Cryptology
Tracer Bullet 96-2
Cryptology is the art and science of making and breaking codes
and ciphers. Cryptography is that part of cryptology concerned
with the putting of messages into a secret or encrypted form,
and cryptanalysis is the reading of encrypted messages without
having authorized knowledge of the key that was used in encryption.
With advances in computers and telecommunications and increased
dependence on such systems, the use of cryptography has found
new applications in the lives of individuals and in the world
of commerce. Cryptography has proven to be the best technique
for protecting information transmitted through accessible communication
networks such as telephone lines, satellites, or microwave systems.
Cryptology was once the domain of the government, especially
for military and diplomatic personnel, but it is more and more
becoming a mathematical discipline, as mathematics provides the
theoretical justification behind the strength of a particular
encryption system. While this makes possible much more interesting,
complicated, and sophisticated encryption systems, it also means
that a degree of mathematical expertise is required.
This guide is not intended as a comprehensive bibliography.
Based on holdings of the Library of Congress, it is designed
-- as the name of the series implies -- to put the reader "on
target." Refer also to a related guide, Computer Crime and
Security (TB 94-1).
TOP OF PAGE
Building in big brother: the cryptographic policy debate.
Edited by Lance J. Hoffman. New York, Springer-Verlag, c1995.
560 p.
Includes bibliographical references.
QA76.9.A25B85 1995
Meyer, Carl H., Stephen M. Matyas, and Don Coppersmith. Cryptography.
In McGraw-Hill encyclopedia of science & technology. 7th
ed. v. 4. New York, McGraw-Hill, c1992. p. 564-572.
Includes bibliographical references.
Q121.M3 1992 and Pamphlet box
Schneier, Bruce. E-mail security: how to keep your electronic
messages private. New York, Wiley, c1995. 365 p.
HE6239.E54S36 1995
TOP OF PAGE
Subject headings used by the Library of Congress,
under which books on cryptology can be located in most card, book,
and online catalogs, include the following:
Highly Relevant
CRYPTOGRAPHY
See also subdivision "Cryptography" under
individual wars, e.g., " World War, 1939-1945--Cryptography"; " World
War, 1914-1918--Cryptography"
See also subdivisions "Security Measures", and "Access
Control" under various other headings, e.g., " Computers--Access Control--Passwords"
Relevant
CRYPTOGRAMS
CRYPTOGRAPHERS
CRYPTOGRAPHY EQUIPMENT INDUSTRY
Related
CIPHER AND TELEGRAPH CODES
CIPHERS
CODING THEORY
DATA COMPRESSION (COMPUTER SCIENCE)
DATA COMPRESSION (TELECOMMUNICATION)
DATA ENCRYPTION (COMPUTER SCIENCE)
MACHINE CIPHERS
TELEGRAPH
TOP OF PAGE
Bauer, Friedrich Ludwig. Decrypted secrets: methods and maxims
of cryptology. Berlin, New York, Springer, c1997. 447 p.
Bibliography: p. 428-430.
Translation of: Entzifferte Geheimnisse: Methoden und Maximen
der Kryptologie.
QA76.9.A25B38513 1997
Beckett, Brian. Introduction to cryptology. Oxford,
Eng., Boston, Blackwell Scientific Publications; Palo Alto, Calif.,
distributors USA and Canada, Blackwell Scientific Publications,
1988. 344 p.
Bibliography: p. 336-338.
Updated edition: Introduction to cryptology and PC security,
c1997, not yet in LC.
QA76.9.A25B43 1988
Beker, Henry, and Fred Piper. Cipher systems: the protection
of communications.
Z104.B39 1982
Bibliography: p. 407-421.
New York, Wiley, c1982. 427 p.
Contemporary cryptology: the science of information integrity.
Edited by Gustavus J. Simmons. Piscataway, N.J., IEEE Press, c1992.
640 p.
Includes bibliographical references.
QA76.9.A25C6678 1992
Davies, Donald Watts, and W. L. Price. Security for computer
networks: an introduction to data security in teleprocessing
and electronic funds transfer. 2nd ed. Chichester, Eng.,
New York, Wiley, c1989. 377 p.
Includes bibliographical references.
