default search action
Cryptologia, Volume 10
Volume 10, Number 1, 1986
- Brian J. Winkel:
Letter from One of the Editors. 1 - Louis Kruh:
The Control of Public Cryptography and Freedom of Speech - a Review. 2-9 - Roland Anderson:
Improving the Machine Recognition of Vowels in Simple Substitution Ciphers. 10-22 - Mike Barlow:
A Machine Solution of the Amsco Cipher. 23-33
- Frode Weierud:
Machine Secrets: a Book Review. 34-37
- David Kahn:
Secrets of the Codebreakers. 38-41 - Louis Kruh:
Announcements and Reviews of Things Cryptologic. 42-45 - Cipher A. Deavours:
Elle a de l'intelligence et de la Conversation. 47-49 - Ralph Erskine:
From the Archives GC and CS Mobilizes "Men of the Professor Type". 50-59 - Louis Kruh:
18th Century Shorthand Expert Needed. 60-62 - Louis Kruh:
Cipher Equipment. 63 - Donald W. Davies:
Bolton's Cypher Wheel. 64
Volume 10, Number 2, 1986
- Louis Kruh:
The Truman Memorandum. 65-74 - Charles-Hubert Desnoyers:
Cryptanalytic Essay - Part I Solution of Problem no. 166, Published in Elementary Cryptanalysis. 75-95 - Yves Roggeman:
Remarks on the Auto-Correlation Function of Binary Periodic Sequences. 96-100 - Louis Kruh:
Cryptology and the Law - V. 101-107 - Louis Kruh:
Reviews of Things Cryptologic. 110-122 - Martin Minow:
No title. 123-125 - Louis Kruh:
18th Century Shorthand Expert Needed (Re-Run). 126-127
Volume 10, Number 3, 1986
- Louis Kruh:
Cryptology and the Law - VI. 129-133 - Gilbert Bloch, Ralph Erskine:
Enigma: the Dropping of the Double Encipherment. 134-141 - Richard Outerbridge:
Some Design Criteria for Feistel-Cipher Key Schedules. 142-156 - Charles-Hubert Desnoyers:
Cryptanalytic Essay - Part II Solution of Problem no. 166, Published in Elementary Cryptanalysis. 158-183 - Louis Kruh:
Reviews of Things Cryptologic. 184-191
Volume 10, Number 4, 1986
- John M. Carroll, Steve Martin:
The Automated Cryptanalysis of Substitution Ciphers. 193-209 - Michael Barlow:
The Voynich Manuscript - by Voynich? 210-216 - Frank Rubin:
Foiling the Known-Plaintext Attack. 217-223 - Richard Outerbridge:
Cadbury Code Confidential. 225-226
- Ralph Erskine:
A Link with PEARL Harbor? Book Review. 227-229
- Wolfgang Mache:
Geheimschreiber. 230-242 - Cipher A. Deavours, Louis Kruh:
Appendix mechanics of the German Telecipher Machine. 243-247 - Louis Kruh:
Cryptology and the Law - VII. 248-253
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.