%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "3.34",
%%%     date            = "09 August 2014",
%%%     time            = "08:46:48 MDT",
%%%     filename        = "cryptologia.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "22286 35876 130644 1423190",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "BibTeX, Cryptologia, ancient languages,
%%%                        bibliography, cipher devices, codes and
%%%                        ciphers, computer security, cryptographic
%%%                        history, cryptographic literature, espionage,
%%%                        history and technology of cryptography,
%%%                        mathematics of cryptography, military
%%%                        science",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        journal Cryptologia (CODEN CRYPE6, ISSN
%%%                        0161-1194 (print), 1558-1586 (electronic)),
%%%                        specializing in the history and technology of
%%%                        cryptography, published by Aegean Park Press,
%%%                        Laguna Hills, CA, USA.
%%%
%%%                        Publication began with volume 1, number 1, in
%%%                        January 1977, and the journal currently
%%%                        appears quarterly, in January, April, July,
%%%                        and October.  Volume 9, number 3, appeared in
%%%                        June, instead of July, 1985.
%%%
%%%                        At version 3.34, the year coverage looked
%%%                        like this:
%%%
%%%                             1934 (   1)    1961 (   0)    1988 (  32)
%%%                             1935 (   0)    1962 (   0)    1989 (  33)
%%%                             1936 (   0)    1963 (   0)    1990 (  34)
%%%                             1937 (   0)    1964 (   0)    1991 (  31)
%%%                             1938 (   0)    1965 (   0)    1992 (  29)
%%%                             1939 (   0)    1966 (   0)    1993 (  33)
%%%                             1940 (   0)    1967 (   0)    1994 (  26)
%%%                             1941 (   0)    1968 (   1)    1995 (  34)
%%%                             1942 (   0)    1969 (   0)    1996 (  30)
%%%                             1943 (   0)    1970 (   0)    1997 (  28)
%%%                             1944 (   0)    1971 (   0)    1998 (  29)
%%%                             1945 (   0)    1972 (   0)    1999 (  30)
%%%                             1946 (   0)    1973 (   0)    2000 (  33)
%%%                             1947 (   0)    1974 (   0)    2001 (  24)
%%%                             1948 (   0)    1975 (   0)    2002 (  24)
%%%                             1949 (   0)    1976 (   1)    2003 (  30)
%%%                             1950 (   0)    1977 (  55)    2004 (  31)
%%%                             1951 (   0)    1978 (  64)    2005 (  47)
%%%                             1952 (   0)    1979 (  62)    2006 (  41)
%%%                             1953 (   0)    1980 (  57)    2007 (  53)
%%%                             1954 (   0)    1981 (  43)    2008 (  51)
%%%                             1955 (   0)    1982 (  48)    2009 (  51)
%%%                             1956 (   0)    1983 (  39)    2010 (  42)
%%%                             1957 (   0)    1984 (  54)    2011 (  45)
%%%                             1958 (   0)    1985 (  44)    2012 (  37)
%%%                             1959 (   0)    1986 (  38)    2013 (  42)
%%%                             1960 (   0)    1987 (  37)    2014 (  27)
%%%                             19xx (   1)
%%%
%%%                             Article:       1379
%%%                             Book:           111
%%%                             Unpublished:      2
%%%
%%%                             Total entries: 1492
%%%
%%%                        The journal was originally published and/or
%%%                        edited first at Albion College, Albion, MI,
%%%                        USA, and later, at Rose-Hulman Institute of
%%%                        Technology, Terre Haute, IN 47803, USA, and
%%%                        then moved in July 1995 to the Department
%%%                        of Mathematical Sciences, United States
%%%                        Military Academy, West Point NY 10996-9902,
%%%                        USA.  In 2006, publishing again moved, this
%%%                        time to Taylor & Francis:
%%%
%%%                            http://www.informaworld.com/smpp/title~content=t725304178~db=all
%%%                            http://www.tandfonline.com/loi/ucry20
%%%                            http://www.tandf.co.uk/journals/titles/01611194.asp
%%%
%%%                        This journal is unusual in that volumes are
%%%                        numbered with roman, rather than arabic,
%%%                        numbers.  For convenience of bibliography
%%%                        tools like bibsort, this bibliography uses
%%%                        the equivalent arabic form.
%%%
%%%                        The journal has a World-Wide Web site at
%%%
%%%                            http://www.dean.usma.edu/math/pubs/cryptologia/
%%%
%%%                        From the Web page:
%%%
%%%                            ``The journal is NOT a publication of the
%%%                            United States Government but rather is
%%%                            managed and published at the United
%%%                            States Military Academy by Professor
%%%                            Brian J. Winkel, Department of
%%%                            Mathematical Sciences.''
%%%
%%%                        There is an interesting Web site about the
%%%                        Enigma machine, with a large color picture,
%%%                        at
%%%
%%%                            http://www.enigma-co.com/history.html
%%%
%%%                        and work is in progress to republish Turing's
%%%                        original analysis of the Enigma machine; see
%%%
%%%                            http://home.cern.ch/~frode/crypto/Turing/index.html
%%%
%%%                        for three of the eight chapters.  An Enigma emulator
%%%                        written by Martin Oberzalek is available at
%%%
%%%                            http://home.pages.at/kingleo/genigma-1.2.tar.gz
%%%
%%%                        Three volumes of selected reprints from the
%%%                        journal have been published; bibliography
%%%                        entries for them appear at the end of this
%%%                        file, and where possible, cross references
%%%                        have been provided from the original articles
%%%                        to these reprint volumes.
%%%
%%%                        Data for the bibliography has been collected
%%%                        from the bibliographies in the TeX User Group
%%%                        collection, from bibliographies in the
%%%                        author's personal files, from the OCLC
%%%                        Article1st and Contents1st databases, from
%%%                        the Compendex database, from the MathSciNet
%%%                        database, from the Zentralblatt fuer
%%%                        Mathematik database, from publisher Web
%%%                        sites, and from several on-line library
%%%                        catalogs.  A small number of missing initial
%%%                        page numbers were obtained from the Uncover
%%%                        database.  There is no coverage of this
%%%                        journal in Science Citation Index
%%%                        (1980--2000).
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.   Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort
%%%                        -byvolume''.  However, this is not reliable
%%%                        for the early years where author and page
%%%                        number information is lacking.
%%%
%%%                        Historical note: The following e-mail
%%%                        message posted on 9-Nov-1998 records the
%%%                        passing of an important figure in
%%%                        computational cryptography:
%%%
%%%                            Date: Mon, 9 Nov 1998 19:22:52 +0000
%%%                            To: msb at sq.com, sc22wg14 at dkuug.dk, ``J. V. Field'' <jv.field at hist-art.bbk.ac.uk>
%%%                            From: ``Clive D. W. Feather'' <clive at on-the-train.demon.co.uk>
%%%                            Subject: (SC22WG14.6480) Tommy Flowers, Engineer who cracked German communications, dead, at, 92
%%%
%%%                            ...
%%%
%%%                            LONDON (November 8, 1998 3:51 p.m. EST
%%%                            http://www.nandotimes.com) Tommy
%%%                            Flowers, who developed a pioneering
%%%                            computer that cracked German military
%%%                            codes in World War II, is dead at 92.
%%%
%%%                            Flowers died from heart failure at home
%%%                            in London on Oct. 28, his son Kenneth
%%%                            said Sunday.
%%%
%%%                            An engineering graduate of the
%%%                            University of London, Flowers joined
%%%                            the British Post Office, then
%%%                            responsible for all national
%%%                            communications, in the 1930s and
%%%                            experimented in electronic telephone
%%%                            transmissions.
%%%
%%%                            In World War II, he was sent to
%%%                            Bletchley Park, 50 miles from London
%%%                            where mathematicians, cryptographers
%%%                            and other experts worked on breaking
%%%                            German military codes.
%%%
%%%                            Flowers secretly developed Colossus, a
%%%                            one-ton machine that was able to
%%%                            unscramble coded messages
%%%                            electronically rather than mechanically
%%%                            as had been done.
%%%
%%%                            ``Colossus had all the characteristics
%%%                            of the computer although it wasn't
%%%                            thought of as a computer at the time,''
%%%                            Kenneth Flowers said in a telephone
%%%                            interview. ``It could think and made
%%%                            decisions.  Up to then these machines
%%%                            had been used just to make numerical
%%%                            calculations.''
%%%
%%%                            By the D-Day invasion on June 6, 1944,
%%%                            Flowers had produced another Colossus
%%%                            that worked five times as fast as the
%%%                            original. By the end of the war in
%%%                            1945, 10 machines were in operation.
%%%
%%%                            Thomas Harold Flowers, who was born in
%%%                            London on Dec. 22, 1905, received an
%%%                            honor, Member of the British Empire,
%%%                            for his work in the 1940s, but remained
%%%                            largely unknown to the wider public
%%%                            because the work was kept secret until
%%%                            the '70s.
%%%
%%%                            After the war, he returned to the post
%%%                            office and tried to persuade his
%%%                            superiors to use technology to produce
%%%                            an all-electronic phone system.
%%%
%%%                            ``He spent 20 years trying to persuade
%%%                            them, but he wasn't so successful
%%%                            because he couldn't tell them he had
%%%                            already produced the machine,'' Kenneth
%%%                            Flowers said.
%%%
%%%                            He did not tell his own family of his
%%%                            achievement and the many lives it saved
%%%                            until long after the war.
%%%
%%%                            ``He told us he worked on something
%%%                            secret and important,'' his son
%%%                            said. ``They were allowed to tell that
%%%                            much in case their wives wondered where
%%%                            they were. But until the '70s he never
%%%                            said anything else. It was a point of
%%%                            honor really.''
%%%
%%%                            Bletchley Park is now a tourist
%%%                            attraction with a replica of the
%%%                            Colossus.
%%%
%%%                            In addition to Kenneth, Flowers is
%%%                            survived by his wife, Eileen, son John,
%%%                            and three grandchildren.
%%%
%%%                            The funeral was to be held Monday at
%%%                            Hendon Crematorium in north London.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================

@Preamble{
    "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:

@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:

@String{j-CRYPTOLOGIA           = "Cryptologia"}

@String{j-IEEE-ANN-HIST-COMPUT  = "IEEE Annals of the History of Computing"}

@String{j-INTELL-NATL-SECUR     = "Intelligence and national security"}

@String{j-NAMS                  = "Notices of the {American Mathematical
                                  Society}"}

%%% ====================================================================
%%% Publisher abbreviations:

@String{pub-AEGEAN-PARK         = "Aegean Park Press"}
@String{pub-AEGEAN-PARK:adr     = "Laguna Hills, CA, USA"}

@String{pub-AMS                 = "American Mathematical Society"}
@String{pub-AMS:adr             = "Providence, RI, USA"}

@String{pub-ARTECH             = "Artech House Inc."}
@String{pub-ARTECH:adr         = "Norwood, MA, USA"}

@String{pub-CAMBRIDGE           = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr       = "Cambridge, UK"}

@String{pub-CHAPMAN-HALL-CRC    = "Chapman and Hall/CRC"}
@String{pub-CHAPMAN-HALL-CRC:adr = "Boca Raton, FL, USA"}

@String{pub-COLLINS             = "Collins"}
@String{pub-COLLINS:adr         = "London, UK"}

@String{pub-CRC                 = "CRC Press"}
@String{pub-CRC:adr             = "2000 N.W. Corporate Blvd., Boca Raton,
                                  FL 33431-9868, USA"}

@String{pub-ELSEVIER            = "Elsevier"}
@String{pub-ELSEVIER:adr        = "Amsterdam, The Netherlands"}

@String{pub-ELSEVIER-ACADEMIC   = "Elsevier Academic Press"}
@String{pub-ELSEVIER-ACADEMIC:adr = "Amsterdam, The Netherlands"}

@String{pub-HOUGHTON-MIFFLIN    = "Houghton-Mifflin"}
@String{pub-HOUGHTON-MIFFLIN:adr = "Boston"}

@String{pub-MATH-ASSOC-AMER     = "Mathematical Association of America"}
@String{pub-MATH-ASSOC-AMER:adr = "Washington, DC, USA"}

@String{pub-MCGRAW-HILL         = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr     = "New York, NY, USA"}

@String{pub-OXFORD              = "Oxford University Press"}
@String{pub-OXFORD:adr          = "Walton Street, Oxford OX2 6DP, UK"}

@String{pub-PH                  = "Pren{\-}tice-Hall"}
@String{pub-PH:adr              = "Upper Saddle River, NJ 07458, USA"}

@String{pub-RANDOM-HOUSE        = "Random House"}
@String{pub-RANDOM-HOUSE:adr    = "New York, NY, USA"}

@String{pub-SIMON-SCHUSTER      = "Simon and Schuster"}
@String{pub-SIMON-SCHUSTER:adr  = "New York, NY, USA"}

@String{pub-SV                  = "Springer-Verlag"}
@String{pub-SV:adr              = "Berlin, Germany~/ Heidelberg, Germany~/
                                    London, UK~/ etc."}

@String{pub-WESTVIEW            = "Westview Press"}
@String{pub-WESTVIEW:adr        = "Boulder, CO, USA"}

@String{pub-WILEY               = "John Wiley"}
@String{pub-WILEY:adr           = "New York, NY, USA"}

@String{pub-YALE                = "Yale University Press"}
@String{pub-YALE:adr            = "New Haven, CT, USA"}

%%% ====================================================================
%%% Bibliography entries:

@Article{Winkel:1977:WC,
  author =       "Brian J. Winkel",
  title =        "Why {Cryptologia}?",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "1",
  pages =        "1--3",
  month =        jan,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832733",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:20 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865249~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Mellen:1977:CMSa,
  author =       "Greg E. Mellen and Lloyd Greenwood",
  title =        "The Cryptology of Multiplex System: {Part I}:
                 Simulation and Cryptanalysis",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "1",
  pages =        "4--16",
  month =        jan,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832742",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:20 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865250~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Harris:1977:DKC,
  author =       "Barbara Harris",
  title =        "A Different Kind of Column",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "1",
  pages =        "17--19",
  month =        jan,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832751",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:20 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865251~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Reeds:1977:CRN,
  author =       "James A. Reeds",
  title =        "``{Cracking}'' a Random Number Generator",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "1",
  pages =        "20--26",
  month =        jan,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832760",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:20 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 Theory/crypto.security.bib",
  note =         "Reprinted in \cite[pp. 509--515]{Deavours:1987:CYT}.",
  URL =          "http://www.dean.usma.edu/math/pubs/cryptologia/ClassicArticleReprints/V01N1PP20-26JamesReeds.pdf;
                 http://www.informaworld.com/smpp/content~content=a748865252~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Kahn:1977:BB,
  author =       "David Kahn",
  title =        "The Biggest Bibliography",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "1",
  pages =        "27--42",
  month =        jan,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832779",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:20 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865253~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Shulman:1977:RKR,
  author =       "David Shulman",
  title =        "A Reply to {Kahn}'s Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "1",
  pages =        "43--45",
  month =        jan,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832788",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:20 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865254~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Deavours:1977:UPC,
  author =       "Cipher A. Deavours",
  title =        "Unicity Points in Cryptanalysis",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "1",
  pages =        "46--68",
  month =        jan,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832797",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:20 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865255~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Kruh:1977:CECa,
  author =       "Louis Kruh",
  title =        "Cipher Equipment: Cipher Disks",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "1",
  pages =        "69--75",
  month =        jan,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832805",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:20 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865256~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
  xxtitle =      "Cipher Equipment",
}

@Article{Levine:1977:SCA,
  author =       "Jack Levine and Joel V. Brawley",
  title =        "Some Cryptographic Applications of Permutation
                 Polynomials",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "1",
  pages =        "76--92",
  month =        jan,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832814",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:20 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865257~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Winkel:1977:PCCa,
  author =       "Brian J. Winkel",
  title =        "{Poe} Challenge Cipher Finally Broken",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "1",
  pages =        "93--96",
  month =        jan,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832823",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:20 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865258~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Anonymous:1977:BCa,
  author =       "Anonymous",
  title =        "Biographies of Contributory",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "1",
  pages =        "97--99",
  month =        jan,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832832",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:20 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865259~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Hiatt:1977:AD,
  author =       "Blanchard Hiatt",
  title =        "Age of Decipherment",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "2",
  pages =        "101--105",
  month =        apr,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832841",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865262~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Hiatt:1977:CFT,
  author =       "Blanchard Hiatt",
  title =        "``Count Forward Three Score and Ten \ldots{}''",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "2",
  pages =        "106--115",
  month =        apr,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832850",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865263~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Schatz:1977:AAC,
  author =       "Bruce R. Schatz",
  title =        "Automated Analysis of Cryptogram Cipher Equipment",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "2",
  pages =        "116--142",
  month =        apr,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832869",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865264~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
  xxtitle =      "Automated Analysis of Cryptograms",
}

@Article{Kruh:1977:CECb,
  author =       "Louis Kruh",
  title =        "Cipher Equipment: Converter {M-325(T)}",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "2",
  pages =        "143--149",
  month =        apr,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832878",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865265~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Mellen:1977:CMSb,
  author =       "Greg E. Mellen and Lloyd Greenwood",
  title =        "The Cryptology of Multiplex System: {Part II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "2",
  pages =        "150--165",
  month =        apr,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832887",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865266~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Kahn:1977:GYS,
  author =       "David Kahn",
  title =        "``Get Out Your Secret Decoders, Boys and Girls
                 \ldots{}''",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "2",
  pages =        "166--166",
  month =        apr,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832896",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865267~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Deavours:1977:AHC,
  author =       "Cipher A. Deavours",
  title =        "Analysis of the {Hebern} Cryptograph Using Isomorphs",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "2",
  pages =        "167--185",
  month =        apr,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832904",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865268~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Reeds:1977:RA,
  author =       "James A. Reeds",
  title =        "Rotor Algebra",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "2",
  pages =        "186--194",
  month =        apr,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832913",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865269~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Penney:1977:GR,
  author =       "Walter Penney",
  title =        "Grille Reconstruction",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "2",
  pages =        "195--201",
  month =        apr,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832922",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865270~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Anonymous:1977:BCb,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "2",
  pages =        "202--204",
  month =        apr,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832931",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865271~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Kahn:1977:SCI,
  author =       "David Kahn",
  title =        "The Significance of Codebreaking and Intelligence in
                 {Allied} Strategy and Tactics",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "209--222",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832940",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a758845268~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Deavours:1977:KT,
  author =       "Cipher A. Deavours",
  title =        "The Kappa Test",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "223--231",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832959",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a758845269~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Winkel:1977:WWJ,
  author =       "Brian J. Winkel",
  title =        "Word Ways, a Journal Worth Going Your Way",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "232--234",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832968",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a758845270~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Reeds:1977:ECP,
  author =       "James A. Reeds",
  title =        "Entropy Calculations and Particular Methods of
                 Cryptanalysis",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "235--254",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832977",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a758845271~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Kruh:1977:CEH,
  author =       "Louis Kruh",
  title =        "Cipher Equipment: {Hagelin} Pocket Cryptographer, Type
                 {CD-57}",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "255--260",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832986",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a758845272~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Leighton:1977:EUD,
  author =       "Albert C. Leighton",
  title =        "The Earliest Use of a Dot Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "261--274",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832995",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a758845273~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Mint:1977:DDC,
  author =       "{Royal Canadian Mint}",
  title =        "{DPEPE DPJO}: a {Canadian} Coin Piece With a Message",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "275--277",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833002",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a758845274~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Deavours:1977:KSM,
  author =       "Cipher A. Deavours",
  title =        "{Kullback}'s {``Statistical Methods in
                 Cryptanalysis''}, a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "278--280",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833011",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a758845275~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Morris:1977:ANB,
  author =       "Robert Morris and Neil J. A. Sloane and Aaron D.
                 Wyner",
  title =        "Assessment of the {National Bureau of Standards
                 Proposed Federal Data Encryption Standard}",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "281--291",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833020",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a758845276~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{NBS:1977:PFI,
  author =       "{National Bureau of Standards}",
  title =        "Proposed {Federal Information Processing Data
                 Encryption Standard}",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "292--306",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833039",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a758845277~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Anonymous:1977:BCc,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "307--308",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833048",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:21 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a758845278~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Winkel:1977:E,
  author =       "Brian J. Winkel",
  title =        "Epilogue",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "3",
  pages =        "309--309",
  month =        jul,
  year =         "1977",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Deavours:1977:ICC,
  author =       "Cipher A. Deavours",
  title =        "The {Ithaca} Connection: Computer Cryptography in the
                 Making --- a Special Report",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "312--317",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833057",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865284~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Winkel:1977:PCCb,
  author =       "Brian J. Winkel",
  title =        "{Poe} Challenge Cipher Solutions",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "318--325",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833066",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865285~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Eckler:1977:RYN,
  author =       "A. Ross Eckler",
  title =        "A Rapid Yes--No Computer-Aided Communicator",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "326--333",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833075",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865286~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Kruh:1977:CEM,
  author =       "Louis Kruh",
  title =        "Cipher Equipment: {MA4210} Alphanumeric Pocket
                 Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "334--336",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833084",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865287~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
  xxtitle =      "{MA4210} Alphanumeric Pocket Cipher",
}

@Article{Kahn:1977:ECR,
  author =       "David Kahn",
  title =        "Ecclesiastical Cryptography --- {A} Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "337--337",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833093",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865288~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Brawley:1977:EVS,
  author =       "Joel V. Brawley and Jack Levine",
  title =        "Equivalence of {Vigen{\`e}re} Systems",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "338--361",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833101",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865289~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Marsh:1977:CCC,
  author =       "D. C. B. Marsh",
  title =        "Courses in Cryptology --- Cryptography at the
                 {Colorado School of Mines}",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "362--363",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833110",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865290~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
  xxtitle =      "Cryptography at the {Colorado School of Mines}",
}

@Article{Straight:1977:CCC,
  author =       "David W. Straight",
  title =        "Courses in Cryptology --- Cryptanalysis and Data
                 Security Course at the {University of Tennessee}",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "363--365",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833129",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865291~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
  xxtitle =      "Cryptanalysis and Data Security Course at the
                 {University of Tennessee}",
}

@Article{Bright:1977:CAD,
  author =       "Herbert S. Bright",
  title =        "Cryptanalytic Attack and Defense: Cipher-Text Only,
                 Known-Plaintext, Chosen-Plaintext",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "366--370",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833138",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865292~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
  xxtitle =      "Cryptanalytic Attack and Defense: Cipher-Text Only,
                 Known Plaintext",
}

@Article{Kahn:1977:RR,
  author =       "David Kahn",
  title =        "Reports From the {Reich}",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "371--371",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833147",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865293~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Kruh:1977:CC,
  author =       "Louis Kruh",
  title =        "The Churchyard Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "372--375",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833156",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865294~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Highland:1977:CSE,
  author =       "Harold Joseph Highland",
  title =        "{CENSORED}: a Simulation Exercise",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "376--377",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833165",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865295~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Kahn:1977:GME,
  author =       "David Kahn",
  title =        "{German} Military Eavesdroppers",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "378--380",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833174",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865296~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Deavours:1977:EPH,
  author =       "Cipher A. Deavours and James A. Reeds",
  title =        "The {Enigma}: {Part I}: Historical Perspectives",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "381--391",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833183",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865297~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Winkel:1977:S,
  author =       "Brian J. Winkel",
  title =        "Solution",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "391--391",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Fagone:1977:MCW,
  author =       "Peter P. Fagone",
  title =        "A Message in Cipher Written by {General Cornwallis}
                 During the {Revolutionary War}",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "392--395",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833192",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865298~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Winkel:1977:TTD,
  author =       "Brian J. Winkel",
  title =        "There and There --- {A} Department",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "396--405",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833200",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865299~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Unknown:1977:TSP,
  author =       "Unknown",
  title =        "They Should Be Paranoid",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "400--401",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Originally published in {\em Datamation}, September
                 1977, pp. 29--30.",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Simmons:1977:PCM,
  author =       "Gustavus J. Simmons and Michael J. Norris",
  title =        "Preliminary Comments on the {M.I.T.} Public-Key
                 Cryptosystem",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "406--414",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833219",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 Theory/crypto.security.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865300~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Anonymous:1977:BCd,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "415--417",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833228",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:22 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865301~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Unknown:1977:LE,
  author =       "Unknown",
  title =        "Letter from the {Editor}",
  journal =      j-CRYPTOLOGIA,
  volume =       "1",
  number =       "4",
  pages =        "??--??",
  month =        oct,
  year =         "1977",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "I",
}

