


default search action
Cryptologia, Volume 11
Volume 11, Number 1, 1987
- Martin Kochanski:
A Survey of Data Insecurity Packages. 1-15 - Robert S. Winternitz, Martin E. Hellman:
Chosen-Key Attacks on a Block Cipher. 16-20 - Samuel M. Levitin:
Equivalence Classes: toward More Efficient Search. 21-28 - Joseph S. Schick:
With the 849th SIS, 1942-45. 29-39 - Bradford Hardie:
The Potus-Prime Connection: Two Notes (1) Roosevelt, Churchill, and Me. 40-43 - Cipher A. Deavours:
Cryptology Courses at Kean College. 47-50 - Louis Kruh:
Reviews and Things Cryptologic. 51-63
Volume 11, Number 2, 1987
- William P. Bundy:
Some of My Wartime Experiences. 65-77 - Patrick Beesly:
Who was the Third Man at Pyry? 78-80 - David Kahn:
The Codebreaker Behind the Footlights. 81-84 - Linda Y. Gouazé:
Needles and Haystacks: the Search for Ultra in the 1930's (an excerpt). 85-92 - James J. Gillogly:
Breaking an Eighteenth Century Shorthand System. 93-98 - Frank Rubin:
Foiling an Exhaustive Key-Search Attack. 102-107 - John R. Michener:
The Use of Complete, Nonlinear, Block Codes for Nonlinear, Noninvertible Mixing of Pseudorandom Sequences. 108-111 - Robert M. Richardson:
Digital Encryption Standard Users Group. 112-114 - Thomas Cheatham:
Message Decryption and Spelling Checkers. 115-118 - Louis Kruh:
An OBSCURE Cryptographic Device. 119-122 - Louis Kruh:
Reviews and Things Cryptologic. 123-128
Volume 11, Number 3, 1987
- Paul Whitaker, Louis Kruh:
From Bletchley Park to Berchtesgaden. 129-141 - Gilbert Bloch, Cipher A. Deavours:
Enigma before Ultra Polish Work and the French Contribution. 142-155 - Louis Kruh:
The Shortsighted View of a Foresighted Admiral. 156-159 - Cipher A. Deavours:
Sois Belle et Tais-Toi. 162-165 - John R. Michener:
The Application of Key Dependent and Variable Rotor Sets to Generalized Rotor Cryptographic Systems. 166-171 - Justo Sancho:
Enumeration of multivariable decipherable Boolean Functions. 172-181 - Subhash C. Kak:
The Study of the Indus Script General Considerations. 182-191
Volume 11, Number 4, 1987
- John M. Carroll, Lynda E. Robbins:
The Automated Cryptanalysis of Polyalphabetic Ciphers. 193-205 - John Bennett:
Analysis of the Encryption Algorithm Used in the Wordperfect Word Processing Program. 206-210 - Jack Levine, Richard Chandler:
Some Further Cryptographic Applications of Permutation Polynomials. 211-218 - William F. Clarke:
Government Code and Cypher School its Foundation and Development with Special Reference to its Naval Side. 219-226 - Gilbert Bloch, Cipher A. Deavours:
Enigma Before Ultra - the Polish Success and Check (1933-1939). 227-234 - Ralph Erskine, Frode Weierud
:
Naval Enigma: M4 and its Rotors. 235-244 - Louis Kruh:
British Rockex Cipher Machines. 245-247 - Louis Kruh, Ralph Erskine:
Reviews and Things Cryptologic. 248-253

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.