TK5105.D43 1989
Kahn, David. The codebreakers: the story of secret writing.
Rev. ed. New York, Scribner, c1996. 1181 p.
Bibliography: p. 985-987.
Z103.K28 1996
Schneier, Bruce. Applied cryptography: protocols, algorithms,
and source code in C. 2nd ed. New York, Wiley, c1996. 758
p.
Bibliography: p. 675-741.
QA76.9.A25S35 1996
Stinson, Douglas R. Cryptography: theory and practice.
Boca Raton, CRC Press, c1995. 434 p.
Bibliography: p. 413-427.
QA268.S75 1995<
TOP OF PAGE
Bosworth, Bruce. Codes, ciphers, and computers: an introduction
to information security. Rochelle Park, NJ, Hayden Book
Co., c1982. 259 p.
Includes bibliographical references.
Z103.B58 1982
Brassard, Gilles. Modern cryptology: a tutorial. New
York, Springer- Verlag, c1988. 107 p. (Lecture notes in computer
science, 325)
Bibliography: p. 91-107.
QA76.9.A25B73 1988
Gaines, Helen Fouche. Elementary cryptanalysis. Boston,
American Photographic
Z104.G15
Publishing Co., 1939. 230 p.
Garfinkel, Simson. PGP: pretty good privacy. Sebastopol,
Calif., O'Reilly & Associates, c1995. 393 p.
Bibliography: p. 377-379.
QA76.9.A25G36 1995
Katzan, Harry. The standard data encryption algorithm.
New York, PBI, c1977. 134 p.
QA76.9.A25K37
Konheim, Alan G. Cryptography, a primer. New York, Wiley,
c1981. 432 p.
Bibliography: p. 365-370.
Z103.K66
Rhee, Man Young. Cryptography and secure communications.
Singapore, New York, McGraw-Hill, c1994. 504 p.
Includes bibliographical references.
QA76.9.A25R44 1994
Sacco, Luigi. Manuale di crittografia. 3rd ed. Rome,
1947. 374 p.
Z104.S3 1947
An English translation, entitled Manual of cryptography, has been published
(Laguna Hills, Calif., Aegean Park Press, c1977. 193 p.), but is not yet in
LC collections.
Secure communications and asymmetric cryptosystems.
Edited by Gustavus J. Simmons. Boulder Colo., Published by Westview
Press for the American Association for the Advancement of Science,
1982. 338 p. (AAAS selected symposium, 69)
Includes bibliographical references.
Z103.S42 1982
Sinkov, Abraham. Elementary cryptanalysis: a mathematical
approach. New York, Random House, c1968. 189 p. (New mathematical
library, 22)
Bibliography: p. 184-186.
Z104.S47
Stallings, William. Network and internetwork security: principles
and practice. Englewood Cliffs, NJ, Prentice Hall, New York,
IEEE, c1995. 462 p.
Bibliography: p. 449-456.
TK5105.5.S728 1995
Stallings, William. Practical cryptography for data internetworks.
Los Alamitos, Calif., IEEE Computer Society Press, 1996. 356 p.
Includes bibliographical references.
Not yet in LC.
Tilborg, Henk C. A. van. An introduction to cryptology.
Boston, Kluwer Academic Publishers, c1988. 170 p. (The Kluwer international
series in engineering and computer science, SECS 52. Communications
and information theory)
Bibliography: p. 159-164.
Z103.T54 1988
Wayner, Peter. Digital cash: commerce on the Net. 2nd
ed. Boston, AP Professional, c1997. 359 p.
Bibliography: p. 345-353.
HG1710.W39 1997
Wayner, Peter. Disappearing cryptography: being and nothingness
on the Net. Boston, AP Professional, c1996. 295 p.
Bibliography: p. 279-289.
TK5105.59.W39 1996
Welsh, Dominic. Codes and cryptography. Oxford, Eng.,
Clarendon Press; New York, Oxford University Press, 1988. 257 p.
Bibliography: p. 243-252.
Z103.W46 1988
TOP OF PAGE
Andreassen, Karl. Computer cryptology: beyond decoder rings.
Englewood Cliffs, NJ, Prentice-Hall, c1988. 268 p.
Bibliography: p. 259-262.
