Skip Navigation Links  The Library of Congress >> Researchers
ScienceReference Services (Science, Technology, and Business Division)
  Home >> Tracer Bullets
Science Tracer Bullets Online

Six men in military uniforms.

Comanche Code Talkers during WWII.
Photo: US Dept. of Defense Web site
http://www.pentagon.gov/specials/nativeam02/chibitty.html

Cryptology

Tracer Bullet 96-2


SCOPE

Cryptology is the art and science of making and breaking codes and ciphers. Cryptography is that part of cryptology concerned with the putting of messages into a secret or encrypted form, and cryptanalysis is the reading of encrypted messages without having authorized knowledge of the key that was used in encryption.

With advances in computers and telecommunications and increased dependence on such systems, the use of cryptography has found new applications in the lives of individuals and in the world of commerce. Cryptography has proven to be the best technique for protecting information transmitted through accessible communication networks such as telephone lines, satellites, or microwave systems.

Cryptology was once the domain of the government, especially for military and diplomatic personnel, but it is more and more becoming a mathematical discipline, as mathematics provides the theoretical justification behind the strength of a particular encryption system. While this makes possible much more interesting, complicated, and sophisticated encryption systems, it also means that a degree of mathematical expertise is required.

This guide is not intended as a comprehensive bibliography. Based on holdings of the Library of Congress, it is designed -- as the name of the series implies -- to put the reader "on target." Refer also to a related guide, Computer Crime and Security (TB 94-1).

TOP OF PAGE

INTRODUCTIONS TO THE TOPIC

Building in big brother: the cryptographic policy debate. Edited by Lance J. Hoffman. New York, Springer-Verlag, c1995. 560 p.
   Includes bibliographical references.
   QA76.9.A25B85 1995

Meyer, Carl H., Stephen M. Matyas, and Don Coppersmith. Cryptography. In McGraw-Hill encyclopedia of science & technology. 7th ed. v. 4. New York, McGraw-Hill, c1992. p. 564-572.
   Includes bibliographical references.
   Q121.M3 1992 and Pamphlet box

Schneier, Bruce. E-mail security: how to keep your electronic messages private. New York, Wiley, c1995. 365 p.
   HE6239.E54S36 1995

TOP OF PAGE

SUBJECT HEADINGS

Subject headings used by the Library of Congress, under which books on cryptology can be located in most card, book, and online catalogs, include the following:

Highly Relevant

CRYPTOGRAPHY
   See also subdivision "Cryptography" under individual wars, e.g., " World War, 1939-1945--Cryptography"; " World War, 1914-1918--Cryptography"
   See also subdivisions "Security Measures", and "Access Control" under various other headings, e.g., " Computers--Access Control--Passwords"

Relevant

CRYPTOGRAMS
CRYPTOGRAPHERS
CRYPTOGRAPHY EQUIPMENT INDUSTRY

Related

CIPHER AND TELEGRAPH CODES
CIPHERS
CODING THEORY
DATA COMPRESSION (COMPUTER SCIENCE)
DATA COMPRESSION (TELECOMMUNICATION)
DATA ENCRYPTION (COMPUTER SCIENCE)
MACHINE CIPHERS
TELEGRAPH

TOP OF PAGE

BASIC TEXTS

Bauer, Friedrich Ludwig. Decrypted secrets: methods and maxims of cryptology. Berlin, New York, Springer, c1997. 447 p.
   Bibliography: p. 428-430.
   Translation of: Entzifferte Geheimnisse: Methoden und Maximen der Kryptologie.
   QA76.9.A25B38513 1997

Beckett, Brian. Introduction to cryptology. Oxford, Eng., Boston, Blackwell Scientific Publications; Palo Alto, Calif., distributors USA and Canada, Blackwell Scientific Publications, 1988. 344 p.
   Bibliography: p. 336-338.
   Updated edition: Introduction to cryptology and PC security, c1997, not yet in LC.
   QA76.9.A25B43 1988

Beker, Henry, and Fred Piper. Cipher systems: the protection of communications.
   Z104.B39 1982
   Bibliography: p. 407-421.
   New York, Wiley, c1982. 427 p.

