Whalen, Terence (1994). "The Code for Gold: Edgar Allan Poe and Cryptography". Representations. 46 (46). University of California Press: 35–57. doi:10.2307/2928778. JSTOR2928778.
Sharbaf, M.S. (1 November 2011). "Quantum cryptography: An emerging technology in network security". 2011 IEEE International Conference on Technologies for Homeland Security (HST). pp. 13–19. doi:10.1109/THS.2011.6107841. ISBN978-1-4577-1376-7. S2CID17915038.
Broemeling, Lyle D. (1 November 2011). "An Account of Early Statistical Inference in Arab Cryptology". The American Statistician. 65 (4): 255–257. doi:10.1198/tas.2011.10191. S2CID123537702.
Whalen, Terence (1994). "The Code for Gold: Edgar Allan Poe and Cryptography". Representations. 46 (46). University of California Press: 35–57. doi:10.2307/2928778. JSTOR2928778.
Cocks, Clifford (20 November 1973). "A Note on 'Non-Secret Encryption'"(PDF). CESG Research Report. Archived(PDF) from the original on 27 July 2011. Retrieved 22 July 2009.
Sharbaf, M.S. (1 November 2011). "Quantum cryptography: An emerging technology in network security". 2011 IEEE International Conference on Technologies for Homeland Security (HST). pp. 13–19. doi:10.1109/THS.2011.6107841. ISBN978-1-4577-1376-7. S2CID17915038.
Broemeling, Lyle D. (1 November 2011). "An Account of Early Statistical Inference in Arab Cryptology". The American Statistician. 65 (4): 255–257. doi:10.1198/tas.2011.10191. S2CID123537702.
Cocks, Clifford (20 November 1973). "A Note on 'Non-Secret Encryption'"(PDF). CESG Research Report. Archived(PDF) from the original on 27 July 2011. Retrieved 22 July 2009.