; RSA algorithm;
                 security of data",
  treatment =    "P Practical",
}

@Book{Koscielny:1983:PRD,
  author =       "Czeslaw Koscielny",
  title =        "Programowa realizacja dzialan w cialach skonczonych do
                 zastosowan w technice kodowania korekcyjnego i
                 kryptografii",
  volume =       "61. 11",
  publisher =    "Wydawn. Politechniki Wroclawskiej",
  address =      "Wroclaw, Poland",
  pages =        "115",
  year =         "1983",
  ISBN =         "????",
  ISBN-13 =      "????",
  ISSN =         "0324-9786",
  LCCN =         "QA76.9.A251 K6 1983",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Title on p. [2] of cover: A software approach to
                 computing in finite fields with applications to
                 error-correcting coding technique and cryptography.
                 Summary in English and Russian; legends and table of
                 contents also in English. Bibliography: p. 109--110.",
  price =        "zl93.00",
  series =       "Prace naukowe Instytutu Cybernetyki Technicznej
                 Politechniki Wroclawskiej; Seria Monografie",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; error-correcting codes (information
                 theory)",
}

@Article{Koyama:1983:MKR,
  author =       "Kenji Koyama",
  title =        "A master key for the {Rabin}'s public-key
                 cryptosystem",
  journal =      "Systems-Comput.-Controls",
  volume =       "14",
  number =       "6",
  pages =        "49--57 (1984)",
  year =         "1983",
  CODEN =        "SYCCBB",
  ISSN =         "0096-8765",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "86j:94049",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Systems-Computers-Controls. The Transactions of the
                 Institute of Electronics and Communication Engineers of
                 Japan",
}

@InCollection{Lakshmivarahan:1983:APK,
  author =       "S. Lakshmivarahan",
  booktitle =    "Advances in computers, Vol. 22",
  title =        "Algorithms for public key cryptosystems: theory and
                 application",
  volume =       "22",
  publisher =    "Academic Press",
  address =      "New York",
  pages =        "45--108",
  year =         "1983",
  MRclass =      "94A60",
  MRnumber =     "86f:94027",
  MRreviewer =   "M. R{\u{a}}duic{\u{a}}",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Adv. in Comput.",
}

@Book{Levine:1983:USC,
  author =       "Jack Levine",
  title =        "{United States} cryptographic patents, 1861--1981",
  publisher =    "Cryptologia",
  address =      "Terre Haute, IN, USA",
  pages =        "69",
  year =         "1983",
  ISBN =         "0-9610560-0-2",
  ISBN-13 =      "978-0-9610560-0-1",
  LCCN =         "T223.Z1 .L48",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; patents",
}

@Article{Lomet:1983:HPU,
  author =       "David B. Lomet",
  title =        "A high performance, universal, key associative access
                 method",
  journal =      j-SIGMOD,
  volume =       "13",
  number =       "4",
  pages =        "120--133",
  month =        may,
  year =         "1983",
  CODEN =        "SRECD8",
  ISSN =         "0163-5808 (print), 1943-5835 (electronic)",
  ISSN-L =       "0163-5808",
  bibdate =      "Sat Mar 6 07:33:53 MST 2004",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMOD Record",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J689",
}

@InProceedings{Massey:1983:LFC,
  author =       "J. L. Massey",
  editor =       "Edward C. van der Meulen",
  booktitle =    "{Proceedings of the Fourth Symposium on Information
                 Theory in the Benelux: held at the Brembergcentrum,
                 Haasrode, Belgium, May 26--27, 1983}",
  title =        "Logarithms in finite cycle groups -- cryptographic
                 issues",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "17--25",
  year =         "1983",
  ISBN =         "90-334-0690-X",
  ISBN-13 =      "978-90-334-0690-4",
  LCCN =         "Q350 S988 1983",
  bibdate =      "Sun Mar 11 10:44:22 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@PhdThesis{Meijer:1983:CCC,
  author =       "Henk Meijer",
  title =        "Cryptology computational complexity and applications",
  volume =       "65915",
  type =         "Thesis ({Ph.D.})",
  publisher =    "National Library of Canada",
  school =       "Queen's University",
  address =      "Ottawa, ON, Canada",
  year =         "1983",
  ISBN =         "0-315-18006-4",
  ISBN-13 =      "978-0-315-18006-2",
  ISSN =         "0227-3845",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "2 microfiches (179 fr.)",
  series =       "Canadian theses on microfiche = Th{\`e}ses canadiennes
                 sur microfiche",
  acknowledgement = ack-nhfb,
}

@Article{Moler:1983:SVA,
  author =       "Cleve Moler and Donald Morrison",
  title =        "Singular Value Analysis of Cryptograms",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "90",
  number =       "2",
  pages =        "78--87",
  month =        feb,
  year =         "1983",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Mon Jun 28 12:37:03 MDT 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/page/journal/amermathmont/about.html",
}

@Article{Morrison:1983:SEA,
  author =       "D. R. Morrison",
  title =        "Subtractive encryptors: alternatives to the {DES}",
  journal =      j-SIGACT,
  volume =       "15",
  number =       "1",
  pages =        "67--77",
  month =        "Winter--Spring",
  year =         "1983",
  CODEN =        "SIGNDM",
  DOI =          "http://dx.doi.org/10.1145/1008908.1008919",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 08:21:21 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Muller-Schloer:1983:MBC,
  author =       "C. M{\"u}ller-Schloer",
  title =        "A microprocessor-based cryptoprocessor",
  journal =      j-IEEE-MICRO,
  volume =       "3",
  number =       "5",
  pages =        "5--15",
  month =        oct,
  year =         "1983",
  CODEN =        "IEMIDZ",
  DOI =          "http://dx.doi.org/10.1109/MM.1983.291160",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Mon Apr 7 14:32:46 MDT 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
  acknowledgement = ack-nhfb,
  classcodes =   "B6210L (Computer communications); C5250 (Microcomputer
                 techniques); C5620 (Computer networks and techniques)",
  classification = "723",
  corpsource =   "Siemens AG, Munich, West Germany",
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
  journalabr =   "IEEE Micro",
  keywords =     "computers; computers, microprocessor --- Applications;
                 crypto processor; cryptography; cryptoprocessor; data
                 communication systems; data encryption standard; data
                 privacy; data processing; electronic envelope;
                 electronic mail; hardware; host-computer application
                 programmer; hybrid system; IEEE 796 module;
                 IEEE-796-bus-compatible 8086 single-board computer;
                 microcomputers; microprocessor-based; RSA public-key;
                 satellite computers; security communication system;
                 software interface; special purpose; system; user
                 interface",
  treatment =    "P Practical",
}

@PhdThesis{Plumstead:1983:ISP,
  author =       "Joan Boyar Plumstead",
  title =        "Inferring Sequences Produced by Pseudo-Random Number
                 Generators",
  type =         "{Ph.D.} Dissertation",
  school =       "Department of Computer Science, University of
                 California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "ii + 56",
  month =        jun,
  year =         "1983",
  bibdate =      "Wed Jun 22 18:14:45 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "To solve the problem of inferring sequences produced
                 by pseudo-random number generators of a particular
                 form, one must present an efficient inference method
                 which, from knowledge of some of the numbers in a
                 sequence, predicts the remainder of the sequence.
                 Pseudo-random number generators of the following forms
                 are considered: (1) Linear congruential method, $ X(, i
                 + 1) = a X(, i) + b \bmod m $. (2) Linear congruences
                 with $n$ terms in the recurrence, for fixed $n$, $ X(,
                 i) = a(, 1) X(, i - 1) + a(, 2) X(, i - 2) + (.)(.)(.)
                 + a(, n) X(, i - n) + a(, n + 1) \bmod m $. (3)
                 Quadratic congruences, $ X(, i + 1) = a X(, i)('2) + b
                 X(, i) + c \bmod m $. In each case, it is assumed that
                 the coefficients and the modulus are unknown. It is
                 also assumed that whenever an incorrect prediction
                 occurs, the correct value is revealed before the next
                 prediction is made. Sequences of the first type can be
                 predicted with no more than $ 2 + \log (, 2) m $
                 errors, sequences of the second type with no more than
                 $ 2 + n('2) \log (, 2) n m $ errors, and sequences of
                 the third type with no more than $ 4 + 3 \log (, 2)m $
                 errors. All of the inference methods presented are
                 efficient. This shows that pseudo-random number
                 generators in any of these forms are cryptographically
                 insecure.",
  acknowledgement = ack-nhfb,
}

@PhdThesis{Plumstead:1983:ISPa,
  author =       "Joan Boyar Plumstead",
  title =        "Inferring Sequences Produced by Pseudo-Random Number
                 Generators",
  type =         "{Ph.D.} Dissertation",
  school =       "Department of Computer Science, University of
                 California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "ii + 56",
  month =        jun,
  year =         "1983",
  bibdate =      "Wed Jun 22 18:14:45 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "To solve the problem of inferring sequences produced
                 by pseudo-random number generators of a particular
                 form, one must present an efficient inference method
                 which, from knowledge of some of the numbers in a
                 sequence, predicts the remainder of the sequence.
                 Pseudo-random number generators of the following forms
                 are considered: (1) Linear congruential method, $ X(, i
                 + 1) = a X(, i) + b \bmod m $. (2) Linear congruences
                 with $n$ terms in the recurrence, for fixed $n$, $ X(,
                 i) = a(, 1) X(, i - 1) + a(, 2) X(, i - 2) + (.)(.)(.)
                 + a(, n) X(, i - n) + a(, n + 1) \bmod m $. (3)
                 Quadratic congruences, $ X(, i + 1) = a X(, i)('2) + b
                 X(, i) + c \bmod m $. In each case, it is assumed that
                 the coefficients and the modulus are unknown. It is
                 also assumed that whenever an incorrect prediction
                 occurs, the correct value is revealed before the next
                 prediction is made. Sequences of the first type can be
                 predicted with no more than $ 2 + \log (, 2) m $
                 errors, sequences of the second type with no more than
                 $ 2 + n('2) \log (, 2) n m $ errors, and sequences of
                 the third type with no more than $ 4 + 3 \log (, 2)m $
                 errors. All of the inference methods presented are
                 efficient. This shows that pseudo-random number
                 generators in any of these forms are cryptographically
                 insecure.",
  acknowledgement = ack-nhfb,
}

@Book{Price:1983:ABR,
  author =       "W. L. Price",
  title =        "Annotated bibliography of recent publications on data
                 security and cryptography",
  volume =       "35/83",
  publisher =    "National Physical Laboratory",
  address =      "Teddington, Middlesex, UK",
  edition =      "Sixth",
  pages =        "ii + 29",
  year =         "1983",
  LCCN =         "Z103.A1 P74 1983a",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted by permission of the Controller of Her
                 Britannic Majesty's Stationery Office. ``PB84-169168.''
                 Photocopy. Springfield, VA: National Technical
                 Information Service, [1983?]. 28 cm.",
  series =       "NPL-DITC",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- bibliography; data protection ---
                 bibliography",
}

@Article{Rivest:1983:MOD,
  author =       "R. L. Rivest and A. Shamir and L. Adleman",
  title =        "A Method for Obtaining Digital Signatures and
                 Public-Key Cryptosystems",
  journal =      j-CACM,
  volume =       "26",
  number =       "1",
  pages =        "96--99",
  month =        jan,
  year =         "1983",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Sep 22 11:37:34 1994",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "An encryption method is presented with the novel
                 property that publicly revealing an encryption key does
                 not thereby reveal the corresponding decryption key.
                 This has two important consequences: (1) Couriers or
                 other secure means are not needed to transmit keys,
                 since a message can be enciphered using an encryption
                 key publicly revealed by the intended recipient. Only
                 he can decipher the message, since only he knows the
                 corresponding decryption key. (2) A message can be
                 ``signed'' using a privately held decryption key.
                 Anyone can verify this signature using the
                 corresponding publicly revealed encryption key.
                 Signatures cannot be forged, and a signer cannot later
                 deny the validity of his signature. This has obvious
                 applications in ``electronic mail'' and ``electronic
                 funds transfer'' systems. A message is encrypted by
                 representing it as a number $M$, raising $M$ to a
                 publicly specified power $e$, and then taking the
                 remainder when the result is divided by the publicly
                 specified product, $n$, of two large secret prime
                 numbers $p$ and $q$. Decryption is similar; only a
                 different, secret, power $d$ is used, where $ e * d = =
                 1 (\mbox {mod}(p - 1)*(q - 1)) $. The security of the
                 system rests in part on the difficulty of factoring the
                 published divisor, n.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@TechReport{Rivest:1983:RET,
  author =       "Ronald L. Rivest and Alan T. Sherman",
  title =        "Randomized encryption techniques",
  type =         "Technical report",
  number =       "MIT/LCS/TM-234",
  institution =  "Massachusetts Institute of Technology, Laboratory for
                 Computer Science",
  address =      "Cambridge, MA, USA",
  pages =        "20",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Schell:1983:SPA,
  author =       "K. J. Schell",
  title =        "Security Printers Application of Lasers",
  journal =      "Proceedings of SPIE --- The International Society for
                 Optical Engineering",
  volume =       "396",
  pages =        "131--140",
  year =         "1983",
  CODEN =        "PSISDG",
  ISBN =         "0-89252-431-6",
  ISBN-13 =      "978-0-89252-431-0",
  ISSN =         "0277-786X (print), 1996-756X (electronic)",
  LCCN =         "TA1673 .A38 1983",
  bibdate =      "Mon May 11 18:28:54 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Industrial application of lasers in the graphic
                 industry is increasing. Examples are typesetting, color
                 separation and laser dot generating, laser printing,
                 laser gravure, laser plate making, etc. Application of
                 laser technology in the area of security printers had a
                 rather slow start but is speeding up rapidly. Encoding
                 credit cards by laser and holography are examples of
                 the application of lasers in this field. We summarize
                 known industrial applications of lasers in the graphic
                 industries and report about the applications of lasers
                 in the detection of a coded watermark. A step repeat
                 holographic laser camera for the production of
                 holograms in dichromatic gelatine is described.",
  acknowledgement = ack-nhfb,
  affiliation =  "Joh. Enschede \& Sons, Security Printers, Haarlem,
                 Neth",
  affiliationaddress = "Joh. Enschede \& Sons, Security Printers,
                 Haarlem, Neth",
  classification = "722; 743; 744; 745",
  conference =   "Advances in Laser Scanning and Recording.",
  journalabr =   "Proceedings of SPIE - The International Society for
                 Optical Engineering",
  keywords =     "coded watermark reacting; graphic industry laser
                 applications; graphic methods; holographic step and
                 repeat camera; Laser Applications; laser printing;
                 reflection holography; security printers' laser
                 applications; typesetting",
  meetingaddress = "Geneva, Switz",
  sponsor =      "SPIE, Bellingham, WA, USA",
}

@Article{Schobi:1983:FAT,
  author =       "P. Sch{\"o}bi and J. L. Massey",
  booktitle =    "Cryptography (Burg Feuerstein, 1982)",
  title =        "Fast authentication in a trapdoor-knapsack public key
                 cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "149",
  pages =        "289--306",
  year =         "1983",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94B99",
  MRnumber =     "84i:94047",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shamir:1983:ECT,
  author =       "Adi Shamir",
  title =        "Embedding Cryptographic Trapdoors in Arbitrary
                 Knapsack Systems",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "2",
  pages =        "77--79",
  day =          "24",
  month =        aug,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60",
  MRnumber =     "85e:94019",
  MRreviewer =   "Tai Yang Hwang",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C1260 (Information theory); C1290Z (Other
                 applications of systems theory); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Appl. Maths., Weizmann Inst. of Sci.,
                 Rehovot, Israel",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "arbitrary knapsack systems; cryptographic trapdoors;
                 cryptography; information theory; modular
                 multiplications; operations research; public-key
                 cryptography",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@Article{Shamir:1983:GCS,
  author =       "Adi Shamir",
  title =        "On the Generation of Cryptographically Strong
                 Pseudorandom Sequences",
  journal =      j-TOCS,
  volume =       "1",
  number =       "1",
  pages =        "38--44",
  month =        feb,
  year =         "1983",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 11:57:59 1999",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  keywords =     "TOCS",
}

@Article{Sicherman:1983:AQR,
  author =       "George L. Sicherman and Wiebren {De Jonge} and Reind
                 P. {Van De Riet}",
  title =        "Answering Queries without Revealing Secrets",
  journal =      j-TODS,
  volume =       "8",
  number =       "1",
  pages =        "41--59",
  month =        mar,
  year =         "1983",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Sat Apr 14 10:34:48 MDT 2001",
  bibsource =    "Compendex database; Database/Graefe.bib;
                 Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/tods.bib;
                 Misc/is.bib",
  note =         "Also published in/as: reprinted in deJonge thesis,
                 Jun. 1985.",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1983-8-1/p41-sicherman/p41-sicherman.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1983-8-1/p41-sicherman/",
  abstract =     "Question-answering systems must often keep certain
                 information secret. This can be accomplished, for
                 example, by sometimes refusing to answer a query. Here
                 the danger of revealing a secret by refusing to answer
                 a query is investigated. First several criteria that
                 can be used to decide whether or not to answer a query
                 are developed. First several criteria that can be used
                 to decide whether or not to answer a query are
                 developed. Then it is shown which of these criteria are
                 safe if the questioner knows nothing at all about what
                 is kept secret. Furthermore, it is proved that one of
                 these criteria is safe even if the user of the system
                 knows which information is to be kept secret.",
  acknowledgement = ack-nhfb,
  acmcrnumber =  "8404-296",
  classification = "723",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "database systems, statistical security TODS; keeping
                 secrets; refusal to answer; strategy",
  subject =      "Information Systems --- Models and Principles ---
                 Systems and Information Theory (H.1.1): {\bf Value of
                 information}; Information Systems --- Models and
                 Principles --- User/Machine Systems (H.1.2);
                 Information Systems --- Information Storage and
                 Retrieval --- Systems and Software (H.3.4): {\bf
                 Current awareness systems (selective dissemination of
                 information--SDI)**}; Information Systems ---
                 Information Storage and Retrieval --- Systems and
                 Software (H.3.4): {\bf Question-answering (fact
                 retrieval) systems**}; Computing Methodologies ---
                 Artificial Intelligence --- Deduction and Theorem
                 Proving (I.2.3): {\bf Answer/reason extraction}",
}

@MastersThesis{Sieminski:1983:SBB,
  author =       "Gregory C. Sieminski",
  title =        "The search for a balance between scientific freedom
                 and national security: a case study of cryptology",
  type =         "Thesis ({M.S.})",
  school =       "Defense Intelligence College",
  address =      "Washington, DC, USA",
  pages =        "v + 73",
  month =        nov,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Intellectual freedom; National security
                 --- United States",
}

@Article{Silverman:1983:RVS,
  author =       "Jonathan M. Silverman",
  title =        "Reflections on the verification of the security of an
                 operating system kernel",
  journal =      j-OPER-SYS-REV,
  volume =       "17",
  number =       "5",
  pages =        "143--154",
  month =        oct,
  year =         "1983",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:54 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@InProceedings{Simmons:1983:PPS,
  author =       "G. J. Simmons",
  title =        "The Prisoners' Problem and the Subliminal Channel",
  crossref =     "Chaum:1983:ACP",
  pages =        "51--67",
  year =         "1983",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1001.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Article{Smith:1983:HCR,
  author =       "J. W. Smith and S. S. {Wagstaff, Jr.}",
  booktitle =    "Proceedings of the fourteenth Southeastern conference
                 on combinatorics, graph theory and computing (Boca
                 Raton, Fla., 1983)",
  title =        "How to crack an {RSA} cryptosystem",
  journal =      j-CONG-NUM,
  volume =       "40",
  pages =        "367--373",
  year =         "1983",
  ISSN =         "0384-9864",
  MRclass =      "94A60",
  MRnumber =     "86d:94020",
  MRreviewer =   "S. Guia{\c{s}}u",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Congressus Numerantium. A Conference Journal on
                 Numerical Themes",
}

@Article{Smith:1983:PKC,
  author =       "John Smith",
  title =        "Public Key Cryptography: An Introduction to a Powerful
                 Cryptographic System for Use on Microcomputers",
  journal =      j-BYTE,
  volume =       "7",
  number =       "??",
  pages =        "198--218",
  month =        Jan,
  year =         "1983",
  CODEN =        "BYTEDJ",
  ISSN =         "0360-5280",
  ISSN-L =       "0360-5280",
  bibsource =    "/usr/local/src/bib/bibliography/Misc/security.1.bib;
                 /usr/local/src/bib/bibliography/Theory/ProbAlgs.bib;
                 http://www.math.utah.edu/pub/tex/bib/byte1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This is a simple exposition of public key
                 cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "BYTE Magazine",
  keywords =     "algorithms; computer security; cryptography; RSA",
  ort =          "Ordner Sicherheit",
}

@TechReport{USGSA:1983:ISR,
  author =       "{United States. General Services Administration} and
                 {National Communications System (U.S.). Office of
                 Technology and Standards} and {National Institute of
                 Standards and Technology (U. S.)}",
  title =        "Interoperability and security requirements for use of
                 the {Data Encryption Standard} in the physical layer of
                 data communications",
  institution =  "General Services Administration, Office of Information
                 Resources Management",
  address =      "Washington, DC, USA",
  pages =        "4",
  day =          "3",
  month =        aug,
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Federal standard 1026. Federal information processing
                 standards publication, FIPS PUB 139",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Standards.",
}

@Periodical{USNBS:1983:FPD,
  author =       "{United States. National Bureau of Standards}",
  title =        "{FIPS} Pub 46: {Data Encryption Standard}. {FIPS}
                 publication change notice",
  publisher =    "U.S. Department of Commerce, National Bureau of
                 Standards",
  address =      "Washinton, DC, USA",
  pages =        "various",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Electronic data processing departments --- Security
                 measures; Standards",
}

@Book{USWD:1983:EC,
  author =       "{United States. War Dept} and {United States.
                 Adjutant-General's Office}",
  title =        "Elements of cryptanalysis",
  publisher =    pub-USGPO,
  address =      pub-USGPO:adr,
  pages =        "165",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "United States. War Dept. Training pamphlet no. 3. War
                 Dept document no. 117",
  acknowledgement = ack-nhfb,
  annote =       "Master microform held by: UnM. OP 66639. Microfilm.
                 Ann Arbor, Mich.: University Microfilms International,
                 19--. 1 reel; 35 mm.",
  keywords =     "Ciphers; Cryptography.",
}

@Article{Voydock:1983:SMH,
  author =       "Victor L. Voydock and Stephen T. Kent",
  title =        "Security Mechanisms in High-Level Network Protocols",
  journal =      j-COMP-SURV,
  volume =       "15",
  number =       "2",
  pages =        "135--171",
  month =        jun,
  year =         "1983",
  CODEN =        "CMSVAN",
  DOI =          "http://doi.acm.org/10.1145/356909.356913",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Jun 19 09:32:27 MDT 2008",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
                 http://www.acm.org/pubs/contents/journals/surveys/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "The implications of adding security mechanisms to
                 high-level network protocols operating in an
                 open-system environment are analyzed. First the threats
                 to security that may arise in such an environment are
                 described, and then a set of goals for communications
                 security measures is established. This is followed by a
                 brief description of the two basic approaches to
                 communications security, link-oriented measures and
                 end-to-end measures, which concludes that end-to-end
                 measures are more appropriate in an open-system
                 environment. Next, relevant properties of data
                 encryption --- the fundamental technique on which all
                 communications security mechanisms are based --- are
                 discussed. The remainder of the paper describes how
                 end-to-end measures can be used to achieve each of the
                 security goals previously established.",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
  keywords =     "security os networks, computer networks",
}

