20869 Sigrides Albert: Quaedam de cryptologia. Vox Latina 44/173 (2008), 310-337. 24190 Welleda Maria Baldoni/Carlo Ciliberto/Giulia Maria Piacentini Cattaneo: Aritmetica, crittografia, codici. Springer 2006, 520p. Eur 26. 11287 Robert Baldwin: [On random numbers in BSAFE.] RSA LAB. BULL. ... (ca. 1996), 2p. Friedrich Bauer: Kryptographie - Verfahren und Maximen. Informatik-Spektrum 5 (1982), 74-81. 20864 Friedrich Bauer: Entzifferte Geheimnisse. Springer 2000, 500p. Eur 20. B. Beckman: Codebreakers. Arne Beurling and the Swedish crypto program during World War II. AMS 2002, 260p. $39. Patrick Beesly: Very special intelligence. London 1977. Henry Beker/Fred Piper: Cipher systems. Northwood 1982. Henry Beker/Fred Piper: Secure speech communications. Academic Press 1985. 15980 Luigia Berardi/Albrecht Beutelspacher: La storia della crittografia - l'uso dei gruppi ciclici per costruire codici. Boll. UMI Mat. Soc. Cult. 6/A (2003), 105-118. 11292 Thomas Berson: Coding theory, cryptology, and computer security. RSA Cryptobytes 2/2 (1996), 13-15. Thomas Beth: Kryptographie als Instrument des Datenschutzes. Informatik-Spektrum 5 (1982), 84-96. 6869 Thomas Beth: Sichere offene Datennetze. Spektrum 1995/5, 46-55. 2115 Thomas Beth/Peter Hess/Klaus Wirl: Kryptographie. Teubner 1983. 5978 Albrecht Beutelspacher: Kryptologie. Vieweg 1992, 180p. 3-528-18990-8. DM 30. Albrecht Beutelspacher: Geheimsprachen. Beck 1997, 130p. 3-406-41871-6. DM 15. 20867 Albrecht Beutelspacher/Heike Neumann/Thomas Schwarzpaul: Kryptografie in Theorie und Praxis. Vieweg 2005, 320p. Eur 25. 7415 Albrecht Beutelspacher/Ute Rosenbaum: Projektive Geometrie. Vieweg 1992, 230p. 3-528-07241-5. DM 38. 20866 Albrecht Beutelspacher/Jörg Schwenk/Klaus-Dieter Wolfenstetter: Moderne Verfahren der Kryptographie. Vieweg 2006, 140p. Eur 22. 20919 Norman Biggs: Codes - an introduction to information communication and cryptography. Springer 2008, 270p. Eur 25. 11295 Matt Blaze/Bruce Schneier: The MacGuffin block cipher algorithm. Internet ca. 1994, 14p. F. Borceux/J. Quisquater: Number theory and cryptology. Ca. 1997. 8725 Ken Branson/Annie Lindstrom: Bellcore puts fault-based cryptanalysis paper on website. Internet 1996, 2p. Gilles Brassard: Cryptologie contemporaine. Masson 1992, 120p. 2-225-83970-0. FF 160. 25889 Carla Bressan: Implementazione di test di casualita' in cryptool. Tesi LT Univ. Bologna 2012, 83p. 19137 Johannes Buchmann: Einführung in die Kryptographie. Springer 2004, 270p. Eur 30. 24535 Andrea Caranti: Finite fields and symmetric cryptography. LN Univ. Trento 2011, 40p. Frederick Cohen: A short history of cryptography. 1995. 11296 Matt Curtin: Snake oil warning signs - encryption software to avoid. Internet 1997, 11p. 7639 Ivan Bjerre Damgard: Practical and provable secure release fo a secret and exchange of signatures. J. Cryptology 8 (1995), 201-222. D. Davies/W. Price: Security for computer networks. Wiley 1989. 10988 Paul Davis: Mathematics and the Internet. Internet 1997, 10p. 7288 Ed Dawson: Linear feedback shift registers and stream ciphers. 7226 Loxton, 106-119. C. Deavours/L. Kruh: Machine cryptography and modern cryptanalysis. Artech House 1985. H. Delfs/H. Knebl: Introduction to cryptography. Springer 2002, 310p. Eur 40. D. Denning: Cryptography and data security. Addison-Wesley. P. Diaconis/M. Shahshahani: Generating a random permutation with random transpositions. Z. Wtheorie 57 (1981), 159-179. Whitfield Diffie: The first ten years of public-key cryptography. Proc. IEEE 76 (1988), 560-577. Whitfield Diffie/Martin Hellman: New directions in cryptography. Trans. IEEE Inform. Theory (IT-22) 6 (1976), 644-654. First paper on public-key cryptography. 