[[MACW 78] |
F. J. Mac Williams, N. J. A. Sloane: |
The theory of error correcting codes
North Holland, Amsterdam, 1978. |
|||
[[MAHO 73] |
M.S.Mahoney: |
The mathematical career of Pierre de
Fermat
Princeton University Press, Princeton, New Jersey, 1973. |
|||
[[MARKS 98] |
Leo Marks: |
Between Silk and Cyanide The story of S.O.E.'s code war Harper Collins Publishers, London, 1998. |
|||
[[MATS 94] |
M. Matsui: |
Linear Cryptoanalysis
Method for DES chipper
eUro Crypt ’93 Advances in Cryptology,
Proceedings, Springer – Verlag 1994 pp 386-387. |
|||
[[MENE 93] |
A. J. Menezes: |
Elliptic Curve Public
key Cryptosystems
Kluwer Academic
Publishers, Norwell, MH, 1993. |
|||
[[MENE 97] |
A. J. Menezes, P. C. van Qorschot, S. A.
Vanstone: |
Handbook of applied cryptography
CBS Press, Boca Raton, New York, London, Tokyo, 1997. |
|||
[[MENF 94] |
B. Menfus: |
Business Continuity
IS AUDIT &
CONTROLL JOURNAL. VOLOME I. 1994. |
|||
[[MEUL 98] |
Michael van der Meulen: |
The
road to German diplomatic ciphers – 1919 to 1945. Cryptologia XXII
(1998) No2 141-166. |
|||
|
[MEYER 82] |
Carl H.Meyer and Stephen M.Matyas: |
Cryptography: A New
Dimension in Computer Data Security New York, John Wiley & Sons, 1982. |
||
|
[MILLIKIN ] |
Donald D.Millikin: |
Elementary Cryptography and
Cryptanalysis
Laguna Hills, Aegean Park Press, n.d. |
||
|
[MOORE 62] |
Dan Tyler Moore, Martha Waller: |
Cloak & Cipher
BOBBS-MERRILL, New York, 1962. |
||
|
[MOSK 01] |
I.S.Moskowitz: |
Information Hiding
4th International Workshop, Pittsburgh, USA (Proceedings) |
||