Contemporary cryptology: the science of information integrity. Edited by Gustavus J. Simmons. Piscataway, N.J., IEEE Press, c1992. 640 p.
   Includes bibliographical references.
   QA76.9.A25C6678 1992

Davies, Donald Watts, and W. L. Price. Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer. 2nd ed. Chichester, Eng., New York, Wiley, c1989. 377 p.
   Includes bibliographical references.
   TK5105.D43 1989

Kahn, David. The codebreakers: the story of secret writing. Rev. ed. New York, Scribner, c1996. 1181 p.
   Bibliography: p. 985-987.
   Z103.K28 1996

Schneier, Bruce. Applied cryptography: protocols, algorithms, and source code in C. 2nd ed. New York, Wiley, c1996. 758 p.
   Bibliography: p. 675-741.
   QA76.9.A25S35 1996

Stinson, Douglas R. Cryptography: theory and practice. Boca Raton, CRC Press, c1995. 434 p.
   Bibliography: p. 413-427.
   QA268.S75 1995<

TOP OF PAGE

ADDITIONAL TITLES

Bosworth, Bruce. Codes, ciphers, and computers: an introduction to information security. Rochelle Park, NJ, Hayden Book Co., c1982. 259 p.
   Includes bibliographical references.
   Z103.B58 1982

Brassard, Gilles. Modern cryptology: a tutorial. New York, Springer- Verlag, c1988. 107 p. (Lecture notes in computer science, 325)
   Bibliography: p. 91-107.
   QA76.9.A25B73 1988

Gaines, Helen Fouche. Elementary cryptanalysis. Boston, American Photographic
   Z104.G15
   Publishing Co., 1939. 230 p.

Garfinkel, Simson. PGP: pretty good privacy. Sebastopol, Calif., O'Reilly & Associates, c1995. 393 p.
   Bibliography: p. 377-379.
   QA76.9.A25G36 1995

Katzan, Harry. The standard data encryption algorithm. New York, PBI, c1977. 134 p.
   QA76.9.A25K37

Konheim, Alan G. Cryptography, a primer. New York, Wiley, c1981. 432 p.
   Bibliography: p. 365-370.
   Z103.K66

Rhee, Man Young. Cryptography and secure communications. Singapore, New York, McGraw-Hill, c1994. 504 p.
   Includes bibliographical references.
   QA76.9.A25R44 1994

Sacco, Luigi. Manuale di crittografia. 3rd ed. Rome, 1947. 374 p.
   Z104.S3 1947
   An English translation, entitled Manual of cryptography, has been published (Laguna Hills, Calif., Aegean Park Press, c1977. 193 p.), but is not yet in LC collections.

Secure communications and asymmetric cryptosystems. Edited by Gustavus J. Simmons. Boulder Colo., Published by Westview Press for the American Association for the Advancement of Science, 1982. 338 p. (AAAS selected symposium, 69)
   Includes bibliographical references.
    Z103.S42 1982

Sinkov, Abraham. Elementary cryptanalysis: a mathematical approach. New York, Random House, c1968. 189 p. (New mathematical library, 22)
   Bibliography: p. 184-186.
   Z104.S47

Stallings, William. Network and internetwork security: principles and practice. Englewood Cliffs, NJ, Prentice Hall, New York, IEEE, c1995. 462 p.
   Bibliography: p. 449-456.
   TK5105.5.S728 1995

Stallings, William. Practical cryptography for data internetworks. Los Alamitos, Calif., IEEE Computer Society Press, 1996. 356 p.
   Includes bibliographical references.
   Not yet in LC.

Tilborg, Henk C. A. van. An introduction to cryptology. Boston, Kluwer Academic Publishers, c1988. 170 p. (The Kluwer international series in engineering and computer science, SECS 52. Communications and information theory)
   Bibliography: p. 159-164.
   Z103.T54 1988

Wayner, Peter. Digital cash: commerce on the Net. 2nd ed. Boston, AP Professional, c1997. 359 p.
   Bibliography: p. 345-353.
   HG1710.W39 1997

Wayner, Peter. Disappearing cryptography: being and nothingness on the Net. Boston, AP Professional, c1996. 295 p.
   Bibliography: p. 279-289.
   TK5105.59.W39 1996

Welsh, Dominic. Codes and cryptography. Oxford, Eng., Clarendon Press; New York, Oxford University Press, 1988. 257 p.
   Bibliography: p. 243-252.
   Z103.W46 1988