@Article{Barker:1978:SHT,
  author =       "Wayne G. Barker",
  title =        "Solving a {Hagelin}, Type {CD-57}, Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "1",
  pages =        "1--8",
  month =        jan,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852730",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:23 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865303~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Wilson:1978:CCC,
  author =       "David Wilson",
  title =        "Courses in Cryptology --- Cryptanalysis Course Down
                 Under",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "1",
  pages =        "9--11",
  month =        jan,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852749",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:23 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865304~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kahn:1978:FNG,
  author =       "David Kahn",
  title =        "The {Forschungsamt}: {Nazi Germany}'s Most Secret
                 Communications Intelligence Agency",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "1",
  pages =        "12--19",
  month =        jan,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852758",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:23 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865305~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Rohrbach:1978:MMMa,
  author =       "Hans Rohrbach",
  title =        "Mathematical and Mechanical Methods in Cryptography.
                 {I}",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "1",
  pages =        "20--37",
  month =        jan,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852767",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99 (00A69 05A15 94-01)",
  MRnumber =     "81e:94027a",
  MRreviewer =   "J. S. Joel",
  bibdate =      "Mon Jun 30 15:38:23 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865306~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kruh:1978:IWF,
  author =       "Louis Kruh",
  title =        "The Inventions of {William F. Friedman}",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "1",
  pages =        "38--61",
  month =        jan,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852776",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:23 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865307~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Rivest:1978:RPC,
  author =       "Ronald L. Rivest",
  title =        "Remarks on a Proposed Cryptanalytic Attack on the
                 {M.I.T.} Public-Key Cryptosystem",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "1",
  pages =        "62--65",
  month =        jan,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852785",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:23 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 Theory/crypto.security.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865308~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Deavours:1978:BRB,
  author =       "Cipher A. Deavours",
  title =        "A Book Review: {{\booktitle{Cryptanalysis of the
                 Hagelin Cryptograph}}, by Wayne G. Barker}",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "1",
  pages =        "66--67",
  month =        jan,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852794",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:23 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865309~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
  xxtitle =      "Cryptanalysis of the {Hagelin} Cryptograph --- {A}
                 Book Review",
}

@Article{Knight:1978:CCa,
  author =       "H. Gary Knight",
  title =        "Cryptanalyst's Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "1",
  pages =        "68--74",
  month =        jan,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852802",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:23 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865310~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Weber:1978:JLS,
  author =       "Ralph E. Weber",
  title =        "{James Lovell} and Secret Ciphers During the {American
                 Revolution}",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "1",
  pages =        "75--88",
  month =        jan,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852811",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:23 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865311~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Winkel:1978:TTDa,
  author =       "Brian J. Winkel",
  title =        "There and There --- {A} Department",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "1",
  pages =        "89--94",
  month =        jan,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852820",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:23 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865312~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Anonymous:1978:BCa,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "1",
  pages =        "95--96",
  month =        jan,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852839",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:23 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865313~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Rohrbach:1978:MMMb,
  author =       "Hans Rohrbach",
  title =        "Mathematical and Mechanical Methods in Cryptography.
                 {II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "101--121",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852848",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99 (00A69 05A15 94-01)",
  MRnumber =     "81e:94027b",
  MRreviewer =   "J. S. Joel",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865315~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kahn:1978:FLB,
  author =       "David Kahn",
  title =        "{Friedman}'s Life: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "122--123",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852857",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99 (00A69 05A15 94-01)",
  MRnumber =     "81e:94027b",
  MRreviewer =   "J. S. Joel",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865316~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Knight:1978:CCb,
  author =       "H. Gary Knight",
  title =        "Cryptanalyst's Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "124--129",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852866",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865317~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
  xxpages =      "124--128",
}

@Article{Kruh:1978:WWA,
  author =       "Louis Kruh",
  title =        "Who Wrote {``The American Black Chamber''}?",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "130--133",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852875",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865318~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Deavours:1978:CCC,
  author =       "Cipher A. Deavours",
  title =        "Courses in Cryptology --- Cryptology at {Kean
                 College}",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "134--138",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852884",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865319~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
  xxtitle =      "Cryptology at Kean College",
}

@Article{Kahn:1978:NAY,
  author =       "David Kahn",
  title =        "Nuggets from the Archives: {Yardley} Tries Again",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "139--143",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852893",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865320~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Barker:1978:UDC,
  author =       "Wayne G. Barker",
  title =        "The Unsolved {D'Agapeyeff} Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "144--147",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852901",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "05A99 (01A60 94B99)",
  MRnumber =     "80k:05013",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865321~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Straight:1978:MMC,
  author =       "David Straight",
  title =        "{``Modern Methods for Computer Security and
                 Privacy''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "148--150",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
  xxtitle =      "An Outline of Computer Security: A Book Review",
}

@Article{Straight:1978:OCS,
  author =       "David Straight",
  title =        "{``An Outline of Computer Security''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "148--150",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852910",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865322~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kahn:1978:PGB,
  author =       "David Kahn",
  title =        "{``Pictures Galore''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "151--151",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852929",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865323~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Rubin:1978:CMDa,
  author =       "Frank Rubin",
  title =        "Computer Methods for Decrypting Multiplex Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "152--160",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852938",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865324~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Winkel:1978:CBC,
  author =       "Brian J. Winkel",
  title =        "{Casanova} and the {Beaufort} Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "161--163",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852947",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865325~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kruh:1978:CC,
  author =       "Louis Kruh",
  title =        "Cryptology as a Career",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "164--167",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852956",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865326~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Anonymous:1978:EC,
  author =       "Anonymous",
  title =        "Encryption Challenge",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "168--171",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Withheld:1978:EC,
  author =       "Names Withheld",
  title =        "Encryption Challenge",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "168--171",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852965",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865327~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kruh:1978:CED,
  author =       "Louis Kruh",
  title =        "Cipher Equipment: {DH-26} Handheld Encryption Unit",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "172--177",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852974",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865328~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
  xxtitle =      "{DH-26} Handheld Encryption Machine",
}

@Article{Winkel:1978:TAM,
  author =       "Brian J. Winkel",
  title =        "A Tribute to {Alf Monge}",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "178--185",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852983",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865329~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
  xxtitle =      "A Tribute to Alf Mong",
}

@Article{Winkel:1978:TTDb,
  author =       "Brian J. Winkel",
  title =        "There and There --- {A} Department",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "186--194",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891852992",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865330~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Anonymous:1978:BCb,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "195--197",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853009",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865331~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Unknown:1978:CCB,
  author =       "Unknown",
  title =        "{``Codes and Ciphers''} --- {A} Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Unknown:1978:MWB,
  author =       "Unknown",
  title =        "{``The Man Who Broke Purple''} --- a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "1978",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Childs:1978:MRG,
  author =       "J. Rives Childs",
  title =        "My Recollections of {G.2 A.6}",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "201--214",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853018",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902659~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
  xxauthor =     "J. Rives Chives",
}

@Article{Rubin:1978:CMDb,
  author =       "Frank Rubin",
  title =        "Computer Methods for Decrypting Random Stream
                 Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "215--231",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853027",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Reprinted in \cite[pp. 493--508]{Deavours:1987:CYT}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902660~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Arnold:1978:FBC,
  author =       "Philip M. Arnold",
  title =        "A Forgotten Book on Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "232--235",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853036",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902661~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Foster:1978:CCC,
  author =       "Caxton C. Foster",
  title =        "Courses in Cryptology --- Cryptanalysis and
                 Computers",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "236--237",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853045",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902662~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Knight:1978:CCc,
  author =       "H. Gary Knight",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "238--241",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853054",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902663~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kruh:1978:CHIa,
  author =       "Louis Kruh",
  title =        "A Catalog of Historical Interest",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "242--253",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853063",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902664~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Winkel:1978:ACS,
  author =       "Brian J. Winkel",
  title =        "{Astle} Cipher Solved",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "254--256",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853072",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902665~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kahn:1978:FVB,
  author =       "David Kahn",
  title =        "A Famous Variation --- {A} Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "257--257",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853081",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902666~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kahn:1978:RDB,
  author =       "David Kahn",
  title =        "Reveling in Deception --- {A} Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "258--259",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853090",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902667~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Heitzenrater:1978:DWD,
  author =       "Richard Heitzenrater",
  title =        "Decoding {Wesley}'s Diaries",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "260--264",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853108",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902668~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kahn:1978:SNR,
  author =       "David Kahn",
  title =        "Short Notices --- Reviews",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "265--266",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853117",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902669~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Morris:1978:HCM,
  author =       "Robert Morris",
  title =        "The {Hagelin} Cipher Machine ({M-209}): Reconstruction
                 of the Internal Settings",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "267--289",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853126",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902670~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kruh:1978:CRC,
  author =       "Louis Kruh",
  title =        "Capsule Reviews for Crypto Buffs",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "290--292",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853135",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902671~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
  xxauthor =     "David Kahn",
}

@Article{Winkel:1978:TTDc,
  author =       "Brian J. Winkel",
  title =        "There and There --- {A} Department",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "293--298",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853144",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902672~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Anonymous:1978:BCc,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "3",
  pages =        "299--300",
  month =        jul,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853153",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:24 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902673~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Blakley:1978:SNT,
  author =       "Bob Blakley and G. R. Blakley",
  title =        "Security of number-theoretic public key cryptosystems
                 against random attack. {I}",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "305--321",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853162",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99 (10A25)",
  MRnumber =     "81g:94041a",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902676~db=all~order=page",
  ZMnumber =     "432.94014",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kruh:1978:WNW,
  author =       "Louis Kruh",
  title =        "What the {Nazis} Were Doing",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "322--323",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853171",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902677~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Oakley:1978:RPC,
  author =       "Howard T. Oakley",
  title =        "The {Riverbank} Publications on Cryptology",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "324--330",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853180",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902678~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kahn:1978:ECO,
  author =       "David Kahn",
  title =        "Extraordinary Codebreakers, Outstanding Family: a
                 Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "331--333",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853199",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902679~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kruh:1978:NCC,
  author =       "Louis Kruh",
  title =        "A Nineteenth Century Challenge Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "334--334",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853207",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902680~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
  xxtitle =      "A 19th-Century Challenge Cipher",
}

@Article{Knight:1978:CCd,
  author =       "H. Gary Knight",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "335--337",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853216",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902681~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kruh:1978:CHIb,
  author =       "Louis Kruh",
  title =        "A Catalog of Historical Interest --- {Part II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "338--349",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853225",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902682~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Callas:1978:ACC,
  author =       "Nicholas P. Callas",
  title =        "An Application of Computers to Cryptology",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "350--364",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853234",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902683~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
  xxtitle =      "An Application of Computers in Cryptography",
}

@Article{Kahn:1978:OWB,
  author =       "David Kahn",
  title =        "One of the Worst --- {A} Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "365--365",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853243",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902684~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
  xxtitle =      "One of the Worst: a Review",
}

@Article{Kruh:1978:RC,
  author =       "Louis Kruh",
  title =        "Rent a Code",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "366--367",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853252",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902685~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Winkel:1978:ALC,
  author =       "Brian J. Winkel",
  title =        "``Action Line'' Challenge",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "368--370",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853261",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902686~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kinnucan:1978:DEG,
  author =       "Paul Kinnucan",
  title =        "Data Encryption Gurus: {Tuchman} and {Meyer}",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "371--381",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853270",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902687~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Winkel:1978:TTDd,
  author =       "Brian J. Winkel",
  title =        "There and There --- {A} Department",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "382--393",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853289",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902688~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Anonymous:1978:BCd,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "2",
  number =       "4",
  pages =        "394--395",
  month =        oct,
  year =         "1978",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117891853298",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:25 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902689~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "II",
}

@Article{Kahn:1979:UC,
  author =       "David Kahn",
  title =        "The {Ultra} Conference",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "1--8",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853738",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:26 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902770~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Hammer:1979:HDT,
  author =       "Carl Hammer",
  title =        "How Did {TJB} Encode {B2}?",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "9--15",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853747",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:26 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902771~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Rohrbach:1979:RDA,
  author =       "Hans Rohrbach",
  title =        "Report on the Decipherment of the {American} Strip
                 Cipher {O-2} by the {German Foreign Office}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "16--26",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853756",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:26 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902772~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
  xxtitle =      "Report on the Decipherment of the {American} Strip
                 Cipher {0-2} by the {German Foreign Office}",
}

@Article{Makar:1979:CSP,
  author =       "Boshra H. Makar",
  title =        "Cryptology at {St. Peter's College}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "27--28",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853765",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:26 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902773~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Blakley:1979:SNTa,
  author =       "Bob Blakley and G. R. Blakley",
  title =        "Security of number theoretic public key cryptosystems
                 against random attack. {II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "29--42",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853774",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99 (10A25)",
  MRnumber =     "81g:94041b",
  bibdate =      "Mon Jun 30 15:38:26 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902774~db=all~order=page",
  ZMnumber =     "432.94015",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Ford:1979:HC,
  author =       "James R. Ford",
  title =        "The {HP-67/97} Cryptograph",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "43--50",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Kruh:1979:XC,
  author =       "Louis Kruh",
  title =        "A Xerograph of a Classic",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "50--50",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853792",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:26 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902776~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Sulzberger:1979:PDA,
  author =       "A. O. {Sulzberger, Jr.}",
  title =        "Papers Disclose {Allies}' Edge in Knowing {German}
                 Codes",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "51--53",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853800",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:26 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902777~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Winkel:1979:SC,
  author =       "Brian J. Winkel",
  title =        "Studies on Cryptology",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "52--53",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Nov 23 09:08:28 MST 1998",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Shulman:1979:SC,
  author =       "David Shulman",
  title =        "A {Sherlockian} Cryptogram",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "54--56",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853819",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:26 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902778~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Winkel:1979:TTa,
  author =       "Brian J. Winkel",
  title =        "There and There",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "57--62",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853828",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:26 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902779~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Anonymous:1979:BCa,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "1",
  pages =        "63--64",
  month =        jan,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853837",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:26 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902780~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Good:1979:EWC,
  author =       "I. J. Good",
  title =        "Early work on computers at {Bletchley Park}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "2",
  pages =        "65--77",
  month =        apr,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853855",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A60 (68-03)",
  MRnumber =     "83d:01045",
  bibdate =      "Mon Jun 30 15:38:27 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902783~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
  xxtitle =      "Early Work on Computers at {Bletchley}",
}

@Article{Kruh:1979:DMH,
  author =       "Louis Kruh",
  title =        "Devices and Machines: The {Hagelin} Cryptographer,
                 Type {C-52}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "2",
  pages =        "78--82",
  month =        apr,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853864",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:27 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902784~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
  xxtitle =      "Devices and Machines: The Hagelin Cryptographer",
}

@Article{Reeds:1979:SCC,
  author =       "James A. Reeds",
  title =        "Solution of Challenge Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "2",
  pages =        "83--95",
  month =        apr,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853873",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:27 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902785~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Kahn:1979:ACB,
  author =       "David Kahn",
  title =        "{``American Codes''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "2",
  pages =        "96--99",
  month =        apr,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853882",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:27 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902786~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Shulman:1979:MTM,
  author =       "David Shulman",
  title =        "The {Macbeth} Test Message",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "2",
  pages =        "100--104",
  month =        apr,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853891",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:27 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902787~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Blakley:1979:SNTb,
  author =       "Bob Blakley and G. R. Blakley",
  title =        "Security of number theoretic public key cryptosystems
                 against random attack. {III}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "2",
  pages =        "105--118",
  month =        apr,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853909",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99 (10A25)",
  MRnumber =     "81g:94041c",
  bibdate =      "Mon Jun 30 15:38:27 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902788~db=all~order=page",
  ZMnumber =     "432.94016",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Kahn:1979:GCC,
  author =       "David Kahn",
  title =        "A {German} Consular Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "2",
  pages =        "119--119",
  month =        apr,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853918",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:27 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902789~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Wilson:1979:LCPa,
  author =       "David Wilson",
  title =        "{Littlewood}'s Cipher: {Part I}: a Challenge",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "2",
  pages =        "120--121",
  month =        apr,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853927",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:27 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902790~db=all~order=page",
  ZMnumber =     "416.94010",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Hardie:1979:BRU,
  author =       "Bradford Hardie",
  title =        "Book Review: {Ultra} Goes to War",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "2",
  pages =        "122--126",
  month =        apr,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853936",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:27 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902791~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Anonymous:1979:BCb,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "2",
  pages =        "127--128",
  month =        apr,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853945",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:27 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902792~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Inman:1979:NPT,
  author =       "Bobby R. Inman",
  title =        "The {NSA} Perspective on Telecommunications Protection
                 in the Nongovernmental Sector",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "129--135",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853954",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902794~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
  xxtitle =      "{NSA} Perspective on Telecommunications Protection",
}

@Article{Mellen:1979:JFB,
  author =       "Greg Mellen",
  title =        "{J. F. Byrne} and the {Chaocipher}: Work in Progress",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "136--154",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853963",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902795~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Rubin:1979:SCB,
  author =       "Frank Rubin",
  title =        "Solving a Cipher Based on Multiple Random Number
                 Streams",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "155--157",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853972",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902796~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Kahn:1979:FIA,
  author =       "David Kahn",
  title =        "The Futility of It All",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "158--165",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853981",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A55",
  MRnumber =     "82f:01050",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902797~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Kruh:1979:DDA,
  author =       "Louis Kruh",
  title =        "The Deadly Double Advertisements: {Pearl Harbor}
                 Warning or Coincidence",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "166--171",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853990",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902798~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
  xxtitle =      "Deadly Double Ad --- {Pearl Harbor} Warning or
                 Coincidence",
}

@Article{Wilson:1979:LCPb,
  author =       "David Wilson",
  title =        "{Littlewood}'s Cipher: {Part II}: a Method of
                 Solution",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "172--176",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854007",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902799~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
  xxtitle =      "{Littlewood}'s Cipher: Solution",
}

@Article{Levine:1979:TMPa,
  author =       "Jack Levine and Michael Willet",
  title =        "The Two-Message Problem in Cipher Text {Autokey}.
                 {Part I}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "177--186",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854016",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99",
  MRnumber =     "81b:94052a",
  MRreviewer =   "James W. Snively, Jr.",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902800~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Yuval:1979:HSR,
  author =       "Gideon Yuval",
  title =        "How to Swindle {Rabin}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "187--189",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854025",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 Theory/crypto.security.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902801~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Kahn:1979:CRR,
  author =       "David Kahn",
  title =        "Classic Revive ??: a Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "190--191",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Nov 23 09:08:28 MST 1998",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Anonymous:1979:SBC,
  author =       "Anonymous",
  title =        "The {Second Beale Cipher Symposium} --- Call for
                 Papers",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "191--191",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854034",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902802~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Anonymous:1979:BCc,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "192--192",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854043",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902803~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Kahn:1979:SCI,
  author =       "David Kahn",
  title =        "The Significance of Codebreaking and Intelligence in
                 {Allied} Strategy and Tactics",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "209--222",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832940",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865273~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Deavours:1979:KT,
  author =       "C. A. Deavours",
  title =        "The Kappa Test",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "223--231",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832959",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865274~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Winkel:1979:WWJ,
  author =       "Brian J. Winkel",
  title =        "Word Ways, a Journal Worth Going Your Way",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "232--234",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832968",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865275~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Reeds:1979:ECP,
  author =       "James Reeds",
  title =        "Entropy Calculations and Particular Methods of
                 Cryptanalysis",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "235--254",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832977",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865276~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Kruh:1979:CE,
  author =       "Louis Kruh",
  title =        "Cipher Equipment",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "255--260",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832986",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865277~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Leighton:1979:EUD,
  author =       "Albert C. Leighton",
  title =        "``The Earliest Use of a Dot Cipher''",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "261--274",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791832995",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865278~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Mint:1979:DDC,
  author =       "{Royal Canadian Mint}",
  title =        "{DPEPE DPJO}: a {Canadian} Coin Piece With a Message",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "275--277",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833002",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865279~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Deavours:1979:KSM,
  author =       "C. A. Deavours",
  title =        "{Kullback's ``Statistical Methods in Cryptanalysis''}
                 --- Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "278--280",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833011",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "See \cite{Kullback:1976:SMC}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865280~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Morris:1979:ANB,
  author =       "Robert Morris and N. J. A. Sloane and A. D. Wyner",
  title =        "Assessment of the {National Bureau of Standards}
                 Proposed {Federal Data Encryption Standard}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "281--291",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833020",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865281~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Anonymous:1979:PFI,
  author =       "Anonymous",
  title =        "Proposed {Federal Information Processing Data
                 Encryption Standard}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "292--306",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833039",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865282~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Anonymous:1979:BCd,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "3",
  pages =        "307--308",
  month =        jul,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117791833048",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a748865283~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Sams:1979:MC,
  author =       "Eric Sams",
  title =        "Musical Cryptography",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "193--201",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854052",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902805~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Rubin:1979:CAD,
  author =       "Frank Rubin",
  title =        "Cryptographic Aspects of Data Compression Codes",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "202--205",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854061",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "See also {\em Comm. ACM}, 19 (November 1976):
                 616--623.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902806~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
  xxtitle =      "Crypto of Data Compression Codes",
  xxtitle =      "Experiments in Text File Compression",
}

@Article{Kruh:1979:CIO,
  author =       "Louis Kruh",
  title =        "{CP-III}: One Time Cypher Pad Manual Encryption
                 Device",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "206--209",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854070",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902807~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Kahn:1979:G,
  author =       "David Kahn",
  title =        "The {Geheimschreiber}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "210--214",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854089",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902808~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Unknown:1979:IGS,
  author =       "Unknown",
  title =        "Interrogation on {German} secret teletypewriters",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "211--214",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Wed Nov 25 16:35:55 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
  xxnote =       "Check pages??. This is probably the same as
                 \cite{Kahn:1979:G}.",
}

@Article{Arnold:1979:CEM,
  author =       "Philip M. Arnold",
  title =        "Ciphers for the Educated Man",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "215--216",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854098",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902809~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Kruh:1979:SN,
  author =       "Louis Kruh",
  title =        "Short Notices",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "217--219",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854106",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902810~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Levine:1979:TMPb,
  author =       "Jack Levine and Michael Willet",
  title =        "The Two-Message Problem in Cipher Text {Autokey}.
                 {Part II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "220--231",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854115",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99",
  MRnumber =     "81b:94052b",
  MRreviewer =   "James W. Snively, Jr.",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902811~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Anonymous:1979:MC,
  author =       "Anonymous",
  title =        "A Musical Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "232--232",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854124",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902812~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Fischer:1979:LRC,
  author =       "Elliot Fischer",
  title =        "Language Redundancy and Cryptanalysis",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "233--235",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854133",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902813~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Kruh:1979:DFT,
  author =       "Louis Kruh",
  title =        "The Day the {Friedmans} Had a Typo in Their Photo",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "236--241",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854142",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902814~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Knight:1979:CC,
  author =       "H. Gary Knight",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "242--242",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854151",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902815~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Arnold:1979:GCB,
  author =       "Philip M. Arnold",
  title =        "A {German} Code Book",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "243--245",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854160",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "See Cryptologia {\bf 4}(1), 1980, pp. 54--55 for a
                 picture of the code book.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902816~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Hardie:1979:TC,
  author =       "Bradford Hardie",
  title =        "A Theory of Cryptography",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "246--247",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854179",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902817~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Winkel:1979:TTb,
  author =       "Brian J. Winkel",
  title =        "There and There",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "248--251",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854188",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902818~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Anonymous:1979:BCe,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "3",
  number =       "4",
  pages =        "252--253",
  month =        oct,
  year =         "1979",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991854197",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:28 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902819~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "III",
}

