default search action
Cryptologia, Volume 16
Volume 16, Number 1, 1992
- Louis Kruh:
Reviews and Things Cryptologic. 1-22 - Bill Robinson:
The Fall and Rise of Cryptanalysis in Canada. 23-38 - Ralph Erskine:
The German Naval Grid in World War II. 39-51 - John M. Carroll, Jeff Solo, Perry T. Wong:
Chaos in Cryptography: the Escape from the Strange Attractor. 52-72 - Krzysztof Gaj:
Polish Cipher Machine - Lacida. 73-80
- Louis Kruh:
Betrayal at PEARL Harbor Book Review. 81-85
- Louis Kruh:
Sliding Code Device of Unknown Origin. 86-88
Volume 16, Number 2, 1992
- Ibrahim A. Al-Kadit:
Origins of Cryptology: the Arab Contributions. 97-126 - John Rabson:
All are Well at Boldon a mid-Victorian Code System. 127-135 - Robert McLaughlin:
Yet Another Machine to Break des. 136-144 - Louis Kruh:
Army - Navy Collaboration for Cryptanalysis of Enemy Systems. 145-164 - George Sassoon:
The Application of Sukhotin's Algorithm to certain non-English Languages. 165-173 - David Alvarez:
A Papal Diplomatic Code. 174-176 - William A. Webb:
A Public Key Cryptosystem based on complementing Sets. 177-181 - Louis Kruh:
Reviews and Things Cryptologic. 182-190
Volume 16, Number 3, 1992
- Peter Wayner:
Mimic Functions. 193-214 - John C. King, Dennis R. Bahler:
An Implementation of Probabilistic Relaxation in the Cryptanalysis of Simple Substitution Ciphers. 215-225 - Ken Shirriff, Curt Welch, Andrew Kinsman:
Decoding a VCR Controller Code. 227-234 - Louis Kruh:
Reviews and Things Cryptologic. 235-249 - Douglas W. Mitchell:
"Rubik's Cube" as a Transposition Device. 250-256 - Alison L. Oswald:
William Frederick Friedman: a Pictorial Essay. 257-264 - Laurence F. Safford:
The Functions and Duties of the Cryptography Section, Naval Communications. 265-281 - Caxton C. Foster:
A Comparison of vowel Identification Methods. 282-286
Volume 16, Number 4, 1992
- David Kahn:
Roosevelt, Magic, and Ultra. 289-319 - Peter P. Fagone:
Partial Solutions of swift's 18th Century Mock Latin Passages. 327-338 - Louis Kruh:
Reviews and Things Cryptologic. 339-346 - David W. Gaddy:
Rochford's Cipher: a Discovery in Confederate Cryptography. 347-362
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.