References
- Berg-Kirkpatrick, T., and D. Klein. 2013. Decipherment with a million random restarts. Proceedings of the Conference on Empirical Methods in Natural Language Processing, 18–21 October, Seattle, Washington, 874–878.
- Bhandarkar, M. 2010. MapReduce programming with apache Hadoop. Parallel and Distributed Processing (IPDPS), 2010 IEEE International Symposium, 1–1.
- The Brown Corpus of standard American English. http://www.cs.toronto.edu/∼gpenn/csc401/a1res.html.
- Cave, R. L., and L. P. Neuwirth. 1980. Hidden Markov models for English. in Hidden Markov models for speech, ed. J. D. Ferguson Princeton, NJ, IDA-CRD, October http://cs.sjsu.edu/stamp/RUA/CaveNeuwirth/.
- Dao, T. 2005. Purple cipher: Simulation and improved hill-climb attack, Undergraduate research report, Department of Computer Science, San Jose State University. http://cs.sjsu.edu/∼stamp/papers/180H.pdf.
- Dhavare, A., R. M. Low, and M. Stamp. 2013. Efficient cryptanalysis of homophonic substitution ciphers. Cryptologia 37(3):250–81.
- Freeman, W., G. Sullivan, and F. Weierud. 2005. Purple revealed: Simulation and computer-aided cryptanalysis of Angooki Taipu B. Cryptologia 29:193–232.
- Hymel, S. R. 2011. Massively parallel hidden Markov models for wireless applications. Master’s thesis, Department of Electrical Engineering, Virginia Polytechnic Institute and State University, http://scholar.lib.vt.edu/theses/available/etd-12082011-204951/unrestricted/Hymel_SR_T_2011.pdf.
- IMDB. Marvin the Martian. http://www.imdb.com/character/ch0030547/.
- Jakobsen, T. 1995. A fast method for the cryptanalysis of substitution ciphers. Cryptologia 19(3):265–74.
- Owens, J. D., M. Houston, D. Luebke, S. Green, J. E. Stone, and J. C. Phillips. 2008. GPU computing. Proceedings of the IEEE 96(5):879–99
- Rabiner, L. R. February 1989. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2):257–86, http://www.cs.ubc.ca/~murphyk/Bayes/rabiner.pdf.
- Stamp, M. 2012. A revealing introduction to hidden Markov models, http://www.cs.sjsu.edu/~stamp/RUA/HMM.pdf.
- Stamp, M., and R. M. Low. 2007. Applied cryptanalysis: Breaking ciphers in the real world. Hoboken, NJ: John Wiley and Sons.
- Vobbilisetty, R. 2015. Cryptanalysis of classic ciphers using hidden Markov models. Master’s report, Department of Computer Science, San Jose State University. http://scholarworks.sjsu.edu/etd_projects/407/.
- Wong, W., and M. Stamp. 2006. Hunting for metamorphic engines. Journal of Computer Virology 2(3):211–29.
- Zeller, C. 2011. CUDA C/C++ Basics. NVIDIA Corporation. http://www.nvidia.com/docs/IO/116711/sc11-cuda-c-basics.pdf.