@InProceedings{Wagner:1983:F,
  author =       "Neal R. Wagner",
  title =        "Fingerprinting",
  crossref =     "IEEE:1983:PSS",
  pages =        "18--22",
  year =         "1983",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1030.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Article{Willett:1983:TKS,
  author =       "Michael Willett",
  title =        "Trapdoor Knapsacks without Superincreasing Structure",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "1",
  pages =        "7--11",
  day =          "19",
  month =        jul,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "85e:94020",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C0230 (Economic, social and political aspects
                 of computing); C1260 (Information theory); C1290
                 (Applications of systems theory)",
  corpsource =   "Dept. of Math., Univ. of North Carolina, Greensboro,
                 NC, USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "computer programming; cryptography; information
                 theory; knapsacks; Merkle--Hellman public-key schemes;
                 operations research; polynomial-time algorithm;
                 superincreasing structure; trapdoor",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Williams:1983:PAP,
  author =       "M. H. Williams",
  title =        "The problem of absolute privacy",
  journal =      j-INFO-PROC-LETT,
  volume =       "17",
  number =       "3",
  pages =        "169--171",
  day =          "5",
  month =        oct,
  year =         "1983",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C6150J (Operating systems)",
  corpsource =   "Computer Sci. Dept., Heriot-Watt Univ., Edinburgh,
                 UK",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "computer operating systems; data privacy; data
                 processing --- Security of Data; data security; file
                 protection; operating systems (computers); security of
                 data",
  treatment =    "G General Review; P Practical",
}

@InProceedings{Winternitz:1983:POW,
  author =       "Robert S. Winternitz",
  title =        "Producing a One-Way Hash Function from {DES}",
  crossref =     "Chaum:1983:ACP",
  pages =        "203--207",
  year =         "1983",
  bibdate =      "Thu Oct 31 18:48:13 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
}

@Book{Wolfe:1983:FCC,
  author =       "Jack Martin Wolfe",
  title =        "A first course in cryptanalysis [!]",
  publisher =    "Brooklyn College Press",
  address =      "Brooklyn",
  pages =        "various",
  year =         "1983",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Three volumes.",
  acknowledgement = ack-nhfb,
  annote =       "Reproduced from type-written copy. Mimeographed on
                 rectos only. Bound in printed paper wrappers. Library
                 of the American Cryptogram Association (George C. Lamb
                 Collection) Master microform held by: UnM. Microfilm.
                 Ann Arbor, Mich., University Microfilms International,
                 19--. reels. 35 mm.",
  keywords =     "Ciphers; Cryptography",
}

@Book{Yardley:1983:CBC,
  author =       "Herbert O. Yardley",
  title =        "The {Chinese Black Chamber}: an adventure in
                 espionage",
  publisher =    pub-HOUGHTON-MIFFLIN,
  address =      pub-HOUGHTON-MIFFLIN:adr,
  pages =        "xxiv + 225",
  year =         "1983",
  ISBN =         "0-395-34648-7",
  ISBN-13 =      "978-0-395-34648-8",
  LCCN =         "DS777.533.S65 Y37 1983",
  bibdate =      "Tue Dec 01 10:58:49 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Chinese title: Chung-kuo hei shih.",
  price =        "US\$13.95",
  acknowledgement = ack-nhfb,
}

@InProceedings{Alexi:1984:RRB,
  author =       "W. Alexi and B. Chor and O. Goldreich and C. P.
                 Schnorr",
  title =        "{RSA\slash Rabin} Bits are {$ 1 / 2 + 1 \mbox {Poly}
                 (\log N) $} Secure",
  crossref =     "IEEE:1984:ASF",
  pages =        "449--457",
  year =         "1984",
  bibdate =      "Thu Apr 5 06:13:39 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Anonymous:1984:ESC,
  author =       "Anonymous",
  title =        "{EDP} security: communications, database, end user,
                 encryption: advanced security concepts",
  number =       "3",
  publisher =    "FTP",
  address =      "Port Jefferson Station, NY, USA",
  pages =        "various",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "FTP technical library EDP security",
  acknowledgement = ack-nhfb,
}

@Article{Apostolico:1984:PMM,
  author =       "A. Apostolico and R. Giancarlo",
  title =        "Pattern matching machine implementation of a fast test
                 for unique decipherability",
  journal =      j-INFO-PROC-LETT,
  volume =       "18",
  number =       "3",
  pages =        "155--158",
  day =          "30",
  month =        mar,
  year =         "1984",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B6140C (Optical information, image and video signal
                 processing); C1160 (Combinatorial mathematics); C1250
                 (Pattern recognition); C1260 (Information theory)",
  corpsource =   "ISI, Univ. of Salerno, Salerno, Italy",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "codes; fast implementation; graph theory; pattern
                 matching machine; pattern recognition; Sardinas-
                 Patterson-Even test; unique decipherability",
  treatment =    "N New Development; T Theoretical or Mathematical",
}

@Book{Barker:1984:CSG,
  author =       "Wayne G. Barker",
  title =        "Cryptanalysis of shift-register generated stream
                 cipher systems",
  volume =       "39",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "ix + 247",
  year =         "1984",
  ISBN =         "0-89412-062-X",
  ISBN-13 =      "978-0-89412-062-6",
  LCCN =         "Z 104 B37 1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  annote =       "Spine title: Cryptanalysis --- stream cipher
                 systems.",
  keywords =     "Ciphers; Cryptography",
}

@Article{Blum:1984:HGC,
  author =       "Manuel Blum and Silvio Micali",
  title =        "How to Generate Cryptographically Strong Sequences of
                 Pseudo-Random Bits",
  journal =      j-SIAM-J-COMPUT,
  volume =       "13",
  number =       "4",
  pages =        "850--864",
  month =        "????",
  year =         "1984",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  MRclass =      "68P25 (65C10 68Q20)",
  MRnumber =     "86a:68021",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  referencedin = "Referenced in \cite[Ref. 7]{Goldreich:1997:FMCb}.",
}

@InProceedings{Blum:1984:IUC,
  author =       "Manuel Blum",
  title =        "Independent Unbiased Coin Flips from a Correlated
                 Biased Source: a Finite State {Markov} Chain",
  crossref =     "IEEE:1984:ASF",
  pages =        "425--433",
  year =         "1984",
  bibdate =      "Thu Feb 02 17:24:58 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Boyer:1984:PCR,
  author =       "Robert S. Boyer and J. Strother Moore",
  title =        "Proof checking the {RSA} public key encryption
                 algorithm",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "91",
  number =       "3",
  pages =        "181--189",
  year =         "1984",
  CODEN =        "AMMYAE",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  MRclass =      "68P25 (68T15 94A60)",
  MRnumber =     "85k:68024",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/amermathmonthly1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  fjournal =     "The American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/page/journal/amermathmont/about.html",
}

@InCollection{Brickell:1984:EAA,
  author =       "E. F. Brickell and J. C. Lagarias and A. M. Odlyzko",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Evaluation of the {Adleman} attack on multiply
                 iterated knapsack cryptosystems (abstract)",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "39--42",
  year =         "1984",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "799 719",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Burton:1984:RPKa,
  author =       "Charles E. Burton",
  title =        "{RSA}: a Public Key Cryptography System Part {I}",
  journal =      j-DDJ,
  volume =       "9",
  number =       "3",
  pages =        "16--??",
  month =        mar,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 http://www.ddj.com/index/author/index.htm;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib;
                 http://www.math.utah.edu/pub/tex/bib/fortran2.bib",
  acknowledgement = ack-nhfb,
  classification = "723; 921",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "computer programming --- Algorithms; computer
                 programming languages --- Fortran; computer programs;
                 computers, microprocessor --- Applications;
                 cryptography; modulo arithmetic; multi precision
                 arithmetic; public key system (PKS); Rational Fortran
                 (RATFOR)",
  pagecount =    "22p between p 16 and 43",
}

@Article{Burton:1984:RPKb,
  author =       "Charles E. Burton",
  title =        "{RSA}: a Public Key Cryptography System Part {II}",
  journal =      j-DDJ,
  volume =       "9",
  number =       "4",
  pages =        "32--??",
  month =        apr,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 http://www.ddj.com/index/author/index.htm;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "computer programs; data processing; public key
                 cryptography",
  pagecount =    "20p between p 32 and 59",
}

@Article{Coppersmith:1984:FEL,
  author =       "D. Coppersmith",
  title =        "Fast evaluations of logarithms in fields of
                 characteristic two",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-30",
  number =       "4",
  pages =        "587--594",
  month =        "????",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1984.1056941",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Sun Mar 11 10:29:59 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Denning:1984:DSR,
  author =       "Dorothy E. Denning",
  title =        "Digital Signatures with {RSA} and Other Public-Key
                 Cryptosystems",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "388--392",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68P25",
  MRnumber =     "784 134",
  bibdate =      "Tue Dec 26 13:35:07 1995",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the Association for Computing
                 Machinery",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InCollection{Denning:1984:FEA,
  author =       "Dorothy E. Denning",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Field encryption and authentication",
  publisher =    pub-PLENUM,
  address =      pub-PLENUM:adr,
  pages =        "231--247",
  year =         "1984",
  MRclass =      "94A60",
  MRnumber =     "86j:94044",
  MRreviewer =   "Evangelos Kranakis",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
}

@Book{Franksen:1984:MBS,
  author =       "Ole Immanuel Franksen",
  title =        "{Mr. Babbage}'s secret: the tale of a cypher and
                 {APL}",
  publisher =    "Strandberg",
  address =      "Birkerod, Denmark",
  pages =        "319",
  year =         "1984",
  ISBN =         "87-87200-86-4",
  ISBN-13 =      "978-87-87200-86-8",
  LCCN =         "Z103.B2 F72 1984",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "APL (computer program language); Babbage, Charles,
                 1791--1871; ciphers --- history; cryptographers ---
                 Great Britain --- biography; cryptography --- history",
}

@Article{Frederickson:1984:PRT,
  author =       "P. Frederickson and R. Hiromoto and T. L. Jordan and
                 B. Smith and T. Warnock",
  title =        "Pseudo-random trees in {Monte Carlo}",
  journal =      j-PARALLEL-COMPUTING,
  volume =       "1",
  number =       "2",
  pages =        "175--180",
  month =        dec,
  year =         "1984",
  CODEN =        "PACOEJ",
  ISSN =         "0167-8191 (print), 1872-7336 (electronic)",
  ISSN-L =       "0167-8191",
  bibdate =      "Mon Apr 14 11:08:33 MDT 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/parallelcomputing.bib",
  acknowledgement = ack-nhfb,
  classification = "C1140G (Monte Carlo methods); C7300 (Natural
                 sciences computing); C7400 (Engineering computing)",
  corpsource =   "Los Alamos Nat. Lab., Los Alamos, NM, USA",
  fjournal =     "Parallel Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01678191/",
  keywords =     "digital simulation; Lehmer pseudorandom number
                 generator; MIMD architecture; Monte Carlo methods;
                 Monte Carlo simulations; parallel; parallel computers;
                 processing; pseudorandom trees; random number
                 generation; reproducibility; SIMD architecture;
                 supercomputer; trees (mathematics)",
  treatment =    "P Practical",
}

@Article{Goldwasser:1984:PE,
  author =       "Shafi Goldwasser and Silvio Micali",
  title =        "Probabilistic Encryption",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "28",
  number =       "2",
  pages =        "270--299",
  year =         "1984",
  CODEN =        "JCSSBM",
  ISSN =         "0022-0000",
  ISSN-L =       "0022-0000",
  MRclass =      "94A60 (11T71 68P25 68Q25)",
  MRnumber =     "86j:94047",
  MRreviewer =   "J. C. Lagarias",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  note =         "See also preliminary version in 14th STOC, 1982.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
  referencedin = "Referenced in \cite[Ref. 18]{Goldreich:1997:FMCb}.",
}

@PhdThesis{Goldwasser:1984:PET,
  author =       "Shafrira Goldwasser",
  title =        "Probabilistic encryption: theory and applications",
  type =         "Thesis ({Ph. D. in Computer Science})",
  school =       "Department of Computer Science, University of
                 California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "iv + 63",
  month =        dec,
  year =         "1984",
  LCCN =         "T7.6 .G628",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Photocopy. Ann Arbor, Mich.: University Microfilms
                 International, 1986. 22 cm.",
  keywords =     "Computers --- Access control; Cryptography;
                 dissertations; dissertations, academic --- UCB ---
                 computer science --- 1981--1990; University of
                 California, Berkeley. Computer Science Division",
}

@InProceedings{Grollmann:1984:CMP,
  author =       "J. Grollmann and A. L. Selman",
  title =        "Complexity Measures for Public-Key Cryptosystems",
  crossref =     "IEEE:1984:ASF",
  pages =        "495--503",
  year =         "1984",
  bibdate =      "Thu Apr 5 06:13:39 MDT 2001",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Grundler:1984:DEH,
  author =       "Edward James Grundler",
  title =        "A data encryption hardware software package",
  type =         "Project (M.S.)",
  school =       "California State University, Sacramento.",
  address =      "Sacramento, CA, USA",
  pages =        "vii + 81",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Electronic data processing departments --- Security
                 measures.",
}

@Article{Haddon:1984:BRS,
  author =       "Bruce K. Haddon",
  title =        "Book review of ``{Security, IFIP\slash Sec'83:
                 proceedings of the first security conference''
                 North-Holland Publishing Co. 1983}",
  journal =      j-OPER-SYS-REV,
  volume =       "18",
  number =       "3",
  pages =        "14--14",
  month =        jul,
  year =         "1984",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:45 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See \cite{Feak:1983:SIS}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Haskett:1984:PAU,
  author =       "James A. Haskett",
  title =        "Pass-Algorithms: a User Validation Scheme Based on
                 Knowledge of Secret Algorithms",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "777--781",
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 22 06:48:51 MST 2001",
  bibsource =    "http://dblp.uni-trier.de/db/journals/cacm/cacm27.html#Haskett84;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "cryptography",
  oldlabel =     "Haskett84",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/cacm/Haskett84",
}

@TechReport{IRD:1984:DTV,
  author =       "{International Resource Development, Inc.}",
  title =        "Data, text, and voice encryption equipment",
  type =         "Report",
  number =       "630",
  institution =  "International Resource Development",
  address =      "6 Prowitt St., Norwalk, CT 06855, USA",
  pages =        "vi + 184",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography equipment industry --- United States;
                 Market surveys --- United States.",
}

@InCollection{Jurgensen:1984:SRI,
  author =       "H. J{\"u}rgensen and D. E. Matthews",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Some results on the information theoretic analysis of
                 cryptosystems",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "303--356",
  year =         "1984",
  MRclass =      "94A60 (68Q25 94A17)",
  MRnumber =     "87b:94038",
  MRreviewer =   "James W. Snively, Jr.",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Kahn:1984:COS,
  author =       "D. Kahn",
  title =        "Cryptology and the origins of spread spectrum",
  journal =      j-IEEE-SPECTRUM,
  volume =       "21",
  number =       "9",
  pages =        "70--80",
  month =        sep,
  year =         "1984",
  CODEN =        "IEESAM",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1009.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  keywords =     "information hiding; steganography",
}

@Article{Kak:1984:MPK,
  author =       "S. C. Kak",
  title =        "On the method of puzzles for key distribution",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "13",
  number =       "2",
  pages =        "103--109",
  month =        apr,
  year =         "1984",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  bibdate =      "Sat Apr 26 12:20:22 MDT 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C6130 (Data handling techniques)",
  corpsource =   "Dept. of Electr. and Comput. Eng., Louisiana State
                 Univ., Baton Rouge, LA, USA",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "codes; cryptography; key distribution; nested puzzles
                 method; public channel; puzzles; work advantage",
  treatment =    "P Practical",
}

@MastersThesis{Kaliski:1984:AWA,
  author =       "Burton Stephen {Kaliski, Jr.}",
  title =        "Analysis of {Wyner}'s analog encryption scheme",
  type =         "Thesis ({B.S.})",
  school =       "Department of Electrical Engineering and Computer
                 Science, Massachusetts Institute of Technology",
  address =      "Cambridge, MA, USA",
  pages =        "97",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Supervised by Ronald L. Rivest.",
  acknowledgement = ack-nhfb,
}

@Article{Kothari:1984:CMW,
  author =       "S. Kothari and S. Lakshmivarahan",
  title =        "On the concealability of messages by the {Williams}
                 public-key encryption scheme",
  journal =      j-COMP-MATH-APPL,
  volume =       "10",
  number =       "1",
  pages =        "15--24",
  year =         "1984",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94A60",
  MRnumber =     "85e:94017",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Computers \& Mathematics with Applications. An
                 International Journal",
}

@Book{Kozaczuk:1984:EHGa,
  author =       "W{\l}adys{\l}aw Kozaczuk",
  title =        "{Enigma}: how the {German} machine cipher was broken,
                 and how it was read by the {Allies} in {World War
                 Two}",
  publisher =    "Arms and Armour",
  address =      "London, UK",
  pages =        "xiv + 348",
  year =         "1984",
  ISBN =         "0-85368-640-8",
  ISBN-13 =      "978-0-85368-640-8",
  LCCN =         "D810.C88 K6813 1984b",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Translation of: W kregu Enigmy.",
  acknowledgement = ack-nhfb,
  keywords =     "World War, 1939--1945 --- cryptography",
}

@Book{Kozaczuk:1984:EHGb,
  author =       "W{\l}adys{\l}aw Kozaczuk",
  title =        "{Enigma}: How the {German} Machine Cipher Was Broken,
                 and How It Was Read by the {Allies} in {World War
                 Two}",
  publisher =    "University Publications of America",
  address =      "Frederick, MD, USA",
  pages =        "xiv + 348",
  year =         "1984",
  ISBN =         "0-89093-547-5",
  ISBN-13 =      "978-0-89093-547-7",
  LCCN =         "D810.C88 K6813 1984",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Edited and translated by Christopher Kasparek, from
                 the original Polish edition, {\em W kr{\c{e}}gu
                 Enigma}, Ksi{\c{a}}{\d{z}}ka i Wiedza, Warsaw, 1979.",
  price =        "US\$24.00",
  series =       "Foreign intelligence book series",
  acknowledgement = ack-nhfb,
  keywords =     "machine ciphers; World War, 1939--1945 ---
                 cryptography",
}

@InCollection{Lagarias:1984:KPK,
  author =       "J. C. Lagarias",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Knapsack public key cryptosystems and {Diophantine}
                 approximation (extended abstract)",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "3--23",
  year =         "1984",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "86j:94050",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@Article{Lagarias:1984:PAS,
  author =       "J. C. Lagarias",
  booktitle =    "Automata, languages and programming (Antwerp, 1984)",
  title =        "Performance analysis of {Shamir}'s attack on the basic
                 {Merkle--Hellman} knapsack cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "172",
  pages =        "312--323",
  year =         "1984",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "68P25",
  MRnumber =     "784 259",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Landwehr:1984:SMM,
  author =       "Carl E. Landwehr and Constance L. Heitmeyer and John
                 McLean",
  title =        "A Security Model for Military Message System",
  journal =      j-TOCS,
  volume =       "2",
  number =       "3",
  pages =        "198--222",
  month =        aug,
  year =         "1984",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold/1984.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/bibsec.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@InCollection{Lidl:1984:PPR,
  author =       "Rudolf Lidl and Winfried B. M{\"u}ller",
  booktitle =    "Advances in cryptology (Santa Barbara, Calif., 1983)",
  title =        "Permutation polynomials in {RSA}-cryptosystems",
  publisher =    "Plenum",
  address =      "New York",
  pages =        "293--301",
  year =         "1984",
  MRclass =      "94A60 (11T06)",
  MRnumber =     "86i:94040",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@TechReport{NCSOTS:1984:ISR,
  author =       "{National Communications System (U.S.). Office of
                 Technology and Standards}",
  title =        "Interoperability and security requirements for use of
                 the {Data Encryption Standard} in the physical layer of
                 data communications",
  type =         "Federal standard",
  number =       "1026",
  institution =  "General Services Administration, Office of Information
                 Resources Management",
  address =      "Washington, DC, USA",
  pages =        "various",
  day =          "3",
  month =        aug,
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  govtdocnumber = "GS 2.8/3:1026 563",
  keywords =     "Cryptography --- Standards --- United States;
                 Government information --- Standards --- United
                 States",
}

@InProceedings{Nobauer:1984:CRS,
  author =       "Rupert N{\"o}bauer",
  title =        "Cryptanalysis of the {R{\'e}dei}-scheme",
  crossref =     "Eigenthaler:1984:CGA",
  pages =        "255--264",
  year =         "1984",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "87b:94040",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Odlyzko:1984:CAM,
  author =       "Andrew M. Odlyzko",
  title =        "Cryptanalytic attacks on the multiplicative knapsack
                 cryptosystem and on {Shamir}'s fast signature scheme",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-30",
  number =       "4",
  pages =        "594--601",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1984.1056942",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "86i:94041",
  MRreviewer =   "Tai Yang Hwang",
  bibdate =      "Mon Jul 19 07:08:40 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.research.att.com/~amo/doc/arch/knapsack.attacks.pdf;
                 http://www.research.att.com/~amo/doc/arch/knapsack.attacks.ps;
                 http://www.research.att.com/~amo/doc/arch/knapsack.attacks.troff",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  xxtitle =      "Cryptanalytic attacks on the multiplicative knapsack
                 cryptosystem and on {Shamir's} signature scheme",
}

@Article{Ozarow:1984:WTC,
  author =       "Lawrence H. Ozarow and Aaron D. Wyner",
  title =        "Wire-tap channel {II}",
  journal =      j-ATT-BELL-LAB-TECH-J,
  volume =       "63",
  number =       "10 part 1",
  pages =        "2135--2157",
  year =         "1984",
  CODEN =        "ABLJER",
  ISSN =         "0748-612X",
  bibdate =      "Fri Nov 12 09:17:39 2010",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "In this paper we study a communication system in which
                 an unauthorized intruder is able to intercept a subset
                 of the transmitted symbols, and it is desired to
                 maximize the intruder's uncertainty about the data
                 without the use of an encryption key (either public or
                 private).",
  acknowledgement = ack-nhfb,
  fjournal =     "AT\&T Bell Laboratories Technical Journal",
  keywords =     "computers --- data communication systems",
  subject =      "conditional entropy; intruder's uncertainty;
                 unauthorized intruder; wire-tap channel",
  topic =        "data processing",
}

@Article{Rao:1984:JEE,
  author =       "T. R. N. Rao",
  title =        "Joint encryption and error correction schemes",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "12",
  number =       "3",
  pages =        "240--241",
  month =        jun,
  year =         "1984",
  CODEN =        "CANED2",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri May 12 09:40:54 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Reeds:1984:FSU,
  author =       "James A. Reeds and Peter J. Weinberger",
  title =        "File Security and the {UNIX} System {\tt crypt}
                 Command",
  journal =      j-ATT-BELL-LAB-TECH-J,
  volume =       "63",
  number =       "8 part 2",
  pages =        "1673--1683",
  month =        oct,
  year =         "1984",
  CODEN =        "ABLJER",
  ISSN =         "0748-612X",
  bibdate =      "Fri Nov 12 09:17:39 2010",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Reprinted in \cite[pp.~93--103]{ATT:1986:AUS}.",
  abstract =     "Sufficiently large files encrypted with the UNIX
                 system {\tt crypt} command can be deciphered in a few
                 hours by algebraic techniques and human interaction. We
                 outline such a decryption method and show it to be
                 applicable to a proposed strengthened algorithm as
                 well. We also discuss the role of encryption in file
                 security.",
  acknowledgement = ack-nhfb,
  fjournal =     "AT\&T Bell Laboratories Technical Journal",
  keywords =     "computer systems, digital",
  subject =      "crypt command; encryption; file security; UNIX
                 system",
  topic =        "data processing",
}