Karl Andreassen is the pseudonym of Waldo T. Boyd.
Z103.B65 1988
Biham, Eli, and Adi Shamir. Differential cryptanalysis of
the data encryption standard. New York, Springer-Verlag,
c1993. 188 p.
Bibliography: p. 183-185.
QA76.9.A25B54 1993
Denning, Dorothy Elizabeth Robling. Cryptography and data
security. Reading, Mass., Addison-Wesley, c1982. 400 p.
Includes bibliographical references.
QA76.9.A25D46 1982
Foster, Caxton C. Cryptanalysis for microcomputers.
Rochelle Park, NJ, Hayden Book Co., c1982. 333 p.
Includes bibliographical references.
Z103.F67 1982
Friedman, William F. Military cryptanalysis. Prepared
under the direction of the Chief Signal Officer. 3rd ed. Washington,
U.S. Govt. Print. Off., c1942. 1 v. (unpaged)
Not in LC collection.
Includes bibliographical references.
A reprint in four volumes, which should soon be available in
LC, has been published separately by Aegean Park Press. These are: pt. 1, Monoalphabetic
substitution systems (1980. 149 p.); pt. 2, Simpler varieties of polyalphabetic
substitution systems (1984. 158 p.); pt. 3, Simpler varieties of aperiodic
substitution systems (1992. 119 p.); and pt. 4, Transposition and fractionating
systems (1992. 189 p.). The four volumes are no. 30, 40, 60, and 61 respectively
in the Cryptographic Series. The third volume is a reprint of the text published
in 1939 and the fourth is a reprint of the text published in 1941.
Golomb, Solomon W. Shift register sequences. With portions
co- authored by Lloyd R. Welch, Richard M. Goldstein, and Alfred
W. Hales. Rev. ed. Laguna Hills, Calif., Aegean Park Press, c1982.
247 p.
Bibliography: p. 231-247.
QA267.5.S4G6 1982
Meyer, Carl H., and Stephen M. Matyas. Cryptography: a new
dimension in computer data security: a guide for the design and
implementation of secure systems. New York, Wiley, 1982.
755 p.
Includes bibliographical references.
Z103.M55 1982
Public-key cryptography: state of the art and future directions:
E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991: final
report. Thomas Beth, Markus Frisch, Gustavus J. Simmons,
eds. Berlin, New York, Springer- Verlag, c1992. 97 p. (Lecture
notes in computer science, 578)
Bibliography: p. 83-97.
QA76.9.A25P83 1992
Rueppel, Rainer A. Analysis and design of stream ciphers.
Berlin, New York, Springer-Verlag, c1986. 244 p.
Bibliography: p. 231-236.
TK5105.R83 1986
Salomaa, Arto. Public-key cryptography. 2nd, enl. ed.
Berlin, New York, Springer-Verlag, c1996. 271 p.
Includes bibliographical references.
QA76.9.A25S26 1996
Seberry, Jennifer, and Josef Pieprzyk. Cryptography: an introduction
to computer security. New York, Prentice-Hall, c1989. 375
p.
Bibliography: p. 344-365.
QA76.9.A25S37 1989
Stallings, William. Protect your privacy: the PGP user's
guide. Englewood Cliffs, NJ, Prentice Hall PTR, c1995. 302
p.
TK5102.85.S73 1995
Zimmermann, Philip. The official PGP user's guide. Cambridge,
Mass., MIT Press, c1995. 127 p.
Includes bibliographical references.
TK5102.85.Z56 1995
Zimmermann, Philip. PGP source code and internals. Cambridge,
Mass.,
TK5102.85.Z58 1995
MIT Press, c1995. 907 p.
Zimmermann, Philip. Pretty good privacy: 3.0 pre-alpha source
code, preliminary release 1.1: distributed at the December 14,
1996 Public Cyberpunks Meeting. Palo Alto, Calif., Warthman
Associates, c1996. 312 p.
TK5102.85.Z59 1996
Specialized Titles of Historical Interest
Andrew, Christopher M. For the president's eyes only: secret
intelligence and the American presidency from Washington to Bush. New
York, HarperCollins Publishers, c1995. 660 p.
Bibliography: p. 627-646.