TOP OF PAGE

SPECIALIZED TITLES

Andreassen, Karl. Computer cryptology: beyond decoder rings. Englewood Cliffs, NJ, Prentice-Hall, c1988. 268 p.
   Bibliography: p. 259-262.
   Karl Andreassen is the pseudonym of Waldo T. Boyd.
   Z103.B65 1988

Biham, Eli, and Adi Shamir. Differential cryptanalysis of the data encryption standard. New York, Springer-Verlag, c1993. 188 p.
   Bibliography: p. 183-185.
   QA76.9.A25B54 1993

Denning, Dorothy Elizabeth Robling. Cryptography and data security. Reading, Mass., Addison-Wesley, c1982. 400 p.
   Includes bibliographical references.
   QA76.9.A25D46 1982

Foster, Caxton C. Cryptanalysis for microcomputers. Rochelle Park, NJ, Hayden Book Co., c1982. 333 p.
   Includes bibliographical references.
   Z103.F67 1982

Friedman, William F. Military cryptanalysis. Prepared under the direction of the Chief Signal Officer. 3rd ed. Washington, U.S. Govt. Print. Off., c1942. 1 v. (unpaged)
   Not in LC collection.
   Includes bibliographical references.
   A reprint in four volumes, which should soon be available in LC, has been published separately by Aegean Park Press. These are: pt. 1, Monoalphabetic substitution systems (1980. 149 p.); pt. 2, Simpler varieties of polyalphabetic substitution systems (1984. 158 p.); pt. 3, Simpler varieties of aperiodic substitution systems (1992. 119 p.); and pt. 4, Transposition and fractionating systems (1992. 189 p.). The four volumes are no. 30, 40, 60, and 61 respectively in the Cryptographic Series. The third volume is a reprint of the text published in 1939 and the fourth is a reprint of the text published in 1941.

Golomb, Solomon W. Shift register sequences. With portions co- authored by Lloyd R. Welch, Richard M. Goldstein, and Alfred W. Hales. Rev. ed. Laguna Hills, Calif., Aegean Park Press, c1982. 247 p.
   Bibliography: p. 231-247.
   QA267.5.S4G6 1982

Meyer, Carl H., and Stephen M. Matyas. Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems. New York, Wiley, 1982. 755 p.
   Includes bibliographical references.
   Z103.M55 1982

Public-key cryptography: state of the art and future directions: E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991: final report. Thomas Beth, Markus Frisch, Gustavus J. Simmons, eds. Berlin, New York, Springer- Verlag, c1992. 97 p. (Lecture notes in computer science, 578)
   Bibliography: p. 83-97.
   QA76.9.A25P83 1992

Rueppel, Rainer A. Analysis and design of stream ciphers. Berlin, New York, Springer-Verlag, c1986. 244 p.
   Bibliography: p. 231-236.
   TK5105.R83 1986

Salomaa, Arto. Public-key cryptography. 2nd, enl. ed. Berlin, New York, Springer-Verlag, c1996. 271 p.
   Includes bibliographical references.
   QA76.9.A25S26 1996

Seberry, Jennifer, and Josef Pieprzyk. Cryptography: an introduction to computer security. New York, Prentice-Hall, c1989. 375 p.
   Bibliography: p. 344-365.
   QA76.9.A25S37 1989

Stallings, William. Protect your privacy: the PGP user's guide. Englewood Cliffs, NJ, Prentice Hall PTR, c1995. 302 p.
   TK5102.85.S73 1995

Zimmermann, Philip. The official PGP user's guide. Cambridge, Mass., MIT Press, c1995. 127 p.
   Includes bibliographical references.
   TK5102.85.Z56 1995

Zimmermann, Philip. PGP source code and internals. Cambridge, Mass.,
   TK5102.85.Z58 1995
   MIT Press, c1995. 907 p.