@Article{Rivest:1984:HEE,
  author =       "Ronald L. Rivest and Adi Shamir",
  title =        "How to Expose an Eavesdropper",
  journal =      j-CACM,
  volume =       "27",
  number =       "4",
  pages =        "393--395",
  month =        apr,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Jan 27 13:18:33 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cacm1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Routh:1984:PAA,
  author =       "Richard LeRoy Routh",
  title =        "A proposal for an architectural approach which
                 apparently solves all known software-based internal
                 computer security problems",
  journal =      j-OPER-SYS-REV,
  volume =       "18",
  number =       "3",
  pages =        "31--39",
  month =        jul,
  year =         "1984",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:45 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Saltzer:1984:EEA,
  author =       "J. H. Saltzer and D. P. Reed and D. D. Clark",
  key =          "Saltzer et al.",
  title =        "End-to-End Arguments in System Design",
  journal =      j-TOCS,
  volume =       "2",
  number =       "4",
  pages =        "277--288",
  month =        nov,
  year =         "1984",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Wed Mar 6 11:12:06 1985",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Graefe.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/digital.library.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Os/os.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/SE/dependability.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "This paper presents a design principle that helps
                 guide placement of functions among the modules of a
                 distributed computer system. The principle, called the
                 end-to-end argument, suggests that functions placed at
                 low levels of a system may be redundant or of little
                 value when compared with the cost of providing them at
                 that low level. Examples discussed in the paper include
                 bit-error recovery, security using encryption,
                 duplicate message suppression, recovery from system
                 crashes, and delivery acknowledgement. Low-level
                 mechanisms to support these functions are justified
                 only as performed enhancements.",
  acknowledgement = ack-nhfb,
  comments =     "Argues that you should put functionality at the higher
                 app layers, rather than at low layers. Includes a
                 security example",
  entered-by =   "Andreas Paepcke",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  keywords =     "data communication; design; design principles;
                 protocol design; TOCS",
}

@Book{Schroeder:1984:NTS,
  author =       "M. R. (Manfred Robert) Schroeder",
  title =        "Number theory in science and communication: with
                 applications in cryptography, physics, biology, digital
                 information, and computing",
  volume =       "7",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 324",
  year =         "1984",
  ISBN =         "0-387-12164-1",
  ISBN-13 =      "978-0-387-12164-2",
  LCCN =         "QA241 .S318 1984",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Springer series in information sciences",
  acknowledgement = ack-nhfb,
  keywords =     "number theory",
}

@Article{Shamir:1984:CCV,
  author =       "A. Shamir and C. P. Schnorr",
  title =        "Cryptanalysis of Certain Variants of {Rabin}'s
                 Signature Scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "19",
  number =       "3",
  pages =        "113--115",
  day =          "19",
  month =        oct,
  year =         "1984",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "86e:68029",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  classification = "723; C6130 (Data handling techniques)",
  corpsource =   "Dept. of Appl. Math., Weizmann Inst. of Sci., Rehovot,
                 Israel",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "cleartext attacks; cryptanalysis; cryptography;
                 digital signatures; natural perturbation techniques;
                 protect; Rabin's signature scheme",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Shamir:1984:PTA,
  author =       "Adi Shamir",
  title =        "A polynomial-time algorithm for breaking the basic
                 {Merkle--Hellman} cryptosystem",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "30",
  number =       "5",
  pages =        "699--704",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1984.1056964",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60",
  MRnumber =     "86m:94032",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Siegenthaler:1984:CIN,
  author =       "T. Siegenthaler",
  title =        "Correlation-Immunity of Nonlinear Combining Functions
                 for Cryptographic Applications",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-30",
  number =       "5",
  pages =        "776--780",
  year =         "1984",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1984.1056949",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Mon Nov 30 09:02:43 1998",
  bibsource =    "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@Article{Simmons:1984:HID,
  author =       "G. J. Simmons",
  title =        "How to Insure that Data Acquired to Verify Treaty
                 Compliance are Trustworthy",
  journal =      j-PROC-IEEE,
  volume =       "76",
  number =       "5",
  pages =        "621--627",
  month =        may,
  year =         "1984",
  CODEN =        "IEEPAD",
  ISSN =         "0018-9219",
  ISSN-L =       "0018-9219",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1003.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the IEEE",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5",
  keywords =     "information hiding; steganography",
}

@Misc{StJohns:1984:RAS,
  author =       "M. {St. Johns}",
  title =        "{RFC 912}: Authentication service",
  day =          "1",
  month =        sep,
  year =         "1984",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}. Status:
                 UNKNOWN.",
  URL =          "ftp://ftp.internic.net/rfc/rfc912.txt;
                 ftp://ftp.internic.net/rfc/rfc931.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc912.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  format =       "TXT=4544 bytes",
  obsoletedby =  "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}.",
  online =       "yes",
  status =       "UNKNOWN",
}

@Article{Summers:1984:OCS,
  author =       "R. C. Summers",
  title =        "An Overview of Computer Security",
  journal =      j-IBM-SYS-J,
  volume =       "23",
  number =       "4",
  pages =        "309--325",
  year =         "1984",
  CODEN =        "IBMSA7",
  ISSN =         "0018-8670",
  bibdate =      "Wed Jan 08 16:35:07 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "Presented is an overview of computer security,
                 including concepts, techniques, and measures relating
                 to the protection of computing systems and the
                 information they maintain against deliberate or
                 accidental threats. Motivations for security measures
                 are discussed. Security strategies are considered.
                 Actions and events that threaten security are
                 described, along with technical problems that can
                 prevent the computer from adequately dealing with
                 threats. Security models are surveyed. Specific
                 technical and administrative measures for promoting
                 security are described. Among the technical measures
                 discussed are design of secure systems, hardware and
                 operating systems, identification of users, encryption,
                 and access control packages. Administrative measures
                 include personnel, physical security of the computing
                 system, and auditing.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Los Angeles Scientific Cent, Los Angeles, CA,
                 USA",
  affiliationaddress = "IBM, Los Angeles Scientific Cent, Los Angeles,
                 CA, USA",
  classification = "723; 731",
  fjournal =     "IBM Systems Journal",
  journalabr =   "IBM Syst J",
  keywords =     "data processing; encryption; process control ---
                 Computer Applications; security measures; security
                 model; Security of Data; security threat sources",
}

@Article{Thersites:1984:IKE,
  author =       "Joan Thersites and John A. Thomas",
  title =        "An Infinite Key Encryption System",
  journal =      j-DDJ,
  volume =       "9",
  number =       "8",
  pages =        "44--??",
  month =        aug,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Mon Sep 2 09:09:39 MDT 1996",
  bibsource =    "http://www.ddj.com/index/author/index.htm;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  xxnote =       "??Check author order??",
}

@Article{Thomas:1984:IKE,
  author =       "John A. Thomas and Joan Thersites",
  title =        "Infinite Key Encryption System",
  journal =      j-DDJ,
  volume =       "9",
  number =       "8",
  pages =        "44--??",
  month =        aug,
  year =         "1984",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "codes, symbolic; computer programs; computers,
                 microcomputer; cryptography; data processing; file
                 encryption; infinite key encryption system; program
                 code; Security of Data",
  pagecount =    "35p between p 44 and 85",
}

@Article{Thompson:1984:RTT,
  author =       "Ken Thompson",
  title =        "Reflections on Trusting Trust",
  journal =      j-CACM,
  volume =       "27",
  number =       "8",
  pages =        "761--763",
  month =        aug,
  year =         "1984",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Object/Nierstrasz.bib;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/index-table-c.html#cacm1980",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1028.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "information hiding; security; steganography; unix",
}

@Book{TI:1984:TTU,
  author =       "{Texas Instruments Inc}.",
  title =        "{TMS7500 TMS75C00} user's guide, data encryption
                 device: 8-bit microcomputer family",
  publisher =    "Texas Instruments",
  address =      "Dallas, TX, USA",
  pages =        "various",
  year =         "1984",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "SPNU004",
  keywords =     "Microcomputers; TMS7500 (Computer).",
}

@Manual{USGSAOIRM:1984:ISR,
  author =       "{United States. General Services Administration.
                 Office of Information Resources Management}",
  title =        "Interoperability and security requirements for use of
                 the {Data Encryption Standard} in the physical layer of
                 data communications",
  number =       "1026",
  publisher =    "General Services Administration",
  address =      "Office of Information Resources Management",
  pages =        "various",
  year =         "1984",
  LCCN =         "GS 2.8/3:1026 Govt Pubs",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Cover title. ``August 3, 1983.'' ``FSC TELE.''",
  series =       "Federal standard",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- standards --- United States;
                 government information --- standards --- United
                 States",
}

@Article{Voydock:1984:SMT,
  author =       "Victor L. Voydock and Stephen T. Kent",
  title =        "Security Mechanisms in a Transport Layer Protocol",
  journal =      j-COMP-NET,
  volume =       "8",
  number =       "5--6",
  pages =        "433--449",
  month =        oct # "\slash " # dec,
  year =         "1984",
  CODEN =        "CNETDP",
  ISSN =         "0376-5075",
  ISSN-L =       "0376-5075",
  bibdate =      "Sat Sep 25 20:21:07 MDT 1999",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Microcom Inc, Norwood, MA, USA",
  classification = "723; 902",
  fjournal =     "Computer Networks",
  journalabr =   "Comput Networks",
  keywords =     "Communication Systems; computer architecture ---
                 Standards; computer networks; computers --- Data; data
                 encryption standard; data processing --- Security of
                 Data; Protocols; security; transport layer protocol",
}

@InProceedings{Wah:1984:RAM,
  author =       "P. K. S. Wah and M. Z. Wang",
  editor =       "{IEEE}",
  booktitle =    "{1984 International Zurich Seminar on Digital
                 Communications: applications of source coding, channel
                 coding and secrecy coding: March 6--8, 1984,
                 Z{\"u}rich, Switzerland, Swiss Federal Institute of
                 Technology: proceedings}",
  title =        "Realization and application of the {Massey--Omura}
                 lock",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "175--182",
  year =         "1984",
  LCCN =         "TK7881.5 I65 1984",
  bibdate =      "Sun Mar 11 10:47:07 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "IEEE catalog number 84CH1998-4.",
  acknowledgement = ack-nhfb,
  bookpages =    "xi + 201",
}

@Article{Winternitz:1984:SOH,
  author =       "Robert S. Winternitz",
  title =        "Secure One-Way Hash Function Built from {DES}",
  journal =      "Proceedings of the Symposium on Security and Privacy",
  pages =        "88--90",
  year =         "1984",
  CODEN =        "PSSPEO",
  ISBN =         "0-8186-0532-4",
  ISBN-13 =      "978-0-8186-0532-1",
  LCCN =         "QA76.9.A25 S95 1984",
  bibdate =      "Tue May 12 09:47:14 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "IEEE Service Cent. Piscataway, NJ, USA.",
  acknowledgement = ack-nhfb,
  classification = "723; 902",
  conference =   "Proceedings of the 1984 Symposium on Security and
                 Privacy.",
  journalabr =   "Proc Symp Secur Privacy",
  keywords =     "authentication of information; data encryption
                 standard (des); data processing; digital message
                 signing for security and efficiency; encryption
                 algorithms; randomly chosen block cipher; secure
                 one-way hash function",
  meetingaddress = "Oakland, CA, USA",
  sponsor =      "IEEE Computer Soc, Technical Committee on Security \&
                 Privacy, Los Alamitos, Calif, USA; IEEE, New York, NY,
                 USA",
}

@InProceedings{Akl:1985:FPR,
  author =       "Selim G. Akl and Henk Meijer",
  title =        "A Fast Pseudo Random Permutation Generator With
                 Applications to Cryptology",
  crossref =     "Blakley:1985:ACP",
  pages =        "269--275",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=269",
  acknowledgement = ack-nhfb,
}

@InProceedings{Anonymous:1985:BM,
  author =       "Anonymous",
  title =        "Back matter",
  crossref =     "Blakley:1985:ACP",
  pages =        "??--??",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=??",
  acknowledgement = ack-nhfb,
}

@TechReport{Anonymous:1985:DEA,
  author =       "Anonymous",
  title =        "Data encryption algorithm: Electronic funds transfer:
                 requirements for interfaces",
  institution =  "????",
  address =      "????",
  pages =        "16",
  year =         "1985",
  ISBN =         "0-7262-3764-7",
  ISBN-13 =      "978-0-7262-3764-5",
  bibdate =      "Wed Sep 28 07:58:30 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{Aruliah:1985:PIE,
  author =       "A. A. Aruliah and G. I. Parkin and Brian A. Wichmann",
  title =        "A {Pascal} implementation of the {DES} encryption
                 algorithm including cipher block chaining",
  type =         "NPL report",
  number =       "DITC 61/85",
  institution =  "National Physical Laboratory, Division of Information
                 Technology and Computing",
  address =      "Teddington, Middlesex, UK",
  pages =        "37",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Electronic data processing; Pascal
                 (Computer program language)",
}

@InProceedings{Beker:1985:KMS,
  author =       "Henry Beker and Michael Walker",
  title =        "Key Management for Secure Electronic Funds Transfer in
                 a Retail Environment",
  crossref =     "Blakley:1985:ACP",
  pages =        "401--410",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=401",
  acknowledgement = ack-nhfb,
}

@Book{Beker:1985:SSC,
  author =       "Henry Beker and F. C. (Frederick Charles) Piper",
  title =        "Secure speech communications",
  volume =       "3",
  publisher =    pub-ACADEMIC,
  address =      pub-ACADEMIC:adr,
  pages =        "xi + 267",
  year =         "1985",
  ISBN =         "0-12-084780-9",
  ISBN-13 =      "978-0-12-084780-8",
  LCCN =         "TK5102.5 .B354 1985",
  bibdate =      "Fri Nov 25 08:37:47 MST 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Microelectronics and signal processing",
  acknowledgement = ack-nhfb,
  subject =      "Scrambling systems (Telecommunication)",
}

@InProceedings{Bennett:1985:UQC,
  author =       "Charles H. Bennett and Gilles Brassard",
  title =        "An Update on Quantum Cryptography",
  crossref =     "Blakley:1985:ACP",
  pages =        "475--480",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=475",
  acknowledgement = ack-nhfb,
}

@Article{Birrell:1985:SCU,
  author =       "Andrew D. Birrell",
  title =        "Secure Communication Using Remote Procedure Calls",
  journal =      j-TOCS,
  volume =       "3",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "1985",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 06:47:30 MST 1999",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tocs/1985-3-1/p1-birrell/",
  abstract =     "Research on encryption-based secure communication
                 protocols has reached a stage where it is feasible to
                 construct end-to-end secure protocols. The design of
                 such a protocol, built as part of a remote procedure
                 call package, is described. The security abstraction
                 presented to users of the package, the authentication
                 mechanisms, and the protocol for encrypting and
                 verifying remote calls are also described.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Xerox Corp",
  classification = "723",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  journalabr =   "ACM Trans Comput Syst",
  keywords =     "computer networks; cryptography; design;
                 experimentation; Protocols; remote procedure calls;
                 secure communication; security",
  subject =      "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
                 Protection, Cryptographic controls. {\bf C.2.0}
                 Computer Systems Organization, COMPUTER-COMMUNICATION
                 NETWORKS, General, Security and protection (e.g.,
                 firewalls). {\bf C.2.2} Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
                 Protocol architecture.",
}

@InProceedings{Blake:1985:CLG,
  author =       "I. F. Blake and R. C. Mullin and S. A. Vanstone",
  title =        "Computing Logarithms in {$ {\rm GF}(2^n) $}",
  crossref =     "Blakley:1985:ACP",
  pages =        "73--82",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=73",
  acknowledgement = ack-nhfb,
}

@InProceedings{Blakley:1985:ITF,
  author =       "G. R. Blakley",
  title =        "Information Theory without the Finiteness Assumption,
                 {I}: Cryptosystems as Group-Theoretic Objects",
  crossref =     "Blakley:1985:ACP",
  pages =        "314--338",
  year =         "1985",
  MRclass =      "94A60 (20F99)",
  MRnumber =     "87c:94034",
  MRreviewer =   "D. Lieberman",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=314",
  acknowledgement = ack-nhfb,
}

@InProceedings{Blakley:1985:SRS,
  author =       "G. R. Blakley and Catherine Meadows",
  title =        "Security of Ramp Schemes",
  crossref =     "Blakley:1985:ACP",
  pages =        "242--268",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=242",
  acknowledgement = ack-nhfb,
}

@InProceedings{Blum:1985:EPP,
  author =       "Manuel Blum and Shafi Goldwasser",
  title =        "An Efficient Probabilistic Public-Key Encryption
                 Scheme Which Hides All Partial Information",
  crossref =     "Blakley:1985:ACP",
  pages =        "289--302",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "87e:94029",
  MRreviewer =   "Willi Meier",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=289",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Goldreich:1997:FMCb}.",
  xxpages =      "289--299",
}

@Article{Book:1985:CRE,
  author =       "Ronald V. Book and Friedrich Otto",
  title =        "Cancellation Rules and Extended Word Problems",
  journal =      j-INFO-PROC-LETT,
  volume =       "20",
  number =       "1",
  pages =        "5--11",
  day =          "2",
  month =        jan,
  year =         "1985",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68Q45 (03D03)",
  MRnumber =     "87d:68054",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Univ of California, Santa Barbara, Dep of Mathematics,
                 Santa Barbara, CA, USA",
  affiliationaddress = "Univ of California, Santa Barbara, Dep of
                 Mathematics, Santa Barbara, CA, USA",
  classification = "721; B6120B (Codes); B6150 (Communication system
                 theory)",
  corpsource =   "Dept. of Maths., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "automata theory; cancellation rules; Church--Rosser
                 property; church-rosser property; computer metatheory;
                 congruences; cryptography; extended word problems;
                 Formal Languages; formal model; name-stamp protocols;
                 protocols; public key encryption; rewriting process;
                 secure network communication; Thue systems",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Book:1985:SNP,
  author =       "R. V. Book and F. Otto",
  title =        "On the security of name-stamp protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "39",
  number =       "2-3",
  pages =        "319--325",
  month =        aug,
  year =         "1985",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
  acknowledgement = ack-nhfb,
  classification = "C5620 (Computer networks and techniques); C6130
                 (Data handling techniques)",
  corpsource =   "Dept. of Math., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "cryptography; name-stamp protocols; p-parity cascade
                 protocols; protocols; security; two-party cascade
                 protocols",
  pubcountry =   "Netherlands A15",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Book:1985:SNS,
  author =       "R. V. Book and F. Otto",
  title =        "On the security of name-stamp protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "39",
  number =       "2-3",
  pages =        "319--325",
  month =        aug,
  year =         "1985",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "C5620 (Computer networks and techniques); C6130
                 (Data handling techniques)",
  corpsource =   "Dept. of Math., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "cryptography; name-stamp protocols; p-parity cascade
                 protocols; protocols; security; two-party cascade
                 protocols",
  pubcountry =   "Netherlands A15",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Book:1985:VTA,
  author =       "R. V. Book and F. Otto",
  title =        "On the verifiability of two-party algebraic
                 protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "40",
  number =       "2-3",
  pages =        "101--130",
  month =        "????",
  year =         "1985",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
  acknowledgement = ack-nhfb,
  classification = "B6210L (Computer communications); C5620 (Computer
                 networks and techniques); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Math., California Univ., Santa Barbara, CA,
                 USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "communication protocols; cryptography; protocols;
                 public-key cryptosystems; two-party algebraic
                 protocols; verifiability",
  pubcountry =   "Netherlands A02",
  treatment =    "P Practical; T Theoretical or Mathematical",
}

@Article{Bounas:1985:DDS,
  author =       "Adam C. Bounas",
  title =        "Direct determination of a ``seed'' binary matrix",
  journal =      j-INFO-PROC-LETT,
  volume =       "20",
  number =       "1",
  pages =        "47--50",
  day =          "2",
  month =        jan,
  year =         "1985",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "94A60 (94A15)",
  MRnumber =     "86g:94038",
  MRreviewer =   "S. Guia{\c{s}}u",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Greek Atomic Energy Commission, Computer Science
                 Dep, Attiki, Greece",
  classification = "723; 922; B6120B (Codes); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Comput. Sci., Min. of Res. and Technol.,
                 Greek Atomic Energy Comm., Attiki, Greece",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "binary matrix; cryptography; data transformation;
                 generalized feedback shift register pseudorandom number
                 generator; keys; mathematical statistics --- Random
                 Number Generation; pseudorandom number generators;
                 random number generation; seed matrices; seed matrix;
                 stream enciphering",
  treatment =    "T Theoretical or Mathematical",
}

@InProceedings{Brickell:1985:BIK,
  author =       "Ernest F. Brickell",
  title =        "Breaking Iterated Knapsacks",
  crossref =     "Blakley:1985:ACP",
  pages =        "342--358",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=342",
  acknowledgement = ack-nhfb,
}

@Article{Burton:1985:EAC,
  author =       "Charles E. Burton",
  title =        "An Enhanced {ADFGVX} Cipher System",
  journal =      j-DDJ,
  volume =       "10",
  number =       "2",
  pages =        "48--??",
  month =        feb,
  year =         "1985",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Thu Jan 9 09:35:43 MST 1997",
  bibsource =    "Compendex database;
                 http://www.ddj.com/index/author/index.htm;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/dr-dobbs.bib",
  acknowledgement = ack-nhfb,
  classification = "723",
  fjournal =     "Dr. Dobb's Journal of Software Tools",
  journalabr =   "Dr Dobb's J",
  keywords =     "ADFGVX cipher; computer programs; cryptography; data
                 processing; decrypted text; encrypted messages;
                 information theory --- Data Compression; Security of
                 Data",
  pagecount =    "19p between p 48 and 70",
}

@Article{Chan:1985:NMP,
  author =       "B. Chan and H. Meijer",
  title =        "A note on the method of puzzles for key distribution",
  journal =      j-INT-J-COMPUT-INF-SCI,
  volume =       "14",
  number =       "4",
  pages =        "221--223",
  month =        aug,
  year =         "1985",
  CODEN =        "IJCIAH",
  ISSN =         "0091-7036",
  bibdate =      "Sat Apr 26 12:20:22 MDT 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjcomputinfsci.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C1260 (Information theory)",
  corpsource =   "Dept. of Comput. and Inf. Sci., Queens Univ.,
                 Kingston, Ont., Canada",
  fjournal =     "International Journal of Computer and Information
                 Sciences",
  keywords =     "cryptography; error correction codes; key
                 distribution; linear error correcting codes; public key
                 cryptosystem; puzzles; security of data",
  treatment =    "T Theoretical or Mathematical",
}

@InProceedings{Chaum:1985:HKS,
  author =       "David Chaum",
  title =        "How to Keep a Secret Alive Extensible Partial Key, Key
                 Safeguarding, and Threshold Systems",
  crossref =     "Blakley:1985:ACP",
  pages =        "481--485",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=481",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chaum:1985:NSC,
  author =       "David Chaum",
  title =        "New Secret Codes Can Prevent a Computerized Big
                 Brother",
  crossref =     "Blakley:1985:ACP",
  pages =        "432--433",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=432",
  acknowledgement = ack-nhfb,
}

@Article{Chaum:1985:SIT,
  author =       "David Chaum",
  title =        "Security without identification: transaction systems
                 to make big brother obsolete",
  journal =      j-CACM,
  volume =       "28",
  number =       "10",
  pages =        "1030--1044",
  month =        oct,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.acm.org/pubs/toc/;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/index-table-c.html#cacm1980",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/4373.html;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1022.html",
  abstract =     "The large-scale automated transaction systems of the
                 near future can be designed to protect the privacy and
                 maintain the security of both individuals and
                 organizations.",
  acknowledgement = ack-nhfb,
  annote =       "Extensive article on use of random, transient personal
                 id's. A digital pseudonym with each organization.",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "design; human factors; information hiding; security;
                 steganography",
  referencedin = "Referenced in \cite[Ref. 4]{Kaliski:1995:SUR}.",
  review =       "ACM CR 8608-0693",
  subject =      "{\bf C.2.0}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, General, Security and
                 protection. {\bf E.3}: Data, DATA ENCRYPTION. {\bf
                 J.1}: Computer Applications, ADMINISTRATIVE DATA
                 PROCESSING, Financial. {\bf K.4.1}: Computing Milieux,
                 COMPUTERS AND SOCIETY, Public Policy Issues, Privacy.
                 {\bf K.4.2}: Computing Milieux, COMPUTERS AND SOCIETY,
                 Social Issues, Abuse and crime involving computers.",
}