JK468.I6A844 1995
Bamford, James. The puzzle palace: a report on America's
most secret agency. Harmondsworth, Middlesex, Eng., New
York, Penguin Books, 1983, c1982. 655 p.
Includes bibliographical references.
UB251.U5B35 1983
Bennett, Ralph. Behind the battle: intelligence in the war
with Germany, 1939-45. London, Sinclair-Stevenson, 1994.
328 p.
Not in LC collection.
Bennett, Ralph Francis. Ultra and Mediterranean strategy. New
York, Morrow, c1989. 496 p.
Bibliography: p. 478-483.
D766.B46 1989
Bennett, Ralph Francis. Ultra in the West: the Normandy campaign
of 1944- 45. London, Hutchinson, 1979. 305 p.
Bibliography: p. 248-250.
D756.5.N6B44
Boyd, Carl. Hitler's Japanese confidant: General Oshima Hiroshima
and MAGIC intelligence, 1941-1945. Lawrence, University
Press of Kansas, c1993. 271 p.
Bibliography: p. 243-261.
D810.C88B69 1993
Burke, Colin B. Information and secrecy: Vannevar Bush, Ultra,
and the other Memex. Metuchen, NJ, Scarecrow Press, 1994.
466 p.
Bibliography: p. 377-450.
HD9696.C772B87 1994
Codebreakers: the inside story of Bletchley Park. Edited
by F. H. Hinsley, Alan Stripp. Oxford, Eng., New York, Oxford University
Press, 1994. 321 p.
D810.C88C63 1994
Cryptology: machines, history, & methods. Cipher
Deavours and others. Norwood, Mass., Artech House, c1989. 508 p.
Includes bibliographical references.
Z103.C75 1989
"Second vol. of articles selected from Crytologia. Continues
Cryptology yesterday, today, and tomorrow."
Cryptology yesterday, today, and tomorrow. Cipher A.
Deavours and others. Boston, Artech House, c1987. 519 p.
Includes bibliographical references.
Z103.C76 1987
Deavours, Cipher A., and Louis Kruh. Machine cryptography
and modern cryptanalysis. Dedham, Mass., Artech House, c1985.
258 p.
Z103.D43 1985
Drea, Edward J. MacArthur's ULTRA: codebreaking and the war
against Japan, 1942-1945. Lawrence, University Press of
Kansas, c1992. 296 p.
Bibliography: p. 275-282.
D767.D66 1992
Hinsley, F. H. British intelligence in the Second World War.
With E. E. Thomas, C. F. G. Ransom, R. C. Knight. New York, Cambridge
University Press, 1979-1990. 5 v.
Includes bibliographical references.
A one-volume abridgement (628 p. D810.S7H49 1993) with the
same title was published by Cambridge University Press in 1993.
D810.S7H49
Holmes, W. J. Double-edged secrets: US naval intelligence
operations in the Pacific during World War II. Annapolis,
Naval Institute Press, c1979. 231 p
D810.S7H637
Kahn, David. Kahn on codes: secrets of the new cryptology.
New York, Macmillan, c1983. 343 p.
Includes bibliographical references.
Z103.K29 1983
Kahn, David. Seizing the enigma: the race to break the German
U-boat codes, 1939-1943. Boston, Houghton Mifflin Co., 1991.
336 p.
Bibliography: p. 311-326.
D810.C88K34 1991
Layton, Edwin T. "And I was there": Pearl Harbor
and Midway--breaking the secrets. With Roger Pineau and
John Costello. New York, W. Morrow, c1985. 596 p.
D767.92.L39 1985
Bibliography: p. 570-581.
McClain, S. Navajo weapon. Boulder, Colo., Books Beyond
Borders, c1994. 304 p.
Bibliography: p. 294-296.
D810.C88M38 1994
The Most mysterious manuscript: the Voynich "Roger Bacon" cipher
manuscript. Edited by Robert S. Brumbaugh. Carbondale, Southern
Illinois University Press, c1978. 175 p.
Bibliography: p. 161-165.
Z104.M67
Stripp, Alan. Codebreaker in the Far East. London, Totowa,
NJ, F. Cass, c1989. 204 p.
Bibliography: p. 192-199.
