Disclaimer Downloads Email Examples Information Links Products Program Screens  

Resource List

From Around The World

[ACA]

ACA and You, "Handbook For Members of the American Cryptogram Association", ACA publications, 1995.

[ACA1]

Anonymous, "The ACA and You - Handbook For Secure Communications", American Cryptogram Association, 1994.

[ACM]

Association For Computing Machinery, "Codes, Keys and Conflicts: Issues in U.S. Crypto Policy." Report of a Special Panel of ACM U. S. Public Policy Committee (USACM), June 1994.

[AFM]

"AFM - 100-80, Traffic Analysis", Department of the Air Force, 1946.

[ALAN]

Turing, Alan, "The Enigma", by A. Hodges. Simon and Schuster, 1983.

[ALBA]

Alberti, "Treatise De Cifris", Meister Papstlichen, Princeton University Press, Princeton, N.J., 1963.

[ALKA]

al-Kadi, Ibrahim A., "Origins of Cryptology: The Arab Contributions, Cryptologia", Vol XVI, No. 2, April 1992, pp 97-127.

[AND1]

Andree, Josephine, "Chips from the Math Log", Mu Alpha Theta, 1966.

[AND2]

Andree, Josephine, "More Chips from the Math Log", Mu Alpha Theta, 1970.

[AND3]

Andree, Josephine, "Lines from the O.U. Mathematics Letter", Vols I,II,III, Mu Alpha Theta, 1971,1971,1971.

top of page

[AND4]

Andree, Josephine and Richard V., "RAJA Books: a Puzzle Potpourri", RAJA, 1976.

[ANDR]

Andrew, Christopher, "Secret Service", Heinemann, London 1985.

[ANNA]

Anonymous., "The History of the International Code.", Proceedings of the United States Naval Institute, 1934.

[ANN1]

Anonymous., "Speech and Facsimile Scrambling and Decoding", Aegean Park Press, Laguna Hills, CA, 1981.

[ANTH]

Anthony - Cave Brown, "Bodyguard of Lies", Harper and Row, New York, 1975.

[ASIR]

Anonymous, "Enigma and Other Machines", Air Scientific Institute Report, 1976.

[AUG1]

D. A. August, "Cryptography and Exploitation of Chinese Manual Cryptosystems - Part I:The Encoding Problem", Cryptologia, Vol XIII, No. 4, October 1989.

[AUG2]

D. A. August, "Cryptography and Exploitation of Chinese Manual Cryptosystems - Part II:The Encrypting Problem", Cryptologia, Vol XIV, No. 1, August 1990.

top of page

[BADE]

Badeau, J. S. et. al.,"The Genius of Arab Civilization: Source of Renaissance". Second Edition. Cambridge: MIT Press. 1983.

[BAMF]

Bamford, James,"The Puzzle Palace: A Report on America's Most Secret Agency", Boston, Houghton Mifflin, 1982.

[BARB]

Barber, F. J. W., "Archaeological Decipherment: A Handbook", Princeton University Press, 1974.

[B201]

Barker, Wayne G., "Cryptanalysis of The Simple Substitution Cipher with Word Divisions," Course #201, Aegean Park Press, Laguna Hills, CA. 1982.

[BALL]

Ball, W. W. R., "Mathematical Recreations and Essays", London, 1928.

[BAR1]

Barker, Wayne G., "Course No 201, Cryptanalysis of The Simple Substitution Cipher with Word Divisions," Aegean Park Press, Laguna Hills, CA. 1975.

[BAR2]

Barker, W., ed., "History of Codes and Ciphers in the U.S. During the Period between World Wars, Part II", 1930 - 1939., Aegean Park Press, 1990.

[BAR3]

Barker, Wayne G., "Cryptanalysis of the Hagelin Cryptograph", Aegean Park Press, 1977.

[BAR4]

Barker, Wayne G., "Cryptanalysis of the Enciphered Code Problem - Where Additive method of Encipherment Has Been Used", Aegean Park Press, 1979.

top of page

[BARK]

Barker, Wayne G., "Cryptanalysis of The Simple Substitution Cipher with Word Divisions", Aegean Park Press, Laguna Hills, CA. 1973.

[BARR]

Barron, John, "KGB: The Secret Work Of Soviet Agents", Bantom Books, New York, 1981.

[BAUD]

Baudouin, Captain Roger, "Elements de Cryptographie", Paris, 1939.

[BAZE]

Bazeries, M. le Capitaine, "Cryptograph a 20 rondelles- alphabets, Compte rendu de la 20e session de l' Association Francaise pour l'Advancement des Scienses", Paris: Au secretariat de l' Association, 1892.

[BEES]

Beesley, P., "Very Special Intelligence", Doubleday, New York, 1977.

[BLK]

Blackstock, Paul W. and Frank L Schaf, Jr., "Intelligence, Espionage, Counterespionage and Covert Operations", Gale Research Co., Detroit, MI., 1978.

[BLOC]

Bloch, Gilbert and Ralph Erskine, "Exploit the Double Encipherment Flaw in Enigma", Cryptologia, vol 10, #3, July 1986, p134 ff. (29)

[BLUE]

Bearden, Bill, "The Bluejacket's Manual", 20th ed., Annapolis: U.S. Naval Institute, 1978.

[BODY]

Brown, Anthony - Cave, "Bodyguard of Lies", Harper and Row, New York, 1975.

[BOLI]

Bolinger, D. and Sears, D., "Aspects of Language", 3rd ed., Harcourt Brace Jovanovich,Inc., New York, 1981.

top of page

[BOSW]

Bosworth, Bruce, Codes, "Ciphers and Computers: An Introduction to Information Security", Hayden Books, Rochelle Park, NJ, 1990.

[BOWE]

Bowers, William Maxwell, "The Bifid Cipher", Practical Cryptanalysis, II, ACA, 1960.

[BOWN]

Bowen, Russell J., "Scholar's Guide to Intelligence Literature: Bibliography of the Russell J. Bowen Collection", National Intelligence Study Center, Frederick, MD, 1983.

[BP82]

Beker, H., and Piper, F., "Cipher Systems, The Protection of Communications", John Wiley and Sons, NY, 1982.

[BRAS]

Brasspounder, Language Data - German, MA89, "The Cryptogram", American Cryptogram Association, 1989.

[BREN]

Brennecke, J., "Die Wennde im U-Boote-Krieg:Ursachen und Folgren 1939 - 1943", Herford, Koehler, 1984.