Zimmermann, Philip. Pretty good privacy: 3.0 pre-alpha source code, preliminary release 1.1: distributed at the December 14, 1996 Public Cyberpunks Meeting. Palo Alto, Calif., Warthman Associates, c1996. 312 p.
   TK5102.85.Z59 1996

Specialized Titles of Historical Interest

Andrew, Christopher M. For the president's eyes only: secret intelligence and the American presidency from Washington to Bush. New York, HarperCollins Publishers, c1995. 660 p.
   Bibliography: p. 627-646.
   JK468.I6A844 1995

Bamford, James. The puzzle palace: a report on America's most secret agency. Harmondsworth, Middlesex, Eng., New York, Penguin Books, 1983, c1982. 655 p.
   Includes bibliographical references.
   UB251.U5B35 1983

Bennett, Ralph. Behind the battle: intelligence in the war with Germany, 1939-45. London, Sinclair-Stevenson, 1994. 328 p.
   Not in LC collection.

Bennett, Ralph Francis. Ultra and Mediterranean strategy. New York, Morrow, c1989. 496 p.
   Bibliography: p. 478-483.
   D766.B46 1989

Bennett, Ralph Francis. Ultra in the West: the Normandy campaign of 1944- 45. London, Hutchinson, 1979. 305 p.
   Bibliography: p. 248-250.
   D756.5.N6B44

Boyd, Carl. Hitler's Japanese confidant: General Oshima Hiroshima and MAGIC intelligence, 1941-1945. Lawrence, University Press of Kansas, c1993. 271 p.
   Bibliography: p. 243-261.
   D810.C88B69 1993

Burke, Colin B. Information and secrecy: Vannevar Bush, Ultra, and the other Memex. Metuchen, NJ, Scarecrow Press, 1994. 466 p.
   Bibliography: p. 377-450.
   HD9696.C772B87 1994

Codebreakers: the inside story of Bletchley Park. Edited by F. H. Hinsley, Alan Stripp. Oxford, Eng., New York, Oxford University Press, 1994. 321 p.
   D810.C88C63 1994

Cryptology: machines, history, & methods. Cipher Deavours and others. Norwood, Mass., Artech House, c1989. 508 p.
   Includes bibliographical references.
   Z103.C75 1989
   "Second vol. of articles selected from Crytologia. Continues Cryptology yesterday, today, and tomorrow."

Cryptology yesterday, today, and tomorrow. Cipher A. Deavours and others. Boston, Artech House, c1987. 519 p.
   Includes bibliographical references.
   Z103.C76 1987

Deavours, Cipher A., and Louis Kruh. Machine cryptography and modern cryptanalysis. Dedham, Mass., Artech House, c1985. 258 p.
   Z103.D43 1985

Drea, Edward J. MacArthur's ULTRA: codebreaking and the war against Japan, 1942-1945. Lawrence, University Press of Kansas, c1992. 296 p.
   Bibliography: p. 275-282.
   D767.D66 1992

Hinsley, F. H. British intelligence in the Second World War. With E. E. Thomas, C. F. G. Ransom, R. C. Knight. New York, Cambridge University Press, 1979-1990. 5 v.
   Includes bibliographical references.
   A one-volume abridgement (628 p. D810.S7H49 1993) with the same title was published by Cambridge University Press in 1993.
   D810.S7H49

Holmes, W. J. Double-edged secrets: US naval intelligence operations in the Pacific during World War II. Annapolis, Naval Institute Press, c1979. 231 p
   D810.S7H637

Kahn, David. Kahn on codes: secrets of the new cryptology. New York, Macmillan, c1983. 343 p.
   Includes bibliographical references.
   Z103.K29 1983

Kahn, David. Seizing the enigma: the race to break the German U-boat codes, 1939-1943. Boston, Houghton Mifflin Co., 1991. 336 p.
   Bibliography: p. 311-326.
   D810.C88K34 1991

Layton, Edwin T. "And I was there": Pearl Harbor and Midway--breaking the secrets. With Roger Pineau and John Costello. New York, W. Morrow, c1985. 596 p.
   D767.92.L39 1985
   Bibliography: p. 570-581.