D810.C88S76 1989
Tuchman, Barbara Wertheim. The Zimmermann telegram.
New York, Macmillan, 1966. 244 p.
Bibliography: p. 205-212.
D511.T77 1966
US Army Signals Intelligence in World War II: a documentary
history. Edited by James L. Gilbert and John P. Finnegan.
Washington, Center of Military History, United States Army, 1993.
237 p.
D810.S7U7 1993
Weber, Ralph Edward. Masked dispatches: cryptograms and cryptology
in American history, 1775-1900. Fort George G. Meade, Md.,
Center for Cryptologic History, National Security Agency, 1993.
236 p. (United States cryptologic history. Series 1, Pre-World
War I, v. 1)
Bibliography: p. 233-236.
Z103.4.U6W43 1993
Weber, Ralph Edward. United States diplomatic codes and ciphers,
1775-1938. Chicago, Precedent Pub., 1979. 633 p.
Bibliography: p. 262-270.
Z103.W4
Welchman, Gordon. The Hut Six story: breaking the Enigma
codes. New York, McGraw-Hill, c1982. 326 p.
Bibliography: p. 315-317.
D810.C88W44
Wright, Peter. Spycatcher: the candid autobiography of a
senior intelligence officer. New York, Viking, 1987. 329
p.
UB271.G72W758 1987
Yardley, Herbert Osborn. The American black chamber.
Indianapolis, The Bobbs-Merrill Co., c1931. 375 p.
D639.S7Y3 1931a
TOP OF PAGE
Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone. Handbook
of applied cryptography. Boca Raton, CRC Press, c1997. 780
p.
Bibliography: p. 703-754.
QA76.9.A25M463 1997
Shulman, David. A glossary of cryptography. New York,
Crypto Press, c1961. (unpaged)
Z103.H3
AUSCRYPT '92 (1992, Gold Coast, Qld.). Advances in cryptology,
AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic
Techniques, Gold Coast, Queensland, Australia, December 13-16,
1992: proceedings. Jennifer Seberry, Yuliang Zheng, eds.
Berlin, New York, Springer-Verlag, c1993. 542 p. (Lecture notes
in computer science, 718)
Includes bibliographical references.
QA76.9.A25A87 1992
CRYPTO '95. Advances in cryptology, CRYPTO '95, 15th Annual
International Cryptology Conference, Santa Barbara, California,
USA, August 27-31, 1995, proceedings. Don Coppersmith, ed.
Berlin, New York, Springer, 1995. 465 p. (Lecture notes in computer
science, 963)
Includes bibliographical references.
QA76.9.A25C78a 1995
Cryptography and coding: 5th IMA Conference, Cirencester,
UK, December 18- 20, 1995, proceedings. Colin Boyd, ed.
Berlin, New York, Springer, c1995. 291 p. (Lecture notes in computer
science, 1025)
Includes bibliographical references.
QA268.C76 1995
EUROCRYPT '96 (1996, Saragossa, Spain). Advances in cryptology,
EUROCRYPT '96: International Conference on the Theory and Application
of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996,
proceedings. Ueli Maurer, ed. Berlin, New York, Springer,
c1996. 416 p. (Lecture notes in computer science, 1070)
Includes bibliographical references.
QA76.9.A25E962a 1996
International Conference on the Theory and Applications of Cryptology
(4th, 1994, Wollongong, N.S.W.). Advances in cryptology, ASIACRYPT
'94, 4th International Conference on the Theory and Applications
of Cryptology, Wollongong, Australia, November 28-December 1, 1994,
proceedings. Josef Pieprzyk, Reihanah Safavi-Naini, eds. Berlin,
New York, Springer, c1995. 430 p. (Lecture notes in computer science,
917).
Includes bibliographical references.
QA76.9.A25I555 1994
TOP OF PAGE
Galland, Joseph Stanislaus. An historical and analytical
bibliography of the literature of cryptology. New York,
AMS Press, 1970, c1945. 209 p. (Northwestern University studies
in the humanities, no. 10)
Z103.A1G3 1970
Shulman, David. An annotated bibliography of cryptography.