11288 Hans Dobbertin: The status of MD5 after a recent attack. RSA Cryptobytes 2/2 (1996), 1, 3-6. 11271 D. Eastlake/S. Crocker/J. Schiller: Randomness recommendations for security. Internet 1994, 30p. 17003 Bettina Eick/Delaram Kahrobaei: Polycyclic groups - a new platform for cryptology? Internet ca. 2005, 7p. 19932 Wolfgang Ertel: Angewandte Kryptographie. Hanser 2007, 220p. Eur 25. 7642 Shimon Even/Oded Goldreich/Silvio Micali: On-line/off-line digital signatures. J. Cryptology 9 (1996), 35-67. 20870 O. Folorunso/H. Longe/A. Ikekwere/S. Sharma: A framework for encrypting the Huffman algorithm. J. Appl. Sci. 6/5 (2006), 1138-1141. 9431 Matthew Franklin/Stuart Haber: Joint encryption and message-efficient secure computation. J. Cryptology 9 (1996), 217-232. J. Friedrich: Entzifferung verschollener Schriften und Sprachen. Springer 1954. 7667 Walter Fumy/Hans Peter Riess: Kryptographie. Oldenbourg 1994. H. Gaines: Cryptanalysis. Dover 1956. Elementary, but interesting. 26945 Joachim von zur Gathen: Cryptoschool. Springer 2015, 880p. Eur 40. 7612 Ian Goldberg/David Wagner: Randomness and the Netscape browser. Dr Dobb's J. January 1996, ... O. Goldreich: Modern cryptography, probabilistic proofs and pseudorandomness. Springer 1998, 200p. 3-540-64766-X. DM 129. 8169 Jovan Golic: Correlation properties of a general binary combiner with memory. J. Cryptology 9 (1996), 111-126. Dieter Gollmann: Algorithmenentwurf in der Kryptographie. Wiss. Vlgsges. 1994, 160p. 3-411-16671-1. DM 68. S. Golomb: Shift register sequences. Aegean Park Press 1982. Peter Gutmann: Applied cryptography. Peter Gutmann: Secure deletion of data from magnetic and solid-state memory. ... (1996), ... 10877 Howard Gutowitz: Method and apparatus for the encryption, decryption and authentication of messages using dynamical systems. Internet 1992, 63p. 10884 Howard Gutowitz: Cryptography with dynamical systems. Internet 1996, 37p. 9433 Yenjo Han/Lane Hemaspaandra: Pseudorandom generators and the frequency of simplicity. J. Cryptology 9 (1996), 251-261. 11403 Lester Hill: Cryptography in an algebraic alphabet. Am. Math. Monthly ... (1929), 306-312. 11402 Lester Hill: Concerning certain linear transformation apparatus of cryptography. Am. Math. Monthly ... (1931), 135-154. 20658 Jeffrey Hoffstein/Jill Pipher/Joseph Silverman: An introduction to mathematical cryptography. Springer 2008, 520p. Eur 38. 2113 Patrick Horster: Kryptologie. Bibl. Inst. 1987. Patrick Horster/Hans-Joachim Knobloch: Discrete logarithm based protocols. EUROCRYPT '91 (1991), 399-408. Patrick Horster/Hans-Joachim Knobloch: Protokolle zum Austausch authentischer Schlu''ssel. VIS ... (1991), 321-328. Patrick Horster/M. Michels/H. Petersen: Das Meta-El-Gamal-Signatur- verfahren und seine Anwendungen. VIS 1995, 395-416. 24092 Michael Huber: Combinatorial designs for authentication and secrecy codes. Found. Trends Comm. Inf. Theory 5/6 (2008), 581-675. 9430 Russell Impagliazzo/Moni Naor: Efficient cryptographic schemes provably as secure as subset sum. J. Cryptology 9 (1996), 199-216. 8168 Toshiya Itoh/Masufumi Hoshi/Shigeo Tsujii: A low communication competitive interactive proof system for promised quadratic residuosity. J. Cryptology 9 (1996), 101-109. 9432 Wen-Ai Jackson/Keith Martin/Christine O'Keefe: Ideal secret sharing schemes with multiple secrets. J. Cryptology 9 (1996), 233-250. S. Jennings: A special class of binary sequences. Thesis, Univ. of London 1980. 11285 Burton Kaliski: [On timing attacks.] RSA Lab. Bull. ... (1996), 2p. 11286 Burton Kaliski/Matthew Robshaw: Comments on some new attacks on cryptographic devices. RSA Lab. Bull. 14 July 1997, 1-5. 