References
- Beckman, B. 2003. Codebreakers: Arne Beurling and the Swedish crypto program during World War II. Providence, RI: American Mathematical Society.
- Bill Tutte memorial fund. http://billtuttememorial.org.uk/about-bill-tutte/ (a ccessed 6 June 2017).
- Chandler, W. W. 1983. The installation and maintenance of Colossus. Annals of the History of Computing 5 (3):260–62. doi:10.1109/mahc.1983.10083.
- Coombs, A. W. M. 1983. The making of Colossus. Annals of the History of Computing 5 (3):253–59. doi:10.1109/mahc.1983.10085.
- Copeland, B. J. and others. 2006. Colossus: The secrets of Bletchley Park’s codebreaking computers. Oxford: Oxford University Press.
- Copeland, J., et al. 2017. The Turing guide. Oxford: Oxford University Press.
- Cragon, H. G. 2003. From Fish to Colossus. Dallas, TX: Cragon Press.
- Davies, D. W. 1995. The Lorenz cipher machine SZ42. Cryptologia 19 (1):39–61. doi:10.1080/0161-119591883755.
- Erskine, R., and M. Smith. eds. 2011. The Bletchley Park codebreakers: How Ultra shortened the war and led to the birth of the computer. London: Biteback Publishing.
- Flowers, T. H. 1983. The design of Colossus. Annals of the History of Computing 5 (3):239–52. doi:10.1109/mahc.1983.10079.
- Gannon, P. 2006. Colossus: Bletchley Park’s greatest secret. London: Atlantic Books.
- Hinsley, F. H., E. E. Thomas, C. F. G. Ransom, and R. C. Knight. 1981. British intelligence in the Second World War. New York: Cambridge University Press.
- Hinsley, F. H., and A. Stripp, eds. 1993. Codebreakers: The inside story of Bletchley Park. Oxford: Oxford University Press.
- Johnson, B. 2004. The secret war. Barnsley, England: Pen and Sword. [This is a reprint of the 1978 book which was published by BBC Books].
- Joyner, D. 2000. Coding theory and cryptography: From Enigma and Geheimschreiber to quantum theory. Berlin-Heidelberg: Springer-Verlag.
- Michie, D. 2002. Colossus and the breaking of the wartime “Fish” codes. Cryptologia 26 (1):17–58. doi:10.1080/0161-110291890740.
- Mulligan, T. P. 1987. Spies, ciphers and ‘Zitadella’: Intelligence and the Battle of Kursk, 1943. Journal of Contemporary History 22 (2):235–60. doi:10.1177/002200948702200203.
- Reeds, J. A., W. Diffie, and J. V. Field, eds. 2015. Breaking teleprinter ciphers at Bletchley Park: An edition of I. J. Good, D. Michie, G. Timms general report on Tunny with emphasis on statistical methods (1945). Hoboken: John Wiley & Sons.
- Smith, M. 1999. Station X: Decoding Nazi secrets. New York: TV Books.
- Tutte, W. T. 2000. FISH and I, which is pp. 9–17 of Joyner, David (ed.). 2000. Coding theory and cryptography from Enigma and Geheimschreiber to quantum theory. Berlin-Heidelberg: Springer Verlag. [A pdf is available at https://uwaterloo.ca/combinatorics-and-optimization/sites/ca.combinatorics-and-optimization/files/uploads/files/corr98-39.pdf].
- Tutte, W. T. 2003. MacTutor history of mathematics archive. http://www-history.mcs.st-and.ac.uk/Biographies/Tutte.html (accessed 7 June 2017).