New York, Garland Pub., 1976. 388 p. (Garland reference library
of the humanities, v. 37)
Z103.A1S58
TOP OF PAGE
DES modes of operation. Washington, US Department of
Commerce, National Bureau of Standards, Institute for Computer
Sciences and Technology, 1980. 30 p. (Federal information processing
standards publication, FIPS PUB 81)
Federal Specifications Communication/Computer Cartridge AC52,
frames 447-476
Digital encryption standard (DES). Gaithersburg, Md.,
US Department of Commerce, National Institute of Standards and
Technology, 1993. 20 p. (Federal information processing standards
publication, FIPS PUB 46-2)
Federal Specifications Communication/Computer Cartridge AC67,
frames 155-174
Digital signature standard (DSS). Gaithersburg, Md.,
US Department of Commerce, National Institute of Standards and
Technology, 1994. 24 p. (Federal information processing standards
publication, FIPS PUB 186)
Federal Specifications Communication/Computer Cartridge AC67,
frames 1474-1497
Escrowed encryption standard (EES). Gaithersburg, Md.,
US Department of Commerce, National Institute of Standards and
Technology, 1994. 11 p. (Federal information processing standards
publication, FIPS PUB 185)
Federal Specifications Communication/Computer Cartridge AC67,
frames 1463-1473
Nechvatal, James. Public-key cryptography: computer security.
Gaithersburg, Md., US Department of Commerce, National Institute
of Standards and Technology, 1991. 162 p. (NIST special publication,
800-2)
QC100.U57 no. 800-2
Bibliography: 147-162.
Security requirements for cryptographic modules. Gaithersburg,
Md., US Department of Commerce, National Institute of Standards
and Technology, 1994. 42 p. (Federal information processing standards
publication, FIPS PUB 140-1)
Federal Specifications Communication/Computer Cartridge AC67,
frames 405-446
TOP OF PAGE
Technical Reports and other types of literature are indexed in
the following guides:
Government Reports Announcements & Index (1895-
)
Z7916.G78 <SciRR A&I> and CD-ROM
See: Coding
Cryptography
Cryptology
Data Encryption
Data Processing Security
Secure Communications
Monthly Catalog of United States Government Publications (1895- )
Z1233.A18 <SciRR A&I> and Computer format
See: Coding Theory
Cryptography
Data Protection
SELECTED TECHNICAL REPORTS
Reports listed below are available upon request in the Science Reading Room.
They and other reports on the subject may also be purchased from the National
Technical Information Service (NTIS), Springfield, Virginia 22161. NTIS telephone:
(703) 487-4650.
Baum, M. S. Federal certification authority liability and
policy: law and policy of certificate-based public key and digital
signatures. Cambridge, Mass., Independent Monitoring, 1994.
485 p. (NIST/GRC-94/654)
PB94-191202
Cheung, Terry. PEM public key certificate cache server. Livermore,
Calif., Lawrence Livermore National Laboratory, 1993. 18 p. (UCRL-MA-115651)
DE94-006404
Feingold, Richard A. The potential of quantum cryptography
for secure private communications. Livermore, Calif., Lawrence
Livermore National Laboratory, 1993. 19 p. (UCRL-JC-11335)
DE93-017188
Good security practices for electronic commerce, including
electronic data interchange. Edited by Roy G. Saltman. Gaithersburg,
Md., National Institute of Standards and Technology, 1993. 68
p. (NIST/SP-800/9)
PB94-139045
Information security and privacy in network environments. Washington,
Office of Technology Assessment, 1994. 252 p. (OTA-TCT-606)
PB95-109203
McNees, R. A., and others. Cryptosystems based on chaotic
dynamics. Oak Ridge, Tenn., Oak Ridge National Laboratory,
1993. 17 p. (ORNL/TM-12440)
DE94-004256
Witzke, Edward L., and Lyndon G. Pierson. Key management
for large scale end-to-end encryption. Albuquerque, N.M.,
Sandia National Laboratories, 1994. 7 p. (SAND-94-1556C)
DE94-014284
TOP OF PAGE
Abstracting and indexing services that index relevant
journal articles and other literature on cryptology are listed
below.