26735 Christian Karpfinger/Hubert Kiechle: Kryptologie. Vieweg+Teubner 2010, 270p. Eur 20 (Ebuch). Rudolf Kippenhahn: Verschlu''sselte Botschaften. Rowohlt 1997, 370p. Eur 10. 11312 Gerd Knorr: Kryptographie. Internet ca. 1996, 3p. Neal Koblitz: Algebraic aspects of cryptography. Springer 1998, 210p. 3-540-63446-0. DM 98. 20001 Neal Koblitz: The uneasy relationship between mathematics and cryptography. Notices AMS September 2007, 972-979. A. Konheim: Cryptography. Wiley 1981. 8586 Evangelos Kranakis: Primality and cryptography. DM 50. Solomon Kullback: Statistical methods in cryptoanalysis. Aegean Park Press 1976. 26239 Alessandro Languasco/Alessandro Zaccagnini: Manuale di crittografia. Hoepli 2015, 310p. Eur 24. 26179 Alessandro Languasco/Alessandro Zaccagnini: Complementi al Manuale di crittografia. Hoepli 2015, 90p. Available on Internet. 5817 Hendrik Lenstra: Integer programming and cryptography. Math. Intell. 6/3 (1984), 14-19. 7226 J. Loxton (ed.): Number theory and cryptography. Cambridge UP 1990, 235p. 0-521-39877-0 (pb.). M. Luby: Pseudorandomness and cryptographic applications. Princeton UP 1996, 230p. 0-691-02546-0. $25. Seems to be not so good. 15245 Subhamoy Maitra/Palash Sarkar: Cryptographically significant Boolean functions with five valued Walsh spectra. Theor. Comp. Sci. 276 (2002), 133-146. J. Massey: Cryptography - a selective survey. Alta Frequenza 55/1 (1986), 4-11. J. Massey: Contemporary cryptology. In Simmons 1992, 3-39. 19138 Roland Matthes: Algebra, Kryptologie und Kodierungstheorie. Hanser 2003, 260p. Eur 25. W. Meier/O. Staffelbach: Fast correlation attacks on stream ciphers. J. Cryptology 1 (1989), 159-176. 20894 Alfred Menezes/Paul van Oorschot/Scott Vanstone: Handbook of applied cryptography. CRC 1997, 780p. Eur 61. R. Merkle: Secrecy, authentication, and public key systems. UMI Research Press 1979. C. Meyer/S. Matyas: Cryptography. Wiley 1982. 23268 Preda Mihailescu/Michael Rassias: Public key cryptography, number theory and applications. EMS Newsletter December 2012, 25-30. J. Moore: Protocol failures in cryptosystems. Proc. IEEE 76/5 (1988), 594-601. L. Myers: Spycomm - covert communication techniques of the underground. Paladin Press 1991. Harald Niederreiter/C. Schnorr: Local randomness in polynomial random number and random function generators. SIAM J. Comp., ca. 1974. 6575 Andrew Odlyzko (ed.): Advances in cryptology - CRYPTO 86. SLN Computer Science 263 (1987). 25271 Christof Paar/Jan Pelzl: Understanding cryptography. Springer 2009, 370p. Eur 36 (Ebook). W. Patterson: Mathematical cryptology for computer scientists and mathematicians. Rowman & Littlefield 1987. 7637 Dingyi Pei: Information-theoretic bounds for authentication codes and block designs. J. Cryptology 8 (1995), 177-188. 4871 Christoph Po''ppe: Spa''te Rehabilitation des Data Encryption Standard. Spektrum 1993/5, 19-24. S. Pohlig/Martin Hellman: An improved algorithm for computing discrete logarithms over GF(p) and its cryptographic significane. IEEE Trans. Inf. Theory 24 (1978), 106-110. M. Rhee: Cryptography and secure communication. McGraw-Hill 1994. 8244 Harald Ritter: Zufallsbits basierend auf dem diskreten Logarithmus. Diplomarbeit Univ. Frankfurt, 1992. 7610 Terry Ritter: Ritter's crypto glossary. Internet, 18p. 7611 Terry Ritter: Ritter's cipher boutique. Web page. 7604 Ronald Rivest: Cryptology. Internet, 47p. 7605 Ronald Rivest: The RC5 encryption algorithm. Internet, 11p. Ronald Rivest/A. Shamir/L. Adleman: A method of obtaining digital signatures and public-key cryptosystems. Comm. ACM 21/2 (1978), 120-126. D. Robbins/E. Bolker: The bias of three pseudo-random shuffles. Aequationes Math. 22 (1981), 268-292. 