References
- American Cryptogram Association (ACA). 2005. The ACA and you. http://www.cryptogram.org/cdb/aca.info/aca.and.you/aca.and.you.pdf, archived at https://web.archive.org/web/; http://www.cryptogram.org/cdb/aca.info/aca.and.you/aca.and.you.pdf. The relevant pages are also available as http://www.cryptogram.org/downloads/aca.info/ciphers/QuagmireI.pdf, QuagmireII.pdf, QuagmireIII.pdf, and QuagmireIV.pdf
- Friedman, W. F. 1920. The index of coincidence and its application in cryptography. Geneva, Illinois: Riverbank Laboratories Department of Ciphers Publication 22.
- Friedman, W. F., and L. D. Callimahos. 1956. Military cryptanalytics. Part I, Vol. 2. Aegean Park Press, reprinted 1985.
- Gaines, H. F. 1956. Cryptanalysis: A study of ciphers and their solution. New York, NY: Dover Publications.
- Jakobsen, T. 1995. A fast method for cryptanalysis of substitution ciphers. Cryptologia 19 (3):265–274. doi:10.1080/0161-119591883944.
- King, J. C. 1994. An algorithm for the complete automated cryptanalysis of periodic polyalphabetic substitution ciphers. Cryptologia 18 (4):332–355. doi:10.1080/0161-119491882928.
- Morelli, R., and R. Walde. 2006. Evolving keys for periodic polyalphabetic ciphers. Proceedings of the Nineteenth International Florida Artificial Intelligence Research Society Conference, 445–450. Accessed July 7, 2006. http://www.aaai.org/Papers/FLAIRS/2006/Flairs06-087.pdf.
- Mountjoy, M. 1963. The bar statistics. NSA Technical Journal VII (2, 4).
- Shannon, C. E. 1948. A mathematical theory of communication. Bell System Technical Journal 27 (3):379–423. doi:10.1002/j.1538-7305.1948.tb01338.x.