[BROO]

Brook, Maxey, "150 Puzzles in Cryptarithmetic", Dover, 1963.

[BRIT]

Anonymous, "British Army Manual of Cryptography", HMF, 1914.

[BROG]

Broglie, Duc de, "Le Secret du roi: Correspondance secrete de Louis XV avec ses agents diplomatiques 1752-1774", 3rd ed. Paris, Calmann Levy, 1879.

top of page

[BRYA]

Bryan, William G., "Practical Cryptanalysis - Periodic Ciphers -Miscellaneous", Vol 5, American Cryptogram Association, 1967.

[BURL]

Burling, R., "Man's Many Voices: Language in Its Cultural Context", Holt, Rinehart & Winston, New York, 1970.

[CAND]

Candela, Rosario, "Isomorphism and its Application in Cryptanalytics", Cardanus Press, NYC 1946.

[CAR1]

Carlisle, Sheila. "Pattern Words: Three to Eight Letters in Length", Aegean Park Press, Laguna Hills, CA 92654, 1986.

[CAR2]

Carlisle, Sheila. "Pattern Words: Nine Letters in Length", Aegean Park Press, Laguna Hills, CA 92654, 1986.

[CASE]

Casey, William, "The Secret War Against Hitler", Simon & Schuster, London 1989.

[CAVE]

Cave Brown, Anthony, "Bodyguard of Lies", Harper & Row, New York 1975.

[CCF]

Foster, C. C., "Cryptanalysis for Microcomputers", Hayden Books, Rochelle Park, NJ, 1990.

[CHOI]

"Interview with Grand Master Sin Il Choi.",9th DAN, June 25, 1995.

[CHOM]

Chomsky, Norm, "Syntactic Structures", The Hague: Mouton, 1957.

top of page

[CHUN]

Chungkuo Ti-erh Lishih Tangankuan, ed, "K'ang-Jih chengmien chanch'ang", Chiangsu Kuchi Ch'upansheh, 1987., pp993-1026.

[CI]

"FM 34-60, Counterintelligence", Department of the Army, February 1990.

[COUR]

Courville, Joseph B., "Manual For Cryptanalysis Of The Columnar Double Transposition Cipher", by Courville Assoc., South Gate, CA, 1986.

[CLAR]

Clark, Ronald W., T"he Man who broke Purple", Weidenfeld and Nicolson, London 1977.

[COLF]

Collins Gem Dictionary, "French", Collins Clear Type Press, 1979.

[COLG]

Collins Gem Dictionary, "German", Collins Clear Type Press, 1984.

[COLI]

Collins Gem Dictionary, "Italian", Collins Clear Type Press, 1954.

[COLL]

Collins Gem Dictionary, "Latin", Collins Clear Type Press, 1980.

[COLP]

Collins Gem Dictionary, "Portuguese", Collins Clear Type Press, 1981.

[COLR]

Collins Gem Dictionary, "Russian", Collins Clear Type Press, 1958.

[COLS]

Collins Gem Dictionary, "Spanish", Collins Clear Type Press, 1980.

[COPP]

Coppersmith, Don., "IBM Journal of Research and Development 38", 1994.

top of page

[COVT]

Anonymous, "Covert Intelligence Techniques Of the Soviet Union, Aegean Park Press, Laguna Hills, Ca. 1980.

[CREM]

Cremer, Peter E.," U-Boat Commander: A Periscope View of The Battle of The Atlantic," New York, Berkley, 1986.

[CULL]

Cullen, Charles G., "Matrices and Linear Transformations," 2nd Ed., Dover Advanced Mathematics Books, NY, 1972.

[DAGA]

D'agapeyeff, Alexander, "Codes and Ciphers," Oxford University Press, London, 1974.

[DALT]

Dalton, Leroy, "Topics for Math Clubs," National Council of Teachers and Mu Alpha Theta, 1973.

[DAN]

Daniel, Robert E., "Elementary Cryptanalysis: Cryptography For Fun," Cryptiquotes, Seattle, WA., 1979.

[DAVI]

Da Vinci, "Solving Russian Cryptograms", The Cryptogram, September-October, Vol XLII, No 5. 1976.

[DEAC]

Deacon, R., "The Chinese Secret Service," Taplinger, New York, 1974.

[DEAU]

Bacon, Sir Francis, "De Augmentis Scientiarum," tr. by Gilbert Watts, (1640) or tr. by Ellis, Spedding, and Heath (1857,1870).

top of page

[DELA]

Delastelle, F., Cryptographie nouvelle, Maire of Saint- Malo, P. Dubreuil, Paris, 1893.

[DENN]

Denning, Dorothy E. R.," Cryptography and Data Security," Reading: Addison Wesley, 1983.

[DEVO]

Deavours, Cipher A. and Louis Kruh, Machine Cryptography and Modern Cryptanalysis, Artech, New York, 1985.

[DEV1]

Deavours, C. A., "Breakthrough '32: The Polish Solution of the ENIGMA," Aegean Park Press, Laguna Hills, CA, 1988.

[DEV2]

Deavours, C. A. and Reeds, J.,"The ENIGMA," CRYPTOLOGIA, Vol I No 4, Oct. 1977.

[DEV3]

Deavours, C. A.,"Analysis of the Herbern cryptograph using Isomorphs," CRYPTOLOGIA, Vol I No 2, April, 1977.

[DIFF]

Diffie, Whitfield," The First Ten Years of Public Key Cryptography," Proceedings of the IEEE 76 (1988): 560- 76.

[DIFE]

Diffie, Whitfield and M.E. Hellman,"New Directions in Cryptography, IEEE Transactions on Information Theory IT-22, 1976.

[DONI]

Donitz, Karl, Memoirs: Ten Years and Twenety Days, London: Weidenfeld and Nicolson, 1959.

top of page

[DOW]

Dow, Don. L., "Crypto-Mania, Version 3.0", Box 1111, Nashua, NH. 03061-1111, (603) 880-6472, Cost $15 for registered version and available as shareware under CRYPTM.zip on CIS or zipnet.

[EIIC]

Ei'ichi Hirose, ",Finland ni okeru tsushin joho," in Showa gunji hiwa: Dodai kurabu koenshu, Vol 1, Dodai kurabu koenshu henshu iinkai, ed., (Toyko: Dodai keizai konwakai, 1987), pp 59-60.

