[164]Bassières processes for autokey,[147]-[151]Beaufort ciphers,[121]“Bifid” substitution,[210]Book cipher,