ACM Guide to Computing Literature (1977- )
QA75.5.A75a <SciRR A&I>
See: Cryptography
Applied Science & Technology Index (1913- )
Z7913.I7 <SciRR A&I> and Computer format
See: Computer User Identification
Cryptanalysis
Cryptographic Keys
Cryptography
Data Encryption Standard
Encryption Algorithms
Public Key Cryptosystems
Computer Abstracts (1957- )
Z6654.C17C64 <SciRR A&I>
See: Cryptography
Cryptosystems
Security
Computer and Control Abstracts (1957- )
QA76.C548 <SciRR A&I>
See: Cryptography
Data Privacy
Message Authentication
Public Key Cryptography
Computer and Information Systems Abstracts (1962- )
QA76.I46 <SciRR A&I>
See: Cryptography
Security of Data
Computer Literature Index (1968- )
QA76.Q3 <SciRR A&I>
See: Cryptography
Privacy
Security
Computing Reviews (1960- )
QA76.C5854 <SciRR A&I>
See: Data Encryption
Engineering Index (1884- )
Z5851.E62 <SciRR A&I> and CD-ROM
See: Algorithms
Codes (Symbols)
Cryptography
Data Handling
Encoding (Symbols)
Security of Data
Information Science Abstracts (1966- )
Z699.A1D6 <SciRR A&I>
See: Cryptography
Encryption
INSPEC (1969- )
Computer format
(Corresponds to the print publications: Science Abstracts.
Series A, Physics Abstracts; Science Abstracts. Series B, Electrical and Electronics
Abstracts; and Science Abstracts. Series C, Computer & Control Abstracts;
with the addition of section D of the INSPEC database (covering information technology),
which has no print equivalent, and the complete INSPEC Thesaurus.)
See: Cryptography
Data Privacy
Public Key Cryptography
Security of Data
Magazine Index (1980- )
Computer format
See: Ciphers
Code Breaking
Codes
Cryptography
Data Encryption
Data Security
Digital Signatures
Encryption
Public key cryptosystems
Readers' Guide to Periodical Literature (1900- )
AI3.R48 <B&E>,<N&CPR>, and Computer format
See: Cryptography
TOP OF PAGE
Journals that often contain relevant articles include the following:
Cryptologia
|
Z102.5.C79 |
Journal of Cryptology |
Z102.5.J68 |
Cryptosystems Journal |
QA76.9.A25C85 |
Designs, Codes, and Cryptography |
QA166.25.D48 |
Cryptogram |
Z104.C9 |
TOP OF PAGE
Bours, Patrick A. H. On the construction of perfect deletion-correcting
codes using design theory. Designs, codes and cryptography,
v. 6, July 1995: 5-20.
QA166.25.D48
Carroll, John M., and Sri Nurdiati. Weak keys and weak data foiling
the two nemeses. Cryptologia, v. 18, July 1994: 253-280.
Z102.5.C79
Coppersmith, D. The data encryption standard (DES) and its strength
against attacks. IBM journal of research and development, v.
38, May 1994: 243-250.
TK7800.I14
Franson, J. D., and H. Ilves. Quantum cryptography using optical
fibers. Applied optics, v. 33, May 10, 1994: 2949-2954.
QC350.O62
Giddy, J. P., and R. Safavi-Naini. Automated cryptanalysis of
transposition ciphers. Computer journal, v. 37, no. 5,
1994: 429-436.
QA76.C57
Greenfield, Gary R. Yet another matrix cryptosystem. Cryptologia,
v. 18, Jan. 1994: 41-51.
Z102.5.C79
Kemmerer, R., C. Meadows, and J. Millen. Three systems for cryptographic
protocol analysis. Journal of cryptology, v. 7, spring
1994: 79-130.
Z102.5.J68
Kim, B. G., and P. Wang. ATM network: goals and challenges. Communications
of the ACM, v. 38, Feb. 1995: 39-44, 109.
QA76.A772
King, John C. An algorithm for the complete automated cryptanalysis
of periodic polyalphabetic substitution ciphers. Cryptologia,
v. 18, Oct. 1994: 332-355.
Z102.5.C79
O'Connor, Luke, and Andrew Klapper. Algebraic nonlinearity and
its applications to cryptography. Journal of cryptology,
v. 7, autumn 1994: 213-227.