[ELCY]

Gaines, Helen Fouche, Cryptanalysis, Dover, New York, 1956.

[ENIG]

Tyner, Clarence E. Jr., and Randall K. Nichols, "ENIGMA95 - A Simulation of Enhanced Enigma Cipher Machine on A Standard Personal Computer," for publication, November, 1995.

[EPST]

Epstein, Sam and Beryl, "The First Book of Codes and Ciphers," Ambassador Books, Toronto, Canada, 1956.

[ERSK]

Erskine, Ralph, "Naval Enigma: The Breaking of Heimisch and Triton," Intelligence and National Security 3, Jan. 1988.

[EVES]

Eves, Howard, "An Introduction to the History of Mathematics, " New York, Holt Rinehart winston, 1964.

[EYRA]

Eyraud, Charles, "Precis de Cryptographie Moderne'" Paris, 1953.

[FL]

Anonymous, The Friedman Legacy: A Tribute to William and Elizabeth Friedman, National Security Agency, Central Security Service, Center for Cryptological History,1995.

 

[FLIC]

Flicke, W. F., "War Secrets in the Ether," Aegean Park Press, Laguna Hills, CA, 1994.

[FOWL]

Fowler, Mark and Radhi Parekh, " Codes and Ciphers, - Advanced Level," EDC Publishing, Tulsa OK, 1994. (clever and work)

top of page

[FREB]

Friedman, William F., "Cryptology," The Encyclopedia Britannica, all editions since 1929. A classic article by the greatest cryptanalyst.

[FR1]

Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part I - Volume 1, Aegean Park Press, Laguna Hills, CA, 1985.

[FR2]

Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part I - Volume 2, Aegean Park Press, Laguna Hills, CA, 1985.

[FR3]

Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part III, Aegean Park Press, Laguna Hills, CA, 1995.

[FR4]

Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part IV, Aegean Park Press, Laguna Hills, CA, 1995.

[FR5]

Friedman, William F. Military Cryptanalysis - Part I, Aegean Park Press, Laguna Hills, CA, 1980.

[FR6]

Friedman, William F. Military Cryptanalysis - Part II, Aegean Park Press, Laguna Hills, CA, 1980.

[FRE]

Friedman, William F. , "Elements of Cryptanalysis," Aegean Park Press, Laguna Hills, CA, 1976.

[FREA]

Friedman, William F. , "Advanced Military Cryptography," Aegean Park Press, Laguna Hills, CA, 1976.

top of page

[FRAA]

Friedman, William F. , "American Army Field Codes in The American Expeditionary Forces During the First World War, USA 1939.

[FRAB]

Friedman, W. F., Field Codes used by the German Army During World War. 1919.

[FR22]

Friedman, William F., The Index of Coincidence and Its Applications In Cryptography, Publication 22, The Riverbank Publications, Aegean Park Press, Laguna Hills, CA, 1979.

[FR6]

Friedman, W. F., "Six Lectures On Cryptology," National Archives, SRH-004.

[FROM]

Fromkin, V and Rodman, R., "Introduction to Language," 4th ed.,Holt Reinhart & Winston, New York, 1988.

[FRS]

Friedman, William F. and Elizabeth S., "The Shakespearean Ciphers Examined," Cambridge University Press, London, 1957.

[FUMI]

Fumio Nakamura, Rikugun ni okeru COMINT no hoga to hatten," The Journal of National Defense, 16-1 (June 1988) pp85 - 87.

[GAJ]

Gaj, Krzysztof, "Szyfr Enigmy: Metody zlamania," Warsaw Wydawnictwa Komunikacji i Lacznosci, 1989.

[GAR1]

Gardner, Martin, "536 Puzzles and Curious Problems," Scribners, 1967.

top of page

[GAR2]

Gardner, Martin, "Mathematics, Magic, and Mystery ," Dover, 1956.

[GAR3]

Gardner, Martin, "New Mathematical Diversions from Scientific American," Simon and Schuster, 1966.

[GAR4]

Gardner, Martin, "Sixth Book of Mathematical Games from Scientific American," Simon and Schuster, 1971.

[GARL]

Garlinski, Jozef, 'The Swiss Corridor', Dent, London 1981.

[GAR1]

Garlinski, Jozef, 'Hitler's Last Weapons', Methuen, London 1978.

[GAR2]

Garlinski, Jozef, 'The Enigma War', New York, Scribner, 1979.

[GERM]

"German Dictionary," Hippocrene Books, Inc., New York, 1983.

[GIVI]

Givierge, General Marcel, " Course In Cryptography," Aegean Park Press, Laguna Hills, CA, 1978. Also, M. Givierge, "Cours de Cryptographie," Berger-Levrault, Paris, 1925.

[GLEA]

Gleason, A. M., "Elementary Course in Probability for the Cryptanalyst," Aegean Park Press, Laguna Hills, CA, 1985.

top of page

[GODD]

Goddard, Eldridge and Thelma, "Cryptodyct," Marion, Iowa, 1976

[GORD]

Gordon, Cyrus H., " Forgotten Scripts: Their Ongoing Discovery and Decipherment," Basic Books, New York, 1982.

[GRA1]

Grandpre: "Grandpre, A. de--Cryptologist. Part 1 'Cryptographie Pratique - The Origin of the Grandpre', ISHCABIBEL, The Cryptogram, SO60, American Cryptogram Association, 1960.

[GRA2]

Grandpre: "Grandpre Ciphers", ROGUE, The Cryptogram, SO63, American Cryptogram Association, 1963.

[GRA3]

Grandpre: "Grandpre", Novice Notes, LEDGE, The Cryptogram, MJ75, American Cryptogram Association,1975

[GRAH]

Graham, L. A., "Ingenious Mathematical Problems and Methods," Dover, 1959.

[GREU]

Greulich, Helmut, "Spion in der Streichholzschachtel: Raffinierte Methoden der Abhortechnik, Gutersloh: Bertelsmann, 1969.

[GUST]

Gustave, B., "Enigma:ou, la plus grande 'enigme de la guerre 1939-1945." Paris:Plon, 1973.

[HA]

Hahn, Karl, " Frequency of Letters", English Letter Usage Statistics using as a sample, "A Tale of Two Cities" by Charles Dickens, Usenet SCI.Crypt, 4 Aug 1994.

top of page

[HAWA]

Hitchcock, H. R., "Hawaiian," Charles E. Tuttle, Co., Toyko, 1968.