@InProceedings{Chen:1985:RGE,
  author =       "Su-shing Chen",
  title =        "On Rotation Group and Encryption of Analog Signals",
  crossref =     "Blakley:1985:ACP",
  pages =        "95--100",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=95",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chor:1985:KTP,
  author =       "Benny Chor and Ronald L. Rivest",
  title =        "A Knapsack Type Public Key Cryptosystem Based On
                 Arithmetic in Finite Fields (preliminary draft)",
  crossref =     "Blakley:1985:ACP",
  pages =        "54--65",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "820 013",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "See also revised version in \cite{Chor:1988:KTP}.",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=54",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chor:1985:RRL,
  author =       "Benny Chor and Oded Goldreich",
  title =        "{RSA\slash Rabin} least significant bits are {$ \frac
                 {1}{2} + \frac {1}{{\rm poly}(\log N)} $} secure
                 (extended abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "303--313",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=303",
  acknowledgement = ack-nhfb,
}

@InProceedings{Chor:1985:VSS,
  author =       "B. Chor and S. Goldwasser and S. Micali and B.
                 Awerbuch",
  title =        "Verifiable Secret Sharing and Achieving Simultaneity
                 in the Presence of Faults",
  crossref =     "IEEE:1985:FOC",
  pages =        "383--395 (or 335--344??)",
  year =         "1985",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 7]{Canetti:1997:PSL},
                 \cite[Ref. 6]{Gemmell:1997:ITC}.",
  xxtitle =      "Verifiable Secret Sharing and Achieving Simultaneous
                 Broadcast",
}

@Article{Coppersmith:1985:AF,
  author =       "D. Coppersmith and J. H. Davenport",
  title =        "An Application of Factoring",
  journal =      j-J-SYMBOLIC-COMP,
  volume =       "1",
  number =       "2",
  pages =        "241--243",
  month =        jun,
  year =         "1985",
  CODEN =        "JSYCEH",
  ISSN =         "0747-7171 (print), 1095-855X (electronic)",
  ISSN-L =       "0747-7171",
  MRclass =      "11T71 (11Y16 68Q40)",
  MRnumber =     "87b:11125",
  MRreviewer =   "Kevin S. McCurley",
  bibdate =      "Sat May 10 15:54:09 MDT 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/jsymcomp.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Symbolic Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07477171",
  keywords =     "Factorization, Logarithms, Cryptography, SCRATCHPAD",
}

@InProceedings{Davies:1985:MAA,
  author =       "Donald Watts Davies",
  title =        "A Message Authenticator Algorithm Suitable for a
                 Mainframe Computer",
  crossref =     "Blakley:1985:ACP",
  pages =        "393--400",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=393",
  acknowledgement = ack-nhfb,
}

@InProceedings{Davio:1985:EHS,
  author =       "Marc Davio and Yvo Desmedt and Jo Goubert and Frank
                 Hoornaert and Jean-Jacques Quisquater",
  title =        "Efficient hardware and software implementations for
                 the {DES}",
  crossref =     "Blakley:1985:ACP",
  pages =        "144--146",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=144",
  acknowledgement = ack-nhfb,
}

@Article{Davis:1985:NRI,
  author =       "J. A. Davis and D. B. Holdridge",
  title =        "New results on integer factorizations",
  journal =      j-CONG-NUM,
  volume =       "46",
  pages =        "65--78",
  year =         "1985",
  ISSN =         "0384-9864",
  MRclass =      "11Y05 (94A60)",
  MRnumber =     "86f:11098",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Proceedings of the fourteenth Manitoba conference on
                 numerical mathematics and computing (Winnipeg, Man.,
                 1984).",
  acknowledgement = ack-nhfb,
  fjournal =     "Congressus Numerantium",
}

@InProceedings{Davis:1985:UFS,
  author =       "J. A. Davis and D. B. Holdridge",
  title =        "An Update on Factorization at {Sandia National
                 Laboratories}",
  crossref =     "Blakley:1985:ACP",
  pages =        "114--114",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=114",
  acknowledgement = ack-nhfb,
}

@Book{Dawson:1985:COL,
  author =       "M. J. Dawson",
  title =        "Cryptanalysis of ornithological literature",
  volume =       "4",
  publisher =    "Oriel Stringer",
  address =      "Brighton",
  pages =        "40",
  year =         "1985",
  ISBN =         "0-948122-04-8 (paperback)",
  ISBN-13 =      "978-0-948122-04-0 (paperback)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Caliologists' series",
  acknowledgement = ack-nhfb,
  keywords =     "Birds --- Great Britain --- Nests; Great Britain ---
                 Birds --- Nests",
}

@Book{Deavours:1985:MCM,
  author =       "Cipher A. Deavours and Louis Kruh",
  title =        "Machine cryptography and modern cryptanalysis",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "xiv + 258",
  year =         "1985",
  ISBN =         "0-89006-161-0",
  ISBN-13 =      "978-0-89006-161-9",
  LCCN =         "Z103 .D431 1985",
  MRclass =      "94A60 (01A60 94-03)",
  MRnumber =     "87h:94017",
  MRreviewer =   "Harriet Fell",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "The Artech House telecom library",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Machine ciphers; World War, 1939--1945
                 --- Cryptography.",
}

@InProceedings{Delsarte:1985:FCM,
  author =       "P. Delsarte and Y. Desmedt and A. Odlyzko and P.
                 Piret",
  title =        "Fast cryptanalysis of the {Matsumoto--Imai} public key
                 scheme",
  crossref =     "Beth:1985:ACP",
  pages =        "142--149",
  year =         "1985",
  DOI =          "http://dx.doi.org/10.1007/3-540-39757-4_14",
  MRclass =      "94A60",
  MRnumber =     "87c:94037",
  bibdate =      "Mon Jul 19 07:03:50 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.research.att.com/~amo/doc/arch/break.mi.scheme.pdf;
                 http://www.research.att.com/~amo/doc/arch/break.mi.scheme.ps;
                 http://www.research.att.com/~amo/doc/arch/break.mi.scheme.troff",
  acknowledgement = ack-nhfb,
}

@InProceedings{Desmedt:1985:DOI,
  author =       "Yvo Desmedt and Jean-Jacques Quisquater and Marc
                 Davio",
  title =        "Dependence of output on input in {DES}: Small
                 avalanche characteristics",
  crossref =     "Blakley:1985:ACP",
  pages =        "359--376",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=359",
  acknowledgement = ack-nhfb,
}

@Book{DRC:1985:AAN,
  author =       "{Datapro Research Corporation}",
  title =        "All about network access control and data encryption
                 devices: with in-depth analyses of leading devices",
  publisher =    "Datapro Research Corporation",
  address =      "Delran, NJ, USA",
  pages =        "65",
  month =        jun,
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Special report prepared by editors of Datapro's
                 monthly loose-leaf services.",
  keywords =     "Computers --- Access control; Electronic data
                 processing.",
}

@TechReport{Ecker:1985:STS,
  author =       "Allen Ecker",
  title =        "Satellite television, signal encryption and the future
                 of broadband distribution",
  type =         "Seminar notes",
  institution =  "Communications Forum, Massachusetts Institute of
                 Technology",
  address =      "Cambridge, MA, USA",
  pages =        "13",
  day =          "19",
  month =        sep,
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{El-Gamal:1985:PCS,
  author =       "T. El-Gamal",
  title =        "A public-key cryptosystem and a signature scheme based
                 on discrete logarithms",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "4",
  pages =        "469--472",
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1985.1057074",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
  referencedin = "Referenced in \cite[Ref. 4]{Handschuh:1998:SCC}.",
}

@Article{ElGamal:1985:PKCa,
  author =       "Taher ElGamal",
  title =        "A public key cryptosystem and a signature scheme based
                 on discrete logarithms",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "4",
  pages =        "469--472",
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1985.1057074",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "86j:94045",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "IEEE Transactions on Information Theory",
}

@InProceedings{ElGamal:1985:PKCb,
  author =       "Taher ElGamal",
  title =        "A Public Key Cryptosystem and a Signature Scheme Based
                 on Discrete Logarithms",
  crossref =     "Blakley:1985:ACP",
  pages =        "10--18",
  year =         "1985",
  MRclass =      "94A60 (11T71 68P25)",
  MRnumber =     "87b:94037",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=10",
  acknowledgement = ack-nhfb,
}

@Article{ElGamal:1985:STA,
  author =       "Taher ElGamal",
  title =        "A subexponential-time algorithm for computing discrete
                 logarithms over {$ {\rm GF}(p^2) $}",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "4",
  pages =        "473--481",
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1985.1057075",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  bibdate =      "Sun Mar 11 10:34:00 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Information Theory",
}

@InProceedings{Even:1985:CSW,
  author =       "Shimon Even",
  title =        "On the complexity of some word problems that arise in
                 testing the security of protocols",
  crossref =     "Apostolico:1985:CAW",
  pages =        "299--314",
  year =         "1985",
  MRclass =      "68Q25 (68P25 94A60)",
  MRnumber =     "87a:68080",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Even:1985:PCC,
  author =       "S. Even and O. Goldreich",
  title =        "On the Power of Cascade Ciphers",
  journal =      j-TOCS,
  volume =       "3",
  number =       "2",
  pages =        "108--116",
  month =        may,
  year =         "1985",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 06:47:30 MST 1999",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tocs/1985-3-2/p108-even/",
  abstract =     "The unicity distance of a cascade of random ciphers,
                 with respect to known plaintext attack, is shown to be
                 the sum of the key lengths. At time-space trade-off for
                 the exhaustive cracking of a cascade of ciphers is
                 shown. The structure of the set of permutations
                 realized by a cascade is studied; it is shown that only
                 l. 2**k exhaustive experiments are necessary to
                 determine the behavior of a cascade of l stages, each
                 having k key bits. It is concluded that the cascade of
                 random ciphers is not a random cipher. Yet, it is shown
                 that, with probability, the number of permutations
                 realizable by a cascade of l random ciphers, each
                 having k key bits, is 2**l**k. Next, it is shown that
                 two stages are not worse than one, by a simple
                 reduction of the cracking problem of any of the stages
                 to the cracking problem of the cascade. Finally, it is
                 shown that proving a nonpolynomial lower bound on the
                 cracking problem of long cascades is a hard task, since
                 such a bound implies that P does not equal NP.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technion-Israel Inst of Technology, Haifa, Isr",
  classification = "723",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  journalabr =   "ACM Trans Comput Syst",
  keywords =     "algorithms; cascade ciphers; cryptography; data
                 encryption; data processing --- Security of Data;
                 random ciphers; security; theory; unicity distance",
  subject =      "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
                 Protection. {\bf E.3} Data, DATA ENCRYPTION.",
}

@Article{Even:1985:RPS,
  author =       "Shimon Even and Oded Goldreich and Abraham Lempel",
  title =        "A randomized protocol for signing contracts",
  journal =      j-CACM,
  volume =       "28",
  number =       "6",
  pages =        "637--647",
  month =        jun,
  year =         "1985",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  MRclass =      "68P25",
  MRnumber =     "800 680",
  bibdate =      "Fri Apr 5 10:03:00 MST 1996",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/3818.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "security; theory; verification",
  review =       "ACM CR 8512-1137",
  subject =      "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption
                 standard (DES). {\bf E.3}: Data, DATA ENCRYPTION,
                 Public key cryptosystems. {\bf C.2.2}: Computer Systems
                 Organization, COMPUTER-COMMUNICATION NETWORKS, Network
                 Protocols. {\bf H.4.3}: Information Systems,
                 INFORMATION SYSTEMS APPLICATIONS, Communications
                 Applications, Electronic mail. {\bf J.1}: Computer
                 Applications, ADMINISTRATIVE DATA PROCESSING,
                 Financial.",
}

@InProceedings{Fairfield:1985:LDE,
  author =       "R. C. Fairfield and A. Matusevich and J. Plany",
  title =        "An {LSI Digital Encryption Processor (DEP)}",
  crossref =     "Blakley:1985:ACP",
  pages =        "115--143",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "820 017",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=115",
  acknowledgement = ack-nhfb,
}

@InProceedings{Fairfield:1985:LRN,
  author =       "R. C. Fairfield and R. L. Mortenson and K. B.
                 Coulthart",
  title =        "An {LSI} Random Number Generator ({RNG})",
  crossref =     "Blakley:1985:ACP",
  pages =        "203--230",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=203",
  acknowledgement = ack-nhfb,
}

@InProceedings{Fortune:1985:PP,
  author =       "Steven Fortune and Michael Merritt",
  title =        "Poker Protocols",
  crossref =     "Blakley:1985:ACP",
  pages =        "454--464",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=454",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Franklin:1985:MID,
  author =       "Matthew Keith Franklin",
  title =        "Mathematical investigations of the {Data Encryption
                 Standard}",
  type =         "Thesis ({M.A. in Mathematics})",
  school =       "Department of Mathematics, University of California,
                 Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "36",
  month =        may,
  year =         "1985",
  LCCN =         "C 2 930 522",
  bibdate =      "Mon Oct 19 08:50:31 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "University of California, Berkeley --- dissertations
                 --- mathematics",
}

@Book{Franksen:1985:MBS,
  author =       "Ole Immanuel Franksen",
  title =        "{Mr. Babbage}'s secret: the tale of a cypher and
                 {APL}",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "319",
  year =         "1985",
  ISBN =         "0-13-604729-7",
  ISBN-13 =      "978-0-13-604729-2",
  LCCN =         "Z103.B2 F721 1985",
  bibdate =      "Mon Nov 4 07:46:57 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "APL (computer program language); Babbage, Charles,
                 1791--1871; ciphers --- history; cryptographers ---
                 Great Britain --- biography; cryptography --- history",
}

@Book{Gleason:1985:ECP,
  author =       "Andrew M. Gleason and Walter F. Penney and Ronald E.
                 Wyllys",
  title =        "Elementary course in probability for the
                 cryptanalyst",
  volume =       "41",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  edition =      "Revised",
  pages =        "????",
  year =         "1985",
  ISBN =         "0-89412-072-7",
  ISBN-13 =      "978-0-89412-072-5",
  LCCN =         "Z104 .G53 1985",
  bibdate =      "Wed May 11 23:23:17 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  subject =      "Probabilities; Cryptography",
}

@InProceedings{Goldreich:1985:CAR,
  author =       "Oded Goldreich and Shafi Goldwasser and Silvio
                 Micali",
  title =        "On the Cryptographic Applications of Random Functions
                 (Extended Abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "276--288",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=276",
  acknowledgement = ack-nhfb,
}

@InProceedings{Goldwasser:1985:PSS,
  author =       "Shafi Goldwasser and Silvio Micali and Ronald L.
                 Rivest",
  title =        "A ``Paradoxical'' Solution to the Signature Problem",
  crossref =     "Blakley:1985:ACP",
  pages =        "467--467",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=467",
  acknowledgement = ack-nhfb,
}

@Article{Goodman:1985:NTK,
  author =       "R. M. F. Goodman and A. J. McAuley",
  booktitle =    "Advances in cryptology (Paris, 1984)",
  title =        "A new trapdoor knapsack public key cryptosystem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "209",
  pages =        "150--158",
  year =         "1985",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "87c:94038",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Gordon:1985:SPE,
  author =       "John A. Gordon",
  title =        "Strong primes are easy to find",
  crossref =     "Beth:1985:ACP",
  pages =        "216--223",
  year =         "1985",
  DOI =          "http://dx.doi.org/10.1007/3-540-39757-4_19",
  bibdate =      "Sun Mar 11 10:24:54 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  remark =       "A {\em strong prime\/} $p$ is a prime that satisfies
                 three conditions: (1) $ p = 1 \bmod r $, (2) $ p = (s -
                 1) \bmod s $, and (3) $ r = 1 \bmod t $, where $r$,
                 $s$, and $t$ are all large random primes of a given
                 number of bits.",
}

@InProceedings{Haastad:1985:CST,
  author =       "J. H{\aa}stad and A. Shamir",
  title =        "The cryptographic security of truncated linearly
                 related variables",
  crossref =     "ACM:1985:PSA",
  pages =        "356--362",
  year =         "1985",
  bibdate =      "Wed Feb 20 18:33:46 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/22145/p356-hastad/p356-hastad.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/22145/p356-hastad/",
  acknowledgement = ack-nhfb,
}

@Manual{Hardy:1985:ECC,
  author =       "John M. Hardy and Dorothy W. Fuller and Douglas R.
                 Long and Jane C. Hartin and Faye Davis",
  title =        "Electronic cryptographic communications equipment
                 specialist {(AFSC 30650)}",
  number =       "CDC 30650",
  organization = "Extension Course Institute, Air University",
  address =      "????",
  pages =        "various",
  year =         "1985",
  LCCN =         "D 301.26/17-2:30650 2 8502 Govt Pubs; Other Govt Docs
                 numbers: D 301.26/17-2:30650 04 8502;",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "``30650 -2 8502''--Vol. 2. ``30650 04 8502''--Vol. 4.
                 ``CDC 30650.'' Description based in vol. 2.
                 Bibliography: vol. 2, p. 153. Contents: v. 2. Advanced
                 electronics / [prepared by John M. Hardy; edited by
                 Dorothy W. Fuller] -- v. 4. Maintenance practices and
                 test equipment / [prepared by John M. Hardy, Douglas R.
                 Long; edited by Jane C. Hartin, Faye Davis].",
  keywords =     "cryptography -- handbooks, manuals, etc; electronics
                 in military engineering -- handbooks, manuals, etc;
                 United States. Air Force -- handbooks, manuals, etc",
}

@InProceedings{Hoornaert:1985:EHI,
  author =       "Frank Hoornaert and Jo Goubert and Yvo Desmedt",
  title =        "Efficient hardware implementation of the {DES}",
  crossref =     "Blakley:1985:ACP",
  pages =        "147--173",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=147",
  acknowledgement = ack-nhfb,
}

@Article{Hunter:1985:ARK,
  author =       "D. G. N. Hunter",
  title =        "{Algorithm 121}: {RSA} key calculation in {Ada}",
  journal =      j-COMP-J,
  volume =       "28",
  number =       "3",
  pages =        "343--348",
  month =        jul,
  year =         "1985",
  CODEN =        "CMPJA6",
  DOI =          "http://dx.doi.org/10.1093/comjnl/28.3.343",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  MRclass =      "94A60 (94-04)",
  MRnumber =     "86j:94048",
  bibdate =      "Tue Dec 4 14:48:18 MST 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/28/3.toc;
                 http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/",
  note =         "See note \cite{Wichmann:1987:NAR}.",
  URL =          "http://comjnl.oxfordjournals.org/content/28/3/343.full.pdf+html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/343.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/344.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/345.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/346.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/347.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_28/Issue_03/tiff/348.tif",
  acknowledgement = ack-nhfb,
  classcodes =   "C6130 (Data handling techniques)",
  corpsource =   "Stand. Telecommun. Labs. Ltd., Harlow, UK",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "16-bit microcomputers; Ada; Ada listings; assembly
                 code; cryptography; encryption programs; exponentiation
                 operation; finite arithmetic; general purpose
                 arithmetic packages; multiple precision arithmetic;
                 packages; RSA key calculation in",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Kak:1985:EEC,
  author =       "Subhash C. Kak",
  title =        "Encryption and error-correction coding using {$D$}
                 sequences",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "34",
  number =       "9",
  pages =        "803--809",
  year =         "1985",
  CODEN =        "ITCOB4",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  MRclass =      "94A60 (68P20)",
  MRnumber =     "86k:94028",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Institute of Electrical and Electronics Engineers.
                 Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Kaliski:1985:WAE,
  author =       "Burt S. Kaliski",
  title =        "{Wyner}'s Analog Encryption Scheme: Results of a
                 Simulation",
  crossref =     "Blakley:1985:ACP",
  pages =        "83--94",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=83",
  acknowledgement = ack-nhfb,
}

@Article{Karger:1985:ADA,
  author =       "Paul A. Karger",
  title =        "Authentication and Discretionary Access Control in
                 Computer Networks",
  journal =      j-COMP-NET-ISDN,
  volume =       "10",
  number =       "1",
  pages =        "27--37",
  month =        aug,
  year =         "1985",
  CODEN =        "CNISE9",
  ISSN =         "0169-7552 (print), 1879-2324 (electronic)",
  ISSN-L =       "0169-7552",
  bibdate =      "Sat Sep 25 23:08:50 MDT 1999",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Digital Equipment Corp, Littleton, MA, USA",
  classification = "723",
  fjournal =     "Computer Networks and ISDN Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01697552",
  journalabr =   "Comput Networks ISDN Syst",
  keywords =     "access control; authentication; computer networks;
                 data processing --- Security of Data; data security;
                 digital network architecture; network security",
}

@Article{Knuth:1985:DLC,
  author =       "Donald E. Knuth",
  title =        "Deciphering a linear congruential encryption",
  journal =      j-IEEE-TRANS-INF-THEORY,
  volume =       "IT-31",
  number =       "1",
  pages =        "49--52",
  month =        jan,
  year =         "1985",
  CODEN =        "IETTAW",
  DOI =          "http://dx.doi.org/10.1109/TIT.1985.1056997",
  ISSN =         "0018-9448 (print), 1557-9654 (electronic)",
  ISSN-L =       "0018-9448",
  MRclass =      "94A60",
  MRnumber =     "87c:94040",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  note =         "Russian translation, to appear.",
  fjournal =     "IEEE Transactions on Information Theory",
  subject =      "G.3 Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation E Data, DATA
                 ENCRYPTION",
}

@InProceedings{Konheim:1985:CAE,
  author =       "Alan G. Konheim",
  title =        "Cryptanalysis of {ADFGVX} Encipherment Systems
                 (extended abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "339--341",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "820 027",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=339",
  acknowledgement = ack-nhfb,
}

@InProceedings{Kothari:1985:GLT,
  author =       "S. C. Kothari",
  title =        "Generalized Linear Threshold Scheme",
  crossref =     "Blakley:1985:ACP",
  pages =        "231--241",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=231",
  acknowledgement = ack-nhfb,
}

@Article{Lagarias:1985:SLD,
  author =       "J. C. Lagarias and A. M. Odlyzko",
  title =        "Solving Low-Density Subset Sum Problems",
  journal =      j-J-ACM,
  volume =       "32",
  number =       "1",
  pages =        "229--246",
  month =        jan,
  year =         "1985",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "Preliminary version in {\em Proc. 24th IEEE
                 Foundations Computer Science Symp.}, pp. 1--10, 1983.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/2461.html",
  abstract =     "The subset sum problem is to decide whether or not a
                 0-1 integer programming problem which is NP-complete,
                 has a solution. The difficulty of solving it is the
                 basis of public-key cryptosystems of knapsack type. An
                 algorithm is proposed that searches for a solution when
                 given an instance of the subset sum problem. This
                 algorithm always halts in polynomial time but does not
                 always find a solution when one exists. It converts the
                 problem to one of finding a particular short vector in
                 a lattice, and then uses a lattice basis reduction
                 algorithm to attempt to find this short vector. The
                 performance of the proposed algorithm is analyzed.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "AT\&T Bell Lab, Murray Hill, NJ, USA",
  classification = "721; 722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "Algorithms; algorithms; automata theory --- Theorem
                 Proving; computer programming; computers, digital ---
                 Special Purpose Application; cryptography ---
                 Applications; data encryption; discrete mathematics;
                 integer lattice; measurement; public-key cryptosystems;
                 security; subset sum problems; theory; verification",
  subject =      "{\bf F.2.1}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Numerical Algorithms
                 and Problems, Number-theoretic computations. {\bf E.3}:
                 Data, DATA ENCRYPTION. {\bf G.1.6}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, Optimization, Integer
                 programming. {\bf G.2.m}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Miscellaneous.",
}

