Cryptanalysis of Typex
暂无分享,去创建一个
[1] L. Carroll,et al. Alice's Adventures in Wonderland: Princeton University Press , 2015 .
[2] A. Nijenhuis. Combinatorial algorithms , 1975 .
[3] Louis Kruh,et al. The Typex Cryptograph , 1983, Cryptologia.
[4] William F. Friedman. The index of coincidence and its applications in cryptanalysis , 1987 .
[5] James Rusbridger,et al. Betrayal at Pearl Harbor : How Churchill Lured Roosevelt into World War II , 1991 .
[6] 外山 昇. 霧のイニシエーション--Adventures of Huckleberry Finnとシャーマニズム , 1993 .
[7] Thomas Jakobsen. A Fast Method for Cryptanalysis of Substitution Ciphers , 1995, Cryptologia.
[8] Friedrich L. Bauer,et al. Decrypted secrets - methods and maxims of cryptology , 1997 .
[9] David H. Hamer. Enigma: Actions involved in the 'Double Stepping' of the Middle Rotor , 1997, Cryptologia.
[10] Victor J. Rayward-Smith,et al. The Cryptanalysis of a Three Rotor Machine Using a Genetic Algorithm , 1997, ICGA.
[11] Wade Trappe,et al. Introduction to Cryptography with Coding Theory , 2002 .
[12] Simon Singh,et al. Book Review: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography , 2003, ACM Queue.
[13] Geoff Sullivan,et al. PURPLE REVEALED: SIMULATION AND COMPUTER-AIDED CRYPTANALYSIS OF ANGOOKI TAIPU B , 2003, Cryptologia.
[14] Wade Trappe,et al. Introduction to Cryptography with Coding Theory (2nd Edition) , 2005 .
[15] John Ferris. Intelligence and Strategy: Selected Essays , 2005 .
[16] Hugh Mann. What is common sense? , 2006, Irish medical journal.
[17] R. A. Ratcliff. Delusions of Intelligence: Enigma, Ultra, and the End of Secure Ciphers , 2006 .
[18] Mark Stamp,et al. Applied Cryptanalysis: Breaking Ciphers in the Real World , 2007 .
[19] Mark Stamp,et al. SIGABA: Cryptanalysis of the Full Keyspace , 2007, Cryptologia.
[20] Chris Christensen. Polish Mathematicians Finding Patterns in Enigma Messages , 2007 .
[21] Kent D. Boklan,et al. Introduction to cryptography with coding theory, second edition , 2007 .
[22] Sjsu ScholarWorks,et al. EFFICIENT ATTACKS ON HOMOPHONIC SUBSTITUTION CIPHERS , 2011 .
[23] Mark Stamp,et al. Efficient Cryptanalysis of Homophonic Substitution Ciphers , 2013, Cryptologia.
[24] Josef Kittler,et al. Combinatorial Algorithms , 2016, Lecture Notes in Computer Science.