[HAWC]

Hawcock, David and MacAllister, Patrick, "Puzzle Power! Multidimensional Codes, Illusions, Numbers, and Brainteasers," Little, Brown and Co., New York, 1994.

[HELD]

Held, Gilbert, "Top Secret Data Encryption Techniques," Prentice Hall, 1993. (great title..limited use)

[HEMP]

Hempfner, Philip and Tania, "Pattern Word List For Divided and Undivided Cryptograms," unpublished manuscript, 1984.

[HEPP]

Hepp, Leo, "Die Chiffriermaschine 'ENIGMA'", F-Flagge, 1978.

[HIDE]

Hideo Kubota, " Zai-shi dai-go kokugun tokushu joho senshi." unpublished manuscript, NIDS.

[HILL]

Hill, Lester, S., "Cryptography in an Algebraic Alphabet", The American Mathematical Monthly, June-July 1929.

[HIL1]

Hill, L. S. 1929. Cryptography in an Algebraic Alphabet. American Mathematical Monthly. 36:306-312.

[HIL2]

Hill, L. S. 1931. Concerning the Linear Transformation Apparatus in Cryptography. American Mathematical Monthly. 38:135-154.

top of page

[HINS]

Hinsley, F. H., "History of British Intelligence in the Second World War", Cambridge University Press, Cambridge, 1979-1988.

[HIN2]

Hinsley, F. H. and Alan Strip in "Codebreakers -Story of Bletchley Park", Oxford University Press, 1994.

[HIN3]

Hinsley, F. H., et. al., "British Intilligence in The Second World War: Its Influence on Strategy and Operations," London, HMSO vol I, 1979, vol II 1981, vol III, 1984 and 1988.

[HISA]

Hisashi Takahashi, "Military Friction, Diplomatic Suasion in China, 1937 - 1938," The Journal of International Studies, Sophia Univ, Vol 19, July, 1987.

[HIS1]

Barker, Wayne G., "History of Codes and Ciphers in the U.S. Prior to World War I," Aegean Park Press, Laguna Hills, CA, 1978.

[HITT]

Hitt, Parker, Col. " Manual for the Solution of Military Ciphers," Aegean Park Press, Laguna Hills, CA, 1976.

[HODG]

Hodges, Andrew, "Alan Turing: The Enigma," New York, Simon and Schuster, 1983.

[HOFF]

Hoffman, Lance J., editor, "Building In Big Brother: The Cryptographic Policy Debate," Springer-Verlag, N.Y.C., 1995. ( A useful and well balanced book of cryptographic resource materials. )

[HOF1]

Hoffman, Lance. J., et. al.," Cryptography Policy," Communications of the ACM 37, 1994, pp. 109-17.

top of page

[HOLM]

Holmes, W. J., "Double-Edged Secrets: U.S. Naval Intelligence Operations in the Pacific During WWII", Annapolis, MD: Naval Institute Press, 1979.

[HOM1]

Homophonic: A Multiple Substitution Number Cipher", S- TUCK, The Cryptogram, DJ45, American Cryptogram Association, 1945.

[HOM2]

Homophonic: Bilinear Substitution Cipher, Straddling," ISHCABIBEL, The Cryptogram, AS48, American Cryptogram Association, 1948.

[HOM3]

Homophonic: Computer Column:"Homophonic Solving," PHOENIX, The Cryptogram, MA84, American Cryptogram Association, 1984.

[HOM4]

Homophonic: Hocheck Cipher,", SI SI, The Cryptogram, JA90, American Cryptogram Association, 1990.

[HOM5]

Homophonic: "Homophonic Checkerboard," GEMINATOR, The Cryptogram, MA90, American Cryptogram Association, 1990.

[HOM6]

Homophonic: "Homophonic Number Cipher," (Novice Notes) LEDGE, The Cryptogram, SO71, American Cryptogram Association, 1971.

[HUNG]

Rip Van Winkel, "Hungarian," The Cryptogram, March - April, American Cryptogram Association, 1956.

[HYDE]

H. Montgomery Hyde, "Room 3603, The Story of British Intelligence Center in New York During World War II", New York, Farrar, Straus, 1963.

top of page

[IBM1]

IBM Research Reports, Vol 7., No 4, IBM Research, Yorktown Heights, N.Y., 1971.

[INDE]

PHOENIX, Index to the Cryptogram: 1932-1993, ACA, 1994.

[ITAL]

Italian - English Dictionary, compiled by Vittore E. Bocchetta, Fawcett Premier, New York, 1965.

[JAPA]

Martin, S.E., "Basic Japanese Coversation Dictionary," Charles E. Tuttle Co., Toyko, 1981.

[JOHN]

Johnson, Brian, 'The Secret War', Arrow Books, London 1979.

[KADI]

al-Kadi, Ibrahim A., Cryptography and Data Security: Cryptographic Properties of Arabic, Proceedings of the Third Saudi Engineering Conference. Riyadh, Saudi Arabia: Nov 24-27, Vol 2:910-921., 1991.

[KAHN]

Kahn, David, "The Codebreakers", Macmillian Publishing Co. , 1967.

[KAH1]

Kahn, David, "Kahn On Codes - Secrets of the New Cryptology," MacMillan Co., New York, 1983.

[KAH2]

Kahn, David, "An Enigma Chronology", Cryptologia Vol XVII,Number 3, July 1993.

[KAH3]

Kahn, David, "Seizing The Enigma: The Race to Break the German U-Boat Codes 1939-1943 ", Houghton Mifflin, New York, 1991.

top of page

[KERC]

Kerckhoffs, "la Cryptographie Militaire, " Journel des Sciences militaires, 9th series, IX, (January and February, 1883, Libraire Militaire de L. Baudoin., Paris. English trans. by Warren T, McCready of the University of Toronto, 1964

[KOBL]

Koblitz, Neal, " A Course in Number Theory and Cryptography, 2nd Ed, Springer-Verlag, New York, 1994.

[KONH]

Konheim, Alan G., "Cryptography -A Primer" , John Wiley, 1981, pp 212 ff.

[KORD]

Kordemsky, B., "The Moscow Puzzles," Schribners, 1972.

[KOTT]

Kottack, Phillip Conrad, "Anthropology: The Exploration Of Human Diversity," 6th ed., McGraw-Hill, Inc., New York, N.Y. 1994.