@MastersThesis{Lassek:1985:CCA,
  author =       "Teresa A. Lassek",
  title =        "Cryptology and the computer age",
  type =         "Thesis ({Honors})",
  school =       "University of Nebraska at Omaha",
  address =      "Omaha, NE, USA",
  pages =        "58",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control; Cryptography; Data
                 protection",
}

@InProceedings{Leighton:1985:HBC,
  author =       "Albert C. Leighton and Stephen M. Matyas",
  title =        "The History of Book Ciphers",
  crossref =     "Blakley:1985:ACP",
  pages =        "101--113",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=101",
  acknowledgement = ack-nhfb,
}

@InProceedings{Leung:1985:SCT,
  author =       "A. K. Leung and S. E. Tavares",
  title =        "Sequence Complexity as a Test for Cryptographic
                 Systems",
  crossref =     "Blakley:1985:ACP",
  pages =        "468--474",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=468",
  acknowledgement = ack-nhfb,
}

@InProceedings{Levin:1985:OWF,
  author =       "L. A. Levin",
  title =        "One-way functions and pseudorandom generators",
  crossref =     "ACM:1985:PSA",
  pages =        "363--365",
  year =         "1985",
  bibdate =      "Wed Feb 20 18:33:46 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/22145/p363-levin/p363-levin.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/22145/p363-levin/",
  acknowledgement = ack-nhfb,
}

@Article{Lidl:1985:CBP,
  author =       "R. Lidl",
  booktitle =    "Advances in cryptology (Paris, 1984)",
  title =        "On cryptosystems based on polynomials and finite
                 fields",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "209",
  pages =        "10--15",
  year =         "1985",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "87c:94041",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mackinnon:1985:OAA,
  author =       "S. J. Mackinnon and P. D. Taylor and H. Meijer and S.
                 G. Akl",
  title =        "An Optimal Algorithm for Assigning Cryptographic Keys
                 to Control Access in a Hierarchy",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C-34",
  number =       "9",
  pages =        "797--802",
  month =        sep,
  year =         "1985",
  CODEN =        "ITCOB4",
  DOI =          "http://dx.doi.org/10.1109/TC.1985.1676635",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 10 08:33:28 MDT 2011",
  bibsource =    "http://www.computer.org/tc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1676635",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{McIvor:1985:SC,
  author =       "R. McIvor",
  title =        "Smart cards",
  journal =      j-SCI-AMER,
  volume =       "253",
  number =       "5",
  pages =        "130--137",
  month =        nov,
  year =         "1985",
  CODEN =        "SCAMAC",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Mon May 18 08:08:24 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  classification = "B1265 (Digital electronics); C7120 (Financial
                 computing)",
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "credit cards; digital IC; digital integrated circuits;
                 EFTS; microelectronic chip; smart cards",
  treatment =    "G General Review",
}

@TechReport{Meijer:1985:MEN,
  author =       "Henk Meijer",
  title =        "Multiplication-permutation encryption networks",
  type =         "Technical report",
  number =       "85-171",
  institution =  "Department of Computing and Information Science,
                 Queen's University",
  address =      "Kingston, Ont., Canada",
  pages =        "15",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Supported by the Natural Sciences and Engineering
                 Research Council of Canada.",
  keywords =     "Cryptography.",
}

@MastersThesis{Miller:1985:PES,
  author =       "Jay I. Miller",
  title =        "A private-key encryption system based on plane
                 geometry",
  type =         "Thesis ({M.S. in Computer Science})",
  school =       "University of Wisconsin-Milwaukee",
  address =      "Milwaukee, WI, USA",
  pages =        "iv + 33 + 115",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Data protection; Geometry, Plane.",
}

@Article{Montgomery:1985:MMT,
  author =       "P. Montgomery",
  title =        "Modular multiplication without trial division",
  journal =      j-MATH-COMPUT,
  volume =       "44",
  number =       "170",
  pages =        "519--521",
  year =         "1985",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (print), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  referencedin = "Referenced in \cite[Ref. 8]{Handschuh:1998:SCC}.",
}

@Manual{NIST:1985:FPC,
  author =       "{NIST}",
  title =        "{FIPS PUB} 113: Computer Data Authentication",
  organization = "National Institute of Standards and Technology
                 (formerly National Bureau of Standards)",
  address =      "Gaithersburg, MD, USA",
  pages =        "??",
  day =          "30",
  month =        may,
  year =         "1985",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 7]{Kaliski:1995:MAM}.",
}

@Book{NIST:1985:FPSa,
  author =       "{National Institute of Standards and Technology}",
  title =        "{FIPS PUB 112}: Standard for Password Usage",
  publisher =    pub-NIST,
  address =      pub-NIST:adr,
  day =          "30",
  month =        may,
  year =         "1985",
  bibdate =      "Mon Nov 27 08:37:27 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.itl.nist.gov/fipspubs/fip112.htm",
  abstract =     "The document specifies basic security criteria for two
                 different uses of passwords in an ADP system, (1)
                 personal identity authentication and (2) data access
                 authorization. It establishes the basic criteria for
                 the design, implementation and use of a password system
                 in those systems where passwords are used. It
                 identifies fundamental ADP management functions
                 pertaining to passwords and specifies some user actions
                 required to satisfy these functions. In addition, it
                 specifies several technical features which may be
                 implemented in an ADP system in order to support a
                 password system. An implementation schedule is
                 established for compliance with the Standard. Numerous
                 guidelines are provided in the Appendices for managers
                 and users seeking to comply with the Standard.",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; data security; passphrase;
                 password; personal identification; systems security.",
}

@Book{NIST:1985:FPSb,
  author =       "{National Institute of Standards and Technology}",
  title =        "{FIPS PUB 113}: Standard for Computer Data
                 Authentication",
  publisher =    pub-NIST,
  address =      pub-NIST:adr,
  day =          "30",
  month =        may,
  year =         "1985",
  bibdate =      "Mon Nov 27 08:37:27 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.itl.nist.gov/fipspubs/fip113.htm",
  abstract =     "his publication specifies a standard to be used by
                 Federal organizations which require that the integrity
                 of computer data be cryptographically authenticated. In
                 addition, it may be used by any organization whenever
                 cryptographic authentication is desired. Cryptographic
                 authentication of data during transmission between
                 electronic components or while in storage is necessary
                 to maintain the integrity of the information
                 represented by the data. The standard specifies a
                 cryptographic authentication algorithm for use in ADP
                 systems and networks. The authentication algorithm
                 makes use of the Data Encryption Standard (DES)
                 cryptographic algorithm as defined in Federal
                 Information Processing Standard 46 (FIPS PUB 46).",
  acknowledgement = ack-nhfb,
  keywords =     "authentication; cryptography; data authentication
                 algorithm; Data Authentication Algorithm (DAA); Data
                 Encryption Standard (DES); data integrity; Federal
                 Information Processing Standard (FIPS)",
}

@InProceedings{Nobauer:1985:CRS,
  author =       "Rupert N{\"o}bauer",
  booktitle =    "Contributions to general algebra, 3 (Vienna, 1984)",
  title =        "Cryptanalysis of the {R{\'e}dei}-scheme",
  publisher =    "H{\"o}lder-Pichler-Tempsky",
  address =      "Vienna, Austria",
  pages =        "255--264",
  year =         "1985",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "87b:94040",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
}

@InProceedings{Odlyzko:1985:DLF,
  author =       "A. M. Odlyzko",
  title =        "Discrete logarithms in finite fields and their
                 cryptographic significance",
  crossref =     "Beth:1985:ACP",
  pages =        "224--314",
  year =         "1985",
  DOI =          "http://dx.doi.org/10.1007/3-540-39757-4_20",
  bibdate =      "Mon Jul 19 07:05:35 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.research.att.com/~amo/doc/arch/discrete.logs.pdf;
                 http://www.research.att.com/~amo/doc/arch/discrete.logs.ps;
                 http://www.research.att.com/~amo/doc/arch/discrete.logs.troff",
  acknowledgement = ack-nhfb,
}

@InProceedings{Ong:1985:ESS,
  author =       "H. Ong and C. P. Schnorr and A. Shamir",
  title =        "Efficient Signature Schemes Based on Polynomial
                 Equations (preliminary version)",
  crossref =     "Blakley:1985:ACP",
  pages =        "37--46",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=37",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Parthasarathy:1985:DSG,
  author =       "Aiyaswamy Parthasarathy",
  title =        "Digital signature generator for cryptographic
                 applications",
  type =         "Thesis ({M.S.})",
  school =       "South Dakota School of Mines and Technology",
  address =      "Rapid City, SD, USA",
  pages =        "148",
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Code generators --- Computer programs; Communication
                 --- Code words; Cryptography --- Computer programs;
                 Generators (Computer programs); Telecommunication ---
                 Code words",
}

@PhdThesis{Peralta:1985:TRN,
  author =       "Rene Caupolican Peralta",
  title =        "Three results in number theory and cryptography: a new
                 algorithm to compute square roots modulo a prime
                 number; On the bit complexity of the discrete
                 logarithm; {A} framework for the study of
                 cryptoprotocols",
  type =         "Thesis ({Ph.D.})",
  school =       "Department of Computer Science, University of
                 California, Berkeley",
  address =      "Berkeley, CA, USA",
  pages =        "52",
  month =        dec,
  year =         "1985",
  LCCN =         "????",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "dissertations; dissertations, academic --- UCB ---
                 computer science --- 1981--1990; University of
                 California, Berkeley. computer science division --",
}

@InProceedings{Proctor:1985:SSC,
  author =       "Norman Proctor",
  title =        "A Self-Synchronizing Cascaded Cipher System with
                 Dynamic Control of Error Propagation",
  crossref =     "Blakley:1985:ACP",
  pages =        "174--190",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=174",
  acknowledgement = ack-nhfb,
}

@InProceedings{Reeds:1985:NPR,
  author =       "J. A. Reeds and J. L. Manferdelli",
  title =        "{DES} has no Per Round Linear Factors",
  crossref =     "Blakley:1985:ACP",
  pages =        "377--389",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=377",
  acknowledgement = ack-nhfb,
}

@Article{Reischuk:1985:NSB,
  author =       "R. Reischuk",
  title =        "A new solution to the {Byzantine} generals problem",
  journal =      j-INF-CONTROL,
  pages =        "23--42",
  year =         "1985",
  CODEN =        "IFCNA4",
  ISSN =         "0019-9958 (print), 1878-2981 (electronic)",
  ISSN-L =       "0019-9958",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Information and Control",
  referencedin = "Referenced in \cite[Ref. 25]{Canetti:1997:PSL}.",
}

@InProceedings{Rivest:1985:RCP,
  author =       "Ronald L. Rivest",
  title =        "{RSA} chips (past\slash present\slash future)",
  crossref =     "Beth:1985:ACP",
  pages =        "159--163",
  year =         "1985",
  DOI =          "http://dx.doi.org/10.1007/3-540-39757-4_16",
  bibdate =      "Sun Mar 11 10:23:55 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Ruggiu:1985:CCT,
  author =       "G. Ruggiu",
  title =        "Cryptology and complexity theories",
  crossref =     "Beth:1985:ACP",
  pages =        "3--9",
  year =         "1985",
  DOI =          "http://dx.doi.org/10.1007/3-540-39757-4_1",
  bibdate =      "Sun Mar 11 10:18:50 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InCollection{Salomaa:1985:PKC,
  author =       "Arto Salomaa",
  booktitle =    "Parcella '84 (Berlin, 1984)",
  title =        "On a public-key cryptosystem based on parallel
                 rewriting",
  volume =       "25",
  publisher =    "Akademie-Verlag",
  address =      "Berlin",
  pages =        "209--214",
  year =         "1985",
  MRclass =      "68P25 (68Q50 94A60)",
  MRnumber =     "832 881",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Math. Res.",
}

@Book{Serpell:1985:CES,
  author =       "S. C. Serpell",
  title =        "Cryptographic equipment security: a code of practice",
  publisher =    "Institution of Electronic and Radio Engineers",
  address =      "London, UK",
  pages =        "25",
  year =         "1985",
  ISBN =         "0-903748-62-2 (paperback)",
  ISBN-13 =      "978-0-903748-62-9 (paperback)",
  LCCN =         "Z103.S47 1985",
  bibdate =      "Sat Nov 18 12:53:52 MST 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography -- equipment and supplies",
}

@InProceedings{Serpell:1985:PES,
  author =       "S. C. Serpell and C. B. Brookson and B. L. Clark",
  title =        "A Prototype Encryption System Using Public Key",
  crossref =     "Blakley:1985:ACP",
  pages =        "3--9",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=3",
  acknowledgement = ack-nhfb,
}

@InProceedings{Shamir:1985:IBC,
  author =       "Adi Shamir",
  title =        "Identity-Based Cryptosystems and Signature Schemes",
  crossref =     "Blakley:1985:ACP",
  pages =        "47--53",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "820 012",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=47",
  acknowledgement = ack-nhfb,
}

@Article{Siegenthaler:1985:DCS,
  author =       "T. Siegenthaler",
  title =        "Decrypting a Class of Stream Ciphers Using Ciphertext
                 Only",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "C34",
  pages =        "81--85",
  year =         "1985",
  CODEN =        "ITCOB4",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Nov 30 08:57:18 1998",
  bibsource =    "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "This paper breaks the cipher of
                 \cite{Geffe:1973:HPD}.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Simmons:1985:ATC,
  author =       "Gustavus J. Simmons",
  title =        "Authentication Theory\slash Coding Theory",
  crossref =     "Blakley:1985:ACP",
  pages =        "411--431",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=411",
  acknowledgement = ack-nhfb,
}

@InProceedings{Simmons:1985:SCD,
  author =       "Gustavus J. Simmons",
  title =        "The Subliminal Channel and Digital Signatures",
  crossref =     "Beth:1985:ACP",
  pages =        "364--378",
  year =         "1985",
  DOI =          "http://dx.doi.org/10.1007/3-540-39757-4_25",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1002.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@Article{Singh:1985:IPS,
  author =       "Kamaljit Singh",
  title =        "On improvements to password security",
  journal =      j-OPER-SYS-REV,
  volume =       "19",
  number =       "1",
  pages =        "53--60",
  month =        jan,
  year =         "1985",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:34 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Smillie:1985:RFM,
  author =       "K. W. Smillie and F. L. Bauer and Ralph Erskine and
                 Henry S. Tropp",
  title =        "Reviews: {O. I. Franksen, Mr. Babbage's Secret}; {F.
                 H. Hinsley, British Intelligence in the Second World
                 War}; {T. M. Thompson, From Error-Correcting Codes
                 Through Sphere Packings to Simple Groups}; Capsule
                 Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "7",
  number =       "2",
  pages =        "185--191",
  month =        apr # "\slash " # jun,
  year =         "1985",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:22 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1985/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1985/pdf/a2185.pdf;
                 http://www.computer.org/annals/an1985/a2185abs.htm",
  acknowledgement = ack-nhfb,
  annote =       "The Thompson book review describes Hamming's July 1947
                 work in developing error-correcting codes, and
                 Shannon's later use of them in work on information
                 theory.",
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Misc{Johns:1984:RAS,
  author =       "M. St. Johns",
  title =        "{RFC 912}: Authentication service",
  day =          "1",
  month =        sep,
  year =         "1984",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}. Status:
                 UNKNOWN.",
  URL =          "ftp://ftp.internic.net/rfc/rfc912.txt;
                 ftp://ftp.internic.net/rfc/rfc931.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc912.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt",
  acknowledgement = ack-nhfb,
  format =       "TXT=4544 bytes",
  obsoletedby =  "Obsoleted by RFC0931 \cite{StJohns:1985:RAS}.",
  online =       "yes",
  status =       "UNKNOWN",
}

@Misc{StJohns:1985:RAS,
  author =       "M. {St. Johns}",
  title =        "{RFC 931}: Authentication server",
  day =          "1",
  month =        jan,
  year =         "1985",
  bibdate =      "Fri Oct 17 17:15:44 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoleted RFC1413 \cite{Johns:1993:RIP}. Obsoletes
                 RFC0912 \cite{Johns:1984:RAS}. Status: UNKNOWN.",
  URL =          "ftp://ftp.internic.net/rfc/rfc912.txt;
                 ftp://ftp.internic.net/rfc/rfc931.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc912.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt",
  acknowledgement = ack-nhfb,
  format =       "TXT=8982 bytes",
  obsoletedby =  "Obsoleted RFC1413 \cite{Johns:1993:RIP}.",
  obsoletes =    "Obsoletes RFC0912 \cite{Johns:1984:RAS}.",
  online =       "yes",
  status =       "UNKNOWN",
}

@Misc{Johns:1993:RIP,
  author =       "M. St. Johns",
  title =        "{RFC 1413}: Identification Protocol",
  month =        jan,
  year =         "1993",
  bibdate =      "Thu Oct 16 09:34:09 MDT 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Obsoletes RFC0931 \cite{StJohns:1985:RAS}. Status:
                 PROPOSED STANDARD.",
  URL =          "ftp://ftp.internic.net/rfc/rfc1413.txt;
                 ftp://ftp.internic.net/rfc/rfc931.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc1413.txt;
                 ftp://ftp.math.utah.edu/pub/rfc/rfc931.txt;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  format =       "TXT=16291 bytes",
  obsoletes =    "Obsoletes RFC0931 \cite{StJohns:1985:RAS}.",
  online =       "yes",
  status =       "PROPOSED STANDARD",
}

@Article{Tao:1985:FAP,
  author =       "Ren Ji Tao and Shi Hua Chen",
  title =        "A finite automaton public key cryptosystem and digital
                 signatures",
  journal =      j-CHIN-J-COMPUTERS,
  volume =       "8",
  number =       "6",
  pages =        "401--409",
  year =         "1985",
  CODEN =        "JIXUDT",
  ISSN =         "0254-4164",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "87c:94045",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Chinese Journal of Computers. Jisuanji Xuebao",
}

@InProceedings{Tedrick:1985:FES,
  author =       "Tom Tedrick",
  title =        "Fair Exchange of Secrets (extended abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "434--438",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=434",
  acknowledgement = ack-nhfb,
}

@TechReport{USGSA:1985:ISR,
  author =       "{United States. General Services Administration} and
                 {National Communications System (U.S.). Office of
                 Technology and Standards} and {National Institute of
                 Standards and Technology (U. S.)}",
  title =        "Interoperability and security requirements for use of
                 the {Data Encryption Standard} with {CCITT} group 3
                 facsimile equipment",
  institution =  "General Services Administration, Office of Information
                 Resources Management",
  address =      "Washington, DC, USA",
  pages =        "2",
  day =          "4",
  month =        apr,
  year =         "1985",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Federal standard 1028. {Federal} information
                 processing standards publication, {FIPS PUB} 141",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Standards; Facsimile
                 transmission --- Standards.",
}

@Article{Vamos:1985:BRB,
  author =       "T. Vamos",
  title =        "Book Review: {{\booktitle{Mr. Babbage's secret. The
                 tale of a cypher --- and APL}}: Ole Immanuel
                 Franksen}",
  journal =      "Automatica",
  volume =       "21",
  number =       "5",
  pages =        "616",
  month =        sep,
  year =         "1985",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1016/0005-1098(85)90013-5",
  ISSN =         "????",
  bibdate =      "Mon Jan 14 21:51:21 MST 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/0005109885900135",
  acknowledgement = ack-nhfb,
}

@InProceedings{Vazirani:1985:ESP,
  author =       "Umesh V. Vazirani and Vijay V. Vazirani",
  title =        "Efficient and Secure Pseudo-Random Number Generation
                 (Extended Abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "193--202",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=193",
  acknowledgement = ack-nhfb,
}

@InProceedings{Vogel:1985:LCC,
  author =       "Rainer Vogel",
  title =        "On the linear complexity of cascaded sequences",
  crossref =     "Beth:1985:ACP",
  pages =        "99--109",
  year =         "1985",
  DOI =          "http://dx.doi.org/10.1007/3-540-39757-4_11",
  bibdate =      "Mon Nov 30 09:03:36 1998",
  bibsource =    "http://ftp.eff.org/pub/Crypto/Security/Crypto_misc/Digital_money/Crypto_misc/crypt.biblio;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Wagner:1985:PKC,
  author =       "Neal R. Wagner and Marianne R. Magyarik",
  title =        "A Public-Key Cryptosystem Based on the Word Problem",
  crossref =     "Blakley:1985:ACP",
  pages =        "19--36",
  year =         "1985",
  MRclass =      "94A60",
  MRnumber =     "87b:94042",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=19",
  acknowledgement = ack-nhfb,
}

@Article{Weiss:1985:RCM,
  author =       "Eric A. Weiss and Henry S. Tropp and Ralph Erskine and
                 John A. N. Lee and Gwen Bell and M. R. Williams",
  title =        "Reviews: {The Computer Museum} and {J. Bernstein,
                 Three Degrees Above Zero: Bell Labs in the Information
                 Age} and {D. R. Hartree, Calculating Machines: Recent
                 and Prospective Developments and Their Impact on
                 Mathematical Physics, and, Calculating Instruments and
                 Machines} and {W. Kozaczuk, Enigma: How the German
                 Machine Cipher Was Broken and How It Was Read by the
                 Allies in World War Two} and {S. Levy, Hackers} and {A.
                 Osborne and J. Dvorak, Hypergrowth: The Rise and Fall
                 of Osborne Computer Corporation} and {E. W. Pugh,
                 Memories that Shaped an Industry} and Capsule Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "7",
  number =       "3",
  pages =        "258--277",
  month =        jul # "\slash " # sep,
  year =         "1985",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:22 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1985/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1985/pdf/a3258.pdf;
                 http://www.computer.org/annals/an1985/a3258abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@InProceedings{Williams:1985:SPK,
  author =       "H. C. Williams",
  title =        "Some Public-Key Crypto-Functions as Intractable as
                 Factorization",
  crossref =     "Blakley:1985:ACP",
  pages =        "66--70",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=66",
  acknowledgement = ack-nhfb,
}

@InProceedings{Yung:1985:CSP,
  author =       "Mordechai Yung",
  title =        "Cryptoprotocols: Subscription to a Public Key, The
                 Secret Blocking and The Multi-Player Mental Poker Game
                 (extended abstract)",
  crossref =     "Blakley:1985:ACP",
  pages =        "439--453",
  year =         "1985",
  bibdate =      "Thu Feb 23 08:43:57 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=????&volume=0&issue=0;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=????&volume=0&issue=0&spage=439",
  acknowledgement = ack-nhfb,
}

@Article{Yung:1985:SUK,
  author =       "Mordechai M. Yung",
  title =        "A secure and useful ``keyless cryptosystem''",
  journal =      j-INFO-PROC-LETT,
  volume =       "21",
  number =       "1",
  pages =        "35--38",
  day =          "10",
  month =        jul,
  year =         "1985",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68P25",
  MRnumber =     "810 097",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Columbia Univ, Dep of Computer Science, New
                 York, NY, USA",
  classification = "723; B6120B (Codes); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Comput. Sci., Columbia Univ., New York, NY,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "authentication; communication environments;
                 cryptography; data transmission; encryption; key
                 generation protocol; keyless cryptography; protocol;
                 protocols; security",
  pubcountry =   "Netherlands A08",
  treatment =    "P Practical",
}

@Article{Andrew:1986:CSI,
  author =       "Christopher Andrew",
  title =        "Codebreaking and Signals Intelligence",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "1--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Article{Andrew:1986:TCB,
  author =       "Christopher Andrew and Keith Neilson",
  title =        "{Tsarist} Codebreakers and {British} Codes",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "6--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Book{ATT:1986:AUS,
  author =       "AT{\&T}",
  key =          "ATT",
  title =        "{AT\&T UNIX} System Readings and Applications",
  volume =       "II",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  pages =        "xii + 324",
  year =         "1986",
  ISBN =         "0-13-939845-7",
  ISBN-13 =      "978-0-13-939845-2",
  LCCN =         "QA76.76.O63 U553 1986",
  bibdate =      "Sat Oct 28 08:25:58 2000",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  xxnote =       "NB: special form AT{\&T} required to get correct
                 alpha-style labels.",
}