McClain, S. Navajo weapon. Boulder, Colo., Books Beyond Borders, c1994. 304 p.
   Bibliography: p. 294-296.
   D810.C88M38 1994

The Most mysterious manuscript: the Voynich "Roger Bacon" cipher manuscript. Edited by Robert S. Brumbaugh. Carbondale, Southern Illinois University Press, c1978. 175 p.
   Bibliography: p. 161-165.
   Z104.M67

Stripp, Alan. Codebreaker in the Far East. London, Totowa, NJ, F. Cass, c1989. 204 p.
   Bibliography: p. 192-199.
   D810.C88S76 1989

Tuchman, Barbara Wertheim. The Zimmermann telegram. New York, Macmillan, 1966. 244 p.
   Bibliography: p. 205-212.
   D511.T77 1966

US Army Signals Intelligence in World War II: a documentary history. Edited by James L. Gilbert and John P. Finnegan. Washington, Center of Military History, United States Army, 1993. 237 p.
   D810.S7U7 1993

Weber, Ralph Edward. Masked dispatches: cryptograms and cryptology in American history, 1775-1900. Fort George G. Meade, Md., Center for Cryptologic History, National Security Agency, 1993. 236 p. (United States cryptologic history. Series 1, Pre-World War I, v. 1)
   Bibliography: p. 233-236.
   Z103.4.U6W43 1993

Weber, Ralph Edward. United States diplomatic codes and ciphers, 1775-1938. Chicago, Precedent Pub., 1979. 633 p.
   Bibliography: p. 262-270.
   Z103.W4

Welchman, Gordon. The Hut Six story: breaking the Enigma codes. New York, McGraw-Hill, c1982. 326 p.
   Bibliography: p. 315-317.
   D810.C88W44

Wright, Peter. Spycatcher: the candid autobiography of a senior intelligence officer. New York, Viking, 1987. 329 p.
   UB271.G72W758 1987

Yardley, Herbert Osborn. The American black chamber. Indianapolis, The Bobbs-Merrill Co., c1931. 375 p.
   D639.S7Y3 1931a

TOP OF PAGE

ADDITIONAL REFERENCE SOURCES

Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. Boca Raton, CRC Press, c1997. 780 p.
   Bibliography: p. 703-754.
   QA76.9.A25M463 1997

Shulman, David. A glossary of cryptography. New York, Crypto Press, c1961. (unpaged)
   Z103.H3

CONFERENCE PROCEEDINGS

AUSCRYPT '92 (1992, Gold Coast, Qld.). Advances in cryptology, AUSCRYPT '92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992: proceedings. Jennifer Seberry, Yuliang Zheng, eds. Berlin, New York, Springer-Verlag, c1993. 542 p. (Lecture notes in computer science, 718)
   Includes bibliographical references.
   QA76.9.A25A87 1992

CRYPTO '95. Advances in cryptology, CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, proceedings. Don Coppersmith, ed. Berlin, New York, Springer, 1995. 465 p. (Lecture notes in computer science, 963)
   Includes bibliographical references.
   QA76.9.A25C78a 1995

Cryptography and coding: 5th IMA Conference, Cirencester, UK, December 18- 20, 1995, proceedings. Colin Boyd, ed. Berlin, New York, Springer, c1995. 291 p. (Lecture notes in computer science, 1025)
   Includes bibliographical references.
   QA268.C76 1995

EUROCRYPT '96 (1996, Saragossa, Spain). Advances in cryptology, EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, proceedings. Ueli Maurer, ed. Berlin, New York, Springer, c1996. 416 p. (Lecture notes in computer science, 1070)
   Includes bibliographical references.
   QA76.9.A25E962a 1996

International Conference on the Theory and Applications of Cryptology (4th, 1994, Wollongong, N.S.W.). Advances in cryptology, ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28-December 1, 1994, proceedings. Josef Pieprzyk, Reihanah Safavi-Naini, eds. Berlin, New York, Springer, c1995. 430 p. (Lecture notes in computer science, 917).
   Includes bibliographical references.
   QA76.9.A25I555 1994

TOP OF PAGE

BIBLIOGRAPHIES

Galland, Joseph Stanislaus. An historical and analytical bibliography of the literature of cryptology. New York, AMS Press, 1970, c1945. 209 p. (Northwestern University studies in the humanities, no. 10)
   Z103.A1G3 1970

Shulman, David. An annotated bibliography of cryptography. New York, Garland Pub., 1976. 388 p. (Garland reference library of the humanities, v. 37)
   Z103.A1S58

TOP OF PAGE

GOVERNMENT PUBLICATIONS

DES modes of operation. Washington, US Department of Commerce, National Bureau of Standards, Institute for Computer Sciences and Technology, 1980. 30 p. (Federal information processing standards publication, FIPS PUB 81)
   Federal Specifications Communication/Computer Cartridge AC52, frames 447-476