@Article{Lu:1980:SEP,
  author =       "S. C. Lu and L. N. Lee",
  title =        "A Simple and Effective Public-Key Cryptosystem",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "??",
  pages =        "??--??",
  month =        "????",
  year =         "1980",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Nov 23 09:08:28 MST 1998",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "See also {\em Comsat Technical Review,} {\bf 9},
                 15--24 (1979).",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Schuetz:1980:SSU,
  author =       "Arthur Schuetz",
  title =        "Secret Service Unmasked",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "??",
  pages =        "??--??",
  month =        "????",
  year =         "1980",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Nov 23 09:08:28 MST 1998",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Fagone:1980:SCE,
  author =       "Peter P. Fagone",
  title =        "The Solution of a {Cromwellian} Era Spy Message (Circa
                 1648)",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "1--4",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854735",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902854~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kruh:1980:CDCa,
  author =       "Louis Kruh",
  title =        "Cipher Devices: The {Cryptomatic HC-520}",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "5--14",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854744",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902855~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Golomb:1980:CRG,
  author =       "Solomon W. Golomb",
  title =        "Cryptographic Reflections on the Genetic Code",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "15--19",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854753",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902856~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Richter:1980:NPK,
  author =       "Michael Richter",
  title =        "A Note on Public-Key Cryptosystems",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "20--22",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854762",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902857~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kahn:1980:DTB,
  author =       "David Kahn",
  title =        "{``Deciphered Texts''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "22--22",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854771",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902858~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kruh:1980:MF,
  author =       "Louis Kruh",
  title =        "Memories of {Friedman}",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "23--26",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854780",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902859~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Knight:1980:CCa,
  author =       "H. Gary Knight",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "27--29",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854799",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902860~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Rivest:1980:FBE,
  author =       "Ronald L. Rivest",
  title =        "``Forwards and Backwards'' Encryption",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "30--33",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854807",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Reprinted in \cite[pp. 433--437]{Deavours:1987:CYT}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902861~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kruh:1980:CSC,
  author =       "Louis Kruh",
  title =        "Ciphering System for a {19th Century} Challenge
                 Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "34--35",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854816",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902862~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kahn:1980:PUC,
  author =       "David Kahn",
  title =        "Problems of the Unbreakable Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "36--40",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854825",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902863~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Shulman:1980:ASS,
  author =       "David Shulman",
  title =        "Another Solution to the {Sherlockian} Cryptogram",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "41--41",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854834",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902864~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
  xxtitle =      "{Sherlockian} Cryptogram",
}

@Article{Kahn:1980:ME,
  author =       "David Kahn",
  title =        "The Market for Encryption",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "42--44",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854843",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902865~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Ford:1980:HC,
  author =       "James R. Ford",
  title =        "The {HP-67/97} Cryptograph",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "43--49",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-117991853783",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902775~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kruh:1980:RMC,
  author =       "Louis Kruh",
  title =        "Reminiscences of a Master Cryptologist",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "45--50",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854852",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902866~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
  xxtitle =      "Reminiscences of Master Cryptograph",
}

@Article{Eckler:1980:SCU,
  author =       "A. Ross Eckler",
  title =        "Some Comments on the Use of the {HP 67/97} as a
                 Cryptograph",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "51--53",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854861",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902867~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Winkel:1980:TTa,
  author =       "Brian J. Winkel",
  title =        "There and There",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "54--61",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854870",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902868~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Anonymous:1980:BCa,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "1",
  pages =        "62--63",
  month =        jan,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854889",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:29 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902869~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kahn:1980:IC,
  author =       "David Kahn",
  title =        "Interviews With Cryptologists",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "65--70",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854898",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902872~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Levine:1980:ADIa,
  author =       "Jack Levine and Robert E. Hartwig",
  title =        "Applications of the {Drazin} inverse to the {Hill}
                 cryptographic system. {Part I}",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "71--85",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854906",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99",
  MRnumber =     "81d:94028",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902873~db=all~order=page",
  ZMnumber =     "427.94015",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Shulman:1980:CCC,
  author =       "David Shulman",
  title =        "A Curious Cryptic Composition",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "86--88",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854915",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902874~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Outerbridge:1980:SCC,
  author =       "Richard Outerbridge",
  title =        "Some Cryptographic and Computing Applications of the
                 {Toshiba LC-836MN Memo Note 30} Pocket Calculator",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "89--94",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854924",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902875~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Anonymous:1980:RML,
  author =       "Anonymous",
  title =        "Ready-Made Love Letters",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "95--95",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854933",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902876~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Arnold:1980:AJS,
  author =       "Philip M. Arnold",
  title =        "An apology for {Jacopo Silvestri}",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "96--103",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854942",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A40",
  MRnumber =     "82e:01026",
  MRreviewer =   "Garry J. Tee",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902877~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Raven:1980:MPB,
  author =       "Francis A. Raven",
  title =        "{``Memories of the Pacific''}: Book Reviews",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "104--108",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854951",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902878~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Wall:1980:DSS,
  author =       "Rajendra S. Wall",
  title =        "Decryption of Simple Substitution Cyphers With Word
                 Divisions Using a Content Addressable Memory",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "109--115",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854960",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902879~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Gillogly:1980:BCD,
  author =       "James J. Gillogly",
  title =        "The {Beale Cypher}: a Dissenting Opinion",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "116--119",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854979",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902880~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  remark =       "From
                 \path=http://www.wolfram.com/~lou/puzzles/r.p.answers.framed/cryptologyA01.html=:
                 The Beale ciphers are one of the greatest unsolved
                 puzzles of all time. About 100 years ago, a fellow by
                 the name of Beale supposedly buried two wagons-full of
                 silver-coin filled pots in Bedford County, near
                 Roanoke. There are local rumors about the treasure
                 being buried near Bedford Lake.\par

                 He wrote three encoded letters telling what was buried,
                 where it was buried, and who it belonged to. He
                 entrusted these three letters to a friend and went
                 west. He was never heard from again.\par

                 Several years later, someone examined the letters and
                 was able to break the code used in the second letter.
                 The code used the text from the Declaration of
                 Independence. A number in the letter indicated which
                 word in the document was to be used. The first letter
                 of that word replaced the number. For example, if the
                 first three words of the document were ``We hold these
                 truths'', the number 3 in the letter would represent
                 the letter t.\par

                 One of the remaining letters supposedly contains
                 directions on how to find the treasure. to date, no one
                 has solved the code. It is believed that both of the
                 remaining letters are encoded using either the same
                 document in a different way, or another very public
                 document.",
  romanvolume =  "IV",
}

@Article{Kahn:1980:NAN,
  author =       "David Kahn",
  title =        "Nuggets from the Archives: a Null Code at the {White
                 House}",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "120--121",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854988",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902881~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Anonymous:1980:S,
  author =       "Anonymous",
  title =        "Solutions",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "122--122",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091854997",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902882~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Winkel:1980:SCC,
  author =       "Brian J. Winkel",
  title =        "Solution to Cryptanalysts' Corner {Scotch}
                 Homophonic",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "122--122",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Nov 23 09:08:28 MST 1998",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Winkel:1980:TTb,
  author =       "Brian J. Winkel",
  title =        "There and There",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "123--126",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855004",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902883~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Anonymous:1980:BCb,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "127--128",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855013",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:30 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902884~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kruh:1980:CDT,
  author =       "Louis Kruh",
  title =        "Cipher Devices: {TRS-80} Data Privacy System",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "2",
  pages =        "181--183",
  month =        apr,
  year =         "1980",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Deavours:1980:BCCa,
  author =       "Cipher A. Deavours",
  title =        "The {Black Chamber}: a column. {How} the {British}
                 broke {Enigma}",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "3",
  pages =        "129--132",
  month =        jul,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855022",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A60",
  MRnumber =     "83f:01025",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902886~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Bright:1980:HSI,
  author =       "Herbert S. Bright",
  title =        "High-Speed Indirect Cryption",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "3",
  pages =        "133--139",
  month =        jul,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855031",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902887~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Pady:1980:FCI,
  author =       "Donald S. Pady and Laura S. Kline",
  title =        "Finger counting and the identification of {James VI}'s
                 secret agents",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "3",
  pages =        "140--149",
  month =        jul,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855040",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A45 (10-03)",
  MRnumber =     "83e:01021",
  MRreviewer =   "J. V. Field",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902888~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Levine:1980:ADIb,
  author =       "Jack Levine and Robert E. Hartwig",
  title =        "Applications of the {Drazin} Inverse to the {Hill}
                 Cryptographic System. {Part II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "3",
  pages =        "150--168",
  month =        jul,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855059",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99",
  MRnumber =     "81j:94030",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902889~db=all~order=page",
  ZMnumber =     "444.94012",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Barker:1980:OAC,
  author =       "Wayne G. Barker",
  title =        "Opportunities for the Amateur Cryptanalyst Can Be
                 Anywhere",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "3",
  pages =        "169--172",
  month =        jul,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855068",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902890~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kruh:1980:WDB,
  author =       "Louis Kruh",
  title =        "{``The Work of a Diplomat''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "3",
  pages =        "172--172",
  month =        jul,
  year =         "1980",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Nov 23 09:08:28 MST 1998",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kahn:1980:SCB,
  author =       "David Kahn",
  title =        "Spy Ciphers: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "3",
  pages =        "173--176",
  month =        jul,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855077",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902891~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Knight:1980:CCb,
  author =       "H. Gary Knight",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "3",
  pages =        "177--180",
  month =        jul,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855086",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902892~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kruh:1980:CDCb,
  author =       "Louis Kruh",
  title =        "Cipher Devices: a Column Cryptext {TRS-80} Data
                 Privacy System",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "3",
  pages =        "181--183",
  month =        jul,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855095",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902893~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Cooper:1980:LTG,
  author =       "R. H. Cooper",
  title =        "Linear transformations in {Galois} fields and their
                 application to cryptography",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "3",
  pages =        "184--188",
  month =        jul,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855103",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "12C99 (94B99)",
  MRnumber =     "82d:12012",
  MRreviewer =   "F. J. MacWilliams",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902894~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Anonymous:1980:BCc,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "3",
  pages =        "189--190",
  month =        jul,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855112",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902895~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Ewing:1980:SSW,
  author =       "Sir Alfred Ewing",
  title =        "Some Special War Work: {Part I}",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "193--203",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855121",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902897~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kochanski:1980:RLL,
  author =       "M. J. Kochanski",
  title =        "Remarks on {Lu} and {Lee}'s proposals for a public-key
                 cryptosystem",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "204--207",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855130",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99 (12C05)",
  MRnumber =     "82a:94089",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902898~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Knight:1980:CCc,
  author =       "H. Gary Knight",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "208--212",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855149",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902899~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Nelson:1980:DCC,
  author =       "Jim Nelson",
  title =        "The Development of Commercial Cryptosystem Standards",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "213--224",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855158",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902900~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kruh:1980:CET,
  author =       "Louis Kruh",
  title =        "Cipher Equipment: {TST-1221}",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "225--229",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855167",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902901~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Makar:1980:TC,
  author =       "Boshra H. Makar",
  title =        "Transfinite Cryptography",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "230--237",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855176",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99 (15A99)",
  MRnumber =     "81g:94043",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902902~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kruh:1980:PHR,
  author =       "Louis Kruh",
  title =        "{``Pearl Harbor Revisited''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "237--237",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855185",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "See \cite{Love:1995:PHR}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902903~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kahn:1980:PC,
  author =       "David Kahn",
  title =        "A Professional's Challenge",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "238--239",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855194",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902904~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Deavours:1980:BCCb,
  author =       "Cipher A. Deavours",
  title =        "The {Black Chamber}: a column --- la m{\'e}thode des
                 b{\^a}tons",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "240--247",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855202",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A60",
  MRnumber =     "83h:01053",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902905~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Kruh:1980:RVA,
  author =       "Louis Kruh",
  title =        "A Remarkable View of Ancient {America}: a Book
                 Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "248--249",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855211",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902906~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Anonymous:1980:RRS,
  author =       "Anonymous",
  title =        "Results of Reader Survey",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "250--251",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855220",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902907~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Anonymous:1980:BCd,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "4",
  number =       "4",
  pages =        "252--253",
  month =        oct,
  year =         "1980",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118091855239",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:31 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902908~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IV",
}

@Article{Mellen:1981:GSL,
  author =       "Greg Mellen",
  title =        "Graphic Solution of a Linear Transformation Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "1",
  pages =        "1--19",
  month =        jan,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855733",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:32 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902952~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Kahn:1981:PS,
  author =       "David Kahn",
  title =        "The Public's Secrets",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "1",
  pages =        "20--26",
  month =        jan,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855742",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:32 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902953~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Rivest:1981:SAH,
  author =       "Ronald L. Rivest",
  title =        "Statistical Analysis of the {Hagelin} Cryptograph",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "1",
  pages =        "27--32",
  month =        jan,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855751",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:32 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902954~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Ewing:1981:SSW,
  author =       "Sir Alfred Ewing",
  title =        "Some Special War Work, {Part II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "1",
  pages =        "33--39",
  month =        jan,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855760",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:32 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902955~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Mellen:1981:CCa,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "1",
  pages =        "40--42",
  month =        jan,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855779",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:32 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902956~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Deavours:1981:BCC,
  author =       "Cipher A. Deavours",
  title =        "The {Black Chamber}: a Column Shutting Off the Spigot
                 in 1981",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "1",
  pages =        "43--45",
  month =        jan,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855788",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:32 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902957~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Kruh:1981:CEC,
  author =       "Louis Kruh",
  title =        "Cipher Equipment: {Collins CR-200/220} Data Security
                 Unit",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "1",
  pages =        "46--50",
  month =        jan,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855797",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:32 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902958~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Rubin:1981:DSC,
  author =       "Frank Rubin",
  title =        "Decrypting a Stream Cipher Based on {J--K}
                 Flip-Flops",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "1",
  pages =        "51--57",
  month =        jan,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855805",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:32 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Originally published in IEEE Transactions on
                 Computers. C-28(7): 483--487, 1979. Reprinted in
                 \cite[283--293]{Deavours:1987:CYT}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902959~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Kruh:1981:UCB,
  author =       "Louis Kruh",
  title =        "{``From the Ultra Conference''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "1",
  pages =        "58--58",
  month =        jan,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855814",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:32 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902960~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Fischer:1981:TMC,
  author =       "Elliot Fischer",
  title =        "A Theoretical Measure of Cryptographic Performance",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "1",
  pages =        "59--62",
  month =        jan,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855823",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99 (68C99)",
  MRnumber =     "82i:94033",
  bibdate =      "Mon Jun 30 15:38:32 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Reprinted in \cite[pp. 426--426]{Deavours:1987:CYT}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902961~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
  xxauthor =     "Elliott Fischer",
}

@Article{Anonymous:1981:BCa,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "1",
  pages =        "63--63",
  month =        jan,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855832",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:32 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902962~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Kahn:1981:GSC,
  author =       "David Kahn",
  title =        "{German} Spy Cryptograms",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "2",
  pages =        "65--66",
  month =        apr,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855841",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902965~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Hartwig:1981:ADIa,
  author =       "Robert E. Hartwig and Jack Levine",
  title =        "Applications of the {Drazin} inverse to the {Hill}
                 cryptographic system. {Part III}",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "2",
  pages =        "67--77",
  month =        apr,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855850",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99",
  MRnumber =     "82j:94022a",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902966~db=all~order=page",
  ZMnumber =     "491.94015",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Kallis:1981:CGC,
  author =       "Stephen A. {Kallis, Jr.}",
  title =        "The {Code-O-Graph} Cipher Disks",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "2",
  pages =        "78--83",
  month =        apr,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855869",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902967~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Sturges:1981:HRP,
  author =       "Gerald Sturges",
  title =        "The {House Report on Public Cryptography}",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "2",
  pages =        "84--93",
  month =        apr,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855878",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902968~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Costas:1981:HHC,
  author =       "John P. Costas",
  title =        "The Hand-Held Calculator As a Cryptographic Machine",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "2",
  pages =        "94--117",
  month =        apr,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855887",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902969~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Lembart:1981:PCS,
  author =       "Lee Lembart",
  title =        "The {Public Cryptography Study Group}: {U.S.} and
                 Mathematicians in Code Dispute",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "2",
  pages =        "118--122",
  month =        apr,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855896",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902970~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Mellen:1981:CCb,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "2",
  pages =        "123--123",
  month =        apr,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855904",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902971~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Kruh:1981:CPB,
  author =       "Louis Kruh",
  title =        "{``A Code Problem''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "2",
  pages =        "124--125",
  month =        apr,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855913",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902972~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Anonymous:1981:BCb,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "2",
  pages =        "126--126",
  month =        apr,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855922",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902973~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Anonymous:1981:RPC,
  author =       "Anonymous",
  title =        "Report of the {Public Cryptography Study Group}",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "3",
  pages =        "130--142",
  month =        jul,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855931",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902975~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Davida:1981:CAR,
  author =       "George I. Davida",
  title =        "The Case Against Restraints on Non-Governmental
                 Research in Cryptography",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "3",
  pages =        "143--148",
  month =        jul,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855940",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902976~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Arnold:1981:PBC,
  author =       "Philip M. Arnold",
  title =        "{Palatino} and {Bibliander} on ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "3",
  pages =        "149--154",
  month =        jul,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855959",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A40",
  MRnumber =     "84j:01027",
  MRreviewer =   "M. Folkerts",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902977~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
  xxtitle =      "{Palatino} and {Biblianber} on Ciphers",
  xxtitle =      "{Palatina} and {Bibliander} on ciphers",
}

@Article{Kruh:1981:RRD,
  author =       "Louis Kruh",
  title =        "{``Reward for Reading and Deciphering''}: a Book
                 Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "3",
  pages =        "155--157",
  month =        jul,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855968",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902978~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Fischer:1981:MCP,
  author =       "Elliot Fischer",
  title =        "Measuring Cryptographic Performance With Production
                 Processes",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "3",
  pages =        "158--162",
  month =        jul,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855977",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902979~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Buck:1981:SHB,
  author =       "R. Creighton Buck",
  title =        "{Sherlock Holmes} in {Babylon}",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "3",
  pages =        "163--173",
  month =        jul,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855986",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A17 (10A30)",
  MRnumber =     "82i:01005",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902980~db=all~order=page",
  ZMnumber =     "502.01002",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Kruh:1981:CME,
  author =       "Louis Kruh",
  title =        "Cipher Machine Exhibit at the {Smithsonian
                 Institution}",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "3",
  pages =        "174--174",
  month =        jul,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191855995",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902981~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
  xxtitle =      "Cipher Machine Exhibit at {Smithsonian Institution}",
}

@Article{Stuerzinger:1981:C,
  author =       "Oskar Stuerzinger",
  title =        "The {A-22} Cryptograph",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "3",
  pages =        "175--183",
  month =        jul,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191856002",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902982~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Winkel:1981:TT,
  author =       "Brian J. Winkel",
  title =        "There and There",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "3",
  pages =        "184--190",
  month =        jul,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191856011",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902983~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Anonymous:1981:BCc,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "3",
  pages =        "191--191",
  month =        jul,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191856020",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:33 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902984~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Kahn:1981:GJB,
  author =       "David Kahn",
  title =        "The Genesis of the {Jefferson\slash Bazeries} Cipher
                 Device",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "193--208",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Kruh:1981:GJB,
  author =       "Louis Kruh",
  title =        "The Genesis of the {Jefferson\slash Bazeries} Cipher
                 Device",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "193--208",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191856039",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:34 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902986~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
  xxtitle =      "The Genesis of the {Jefferson\slash Bazeries} Cipher
                 Devices",
}

@Article{Kruh:1981:UGV,
  author =       "Louis Kruh",
  title =        "{``A User's Guide in Voice and Data Communications
                 Protection''}: Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "208--212",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191856048",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:34 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902987~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Klingler:1981:LE,
  author =       "L. Klingler",
  title =        "Letter to the {Editor}",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "209--210",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Costas:1981:LE,
  author =       "J. Costas",
  title =        "Letter to the {Editor}",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "210--212",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Hartwig:1981:ADIb,
  author =       "Robert E. Hartwig and Jack Levine",
  title =        "Applications of the {Drazin} Inverse to the {Hill}
                 Cryptographic System. {Part IV}",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "213--228",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191856057",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99",
  MRnumber =     "82j:94022b",
  bibdate =      "Mon Jun 30 15:38:34 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902988~db=all~order=page",
  ZMnumber =     "491.94016",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Groth:1981:SWE,
  author =       "William Groth",
  title =        "Secret Writing Exhibit",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "229--230",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191856066",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:34 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902989~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Hammer:1981:HOH,
  author =       "Carl Hammer",
  title =        "Higher-Order Homophonic Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "231--242",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191856075",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:34 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902990~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Wolf:1981:NTD,
  author =       "Jack Keil Wolf",
  title =        "{``Number Theory in Digital Signal Processing''}: a
                 Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "243--246",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191856084",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:34 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "See \cite{McClellan:1979:NTD}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902991~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Deavours:1981:ISC,
  author =       "C. A. Deavours",
  title =        "Interactive Solution of Columnar Transposition
                 Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "247--251",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191856093",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:34 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902992~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Anonymous:1981:BCd,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "252--253",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118191856101",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:34 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902993~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Unknown:1981:LE,
  author =       "Unknown",
  title =        "Letters to the {Editor}",
  journal =      j-CRYPTOLOGIA,
  volume =       "5",
  number =       "4",
  pages =        "??--??",
  month =        oct,
  year =         "1981",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "V",
}