@Article{Benois:1986:CSE,
  author =       "Mich{\`e}le Benois and Jacques Sakarovitch",
  title =        "On the Complexity of Some Extended Word Problems
                 Defined by Cancellation Rules",
  journal =      j-INFO-PROC-LETT,
  volume =       "23",
  number =       "6",
  pages =        "281--287",
  day =          "3",
  month =        dec,
  year =         "1986",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68Q45 (03D03 03D15 03D40 20M05 68Q25)",
  MRnumber =     "88d:68046",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "IMAG Grenoble, St. Martin d'Heres, Fr",
  classification = "721; 723; C4220 (Automata theory); C4240
                 (Programming and algorithm theory)",
  corpsource =   "IMAG Grenoble, St. Martin d'Heres, France",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "algorithm; algorithms; automata theory; automaton
                 recognising; cancellation rules; complexity bounds;
                 computational complexity; computer programming ---
                 Algorithms; cryptography; descendants; extended word
                 problems; Formal Languages; languages; public key
                 encryption; regular set; theory; Thue systems;
                 verification",
  pubcountry =   "Netherlands A02",
  subject =      "F.1.1 Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Automata \\ F.4.2
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Grammars and Other Rewriting Systems, Thue
                 systems",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Birnbaum:1986:VPS,
  author =       "Martha Birnbaum and Larry A. Cohen and Frank X.
                 Welsh",
  title =        "Voice password system for access security",
  journal =      j-ATT-TECH-J,
  volume =       "65",
  number =       "5",
  pages =        "68--74",
  month =        sep,
  year =         "1986",
  CODEN =        "ATJOEM",
  ISSN =         "8756-2324",
  bibdate =      "Fri Nov 12 13:09:16 2010",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  abstract =     "A voice password system for access security using
                 speaker verification technology has been designed for
                 use over dial-up telephone lines. The voice password
                 system (VPS) can provide secure access to telephone
                 networks, computers, rooms, and buildings. It also has
                 application in office automation systems, electronic
                 funds transfer, and 'Smart Cards' (interactive
                 computers embedded in credit-card-sized packages). As
                 increasing attention is focused on access security in
                 the public, private, and government sectors, the voice
                 password system can provide a timely solution to the
                 security dilemma. The VPS uses modes of communication
                 available to almost everyone (the human voice and the
                 telephone). A user calls the VPS, enters his or her
                 identification number (ID) by touch-tone telephone, and
                 then speaks a password. This is usually a phrase or
                 sentence of about seven syllables.",
  acknowledgement = ack-nhfb,
  fjournal =     "AT\&T Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  keywords =     "data processing --- security of data; telephone
                 interference",
  subject =      "access security; speaker verification technology;
                 Voice Password System (VPS)",
  topic =        "speech",
}

@Book{Boyd:1986:CPC,
  author =       "Waldo T. Boyd",
  title =        "Cryptology and the personal computer: with programming
                 in {Basic}",
  volume =       "47",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "157",
  year =         "1986",
  ISBN =         "0-89412-145-6 (hardcover), 0-89412-144-8 (paperback)",
  ISBN-13 =      "978-0-89412-145-6 (hardcover), 978-0-89412-144-9
                 (paperback)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic Series",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.",
}

@InProceedings{Brickell:1986:CKC,
  author =       "Ernest F. Brickell",
  title =        "The cryptanalysis of knapsack cryptosystems",
  crossref =     "Ringeisen:1986:ADM",
  pages =        "3--23",
  year =         "1986",
  MRclass =      "94A60 (11T71 90C09)",
  MRnumber =     "90f:94026",
  MRreviewer =   "Harald Niederreiter",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Brooke:1986:BRB,
  author =       "N. Michael Brooke",
  title =        "Book Review: {{\booktitle{Mr. Babbage's secret: the
                 tale of a Cypher --- and APL}}: O. I. Franksen.
                 Strandbergs Forlag, Denmark (1984). 320 pp. Dkr.
                 320.00. ISBN: 87-872-0086-4}",
  journal =      j-INFO-PROC-MAN,
  volume =       "22",
  number =       "1",
  pages =        "67--68",
  month =        "????",
  year =         "1986",
  CODEN =        "IPMADK",
  DOI =          "http://dx.doi.org/10.1016/0306-4573(86)90018-X",
  ISSN =         "0306-4573 (print), 1873-5371 (electronic)",
  ISSN-L =       "0306-4573",
  bibdate =      "Mon Jan 14 21:51:21 MST 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/030645738690018X",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing and Management",
}

@Article{Chang:1986:DKL,
  author =       "C. C. Chang",
  title =        "On the Design of a Key-Lock-Pair Mechanism in
                 Information Protection Systems",
  journal =      j-BIT,
  volume =       "26",
  number =       "4",
  pages =        "410--417",
  year =         "1986",
  CODEN =        "BITTEL, NBITAB",
  ISSN =         "0006-3835 (print), 1572-9125 (electronic)",
  ISSN-L =       "0006-3835",
  bibdate =      "Thu Nov 12 18:12:56 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "BIT (Nordisk tidskrift for informationsbehandling)",
  journal-URL =  "http://link.springer.com/journal/10543",
}

@Article{Chapman:1986:NFS,
  author =       "J. W. M. Chapman",
  title =        "No Final Solution: a Survey of the Cryptanalytical
                 Capabilities of {German} Military Agencies, 1926--35",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "13--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Article{Chaum:1986:CRN,
  author =       "David Chaum and Jan-Hendrik Evertse",
  booktitle =    "Advances in cryptology---CRYPTO '85 (Santa Barbara,
                 Calif., 1985)",
  title =        "Cryptanalysis of {DES} with a reduced number of
                 rounds: sequences of linear factors in block ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "218",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "192--211",
  year =         "1986",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "88a:94023",
  MRreviewer =   "Albrecht Beutelspacher",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Chor:1986:TIP,
  author =       "Ben-Zion Chor",
  title =        "Two issues in public key cryptography: {RSA} bit
                 security and a new knapsack type system",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "78",
  year =         "1986",
  ISBN =         "0-262-03121-3",
  ISBN-13 =      "978-0-262-03121-9",
  LCCN =         "TK5102.5 .C4781 1986",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Originally presented as the author's thesis (doctoral
                 --- MIT, 1985)",
  series =       "ACM distinguished dissertations",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; telecommunication --- security
                 measures",
}

@Article{Ciarcia:1986:BHD,
  author =       "Steve Ciarcia",
  title =        "Build a Hardware Data Encryptor",
  journal =      j-BYTE,
  volume =       "11",
  number =       "??",
  pages =        "??--??",
  month =        "??",
  year =         "1986",
  CODEN =        "BYTEDJ",
  ISSN =         "0360-5280",
  ISSN-L =       "0360-5280",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "BYTE Magazine",
}

@Article{Coppersmith:1986:DL,
  author =       "Don Coppersmith and Andrew M. Odlyzko and Richard
                 Schroeppel",
  title =        "Discrete logarithms in {$ {\rm GF}(p) $}",
  journal =      j-ALGORITHMICA,
  volume =       "1",
  number =       "1",
  pages =        "1--15",
  year =         "1986",
  CODEN =        "ALGOEJ",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  MRclass =      "11T71 (11Y16)",
  MRnumber =     "MR833115 (87g:11167)",
  MRreviewer =   "Jacques Calmet",
  bibdate =      "Mon Jan 22 05:26:07 MST 2001",
  bibsource =    "dblp-journals-algorithmica.bib;
                 http://dblp.uni-trier.de/db/journals/algorithmica/algorithmica1.html#CoppersmithOS86;
                 http://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica. An International Journal in Computer
                 Science",
  journal-URL =  "http://link.springer.com/journal/453",
  oldlabel =     "CoppersmithOS86",
  XMLdata =      "ftp://ftp.informatik.uni-trier.de/pub/users/Ley/bib/records.tar.gz#journals/algorithmica/CoppersmithOS86",
}

@Book{Courville:1986:MCC,
  author =       "Joseph B. Courville",
  title =        "Manual for cryptanalysis of the columnar double
                 transposition cipher: a study of cryptanalysis",
  publisher =    "J. B. Courville",
  address =      "10240 Virginia Ave, South Gate, CA, 90280, USA",
  pages =        "iv + 91",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers; Cryptography",
}

@InProceedings{deJonge:1986:ASR,
  author =       "W. {de Jonge} and D. Chaum",
  title =        "Attacks on some {RSA} signatures",
  crossref =     "Williams:1986:ACC",
  pages =        "18--27",
  year =         "1986",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 6]{Kaliski:1995:SUR}.",
}

@Article{Denniston:1986:GCC,
  author =       "A. G. Denniston",
  title =        "The {Government Code and Cypher School} Between the
                 {Wars}",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "48--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@InProceedings{Desmedt:1986:CTA,
  author =       "Y. G. Desmedt and A. M. Odlyzko",
  title =        "A chosen text attack on the {RSA} cryptosystem and
                 some discrete logarithm schemes",
  crossref =     "Williams:1986:ACC",
  pages =        "516--522",
  year =         "1986",
  bibdate =      "Mon Jul 19 07:00:30 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.research.att.com/~amo/doc/arch/rsa.attack.pdf;
                 http://www.research.att.com/~amo/doc/arch/rsa.attack.ps;
                 http://www.research.att.com/~amo/doc/arch/rsa.attack.troff",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 7]{Kaliski:1995:SUR}.",
}

@Article{Franksen:1986:SHM,
  author =       "O. I. Franksen",
  title =        "The secret hobby of {Mr. Babbage}",
  journal =      "Systems Anal. Modelling Simulation",
  volume =       "3",
  number =       "2",
  pages =        "183--194",
  year =         "1986",
  ISSN =         "0232-9298",
  MRclass =      "01A55 (94-03)",
  MRnumber =     "846173 (87h:01035)",
  MRreviewer =   "Garry J. Tee",
  bibdate =      "Tue Jan 15 11:49:13 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Systems Analysis Modelling Simulation. Journal of
                 Mathematical Modelling and Simulation in Systems
                 Analysis",
}

@Book{Gleason:1986:ECP,
  author =       "Andrew M. Gleason",
  title =        "Elementary course in probability for the
                 cryptanalyst",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "????",
  year =         "1986",
  ISBN =         "0-89412-098-0",
  ISBN-13 =      "978-0-89412-098-5",
  LCCN =         "????",
  bibdate =      "Wed May 11 23:23:17 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Goldreich:1986:HCR,
  author =       "Oded Goldreich and Shafi Goldwasser and Silvio
                 Micali",
  title =        "How to Construct Random Functions",
  journal =      j-J-ACM,
  volume =       "33",
  number =       "4",
  pages =        "792--807",
  month =        oct,
  year =         "1986",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Theory/ProbAlgs.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/jacm.bib",
  note =         "A computational complexity measure of the randomness
                 of functions is introduced, and, assuming the existence
                 of one-way functions, a pseudo-random function
                 generator is presented.",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/6503.html",
  abstract =     "A constructive theory of randomness for functions,
                 based on computational complexity, is developed, and a
                 pseudorandom function generator is presented. The
                 generator is a deterministic polynomial-time algorithm
                 that transforms pairs (g, r), where g is any one-way
                 function and r is a random k-bit string, to
                 polynomial-time computable functions that cannot be
                 distinguished from random functions by any
                 probabilistic polynomial-time algorithm that asks and
                 receives the value of a function at arguments of its
                 choice. The result has applications in cryptography,
                 random constructions, and complexity theory.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "MIT, Cambridge, MA, USA",
  classification = "723; 922",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computational complexity; computer
                 metatheory; computer programming --- Algorithms;
                 cryptography; probability; pseudorandom function
                 generator; random functions; Random Processes;
                 security; theory",
  referencedin = "Referenced in \cite[Ref. 14]{Goldreich:1997:FMCb}.",
  subject =      "{\bf F.1.3}: Theory of Computation, COMPUTATION BY
                 ABSTRACT DEVICES, Complexity Classes. {\bf F.1.1}:
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Models of Computation. {\bf F.1.2}: Theory of
                 Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
                 Computation, Probabilistic computation. {\bf G.3}:
                 Mathematics of Computing, PROBABILITY AND STATISTICS,
                 Probabilistic algorithms (including Monte Carlo). {\bf
                 G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation.",
}

@Book{Hamming:1986:CIT,
  author =       "R. W. (Richard Wesley) Hamming",
  title =        "Coding and information theory",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  edition =      "Second",
  pages =        "xii + 259",
  year =         "1986",
  ISBN =         "0-13-139072-4",
  ISBN-13 =      "978-0-13-139072-0",
  LCCN =         "QA268 .H35 1986",
  bibdate =      "Fri Jun 24 21:02:55 MDT 2005",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 z3950.loc.gov:7090/Voyager",
  price =        "US\$36.95",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Information theory",
}

@Book{IEE:1986:CEC,
  author =       "{IEE}",
  title =        "Colloquium on {``Encryption for Cable and DBS'':
                 Wednesday, 19 February 1986}",
  volume =       "1986/24",
  publisher =    "Institution of Electrical Engineers",
  address =      "London, UK",
  pages =        "various",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Imai:1986:AMC,
  author =       "Hideki Imai and Tsutomu Matsumoto",
  booktitle =    "Algebraic algorithms and error correcting codes
                 (Grenoble, 1985)",
  title =        "Algebraic methods for constructing asymmetric
                 cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "229",
  pages =        "108--119",
  year =         "1986",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "88f:94031",
  MRreviewer =   "Willi Meier",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jeffery:1986:GCC,
  author =       "Keith Jeffery",
  title =        "The {Government Code and Cypher School}; {A}
                 Memorandum by {Lord Curzon}",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "3",
  pages =        "454--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@MastersThesis{Jones:1986:DEB,
  author =       "John W. Jones",
  title =        "Data encryption based on the logarithm problem",
  type =         "Thesis ({M.A.Sc.})",
  publisher =    "National Library of Canada",
  school =       "University of Ottawa",
  address =      "Ottawa, ON, Canada",
  year =         "1986",
  ISBN =         "0-315-33330-8",
  ISBN-13 =      "978-0-315-33330-7",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "2 microfiches (103 fr.)",
  series =       "Canadian theses = Th{\`e}ses canadiennes",
  acknowledgement = ack-nhfb,
}

@Article{Koopman:1986:OES,
  author =       "Raymond F. Koopman",
  title =        "The orders of equidistribution of subsequences of some
                 asymptotically random sequences",
  journal =      j-CACM,
  volume =       "29",
  number =       "8",
  pages =        "802--806",
  month =        aug,
  year =         "1986",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "http://www.acm.org/pubs/toc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/6431.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  review =       "ACM CR 8704-0294",
  subject =      "{\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Random number generation. {\bf G.2.1}:
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics. {\bf F.2.1}: Theory of Computation,
                 ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
                 Numerical Algorithms and Problems. {\bf E.3}: Data,
                 DATA ENCRYPTION.",
}

@Book{Kranakis:1986:PC,
  author =       "Evangelos Kranakis",
  title =        "Primality and cryptography",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xv + 235",
  year =         "1986",
  ISBN =         "0-471-90934-3",
  ISBN-13 =      "978-0-471-90934-7",
  LCCN =         "TK5102.5 .K661 1986",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$38.00",
  series =       "Wiley-Teubner series in computer science",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; numbers, prime; telecommunication ---
                 security measures",
}

@InProceedings{Luby:1986:PRP,
  author =       "M. Luby and C. Rackoff",
  title =        "Pseudo-random permutation generators and cryptographic
                 composition",
  crossref =     "ACM:1986:PEA",
  pages =        "356--363",
  year =         "1986",
  bibdate =      "Wed Feb 20 18:33:46 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.acm.org/pubs/contents/proceedings/series/stoc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.acm.org/pubs/articles/proceedings/stoc/12130/p356-luby/p356-luby.pdf;
                 http://www.acm.org/pubs/citations/proceedings/stoc/12130/p356-luby/",
  acknowledgement = ack-nhfb,
}

@Book{Mevis:1986:SCP,
  author =       "Howard Mevis and Janet Plant",
  title =        "Satellite communications: a practical guide to
                 satellite {TV} encryption with tips on installing
                 decoders, solving reception problems, and upgrading
                 {TVROs}",
  publisher =    "American Hospital Association, Media Center",
  address =      "Chicago, IL, USA",
  pages =        "25",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Telecommunications",
}

@InProceedings{Miller:1986:UEC,
  author =       "V. S. Miller",
  title =        "Uses of Elliptic Curves in Cryptography",
  crossref =     "Williams:1986:ACC",
  pages =        "417--426",
  year =         "1986",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 5]{Wiener:1998:PCP},
                 \cite[Ref. 7]{Handschuh:1998:SCC}.",
  xxnote =       "Check pages: one reference has 417--428??",
  xxtitle =      "Use of Elliptic Curves in Cryptography",
}

@Article{Milner-Barry:1986:ADL,
  author =       "P. S. Milner-Barry",
  title =        "{`Action This Day'}: The Letter from {Bletchley Park}
                 Cryptanalysts to the {Prime Minister}, {21 October
                 1941}",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "2",
  pages =        "??--??",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Article{Mullender:1986:DCD,
  author =       "S. J. Mullender and A. S. Tanenbaum",
  title =        "The design of a capability-based distributed operating
                 system",
  journal =      j-COMP-J,
  volume =       "29",
  number =       "4",
  pages =        "289--299",
  month =        aug,
  year =         "1986",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "Compendex database; Distributed/amoeba.bib;
                 Distributed/clusters.bib;
                 http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/;
                 Misc/IMMD_IV.bib",
  URL =          "http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/289.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/290.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/291.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/292.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/293.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/294.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/295.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/296.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/297.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/298.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/299.tif",
  abstract =     "Fifth-generation computer systems will use large
                 numbers of processors to achieve high performance. In
                 this paper a capability-based operating system designed
                 for this environment is discussed. Capability-based
                 operating systems have traditionally required large,
                 complex kernels to manage the use of capabilities. In
                 our proposal, capability management is done entirely by
                 user programs without giving up any of the protection
                 aspects normally associated with capabilities. The
                 basic idea is to use one-way functions and encryption
                 to protect sensitive information. Various aspects of
                 the proposed system are discussed.",
  acknowledgement = ack-nhfb,
  affiliation =  "Cent for Mathematics \& Computer Science, Amsterdam,
                 Neth",
  affiliationaddress = "Cent for Mathematics \& Computer Science,
                 Amsterdam, Neth",
  classcodes =   "C6130 (Data handling techniques); C6150J (Operating
                 systems)",
  classification = "722; 723",
  corpsource =   "Centre for Math. and Comput. Sci., Amsterdam,
                 Netherlands",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "(computers); Amoeba Capabilities; capability
                 management; capability-based distributed operating
                 systems; capability-based operating system; computer
                 networks --- Protocols; computer operating systems;
                 computer systems, digital --- Distributed;
                 cryptography; data protection; distributed; distributed
                 processing; encryption; fifth generation systems;
                 fifth-generation computers; information; operating
                 system; operating systems; sensitive; user programs",
  treatment =    "P Practical",
}

@Article{Muller:1986:CDS,
  author =       "Winfried B. M{\"u}ller and Rupert N{\"o}bauer",
  booktitle =    "Advances in cryptology---EUROCRYPT '85 (Linz, 1985)",
  title =        "Cryptanalysis of the {Dickson}-scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "219",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "50--61",
  year =         "1986",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60 (11T71 11Y16)",
  MRnumber =     "851 582",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Niederreiter:1986:KTC,
  author =       "H. Niederreiter",
  title =        "Knapsack-type cryptosystems and algebraic coding
                 theory",
  journal =      "Problems Control Inform. Theory/Problemy Upravlen.
                 Teor. Inform.",
  volume =       "15",
  number =       "2",
  pages =        "159--166",
  year =         "1986",
  CODEN =        "PUTIAI",
  ISSN =         "0370-2529",
  MRclass =      "94A60 (11K55 11T71 94B05)",
  MRnumber =     "88a:94025",
  MRreviewer =   "Willi Meier",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Problems of Control and Information Theory. Problemy
                 Upravlenija i Teorii Informacii",
}

@Article{ONeil:1986:ETM,
  author =       "Patrick E. O'Neil",
  title =        "The {Escrow} Transactional Method",
  journal =      j-TODS,
  volume =       "11",
  number =       "4",
  pages =        "405--430",
  month =        dec,
  year =         "1986",
  CODEN =        "ATDSD3",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Sat Apr 14 10:34:48 MDT 2001",
  bibsource =    "Compendex database; Database/Graefe.bib;
                 Database/Wiederhold.bib; http://www.acm.org/pubs/toc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/articles/journals/tods/1986-11-4/p405-o_neil/p405-o_neil.pdf;
                 http://www.acm.org/pubs/citations/journals/tods/1986-11-4/p405-o_neil/;
                 http://www.acm.org/pubs/toc/Abstracts/tods/7265.html",
  abstract =     "A method is presented for permitting record updates by
                 long-lived transactions without forbidding simultaneous
                 access by other users to records modified. Earlier
                 methods presented separately by Gawlick and Reuter are
                 comparable but concentrate on ``hot-spot'' situations,
                 where even short transactions cannot lock frequently
                 accessed fields without causing bottlenecks. The Escrow
                 Method offered here is designed to support nonblocking
                 record updates by transactions that are ``long lived''
                 and thus require long periods to complete.
                 Recoverability of intermediate results prior to commit
                 thus becomes a design goal, so that updates as of a
                 given time can be guaranteed against memory or media
                 failure while still retaining the prerogative to abort.
                 This guarantee basically completes phase one of a
                 two-phase commit, and several advantages result: (1) As
                 with Gawlick's and Reuter's methods, high-concurrency
                 items in the database will not act as a bottleneck; (2)
                 transaction commit of different updates can be
                 performed asynchronously, allowing natural distributed
                 transactions; indeed, distributed transactions in the
                 presence of delayed messages or occasional line
                 disconnection become feasible in a way that we argue
                 will tie up minimal resources for the purpose intended;
                 and (3) it becomes natural to allow for human
                 interaction in the middle of a transaction without loss
                 of concurrent access or any special difficulty for the
                 application programmer. The Escrow Method, like
                 Gawlick's Fast Path and Reuter's Method, requires the
                 database system to be an ``expert'' about the type of
                 transactional updates performed, most commonly updates
                 involving incremental changes to aggregate quantities.
                 However, the Escrow Method is extendable to other types
                 of updates.",
  acknowledgement = ack-nhfb,
  affiliation =  "Computer Corp of America, Cambridge, MA, USA",
  affiliationaddress = "Computer Corp of America, Cambridge, MA, USA",
  annote =       "For aggregate values (counts, sum) concurrency control
                 can use soft tolerances and keep them in escrow",
  classification = "723",
  fjournal =     "ACM Transactions on Database Systems",
  generalterms = "Algorithms; Design; Performance; Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "database systems; design; escrow transactional method;
                 long-lived transactions; multiuser environment, locking
                 quantities, not variables TODS, algorithms; nested
                 transactions; performance; theory; two-phase commit",
  subject =      "{\bf D.4.1}: Software, OPERATING SYSTEMS, Process
                 Management, Concurrency. {\bf D.4.1}: Software,
                 OPERATING SYSTEMS, Process Management, Deadlocks. {\bf
                 H.2.2}: Information Systems, DATABASE MANAGEMENT,
                 Physical Design, Recovery and restart. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Distributed systems. {\bf H.2.4}: Information Systems,
                 DATABASE MANAGEMENT, Systems, Escrow. {\bf H.2.4}:
                 Information Systems, DATABASE MANAGEMENT, Systems,
                 Transaction processing.",
}

