default search action
Cryptologia, Volume 12
Volume 12, Number 1, 1988
- Peter K. Pearson:
Cryptanalysis of the Ciarcia Circuit Cellar Data Encryptor. 1-10 - Carl Hammer:
Second order Homophonic Ciphers. 11-20 - John R. Michener:
Recent Developments in Electronic Circuitry and their effects on the Implementation of Substitution-Permutation Block codes. 21-24 - Frank Rubin:
The Cryptographic Uses of Post Tag Systems. 25-33 - Louis Kruh, Ralph Erskine, Michael Barlow:
Reviews and Things Cryptologic. 37-51 - William F. Clarke:
The Years between. 52-58 - Ralph Erskine:
From the Archives Tunny Decrypts. 59-61 - Jonathan P. Arnold:
Herbert O. Yardley, Gangbuster. 62-64
Volume 12, Number 2, 1988
- Louis Kruh:
Stimson, the Black Chamber, and the "gentlemen's Mail" Quote. 65-89 - William F. Clarke:
Bletchley Park 1941-1945. 90-97 - Ralph Erskine:
From the Archives: U-boat HF WT signalling. 98-106 - Peter Wayner:
A Redundancy Reducing Cipher. 107-112 - Subhash C. Kak:
The Aryabhata Cipher. 113-117 - Louis Kruh:
Reviews and Things Cryptologic. 118-127
Volume 12, Number 3, 1988
- Subhash C. Kak:
A frequency Analysis of the Indus Script. 129-143 - Carl M. Ellison:
A solution of the Hebern Messages. 144-158 - Peter Jamnig:
Securing the RSA-Cryptosystem against cycling Attacks. 159-164 - Martin Kochanski:
Another Data Insecurity package. 165-173 - William F. Clarke:
Post War Organization. 174-177 - Gilbert Bloch, Cipher A. Deavours:
Enigma Avant ultra Enigma before ultra. 178-184 - Louis Kruh:
Reviews and Things Cryptologic. 185-192
Volume 12, Number 4, 1988
- John M. Carroll, Lynda E. Robbins:
Using Binary derivatives to Test an enhancement of des. 193-208 - Donald V. Miller:
Cryptanalysis of a two Round Version of des using Index Implications. 209-219 - Robert A. J. Matthews:
An Empirical Method for Finding the Keylength of periodic Ciphers. 220-224 - Kaoru Kurosawa, Toshiya Itoh, Masashi Takeuchi:
Public Key Cryptosystem using a reciprocal number with the same Intractability as Factoring a Large number. 225-233 - Richard I. Polis:
European Needs and Attitudes towards Information Security. 234-239 - Louis Kruh, Johnnie Murray:
A pulp Magazine Cipher. 240 - Louis Kruh:
The Beale Cipher as a Bamboozlement - Part II. 241-246 - Cipher A. Deavours:
Interactive solution of Beaufort Enciphered Text with Overlapping Keys. 247-255 - Mike Barlow:
A Mathematical Word Block Cipher. 256-264 - Louis Kruh:
Reviews and Things Cryptologic. 265-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.