These are the sources and citations used to research Coding & Cryptography. This bibliography was generated on Cite This For Me on
In-text: (Christensen, 2005)
Your Bibliography: Christensen, C., 2005. MAT 483 - 001 Syllabus. [online] Northern Kentucky University. Available at: <http://www.nku.edu/~christensen/071mat483001.html> [Accessed 15 February 2015].
In-text: (Christensen, 2015)
Your Bibliography: Christensen, D., 2015. The Cracking of Enigma. 1st ed. [ebook] Washington D.C.: University of Washington. Available at: <https://courses.cs.washington.edu/courses/csep590/06wi/finalprojects/> [Accessed 15 February 2015].
In-text: (Enigma History, 2013)
Your Bibliography: Cryptomuseum.com. 2013. Enigma History. [online] Available at: <http://www.cryptomuseum.com/crypto/enigma/hist.htm> [Accessed 15 February 2015].
In-text: (SIGABA, 2014)
Your Bibliography: Cryptomuseum.com. 2014. SIGABA. [online] Available at: <http://www.cryptomuseum.com/crypto/usa/sigaba/> [Accessed 15 February 2015].
In-text: (Typex, 2014)
Your Bibliography: Cryptomuseum.com. 2014. Typex. [online] Available at: <http://www.cryptomuseum.com/crypto/uk/typex/index.htm> [Accessed 15 February 2015].
In-text: (Dade, 2015)
Your Bibliography: Dade, L., 2015. How Enigma Machines Work. [online] Enigma.louisedade.co.uk. Available at: <http://enigma.louisedade.co.uk/howitworks.html> [Accessed 15 February 2015].
In-text: (Dvorsky, 2012)
Your Bibliography: Dvorsky, G., 2012. Did Polish cryptographers crack the Nazi Enigma code before Alan Turing?. [online] io9. Available at: <http://io9.com/5950138/did-polish-cryptographers-crack-the-nazi-enigma-code-before-alan-turing> [Accessed 15 February 2015].
In-text: (Ellis, 2005)
Your Bibliography: Ellis, C., 2005. Exploring the Enigma | plus.maths.org. [online] Plus.maths.org. Available at: <http://plus.maths.org/content/exploring-enigma> [Accessed 17 February 2015].
In-text: (Ellsbury, 1998)
Your Bibliography: Ellsbury, G., 1998. Description of the Enigma. [online] Ellsbury.com. Available at: <http://www.ellsbury.com/enigma2.htm> [Accessed 15 February 2015].
In-text: (Ellsbury, 1998)
Your Bibliography: Ellsbury, G., 1998. Historical Background. [online] Ellsbury.com. Available at: <http://www.ellsbury.com/enigma1.htm> [Accessed 15 February 2015].
In-text: (Hinsley and Stripp, 2001)
Your Bibliography: Hinsley, F. and Stripp, A., 2001. Codebreakers. Oxford [England]: Oxford University Press.
In-text: (Code Breaking, 2014)
Your Bibliography: History. 2014. Code Breaking. [online] Available at: <http://www.history.co.uk/study-topics/history-of-ww2/code-breaking> [Accessed 15 February 2015].
In-text: (Judd, 2008)
Your Bibliography: Judd, A., 2008. ENIGMA'S SECRET TWIN. [online] More Intelligent Life. Available at: <http://moreintelligentlife.com/story/enigma039s-secret-twin> [Accessed 15 February 2015].
In-text: (Krishan, 2004)
Your Bibliography: Krishan, K., 2004. 1st ed. [ebook] North Carolina: North Carolina State University. Available at: <http://www4.ncsu.edu/~kksivara/sfwr4c03/lectures/lecture9.pdf> [Accessed 15 February 2015].
In-text: (Learn Cryptography — Cracking the Enigma Code, 2014)
Your Bibliography: Learncryptography.com. 2014. Learn Cryptography — Cracking the Enigma Code. [online] Available at: <http://learncryptography.com/cracking-the-enigma-code/> [Accessed 16 February 2015].
In-text: (Lyons, 2012)
Your Bibliography: Lyons, J., 2012. Homophonic Substitution Cipher. [online] Practicalcryptography.com. Available at: <http://practicalcryptography.com/ciphers/homophonic-substitution-cipher/> [Accessed 15 February 2015].
In-text: (Factsheets : War of Secrets: Cryptology in WWII, 2015)
Your Bibliography: Nationalmuseum.af.mil. 2015. Factsheets : War of Secrets: Cryptology in WWII. [online] Available at: <http://www.nationalmuseum.af.mil/factsheets/factsheet.asp?id=9722> [Accessed 15 February 2015].
In-text: (Poole, 2013)
Your Bibliography: Poole, J., 2013. SIGABA: ECM MARK II. 1st ed. [ebook] Available at: <http://www.usna.edu/Users/math/wdj/_files/documents/sm473-capstone/poole_SIGABA.pdf> [Accessed 15 February 2015].
In-text: (The Enigma Machine | Online Information Bank | Research Collections | Royal Naval Museum at Portsmouth Historic Dockyard, 2002)
Your Bibliography: Royalnavalmuseum.org. 2002. The Enigma Machine | Online Information Bank | Research Collections | Royal Naval Museum at Portsmouth Historic Dockyard. [online] Available at: <http://www.royalnavalmuseum.org/info_sheets_enigma.htm> [Accessed 15 February 2015].
In-text: (Sale, n.d.)
Your Bibliography: Sale, T., n.d. Virtual Bletchley Park. [online] Codesandciphers.org.uk. Available at: <http://www.codesandciphers.org.uk/virtualbp/poles/poles.htm> [Accessed 15 February 2015].
In-text: (Symmetric and Asymmetric ciphers, 2012)
Your Bibliography: Tech-FAQ.com. 2012. Symmetric and Asymmetric ciphers. [online] Available at: <http://www.tech-faq.com/symmetric-and-asymmetric-ciphers.html> [Accessed 15 February 2015].
In-text: (The Telegraph, 2015)
Your Bibliography: The Telegraph, 2015. Imitation Game: how did the Enigma machine work?. [video] Available at: <http://www.telegraph.co.uk/culture/film/11229586/Imitation-Game-how-did-the-Enigma-machine-work.html> [Accessed 15 February 2015].
In-text: (Weston, 2014)
Your Bibliography: Weston, D., 2014. Information Security & Information & Network Security Lecture 4. 1st ed. [ebook] Birbeck: University of London. Available at: <http://www.dcs.bbk.ac.uk/~dweston/infosec/Lecture4.pdf> [Accessed 15 February 2015].
10,587 students joined last month!