[KOZA]

Kozaczuk, Dr. Wladyslaw, "Enigma: How the German Machine Cipher was Broken and How it Was Read by the Allies in WWI", University Pub, 1984.

[KRAI]

Kraitchek, "Mathematical Recreations," Norton, 1942, and Dover, 1963.

[KULL]

Kullback, Solomon, Statistical Methods in Cryptanalysis, Aegean Park Press, Laguna Hills, Ca. 1976

[LAFF]

Laffin, John, "Codes and Ciphers: Secret Writing Through The Ages," Abelard-Schuman, London, 1973.

top of page

[LAI]

Lai, Xuejia, "On the Design and Security of Block Ciphers," ETH Series in Information Processing 1, 1992. (Article defines the IDEA Cipher)

[LAIM]

Lai, Xuejia, and James L. Massey, "A Proposal for a New Block Encryption Standard," Advances in Cryptology - Eurocrypt 90 Proceedings, 1992, pp. 55-70.

[LAKE]

Lakoff, R., "Language and the Women's Place," Harper & Row, New York, 1975.

[LANG]

Langie, Andre, "Cryptography," translated from French by J.C.H. Macbeth, Constable and Co., London, 1922.

[LATI]

BRASSPOUNDER, "Latin Language Data, "The Cryptogram," July-August 1993.

[LAUE]

Lauer, Rudolph F., "Computer Simulation of Classical Substitution Cryptographic Systems" Aegean Park Press, 1981, p72 ff.

[LEAR]

Leary, Penn, " The Second Cryptographic Shakespeare," Omaha, NE [from author] 1994.

[LEA1]

Leary, Penn, " Supplement to The Second Cryptographic Shakespeare," Omaha, NE [from author] 1994.

[LEAU]

Leaute, H., "Sur les Mecanismes Cryptographiques de M. de Viaris," Le Genie Civil, XIII, Sept 1, 1888.

[LEDG]

LEDGE, "NOVICE NOTES," American Cryptogram Association, 1994. [ One of the best introductory texts on ciphers written by an expert in the field. Not only well written, clear to understand but as authoritative as they come! ]

top of page

[LENS]

Lenstra, A.K. et. al. "The Number Field Sieve," Proceedings of the 22 ACM Symposium on the Theory of Computing," Baltimore, ACM Press, 1990, pp 564-72.

[LEN1]

Lenstra, A.K. et. al. "The Factorization of the Ninth Fermat Number," Mathematics of Computation 61 1993, pp. 319-50.

[LEWI]

Lewin, Ronald, 'Ultra goes to War', Hutchinson, London 1978.

[LEWY]

Lewy, Guenter, "America In Vietnam", Oxford University Press, New York, 1978.

[LEVI]

Levine, J., U.S. Cryptographic Patents 1861-1981, Cryptologia, Terre Haute, In 1983.

[LEV1]

Levine, J. 1961. Some Elementary Cryptanalysis of Algebraic Cryptography. American Mathematical Monthly. 68:411-418

[LEV2]

Levine, J. 1961. Some Applications of High- Speed Computers to the Case n =2 of Algebraic Cryptography. Mathematics of Computation. 15:254-260

[LEV3]

Levine, J. 1963. Analysis of the Case n =3 in Algebraic Cryptography With Involuntary Key Matrix With Known Alphabet. Journal fuer die Reine und Angewante Mathematik. 213:1-30.

[LISI]

Lisicki, Tadeusz, 'Dzialania Enigmy', Orzet Biaty, London July-August, 1975; 'Enigma i Lacida', Przeglad lacznosci, London 1974- 4; 'Pogromcy Enigmy we Francji', Orzet Biaty, London, Sept. 1975.'

[LYNC]

Lynch, Frederick D., "Pattern Word List, Vol 1.," Aegean Park Press, Laguna Hills, CA, 1977.

top of page

[LYSI]

Lysing, Henry, aka John Leonard Nanovic, "Secret Writing," David Kemp Co., NY 1936.

[MACI]

Macintyre, D., "The Battle of the Atlantic," New York, Macmillan, 1961.

[MADA]

Madachy, J. S., "Mathematics on Vacation," Scribners, 1972.

[MAGN]

Magne, Emile, Le plaisant Abbe de Boisrobert, Paris, Mecure de France, 1909.

[MANN]

Mann, B.,"Cryptography with Matrices," The Pentagon, Vol 21, Fall 1961.

[MANS]

Mansfield, Louis C. S., "The Solution of Codes and Ciphers", Alexander Maclehose & Co., London, 1936.

[MARO]

Marotta, Michael, E. "The Code Book - All About Unbreakable Codes and How To Use Them," Loompanics Unlimited, 1979. [This is a terrible book. Badly written, without proper authority, unprofessional, and prejudicial to boot. And, it has one of the better illustrations of the Soviet one-time pad with example.]

[MARS]

Marshall, Alan, "Intelligence and Espionage in the Reign of Charles II," 1660-1665, Cambridge University, New York, N.Y., 1994.

[MART]

Martin, James, "Security, Accuracy and Privacy in Computer Systems," Prentice Hall, Englewood Cliffs, N.J., 1973.

[MAVE]

Mavenel, Denis L., Lettres, Instructions Diplomatiques et Papiers d' Etat du Cardinal Richelieu, Historie Politique, Paris 1853-1877 Collection.

top of page

[MAYA]

Coe, M. D., "Breaking The Maya Code," Thames and Hudson, New York, 1992.

[MAZU]

Mazur, Barry, "Questions On Decidability and Undecidability in Number Theory," Journal of Symbolic Logic, Volume 54, Number 9, June, 1994.

[MELL]

Mellen G. 1981. Graphic Solution of a Linear Transformation Cipher. Cryptologia. 5:1-19.

[MEND]

Mendelsohn, Capt. C. J., Studies in German Diplomatic Codes Employed During World War, GPO, 1937.

[MERK]

Merkle, Ralph, "Secrecy, Authentication and Public Key Systems," Ann Arbor, UMI Research Press, 1982.

[MER1]

Merkle, Ralph, "Secure Communications Over Insecure Channels," Communications of the ACM 21, 1978, pp. 294- 99.

[MER2]

Merkle, Ralph and Martin E. Hellman, "On the Security of Multiple Encryption ," Communications of the ACM 24, 1981, pp. 465-67.

[MER3]

Merkle, Ralph and Martin E. Hellman, "Hiding Information and Signatures in Trap Door Knapsacks," IEEE Transactions on Information Theory 24, 1978, pp. 525-30.