Digital encryption standard (DES). Gaithersburg, Md., US Department of Commerce, National Institute of Standards and Technology, 1993. 20 p. (Federal information processing standards publication, FIPS PUB 46-2)
   Federal Specifications Communication/Computer Cartridge AC67, frames 155-174

Digital signature standard (DSS). Gaithersburg, Md., US Department of Commerce, National Institute of Standards and Technology, 1994. 24 p. (Federal information processing standards publication, FIPS PUB 186)
   Federal Specifications Communication/Computer Cartridge AC67, frames 1474-1497

Escrowed encryption standard (EES). Gaithersburg, Md., US Department of Commerce, National Institute of Standards and Technology, 1994. 11 p. (Federal information processing standards publication, FIPS PUB 185)
   Federal Specifications Communication/Computer Cartridge AC67, frames 1463-1473

Nechvatal, James. Public-key cryptography: computer security. Gaithersburg, Md., US Department of Commerce, National Institute of Standards and Technology, 1991. 162 p. (NIST special publication, 800-2)
   QC100.U57 no. 800-2
   Bibliography: 147-162.

Security requirements for cryptographic modules. Gaithersburg, Md., US Department of Commerce, National Institute of Standards and Technology, 1994. 42 p. (Federal information processing standards publication, FIPS PUB 140-1)
   Federal Specifications Communication/Computer Cartridge AC67, frames 405-446

TOP OF PAGE

TECHNICAL REPORTS

Technical Reports and other types of literature are indexed in the following guides:

Government Reports Announcements & Index (1895- )
   Z7916.G78 <SciRR A&I> and CD-ROM
   See: Coding
   Cryptography
   Cryptology
   Data Encryption
   Data Processing Security
   Secure Communications

Monthly Catalog of United States Government Publications (1895- )
   Z1233.A18 <SciRR A&I> and Computer format
   See: Coding Theory
   Cryptography
   Data Protection

SELECTED TECHNICAL REPORTS

Reports listed below are available upon request in the Science Reading Room. They and other reports on the subject may also be purchased from the National Technical Information Service (NTIS), Springfield, Virginia 22161. NTIS telephone: (703) 487-4650.

Baum, M. S. Federal certification authority liability and policy: law and policy of certificate-based public key and digital signatures. Cambridge, Mass., Independent Monitoring, 1994. 485 p. (NIST/GRC-94/654)
   PB94-191202

Cheung, Terry. PEM public key certificate cache server. Livermore, Calif., Lawrence Livermore National Laboratory, 1993. 18 p. (UCRL-MA-115651)
   DE94-006404

Feingold, Richard A. The potential of quantum cryptography for secure private communications. Livermore, Calif., Lawrence Livermore National Laboratory, 1993. 19 p. (UCRL-JC-11335)
   DE93-017188

Good security practices for electronic commerce, including electronic data interchange. Edited by Roy G. Saltman. Gaithersburg, Md., National Institute of Standards and Technology, 1993. 68 p. (NIST/SP-800/9)
   PB94-139045

Information security and privacy in network environments. Washington, Office of Technology Assessment, 1994. 252 p. (OTA-TCT-606)
   PB95-109203

McNees, R. A., and others. Cryptosystems based on chaotic dynamics. Oak Ridge, Tenn., Oak Ridge National Laboratory, 1993. 17 p. (ORNL/TM-12440)
   DE94-004256

Witzke, Edward L., and Lyndon G. Pierson. Key management for large scale end-to-end encryption. Albuquerque, N.M., Sandia National Laboratories, 1994. 7 p. (SAND-94-1556C)
   DE94-014284

TOP OF PAGE

ABSTRACTING AND INDEXING SERVICES

Abstracting and indexing services that index relevant journal articles and other literature on cryptology are listed below.