@Article{Rejewski:1982:MSE,
  author =       "Marian Rejewski",
  title =        "Mathematical Solution of the {Enigma} Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "1--18",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856731",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A60 (20-03)",
  MRnumber =     "84c:01049",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Translated from the Polish by Christopher Kasparek.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903044~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kasparek:1982:MMR,
  author =       "Christopher Kasparek and Richard A. Woytak",
  title =        "In memoriam {Marian Rejewski}",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "19--25",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856740",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A70",
  MRnumber =     "84c:01057",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903045~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kahn:1982:WGL,
  author =       "David Kahn",
  title =        "Why {Germany} Lost the Code War",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "26--31",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856759",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903046~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kozaczuk:1982:ES,
  author =       "Wldyslaw Kozaczuk",
  title =        "{Enigma} Solved",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "32--33",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856768",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903047~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Deavours:1982:BC,
  author =       "C. A. Deavours",
  title =        "The {Black Chamber}",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "34--37",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856777",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903048~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kruh:1982:WMB,
  author =       "Louis Kruh",
  title =        "{`Wilderness of Mirrors''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "38--38",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856786",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "See \cite{Martin:2003:WMI}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903049~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kruh:1982:BSM,
  author =       "Louis Kruh",
  title =        "{``Beale Society Material''}: Book Reviews",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "39--39",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856795",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903050~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Anderson:1982:IR,
  author =       "Ralph V. Anderson",
  title =        "If {I} Remember",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "40--44",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856803",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903051~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Mellen:1982:CCa,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "45--46",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856812",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903052~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kahn:1982:CPI,
  author =       "David Kahn",
  title =        "{Churchill} Pleads for the Intercepts",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "47--49",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856821",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903053~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Woytak:1982:CMR,
  author =       "Richard A. Woytak",
  title =        "A Conversation With {Marian Rejewski}",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "50--60",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856830",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903054~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Hardie:1982:UES,
  author =       "Bradford Hardie",
  title =        "{``Unraveling the Enigma Story''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "61--64",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856849",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903055~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Bundy:1982:DHB,
  author =       "William P. Bundy",
  title =        "{``From the Depths to the Heights''}: Book Reviews",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "65--74",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856858",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903056~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Rejewski:1982:RAB,
  author =       "Marian Rejewski",
  title =        "Remarks on Appendix 1 to {``British Intelligence in
                 the Second World War''} by {F. H. Hinsley}",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "75--83",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856867",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903057~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kahn:1982:CCB,
  author =       "David Kahn",
  title =        "{``Computer Cryptography''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "84--84",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856876",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903058~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kruh:1982:NCB,
  author =       "Louis Kruh",
  title =        "The {Navy} Cipher Box {Mark II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "85--93",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856885",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903059~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Anonymous:1982:BCa,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "1",
  pages =        "94--95",
  month =        jan,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856894",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903060~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Barclay:1982:UMS,
  author =       "Mel L. Barclay and Joshua S. Barclay",
  title =        "Use of Microcomputer System for Medical Record
                 Encryption and Decryption Using a Sequential
                 Pseudo-Random Key",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "2",
  pages =        "97--107",
  month =        apr,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856902",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903063~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Fischer:1982:PHT,
  author =       "Elliot Fischer",
  title =        "The Performance of {Hellman}'s Time-Memory Trade-Off
                 Against Some Rotor Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "2",
  pages =        "108--114",
  month =        apr,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856911",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903064~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kahn:1982:NSH,
  author =       "David Kahn",
  title =        "A New Source for Historians: {Yardley}'s Seized
                 Manuscript",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "2",
  pages =        "115--119",
  month =        apr,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856920",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903065~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kahn:1982:MGJ,
  author =       "David Kahn",
  title =        "In Memoriam: {Georges-Jean Painvin}",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "2",
  pages =        "120--127",
  month =        apr,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856939",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903066~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Sloane:1982:ECCa,
  author =       "N. J. A. Sloane",
  title =        "Error-Correcting Codes and Cryptography. {Part I}",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "2",
  pages =        "128--153",
  month =        apr,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856948",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94-02 (12C99 94B20)",
  MRnumber =     "84j:94003a",
  MRreviewer =   "J. S. Joel",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Originally published in {\em The Mathematical
                 Gardner}, D. A. Klarner (editor), Prindle, Weber \&
                 Schmidt, Boston, MA, 1981, pp. 346--382.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903067~db=all~order=page",
  ZMnumber =     "486.94002",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kruh:1982:BRB,
  author =       "Louis Kruh",
  title =        "Book Reviews: a Book With a Book Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "2",
  pages =        "154--168",
  month =        apr,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856957",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903068~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Mellen:1982:CCb,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "2",
  pages =        "169--174",
  month =        apr,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856966",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903069~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Deavours:1982:KCP,
  author =       "C. A. Deavours",
  title =        "{Konheim's ``Cryptography --- A Primer''}: a Book
                 Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "2",
  pages =        "175--176",
  month =        apr,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856975",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "See \cite{Konheim:1981:CP}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903070~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kaiserling:1982:S,
  author =       "M. C. W. Kaiserling",
  title =        "{Sirius}",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "2",
  pages =        "177--178",
  month =        apr,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856984",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903071~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Winkel:1982:TTC,
  author =       "Brian J. Winkel",
  title =        "There and There --- {A} Column",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "2",
  pages =        "179--188",
  month =        apr,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291856993",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903072~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Anonymous:1982:BCb,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "2",
  pages =        "189--190",
  month =        apr,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857000",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:35 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903073~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Tucker:1982:RPNa,
  author =       "Dundas P. Tucker",
  title =        "Rhapsody in {Purple}: a New History of {Pearl Harbor}
                 --- {I}",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "3",
  pages =        "193--228",
  month =        jul,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857019",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:36 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903075~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Berkovits:1982:FS,
  author =       "Shimshon Berkovits",
  title =        "Factoring via superencryption",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "3",
  pages =        "229--237",
  month =        jul,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857028",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94B99",
  MRnumber =     "83g:94034",
  bibdate =      "Mon Jun 30 15:38:36 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 Theory/crypto.security.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903076~db=all~order=page",
  ZMnumber =     "503.94020",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kruh:1982:MCD,
  author =       "Louis Kruh",
  title =        "The Mystery of {Colonel Decius Wadsworth}'s Cipher
                 Device",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "3",
  pages =        "238--247",
  month =        jul,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857037",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:36 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903077~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Mellen:1982:CCc,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "3",
  pages =        "248--252",
  month =        jul,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857046",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:36 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903078~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Morris:1982:CFU,
  author =       "Robert H. Morris",
  title =        "Cryptographic Features of the {UNIX} Operating
                 System",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "3",
  pages =        "253--257",
  month =        jul,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857055",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:36 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.cs.bell-labs.com/~dmr/crypt.html;
                 http://www.informaworld.com/smpp/content~content=a741903079~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
  xxauthor =     "Richard Outerbridge",
}

@Article{Sloane:1982:ECCb,
  author =       "N. J. A. Sloane",
  title =        "Error-Correcting Codes and Cryptography. {Part II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "3",
  pages =        "258--278",
  month =        jul,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857064",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94-02 (12C99 94B20)",
  MRnumber =     "84j:94003b",
  MRreviewer =   "J. S. Joel",
  bibdate =      "Mon Jun 30 15:38:36 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Originally published in {\em The Mathematical
                 Gardner}, D. A. Klarner (editor), Prindle, Weber \&
                 Schmidt, Boston, MA, 1981, pp. 346--382.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903080~db=all~order=page",
  ZMnumber =     "486.94002",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Miller:1982:COA,
  author =       "Donald V. Miller",
  title =        "Ciphertext Only Attack on the {Merkle--Hellman}
                 Public-Key System under Broadcast Situations",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "3",
  pages =        "279--281",
  month =        jul,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857073",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:36 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903081~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kaiserling:1982:SSM,
  author =       "M. C. W. Kaiserling",
  title =        "Solution to {Sirius} Music Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "3",
  pages =        "282--282",
  month =        jul,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857082",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:36 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903082~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Deavours:1982:HK,
  author =       "C. A. Deavours",
  title =        "{Helmich} and the {KL-7}",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "3",
  pages =        "283--284",
  month =        jul,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857091",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:36 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903083~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Anonymous:1982:BCc,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "3",
  pages =        "285--286",
  month =        jul,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857109",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:36 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903084~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Davies:1982:SHT,
  author =       "Donald W. Davies",
  title =        "The {Siemens and Halske T52E} Cipher Machine",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "4",
  pages =        "289--308",
  month =        oct,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857118",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903086~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Mellen:1982:CCd,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "4",
  pages =        "309--311",
  month =        oct,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857127",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903087~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Akritas:1982:AVT,
  author =       "Alkiviadis G. Akritas",
  title =        "Application of {Vincent's Theorem} in Cryptography or
                 One-Time Pads Made Practical",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "4",
  pages =        "312--318",
  month =        oct,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857136",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903088~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Vahle:1982:BPR,
  author =       "M. O. Vahle and L. F. Tolendino",
  title =        "Breaking a Pseudo Random Number Based Cryptographic
                 Algorithm",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "4",
  pages =        "319--328",
  month =        oct,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857145",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903089~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Meijer:1982:DSS,
  author =       "Henk Meijer and Selim Akl",
  title =        "Digital Signature Schemes",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "4",
  pages =        "329--338",
  month =        oct,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857154",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903090~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Outerbridge:1982:PC,
  author =       "Richard Outerbridge",
  title =        "A Pedagogical Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "4",
  pages =        "339--345",
  month =        oct,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857163",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "This paper is the winner of the Cryptologia First
                 Annual Undergraduate Paper Competition in Cryptology.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903091~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Tucker:1982:RPNb,
  author =       "Dundas P. Tucker",
  title =        "Rhapsody in {Purple}: a New History of {Pearl Harbor}:
                 Part Two of Two",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "4",
  pages =        "346--367",
  month =        oct,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857172",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903092~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kallis:1982:CGC,
  author =       "Stephen A. Kallis",
  title =        "A Child's Garden of Cryptography",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "4",
  pages =        "368--377",
  month =        oct,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857181",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a757776453~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kruh:1982:BPB,
  author =       "Louis Kruh",
  title =        "A Basic Probe of the {Beale} Cipher as a
                 Bamboozlement",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "4",
  pages =        "378--382",
  month =        oct,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857190",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903094~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Anonymous:1982:BCd,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "6",
  number =       "4",
  pages =        "383--384",
  month =        oct,
  year =         "1982",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118291857208",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903095~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VI",
}

@Article{Kahn:1983:CCR,
  author =       "David Kahn",
  title =        "The {Crypto '82} Conference, a Report on [the]
                 Conference",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "1",
  pages =        "1--5",
  month =        jan,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857739",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902490~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
  xxtitle =      "The {Crypto '82 Conference, Santa Barbara}: a Report
                 on a Conference",
}

@Article{Mellen:1983:CCa,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "1",
  pages =        "6--11",
  month =        jan,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857748",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902491~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Floyd:1983:ABC,
  author =       "Denis R. Floyd",
  title =        "Annotated bibliography in conventional and public key
                 cryptography",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "1",
  pages =        "12--24",
  month =        jan,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857757",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "00A15 (94Bxx)",
  MRnumber =     "85a:00011",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902492~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Morris:1983:FCC,
  author =       "S. Brent Morris",
  title =        "Fraternal Cryptography: Cryptographic Practices of
                 {American} Fraternal Organizations",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "1",
  pages =        "27--36",
  month =        jan,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857766",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902493~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Jurgensen:1983:LRU,
  author =       "H. Jurgensen",
  title =        "Language Redundancy and the Unicity Point",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "1",
  pages =        "37--48",
  month =        jan,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857775",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902494~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Fak:1983:CPF,
  author =       "Viiveke Fak",
  title =        "Cryptographic Protection of Files in An Automated
                 Office System",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "1",
  pages =        "49--62",
  month =        jan,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857784",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902495~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Makar:1983:ACC,
  author =       "Boshra H. Makar",
  title =        "Application of a certain class of infinite matrices to
                 the {Hill} cryptographic system",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "1",
  pages =        "63--78",
  month =        jan,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857793",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "85a:94024",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902496~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Dyer:1983:PMB,
  author =       "Thomas H. Dyer",
  title =        "{``The Power of Magic''}: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "1",
  pages =        "79--82",
  month =        jan,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857801",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902497~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Kruh:1983:CEC,
  author =       "Louis Kruh",
  title =        "Cipher Equipment: the Cryptographic Unit {CSI-10}",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "1",
  pages =        "83--88",
  month =        jan,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857810",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902498~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Fischer:1983:UHC,
  author =       "Elliot Fischer",
  title =        "Uncaging the {Hagelin} Cryptograph",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "1",
  pages =        "89--92",
  month =        jan,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857829",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902499~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Anonymous:1983:BCa,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "1",
  pages =        "93--94",
  month =        jan,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857838",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:37 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902500~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Lundstrom:1983:FRI,
  author =       "John B. Lundstrom",
  title =        "A Failure of Radio Intelligence: An Episode in the
                 {Battle of the Coral Sea}",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "2",
  pages =        "97--118",
  month =        apr,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857847",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:38 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902503~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Clarke:1983:ASR,
  author =       "Brig. Gen. Carter W. Clarke",
  title =        "From the Archives: Statement for Record of
                 Participation of {Brig. Gen. Carter W. Clarke, GSC} in
                 the Transmittal of Letters from {Gen. George C.
                 Marshall} to {Gov. Thomas E. Dewey}, the Latter Part of
                 {September}, 1944",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "2",
  pages =        "119--131",
  month =        apr,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857856",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:38 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902504~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
  xxtitle =      "{Gen. Marshall}'s Request of {Gov. Thomas E. Dewey}",
}

@Article{Bratzel:1983:ACL,
  author =       "John F. Bratzel and Leslie B. Rout",
  title =        "{Abwehr} Ciphers in {Latin America}",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "2",
  pages =        "132--144",
  month =        apr,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857865",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:38 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902505~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Kruh:1983:TC,
  author =       "Louis Kruh and C. A. Deavours",
  title =        "The {Typex} Cryptograph",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "2",
  pages =        "145--166",
  month =        apr,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857874",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:38 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902506~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Mellen:1983:CCb,
  author =       "Greg Mellen",
  title =        "Cryptanalysis' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "2",
  pages =        "167--169",
  month =        apr,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857883",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:38 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902507~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Ndam:1983:PRD,
  author =       "Babacar Alassane Ndam and Amadou Sarr",
  title =        "The Problem of Reciprocity in a {Delastelle} Digraphic
                 Substitution",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "2",
  pages =        "170--179",
  month =        apr,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857892",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:38 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902508~db=all~order=page",
  ZMnumber =     "518.94013",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
  xxauthor =     "Babacar Alassane Ndaw and Amadou Sarr",
}

@Article{Simmons:1983:WPP,
  author =       "Gustavus J. Simmons",
  title =        "A ``Weak'' Privacy Protocol Using the {RSA} Crypto
                 Algorithm",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "2",
  pages =        "180--182",
  month =        apr,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857900",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:38 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902509~db=all~order=page",
  ZMnumber =     "537.94013",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Meijer:1983:RDS,
  author =       "Henk Meijer and Selim Akl",
  title =        "Remarks on a Digital Signature Scheme",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "2",
  pages =        "183--186",
  month =        apr,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857919",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:38 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902510~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Deavours:1983:VAP,
  author =       "C. A. Deavours",
  title =        "The View From Across the Pond: An Interview With the
                 {Geneva Management Group}",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "2",
  pages =        "187--190",
  month =        apr,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857928",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:38 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902511~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Anonymous:1983:BCb,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "2",
  pages =        "191--192",
  month =        apr,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857937",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:38 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902512~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Strasser:1983:NCD,
  author =       "Gerhard F. Strasser",
  title =        "The Noblest Cryptologist: {Duke August the Younger of
                 Brunswick--Luneburg (Gustavus Selenus)} and his
                 Cryptological Activities",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "3",
  pages =        "193--217",
  month =        jul,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857946",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A45",
  MRnumber =     "84m:01018",
  MRreviewer =   "M. Kline",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902514~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Bennett:1983:UPS,
  author =       "Donald H. Bennett",
  title =        "An Unsolved Puzzle Solved",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "3",
  pages =        "218--234",
  month =        jul,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857955",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902515~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Davies:1983:EMS,
  author =       "Donald W. Davies",
  title =        "The Early Models of the {Siemens and Halske T52}
                 Cipher Machine",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "3",
  pages =        "235--253",
  month =        jul,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857964",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902516~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Kahn:1983:ER,
  author =       "David Kahn",
  title =        "{Eurocrypt 83}: a Report",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "3",
  pages =        "254--256",
  month =        jul,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857973",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902517~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Mueller-Schloer:1983:GCE,
  author =       "Christian Mueller-Schloer",
  title =        "{DES}-Generated Checksums for Electronic Signatures",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "3",
  pages =        "257--273",
  month =        jul,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857982",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902518~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Mellen:1983:CCc,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "3",
  pages =        "274--277",
  month =        jul,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391857991",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902519~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Kruh:1983:BMA,
  author =       "Louis Kruh and Greg Mellen",
  title =        "Book, Movie, Article and Game Reviews",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "3",
  pages =        "278--286",
  month =        jul,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858008",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902520~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Anonymous:1983:BCc,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "3",
  pages =        "287--288",
  month =        jul,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858017",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902521~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Kruh:1983:HUG,
  author =       "Louis Kruh",
  title =        "How to Use the {German Enigma} Cipher Machine: a
                 Photographic Essay",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "4",
  pages =        "291--296",
  month =        oct,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858026",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902523~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
  xxtitle =      "{German Enigma} Cipher Machine: a Photographic Essay",
  xxtitle =      "How to Use the {German Enigma} Cipher Machine. A
                 Photographic Essay",
}

@Article{Leighton:1983:SKB,
  author =       "Albert C. Leighton and Stephen M. Matyas",
  title =        "The Search for the Key Book to {Nicholas Trist}'s Book
                 Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "4",
  pages =        "297--314",
  month =        oct,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858035",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902524~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Anonymous:1983:AEI,
  author =       "Anonymous",
  title =        "From the archives: Examples of Intelligence Obtained
                 from Cryptanalysis, {1 August 1946}",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "4",
  pages =        "315--326",
  month =        oct,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858044",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902525~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Winkler:1983:ACG,
  author =       "Peter Winkler",
  title =        "The Advent of Cryptology in the Game of Bridge",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "4",
  pages =        "327--332",
  month =        oct,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858053",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902526~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Stuerzinger:1983:BC,
  author =       "Oskar Stuerzinger",
  title =        "The {B-21} Cryptograph",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "4",
  pages =        "333--346",
  month =        oct,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858062",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902527~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Brandstrom:1983:PKC,
  author =       "Hugo Br{\"a}ndstr{\"o}m",
  title =        "A public-key cryptosystem based upon equations over a
                 finite field",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "4",
  pages =        "347--358",
  month =        oct,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858071",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902528~db=all~order=page",
  ZMnumber =     "537.94014",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Wolf:1983:RMB,
  author =       "Daniel Wolf",
  title =        "{ROTERM}: a Microprocessor Based Cipher Terminal
                 System",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "4",
  pages =        "359--370",
  month =        oct,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858080",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902529~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Mellen:1983:CCd,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "4",
  pages =        "371--374",
  month =        oct,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858099",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902530~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Kruh:1983:BR,
  author =       "Louis Kruh",
  title =        "Book Reviews",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "4",
  pages =        "375--379",
  month =        oct,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858107",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902531~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Anonymous:1983:BCd,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "7",
  number =       "4",
  pages =        "380--381",
  month =        oct,
  year =         "1983",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118391858116",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:39 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902532~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VII",
}

@Article{Levine:1984:UCP,
  author =       "J. Levine",
  title =        "{U.S.} Cryptographic Patents 1861--1981",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "??",
  pages =        "??--??",
  month =        "????",
  year =         "1984",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Simmons:1984:SVU,
  author =       "Gustavus J. Simmons",
  title =        "A System for Verifying User Identity and Authorization
                 at the Point-Of Sale or Access",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "1--21",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858737",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902567~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Sorkin:1984:LCA,
  author =       "Arthur Sorkin",
  title =        "{LUCIFER}, a Cryptographic Algorithm",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "22--42",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858746",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 Theory/crypto.security.bib",
  note =         "See also erratum, Cryptologia {\bf 7}, 1978, p. 118",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902568~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:RTC,
  author =       "Louis Kruh and Greg Mellen",
  title =        "Reviews of Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "43--53",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858755",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902569~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:WDI,
  author =       "Louis Kruh",
  title =        "Who Did It?",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "54--54",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858764",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902570~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Mellen:1984:CCa,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "55--57",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858773",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902571~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kahn:1984:CMI,
  author =       "David Kahn",
  title =        "Cipher Machine Inventor --- {Boris Hagelin} Dies",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "60--61",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858782",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902572~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
  xxtitle =      "Cipher Machine Inventor --- {Boris Hagelin}",
}

@Article{Yardley:1984:AAC,
  author =       "Herbert O. Yardley",
  title =        "From the archives: Achievements of {Cipher Bureau
                 MI-8} During the {First World War}. Documents by {Major
                 Herbert O. Yardley} Prepared Under the Direction of the
                 {Chief Signal Officer, 25 May 1945, SPSIS-1. Signal
                 Security Agency. Washington, DC}",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "62--74",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858791",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902573~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:BFI,
  author =       "Louis Kruh",
  title =        "Because of the {Freedom of Information Act (FOIA)}",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "75--77",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858809",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902574~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:CD,
  author =       "Louis Kruh",
  title =        "Cipher Devices",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "78--79",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858818",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902575~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Gillogly:1984:MA,
  author =       "James J. Gillogly",
  title =        "The Mysterious Autocryptograph",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "79--81",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858827",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902576~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Davies:1984:A,
  author =       "Donald W. Davies",
  title =        "The {Autocryptograph}",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "82--92",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858836",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902577~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Anonymous:1984:BCa,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "1",
  pages =        "93--94",
  month =        jan,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858845",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:40 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902578~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Retter:1984:CMM,
  author =       "Charles T. Retter",
  title =        "Cryptanalysis of a {Maclaren--Marsaglia} System",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "97--108",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858854",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "See also letters and responses, Cryptologia {\bf 8},
                 1984, pp. 374--378.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902581~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Anonymous:1984:PSO,
  author =       "Anonymous",
  title =        "Project on Secrecy and Openness in Scientific and
                 Technical Communication",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "109--111",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858863",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902582~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:HHC,
  author =       "Louis Kruh",
  title =        "Hand-Held Crypto Device {SEC-36}",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "112--114",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858872",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902583~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Davies:1984:SHC,
  author =       "Donald W. Davies",
  title =        "{Sidney Hole}'s Cryptographic Machine",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "115--126",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858881",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902584~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:LR,
  author =       "Louis Kruh",
  title =        "Literature Reviews",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "127--131",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858890",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902585~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Tilt:1984:KTM,
  author =       "Borge Tilt",
  title =        "On {Kullback}'s $ \chi $-tests for matching and
                 non-matching multinomial distributions",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "132--141",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858908",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "62F03",
  MRnumber =     "85k:62048",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902586~db=all~order=page;
                 http://www.informaworld.com/smpp/content~content=a757776821~db=all~order=page",
  ZMnumber =     "545.62021",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Carroll:1984:SPM,
  author =       "John M. Carroll and Pierre G. Laurin",
  title =        "Software Protection for Microcomputers",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "142--160",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858917",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902587~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
  xxtitle =      "Software Protection for Micros",
}

@Article{Levine:1984:CPC,
  author =       "Jack Levine",
  title =        "Corrections for Published Copy of {United States}
                 Cryptographic Patents: 1861--1981",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "161--162",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858926",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902588~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:SRC,
  author =       "Louis Kruh",
  title =        "The {Slidex RT} Code",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "163--172",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858935",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902589~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Erskine:1984:BIV,
  author =       "Ralph Erskine",
  title =        "{``British Intelligence --- Volume II''} --- Book
                 Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "173--180",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858944",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902590~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Anonymous:1984:ACC,
  author =       "Anonymous",
  title =        "From the Archives: Codes and Ciphers for Combined
                 Air-Amphibian Operations",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "181--186",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858953",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902591~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  remark =       "Coordinating cipher material for the Allied invasion
                 of France.",
  romanvolume =  "VIII",
}

@Article{Shulman:1984:UCD,
  author =       "David Shulman",
  title =        "An Unknown Cipher Disk",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "187--190",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858962",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902592~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Anonymous:1984:BS,
  author =       "Anonymous",
  title =        "Biographical Sketches",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "2",
  pages =        "191--192",
  month =        apr,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858971",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902593~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Hammant:1984:ORN,
  author =       "Thomas R. Hammant",
  title =        "The Origins of {Russian Navy} Communications
                 Intelligence",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "193--202",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858980",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902595~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
  xxtitle =      "Origins of {Russian Navy Intelligence}",
}

@Article{Guelker:1984:CWM,
  author =       "Francis Guelker",
  title =        "A Cryptographer's War Memories",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "203--207",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491858999",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902596~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Weller:1984:RAJ,
  author =       "Robert Weller",
  title =        "{Rear Admiral Joseph N. Wenger USN (Ret)} and the
                 {Naval Cryptologic Museum}",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "208--234",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859006",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902597~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Arnold:1984:VRC,
  author =       "Philip M. Arnold",
  title =        "{``A View of Renaissance Cryptography''} --- a Book
                 Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "235--241",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859015",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902598~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Deavours:1984:RSA,
  author =       "C. A. Deavours",
  title =        "Reflections on the ``State of the Art''",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "242--245",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859024",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902599~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:CLa,
  author =       "Louis Kruh",
  title =        "Cryptology and the Law",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "246--248",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859033",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902600~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:CE,
  author =       "Louis Kruh",
  title =        "Cipher Equipment",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "249--249",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859042",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902601~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Davies:1984:SPS,
  author =       "Donald W. Davies",
  title =        "{Sir Percy Scott}'s Cypher",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "250--252",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859051",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902602~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
  xxtitle =      "{Sir Percy Scott}'s Cipher",
}

