Coding Theory and Cryptography:
From Enigma and Geheimschreiber to Quantum Theory
SpringerVerlag, 2000. ISBN 3540663363
Summary: These are the proceedings of the Conference on Coding Theory,
Cryptography, and Number Theory held at the U. S. Naval Academy
during October 2526, 1998. This book concerns elementary and
advanced aspects of coding theory and cryptography.
The coding theory contributions deal mostly with algebraic
coding theory. Some of these papers are expository, whereas
others are the result of original research. The emphasis is
on geometric Goppa codes, but there is also a paper on codes
arising from combinatorial constructions. There are both,
historical and mathematical papers on cryptography.
Several of the contributions on cryptography describe the
work done by the British and their allies during World War II to
crack the German and Japanese ciphers. Some mathematical aspects
of the Enigma rotor machine and more recent research on quantum
cryptography are described. Moreover, there are two papers
concerned with the RSA cryptosystem and related numbertheoretic issues.
Chapters

Contents Reminiscences and Reflections of a Codebreaker,
by Peter Hilton
pdf

FISH and I, by
W. T. Tutte
pdf

Sturgeon, The FISH BP Never Really Caught, by
Frode Weierud, pdf

ENIGMA and PURPLE: How the Allies Broke German and Japanese Codes
During the War, by David A. Hatch
pdf

The Geheimschreiber Secret, by Lars Ulfving,
Frode Weierud
pdf

The RSA Public Key Cryptosystem, by William P. Wardlaw
pdf

Number Theory and Cryptography (using Maple), by
John Cosgrave
pdf

A Talk on Quantum Cryptography or How Alice Outwits Eve, by
Samuel J. Lomonaco, Jr.
pdf

The Rigidity Theorems of Hamada and Ohmori, Revisited, by
T. S. Michael
pdf

Counting Prime Divisors on Elliptic Curves and Multiplication in
Finite Fields,
by M. Amin Shokrollahi
pdf,

On Cyclic MDSCodes,
by
M. Amin Shokrollahi
pdf

Computing Roots of Polynomials over Function Fields of Curves, by
Shuhong Gao,
M. Amin Shokrollahi
pdf

Remarks on codes from modular curves: MAPLE applications, by
David Joyner and Salahoddin Shokranian,
pdf
For more cryptologic history, see
the National Cryptologic Museum.
This is now out of print and will not be reprinted
(as far as I know). It is not available at amazon.com nor
even advertised on the springer website, but is
available at a few other places online (buy.com and amazon.de,
as of Oct, 2003).
The above ps and pdf files were posted by
written permission. I thank SpringerVerlag for this.
"Material contained herein is made available for the purpose of peer
review and discussion and does not necessarily reflect the views of the
Department of the Navy or the Department of Defense."
Last modified 20170201.