[MILL]

Millikin, Donald, " Elementary Cryptography ", NYU Bookstore, NY, 1943.

[MM]

Meyer, C. H., and Matyas, S. M., " CRYPTOGRAPHY - A New Dimension in Computer Data Security, " Wiley Interscience, New York, 1982.

top of page

[MODE]

Modelski, Tadeusz, 'The Polish Contribution to the Ultimate Allied Victory in the Second World War', Worthing (Sussex) 1986.

[MRAY]

Mrayati, Mohammad, Yahya Meer Alam and Hassan al- Tayyan., Ilm at-Ta'miyah wa Istikhraj al-Mu,amma Ind al-Arab. Vol 1. Damascus: The Arab Academy of Damascus., 1987.

[MULL]

Mulligan, Timothy," The German Navy Examines its Cryptographic Security, Oct. 1941, Military affairs, vol 49, no 2, April 1985.

[MYER]

Myer, Albert, "Manual of Signals," Washington, D.C., USGPO, 1879.

[NBS]

National Bureau of Standards, "Data Encryption Standard," FIPS PUB 46-1, 1987.

[NIBL]

Niblack, A. P., "Proposed Day, Night and Fog Signals for the Navy with Brief Description of the Ardois Hight System," In Proceedings of the United States Naval Institute, Annapolis: U. S. Naval Institute, 1891.

[NIC1]

Nichols, Randall K., "Xeno Data on 10 Different Languages," ACA-L, August 18, 1995.

[NIC2]

Nichols, Randall K., "Chinese Cryptography Parts 1-3," ACA-L, August 24, 1995.

[NIC3]

Nichols, Randall K., "German Reduction Ciphers Parts 1-4," ACA-L, September 15, 1995.

[NIC4]

Nichols, Randall K., "Russian Cryptography Parts 1-3," ACA-L, September 05, 1995.

[NIC5]

Nichols, Randall K., "A Tribute to William F. Friedman", NCSA FORUM, August 20, 1995.

top of page

[NIC6]

Nichols, Randall K., "Wallis and Rossignol," NCSA FORUM, September 25, 1995.

[NIC7]

Nichols, Randall K., "Arabic Contributions to Cryptography,", in The Cryptogram, ND95, ACA, 1995.

[NIC8]

Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse Code System," The Cryptogram, SO95, ACA publications, 1995.

[NIC9]

Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10, 1995.

[NICX]

Nichols, R. K., Keynote Speech to A.C.A. Convention, "Breaking Ciphers in Other Languages.," New Orleans, La., 1993.

[NICK]

Nickels, Hamilton, "Codemaster: Secrets of Making and Breaking Codes," Paladin Press, Boulder, CO., 1990.

[NORM]

Norman, Bruce, 'Secret Warfare', David & Charles, Newton Abbot (Devon) 1973.

[NORW]

Marm, Ingvald and Sommerfelt, Alf, "Norwegian," Teach Yourself Books, Hodder and Stoughton, London, 1967.

[NSA]

NSA's Friedman Legacy - A Tribute to William and Elizabeth Friedman, NSA Center for Cryptological History, 1992, pp 201 ff.

[OKLA]

Andre, Josephine and Richard V. Andree, "Cryptarithms," Unit One, Problem Solving and Logical Thinking, University of Oklahoma, Norman, Ok. Copy No: 486, 1976.

top of page

[OKLI]

Andre, Josephine and Richard V. Andree, " Instructors Manual For Cryptarithms," Unit One, Problem Solving and Logical Thinking, University of Oklahoma, Norman, Ok. Copy No: 486, 1976.

[OP20]

"Course in Cryptanalysis," OP-20-G', Navy Department, Office of Chief of Naval Operations, Washington, 1941.

[PERR]

Perrault, Charles, Tallement des Reaux, Les Historiettes, Bibliotheque del La Pleiade, Paris 1960, pp 256-258.

[PGP]

Garfinkel, Simson, "PGP: Pretty Good Privacy," O'reilly and Associates, Inc. Sebastopol, CA. 1995.

[PHIL]

Phillips, H., "My Best Puzzles in Logic and Reasoning," Dover, 1961.

[PIER]

Pierce, Clayton C., "Cryptoprivacy", 325 Carol Drive, Ventura, Ca. 93003.

[POLY]

Polya, G., "Mathematics and Plausible Reasoning," Princeton Press, 1954.

[POL1]

Polya, G., "How To Solve It.," Princeton Press, 1948.

[POPE]

Pope, Maurice, "The Story of Decipherment: From Egyptian Hieroglyphic to Linear B., Thames and Hudson Ltd., 1975.

[PORT]

Barker, Wayne G. "Cryptograms in Portuguese," Aegean Park Press, Laguna Hills, CA., 1986.

[POR1]

Aliandro, Hygino, "The Portuguese-English Dictionary," Pocket Books, New York, N.Y., 1960.

top of page

[PRIC]

Price, A.,"Instruments of Darkness: the History of Electronic Warfare, London, Macdonalds and Janes, 1977.

[RAJ1]

"Pattern and Non Pattern Words of 2 to 6 Letters," G & C. Merriam Co., Norman, OK. 1977.

[RAJ2]

"Pattern and Non Pattern Words of 7 to 8 Letters," G & C. Merriam Co., Norman, OK. 1980.

[RAJ3]

"Pattern and Non Pattern Words of 9 to 10 Letters," G & C. Merriam Co., Norman, OK. 1981.

[RAJ4]

"Non Pattern Words of 3 to 14 Letters," RAJA Books, Norman, OK. 1982.

[RAJ5]

"Pattern and Non Pattern Words of 10 Letters," G & C. Merriam Co., Norman, OK. 1982.

[REJE]

Rejewski, Marian, "Mathematical Solution of the Enigma Cipher" published in vol 6, #1, Jan 1982 Cryptologia pp 1-37.

[RENA]

Renauld, P. "La Machine a' chiffrer 'Enigma'", Bulletin Trimestriel de l'association des Amis de L'Ecole superieure de guerre no 78, 1978.

[RHEE]

Rhee, Man Young, "Cryptography and Secure Commun- ications," McGraw Hill Co, 1994

[RIVE]

Rivest, Ron, "Ciphertext: The RSA Newsletter 1, 1993.