@Article{Delaurentis:1984:FWC,
  author =       "John M. Delaurentis",
  title =        "A further weakness in the {Common Modulus Protocol}
                 for the {RSA} cryptoalgorithm",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "253--259",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859060",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (11T71 68P25)",
  MRnumber =     "85m:94025",
  MRreviewer =   "James G. Dunham",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902603~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Carroll:1984:RMK,
  author =       "John M. Carroll",
  title =        "The Resurrection of Multiple-Key Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "262--265",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859079",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902604~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Blakley:1984:ACS,
  author =       "G. R. Blakley",
  title =        "{AAAS} Crypto Sessions Proceedings: Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "266--269",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859088",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902605~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Mellen:1984:CCb,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "270--275",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859097",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902606~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:CET,
  author =       "Louis Kruh",
  title =        "Cipher Equipment: {Tst 3336} and {Tst 9761}",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "278--284",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859105",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902607~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Jueneman:1984:IAB,
  author =       "Robert R. Jueneman",
  title =        "{IACR} Announces Bulletin Board Service",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "285--286",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859114",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902608~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Anonymous:1984:BCb,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "3",
  pages =        "287--288",
  month =        jul,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859123",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:41 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902609~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:HC,
  author =       "Louis Kruh",
  title =        "The Heraldry of Cryptology",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "289--301",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859132",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:42 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902611~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Landsverk:1984:CRI,
  author =       "O. G. Landsverk",
  title =        "Cryptography in Runic Inscriptions",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "302--319",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859141",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A35 (94A60)",
  MRnumber =     "86e:01014",
  MRreviewer =   "J. S. Joel",
  bibdate =      "Mon Jun 30 15:38:42 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "See remark \cite{Johnsen:2001:CRI}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902612~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Mellen:1984:CCc,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "320--325",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859150",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:42 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902613~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:CLb,
  author =       "Louis Kruh",
  title =        "Cryptology and the Law",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "326--331",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859169",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:42 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902614~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Erskine:1984:BTE,
  author =       "Ralph Erskine",
  title =        "{{\booktitle{Alan Turing: The Enigma}}} --- Book
                 Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "332--336",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859178",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:42 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902615~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kullback:1984:LB,
  author =       "Solomon Kullback",
  title =        "Looking Back",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "337--342",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859187",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:42 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902616~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Cooper:1984:GKA,
  author =       "Rodney Cooper and Wayne Patterson",
  title =        "A generalization of the knapsack algorithm using
                 {Galois} fields",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "343--347",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859196",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (11Y05)",
  MRnumber =     "86i:94038",
  bibdate =      "Mon Jun 30 15:38:42 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902617~db=all~order=page",
  ZMnumber =     "553.94007",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Anderson:1984:FVS,
  author =       "Roland Anderson",
  title =        "Finding Vowels in Simple Substitution Ciphers by
                 Computer",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "348--359",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859204",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:42 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902618~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Deavours:1984:CSS,
  author =       "C. A. Deavours and Brian J. Winkel",
  title =        "{``Cryptanalysis of Shift Stream Generated Stream
                 Cipher Systems''}: Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "360--363",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859213",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:42 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "See \cite{Barker:1984:CSR}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902619~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kruh:1984:TTR,
  author =       "Louis Kruh",
  title =        "There and There --- Reviews and News",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "364--373",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859222",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:42 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902620~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Anonymous:1984:BCc,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "379--380",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118491859231",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:42 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902621~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Unknown:1984:ATE,
  author =       "Unknown",
  title =        "{Alan Turing}: The {Enigma}",
  journal =      j-CRYPTOLOGIA,
  volume =       "8",
  number =       "4",
  pages =        "??--??",
  month =        oct,
  year =         "1984",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "ftp://ftp.math.utah.edu/pub/bibnet/authors/a/turing-alan-mathison.bib;
                 http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "VIII",
}

@Article{Kahn:1985:AAB,
  author =       "David Kahn",
  title =        "The Annotated {The American Black Chamber}",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "1",
  pages =        "1--37",
  month =        jan,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859735",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902691~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Kruh:1985:AVS,
  author =       "Louis Kruh",
  title =        "An Armchair View of the {Smithsonian Institution}
                 Cipher Machine Exhibit",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "1",
  pages =        "38--51",
  month =        jan,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859744",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902692~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Erskine:1985:ESS,
  author =       "Ralph Erskine",
  title =        "An Early Success Story",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "1",
  pages =        "52--54",
  month =        jan,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859753",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902693~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Gillogly:1985:FPM,
  author =       "James J. Gillogly",
  title =        "Fast Pattern Matching for Word Lists",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "1",
  pages =        "55--62",
  month =        jan,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859762",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902694~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Franksen:1985:EW,
  author =       "Ole Immanuel Franksen",
  title =        "Expert Witness",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "1",
  pages =        "63--69",
  month =        jan,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859771",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902695~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Mellen:1985:CCa,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "1",
  pages =        "70--74",
  month =        jan,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859780",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902696~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Scott:1985:WOE,
  author =       "Robert Scott",
  title =        "Wide-Open Encryption Design Offers Flexible
                 Implementations",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "1",
  pages =        "75--91",
  month =        jan,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859799",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902697~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Murray:1985:CB,
  author =       "Master Sgt. Charles Murray",
  title =        "The Crypt Bug",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "1",
  pages =        "92--92",
  month =        jan,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859807",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902698~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Anonymous:1985:BCa,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "1",
  pages =        "95--96",
  month =        jan,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859816",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902699~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Michener:1985:GRC,
  author =       "John R. Michener",
  title =        "The ``Generalized Rotor'' Cryptographic Operator and
                 Some of Its Applications",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "2",
  pages =        "97--113",
  month =        apr,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859825",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902702~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Retter:1985:KSA,
  author =       "Charles T. Retter",
  title =        "A Key-Search Attack on {Maclaren--Marsaglia} Systems",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "2",
  pages =        "114--130",
  month =        apr,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859834",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902703~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Mitchell:1985:PSC,
  author =       "Douglas W. Mitchell",
  title =        "A Polygraphic Substitution Cipher Based on Multiple
                 Interlocking Applications of Playfair",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "2",
  pages =        "131--139",
  month =        apr,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859843",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902704~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Varadharajan:1985:ERC,
  author =       "V. Varadharajan and R. Odoni",
  title =        "Extension of {RSA} cryptosystems to matrix rings",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "2",
  pages =        "140--153",
  month =        apr,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859852",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "86g:94039",
  MRreviewer =   "N. J. A. Sloane",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902705~db=all~order=page",
  ZMnumber =     "652.94013",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Kruh:1985:CE,
  author =       "Louis Kruh",
  title =        "Cipher Equipment",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "2",
  pages =        "154--154",
  month =        apr,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859861",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902706~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Davies:1985:CWC,
  author =       "Donald W. Davies",
  title =        "{Charles Wheatstone}'s Cryptograph and {Pletts}'
                 Cipher Machine",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "2",
  pages =        "155--160",
  month =        apr,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859870",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902707~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Mellen:1985:CCb,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "2",
  pages =        "161--166",
  month =        apr,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859889",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902708~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Price:1985:CCS,
  author =       "Robert Price",
  title =        "A conversation with {Claude Shannon}: one man's
                 approach to problem solving",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "2",
  pages =        "167--175",
  month =        apr,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859898",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A99",
  MRnumber =     "86k:01053",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902709~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Kruh:1985:RL,
  author =       "Louis Kruh",
  title =        "Reviews of the Literature",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "2",
  pages =        "176--186",
  month =        apr,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859906",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902710~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Anonymous:1985:BCb,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "2",
  pages =        "188--189",
  month =        apr,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859915",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:43 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902711~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Michener:1985:AGR,
  author =       "John R. Michener",
  title =        "Application of the Generalized Rotor Cryptographic
                 Operator in the Construction of
                 Substitution-Permutation Network Block Codes",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "3",
  pages =        "193--201",
  month =        jun,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859924",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:44 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902713~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Kruskal:1985:TCS,
  author =       "Joseph R. Kruskal",
  title =        "A Trigraph Cipher With a Short Key for Hand Use",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "3",
  pages =        "202--222",
  month =        jun,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859933",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "806 443",
  bibdate =      "Mon Jun 30 15:38:44 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902714~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Williams:1985:SPK,
  author =       "H. C. Williams",
  title =        "Some Public-Key Crypto-Functions as Intractable as
                 Factorization",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "3",
  pages =        "223--237",
  month =        jun,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859942",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "86m:94033",
  bibdate =      "Mon Jun 30 15:38:44 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902715~db=all~order=page",
  ZMnumber =     "652.94012",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Outerbridge:1985:DLA,
  author =       "Richard Outerbridge",
  title =        "{DEA} and {Lucifer} Available on {Compuserve}",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "3",
  pages =        "238--239",
  month =        jun,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859951",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:44 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902716~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Kranz:1985:EHR,
  author =       "Fred W. Kranz",
  title =        "Early History of {Riverbank Acoustical Laboratories}",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "3",
  pages =        "240--246",
  month =        jun,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859960",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:44 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902717~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Winkel:1985:TTC,
  author =       "Brian J. Winkel",
  title =        "There and There --- {A} Column of News",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "3",
  pages =        "247--251",
  month =        jun,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859979",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:44 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902718~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Kruh:1985:KLC,
  author =       "Louis Kruh",
  title =        "The {Kryha Liliput} Ciphering Machine",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "3",
  pages =        "252--261",
  month =        jun,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859988",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:44 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902719~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Erskine:1985:BIV,
  author =       "Ralph Erskine",
  title =        "{British Intelligence --- Volume 3, Part 1} --- Book
                 Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "3",
  pages =        "262--272",
  month =        jun,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591859997",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:44 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902720~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Kruh:1985:CLIa,
  author =       "Louis Kruh",
  title =        "Cryptology and the Law --- {III}",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "3",
  pages =        "273--285",
  month =        jun,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860003",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:44 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902721~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Anonymous:1985:BCc,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "3",
  pages =        "287--288",
  month =        jun,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860012",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:44 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902722~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Mellen:1985:CCc,
  author =       "Greg Mellen",
  title =        "Cryptanalysts' Corner",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "289--293",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860021",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902724~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Kruh:1985:RTC,
  author =       "Louis Kruh and Ralph Erskine",
  title =        "Review of Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "294--305",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860030",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902725~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Anonymous:1985:FOS,
  author =       "Anonymous",
  title =        "Forty One and Strong: {Arlington Hall Station}",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "306--310",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860049",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902726~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Kruh:1985:ACS,
  author =       "Louis Kruh",
  title =        "Automatic Communications With the {SIGABA} and the
                 {M-294}",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "311--315",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860058",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902727~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Erskine:1985:EPC,
  author =       "Ralph Erskine",
  title =        "{``Enigma and the Polish Contribution''}: Book
                 Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "316--323",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860067",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902728~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Kruh:1985:ECS,
  author =       "Louis Kruh",
  title =        "Early communications security in the {U.S. Navy}",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "324--331",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860076",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94-03 (01A60 94A60)",
  MRnumber =     "87a:94001",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902729~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Atha:1985:BCH,
  author =       "Robert I. Atha",
  title =        "Bombe! ``{I} Could Hardly Believe It!''",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "332--336",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860085",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902730~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Ephron:1985:ACA,
  author =       "Henry D. Ephron",
  title =        "An {American} Cryptanalyst in {Australia}",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "337--340",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860094",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902731~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Kruh:1985:CLIb,
  author =       "Louis Kruh",
  title =        "Cryptology and the Law --- {IV}",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "348--350",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860102",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902732~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{August:1985:ITA,
  author =       "David August",
  title =        "Information Theoretic Approach to Secure {LSFR}
                 Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "351--359",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860111",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902733~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Yagisawa:1985:NMR,
  author =       "Masahiro Yagisawa",
  title =        "A New Method for Realizing Public-Key Cryptosystem",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "360--371, 380",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860120",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "380. 94A60 (11T71)",
  MRnumber =     "86j:94053",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902734~db=all~order=page",
  ZMnumber =     "651.94004",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
  xxpages =      "360--372",
}

@Article{Atkinson:1985:COL,
  author =       "Russell Atkinson",
  title =        "Ciphers in Oriental Languages",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "373--380",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860139",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902735~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Anonymous:1985:BCd,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "9",
  number =       "4",
  pages =        "381--382",
  month =        oct,
  year =         "1985",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118591860148",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902736~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "IX",
}

@Article{Winkel:1986:LOE,
  author =       "Brian J. Winkel",
  title =        "Letter From One of the {Editors}",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "1--1",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860732",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902910~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kruh:1986:CPC,
  author =       "Louis Kruh",
  title =        "The Control of Public Cryptography and Freedom of
                 Speech --- {A} Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "2--9",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860741",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902911~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Anonymous:1986:BCa,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "9--9",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860750",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902912~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Anderson:1986:IMR,
  author =       "Roland Anderson",
  title =        "Improving the Machine Recognition of Vowels in Simple
                 Substitution Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "10--22",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860769",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902913~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Barlow:1986:MSA,
  author =       "Mike Barlow",
  title =        "A Machine Solution of the {AMSCO} Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "23--33",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860778",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902914~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Weierud:1986:MSB,
  author =       "Frode Weierud",
  title =        "Machine Secrets: a Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "34--37",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860787",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902915~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kahn:1986:SC,
  author =       "David Kahn",
  title =        "Secrets of the Codebreakers",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "38--41",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860796",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902916~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kruh:1986:ART,
  author =       "Louis Kruh",
  title =        "Announcements and Reviews of Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "42--45",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860804",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902917~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Deavours:1986:EIC,
  author =       "C. A. Deavours",
  title =        "Elle a de l'intelligence et de la conversation",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "47--49",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860813",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902918~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Erskine:1986:AGC,
  author =       "Ralph Erskine",
  title =        "From the Archives: {GC} and {CS} Mobilizes {'Men of
                 the Professor Type'}",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "50--59",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860822",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a782216711~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kruh:1986:CSEa,
  author =       "Louis Kruh",
  title =        "{18th Century} Shorthand Expert Needed",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "60--62",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860831",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902920~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kruh:1986:CE,
  author =       "Louis Kruh",
  title =        "Cipher Equipment",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "63--63",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860840",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902921~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Davies:1986:CEB,
  author =       "Donald W. Davies",
  title =        "Cipher Equipment: {Bolton}'s Cypher Wheel",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "1",
  pages =        "64--64",
  month =        jan,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860859",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:45 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902922~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kruh:1986:TM,
  author =       "Louis Kruh",
  title =        "The {Truman Memorandum}",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "2",
  pages =        "65--74",
  month =        apr,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860868",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:46 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902925~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Desnoyers:1986:CEPa,
  author =       "Charles-Hubert Desnoyers",
  title =        "Cryptanalytic Essay --- {Part I}: Solution of Problem
                 No. 166 Published in Elementary Cryptanalysis",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "2",
  pages =        "75--95",
  month =        apr,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860877",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:46 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902926~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Roggeman:1986:RAC,
  author =       "Yves Roggeman",
  title =        "Remarks on the auto-correlation function of binary
                 periodic sequences",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "2",
  pages =        "96--100",
  month =        apr,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860886",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "87e:94031",
  bibdate =      "Mon Jun 30 15:38:46 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902927~db=all~order=page",
  ZMnumber =     "652.94011",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kruh:1986:CLVa,
  author =       "Louis Kruh",
  title =        "Cryptology and the Law --- {V}",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "2",
  pages =        "101--107",
  month =        apr,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860895",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:46 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902928~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kruh:1986:RTCa,
  author =       "Louis Kruh",
  title =        "Reviews of Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "2",
  pages =        "110--122",
  month =        apr,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860903",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:46 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902929~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Minow:1986:NT,
  author =       "Martin Minow",
  title =        "No Title",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "2",
  pages =        "123--125",
  month =        apr,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860912",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:46 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902930~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kruh:1986:CSEb,
  author =       "Louis Kruh",
  title =        "{18th Century} Shorthand Expert Needed (Re-Run)",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "2",
  pages =        "126--127",
  month =        apr,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860921",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:46 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902931~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Anonymous:1986:BCb,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "2",
  pages =        "128--128",
  month =        apr,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860930",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:46 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902932~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Unknown:1986:DTS,
  author =       "Unknown",
  title =        "Has {Dr. Thouless} Survived Death?",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "1986",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kruh:1986:CLVb,
  author =       "Louis Kruh",
  title =        "Cryptology and the Law --- {VI}",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "3",
  pages =        "129--133",
  month =        jul,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860949",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902934~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Bloch:1986:EDD,
  author =       "Gilbert Bloch and Ralph Erskine",
  title =        "{Enigma}: the Dropping of the Double Encipherment",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "3",
  pages =        "134--141",
  month =        jul,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860958",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902935~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Outerbridge:1986:SDC,
  author =       "Richard Outerbridge",
  title =        "Some Design Criteria for {Feistel}-Cipher Key
                 Schedules",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "3",
  pages =        "142--156",
  month =        jul,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860967",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902936~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Desnoyers:1986:CEPb,
  author =       "Charles-Hubert Desnoyers",
  title =        "Cryptanalytic Essay --- {Part II}: Solution of Problem
                 No. 166 Published in Elementary Cryptanalysis",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "3",
  pages =        "158--183",
  month =        jul,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860976",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902937~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kruh:1986:RTCb,
  author =       "Louis Kruh",
  title =        "Reviews of Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "3",
  pages =        "184--191",
  month =        jul,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860985",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902938~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Anonymous:1986:BCc,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "3",
  pages =        "192--192",
  month =        jul,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691860994",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902939~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Carroll:1986:ACS,
  author =       "John M. Carroll and Steve Martin",
  title =        "The Automated Cryptanalysis of Substitution Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "4",
  pages =        "193--209",
  month =        oct,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691861001",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902941~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Barlow:1986:VMV,
  author =       "Michael Barlow",
  title =        "The {Voynich Manuscript} --- By {Voynich}?",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "4",
  pages =        "210--216",
  month =        oct,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691861010",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902942~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Rubin:1986:FKP,
  author =       "Frank Rubin",
  title =        "Foiling the Known-Plaintext Attack",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "4",
  pages =        "217--223",
  month =        oct,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691861029",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902943~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Anonymous:1986:FIP,
  author =       "Anonymous",
  title =        "Free {IBM-PC} Encryption Software",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "4",
  pages =        "224--224",
  month =        oct,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691861038",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902944~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Outerbridge:1986:CCC,
  author =       "Richard Outerbridge",
  title =        "{Cadbury} Code Confidential",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "4",
  pages =        "225--226",
  month =        oct,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691861047",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902945~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Erskine:1986:LPH,
  author =       "Ralph Erskine",
  title =        "{``A Link With Pearl Harbor?''} Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "4",
  pages =        "227--229",
  month =        oct,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691861056",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902946~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Mache:1986:G,
  author =       "Wolfgang W. Mache",
  title =        "{Geheimschreiber}",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "4",
  pages =        "230--242",
  month =        oct,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691861065",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902947~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Deavours:1986:AMG,
  author =       "Cipher A. Deavours and Louis Kruh",
  title =        "Appendix: Mechanics of the {German} Telecipher
                 Machine",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "4",
  pages =        "243--247",
  month =        oct,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691861074",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902948~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kruh:1986:CLVc,
  author =       "Louis Kruh",
  title =        "Cryptology and the Law --- {VII}",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "4",
  pages =        "248--253",
  month =        oct,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691861083",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902949~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Anonymous:1986:BCd,
  author =       "Anonymous",
  title =        "Biographies of Contributors",
  journal =      j-CRYPTOLOGIA,
  volume =       "10",
  number =       "4",
  pages =        "254--255",
  month =        oct,
  year =         "1986",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118691861092",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:47 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902950~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "X",
}

@Article{Kochanski:1987:SDI,
  author =       "Martin Kochanski",
  title =        "A Survey of Data Insecurity Packages",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "1",
  pages =        "1--15",
  month =        jan,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861730",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "68P25 (94A60)",
  MRnumber =     "874 439",
  bibdate =      "Mon Jun 30 15:38:48 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902995~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Winternitz:1987:CKA,
  author =       "Robert Winternitz and Martin Hellman",
  title =        "Chosen-Key Attacks on a Block Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "1",
  pages =        "16--20",
  month =        jan,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861749",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:48 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902996~db=all~order=page",
  ZMnumber =     "654.94008",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Levitin:1987:ECT,
  author =       "Samuel M. Levitin",
  title =        "Equivalence Classes: Toward More Efficient Search",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "1",
  pages =        "21--28",
  month =        jan,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861758",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:48 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902997~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Schick:1987:S,
  author =       "Joseph S. Schick",
  title =        "With the {849th SIS, 1942--45}",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "1",
  pages =        "29--39",
  month =        jan,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861767",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:48 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902998~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Hardie:1987:PPC,
  author =       "Bradford Hardie",
  title =        "The {POTUS}-Prime Connection: Two Notes (1)
                 {Roosevelt}, {Churchill}, and Me",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "1",
  pages =        "40--43",
  month =        jan,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861776",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:48 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902999~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Anonymous:1987:HCM,
  author =       "Anonymous",
  title =        "{(2) History of Converter M-134-C Top Secret Chapter
                 XVIII. the Zero Machine}",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "1",
  pages =        "44--46",
  month =        jan,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861785",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:48 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903000~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Deavours:1987:CCK,
  author =       "C. A. Deavours",
  title =        "Cryptology Courses at {Kean College}",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "1",
  pages =        "47--50",
  month =        jan,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861794",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:48 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903001~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Kruh:1987:RTCa,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "1",
  pages =        "51--63",
  month =        jan,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861802",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:48 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903002~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Bundy:1987:SMW,
  author =       "William P. Bundy",
  title =        "Some of My Wartime Experiences",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "65--77",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861811",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903005~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Beesly:1987:WWT,
  author =       "Patrick Beesly",
  title =        "Who Was the Third Man at {Pyry}?",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "78--80",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861820",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903006~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Kahn:1987:CBF,
  author =       "David Kahn",
  title =        "The Codebreaker Behind the Footlights",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "81--84",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861839",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A70",
  MRnumber =     "888 009",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903007~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Gouaz:1987:NHS,
  author =       "Linda Y. Gouaz",
  title =        "Needles and Haystacks: the Search for {Ultra} in the
                 1930's (An Excerpt)",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "85--92",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861848",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903008~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Gillogly:1987:BEC,
  author =       "James J. Gillogly",
  title =        "Breaking An {Eighteenth Century} Shorthand System",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "93--98",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861857",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903009~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Anonymous:1987:CCC,
  author =       "Anonymous",
  title =        "{Cadbury} Caper or Cipher?",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "99--101",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861866",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903010~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Rubin:1987:FEK,
  author =       "Frank Rubin",
  title =        "Foiling An Exhaustive Key-Search Attack",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "102--107",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861875",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 Theory/crypto.security.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903011~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Michener:1987:UCN,
  author =       "John R. Michener",
  title =        "The Use of Complete, Nonlinear, Block Codes for
                 Nonlinear, Noninvertible Mixing of Pseudorandom
                 Sequences",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "108--111",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861884",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903012~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Richardson:1987:DES,
  author =       "Robert M. Richardson",
  title =        "{Digital Encryption Standard Users Group}",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "112--114",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861893",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903013~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Cheatham:1987:MDS,
  author =       "Tom Cheatham",
  title =        "Message Decryption and Spelling Checkers",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "115--118",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861901",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903014~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "security",
  romanvolume =  "XI",
  subject =      "E.3 Data, DATA ENCRYPTION \\ D.4.6 Software, OPERATING
                 SYSTEMS, Security and Protection, Cryptographic
                 controls",
}

