References
- Kahn, D. 1978. Codebreaking in World Wars I and II: The major successes and failures, their causes and their effects. Address to the 15 November 1978 Ultra Conference. Appears in Kahn, D. 1983. Kahn on codes: Secrets of the new cryptology, 99–119. New York: MacMillan.
- Kelley, S. 2001. Big machines. Laguna Hills, CA: Aegean Park Press.
- Pekelney, R. 2015. Electronic cipher machine (ECM) Mark II. http://www.maritime.org/tech/ecm2.htm (accessed December 18, 2015).
- Savard, J. and R. Pekelney. 1999. The ECM Mark II: Design, history, and cryptology. Cryptologia 23 (3):211–28. doi:10.1080/0161-119991887856.
- Stamp, M. and W. Chan. 2007. SIGABA: Cryptanalysis of the full keyspace. Cryptologia 31 (3):201–22. doi:10.1080/01611190701394650.
- Stamp, M. and R. Low. 2007. Applied cryptanalysis: Breaking ciphers in the real world, 52–68. Hoboken: Wiley Interscience.
- Sullivan, G. 2002. The ECM Mark II: Some observations on the rotor stepping. Cryptologia 26 (2):97–100. doi:10.1080/0161-110291890795.