


default search action
Cryptologia, Volume 1
Volume 1, Number 1, 1977
- Brian J. Winkel:
Why Cryptologia? 1-3 - Greg E. Mellen, Lloyd Greenwood:
The Cryptology of Multiplex Systems. 4-16 - Barbara Harris:
A Different Kind of Column. 17-19 - James A. Reeds:
"Cracking" a Random Number Generator. 20-26 - David Kahn:
The biggest Bibliography. 27-42 - David Shulman:
A Reply to Kahn's Review. 43-45 - Cipher A. Deavours:
Unicity Points in Cryptanalysis. 46-68 - Louis Kruh:
Cipher Equipment. 69-75 - Jack Levine, Joel V. Brawley:
Some Cryptographic Applications of Permutation Polynomials. 76-92 - Brian J. Winkel:
Poe Challenge Cipher Finally Broken. 93-96
Volume 1, Number 2, 1977
- Blanchard Hiatt:
Age of Decipherment. 101-105 - Blanchard Hiatt:
"Count Forward Three Score and Ten...". 106-115 - Bruce R. Schatz:
Automated Analysis of Cryptograms. 116-142 - Louis Kruh:
Cipher Equipment. 143-149 - Greg E. Mellen, Lloyd Greenwood:
The Cryptology of Multiplex Systems. 150-165 - David Kahn:
"Get Out Your Secret Decoders, Boys and Girls...". 166 - Cipher A. Deavours:
Analysis of the Hebern Cryptograph Using Isomorphs. 167-185 - James A. Reeds:
Rotor Algebra. 186-194 - Walter Penney:
Grille Reconstruction. 195-201
Volume 1, Number 3, 1977
- David Kahn:
The Significance of Codebreaking and Intelligence in Allied Strategy and Tactics. 209-222 - Cipher A. Deavours:
The Kappa Test. 223-231 - Brian J. Winkel:
Word Ways, a Journal Worth Going Your Way. 232-234 - James A. Reeds:
Entropy calculations and Particular Methods of Cryptanalysis. 235-254 - Louis Kruh:
Cipher Equipment. 255-260 - Albert C. Leighton:
"the Earliest Use of a Dot Cipher". 261-274
- Cipher A. Deavours:
Kullback's "Statistical Methods in Cryptanalysis" - Book Review. 278-280
- Robert H. Morris Sr., Neil J. A. Sloane, Aaron D. Wyner:
Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard. 281-291
Volume 1, Number 4, 1977
- Cipher A. Deavours:
The ITHACA Connection: Computer Cryptography in the Making. 312-317 - A. Ross Eckler:
A Rapid Yes-No Computer-Aided Communicator. 326-333 - Louis Kruh:
MA4210 Alphanumeric pocket Cipher. 334-336 - David Kahn:
Ecclesiastical Cryptography. 337 - Joel V. Brawley, Jack Levine:
Equivalences of Vigenere Systems. 338-361 - D. C. B. Marsh:
Cryptography at the Colorado School of Mines. 362-363 - David W. Straight:
Cryptanalysis and Data Security Course at the University of Tennessee. 363-365 - Herbert S. Bright:
Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext. 366-370 - David Kahn:
Reports from the Reich. 371 - Louis Kruh:
The Churchyard Ciphers. 372-375 - Harold Joseph Highland:
A Simulation Exercise. 376-377 - David Kahn:
German Military Eavesdroppers. 378-380 - Cipher A. Deavours, James A. Reeds:
The Enigma Part I Historical Perspectives. 381-391 - Peter P. Fagone:
A Message in Cipher Written by General Cornwallis during the Revolutionary War. 392-395 - Brian J. Winkel:
There and There. 396-405 - Gustavus J. Simmons, Michael J. Norris:
Preliminary Comments on the M.I.T. Public-Key Cryptosystem. 406-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.