[RIV1]

Rivest, Ron, Shamir, A and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Communications of the ACM 21, 1978.

top of page

[ROAC]

Roach, T., "Hobbyist's Guide To COMINT Collection and Analysis," 1330 Copper Peak Lane, San Jose, Ca. 95120- 4271, 1994.

[ROBO]

NYPHO, The Cryptogram, Dec 1940, Feb, 1941.

[ROHE]

Jurgen Rohwer's Comparative Analysis of Allied and Axis Radio-Intelligence in the Battle of the Atlantic, Proceedings of the 13th Military History Symposium, USAF Academy, 1988, pp 77-109.

[ROHW]

Rohwer Jurgen, "Critical Convoy Battles of March 1943," London, Ian Allan, 1977.

[ROH1]

Rohwer Jurgen, "Nachwort: Die Schlacht im Atlantik in der Historischen Forschung, Munchen: Bernard and Graefe, 1980.

[ROH2]

Rohwer Jurgen, et. al. , "Chronology of the War at Sea, Vol I, 1939-1942, London, Ian Allan, 1972.

[ROH3]

Rohwer Jurgen, "U-Boote, Eine Chronik in Bildern, Oldenburs, Stalling, 1962. Skizzen der 8 Phasen.

[ROOM]

Hyde, H. Montgomery, "Room 3603, The Story of British Intelligence Center in New York During World War II", New York, Farrar, Straus, 1963.

[ROSE]

Budge, E. A. Wallis, "The Rosetta Stone," British Museum Press, London, 1927.

[RSA]

RSA Data Security, Inc., "Mailsafe: Public Key Encryption Software Users Manual, Version 5.0, Redwood City, CA, 1994

[RUNY]

Runyan, T. J. and Jan M. Copes "To Die Gallently", Westview Press 1994, p85-86 ff.

top of page

[RYSK]

Norbert Ryska and Siegfried Herda, "Kryptographische Verfahren in der Datenverarbeitung," Gesellschaft fur Informatik, Berlin, Springer-Verlag1980.

[SADL]

Sadler, A. L., "The Code of the Samurai," Rutland and Tokyo: Charles E. Tuttle Co., 1969.

[SACC]

Sacco, Generale Luigi, " Manuale di Crittografia", 3rd ed., Rome, 1947.

[SALE]

Salewski, Michael, "Die Deutscher Seekriegsleitung, 1938- 1945, Frankfurt/Main: Bernard and Graefe, 1970- 1974. 3 volumes.

[SANB]

Sanbohonbu, ed., "Sanbohonbu kotokan shokuinhyo." NIDS Archives.

[SAPR]

Sapir, E., "Conceptual Categories in Primitive Language," Science: 74: 578-584., 1931.

[SASS]

Sassoons, George, "Radio Hackers Code Book", Duckworth, London, 1986.

[SCHN]

Schneier, Bruce, "Applied Cryptography: Protocols, Algorithms, and Source Code C," John Wiley and Sons, 1994.

[SCH2]

Schneier, Bruce, "Applied Cryptography: Protocols, Algorithms, and Source Code C," 2nd ed., John Wiley and Sons, 1995.

[SCHU]

Schuh, fred, "Master Book of Mathematical Recreation," Dover, 1968.

[SCHW]

Schwab, Charles, "The Equalizer," Charles Schwab, San Francisco, 1994.

top of page

[SEBE]

Seberry, Jennifer and Joseph Pieprzyk, "Cryptography: An Introduction to Computer Security," Prentice Hall, 1989. [CAREFUL! Lots of Errors - Basic research efforts may be flawed - see Appendix A pg 307 for example.]

[SHAN]

Shannon, C. E., "The Communication Theory of Secrecy Systems," Bell System Technical Journal, Vol 28 (October 1949).

[SHIN]

Shinsaku Tamura, "Myohin kosaku," San'ei Shuppansha, Toyko, 1953.

[SIG1]

"International Code Of Signals For Visual, Sound, and Radio Communications," Defense Mapping Agency, Hydrographic/Topographic Center, United States Ed. Revised 1981

[SIG2]

"International Code Of Signals For Visual, Sound, and Radio Communications," U. S. Naval Oceanographic Office, United States Ed., Pub. 102, 1969.

[SIMM]

Simmons, G. J., "How To Insure that Data Acquired to Verify Treaty Compliance are Trustworthy, " in "Authentication without secrecy: A secure communications problem uniquely solvable by asymmetric encryption techniques.", IEEE EASCON 79, Washington, 1979, pp. 661- 62.

[SINK]

Sinkov, Abraham, "Elementary Cryptanalysis", The Mathematical Association of America, NYU, 1966.

[SISI]

Pierce, C.C., "Cryptoprivacy," Author/Publisher, Ventura Ca., 1995. (XOR Logic and SIGTOT teleprinters)

[SMIH]

Smith, David E., "John Wallis as Cryptographer", Bulletin of American Mathematical Society, XXIV, 1917.

[SMIT]

Smith, Laurence D., "Cryptography, the Science of Secret Writing," Dover, NY, 1943.

top of page

[SOLZ]

Solzhenitsyn, Aleksandr I. , "The Gulag Archipelago I- III, " Harper and Row, New York, N.Y., 1975.

[SPAN]

Barker, Wayne G. "Cryptograms in Spanish," Aegean Park Press, Laguna Hills, CA., 1986.

[STEV]

Stevenson, William, 'A Man Called INTREPID', Macmillan, London 1976.

[STIN]

Stinson, D. R., "Cryptography, Theory and Practice," CRC Press, London, 1995.

[STIX]

Stix, F., Zur Geschicte und Organisation der Wiener Geheimen Ziffernkanzlei, Mitteilungen des Osterreichischen Instituts fir Geschichtsforschung, LI 1937.

[STUR]

Sturtevant, E. H. and Bechtel, G., "A Hittite Chrestomathy," Linguistic Society of American and University of Pennsylvania, Philadelphia, 1935.

[SUVO]

Suvorov, Viktor "Inside Soviet Military Intelligence," Berkley Press, New York, 1985.

[TERR]

Terrett, D., "The Signal Corps: The Emergency (to December 1941); G. R. Thompson, et. al, The Test( December 1941 - July 1943); D. Harris and G. Thompson, The Outcome;(Mid 1943 to 1945), Department of the Army, Office of the Chief of Military History, USGPO, Washington,1956 -1966.

[THEO]

Theodore White and Annalee Jacoby, "Thunder Out Of China," William Sloane Assoc., New York, 1946.

