References
- Bauer , F. L. 2007 . Decrypted Secrets, Fourth Edition . Berlin Heidelberg : Springer-Verlag .
- Christensen , C. 2012 . “Review of ‘The Shadow of Pont du Gard’ by Zdzislaw Jan Kapera,” Cryptologia , 36 ( 2 ): 176 – 178 .
- Gaj , K. 1992 . “Polish Cipher Machine—LACIDA,” Cryptologia , 16 ( 1 ): 73 – 80 .
- Givierge , M. 1978 . Course in Cryptography . Laguna Hills , CA : Aegean Park Press .
- Hinsley , F. H. 1986 . British Intelligence in the Second World War , Volume 1 . Southampton : Her Majesty's Stationery Office .
- Kahn , D. 2002 . “A Riverbank Trove,” Cryptologia , 26 ( 3 ): 161 – 164 .
- Kapera , Z. J. 2011 . In the Shadow of Pont du Gard . Krakow-Mogilany : The Enigma Press .
- Kozaczuk , W. 1984 . Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II . Edited and translated by Christopher Kasparek . Fredrick , MD : University Publications of America .
- Kozaczuk , W. and J. Straszak . 2004 . Enigma: How the Poles Broke the Nazi Code . New York : Hippocrene Books .
- Lawrence , J. 2004. “The Versatility of Rejewski's Method: Solving for the Wiring of the Second Rotor,” Cryptologia , 28(2):149–152.
- Lawrence , J. 2005 . “A Study of Rejewski's Equations,” Cryptologia , 29 ( 3 ): 233 – 247 .
- Lawrence , J. 2005 . “Factoring for the Plugboard—Was Rejewski's Proposed Solution for Breaking The Enigma Feasible?,” Cryptologia , 29 ( 4 ): 343 – 366 .
- Rejewski , M. 1981 . “How Polish Mathematicians Deciphered the Enigma,” Annals of the History of Computing , 3 ( 3 ): 213 – 234 .
- Rejewski , M. 1982 . “Mathematical Solution of the Enigma Cipher,” Cryptologia , 6 ( 1 ): 1 – 18 .
- Rejewski , M. 1982 . “Remarks on Appendix 1 to British Intelligence in the Second World War by F.H. Hinsley,” Cryptologia , 6 ( 1 ): 75 – 83 .
- Woytak , R. 1982 . “A Conversation with Marian Rejewski,” Cryptologia , 6 ( 1 ): 50 – 60 .