Z102.5.J68
Reeds, Jim. William F. Friedman's transcription of the Voynich
manuscript. Cryptologia, v. 19, Jan. 1995: 1-23.
Z102.5.C79
Ritter, Terry. Estimating population from repetitions in accumulated
random samples. Cryptologia, v. 18, Apr. 1994: 155-190.
Z102.5.C79
TOP OF PAGE
Selected materials available in the Science Reading
Room pamphlet boxes include the following:
Akkad, Adnan A. Conservation in the Arabian Gulf countries. In American
Water Works Association. Journal, v. 82, May 1990: 40-50.
Anderson, Ross J. Why cryptosystems fail. Communications
of the ACM, v. 37, Nov. 1994: 32-40.
Camp, Jean L. Cryptography policy needs another look. IEEE
spectrum, v. 31, June 1994: 15-16.
Diffie, Whitfield. The first ten years of public-key cryptography. Proceedings
of the IEEE, v. 76, May 1988: 560-577.
Diffie, Whitfield, and Martin E. Hellman. Privacy and authentication:
an introduction to cryptography. Proceedings of the IEEE, v.
67, Mar. 1979: 397-427.
Flower, Joe. Network confidential. New scientist, v.
144, Oct. 8, 1994: 26-30.
Ganesan, Ravi, and Ravi Sandhu. Securing cyberspace. Communications
of the ACM, v. 37, Nov. 1994. p. 28-31.
Hauser, Ralf C. Does licensing require new access control techniques? Communications
of the ACM, v. 37, Nov. 1994: 48-55.
Hoffman, Lance J., and others. Cryptography policy. Communications
of the ACM, v. 37, no. 9, Sept. 1994: 109-117.
Kahn, David. [Legislation relating to cryptography] [New
York? 1995] 3 leaves.
Typescript list of references.
Kruh, Louis. A pictorial tour of the National Cryptologic Museum. Cryptologia,
v. 18, Oct. 1994: 381-389.
Landau, Susan, and others. Crypto policy perspectives. Communications
of the ACM, v. 37, Aug. 1994: 115-121.
Massey, James L. An introduction to contemporary cryptology. Proceedings
of the IEEE, v. 76, May 1988: 533-549.
Needham, Roger M. Denial of service: an example. Communications
of the ACM, v. 37, Nov. 1994: 42-46.
Neumann, Peter G. Reassessing the crypto debate. Communications
of the ACM, v. 38, Mar. 1995: 138.
NSA Cryptologic Museum. Cryptosystems journal, v. 3,
Dec. 1994: 125- 128.
Origins of NSA. Fort George G. Meade, Md., Center for
Cryptologic History, National Security Agency, [198-?]. 5 p.
Pioneers in US Cryptology. Fort George G. Meade, Md.,
Center for Cryptologic History, National Security Agency, [198-?].
23 p.
Shannon, C. E. Communication theory of secrecy systems. Bell
systems technical journal, v. 28, Oct. 1949: 656-715.
Simmons, Gustavus, J. Cryptanalysis and protocol failures. Communications
of the ACM, v. 37, Nov. 1994: 56-65.
Smid, Miles E., and Dennis K. Branstad. The data encryption standard:
past and future. Proceedings of the IEEE, v. 76, May 1988:
550-559.
Stallings, William. Getting cryptic: PGP for you and me. Internet
world, v. 6, Feb. 1995: 34-39.
TOP OF PAGE
Additional Sources of Information are listed below. Also, the
Internet offers a growing number of information resources.
American Cryptogram Association
P.O. Box 198
Vernon Hills, IL 60061-0198
Telephone: (708) 549-9762
(puzzle crytograms for solution)
International Association for Cryptologic Research
Aarhus Science Park
Gustav Wieds Vej 10
DK-8000 Aarhus, DENMARK
(unclassified [nonsecret] technical cryptologic research)
National Cryptologic Museum
Attn: E32 (Museum)
Ft. George G. Meade, MD 20755-6000
Telephone: (301) 688-5849
(historical displays and research library)
Aegean Park Press
PO Box 2837
Laguna Hills, CA 92654
Telephone: (714) 586-8811 and (800) 736-3587
(publishes extensively on cryptography and cryptanalysis)
TOP OF PAGE
|