@InProceedings{Pfitzmann:1986:NUO,
  author =       "A. Pfitzmann and M. Waidner",
  title =        "Networks Without User Observability --- Design
                 Options",
  crossref =     "Pichler:1986:ACE",
  pages =        "????",
  year =         "1986",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1020.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@MastersThesis{Roy:1986:CBI,
  author =       "Marc Paul Roy",
  title =        "A {CMOS} bit-slice implementation of the {RSA} public
                 key encryption algorithm",
  type =         "Thesis ({M.Sc.(Eng.)})",
  publisher =    "National Library of Canada",
  school =       "Queen's University",
  address =      "Ottawa, ON, Canada",
  year =         "1986",
  ISBN =         "0-315-30418-9",
  ISBN-13 =      "978-0-315-30418-5",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "3 microfiches (210 fr.)",
  series =       "Canadian theses = Th{\`e}ses canadiennes",
  acknowledgement = ack-nhfb,
}

@Article{Rytter:1986:SCU,
  author =       "Wojciech Rytter",
  title =        "The Space Complexity of the Unique Decipherability
                 Problem",
  journal =      j-INFO-PROC-LETT,
  volume =       "23",
  number =       "1",
  pages =        "1--3",
  day =          "20",
  month =        jul,
  year =         "1986",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Salerno, Italy",
  classification = "723; C4210 (Formal logic); C4240 (Programming and
                 algorithm theory)",
  corpsource =   "Inst. of Inf., Warsaw Univ., Poland",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "algorithms; alphabet; code-set; codewords;
                 computational complexity; computer metatheory;
                 decomposition; formal languages; graph accessibility
                 problem; languages; nonunique decipherability; space
                 complexity; theory; unique decipherability problem;
                 uniquely decipherable; verification",
  pubcountry =   "Netherlands A01",
  subject =      "F.1.1 Theory of Computation, COMPUTATION BY ABSTRACT
                 DEVICES, Models of Computation, Automata \\ F.4.3
                 Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
                 LANGUAGES, Formal Languages, Algebraic language theory
                 \\ D.3.3 Software, PROGRAMMING LANGUAGES, Language
                 Constructs, Abstract data types",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Salomaa:1986:PCB,
  author =       "A. Salomaa and S. Yu",
  title =        "On a public-key cryptosystem based on iterated
                 morphisms and substitutions",
  journal =      j-THEOR-COMP-SCI,
  volume =       "48",
  number =       "2-3",
  pages =        "283--296",
  month =        "????",
  year =         "1986",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
  acknowledgement = ack-nhfb,
  classification = "B6120B (Codes); C1260 (Information theory); C4210
                 (Formal logic); C4290 (Other computer theory)",
  corpsource =   "Dept. of Math., Turku Univ., Finland",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "backward determinism; context-free languages;
                 cryptoanalysis; cryptography; DT0L system; growth;
                 iterated morphisms; L systems; mathematics; plaintext
                 blocksize; preprocessing; Salomaa-Welzl public-key
                 cryptosystem; substitutions",
  pubcountry =   "Netherlands A09",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Salomaa:1986:PKC,
  author =       "Arto Salomaa and Sheng Yu",
  title =        "On a public-key cryptosystem based on iterated
                 morphisms and substitutions",
  journal =      j-THEOR-COMP-SCI,
  volume =       "48",
  number =       "2-3",
  pages =        "283--296 (1987)",
  year =         "1986",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  MRclass =      "68Q99 (68P25 68Q45 94A60)",
  MRnumber =     "88j:68143",
  MRreviewer =   "J{\"u}rgen Dassow",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Sansom:1986:BRC,
  author =       "Robert Sansom",
  title =        "Book Review: {{\em Computer Security: A Global
                 Challenge --- Proceedings of the Second IFIP
                 International Conference on Computer Security,
                 IFIP\slash Sec'84, Toronto, Ontario, Canada, 10--12
                 September, 1984\/}: (Elsevier Science Publishing Co.
                 1984)}",
  journal =      j-OPER-SYS-REV,
  volume =       "20",
  number =       "3",
  pages =        "9--9",
  month =        jul,
  year =         "1986",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:45 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Scacchitti:1986:CT,
  author =       "Fred A. Scacchitti",
  title =        "The Cryptographer's Toolbox",
  journal =      j-DDJ,
  volume =       "11",
  number =       "5",
  pages =        "58--??",
  month =        may,
  year =         "1986",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Mon Sep 2 09:09:39 MDT 1996",
  bibsource =    "http://www.ddj.com/index/author/index.htm;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Book{Schroeder:1986:NTS,
  author =       "M. R. (Manfred Robert) Schroeder",
  title =        "Number theory in science and communication: with
                 applications in cryptography, physics, digital
                 information, computing, and self-similarity",
  volume =       "7",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Second enlarged",
  pages =        "xix + 374",
  year =         "1986",
  ISBN =         "0-387-15800-6",
  ISBN-13 =      "978-0-387-15800-6",
  LCCN =         "QA241 .S3181 1986",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "Springer series in information sciences",
  acknowledgement = ack-nhfb,
  keywords =     "number theory",
}

@Book{Sears:1986:SWK,
  author =       "Peter Sears",
  title =        "Secret writing: keys to the mysteries of reading and
                 writing",
  publisher =    "Teachers and Writers Collaborative",
  address =      "New York, NY, USA",
  pages =        "xv + 160",
  year =         "1986",
  ISBN =         "0-915924-86-2 (paperback)",
  ISBN-13 =      "978-0-915924-86-8 (paperback)",
  LCCN =         "Z 103.3 S4 1986 Resources for Teaching--2nd Floor",
  bibdate =      "Wed Nov 25 14:23:25 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Discusses secret writing, ciphers, and the processes
                 of creating and deciphering secret or difficult
                 languages. Includes thinking and writing exercises.",
  price =        "US\$9.95",
  acknowledgement = ack-nhfb,
  keywords =     "ciphers --- juvenile literature; cryptography ---
                 juvenile literature; language and languages ---
                 juvenile literature",
}

@InProceedings{Shamir:1986:SPS,
  author =       "A. Shamir",
  title =        "The search for provably secure identification
                 schemes",
  crossref =     "Gleason:1987:PIC",
  volume =       "2",
  pages =        "1488--1495",
  year =         "1986",
  bibdate =      "Sun Mar 11 11:15:35 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  ZMnumber =     "Zbl 0685.94004",
  acknowledgement = ack-nhfb,
}

@PhdThesis{Sherman:1986:CVT,
  author =       "Alan T. Sherman",
  title =        "Cryptology and {VLSI} (a two-part dissertation). {I},
                 {II}, Detecting and exploiting algebraic weaknesses in
                 cryptosystems. Algorithms for placing modules on a
                 custom {VLSI} chip",
  type =         "Thesis ({Ph.D.})",
  number =       "MIT/LCS/TR-381",
  school =       "Laboratory for Computer Science, Massachusetts
                 Institute of Technology",
  address =      "Cambridge, MA, USA",
  pages =        "221",
  month =        oct,
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Supervised by Ronald Linn Rivest",
  acknowledgement = ack-nhfb,
  keywords =     "Algorithms; Cryptography --- Data processing;
                 Integrated circuits --- Very large scale integration",
}

@InCollection{Siromoney:1986:PKC,
  author =       "Rani Siromoney and Gift Siromoney",
  booktitle =    "Workshop on Mathematics of Computer Algorithms
                 (Madras, 1986)",
  title =        "A public key cryptosystem that defies cryptanalysis",
  volume =       "111",
  publisher =    "Inst. Math. Sci.",
  address =      "Madras",
  pages =        "D.3.17, 4",
  year =         "1986",
  MRclass =      "68P25",
  MRnumber =     "970 342",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "IMS Rep.",
}

@Article{Smillie:1986:RWA,
  author =       "K. W. Smillie and Ralph Erskine",
  title =        "Reviews: {W. Aspray, Should the Term Fifth Generation
                 Computers Be Banned?}; {C. A. Deavours and L. Kruh,
                 Machine Cryptography and Modern Cryptanalysis}; Capsule
                 Reviews",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "8",
  number =       "2",
  pages =        "199--200, 202, 204--205",
  month =        apr # "\slash " # jun,
  year =         "1986",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:23 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1986/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1986/pdf/a2199.pdf;
                 http://www.computer.org/annals/an1986/a2199abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Smith:1986:GCC,
  author =       "G. W. Smith and J. B. H. {Du Boulay}",
  title =        "The generation of cryptic crossword clues",
  journal =      j-COMP-J,
  volume =       "29",
  number =       "3",
  pages =        "282--284",
  month =        jun,
  year =         "1986",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 25 13:51:56 MST 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  affiliation =  "Logica UK Ltd, London, Engl",
  affiliationaddress = "Logica UK Ltd, London, Engl",
  classcodes =   "C7820 (Humanities computing); C7830D (Computer
                 games)",
  classification = "723",
  corpsource =   "Logica UK Ltd., London, UK",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "clue insertion; compilation; computer programming;
                 computer software; crossword; crossword clue
                 generation; crossword compilation; cryptic clues;
                 cryptic crossword; entertainment; games of skill;
                 linguistics",
  treatment =    "P Practical",
}

@Article{Tao:1986:TVF,
  author =       "Ren Ji Tao and Shi Hua Chen",
  title =        "Two varieties of finite automaton public key
                 cryptosystem and digital signatures",
  journal =      j-J-COMP-SCI-TECH,
  volume =       "1",
  number =       "1",
  pages =        "9--18",
  year =         "1986",
  CODEN =        "JCTEEM",
  ISSN =         "1000-9000",
  ISSN-L =       "1000-9000",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "88e:68025",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Journal of Computer Science and Technology",
}

@Article{Thomas:1986:SDE,
  author =       "John A. Thomas",
  title =        "Survey of Data Encryption in {DOL}",
  journal =      j-DDJ,
  volume =       "11",
  number =       "6",
  pages =        "16--??",
  month =        jun,
  year =         "1986",
  CODEN =        "DDJOEB",
  ISSN =         "1044-789X",
  bibdate =      "Mon Sep 2 09:09:39 MDT 1996",
  bibsource =    "http://www.ddj.com/index/author/index.htm;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Dr. Dobb's Journal of Software Tools",
}

@Article{Valiant:1986:NED,
  author =       "L. G. Valiant and V. V. Vazirani",
  title =        "{NP} is as easy as detecting unique solutions",
  journal =      j-THEOR-COMP-SCI,
  volume =       "47",
  number =       "1",
  pages =        "85--93",
  month =        "????",
  year =         "1986",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Nov 22 13:29:49 MST 1997",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/tcs1985.bib",
  acknowledgement = ack-nhfb,
  classification = "C4240 (Programming and algorithm theory)",
  corpsource =   "Aiken Comput. Lab., Harvard Univ., Cambridge, MA,
                 USA",
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
  keywords =     "computational complexity; cryptography; D/sup p/-hard
                 problems; NP-complete problem; NP-hard problems;
                 parity; randomized polynomial time reducibility; SAT;
                 unique solutions",
  pubcountry =   "Netherlands A07",
  treatment =    "T Theoretical or Mathematical",
}

@MastersThesis{Vandeberg:1986:ICS,
  author =       "Ronald D. Vandeberg",
  title =        "Implementation of a coprocessing system to support
                 data encryption",
  type =         "Thesis ({M.S. in Computer Science})",
  school =       "University of Wisconsin-Milwaukee",
  address =      "Milwaukee, WI, USA",
  pages =        "112",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography; Data protection",
}

@Article{vanTilburg:1986:DBK,
  author =       "Johan van Tilburg and Dick E. Boekee",
  booktitle =    "Advances in cryptology---CRYPTO '85 (Santa Barbara,
                 Calif., 1985)",
  title =        "Divergence bounds on key equivocation and error
                 probability in cryptanalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "218",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "489--513",
  year =         "1986",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "851 437",
  bibdate =      "Sat Oct 26 10:21:29 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Wang:1986:UEA,
  author =       "Yuedong Wang",
  title =        "Using encryption for authentication in local area
                 networks",
  publisher =    "????",
  address =      "????",
  pages =        "??",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Welchman:1986:PBB,
  author =       "G. Welchman",
  title =        "From {Polish Bomba} to {British Bombe}. {The} Birth of
                 {Ultra}",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "1",
  number =       "1",
  pages =        "71--110",
  month =        "????",
  year =         "1986",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Sun Dec 01 10:02:58 2013",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Article{Wiedemann:1986:QC,
  author =       "D. Wiedemann",
  title =        "Quantum cryptography",
  journal =      j-SIGACT,
  volume =       "18",
  number =       "2",
  pages =        "48--51",
  month =        sep # "\slash " # mar,
  year =         "1986--1987",
  CODEN =        "SIGNDM",
  DOI =          "http://dx.doi.org/10.1145/24652.24654",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Wed Mar 21 08:21:23 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "An idea of Stephen Wiesner [1] is expanded to give a
                 method of public key distribution which is provably
                 secure under the principles of quantum mechanics. It
                 appears that this scheme could actually be implemented
                 in favorable environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Book{Williams:1986:CTU,
  author =       "John J. Williams",
  title =        "Cryptanalysis techniques: the ultimate decryption
                 manual",
  publisher =    "Consumertronics Co.",
  address =      "Alamogordo, NM, USA",
  pages =        "11 + 3 + 1",
  year =         "1986",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Ciphers --- Data processing; Cryptography --- Data
                 processing.",
}

@InCollection{Williams:1986:PKE,
  author =       "H. C. Williams",
  booktitle =    "Advances in cryptology---CRYPTO '85 (Santa Barbara,
                 Calif., 1985)",
  title =        "An {$ M^3 $} public-key encryption scheme",
  volume =       "218",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "358--368",
  year =         "1986",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "851 427",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  series =       "Lecture Notes in Comput. Sci.",
}

@InProceedings{Yao:1986:HGE,
  author =       "A. C. Yao",
  title =        "How to Generate and Exchange Secrets",
  crossref =     "IEEE:1986:ASF",
  pages =        "162--167",
  year =         "1986",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 29]{Goldreich:1997:FMCb}.",
}

@InCollection{Adleman:1987:PRD,
  author =       "Leonard Adleman",
  title =        "Pre-{RSA} Days: History and Lessons",
  crossref =     "Ashenhurst:1987:ATA",
  pages =        "??--??",
  year =         "1987",
  DOI =          "http://dx.doi.org/10.1145/1283920.1961904",
  bibdate =      "Tue Jun 21 11:01:04 2011",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "ACM Turing Award lecture.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Agnew:1987:RSC,
  author =       "G. B. Agnew",
  title =        "Random Sources for Cryptographic Systems",
  crossref =     "Chaum:1987:ACE",
  pages =        "77--81",
  year =         "1987",
  bibdate =      "Thu Feb 23 10:04:54 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ahituv:1987:PED,
  author =       "Niv Ahituv and Yeheskel Lapid and Seev Neumann",
  title =        "Processing encrypted data",
  journal =      j-CACM,
  volume =       "30",
  number =       "9",
  pages =        "777--780",
  month =        sep,
  year =         "1987",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu May 30 09:41:10 MDT 1996",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Database/Wiederhold.bib;
                 http://www.acm.org/pubs/toc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0001-0782/30404.html",
  acknowledgement = ack-nhfb,
  annote =       "Limit to operation is integer modular addition.",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "algorithms; security",
  review =       "ACM CR 8812-0933",
  subject =      "{\bf E.3}: Data, DATA ENCRYPTION, Data encryption
                 standard (DES). {\bf E.3}: Data, DATA ENCRYPTION,
                 Public key cryptosystems.",
}

@Book{Anonymous:1987:EVE,
  author =       "Anonymous",
  title =        "{Enigma} variations: encryption, emc\slash rfi, emp:
                 1987 conference proceedings",
  publisher =    "Osprey Exhibitions",
  address =      "Watford, England",
  pages =        "v + 243",
  year =         "1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Computers --- Access control --- Congresses;
                 Cryptography --- Congresses; Data protection ---
                 Congresses.",
}

@InProceedings{Barrett:1987:IRS,
  author =       "Paul Barrett",
  title =        "Implementing the {Rivest}, {Shamir} and {Adleman}
                 public-key encryption algorithm on a standard digital
                 signal processor",
  crossref =     "Odlyzko:1987:ACC",
  pages =        "311--323",
  year =         "1987",
  MRclass =      "94A60",
  MRnumber =     "88i:94015",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 1]{Handschuh:1998:SCC}.",
}

@Article{Bracha:1987:ERR,
  author =       "Gabriel Bracha",
  title =        "An $ {O}(\log n) $ Expected Rounds Randomized
                 {Byzantine} Generals Protocol",
  journal =      j-J-ACM,
  volume =       "34",
  number =       "4",
  pages =        "910--920",
  month =        oct,
  year =         "1987",
  CODEN =        "JACOAH",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Jan 15 18:12:53 MST 1997",
  bibsource =    "Compendex database;
                 ftp://ftp.ira.uka.de/pub/bibliography/Misc/IMMD_IV.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "http://www.acm.org/pubs/toc/Abstracts/0004-5411/42229.html",
  abstract =     "Byzantine Generals protocols enable processes to
                 broadcast messages reliably in the presence of faulty
                 processes. These protocols are run in a system that
                 consists of n processes, t of which are faulty. The
                 protocols are conducted in synchronous rounds of
                 message exchange. It is shown that, in the absence of
                 eavesdropping, without using cryptography, for any
                 epsilon greater than 0 and t equals n/(3 plus epsilon),
                 there is a randomized protocol with O(log n) expected
                 number of rounds. If cryptographic methods are allowed,
                 then, for epsilon greater than 0 and t equals n/(2 plus
                 epsilon), there is a randomized protocol with O(log n)
                 expected number of rounds. This is an improvement on
                 the lower bound of t plus 1 rounds required for
                 deterministic protocols, and on a previous result of
                 t/log n expected number of rounds for randomized
                 noncryptographic protocols.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Cornell Univ, Ithaca, NY, USA",
  classification = "722; 723",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  journalabr =   "J Assoc Comput Mach",
  keywords =     "algorithms; computer networks --- Protocols; computer
                 programming --- Algorithms; computer systems, digital;
                 consensus protocols; cryptography; Distributed;
                 distributed algorithms; parallel algorithms; randomized
                 Byzantine generals protocol; reliability; theory;
                 verification",
  subject =      "{\bf C.2.2}: Computer Systems Organization,
                 COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
                 {\bf G.3}: Mathematics of Computing, PROBABILITY AND
                 STATISTICS, Probabilistic algorithms (including Monte
                 Carlo). {\bf F.2.2}: Theory of Computation, ANALYSIS OF
                 ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
                 Algorithms and Problems. {\bf G.1.0}: Mathematics of
                 Computing, NUMERICAL ANALYSIS, General, Parallel
                 algorithms. {\bf G.2.1}: Mathematics of Computing,
                 DISCRETE MATHEMATICS, Combinatorics, Permutations and
                 combinations.",
}

@TechReport{Brassard:1987:IMC,
  author =       "Gilles Brassard",
  title =        "Introduction to modern cryptology",
  type =         "Publication",
  number =       "606",
  institution =  "Universit{\'e} de Montreal, D{\`e}partement
                 d'Informatique et de Recherche Op{\`e}rationnelle",
  address =      "Montr{\'e}al, Qu{\'e}bec, Canada",
  pages =        "56",
  year =         "1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Revised version, February 1987. Supported in part by
                 Canada NSERC.",
  keywords =     "Cryptography.",
}

@TechReport{Campbell:1987:MBC,
  author =       "Q. G. Campbell",
  title =        "Meteor burst communications protocols --- The history
                 and role of computing technology in radio communication
                 via meteor trails",
  type =         "Technical Report",
  number =       "246",
  institution =  "University of Newcastle upon Tyne",
  address =      "Newcastle upon Tyne, UK",
  pages =        "??--??",
  month =        nov,
  year =         "1987",
  bibdate =      "Sat Dec 26 17:01:46 1998",
  bibsource =    "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1007.html",
  acknowledgement = ack-nhfb,
  keywords =     "information hiding; steganography",
}

@InProceedings{Chaum:1987:DPD,
  author =       "David Chaum and Jan-Hendrik Everse and Jeroem van de
                 Graaf and Ren{\'e} Peralta",
  title =        "Demonstrating possession of a discrete logarithm
                 without revealing it",
  crossref =     "Odlyzko:1987:ACC",
  pages =        "200--212",
  year =         "1987",
  DOI =          "http://dx.doi.org/10.1007/3-540-47721-7_14",
  bibdate =      "Sun Mar 11 11:11:23 2012",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Book{Cohen:1987:IIP,
  author =       "Fred Cohen",
  title =        "Introductory Information Protection",
  publisher =    "????",
  address =      "????",
  pages =        "????",
  year =         "1987",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Thu May 16 08:16:54 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://all.net/books/ip/",
  acknowledgement = ack-nhfb,
  annote =       "Possibly unpublished: not found in University of
                 California MELVYL, U.S. Library of Congress, and
                 numerous European library catalogs. Available
                 electronically at the indicated URL.",
}

@MastersThesis{Cominsky:1987:CAP,
  author =       "Isabeth Cominsky",
  title =        "Cryptology: ancient problem modern solutions",
  type =         "Thesis ({M.S.})",
  school =       "State University of New York, College of Technology at
                 Utica/Rome",
  address =      "Utica/Rome, NY, USA",
  pages =        "iv + 91",
  year =         "1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  annote =       "Gives a basic background in cryptology, its current
                 techniques (algorithms), and examines security and
                 authentication. Examines relationship between
                 cryptology and computer science.",
  keywords =     "Ciphers; Cryptography",
}

@Article{Coppersmith:1987:C,
  author =       "D. Coppersmith",
  title =        "Cryptography",
  journal =      j-IBM-JRD,
  volume =       "31",
  number =       "2",
  pages =        "244--248",
  month =        mar,
  year =         "1987",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "88c:94019",
  bibdate =      "Tue Mar 25 14:26:59 MST 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  abstract =     "This paper is concerned with two aspects of
                 cryptography in which the author has been working. One
                 is the Data Encryption Standard (DES), developed at IBM
                 and now in wide use for commercial cryptographic
                 applications. This is a `private key' system; the
                 communicants share a secret key, and the eavesdropper
                 will succeed if he can guess this key among its
                 quadrillions of possibilities. The other is the
                 Diffie--Hellman key exchange protocol, a typical
                 `public key' cryptographic system. Its security is
                 based on the difficulty of taking `discrete logarithms'
                 (reversing the process of exponentiation in a finite
                 field). We describe the system and some analytic
                 attacks against it.",
  acknowledgement = ack-nhfb,
  affiliation =  "IBM, Yorktown Heights, NY, USA",
  affiliationaddress = "IBM, Yorktown Heights, NY, USA",
  classcodes =   "C6130 (Data handling techniques)",
  classification = "723; 902",
  conference =   "Math and Comput",
  corpsource =   "IBM Thomas J. Watson Res. Center, Yorktown Heights,
                 NY, USA",
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
  journalabr =   "IBM J Res Dev",
  keywords =     "cryptography; data encryption standard; Data
                 Encryption Standard; Diffie--Hellman key exchange
                 protocol; discrete logarithms; eavesdropper;
                 exponentiation; IBM; private key; public key; secret
                 key; security; security of data; standards",
  meetingaddress = "Yorktown Heights, NY, USA",
  meetingdate =  "Dec 1985",
  meetingdate2 = "12/85",
  treatment =    "P Practical",
}