@Article{Kruh:1987:OCD,
  author =       "Louis Kruh",
  title =        "An Obscure Cryptographic Device",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "119--122",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861910",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903015~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Kruh:1987:RTCb,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "2",
  pages =        "123--128",
  month =        apr,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861929",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903016~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Whitaker:1987:BPB,
  author =       "Paul Whitaker and Louis Kruh",
  title =        "From {Bletchley Park} to {Berchtesgaden}",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "3",
  pages =        "129--141",
  month =        jul,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861938",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903018~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Bloch:1987:EBUa,
  author =       "Gilbert Bloch and C. A. Deavours",
  title =        "{ENIGMA} Before {ULTRA}: {Polish} Work and the
                 {French} Contribution",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "3",
  pages =        "142--155",
  month =        jul,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861947",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Translated by C. A. Deavours. Reprinted in \cite[pp.
                 373--386]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903019~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Kruh:1987:SVF,
  author =       "Louis Kruh",
  title =        "The Shortsighted View of a Foresighted {Admiral}",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "3",
  pages =        "156--159",
  month =        jul,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861956",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903020~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Anonymous:1987:AMN,
  author =       "Anonymous",
  title =        "From the Archives: Memorandum on Non-Military Codes
                 and Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "3",
  pages =        "160--161",
  month =        jul,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861965",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903021~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Deavours:1987:SBT,
  author =       "C. A. Deavours",
  title =        "Sois Belle et Tais-Toi",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "3",
  pages =        "162--165",
  month =        jul,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861974",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903022~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Michener:1987:AKD,
  author =       "John R. Michener",
  title =        "The Application of Key Dependent and Variable Rotor
                 Sets to Generalized Rotor Cryptographic Systems",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "3",
  pages =        "166--171",
  month =        jul,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861983",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903023~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Sancho:1987:EMD,
  author =       "Justo Sancho",
  title =        "Enumeration of multivariable decipherable {Boolean}
                 functions",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "3",
  pages =        "172--181",
  month =        jul,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791861992",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "88f:94032",
  MRreviewer =   "D. Lieberman",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903024~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Kak:1987:SIS,
  author =       "Subhash C. Kak",
  title =        "The Study of the {Indus} Script General
                 Considerations",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "3",
  pages =        "182--191",
  month =        jul,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791862009",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:49 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903025~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Carroll:1987:ACP,
  author =       "John M. Carroll and Lynda Robbins",
  title =        "The Automated Cryptanalysis of Polyalphabetic
                 Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "4",
  pages =        "193--205",
  month =        oct,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791862018",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:50 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903027~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Bennett:1987:AEA,
  author =       "John Bennett",
  title =        "Analysis of the Encryption Algorithm Used in the
                 {WordPerfect} Word Processing Program",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "4",
  pages =        "206--210",
  month =        oct,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791862027",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:50 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903028~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Levine:1987:SFC,
  author =       "Jack Levine and Richard Chandler",
  title =        "Some further cryptographic applications of permutation
                 polynomials",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "4",
  pages =        "211--218",
  month =        oct,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791862036",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "11T71 (94A60)",
  MRnumber =     "88m:11108",
  MRreviewer =   "Bernard J. M. Smeets",
  bibdate =      "Mon Jun 30 15:38:50 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903029~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Clarke:1987:GCC,
  author =       "William F. Clarke",
  title =        "{Government Code and Cypher School}: Its Foundation
                 and Development With Special Reference to Its {Naval}
                 Side",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "4",
  pages =        "219--226",
  month =        oct,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791862045",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:50 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903030~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Bloch:1987:EBUb,
  author =       "Gilbert Bloch and C. A. Deavours",
  title =        "{Enigma} Before {Ultra}: the {Polish} Success and
                 Check (1933--1939)",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "4",
  pages =        "227--234",
  month =        oct,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791862054",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:50 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Translated by C. A. Deavours. Reprinted in \cite[pp.
                 387--394]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903031~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
  xxtitle =      "{Enigma} Before {Ultra}: {Polish} Success and Check
                 (1933--1939)",
}

@Article{Erskine:1987:NEM,
  author =       "Ralph Erskine and Frode Weierud",
  title =        "{Naval Enigma}: {M4} and Its Rotors",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "4",
  pages =        "235--244",
  month =        oct,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791862063",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:50 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903032~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Kruh:1987:BRC,
  author =       "Louis Kruh",
  title =        "{British Rockex} Cipher Machines",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "4",
  pages =        "245--247",
  month =        oct,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791862072",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:50 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903033~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Kruh:1987:RTCc,
  author =       "Louis Kruh and Ralph Erskine",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "11",
  number =       "4",
  pages =        "248--253",
  month =        oct,
  year =         "1987",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118791862081",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:50 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903034~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XI",
}

@Article{Barlow:1988:VS,
  author =       "Michael Barlow",
  title =        "{Voynich} Solved?",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "??",
  pages =        "??--??",
  month =        "????",
  year =         "1988",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Pearson:1988:CCC,
  author =       "Peter K. Pearson",
  title =        "Cryptanalysis of the {Ciarcia Circuit Cellar Data
                 Encryptor}",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "1",
  pages =        "1--10",
  month =        jan,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862738",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903097~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Hammer:1988:SOH,
  author =       "Carl Hammer",
  title =        "Second Order Homophonic Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "1",
  pages =        "11--20",
  month =        jan,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862747",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903098~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Michener:1988:RDE,
  author =       "John Michener",
  title =        "Recent Developments in Electronic Circuitry and Their
                 Effects on the Implementation of
                 Substitution-Permutation Block Codes",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "1",
  pages =        "21--24",
  month =        jan,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862756",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903099~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Rubin:1988:CUP,
  author =       "Frank Rubin",
  title =        "The cryptographic uses of {Post} tag systems",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "1",
  pages =        "25--33",
  month =        jan,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862765",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (03D03 11T71)",
  MRnumber =     "89e:94010",
  MRreviewer =   "Kaicheng Lu",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903100~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Kruh:1988:RTCa,
  author =       "Louis Kruh and Ralph Erskine and Michael Barlow",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "1",
  pages =        "37--51",
  month =        jan,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862774",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903101~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Clarke:1988:YB,
  author =       "William F. Clarke",
  title =        "The Years Between",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "1",
  pages =        "52--58",
  month =        jan,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862783",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903102~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Erskine:1988:ATD,
  author =       "Ralph Erskine",
  title =        "From the Archives: {Tunny} Decrypts",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "1",
  pages =        "59--61",
  month =        jan,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862792",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903103~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Arnold:1988:HYG,
  author =       "Jonathan P. Arnold",
  title =        "{Herbert O. Yardley}, Gangbuster",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "1",
  pages =        "62--64",
  month =        jan,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862800",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903104~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Kruh:1988:SBC,
  author =       "Louis Kruh",
  title =        "{Stimson}, the {Black Chamber}, and the {``Gentlemen's
                 Mail''} Quote",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "2",
  pages =        "65--89",
  month =        apr,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862819",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903107~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Clarke:1988:BP,
  author =       "William F. Clarke",
  title =        "{Bletchley Park} 1941--1945",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "2",
  pages =        "90--97",
  month =        apr,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862828",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Reprinted in \cite[pp. 227--234]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903108~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Erskine:1988:AUB,
  author =       "Ralph Erskine",
  title =        "From the Archives: {U}-Boat {HF WT} Signalling",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "2",
  pages =        "98--106",
  month =        apr,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862837",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903109~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Wayner:1988:RRC,
  author =       "Peter Wayner",
  title =        "A Redundancy Reducing Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "2",
  pages =        "107--112",
  month =        apr,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862846",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903110~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Kak:1988:AC,
  author =       "Subhash Kak",
  title =        "The {{\=A}ryabha{\d{t}}a} cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "2",
  pages =        "113--117",
  month =        apr,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862855",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "11T71 (01A32)",
  MRnumber =     "89f:11165",
  MRreviewer =   "Hans K. Kaiser",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903111~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Kruh:1988:RTCb,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "2",
  pages =        "118--127",
  month =        apr,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862864",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:51 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903112~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Kak:1988:FAI,
  author =       "Subhash C. Kak",
  title =        "A Frequency Analysis of the {Indus} Script",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "3",
  pages =        "129--143",
  month =        jul,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862873",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:52 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903114~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Ellison:1988:SHM,
  author =       "Carl M. Ellison",
  title =        "A solution of the {Hebern} messages",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "3",
  pages =        "144--158",
  month =        jul,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862882",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "89g:94024",
  bibdate =      "Mon Jun 30 15:38:52 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903115~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Jamnig:1988:SRC,
  author =       "Peter Jamnig",
  title =        "Securing the {RSA}-cryptosystem against cycling
                 attacks",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "3",
  pages =        "159--164",
  month =        jul,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862891",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (11T71 68P25)",
  MRnumber =     "89k:94047",
  MRreviewer =   "Thomas Beth",
  bibdate =      "Mon Jun 30 15:38:52 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903116~db=all~order=page",
  ZMnumber =     "654.94009",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Kochanski:1988:ADI,
  author =       "Martin Kochanski",
  title =        "Another Data Insecurity Package",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "3",
  pages =        "165--173 (or 165--177??)",
  month =        jul,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862909",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:52 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903117~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Clarke:1988:PWO,
  author =       "William F. Clarke",
  title =        "Post War Organization",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "3",
  pages =        "174--177",
  month =        jul,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862918",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:52 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903118~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Bloch:1988:EAU,
  author =       "Gilbert Bloch and C. A. Deavours",
  title =        "{Enigma} Avant {Ultra}, {Enigma} Before {Ultra}",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "3",
  pages =        "178--184",
  month =        jul,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862927",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:52 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Translated by C. A. Deavours. Reprinted in \cite[pp.
                 395--401]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903119~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Kruh:1988:RTCc,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "3",
  pages =        "185--192",
  month =        jul,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862936",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:52 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741903120~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Carroll:1988:UBD,
  author =       "John M. Carroll and Lynda E. Robbins",
  title =        "Using binary derivatives to test an enhancement of
                 {DES}",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "4",
  pages =        "193--208",
  month =        oct,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862945",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "89i:94029",
  MRreviewer =   "Yvo Desmedt",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741908083~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Miller:1988:CTR,
  author =       "Donald V. Miller",
  title =        "Cryptanalysis of a Two Round Version of {DES} Using
                 Index Implications",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "4",
  pages =        "209--219",
  month =        oct,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862954",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741908084~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Matthews:1988:EMF,
  author =       "Robert Matthews",
  title =        "An Empirical Method for Finding the Keylength of
                 Periodic Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "4",
  pages =        "220--224",
  month =        oct,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862963",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741908085~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Kurosawa:1988:PKC,
  author =       "Kaoru Kurosawa and Toshiya Ito and Masashi Takeuchi",
  title =        "Public key cryptosystem using a reciprocal number with
                 the same intractability as factoring a large number",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "4",
  pages =        "225--233",
  month =        oct,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862972",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (11T71 11Y16)",
  MRnumber =     "89k:94049",
  MRreviewer =   "Zhen Fu Cao",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741908086~db=all~order=page",
  ZMnumber =     "654.94010",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Polis:1988:ENA,
  author =       "Richard I. Polis",
  title =        "{European} Needs and Attitudes Towards Information
                 Security",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "4",
  pages =        "234--239",
  month =        oct,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862981",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741908087~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Kruh:1988:PMC,
  author =       "Louis Kruh and Johnnie Murray",
  title =        "A Pulp Magazine Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "4",
  pages =        "240--240",
  month =        oct,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891862990",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741908088~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Kruh:1988:BCB,
  author =       "Louis Kruh",
  title =        "The {Beale Cipher} As a Bamboozlement --- {Part II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "4",
  pages =        "241--246",
  month =        oct,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891863007",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741908089~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Deavours:1988:ISB,
  author =       "C. A. Deavours",
  title =        "Interactive Solution of {Beaufort} Enciphered Text
                 With Overlapping Keys",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "4",
  pages =        "247--255",
  month =        oct,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891863016",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741908090~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Barlow:1988:MWB,
  author =       "Mike Barlow",
  title =        "A Mathematical Word Block Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "4",
  pages =        "256--264",
  month =        oct,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891863025",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741908091~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Kruh:1988:RTCd,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "12",
  number =       "4",
  pages =        "265--269",
  month =        oct,
  year =         "1988",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118891863034",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741908092~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XII",
}

@Article{Levine:1989:HCS,
  author =       "Jack Levine and Richard Chandler",
  title =        "The {Hill} cryptographic system with unknown cipher
                 alphabet but known plaintext",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "1",
  pages =        "1--28",
  month =        jan,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863736",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "90a:94038",
  MRreviewer =   "Shimshon Berkovits",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902534~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Matthews:1989:DCE,
  author =       "Robert Matthews",
  title =        "On the derivation of a ``chaotic'' encryption
                 algorithm",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "1",
  pages =        "29--42",
  month =        jan,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863745",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (26A18 58F08)",
  MRnumber =     "90g:94015",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902535~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Belkora:1989:BHC,
  author =       "Jeff Belkora",
  title =        "{Belkoranic} Hill Ciphering",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "1",
  pages =        "43--49",
  month =        jan,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863754",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902536~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Greenfield:1989:CCU,
  author =       "Gary R. Greenfield",
  title =        "A Cryptography Course for the {University of
                 Richmond}",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "1",
  pages =        "50--60",
  month =        jan,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863763",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902537~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Anderson:1989:CPS,
  author =       "Roland Anderson",
  title =        "Cryptanalytic Properties of Short Substitution
                 Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "1",
  pages =        "61--72",
  month =        jan,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863772",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "90a:94035",
  MRreviewer =   "Shimshon Berkovits",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902538~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Kak:1989:NMC,
  author =       "Subhash C. Kak",
  title =        "A New Method for Coin Flipping by Telephone",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "1",
  pages =        "73--78",
  month =        jan,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863781",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "90a:94037",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902539~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Kruh:1989:HCA,
  author =       "Louis Kruh",
  title =        "The Heraldry of Cryptology --- Addendum",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "1",
  pages =        "79--84",
  month =        jan,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863790",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902540~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Kruh:1989:RTCa,
  author =       "Louis Kruh and Ralph Erskine",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "1",
  pages =        "85--96",
  month =        jan,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863808",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:53 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902541~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Mache:1989:SCT,
  author =       "Wolfgang W. Mache",
  title =        "The {Siemens} Cipher Teletype in the History of
                 Telecommunications",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "2",
  pages =        "97--117",
  month =        apr,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863817",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:54 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Reprinted in \cite[pp. 433--453]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902544~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Clarke:1989:PWO,
  author =       "William F. Clarke",
  title =        "Post War Organization",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "2",
  pages =        "118--122",
  month =        apr,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863826",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:54 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902545~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Kruh:1989:BAC,
  author =       "Louis Kruh",
  title =        "{British--American} Cryptanalytic Cooperation and an
                 Unprecedented Admission by {Winston Churchill}",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "2",
  pages =        "123--134",
  month =        apr,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863835",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:54 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902546~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Erskine:1989:ABP,
  author =       "Ralph Erskine",
  title =        "From the Archives: a {Bletchley Park} Assessment of
                 {German} Intelligence on {Torch}",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "2",
  pages =        "135--142",
  month =        apr,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863844",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:54 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902547~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Myer:1989:VCS,
  author =       "Lt. Gen. Charles R. Myer",
  title =        "{Viet Cong} {Sigint} and {U.S. Army COMSEC} in
                 {Vietnam}",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "2",
  pages =        "143--150",
  month =        apr,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863853",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:54 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Reprinted in \cite[pp. 301--308]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902548~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Georgiou:1989:MSC,
  author =       "George Georgiou",
  title =        "A Method to Strengthen Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "2",
  pages =        "151--160",
  month =        apr,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863862",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (68P25)",
  MRnumber =     "90e:94021",
  MRreviewer =   "Yvo Desmedt",
  bibdate =      "Mon Jun 30 15:38:54 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902549~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Anderson:1989:RCP,
  author =       "Roland Anderson",
  title =        "Recognizing Complete and Partial Plaintext",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "2",
  pages =        "161--166",
  month =        apr,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863871",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:54 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902550~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Guillou:1989:PKT,
  author =       "Louis C. Guillou and Marc Davio and Jean-Jacques
                 Quisquater",
  title =        "Public-Key Techniques: Randomness and Redundancy",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "2",
  pages =        "167--189",
  month =        apr,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863880",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:54 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902551~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Kahn:1989:SWO,
  author =       "David Kahn",
  title =        "A {Soviet} Wiretapping Office",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "2",
  pages =        "190--191",
  month =        apr,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863899",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:54 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902552~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Boyd:1989:AUS,
  author =       "Carl Boyd",
  title =        "Anguish under Siege: High-Grade {Japanese} Signal
                 Intelligence and the Fall of {Berlin}",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "3",
  pages =        "193--209",
  month =        jul,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863907",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:55 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902554~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Deavours:1989:KKK,
  author =       "C. A. Deavours",
  title =        "A {Ku Klux Klan} Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "3",
  pages =        "210--214",
  month =        jul,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863916",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:55 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902555~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Kruh:1989:RTCb,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "3",
  pages =        "215--242",
  month =        jul,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863925",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:55 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902556~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Wheeler:1989:PCC,
  author =       "Daniel D. Wheeler",
  title =        "Problems With Chaotic Cryptosystems",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "3",
  pages =        "243--250",
  month =        jul,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863934",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:55 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902557~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Deavours:1989:SHC,
  author =       "C. A. Deavours and Louis Kruh",
  title =        "The {Swedish HC-9} Ciphering Machine",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "3",
  pages =        "251--265",
  month =        jul,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863943",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:55 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902558~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Matthews:1989:RDP,
  author =       "Robert Matthews",
  title =        "A Rotor Device for Periodic and Random-Key
                 Encryption",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "3",
  pages =        "266--272",
  month =        jul,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863952",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:55 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902559~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Blackman:1989:GCS,
  author =       "Deane R. Blackman",
  title =        "The {Gromark} Cipher, and Some Relatives",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "3",
  pages =        "273--282",
  month =        jul,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863961",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:55 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902560~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Unknown:1989:OCP,
  author =       "Unknown",
  title =        "{OSS} Cryptographic Plan",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "3",
  pages =        "283--287",
  month =        jul,
  year =         "1989",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  remark =       "1945 U.S. Army staff study obtained under FOIA.",
  romanvolume =  "XIII",
}

@Article{August:1989:CEC,
  author =       "David A. August",
  title =        "Cryptography and Exploitation of {Chinese} Manual
                 Cryptosystems: {Part I}: The Encoding Problem",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "4",
  pages =        "289--302",
  month =        oct,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863970",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:55 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902562~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Carroll:1989:CCP,
  author =       "John M. Carroll and Lynda E. Robbins",
  title =        "Computer Cryptanalysis of Product Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "4",
  pages =        "303--326",
  month =        oct,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863989",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:55 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902563~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Kruh:1989:TYS,
  author =       "Louis Kruh",
  title =        "Tales of {Yardley}: Some Sidelights to His Career",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "4",
  pages =        "327--358",
  month =        oct,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991863998",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:55 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902564~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{August:1989:ITA,
  author =       "David August",
  title =        "Information theoretic approach to secure {LSFR}
                 ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "4",
  pages =        "351--359",
  month =        oct,
  year =         "1989",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  bibdate =      "Fri Feb 09 18:12:03 2001",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  ZMnumber =     "651.94006",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Kruh:1989:RTCc,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "4",
  pages =        "359--377",
  month =        oct,
  year =         "1989",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-118991864005",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:55 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902565~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIII",
}

@Article{Unknown:1989:ACN,
  author =       "Unknown",
  title =        "From the archives: Compromise of a {Navy} Code",
  journal =      j-CRYPTOLOGIA,
  volume =       "13",
  number =       "4",
  pages =        "378--381",
  month =        oct,
  year =         "1989",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  remark =       "925 document on a lapse of security.",
  romanvolume =  "XIII",
}

@Article{Hinsley:1990:BIS,
  author =       "F. H. Hinsley",
  title =        "{British} Intelligence in the {Second World War}: An
                 Overview",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "1",
  pages =        "1--10",
  month =        jan,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864733",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902623~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Lewis:1990:DD,
  author =       "Frank W. Lewis",
  title =        "The Day of the Dodo",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "1",
  pages =        "11--27",
  month =        jan,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864742",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902624~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Lipson:1990:MCC,
  author =       "Stanley H. Lipson and Francine Abeles",
  title =        "The Matrix Cipher of {C. L. Dodgson}",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "1",
  pages =        "28--36",
  month =        jan,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864751",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A55 (11T71 94A60)",
  MRnumber =     "91b:01044",
  MRreviewer =   "James J. Tattersall",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902625~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Vogel:1990:IKC,
  author =       "Daniel S. Vogel",
  title =        "Inside a {KGB} Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "1",
  pages =        "37--52",
  month =        jan,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864760",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902626~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
  xxauthor =     "Donald S. Vogel",
}

@Article{Rabson:1990:WOH,
  author =       "John Rabson and Hugo Rabson",
  title =        "The {War Office HK POW} Cypher System",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "1",
  pages =        "53--60",
  month =        jan,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864779",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902627~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
  xxauthor =     "Hugo Rabson",
}

@Article{August:1990:CEC,
  author =       "David A. August",
  title =        "Cryptography and Exploitation of {Chinese} Manual
                 Cryptosystems. {Part II}: The Encrypting Problem",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "1",
  pages =        "61--78",
  month =        jan,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864788",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902628~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Kak:1990:VC,
  author =       "Subhash C. Kak",
  title =        "The {Vararuchi} Cipher",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "1",
  pages =        "79--82",
  month =        jan,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864797",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A32 (94A60)",
  MRnumber =     "91b:01020",
  MRreviewer =   "A. I. Volodarski{\u{\i}}",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902629~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Kruh:1990:RTCa,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "1",
  pages =        "83--89",
  month =        jan,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864805",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902630~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Donini:1990:CSR,
  author =       "Rear Admiral (disch.) Luigi Donini and Augusto
                 Buonafalce",
  title =        "The Cryptographic Services of the {Royal British} and
                 {Italian} Navies",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "2",
  pages =        "97--127",
  month =        apr,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864814",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Translated by Augusto Buonafalce. Reprinted in
                 \cite[pp. 3--33]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902633~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
  xxauthor =     "Rear Admiral (disch.) Luigi Donini",
}

@Article{Abeles:1990:SVP,
  author =       "Francine Abeles and Stanley H. Lipson",
  title =        "Some {Victorian} Periodic Polyalphabetic Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "2",
  pages =        "128--134",
  month =        apr,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864823",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A55 (94-03)",
  MRnumber =     "90m:01018",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 309--315]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902634~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Dunnigan:1990:NCPa,
  author =       "Brian Leigh Dunnigan and Frank Lewis and Mike Barlow",
  title =        "The {Niagara} Cipher --- {Part I}",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "2",
  pages =        "135--138",
  month =        apr,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864832",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902635~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Deavours:1990:SHC,
  author =       "C. A. Deavours and Louis Kruh",
  title =        "The {Swedish HC-9} Ciphering Machine Challenge",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "2",
  pages =        "139--144",
  month =        apr,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864841",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902636~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Greenough:1990:CUH,
  author =       "H. Paul Greenough",
  title =        "Cryptanalysis of the Uncaged {Hagelin}",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "2",
  pages =        "145--161",
  month =        apr,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864850",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (01A99)",
  MRnumber =     "91a:94023",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902637~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Deavours:1990:SCT,
  author =       "C. A. Deavours",
  title =        "Solution of {C-35} Texts With Partial Key Overlaps",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "2",
  pages =        "162--168",
  month =        apr,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864869",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "1 047 338",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902638~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Kak:1990:IBF,
  author =       "Subhash C. Kak",
  title =        "{Indus} and {Brahmi} --- Further Connections",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "2",
  pages =        "169--183",
  month =        apr,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864878",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902639~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Kruh:1990:RTCb,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "2",
  pages =        "184--191",
  month =        apr,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864887",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:56 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902640~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Byrne:1990:CEC,
  author =       "John Byrne and Cipher A. Deavours and Louis Kruh",
  title =        "{Chaocipher} Enters the Computer Age When its Method
                 Is Disclosed to {Cryptologia Editors}",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "3",
  pages =        "193--198",
  month =        jul,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864896",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:57 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 317--322]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902642~db=all~order=page",
  abstract =     "John F. Byrne invented Chaocipher in 1918 (J.F. Byrne,
                 1953) and tried unsuccessfully for almost 40 years to
                 interest the US government in his cipher system. In
                 1989, John Byrne, son of John F. Byrne, demonstrated
                 Chaocipher to two editors of a cryptology journal to
                 determine if it had any commercial value. After making
                 some improvements and providing additional information
                 they issue a new challenge to would-be solvers and
                 discuss the computer algorithm for the cipher system",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; history",
  language =     "English",
  romanvolume =  "XIV",
  subject =      "Cryptologia editors; Chaocipher; US government; cipher
                 system; cryptology; computer algorithm",
}

