Krishnamurty, Computer Cryptographic Techniques for Processing and Storage of Confidential Information, Int. J. Control, 1970.* |
British General Staff, Manual of Cryptography, Aegean Park Press (1919).* |
Rivest, et. al. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, communications of the ACM 1978.* |
Delfs et. al., Introduction to Cryptography , Springer,2002.* |
Denning, Cryptography and Data Security, Addison-Wesley.* |
Simmons, Contemporary Cryptology, The Science of Information Integrity, IEEE Press.* |
Menezes, et. al. Handbook of Applied Cryptography, CRC Press.* |
Yasuhiro et. al. Dual reduction Method of Random Keys for Encryption by Graph transformation, 1988.* |
Gaines, Cryptanalysis, 1956.* |
Schneier, Applied Cryptography, 1988.* |
jOxford English Dictionary, 2nd edition.* |
Krishnamurty, Computer Cryptographic Techniques for Processing and Storage of Cofidential Information, Int. J. Control 1970.* |
Solution to the/cryptology/Beale problem, http://einstein.et.tudelft.nl/˜arlet/puzzles/sol.cgi/cryptology/Beale, Dec. 14, 1999, pp. 1-5. |
Internet-ERA Cryptographic Methods, http://tryagain.com/humcivil/crptweb.htm, Dec. 14, 1999, p. 1. |
Leonardo/Daniel, Floating-Key Cryptography, D&G Sciences—Virginia Technology Corporation, Limited Release Notes, info@dgsciences.com, pp. 1-8. |
Gideo Samid, “Cryptographic Possibilities Suggested by Certain Expansion-Reduction Algorithms”, AGS Encryptions, Ltd., Jul. 4, 1999, pp. 1-23. |