ACM Guide to Computing Literature (1977- )
   QA75.5.A75a <SciRR A&I>
   See: Cryptography

Applied Science & Technology Index (1913- )
   Z7913.I7 <SciRR A&I> and Computer format
   See: Computer User Identification
   Cryptanalysis
   Cryptographic Keys
   Cryptography
   Data Encryption Standard
   Encryption Algorithms
   Public Key Cryptosystems

Computer Abstracts (1957- )
   Z6654.C17C64 <SciRR A&I>
   See: Cryptography
   Cryptosystems
   Security

Computer and Control Abstracts (1957- )
   QA76.C548 <SciRR A&I>
   See: Cryptography
   Data Privacy
   Message Authentication
   Public Key Cryptography

Computer and Information Systems Abstracts (1962- )
   QA76.I46 <SciRR A&I>
   See: Cryptography
   Security of Data

Computer Literature Index (1968- )
   QA76.Q3 <SciRR A&I>
   See: Cryptography
   Privacy
   Security

Computing Reviews (1960- )
   QA76.C5854 <SciRR A&I>
   See: Data Encryption

Engineering Index (1884- )
   Z5851.E62 <SciRR A&I> and CD-ROM
   See: Algorithms
   Codes (Symbols)
   Cryptography
   Data Handling
   Encoding (Symbols)
   Security of Data

Information Science Abstracts (1966- )
   Z699.A1D6 <SciRR A&I>
   See: Cryptography
   Encryption

INSPEC (1969- )
   Computer format
   (Corresponds to the print publications: Science Abstracts. Series A, Physics Abstracts; Science Abstracts. Series B, Electrical and Electronics Abstracts; and Science Abstracts. Series C, Computer & Control Abstracts; with the addition of section D of the INSPEC database (covering information technology), which has no print equivalent, and the complete INSPEC Thesaurus.)
   See: Cryptography
   Data Privacy
   Public Key Cryptography
   Security of Data

Magazine Index (1980- )
   Computer format
   See: Ciphers
   Code Breaking
   Codes
   Cryptography
   Data Encryption
   Data Security
   Digital Signatures
   Encryption
   Public key cryptosystems

Readers' Guide to Periodical Literature (1900- )
   AI3.R48 <B&E>,<N&CPR>, and Computer format
   See: Cryptography

TOP OF PAGE

JOURNALS

Journals that often contain relevant articles include the following:

Cryptologia
Z102.5.C79
Journal of Cryptology Z102.5.J68
Cryptosystems Journal QA76.9.A25C85
Designs, Codes, and Cryptography QA166.25.D48
Cryptogram Z104.C9

TOP OF PAGE

REPRESENTATIVE JOURNAL ARTICLES

Bours, Patrick A. H. On the construction of perfect deletion-correcting codes using design theory. Designs, codes and cryptography, v. 6, July 1995: 5-20.
   QA166.25.D48

Carroll, John M., and Sri Nurdiati. Weak keys and weak data foiling the two nemeses. Cryptologia, v. 18, July 1994: 253-280.
   Z102.5.C79

Coppersmith, D. The data encryption standard (DES) and its strength against attacks. IBM journal of research and development, v. 38, May 1994: 243-250.
   TK7800.I14

Franson, J. D., and H. Ilves. Quantum cryptography using optical fibers. Applied optics, v. 33, May 10, 1994: 2949-2954.
   QC350.O62

Giddy, J. P., and R. Safavi-Naini. Automated cryptanalysis of transposition ciphers. Computer journal, v. 37, no. 5, 1994: 429-436.
   QA76.C57

Greenfield, Gary R. Yet another matrix cryptosystem. Cryptologia, v. 18, Jan. 1994: 41-51.
   Z102.5.C79

Kemmerer, R., C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of cryptology, v. 7, spring 1994: 79-130.
   Z102.5.J68

Kim, B. G., and P. Wang. ATM network: goals and challenges. Communications of the ACM, v. 38, Feb. 1995: 39-44, 109.
   QA76.A772

King, John C. An algorithm for the complete automated cryptanalysis of periodic polyalphabetic substitution ciphers. Cryptologia, v. 18, Oct. 1994: 332-355.
   Z102.5.C79

O'Connor, Luke, and Andrew Klapper. Algebraic nonlinearity and its applications to cryptography. Journal of cryptology, v. 7, autumn 1994: 213-227.
   Z102.5.J68

Reeds, Jim. William F. Friedman's transcription of the Voynich manuscript. Cryptologia, v. 19, Jan. 1995: 1-23.
   Z102.5.C79

Ritter, Terry. Estimating population from repetitions in accumulated random samples. Cryptologia, v. 18, Apr. 1994: 155-190.
   Z102.5.C79

TOP OF PAGE

SELECTED MATERIALS

Selected materials available in the Science Reading Room pamphlet boxes include the following:

Akkad, Adnan A. Conservation in the Arabian Gulf countries. In American Water Works Association. Journal, v. 82, May 1990: 40-50.

