1. R. Merkle , “ Secure communication over an insecure channel ,” submitted to Communications of the ACM. [This was subsequently published in volume 21 , no. 4. pp. 294–299, April 1978.] R. Merkle, “Secure communication over an insecure channel,” submitted to Communications of the ACM. [This was subsequently published in volume 21, no. 4. pp. 294–299, April 1978.]
2. D. Kahn , The Codebreakers , The Story of Secret Writing. New York : Macmillan , 1967 . D. Kahn, The Codebreakers, The Story of Secret Writing. New York: Macmillan, 1967.
3. Communication Theory of Secrecy Systems*
4. M. E. Hellman , “ An extension of the Shannon theory approach to cryptography ,” submitted to IEEE Trans. Inform. Theory . [This was subsequently published in volume 23 , no. 5. pp. 289–294, May 1977.] M. E. Hellman, “An extension of the Shannon theory approach to cryptography,” submitted to IEEE Trans. Inform. Theory. [This was subsequently published in volume 23, no. 5. pp. 289–294, May 1977.]
5. Multiuser cryptographic techniques