1. On the cryptanalysis of rotor machines and substitution-permutation networks;Andelman;IEEE Trans. Inf. Theory,1982
2. Word Frequencies of Spoken American English;Dahl,1979
3. Department of Defense Password Management Guideline;DoD Computer Security Center;CSC-STD-002-85,1985
4. Validating the correctness of hardware implementations of the NBS data encryption standard;Gait;NBS Special Publ. 500-20,1980
5. The Computer Underground;Harry,1985