11291 Phillip Rogaway: The security of DESX. RSA Cryptobytes 2/2 (1996), 8-11. 11417 RSA Laboratories: Answers to frequently asked questions about today's cryptography. RSA Laboratories ca. 1994, 200p. 7666 Rainer Rueppel: Analysis and design of stream ciphers. Springer 1986, 250p. 3-540-16870-2. DM 136. Rainer Rueppel: Stream ciphers. In Simmons 1992, 65-134. Rainer Rueppel/O. Staffelbach: Products of linear recurring sequences with maximum complexity. IEEE Trans. Inf. Th. 33 (1987), 124-131. N. Ryska/S. Herda: Kryptographische Verfahren in der Datenverarbeitung. Springer 1980. A. Salomaa: Public-key cryptography. Springer 1996, 270p. 3-540-61356-0. DM 68. Bruce Schneier: Applied cryptography. Protocols, algoritms, and source code in C. Wiley 1996. 0-471-12845-7. $70. Bruce Schneier: E-mail security. Wiley 1995. 0-471-05318-X. 11299 Bruce Schneier: Why cryptography is harder than it looks. Inf. Security Bull. 2/2 (1997), 31-36. 11297 Bruce Schneier/John Kelsey: Unbalanced Feistel networks and block- cipher design. 3rd Int. Workshop Fast Software Encryption 1996, 121-144. 8658 Charles Seife: New attacks breach computer codes. Science 1 November 1996, 716-717. Claude Shannon: Communication theory of secrecy systems. Bell Systems Technical Journal 28 (October 1949), 656-715. T. Siegenthaler: Decrypting a class of stream ciphers using ciphertext only. IEEE Trans. Computers 34 (1985), 81-85. G. Simmons: A survey of information authentication. In Simmons 1992, ... G. Simmons: Cryptology. In Encyclopaedia Britannica, 1993. 19136 Simon Singh: The code book. Fourth Estate 1999, 400p. Eur 13. Abraham Sinkov: Elementary cryptoanalysis - a mathematical approach. MAA 1966. L. Smith: Cryptography. Dover 1955. Elementary, but interesting. A. Sorkin: Lucifer. A cryptographic algorithm. Cryptologia 8/1 (1984), 22-41. 9623 William Stallings: Sicherheit im Datennetz. Prentice Hall 1995, 522p. 3-930436-29-9. DM 59. 20906 Mark Stamp/Richard Low: Applied cryptanalysis. Wiley 2007, 400p. Eur 77. 20662 Douglas Stinson. Cryptography. Chapman & Hall 2006, 590p. Eur 45. 20902 Christopher Swenson: Modern cryptanalysis. Wiley 2008, 240p. Eur 35. 8245 Thorsten Theobald: Digitale Unterschriften mittels birationaler Permutationen. Diplomarbeit Univ. Frankfurt 1995. Serge Vaudenay: A classical introduction to cryptography. Springer 2005, 350p. $39. 20863 Dietmar Wätjen: Kryptographie. Spektrum 2008, 340p. Eur 33. 20935 Samuel Wagstaff: Cryptanalysis of number theoretic ciphers. Chapman & Hall 2003, 320p. Eur 80. P. Wayner: Should encryption be regulated? Byte May 1993, ... M. Welschenbach: Kryptographie in C und C++. Zahlentheoretische Grundlagen, Computerarithmetik mit gros''en Zahlen, kryptographische Tools. Springer 1998, 330p. 3-540-64404-0. DM 78. Dominic Welsh: Codes und Kryptographie. VCH 1991, 340p. 3-527-27959-8. DM 74. [Codes and cryptography. Oxford UP 1988, 270p. $ 33.] 20862 Wolfgang Willems: Codierungstheorie und Kryptographie. Birkhäuser 2008, 150p. Eur 19. 20895 Reinhard Wobst: Cryptology unlocked. Wiley 2007, 540p. Eur 33. 12428 Philip Zimmermann: Schlu''sseldienst fu''rs Internet. Spektrum 1999/3, 94-100. 11255 ZZ: Introduction to cryptography. Internet ca. 1995, 6p. 11240 ZZ: Cryptographic algorithms. Internet ca. 1995, 7p. 8724 ZZ. New threat model breaks crypto codes. Internet 1996, 4p. 11289 ZZ: [On Hans Dobbertin's work.] RSA Cryptobytes 2/2 (1996), 2. 11313 ZZ: Cryptographic algorithms. Internet ca. 1996, 7p. 29462 ZZ: Programming Cryptol. Galois Inc. 2021, 140p.