@Article{Crilly:1987:BPB,
  author =       "Tony Crilly and Shekhar Nandy",
  title =        "The Birthday Problem for Boys and Girls",
  journal =      j-MATH-GAZ,
  volume =       "71",
  number =       "455",
  pages =        "19--22",
  month =        mar,
  year =         "1987",
  CODEN =        "MAGAAS",
  ISSN =         "0025-5572",
  bibdate =      "Wed Oct 31 13:22:46 2007",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://links.jstor.org/sici?sici=0025-5572%28198703%292%3A71%3A455%3C19%3ATBPFBA%3E2.0.CO%3B2-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematical Gazette",
  journal-URL =  "http://www.m-a.org.uk/jsp/index.jsp?lnk=620",
  keywords =     "Birthday Paradox",
  remark =       "The authors reexamine the Birthday Paradox in a
                 variant described as ``If the group consists of an
                 equal number of boys and girls, what should be the
                 corresponding minimum group size if we are interested
                 in a boy and a girl sharing a birthday?''\par The
                 answer is that at least one of the $r$ boys and one of
                 the $r$ girls will share a birthday is $ P(r) = 1 - (1
                 / 365)^{2r} \sum {k = 1r}(365 - k)^r {}^{365P}_k S(r,
                 k) $, where the $ S(r, k) $ is the Stirling numbers of
                 the second kind, and ${}^{365P}_k = 365 ! / (365 - k)!$
                 is the number of ways that $k$ specific subsets of
                 girls with birthdays in $k$ days can fall in the $ 365$
                 days.",
}

@Book{Deavours:1987:CPI,
  author =       "Cipher A. Deavours",
  title =        "Cryptanalytic programs for the {IBM PC}",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "44",
  year =         "1987",
  bibdate =      "Mon Nov 23 12:36:43 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A Cryptographic series",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography.; IBM Personal Computer.",
}

@Book{Deavours:1987:CYT,
  editor =       "Cipher A. Deavours and David Kahn and Louis Kruh and
                 Greg Mellen",
  title =        "Cryptology yesterday, today, and tomorrow",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  pages =        "xi + 519",
  year =         "1987",
  ISBN =         "0-89006-253-6",
  ISBN-13 =      "978-0-89006-253-1",
  LCCN =         "Z103.C76 1987",
  bibdate =      "Tue Dec 01 14:29:11 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "First volume of selected papers from issues of
                 Cryptologia.",
  price =        "US\$60.00",
  series =       "The Artech House communication and electronic defense
                 library",
  acknowledgement = ack-nhfb,
  annote =       "Continued by: Cryptology, machines, history, and
                 methods.",
  keywords =     "Ciphers; Cryptography",
}

@InProceedings{deJonge:1987:SVR,
  author =       "Wiebren {de Jonge} and David Chaum",
  title =        "Some variations on {RSA} signatures \& their
                 security",
  crossref =     "Odlyzko:1987:ACC",
  pages =        "49--59",
  year =         "1987",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "89b:94025",
  MRreviewer =   "Do Long Van",
  bibdate =      "Tue Feb 9 11:14:49 MST 1999",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@MastersThesis{Elvin:1987:CWW,
  author =       "Robert Scott Elvin",
  title =        "A cryptanalysis of the {World War II German Enigma}
                 cipher machine",
  type =         "Thesis ({M.Sc.C.S.})",
  publisher =    "National Library of Canada",
  school =       "University of New Brunswick",
  address =      "Ottawa, ON, Canada",
  year =         "1987",
  ISBN =         "0-315-39876-0",
  ISBN-13 =      "978-0-315-39876-4",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "2 microfiches (104 fr.)",
  series =       "Canadian theses = Th{\`e}ses canadiennes",
  acknowledgement = ack-nhfb,
}

@InProceedings{Feldman:1987:PSN,
  author =       "P. Feldman",
  title =        "A Practical Scheme for Non-Interactive Verifiable
                 Secret Sharing",
  crossref =     "IEEE:1987:ASF",
  pages =        "427--437",
  year =         "1987",
  bibdate =      "Thu Dec 03 07:01:52 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 15]{Gemmell:1997:ITC},
                 \cite[Ref. 13]{Canetti:1997:PSL}.",
}

@Article{Ferris:1987:WBC,
  author =       "John Ferris",
  title =        "{Whitehall}'s {Black Chamber}: {British} Cryptology
                 and the {Government Code and Cypher School}, 1919--29",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "2",
  number =       "1",
  pages =        "54--??",
  year =         "1987",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@InProceedings{Fiat:1987:HPY,
  author =       "A. Fiat and A. Shamir",
  title =        "How to prove yourself: Practical solutions to
                 identification and signature problems",
  crossref =     "Odlyzko:1987:ACC",
  pages =        "181--187",
  year =         "1987",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 5]{Handschuh:1998:SCC}.",
}

@Book{Friedman:1987:ICA,
  author =       "William F. (William Frederick) Friedman",
  title =        "The index of coincidence and its applications in
                 cryptanalysis",
  volume =       "49",
  publisher =    pub-AEGEAN-PARK,
  address =      pub-AEGEAN-PARK:adr,
  pages =        "95",
  year =         "1987",
  ISBN =         "0-89412-137-5 (soft cover), 0-89412-138-3 (library
                 bound)",
  ISBN-13 =      "978-0-89412-137-1 (soft cover), 978-0-89412-138-8
                 (library bound)",
  LCCN =         "????",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  series =       "A cryptographic series",
  acknowledgement = ack-nhfb,
  author-dates = "1891--1969",
  keywords =     "Ciphers; Cryptography; Probabilities.",
}

@Article{Galil:1987:PEA,
  author =       "Zvi Galil and Moti Yung",
  title =        "Partitioned encryption and achieving simultaneity by
                 partitioning",
  journal =      j-INFO-PROC-LETT,
  volume =       "26",
  number =       "2",
  pages =        "81--88",
  day =          "19",
  month =        oct,
  year =         "1987",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68M10 (68M15 68P25 68Q99)",
  MRnumber =     "88k:68014",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/infoproc.bib;
                 MathSciNet database",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Columbia Univ, New York, NY, USA",
  classification = "723; C4240 (Programming and algorithm theory); C5620
                 (Computer networks and techniques)",
  corpsource =   "Dept. of Comput. Sci., Columbia Univ. New York, NY,
                 USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "computational complexity; computer systems, digital
                 --- Distributed; cryptographic protocols; cryptography;
                 distributed processing; fault tolerant computing;
                 fault-tolerant distributed computing; partitioned
                 encryption; partitioned secret sharing; probabilistic
                 encryption; probabilistic public-key encryption;
                 protocols; security; simultaneous broadcast;
                 standardization; theory; verification",
  pubcountry =   "Netherlands A06",
  subject =      "E.3 Data, DATA ENCRYPTION, Public key cryptosystems
                 \\
                 D.4.6 Software, OPERATING SYSTEMS, Security and
                 Protection, Cryptographic controls",
  treatment =    "T Theoretical or Mathematical",
}

@InProceedings{Goldreich:1987:HPM,
  author =       "O. Goldreich and S. Micali and A. Wigderson",
  title =        "How to Play any Mental Game --- {A} Completeness
                 Theorem for Protocols with Honest Majority",
  crossref =     "ACM:1987:PNA",
  pages =        "218--229",
  year =         "1987",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 23]{Gemmell:1997:ITC},
                 \cite[Ref. 17]{Goldreich:1997:FMCb}, \cite[Ref.
                 19]{Canetti:1997:PSL}.",
}

@Article{Guan:1987:CAP,
  author =       "Puhua Guan",
  title =        "Cellular automaton public-key cryptosystem",
  journal =      j-COMPLEX-SYSTEMS,
  volume =       "1",
  number =       "1",
  pages =        "51--56",
  year =         "1987",
  ISSN =         "0891-2513",
  MRclass =      "94A60 (68P25 68Q80)",
  MRnumber =     "88j:94030",
  MRreviewer =   "Harriet Fell",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "Complex Systems",
  journal-URL =  "http://www.nature.com/scientificamerican",
}

@Article{Haastad:1987:OWP,
  author =       "Johan H{\aa}stad",
  title =        "One-way permutations in {$ {\rm NC}^0 $}",
  journal =      j-INFO-PROC-LETT,
  volume =       "26",
  number =       "3",
  pages =        "153--155",
  day =          "23",
  month =        nov,
  year =         "1987",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  MRclass =      "68Q15 (68Q05)",
  MRnumber =     "89h:68051",
  MRreviewer =   "J. C. Lagarias",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "MIT, Cambridge, MA, USA",
  classification = "723; C4240 (Programming and algorithm theory)",
  corpsource =   "Lab. for Comput. Sci., MIT, Cambridge, MA, USA",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "computable; computational complexity; computer
                 systems, digital --- Parallel Processing; cryptography;
                 inverting permutations; NC/sup 0/ circuits; one-way
                 permutations; p-completeness; P-hard; parallel
                 algorithms; parallel computation; permutations; theory;
                 verification",
  pubcountry =   "Netherlands A07",
  subject =      "G.2.2 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Graph Theory, Path and circuit problems \\ G.2.1
                 Mathematics of Computing, DISCRETE MATHEMATICS,
                 Combinatorics, Permutations and combinations \\ F.1.1
                 Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
                 Models of Computation, Bounded-action devices",
  treatment =    "T Theoretical or Mathematical",
  xxtitle =      "One-way permutations in ${NC}_0$",
}

@Article{Hammer:1987:EUH,
  author =       "Joseph Hammer and Dinesh G. Sarvate",
  title =        "Encryption using {Hungarian} rings",
  journal =      j-DISCRETE-APPL-MATH,
  volume =       "16",
  number =       "2",
  pages =        "151--155",
  year =         "1987",
  CODEN =        "DAMADU",
  ISSN =         "0166-218X",
  ISSN-L =       "0166-218X",
  MRclass =      "94B25 (05A05)",
  MRnumber =     "87k:94018",
  bibdate =      "Fri Oct 25 18:39:09 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 MathSciNet database",
  fjournal =     "Discrete Applied Mathematics. Combinatorial
                 Algorithms, Optimization and Computer Science",
}

@Article{Herzberg:1987:PPS,
  author =       "Amir Herzberg and Shlomit S. Pinter",
  title =        "Public Protection of Software",
  journal =      j-TOCS,
  volume =       "5",
  number =       "4",
  pages =        "371--393",
  month =        nov,
  year =         "1987",
  CODEN =        "ACSYEC",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Thu Jan 14 06:47:30 MST 1999",
  bibsource =    "Compendex database; http://www.acm.org/pubs/toc/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tocs/1987-5-4/p371-herzberg/",
  abstract =     "One of the overwhelming problems that software
                 producers must contend with is the unauthorized use and
                 distribution of their products. Copyright laws
                 concerning software are rarely enforced, thereby
                 causing major losses to the software companies.
                 Technical means of protecting software from illegal
                 duplication are required, but the available means are
                 imperfect. We present protocols that enable software
                 protection, without causing substantial overhead in
                 distribution and maintenance. The protocols may be
                 implemented by a conventional cryptosystem, such as the
                 DES, or by a public key cryptosystem, such as the RSA.
                 Both implementations are proved to satisfy required
                 security criteria.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technion-Israel Inst of Technology, Isr",
  classification = "723",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
  journalabr =   "ACM Trans Comput Syst",
  keywords =     "algorithms; computer software; cryptographic
                 protocols; cryptography; design; Protection; public key
                 cryptosystems; security; security protocols; single key
                 cryptosystems",
  subject =      "{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
                 Protection, Cryptographic controls. {\bf K.5.1}
                 Computing Milieux, LEGAL ASPECTS OF COMPUTING,
                 Hardware/Software Protection. {\bf E.3} Data, DATA
                 ENCRYPTION, Public key cryptosystems. {\bf D.4.6}
                 Software, OPERATING SYSTEMS, Security and Protection.",
}

@InProceedings{Hollis:1987:TCA,
  author =       "J. B. Hollis",
  title =        "A technique for communicating {AVL} traffic by
                 subliminal data signalling over a speech radio
                 channel",
  crossref =     "Muraszko:1987:CVR",
  pages =        "13/1--13/5",
  year =         "1987",
  bibdate =      "Mon Dec 28 13:17:10 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@TechReport{IRD:1987:DTV,
  author =       "{International Resource Development, Inc.}",
  title =        "Data, text and voice encryption worldwide markets",
  type =         "Report",
  number =       "727",
  institution =  "International Resource Development",
  address =      "6 Prowitt St., Norwalk, CT 06855, USA",
  pages =        "vii + 197",
  month =        feb,
  year =         "1987",
  bibdate =      "Mon Oct 19 08:47:56 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Cryptography equipment industry; Market surveys.",
}

@InProceedings{Ito:1987:SSS,
  author =       "M. Ito and A. Saito and T. Nishizeki",
  title =        "Secret sharing schemes realizing general access
                 structures",
  crossref =     "IEEE:1987:IIG",
  pages =        "99--102",
  year =         "1987",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 25]{Gemmell:1997:ITC}.",
}

@Book{Jackson:1987:NTS,
  author =       "T. H. Jackson",
  title =        "From number theory to secret codes",
  publisher =    "Hilger",
  address =      "Bristol, UK",
  pages =        "vi + 86",
  year =         "1987",
  ISBN =         "0-85274-077-8 (paperback), 0-85274-078-6",
  ISBN-13 =      "978-0-85274-077-4 (paperback), 978-0-85274-078-1",
  LCCN =         "Z104 .J3 1987",
  bibdate =      "Sat Apr 20 12:24:59 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Jung:1987:IRC,
  author =       "Achim Jung",
  title =        "Implementing the {RSA} Cryptosystem",
  journal =      j-COMPUT-SECUR,
  volume =       "6",
  number =       "4",
  pages =        "342--350",
  month =        aug,
  year =         "1987",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Jan 25 17:38:12 MST 1997",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  abstract =     "Techniques for a software implementation of the RSA
                 cryptosystem are presented. They allow both space and
                 time requirements of the RSA scheme to be minimized. A
                 hash function to be used in connection with the
                 cryptosystem is presented; this function avoids
                 weaknesses of other hash functions published
                 previously. Performance results of several
                 implementations are given, which show that the RSA
                 algorithm is acceptably fast for a large number of
                 applications.",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Technische Hochschule Darmstadt, Darmstadt, West
                 Ger",
  classification = "723",
  fjournal =     "Computers and Security",
  journalabr =   "Comput Secur",
  keywords =     "computer programming --- Algorithms; computer
                 software; cryptography; cryptosystem; digital
                 signatures; hash functions; primality tests",
}

@InProceedings{Karger:1987:LDP,
  author =       "P. Karger",
  title =        "Limiting the damage potential of discretionary
                 {Trojan} horses",
  crossref =     "IEEE:1987:PIS",
  pages =        "32--37",
  year =         "1987",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  referencedin = "Referenced in \cite[Ref. 30]{Gemmell:1997:ITC}.",
}

@Article{Kawai:1987:LAI,
  author =       "Satoru Kawai",
  title =        "Local authentication in insecure environments",
  journal =      j-INFO-PROC-LETT,
  volume =       "25",
  number =       "3",
  pages =        "171--174",
  day =          "29",
  month =        may,
  year =         "1987",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Nov 11 12:16:26 MST 1998",
  bibsource =    "Compendex database;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/infoproc.bib",
  acknowledgement = ack-nhfb,
  affiliationaddress = "Univ of Tokyo, Tokyo, Jpn",
  classification = "723; B6120B (Codes); C6130 (Data handling
                 techniques)",
  corpsource =   "Dept. of Inf. Sci., Tokyo Univ., Japan",
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  journalabr =   "Inf Process Lett",
  keywords =     "codebreaking; cryptography; data processing ---
                 Security of Data; faking; insecure environments; local
                 authentication; local authentication mechanism; public
                 key cryptosystem; system information; theory; user
                 identifiers",
  pubcountry =   "Netherlands A07",
  subject =      "E.3 Data, DATA ENCRYPTION, Public key cryptosystems
                 \\
                 E.3 Data, DATA ENCRYPTION, Data encryption standard
                 (DES)",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Knuth:1987:CT,
  author =       "Donald E. Knuth",
  title =        "{$N$}-ciphered texts",
  journal =      j-WORD-WAYS,
  volume =       "20",
  number =       "??",
  pages =        "173--174, 191--192",
  year =         "1987",
  ISSN =         "0043-7980",
  bibdate =      "Sat Mar 23 15:46:24 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Word Ways",
}

@Book{Koblitz:1987:CNT,
  author =       "Neal Koblitz",
  title =        "A course in number theory and cryptography",
  volume =       "114",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "208",
  year =         "1987",
  ISBN =         "0-387-96576-9",
  ISBN-13 =      "978-0-387-96576-5",
  LCCN =         "QA241 .K6721 1987",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  price =        "US\$29.80",
  series =       "Graduate texts in mathematics",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; number theory",
}

@Article{Koblitz:1987:ECC,
  author =       "Neal Koblitz",
  title =        "Elliptic Curve Cryptosystems",
  journal =      j-MATH-COMPUT,
  volume =       "48",
  number =       "177",
  pages =        "203--209",
  month =        jan,
  year =         "1987",
  CODEN =        "MCMPAF",
  ISSN =         "0025-5718 (paper), 1088-6842 (electronic)",
  ISSN-L =       "0025-5718",
  MRclass =      "94A60 (11T71 11Y16 68P25)",
  MRnumber =     "88b:94017",
  MRreviewer =   "Harald Niederreiter",
  bibdate =      "Tue Oct 13 08:06:19 MDT 1998",
  bibsource =    "ftp://ftp.ira.uka.de/pub/bibliography/Theory/crypto.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/mathcomp1980.bib;
                 JSTOR database",
  acknowledgement = ack-nhfb,
  classcodes =   "B0250 (Combinatorial mathematics); B6120B (Codes);
                 C1160 (Combinatorial mathematics); C1260 (Information
                 theory)",
  corpsource =   "Dept. of Math., Washington Univ., Seattle, WA, USA",
  fjournal =     "Mathematics of Computation",
  journal-URL =  "http://www.ams.org/mcom/",
  keywords =     "cryptography; cryptosystems; cyclic; elliptic curve;
                 elliptic curves over finite fields; global point; group
                 theory; key cryptosystems; multiplicative group;
                 nonsmoothness; number theory; primitive points; public;
                 subgroup",
  referencedin = "Referenced in \cite[Ref. 3]{Wiener:1998:PCP}.",
  treatment =    "T Theoretical or Mathematical",
}

@Article{Kuchlin:1987:PKE,
  author =       "W. K{\"u}chlin",
  title =        "Public key encryption",
  journal =      j-SIGSAM,
  volume =       "21",
  number =       "3",
  pages =        "69--73",
  month =        aug,
  year =         "1987",
  CODEN =        "SIGSBZ",
  ISSN =         "0163-5824 (print), 1557-9492 (electronic)",
  ISSN-L =       "0163-5824",
  bibdate =      "Fri Feb 8 18:26:59 MST 2002",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGSAM Bulletin",
  issue =        "81",
  keywords =     "theory",
  subject =      "E.3 Data, DATA ENCRYPTION, Public key cryptosystems",
}

@Book{Leary:1987:CSM,
  author =       "Penn Leary",
  title =        "The Cryptographic {Shakespeare}: a monograph wherein
                 the poems and plays attributed to {William Shakespeare}
                 are proven to contain the enciphered name of the
                 concealed author, {Francis Bacon}",
  publisher =    "Westchester House",
  address =      "Omaha, NE, USA",
  pages =        "272",
  year =         "1987",
  ISBN =         "0-9617917-0-5",
  ISBN-13 =      "978-0-9617917-0-4",
  LCCN =         "PR2944 .L38 1987",
  bibdate =      "Mon Nov 30 10:07:37 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lenstra:1987:FIE,
  author =       "H. W. {Lenstra, Jr.}",
  title =        "Factoring integers with elliptic curves",
  journal =      j-ANN-MATH,
  volume =       "126",
  number =       "3",
  pages =        "649--673",
  year =         "1987",
  CODEN =        "ANMAAH",
  ISSN =         "0003-486X (print), 1939-8980 (electronic)",
  ISSN-L =       "0003-486X",
  bibdate =      "Fri Nov 20 15:54:39 MST 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.jstor.org/stable/1971363",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of Mathematics",
  referencedin = "Referenced in \cite[Ref. 15]{Kaliski:1995:SUR}.",
}

@Article{Litant:1987:BRC,
  author =       "Thomas F. Litant",
  title =        "Book Review: {{\em Computer Security: the Practical
                 Issues in a Troubled World}, (Elsevier Science
                 Publishers, Amsterdam 1985)}",
  journal =      j-OPER-SYS-REV,
  volume =       "21",
  number =       "1",
  pages =        "3--5",
  month =        jan,
  year =         "1987",
  CODEN =        "OSRED8",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Sat Aug 26 08:55:35 MDT 2006",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@Article{Luciano:1987:CCC,
  author =       "Dennis Luciano and Gordon Prichett",
  title =        "Cryptology: from {Caesar} ciphers to public-key
                 cryptosystems",
  journal =      j-COLLEGE-MATH-J,
  volume =       "18",
  number =       "1",
  pages =        "2--17",
  year =         "1987",
  ISSN =         "0746-8342",
  ISSN-L =       "0746-8342",
  MRclass =      "94A60 (00A08 11T71)",
  MRnumber =     "88e:94025",
  MRreviewer =   "E. F. Assmus, Jr.",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  fjournal =     "The College Mathematics Journal",
}

@Article{MacPherson:1987:CUN,
  author =       "B. Nelson MacPherson",
  title =        "The Compromise of {US Navy} Cryptanalysis After the
                 {Battle of Midway}",
  journal =      j-INTELL-NATL-SECUR,
  volume =       "2",
  number =       "2",
  pages =        "320--??",
  year =         "1987",
  ISSN =         "0268-4527 (print), 1743-9019 (electronic)",
  ISSN-L =       "0268-4527",
  bibdate =      "Wed Jan 16 10:21:32 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Intelligence and National Security",
  journal-URL =  "http://www.tandfonline.com/loi/fint20",
}

@Book{Marayati:1987:AWA,
  author =       "Muhammad Marayati and Muhammad Hassan Tayyan and Yahya
                 Mir 'Alam",
  title =        "'Ilm al-ta'miyah wa-istikhraj al-mu'amma 'inda
                 al-'Arab",
  publisher =    "Majma' al-Lughah al-'Arabiyah bi-Dimashq",
  address =      "Damascus, Syria",
  pages =        "various",
  year =         "1987",
  LCCN =         "Z103.4.A65 M37 1987",
  bibdate =      "Sat Oct 17 16:25:07 MDT 1998",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  note =         "Abstract in English. Title on added t.p.: Origins of
                 Arab cryptography and cryptanalysis. Contents: al-juz'
                 1. Dirasat wa-tahqiq li-rasa'il al-Kindi wa-Ibn 'Adlan
                 wa-Ibn al-Durayhim.",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography --- Arab countries --- history",
}

@Article{Maulucci:1987:HAC,
  author =       "Ruth A. Maulucci and J. A. N. Lee",
  title =        "Happenings: {The 25th Anniversary of Committee X3};
                 {The Code-Breaking Computers of 1944}",
  journal =      j-ANN-HIST-COMPUT,
  volume =       "9",
  number =       "3/4",
  pages =        "345--356",
  month =        jul # "\slash " # sep,
  year =         "1987",
  CODEN =        "AHCOE5",
  ISSN =         "0164-1239",
  bibdate =      "Fri Nov 1 15:29:24 MST 2002",
  bibsource =    "http://www.computer.org/annals/an1987/;
                 http://www.math.utah.edu/pub/tex/bib/cryptography.bib",
  URL =          "http://dlib.computer.org/an/books/an1987/pdf/a3345.pdf;
                 http://www.computer.org/annals/an1987/a3345abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5488650",
}

@Article{Micali:1987:NSP,
  author =       "Silvio Micali and Charles Rackoff and Bob Sloan",
  title =        "The notion of security for probabilistic cryptosystems
                 (extended abstract)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "263",
  pages =        "381--392",
  year =         "1987",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  MRclass =      "94A60",
  MRnumber =     "907 101",
  bibsource =    "http://www.math.utah