[THOM]

Thompson, Ken, "Reflections on Trusting Trust," Communications of the ACM 27, 1984.

[TILD]

Glover, D. Beaird, Secret Ciphers of The 1876 Presidential Election, Aegean Park Press, Laguna Hills, Ca. 1991.

top of page

[TM32]

TM 32-250, Fundamentals of Traffic Analysis (Radio Telegraph) Department of the Army, 1948.

[TRAD]

U. S. Army Military History Institute, "Traditions of The Signal Corps., Washington, D.C., USGPO, 1959.

[TRAI]

Lange, Andre and Soudart, E. A., "Treatise On Cryptography," Aegean Park Press, Laguna Hills, Ca. 1981.

[TRIB]

Anonymous, New York Tribune, Extra No. 44, "The Cipher Dispatches, New York, 1879.

[TRIT]

Trithemius:Paul Chacornac, "Grandeur et Adversite de Jean Tritheme ,Paris: Editions Traditionelles, 1963.

[TUCK]

Harris, Frances A., "Solving Simple Substitution Ciphers," ACA, 1959.

[TUKK]

Tuckerman, B., "A Study of The Vigenere-Vernam Single and Multiple Loop Enciphering Systems," IBM Report RC2879, Thomas J. Watson Research Center, Yorktown Heights, N.Y. 1970.

[TUCM]

Tuckerman, B., "A Study of The Vigenere-Vernam Single and Multiple Loop Enciphering Systems," IBM Report RC2879, Thomas J. Watson Research Center, Yorktown Heights, N.Y. 1970.

[UBAL]

Ubaldino Mori Ubaldini, "I Sommergibili begli Oceani: La Marina Italian nella Seconda Guerra Mondiale," vol XII, Roma, Ufficio Storico della Marina Militare, 1963.

[USAA]

U. S. Army, Office of Chief Signal Officer, "Instructions for Using the Cipher Device Type M-94, February, 1922," USGPO, Washington, 1922.

top of page

[VAIL]

Vaille, Euggene, Le Cabinet Noir, Paris Presses Universitaires de Frances, 1950.

[VALE]

Valerio, "De La Cryptographie," Journal des Scienses militares, 9th series, Dec 1892 - May 1895, Paris.

[VAND]

Van de Rhoer, E., "Deadly Magic: A personal Account of Communications Intilligence in WWII in the Pacific, New York, Scriber, 1978.

[VERN]

Vernam, A. S., "Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications," J. of the IEEE, Vol 45, 109-115 (1926).

[VIAR]

de Viaris in Genie Civil: "Cryptographie", Publications du Journal Le Genie Civil, 1888.

[VIA1]

de Viaris, "L'art de chiffre et dechiffre les depeches secretes," Gauthier-Villars, Paris, 1893.

[VOGE]

Vogel, Donald S., "Inside a KGB Cipher," Cryptologia, Vol XIV, Number 1, January 1990.

[WALL]

Wallis, John, "A Collection of Letters and other Papers in Cipher" , Oxford University, Bodleian Library, 1653.

[WAL1]

Wallace, Robert W. Pattern Words: Ten Letters and Eleven Letters in Length, Aegean Park Press, Laguna Hills, CA 92654, 1993.

[WAL2]

Wallace, Robert W. Pattern Words: Twelve Letters and Greater in Length, Aegean Park Press, Laguna Hills, CA 92654, 1993.

top of page

[WATS]

Watson, R. W. Seton-, ed, "The Abbot Trithemius," in Tudor Studies, Longmans and Green, London, 1924.

[WEBE]

Weber, Ralph Edward, "United States Diplomatic Codes and Ciphers, 1175-1938, Chicago, Precedent Publishing, 1979.

[WEL]

Welsh, Dominic, "Codes and Cryptography," Oxford Science Publications, New York, 1993.

[WELC]

Welchman, Gordon, 'The Hut Six Story', McGraw-Hill, New York 1982.

[WHOR]

Whorf, B. L., "A Linguistic Consideration of Thinking In Primitive Communities," In Language, Thought, and Reality: Selected Writings of Benjamin Lee Whorf, ed. J. B. Carroll, Cambridge, MA: MIT Press, pp. 65-86., 1956.

[WINT]

Winton, J., " Ultra at Sea: How Breaking the Nazi Code Affected Allied Naval Strategy During WWII," New Uork, William Morror, 1988.

[WINK]

Winkle, Rip Van, "Hungarian: The Cryptogram,", March - April 1956.

[WINT]

Winterbotham, F.W., 'The Ultra Secret', Weidenfeld and Nicolson, London 1974.

[WOLE]

Wolfe, Ramond W., "Secret Writing," McGraw Hill Books, NY, 1970.

[WOLF]

Wolfe, Jack M., " A First Course in Cryptanalysis," Brooklin College Press, NY, 1943.

top of page

[WRIX]

Wrixon, Fred B. "Codes, Ciphers and Secret Languages," Crown Publishers, New York, 1990.

[XEN1]

PHOENIX, "Xenocrypt Handbook," American Cryptogram Association, 1 Pidgeon Dr., Wilbraham, MA., 01095-2603, for publication March, 1996.

[YARD]

Yardley, Herbert, O., "The American Black Chamber," Bobbs-Merrill, NY, 1931.

[YAR1]

Yardley, H. O., "The Chinese Black Chamber," Houghton Mifflin, Boston, 1983.

[YOKO]

Yukio Yokoyama, "Tokushu joho kaisoka," unpublished handwritten manuscript.

[YOUS]

Youshkevitch, A. P., Geschichte der Mathematik im Mittelatter, Liepzig, Germany: Teubner, 1964.

[YUKI]

Yukio Nishihara, "Kantogan tai-So Sakusenshi," Vol 17., unpublished manuscript, National Institute for Defense Studies Military Archives, Tokyo.,(hereafter NIDS Archives)

[ZIM]

Zim, Herbert S., "Codes and Secret Writing." William Morrow Co., New York, 1948.

[ZEND]

Callimahos, L. D., Traffic Analysis and the Zendian Problem, Agean Park Press, 1984. (also available through NSA Center for Cryptologic History)



Data Security Solutions, Inc.

Privacy Statement

Copyright © 1994 - 2009 Data Security Solutions, Inc. All rights reserved.
All registered marks and trademarks mentioned in this site are the property of their owners.