@Article{Dunnigan:1990:NCPb,
  author =       "Brian Leigh Dunnigan and Frank Lewis and Mike Barlow",
  title =        "The {Niagara} cipher --- {Part II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "3",
  pages =        "199--203",
  month =        jul,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864904",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:57 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Niagara cipher; British military cipher;
                 polyalphabetic cipher",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902643~db=all~order=page",
  abstract =     "For pt.I see ibid., vol.14, no.2, p.135--138 (1990).
                 Cryptanalysis of a British military cipher of 1759
                 shows the cipher to be a polyalphabetic cipher. This
                 cipher is described and various ways of solving it
                 (with and without computers) are demonstrated",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography",
  language =     "English",
  romanvolume =  "XIV",
}

@Article{Kozaczuk:1990:NCO,
  author =       "Wladyslaw Kozaczuk",
  title =        "A New Challenge for an Old {ENIGMA} --- {Buster}",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "3",
  pages =        "204--216",
  month =        jul,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864913",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:57 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Marian Rejewski; mathematician-cryptologist; Enigma
                 cipher; enciphered message; Russo-Japanese war; Polish
                 Socialist Party; historical document",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902644~db=all~order=page",
  abstract =     "In 1976, Marian Rejewski, Polish
                 mathematician-cryptologist, the solver of the German
                 Enigma cipher, was sent a letter including a photocopy
                 of an enciphered message, dated 26 April 1904. This was
                 the period of the Russo-Japanese war. The piece was a
                 correspondence between the Polish Socialist Party and
                 its emissaries in London. Despite his advanced age and
                 prolonged ailment and contrary to his initial
                 objections, Rejewski solved the cipher, which turned
                 out to reveal an interesting historical document",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; history",
  language =     "English",
  romanvolume =  "XIV",
}

@Article{Connell:1990:ANM,
  author =       "Charles Connell",
  title =        "An Analysis of {NEWDES}: a Modified Version of {DES}",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "3",
  pages =        "217--224",
  month =        jul,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864922",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:57 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "NEWDES; modified version; encryption algorithm; data
                 encryption standard; secretness; S-boxes;
                 microcomputer; bytes; entire f-function; key length",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902645~db=all~order=page",
  abstract =     "An encryption algorithm designed by R Scott (1985)
                 that is a modified form of the data encryption standard
                 is examined. Scott's goal in varying DES is to improve
                 two aspects of it that are alleged to be weaknesses:
                 the length of the key and the `secretness' of the
                 design of the S-boxes. An ancillary goal of his is to
                 provide an algorithm that is easy to implement in
                 software on a microcomputer. Scott's algorithm is
                 indeed simple to implement. One of the main reasons for
                 this is that it uses only operations on entire bytes,
                 so there is no individual bit manipulation. Also, as
                 promised, the design of the entire f-function is open
                 for examination. The increase in key length, however,
                 may not be as significant as it first appears to be",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; microcomputer applications; programming;
                 standards",
  language =     "English",
  romanvolume =  "XIV",
}

@Article{Kiele:1990:TTE,
  author =       "William A. Kiele",
  title =        "A Tensor --- Theoretic Enhancement to the {Hill}
                 Cipher System",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "3",
  pages =        "225--233",
  month =        jul,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864931",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (11T71)",
  MRnumber =     "91d:94012",
  bibdate =      "Mon Jun 30 15:38:57 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "tensor-theoretic enhancement; Hill cipher system; Hill
                 matrix algorithm; purely algebraic cryptographic
                 system; algebraic cryptology; ring isomorphism theory;
                 block size; invertible matrix; ciphertext blocks",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902646~db=all~order=page",
  ZMnumber =     "715.94002",
  abstract =     "The Hill matrix algorithm (L.S. Hill, 1929) is known
                 for being the first purely algebraic cryptographic
                 system and for starting the entire field of algebraic
                 cryptology. An operator derived from ring isomorphism
                 theory is adapted for use in the Hill system which
                 greatly increases the block size that a matrix can
                 encrypt; specifically, a $ k \times k $ invertible
                 matrix over $ Z_n $ represents an invertible matrix of
                 order $ k^3 $, which produces ciphertext blocks $ k^2
                 $-times as long as the original matrix could. This
                 enhancement increases the Hill system's security
                 considerably",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; matrix algebra",
  language =     "English",
  romanvolume =  "XIV",
}

@Article{Kruh:1990:RTCc,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "3",
  pages =        "234--252",
  month =        jul,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864940",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:57 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902647~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Kruh:1990:WWS,
  author =       "Louis Kruh",
  title =        "Why Was {Safford} Pessimistic About Breaking the
                 {German ENIGMA} Cipher Machine in 1942?",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "3",
  pages =        "253--257",
  month =        jul,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864959",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:57 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 235--239]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902648~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Baldwin:1990:HWS,
  author =       "Robert W. Baldwin and Alan T. Sherman",
  title =        "How We Solved the {US\$100,000} Decipher Puzzle (16
                 Hours Too Late)",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "3",
  pages =        "258--284",
  month =        jul,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864968",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:57 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "A preliminary version appears as Technical Report
                 89-3, Tufts University Department of Computer Science
                 (July 1989), and in modified form as Technical Report
                 UMIACS-TR-90-64/CS-TR-2468, University of Maryland,
                 College Park (May 1990).",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902649~db=all~order=page",
  abstract =     "On March 30, 1985 the authors solved a cryptography
                 puzzle that had remained unsolved for over two years.
                 Unfortunately, they missed by one day the deadline for
                 sharing what had become a \$117000 prize. They describe
                 the puzzle and how they solved it. The \$100000
                 Decipher Puzzle consists of a simple two-sided jigsaw
                 puzzle that contains a sequence of 376 codenumbers,
                 ranging from 1 to 1252, which are encrypted by a
                 multiple-substitution cipher similar to the Beale
                 cipher. Clues state that the key was derived from some
                 keytext in the public domain. The authors solved the
                 puzzle by building a Zetalisp program that tested
                 candidate keytexts by trying a variety of ways to
                 extract candidate keys from each keytext and by
                 checking the resulting candidate plaintexts for
                 English. The program exploited a novel `windowing'
                 technique that detected when part of a candidate key
                 was correct and an effective test for English based on
                 digraph frequencies",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; linguistics; programming; word
                 processing",
  language =     "English",
  romanvolume =  "XIV",
  subject =      "cryptography puzzle; Decipher Puzzle; two-sided jigsaw
                 puzzle; codenumbers; multiple-substitution cipher;
                 Beale cipher; keytext; public domain; Zetalisp program;
                 candidate keys; candidate plaintexts; English;
                 windowing; digraph frequencies",
}

@Article{Anderson:1990:SCS,
  author =       "Ross J. Anderson",
  title =        "Solving a Class of Stream Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "3",
  pages =        "285--288",
  month =        jul,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864977",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:57 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "keystream sequences; linear feedback shift registers;
                 multiplexor; consistency check; observed keystream;
                 address information",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902650~db=all~order=page",
  abstract =     "S. M. Jennings (1980) and H. Beker and F. Piper (1982)
                 have proposed generating keystream sequences by
                 combining the output of two linear feedback shift
                 registers using a multiplexor. Such sequences can be
                 solved by a consistency check between the observed
                 keystream and the possible states of the shift register
                 which provides the address information to the
                 multiplexor",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; data integrity; shift registers",
  language =     "English",
  romanvolume =  "XIV",
}

@Article{Ritter:1990:SCP,
  author =       "Terry Ritter",
  title =        "Substitution Cipher with Pseudo-Random Shuffling The
                 Dynamic Substitution Combiner",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "4",
  pages =        "289--303",
  month =        oct,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864986",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "pseudo-random shuffling; dynamic substitution
                 combiner; modified substitution cipher; translation
                 table; plaintext symbols; ciphertext symbols; dynamic
                 translation; symbol frequency statistics; cryptanalytic
                 attacks; cryptographic combiner; exclusive-OR combining
                 function; Vernam stream ciphers; one-way function;
                 pseudo-random sequence; cryptanalysis",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902652~db=all~order=page;
                 http://www.io.com/~ritter/ARTS/DYNSUB2.HTM",
  abstract =     "A cipher mechanism or process which can be viewed as a
                 modified substitution cipher is presented. A
                 translation table is used to replace plaintext symbols
                 with ciphertext symbols; the modification consists of
                 changing the contents of the translation table after
                 each substitution. The dynamic translation table acts
                 to confuse symbol frequency statistics and so frustrate
                 the usual cryptanalytic attacks. The same mechanism can
                 also be viewed as a cryptographic combiner, and can
                 replace the exclusive-OR combining function used in
                 Vernam stream ciphers (G. Vernam, 1926). The dynamic
                 translation table acts as one-way function to protect
                 the pseudo-random sequence and consequently helps to
                 prevent cryptanalysis",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography",
  language =     "English",
  romanvolume =  "XIV",
}

@Article{Ephron:1990:C,
  author =       "Henry D. Ephron",
  title =        "{S. I. S./CB}",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "4",
  pages =        "304--330",
  month =        oct,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091864995",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 241--267]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902653~db=all~order=page",
  abstract =     "An introduction is given to the Japanese method of
                 superenciphermant, by means of additives, of their
                 encoded messages and a detailed description of some of
                 the author's efforts at solving this
                 superenciphermant-by means of step-by-step solution of
                 an imaginary worksheet. Later the Japanese improved the
                 security of their communications, superenciphering by
                 passing the digits through a numerical square (a 10*10
                 table) instead of by mere addition. Encipherment is
                 demonstrated in detail by means of a step-by-step
                 solution of an English encoded text superenciphered by
                 this method",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography",
  language =     "English",
  romanvolume =  "XIV",
  subject =      "Japanese method; superenciphermant; encoded messages;
                 step-by-step solution; imaginary worksheet; security;
                 communications; numerical square; English encoded
                 text",
}

@Article{Deavours:1990:TBW,
  author =       "C. A. Deavours and Louis Kruh",
  title =        "The {Turing0} Bombe: Was it Enough?",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "4",
  pages =        "331--349",
  month =        oct,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091865002",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 403--421]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902654~db=all~order=page",
  abstract =     "The effectiveness of Alan Turing's original bombe
                 design (cipher), is discussed, along with
                 organizational methods of implementing it via a
                 microcomputer. to illustrate the material presented, a
                 three part German Werhmacht message is solved",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; microcomputer applications",
  language =     "English",
  romanvolume =  "XIV",
  subject =      "Turing bombe; organizational methods; microcomputer;
                 German Werhmacht message",
}

@Article{Mitchell:1990:NKG,
  author =       "Douglas W. Mitchell",
  title =        "Nonlinear Key Generators",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "4",
  pages =        "350--354",
  month =        oct,
  year =         "1990",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Fri Mar 15 09:01:38 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "key generators; nonlinear generation; key sequences;
                 chaos-based approach; simulations; desirable
                 properties",
  abstract =     "A method of nonlinear generation of key sequences is
                 shown. While D. Wheeler (1989), has shown R. Matthews'
                 (1989), earlier chaos-based approach to have potential
                 pitfalls, the present method is shown-in part via
                 simulations-to be invulnerable to Wheeler's criticisms
                 and to have various other desirable properties",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; digital simulation; random number
                 generation",
  language =     "English",
  romanvolume =  "XIV",
}

@Article{Foster:1990:VDC,
  author =       "Caxton C. Foster",
  title =        "Vowel Distribution as a Clue to Vowel Identification",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "4",
  pages =        "355--362",
  month =        oct,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091865020",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "vowel identification; English; simple substitution
                 cipher; equally distributed; text",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902655~db=all~order=page",
  abstract =     "In any sample of English, about 40\% of the letters
                 will be vowels. The author tries to identify which
                 letters of a simple substitution cipher are vowels by
                 looking for those letters which, as a group, are most
                 equally distributed through the text",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; word processing",
  language =     "English",
  romanvolume =  "XIV",
}

@Article{Kruh:1990:RTCd,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "4",
  pages =        "363--373",
  month =        oct,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091865039",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902656~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Weber:1990:MD,
  author =       "Ralph E. Weber",
  title =        "A Masked Dispatch",
  journal =      j-CRYPTOLOGIA,
  volume =       "14",
  number =       "4",
  pages =        "374--380",
  month =        oct,
  year =         "1990",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119091865048",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902657~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XIV",
}

@Article{Ritter:1991:TCP,
  author =       "Terry Ritter",
  title =        "Transposition Cipher with Pseudo-random Shuffling: The
                 Dynamic Transposition Combiner",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "1",
  pages =        "1--17",
  month =        jan,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865731",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "pseudorandom shuffling; dynamic transposition
                 combiner; transposition cipher; cryptographic
                 shuffling; bit-balancing data; usage-frequency
                 statistics; exclusive-OR combining function; Vernam
                 stream ciphers",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902738~db=all~order=page;
                 http://www.io.com/~ritter/ARTS/DYNTRAN2.HTM",
  abstract =     "Extensions are made to a class of transposition cipher
                 based on continued shuffling. These ciphers permute
                 plaintext into ciphertext by swapping every message
                 element with some message element selected at
                 pseudo-random; elements can be characters (e.g., bytes)
                 or bits. Extensions include operation on very large
                 data blocks, cryptographic shuffling variations, and
                 the efficient extraction of plaintext from ciphertext.
                 In addition, selected extra data can be adjoined to the
                 plaintext to eliminate the data-dependent weak
                 encipherings otherwise inherent in transposition. This
                 bit-balancing data is supposed to completely eliminate
                 all normal usage-frequency statistics from
                 bit-transposition ciphertext. The same mechanism can
                 also be viewed as a cryptographic combiner, and, with
                 sequence-to-block and block-to-sequence conversions,
                 can generally replace the exclusive-OR combining
                 function used in Vernam stream ciphers",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography",
  language =     "English",
  romanvolume =  "XV",
}

@Article{Lipson:1991:KVC,
  author =       "Stanley H. Lipson and Francine Abeles",
  title =        "The Key--Vowel Cipher of {Charles S. Dodgson}",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "1",
  pages =        "18--24",
  month =        jan,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865740",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 323--329]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902739~db=all~order=page",
  abstract =     "In his diary entry of 23 February 1858, Charles L.
                 Dodgson (Lewis Carroll) described the first of two
                 ciphers he invented within three days of each other.
                 Analyzing this cipher, the authors show that it is a
                 subset of a Vigen{\'e}re cipher with the addition of
                 systematically placed nulls. Discussing the key-vowel
                 cipher and the later one, the matrix cipher, the
                 authors focus on the security of the key-word. Two
                 exercises for the reader are also provided",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography",
  language =     "English",
  romanvolume =  "XV",
  subject =      "key-vowel cipher; Vigen{\'e}re cipher; matrix cipher;
                 security",
}

@Article{Kruh:1991:MIC,
  author =       "Louis Kruh",
  title =        "{Military Intelligence Corps Hall of Fame}",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "1",
  pages =        "25--28",
  month =        jan,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865759",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902740~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Kruh:1991:CCC,
  author =       "Louis Kruh",
  title =        "Correspondence in Cipher --- a Cipher Typewriter
                 Catalogue",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "1",
  pages =        "29--42",
  month =        jan,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865768",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902741~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Schwartz:1991:NGM,
  author =       "Charles Schwartz",
  title =        "A New Graphical Method for Encryption of Computer
                 Data",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "1",
  pages =        "43--46",
  month =        jan,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865777",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "pseudorandom number generator; decryption; graphical
                 method; encryption; computer data; text; pictures;
                 binary files; graphically generated inversions; bit
                 pattern; uncrackability",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902742~db=all~order=page",
  abstract =     "A new method for encryption of computer data (text,
                 pictures, or binary files) makes use of a sequence of
                 graphically generated inversions on the bit pattern,
                 keyed to a pseudo-random number generator. The method
                 is easy, fast and fun. Decryption requires knowledge of
                 the secret code number used at encryption. The argument
                 for `uncrackability' of this scheme is only heuristic;
                 but the author believes that it is practically immune
                 from attack. He invites others to see if they can prove
                 otherwise",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography",
  language =     "English",
  romanvolume =  "XV",
}

@Article{Lujan:1991:AMD,
  author =       "Lt. Susan M. {Lujan, USNR}",
  title =        "{Agnes Meyer Driscoll}",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "1",
  pages =        "47--56",
  month =        jan,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865786",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 269--278]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902743~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Bergen:1991:FSW,
  author =       "H. A. Bergen and W. J. Caelli",
  title =        "File Security in {WordPerfect 5.0}",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "1",
  pages =        "57--66",
  month =        jan,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865795",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "file security; files cryptanalysis; locked document
                 option; word processing package WordPerfect V5.0;
                 encryption key; ciphertext",
  URL =          "http://catless.ncl.ac.uk/Risks/12.01.html;
                 http://www.informaworld.com/smpp/content~content=a741902744~db=all~order=page",
  abstract =     "Cryptanalysis of files encrypted with the locked
                 document option of the word processing package
                 WordPerfect V5.0, is shown to be remarkably simple. The
                 encryption key and the plaintext are easily recovered
                 in a ciphertext only attack. File security is thus
                 compromised and is not in accord with the claim by the
                 manufacturer that: `If you forget the password, there
                 is absolutely no way to retrieve the document'",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "security of data; software packages; word processing",
  language =     "English",
  romanvolume =  "XV",
}

@Article{Kruh:1991:RTCa,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "1",
  pages =        "67--80",
  month =        jan,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865803",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:58 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902745~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Ritter:1991:EGC,
  author =       "Terry Ritter",
  title =        "The Efficient Generation of Cryptographic Confusion
                 Sequences",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "2",
  pages =        "81--139",
  month =        apr,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865812",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (65C10)",
  MRnumber =     "92b:94035",
  bibdate =      "Mon Jun 30 15:38:59 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "cryptographic confusion sequences; pseudo-random
                 sequence; random number generators; cryptographic
                 applications; random sequences; incompleteness theorem;
                 deterministic implementation; external analysis; RNG
                 comparison; chaos; Cebysev mixing; cellular automata;
                 linear congruential; linear feedback shift register;
                 nonlinear shift register; generalized feedback shift
                 register; additive types; isolator mechanisms; one-way
                 functions; combined sequences; random permutations;
                 primitive mod 2 polynomials; empirical state-trajectory
                 approach; RNG design analysis; GFSR",
  URL =          "http://fizz.sys.uea.ac.uk/~rs/ritter.html;
                 http://www.ciphersbyritter.com/ARTS/CRNG2ART.HTM;
                 http://www.informaworld.com/smpp/content~content=a741902748~db=all~order=page",
  abstract =     "A survey is given of pseudo-random sequence or random
                 number generators (RNGs) for cryptographic
                 applications, with extensive reference to the
                 literature, and seemingly unresolved issues discussed
                 throughout. An introduction to random sequences is
                 presented, with some speculative consequences suggested
                 by G{\"o}del's incompleteness theorem (G. Chaitin,
                 1987). Implications of a necessarily deterministic
                 implementation, techniques of external analysis, and
                 ways to complicate such analysis are discussed. A basis
                 for RNG comparison is suggested. Various RNGs are
                 described, including chaos, Cebysev mixing, cellular
                 automata, x/sup 2/ mod N, linear congruential, linear
                 feedback shift register, nonlinear shift register,
                 generalized feedback shift register and additive types.
                 Randomizer and isolator mechanisms, one-way functions,
                 the combined sequences from multiple RNGs, random
                 permutations, and methods for finding primitive mod 2
                 polynomials are also described. An empirical
                 state-trajectory approach to RNG design analysis is
                 given, and experimental results tabulated for several
                 cellular automata, x/sup 2/ mod N, GFSR, and additive
                 designs",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "automata theory; cryptography; random number
                 generation; shift registers",
  language =     "English",
  romanvolume =  "XV",
}

@Article{Wheeler:1991:SIC,
  author =       "Daniel D. Wheeler and Robert A. J. Matthews",
  title =        "Supercomputer Investigations of a Chaotic Encryption
                 Algorithm",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "2",
  pages =        "140--152",
  month =        apr,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865821",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:59 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "chaotic encryption algorithm; nonlinear pseudo-random
                 number generator; chaos theory; cycling keys;
                 low-precision arithmetic; numerical investigation; Cray
                 Y-MP machine; cycling problem",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902749~db=all~order=page",
  abstract =     "A nonlinear pseudo-random number generator based on
                 chaos theory was criticized for producing cycling keys
                 if used with low-precision arithmetic. The authors
                 present the results of a numerical investigation of the
                 algorithm's properties using a Cray Y-MP machine. This
                 suggests that the cycling problem can be combatted to
                 any desired degree. They conclude that the generator is
                 still of cryptographic interest",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "chaos; cryptography; parallel programming; random
                 number generation; random processes",
  language =     "English",
  romanvolume =  "XV",
}

@Article{Burke:1991:LER,
  author =       "Colin Burke and Ralph Erskine",
  title =        "Letters to the {Editor}: Re: {Safford} Article",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "2",
  pages =        "153--160",
  month =        apr,
  year =         "1991",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Sat Nov 21 12:35:16 MST 1998",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  note =         "Reprinted in \cite[pp. 279--286]{Deavours:1998:SCH}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Guy:1991:LER,
  author =       "Jacques B. M. Guy",
  title =        "Letter to the {Editor}: Re: {Voynich Manuscript}",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "2",
  pages =        "161--166",
  month =        apr,
  year =         "1991",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Fri Mar 15 09:01:39 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Kruh:1991:RTCb,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "2",
  pages =        "167--176",
  month =        apr,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865830",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:38:59 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902750~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Garon:1991:WES,
  author =       "Gilles Garon and Richard Outerbridge",
  title =        "{DES} Watch: An Examination of the Sufficiency of the
                 {Data Encryption Standard} for Financial Institution
                 Information Security in the 1990's",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "3",
  pages =        "177--193",
  month =        jul,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865849",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "data encryption standard; financial institution
                 information security; FIs; unmodified single-key DES;
                 financial systems; key management security;
                 double-length keys; financial systems",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902752~db=all~order=page",
  abstract =     "DES is used almost universally by financial
                 institutions (FIs) around the world. For the
                 foreseeable future there are no alternatives to its
                 continued use. Within ten years (to 2001) unmodified
                 single-key DES will be breakable for a cost of about
                 \$3,500 per solution in under one day. Many financial
                 systems which currently rely on single-key DES are
                 therefore becoming vulnerable to attack. Despite the
                 impact of breaking DES, the misconception that an FI's
                 exposure is limited to the dollar values of particular
                 short-lived transactions may make users unwilling to
                 undertake urgent remedial measures. They may be
                 prepared to tolerate risks they perceive as limited and
                 unrealistic. This view ignores the danger that a breach
                 of key management security poses to the system as a
                 whole. Until a new encryption standard emerges, the
                 exposure and consequences can be avoided by the
                 adoption of double-length keys for DES. This is
                 technically and economically feasible. Double-length
                 keys and unique keys per transaction should be
                 implemented in financial systems as soon as possible",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; financial data processing; standards",
  language =     "English",
  romanvolume =  "XV",
}

@Article{Anderson:1991:TFC,
  author =       "Ross J. Anderson",
  title =        "Tree Functions and Cipher Systems",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "3",
  pages =        "194--202",
  month =        jul,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865858",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "encryption systems; plaintext bit; hash function;
                 ciphertext errors; error extension; tree function;
                 ciphertext attack; computable attack; connectivity;
                 DES; RSA key selection; algorithm design",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902753~db=all~order=page",
  abstract =     "A number of encryption systems work by combining each
                 plaintext bit with a hash function of the last $n$
                 ciphertext bits. Such systems are self-synchronising in
                 that they recover from ciphertext errors with an error
                 extension of $n$. The author shows that if the hash
                 function is a tree function, then the system is
                 vulnerable to a chosen ciphertext attack and, under
                 certain circumstances, to a chosen plaintext attack;
                 secondly, that all hash functions are equivalent to
                 some tree function; thirdly, that whether or not this
                 gives a computable attack on a given algorithm depends
                 on the connectivity of a graph associated with the hash
                 function; and, fourthly, the implications for DES, for
                 RSA key selection, and for algorithm design in
                 general",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "algorithm theory; cryptography; data integrity; file
                 organisation; trees (mathematics)",
  language =     "English",
  romanvolume =  "XV",
}