Anderson, Ross J. Why cryptosystems fail. Communications of the ACM, v. 37, Nov. 1994: 32-40.

Camp, Jean L. Cryptography policy needs another look. IEEE spectrum, v. 31, June 1994: 15-16.

Diffie, Whitfield. The first ten years of public-key cryptography. Proceedings of the IEEE, v. 76, May 1988: 560-577.

Diffie, Whitfield, and Martin E. Hellman. Privacy and authentication: an introduction to cryptography. Proceedings of the IEEE, v. 67, Mar. 1979: 397-427.

Flower, Joe. Network confidential. New scientist, v. 144, Oct. 8, 1994: 26-30.

Ganesan, Ravi, and Ravi Sandhu. Securing cyberspace. Communications of the ACM, v. 37, Nov. 1994. p. 28-31.

Hauser, Ralf C. Does licensing require new access control techniques? Communications of the ACM, v. 37, Nov. 1994: 48-55.

Hoffman, Lance J., and others. Cryptography policy. Communications of the ACM, v. 37, no. 9, Sept. 1994: 109-117.

Kahn, David. [Legislation relating to cryptography] [New York? 1995] 3 leaves. Typescript list of references.

Kruh, Louis. A pictorial tour of the National Cryptologic Museum. Cryptologia, v. 18, Oct. 1994: 381-389.

Landau, Susan, and others. Crypto policy perspectives. Communications of the ACM, v. 37, Aug. 1994: 115-121.

Massey, James L. An introduction to contemporary cryptology. Proceedings of the IEEE, v. 76, May 1988: 533-549.

Needham, Roger M. Denial of service: an example. Communications of the ACM, v. 37, Nov. 1994: 42-46.

Neumann, Peter G. Reassessing the crypto debate. Communications of the ACM, v. 38, Mar. 1995: 138.

NSA Cryptologic Museum. Cryptosystems journal, v. 3, Dec. 1994: 125- 128.

Origins of NSA. Fort George G. Meade, Md., Center for Cryptologic History, National Security Agency, [198-?]. 5 p.

Pioneers in US Cryptology. Fort George G. Meade, Md., Center for Cryptologic History, National Security Agency, [198-?]. 23 p.

Shannon, C. E. Communication theory of secrecy systems. Bell systems technical journal, v. 28, Oct. 1949: 656-715.

Simmons, Gustavus, J. Cryptanalysis and protocol failures. Communications of the ACM, v. 37, Nov. 1994: 56-65.

Smid, Miles E., and Dennis K. Branstad. The data encryption standard: past and future. Proceedings of the IEEE, v. 76, May 1988: 550-559.

Stallings, William. Getting cryptic: PGP for you and me. Internet world, v. 6, Feb. 1995: 34-39.

TOP OF PAGE

ADDITIONAL SOURCES OF INFORMATION

Additional Sources of Information are listed below. Also, the Internet offers a growing number of information resources.

American Cryptogram Association
P.O. Box 198
Vernon Hills, IL 60061-0198
Telephone: (708) 549-9762
(puzzle crytograms for solution)

International Association for Cryptologic Research
Aarhus Science Park
Gustav Wieds Vej 10
DK-8000 Aarhus, DENMARK
(unclassified [nonsecret] technical cryptologic research)

National Cryptologic Museum
Attn: E32 (Museum)
Ft. George G. Meade, MD 20755-6000
Telephone: (301) 688-5849
(historical displays and research library)

Aegean Park Press
PO Box 2837
Laguna Hills, CA 92654
Telephone: (714) 586-8811 and (800) 736-3587
(publishes extensively on cryptography and cryptanalysis)

TOP OF PAGE

Top of Page Top of Page
  Home >> Tracer Bullets
  The Library of Congress >> Researchers
   November 23, 2015
Legal | External Link Disclaimer

Contact Us:  
Ask a Librarian