default search action
Cryptologia, Volume 13
Volume 13, Number 1, 1989
- Jack Levine, Richard Chandler:
The Hill Cryptographic System with Unknown Cipher Alphabet but Known Plaintext. 1-28 - Robert A. J. Matthews:
On the Derivation of a "Chaotic" Encryption Algorithm. 29-42 - Jeff Belkora:
Belkoranic Hill Ciphering. 43-49 - Gary R. Greenfield:
A Cryptography Course for the University of Richmond. 50-60 - Roland Anderson:
Cryptanalytig Properties of Short Substitution Ciphers. 61-72 - Subhash C. Kak:
A New Method for Coin Flipping by Telephone. 73-78 - Louis Kruh:
The Heraldry of Cryptology - Addendum. 79-84 - Louis Kruh, Ralph Erskine:
Reviews and Things Cryptologic. 85-96
Volume 13, Number 2, 1989
- Wolfgang W. Mache:
The Siemens Cipher Teletype in the History of Telecommunications. 97-117 - William F. Clarke:
Post War Organization. 118-122 - Louis Kruh:
British-American Cryptanalytic Cooperation and an unprecedented Admission by Winston Churchill. 123-134 - Ralph Erskine:
From the Archives: a Bletchley Park Assessment of German Intelligence on Torch. 135-142 - Charles R. Myer:
Viet Cong SIGINT and U.S. Army COMSEC in Vietnam. 143-150 - George Georgiou:
A Method to Strengthen Ciphers. 151-160 - Roland Anderson:
Recognizing Complete and Partial Plaintext. 161-166 - Louis C. Guillou, Marc Davio, Jean-Jacques Quisquater:
Public-Key Techniques: Randomness and Redundancy. 167-189 - David Kahn:
A Soviet Wiretapping Office. 190-191
Volume 13, Number 3, 1989
- Carl Boyd:
Anguish under Siege: High-Grade Japanese Signal Intelligence and the Fall of Berlin. 193-209 - Cipher A. Deavours:
A Ku Klux Klan Cipher. 210-214 - Louis Kruh:
Reviews and Things Cryptologic. 215-242 - Daniel D. Wheeler:
Problems with Chaotic Cryptosystems. 243-250 - Cipher A. Deavours, Louis Kruh:
The Swedish HC-9 Ciphering Machine. 251-265 - Robert A. J. Matthews:
A Rotor Device for Periodic and Random-Key Encryption. 266-272 - Deane R. Blackman:
The Gromark Cipher, and Some Relatives. 273-282
Volume 13, Number 4, 1989
- David A. August:
Cryptography and Exploitation of Chinese Manual Cryptosystems Part I: the Encoding Problem. 289-302 - John M. Carroll, Lynda E. Robbins:
Computer Cryptanalysis of Product Ciphers. 303-326 - Louis Kruh:
Tales of Yardley: Some Sidelights to His Career. 327-358 - Louis Kruh:
Reviews and Things Cryptologic. 359-377
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.