@Article{Desmedt:1991:CDN,
  author =       "Yvo G. Desmedt",
  title =        "The {``$A$''} cipher does not necessarily strengthen
                 security",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "3",
  pages =        "203--206",
  month =        jul,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865867",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "92f:94013",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "enciphering transformation; multiplication;
                 homomorphism; A cipher; cryptanalyst",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902754~db=all~order=page",
  abstract =     "G. Georgiou (1989) proposed a method to strengthen
                 ciphers based on a combination of an enciphering
                 transformation and a multiplication. If the enciphering
                 transformation is a homomorphism and the multiplication
                 in the domain is used in the A cipher and the
                 multiplication in the range is known to the
                 cryptanalyst, his method does not strengthen the cipher
                 at all",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography",
  language =     "English",
  romanvolume =  "XV",
}

@Article{Guy:1991:SPT,
  author =       "Jacques B. M. Guy",
  title =        "Statistical Properties of the Two Folios of the
                 {Voynich Manuscript}",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "3",
  pages =        "207--218",
  month =        jul,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865876",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902755~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
  xxtitle =      "Statistical Properties of Two Folios of the {Voynich
                 Manuscript}",
}

@Article{Callimahos:1991:LWF,
  author =       "Lambros D. Callimahos",
  title =        "The Legendary {William F. Friedman}",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "3",
  pages =        "219--236",
  month =        jul,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865885",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902756~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Kruh:1991:SET,
  author =       "Louis Kruh and Paul Edden",
  title =        "Seizing the {ENIGMA}: Two Reviews of One Book",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "3",
  pages =        "237--240",
  month =        jul,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865894",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902757~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
  xxauthor =     "Louis Kruh and Paul Edelen",
}

@Article{Kruh:1991:RTCc,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "3",
  pages =        "241--246",
  month =        jul,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865902",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902758~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Friedman:1991:IRC,
  author =       "William F. Friedman",
  title =        "Information Regarding Cryptographic Systems Submitted
                 for Use by the Military Service and Forms to be Used",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "3",
  pages =        "247--257",
  month =        jul,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865911",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902759~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Guy:1991:VIO,
  author =       "Jacques B. M. Guy",
  title =        "Vowel Identification: An Old (But Good) Algorithm",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "3",
  pages =        "258--262",
  month =        jul,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865920",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "vowel identification; accurate algorithm; plaintext;
                 simple substitution cipher; very fast algorithm; Soviet
                 researcher",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902760~db=all~order=page",
  abstract =     "A very fast and accurate algorithm for identifying
                 vowels and consonants in plaintext or in a simple
                 substitution cipher, is presented. C. Foster (see
                 ibid., vol. 14, no. 4, p. 355--62, 1990), proposed an
                 algorithm to identify which letters of a simple
                 substitution cipher are vowels. A very fast algorithm
                 which does precisely that was discovered by a Soviet
                 researcher, B. V. Sukhotin (1962; 1973). The author
                 presents a version Sukhotin's algorithm in English",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; data analysis",
  language =     "English",
  romanvolume =  "XV",
}

@Article{Friedman:1991:BHS,
  author =       "William F. Friedman",
  title =        "A Brief History of the {Signal Intelligence Service}
                 by the {Military Service} and Forms to be Used",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "3",
  pages =        "263--272",
  month =        jul,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865939",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902761~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Kahn:1991:PHI,
  author =       "David Kahn",
  title =        "{Pearl Harbor} and the Inadequacy of Cryptanalysis",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "4",
  pages =        "273--294",
  month =        oct,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865948",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 35--56]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902763~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Parker:1991:UMP,
  author =       "Frederick D. Parker",
  title =        "The Unsolved Messages of {Pearl Harbor}",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "4",
  pages =        "295--313",
  month =        oct,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865957",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 57--75]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902764~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Anderson:1991:ECI,
  author =       "Roland Anderson",
  title =        "Extending the Concept of Interval",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "4",
  pages =        "314--324",
  month =        oct,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865966",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "interval concept; cryptography; identity information",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902765~db=all~order=page",
  abstract =     "The relative variation in length found among the
                 intervals between occurrences of characters in written
                 text provides extremely valuable clues as to the
                 identity of those characters. It is possible to obtain
                 still more identity information by extending the
                 definition of `interval' so that intervals of various
                 kinds can be distinguished. In addition, it is possible
                 to make use of `complex' or `multi-dimensional'
                 intervals by giving simultaneous consideration to a
                 number of adjacent `simple' intervals",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography",
  language =     "English",
  romanvolume =  "XV",
}

@Article{Kruh:1991:RTCd,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "4",
  pages =        "325--334",
  month =        oct,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865975",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902766~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Anonymous:1991:ASU,
  author =       "Anonymous",
  title =        "From the Archives: Security of {Ultra Dexter} and
                 {Rabid Intelligence War Department}",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "4",
  pages =        "341--354",
  month =        oct,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865984",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902767~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XV",
}

@Article{Wheeler:1991:PMN,
  author =       "Daniel D. Wheeler",
  title =        "Problems with {Mitchell}'s Nonlinear Key Generators",
  journal =      j-CRYPTOLOGIA,
  volume =       "15",
  number =       "4",
  pages =        "355--363",
  month =        oct,
  year =         "1991",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119191865993",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:00 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "pseudo random numbers; successive differences;
                 nonlinear key generators; probable-word attack",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902768~db=all~order=page",
  abstract =     "The key sequences from Mitchell's (ibid., vol. 14, p.
                 350--354, 1990) nonlinear key generator show clear
                 patterns when successive differences are examined.
                 These are sufficient to break the system with a
                 probable-word attack",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; random number generation",
  language =     "English",
  romanvolume =  "XV",
}

@Article{Kruh:1992:RTCa,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "1",
  pages =        "1--22",
  month =        jan,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866739",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:01 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902821~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Robinson:1992:FRC,
  author =       "Bill Robinson",
  title =        "The Fall and Rise of Cryptanalysis in {Canada}",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "1",
  pages =        "23--38",
  month =        jan,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866748",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:01 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 77--92]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902822~db=all~order=page",
  abstract =     "In the late 1970s, Canada's Communications Security
                 Establishment (CSE) was an organization in decline. By
                 1979 only one person was still doing real
                 cryptanalysis. Earlier in 1980, however, CSE had sent
                 T. Johnston to NSA to investigate what it would take to
                 re-enter the field. This effort culminated in the
                 purchase of a Cray X-MP supercomputer, installed in
                 1985, and the hiring of a new staff of cryptanalysts to
                 make use of it. Only with these developments did CSE
                 enter the modern age of cryptanalysis",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; societies",
  language =     "English",
  romanvolume =  "XVI",
  subject =      "Communications Security Establishment; cryptanalysis;
                 Cray X-MP; supercomputer",
}

@Article{Erskine:1992:GNG,
  author =       "Ralph Erskine",
  title =        "The {German Naval} Grid in {World War II}",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "1",
  pages =        "39--51",
  month =        jan,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866757",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:01 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902823~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Carroll:1992:CCE,
  author =       "John M. Carroll and Jeff Verhagen and Perry T. Wong",
  title =        "Chaos in Cryptography: The Escape from the Strange
                 Attractor",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "1",
  pages =        "52--72",
  month =        jan,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866766",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60 (58F13)",
  MRnumber =     "1 145 809",
  bibdate =      "Mon Jun 30 15:39:01 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "cryptography; random characteristics; cipher system;
                 pseudo-random number generators; random generators;
                 Lorenz attractor; chaotic nature; strange attractor;
                 key management; authentication protocols",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902824~db=all~order=page",
  ZMnumber =     "746.94012",
  abstract =     "Modern cryptography has a voracious appetite for
                 reproducible sequences of large numbers that possess
                 random characteristics. Because a cipher system is
                 vulnerable to attack if cryptanalysts can successfully
                 guess the nature of its underlying pseudo-random number
                 generators, it is helpful for cryptographers to have a
                 large repertoire of them. Chaos theory provides many
                 formulations that can be used as random generators. The
                 paper describes one of these, the Lorenz attractor. The
                 chaotic nature of the Lorenz system of equations makes
                 it a good candidate for pseudo-random number
                 generation. However, to ensure that its sequences are
                 not serially autocorrelated, they must be modified so
                 that the particle can escape from the field of the
                 strange attractor. The modified system produces
                 extremely long sequences with good random properties.
                 The generating algorithm is fast and efficient.
                 Significantly, several components are needed to specify
                 the starting point, which increases resistance to
                 cryptanalysis and admits a number of key management and
                 authentication protocols",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "chaos; cryptography; random number generation; random
                 processes",
  language =     "English",
  romanvolume =  "XVI",
}

@Article{Gaj:1992:PCM,
  author =       "Krzysztof Gaj",
  title =        "{Polish} Cipher Machine --- {LUCIDA}",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "1",
  pages =        "73--80",
  month =        jan,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866775",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:01 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902825~db=all~order=page",
  abstract =     "The Polish cipher machine, constructed early in the
                 1930s and used during World War II is described. Its
                 origin and application are presented. Details of
                 construction, results, and implications of its
                 cryptanalysis, made by Polish cipher experts in 1941,
                 are described",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; history; military systems",
  language =     "English",
  romanvolume =  "XVI",
  subject =      "military communications; Lucida; Polish cipher
                 machine; cryptanalysis",
}

@Article{Kruh:1992:BPH,
  author =       "Louis Kruh",
  title =        "{``Betrayal at Pearl Harbor''}: Book Review",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "1",
  pages =        "81--85",
  month =        jan,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866784",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:01 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "See \cite{Rusbridger:1991:BPH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902826~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Kruh:1992:SCD,
  author =       "Louis Kruh",
  title =        "Sliding Code Device of Unknown Origin",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "1",
  pages =        "86--88",
  month =        jan,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866793",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:01 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902827~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Al-Kadit:1992:OCA,
  author =       "Ibrahim A. Al-Kadit",
  title =        "Origins of cryptology: {The} {Arab} contributions",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "2",
  pages =        "97--126",
  month =        apr,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866801",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "01A30 (94-03)",
  MRnumber =     "93b:01010",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 93--122]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902830~db=all~order=page",
  ZMnumber =     "756.01011",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
  xxauthor =     "Ibrahim A. Al-Kadi",
}

@Article{Rabson:1992:AWB,
  author =       "John Rabson",
  title =        "All Are Well at {Boldon}: a Mid-{Victorian} Code
                 System",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "2",
  pages =        "127--135",
  month =        apr,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866810",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902831~db=all~order=page",
  ZMnumber =     "756.01028",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{McLaughlin:1992:YAM,
  author =       "Robert McLaughlin",
  title =        "Yet Another Machine to Break {DES}",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "2",
  pages =        "136--144",
  month =        apr,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866829",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "data encryption standard; DES; current high-speed
                 encryption chips; hardware fuzzy comparers; breaking
                 process",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902832~db=all~order=page",
  abstract =     "The data encryption standard (DES) has been the
                 subject of multiple attempts at breaking. As of this
                 date (April 1992), no one has announced a method that
                 will break DES with certainty. The author does not
                 consider a method but develops another machine. This
                 machine makes use of current high-speed encryption
                 chips in combination with hardware fuzzy comparers to
                 automate the breaking process",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; fuzzy logic; microprocessor chips;
                 standards",
  language =     "English",
  romanvolume =  "XVI",
}

@Article{Kruh:1992:ANC,
  author =       "Louis Kruh",
  title =        "{Army--Navy} Collaboration for Cryptanalysis of Enemy
                 Systems",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "2",
  pages =        "145--164",
  month =        apr,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866838",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902833~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Sassoon:1992:ASA,
  author =       "George T. Sassoon",
  title =        "The Application of {Sukhotin}'s Algorithm to Certain
                 Non-{English} Languages",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "2",
  pages =        "165--173",
  month =        apr,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866847",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Sukhotin algorithm; vowel-finding algorithm;
                 simple-substitution ciphertext; foreign languages;
                 computer program VOWEL1; compiled BASIC; English;
                 Georgian; Croatian; Scottish Gaelic; Hungarian; Hebrew
                 languages",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902834~db=all~order=page",
  abstract =     "J. B. M. Guy (see ibid., vol. 15, no. 3, p. 258--262,
                 1991), described Sukhotin's algorithm for identifying
                 the vowels in a simple-substitution ciphertext and
                 showed how it can be implemented. The author decided to
                 try it out on certain foreign languages. This was done
                 using a computer program VOWEL1 in compiled BASIC,
                 which was thoroughly tested against pencil-and-paper
                 methods on short plaintexts. The method was applied to:
                 English, Georgian, Croatian, Scottish Gaelic, Hungarian
                 and Hebrew languages",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "linguistics; word processing",
  language =     "English",
  romanvolume =  "XVI",
}

@Article{Alvarez:1992:PDC,
  author =       "David Alvarez",
  title =        "A {Papal} Diplomatic Code",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "2",
  pages =        "174--176",
  month =        apr,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866856",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902835~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Webb:1992:PKC,
  author =       "William A. Webb",
  title =        "A Public-Key Cryptosystem Based on Complementing
                 Sets",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "2",
  pages =        "177--181",
  month =        apr,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866865",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "93a:94025",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "public key cryptosystem; complementing sets;
                 integers",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902836~db=all~order=page",
  abstract =     "A public key cryptosystem is constructed, based on the
                 idea of complementing sets A/sub 1/, A/sub 2/, . . .,
                 A/sub k/ of integers. Such sets have the property that
                 all sums a/sub 1/+a/sub 2/+. . .+a/sub k/ where a/sub
                 i/ in A/sub i/, are distinct",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; set theory",
  language =     "English",
  romanvolume =  "XVI",
}

@Article{Kruh:1992:RTCb,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "2",
  pages =        "182--190",
  month =        apr,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866874",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902837~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Wayner:1992:MF,
  author =       "Peter Wayner",
  title =        "Mimic Functions",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "3",
  pages =        "193--214",
  month =        jul,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866883",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "1 170 667",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "ftp://ftp.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Graphics/information.hiding.watermarking.bib;
                 http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "data compression; encryption; mimic function; Huffman
                 coding; context-free grammars",
  URL =          "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1029.html;
                 http://www.informaworld.com/smpp/content~content=a741902839~db=all~order=page",
  ZMnumber =     "752.68034",
  abstract =     "A mimic function changes a file A so it assumes the
                 statistical properties of another file B. That is, if
                 p(t,A) is the probability of some substring t occurring
                 in A, then a mimic function f, recodes A so that
                 p(t,f(A)) approximates p(t,B) for all strings t of
                 length less than some n. This paper describes the
                 algorithm for computing mimic functions and compares
                 the algorithm with its functional inverse, Huffman
                 coding. The paper also provides a description of more
                 robust and more general mimic functions which can be
                 defined using context-free grammars and van Wijngaarden
                 grammars (1974)",
  abstract-2 =   "The author shows how the inverse of Huffman coding can
                 be used to endow one file with the statistical
                 characteristics of another. Examples are given of
                 randomly generated text with the statistical properties
                 of English, for third order through sixth order
                 statistics and for a context free grammar.",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "context-free grammars; cryptography; data compression;
                 encoding",
  language =     "English",
  romanvolume =  "XVI",
}

@Article{King:1992:IPR,
  author =       "John C. King and Dennis R. Bahler",
  title =        "An Implementation of Probabilistic Relaxation in the
                 Cryptanalysis of Simple Substitution Ciphers",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "3",
  pages =        "215--225",
  month =        jul,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866892",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "trigram statistics generation; probabilistic
                 relaxation; cryptanalysis; Pascal; adjustment formula;
                 simple substitution ciphers; homophonic ciphers",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902840~db=all~order=page",
  abstract =     "Relaxation algorithms have been used successfully in
                 the automated cryptanalysis of simple substitution
                 ciphers. This paper describes a Pascal implementation
                 of relaxation using an adjustment formula (C. Shannon,
                 1951). The formula is used to generate trigram
                 statistics suitable for the solution of simple
                 substitution ciphers without word divisions. Problems
                 encountered when applying relaxation to homophonic
                 ciphers are identified",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography; Pascal listings",
  language =     "English",
  romanvolume =  "XVI",
}

@Article{Anderson:1992:CRN,
  author =       "Ross Anderson",
  title =        "Chaos and Random Numbers",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "3",
  pages =        "226--226",
  month =        jul,
  year =         "1992",
  CODEN =        "CRYPE6",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Fri Mar 15 09:01:38 MST 2002",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Shirriff:1992:DVC,
  author =       "Ken Shirriff and Curt Welch and Andrew Kinsman",
  title =        "Decoding a {VCR} Controller Code",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "3",
  pages =        "227--234",
  month =        jul,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866900",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "video cassette recorder programming; encryption;
                 encoding; VCR Plus+; remote control; decoding",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902841~db=all~order=page;
                 http://www.righto.com/papers/vcr.html",
  abstract =     "The VCR Plus+ is a remote control for programming
                 video cassette recorders. It uses an encrypted 1 to 8
                 digit number that encodes the channel, start time,
                 length, and day of the month of the television show to
                 be recorded. This paper describes a procedure for
                 decoding the 1 to 6 digit codes",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "codes; cryptography; encoding",
  language =     "English",
  romanvolume =  "XVI",
}

@Article{Kruh:1992:RTCc,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "3",
  pages =        "235--249",
  month =        jul,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866919",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902842~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Mitchell:1992:RCT,
  author =       "Douglas W. Mitchell",
  title =        "{``Rubik's Cube''} As a Transposition Device",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "3",
  pages =        "250--256",
  month =        jul,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866928",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "data security; cryptography; Rubik's Cube;
                 transposition cipher; multiple anagramming",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902843~db=all~order=page",
  abstract =     "This paper points out that the well-known `Rubik's
                 Cube' can be used as a device for implementing a
                 transposition cipher which is simple to operate and
                 which should afford a high level of security. A
                 particular system for using the cube is proposed. The
                 system is secure against brute attacks; since it
                 permits a different scrambled ordering of letters for
                 each letter block enciphered, it is also secure against
                 multiple anagramming",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "codes; cryptography",
  language =     "English",
  romanvolume =  "XVI",
}

@Article{Oswald:1992:WFF,
  author =       "Alison L. Oswald",
  title =        "{William Frederick Friedman}: a Pictorial Essay",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "3",
  pages =        "257--264",
  month =        jul,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866937",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902844~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Safford:1992:AFD,
  author =       "Lieutenant L. F. Safford",
  title =        "From the Archives: The Functions and Duties of the
                 {Cryptography Section, Naval Communications}",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "3",
  pages =        "265--281",
  month =        jul,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866946",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902845~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Foster:1992:CVI,
  author =       "Caxton C. Foster",
  title =        "A Comparison of Vowel Identification Methods",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "3",
  pages =        "282--286",
  month =        jul,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866955",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:02 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "cryptoanalysis; simple substitution cipher; vowel
                 identification methods; consonant line; vowel
                 distribution; machine readable computer program
                 manual",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902846~db=all~order=page",
  abstract =     "Four methods of vowel identification are examined. The
                 author discusses how the method of Sukhotin combined
                 with the consonant line appears to be the best, whereas
                 the method of vowel distribution is the worst. The text
                 was a machine readable computer program manual that had
                 been converted to all upper case and had all characters
                 except A-Z stripped out",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography",
  language =     "English",
  romanvolume =  "XVI",
}

@Article{Kahn:1992:RMU,
  author =       "David Kahn",
  title =        "{Roosevelt}, {MAGIC}, and {ULTRA}",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "4",
  pages =        "289--319",
  month =        oct,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866964",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:03 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Reprinted in \cite[pp. 123--153]{Deavours:1998:SCH}.",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902848~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Anonymous:1992:ASU,
  author =       "Anonymous",
  title =        "From the Archives: Strategic Use of Communications
                 During the {World War}",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "4",
  pages =        "320--326",
  month =        oct,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866973",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:03 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902849~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Fagone:1992:PSS,
  author =       "Peter P. Fagone",
  title =        "Partial Solutions of {Swift}'s {18th Century Mock
                 Latin} Passages",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "4",
  pages =        "327--338",
  month =        oct,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866982",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:03 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902850~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Kruh:1992:RTCd,
  author =       "Louis Kruh",
  title =        "Reviews and Things Cryptologic",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "4",
  pages =        "339--346",
  month =        oct,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291866991",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:03 MDT 2008",
  bibsource =    "http://www.dean.usma.edu/math/pubs/cryptologia/;
                 http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902851~db=all~order=page",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  romanvolume =  "XVI",
}

@Article{Gaddy:1992:RCD,
  author =       "David W. Gaddy",
  title =        "{Rochford}'s Cipher: a Discovery in {Confederate}
                 Cryptography",
  journal =      j-CRYPTOLOGIA,
  volume =       "16",
  number =       "4",
  pages =        "347--362",
  month =        oct,
  year =         "1992",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119291867008",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  bibdate =      "Mon Jun 30 15:39:03 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Rochfort cipher; Confederated States Navy cipher;
                 American Civil War cryptography; Rochford's cipher;
                 historical background; Confederate message; grille
                 cipher system",
  URL =          "http://www.informaworld.com/smpp/content~content=a741902852~db=all~order=page",
  abstract =     "Details the decryption and historical background of a
                 Confederate message in a grille cipher system
                 (Rochford's (Rochfort) Cipher) previously unknown to
                 the cryptography of the US Civil War period",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  journal-URL =  "http://www.tandfonline.com/loi/ucry20",
  keywords =     "cryptography",
  language =     "English",
  romanvolume =  "XVI",
}

@Article{Levine:1993:TMP,
  author =       "Jack Levine and Richard Chandler",
  title =        "The Two-message Problem in the {Hill} Cryptographic
                 System with Unknown Cipher Alphabet",
  journal =      j-CRYPTOLOGIA,
  volume =       "17",
  number =       "1",
  pages =        "1--30",
  month =        jan,
  year =         "1993",
  CODEN =        "CRYPE6",
  DOI =          "http://dx.doi.org/10.1080/0161-119391867737",
  ISSN =         "0161-1194 (print), 1558-1586 (electronic)",
  ISSN-L =       "0161-1194",
  MRclass =      "94A60",
  MRnumber =     "93m:94019",
  bibdate =      "Mon Jun 30 15:39:04 MDT 2008",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 OCLC Article1st database",
  note =         "Hill cryptographic system; Hill two-message problem;
                 ciphertexts; encipherment; single plaintext; key
                 matrices; cipher alphabet; row-reduced echelon form;
                 linear equations; unknown elements",
  URL =          "http://www.informaworld.com/smpp/content~content=a748639218~db=all~order=page",
  abstract =     "The Hill two-message problem assumes given two
                 ciphertexts obtained by the encipherment of a single
                 plaintext by two different key matrices K/sub 1/, K/sub
                 2/. The problem is to determine the (unknown) K/sub 1/,
                 K/sub 2/ and the cipher alphabet if unknown. J. Levine
                 and J.V. Brawley (1966; 1967) and N.C. Nance (1972),
                 analyzed this problem for the case in which the cipher
                 alphabet is known. The authors continue with the
                 problem and consider the (more difficult) case in which
                 the cipher alphabet is unknown. The method used depends
                 in part on some results obtained by J. Levine and R.
                 Chandler (1989), which determine the matrix A=K/sub
                 1/K/sub 2/. The basic equation AXA=X is then solved for
                 matrix X by use of the row-reduced echelon form of the
                 system of linear equations in the unknown elements of
                 X, the key matrices being among these solutions",
  acknowledgement = ack-nhfb,
  fjournal =     "Cryptologia",
  jo