Bibliography

[1]  T. Barr. Invitation to Cryptology. Prentice Hall, Upper Saddle River, NJ, 2002.

[2]  C. Bauer. Secret History: The Story of Cryptology. Chapman & Hall/CRC, Boca Raton, FL, 2013.

[3]  F. Bauer. Decrypted Secrets: Methods and Maxims of Cryptology, Fourth Edition. Springer, New York, NY, 2007.

[4]  J. Brawley. In memory of Jack Levine (1907–2005). Cryptologia, 30(2):83–97, 2006.

[5]  F. Carter. The Turing Bombe. Bletchley Park Trust, Milton Keynes, UK, 2008.

[6]  W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions in Information Theory, 22:644–654, 1976.

[7]  G. Ellsbury. The Enigma and the Bombe. Available at http://www.ellsbury.com/enigmabombe.htm, 2007.

[8]  W. Friedman. Elements of Cryptanalysis. Aegean ...

Get Cryptology, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.