default search action
Cryptologia, Volume 19
Volume 19, Number 1, 1995
- Jim Reeds:
William F. Friedman's transcription of the Voynich Manuscript. 1-23 - Louis Kruh:
When a Court ruled for BACON Instead of Shakespeare-Temporarily. 24-38 - Donald W. Davies:
The Lorenz Cipher Machine Sz42. 39-61 - Robin Denniston:
Fetterlein and Others. 62-64 - A. Ray Miller:
The Cryptographic Mathematics of Enigma. 65-80 - Ralph Erskine:
Ultra and Some U. S. Navy Carrier Operations. 81-96
- Louis Kruh:
In the Name of Intelligence: Essays in Honor of Walter Pforzheimer Book Review. 97-101
- Louis Kruh:
Reviews and Things Cryptologic. 102-112
Volume 19, Number 2, 1995
- Edward J. Drea:
Were the Japanese Army Codes Secure? 113-136 - Cipher A. Deavours:
The Autoscritcher. 137-148 - David Kahn:
The Cryptologic Origin of Braille. 151-152 - Karl de Leeuw, Hans van der Meer:
A Turning grille from the Ancestral Castle of the Dutch Stadtholders. 153-165 - David Kahn:
Enemy Codes and their Solution. 166-197 - Horng-Twu Liaw, Chin-Laung Lei:
An Efficient Password Authentication Scheme Based on a Unit Circle. 198-208 - Louis Kruh:
Reviews and Things Cryptologic. 209-215 - Caxton C. Foster:
Secret Musical codewords. 216
Volume 19, Number 3, 1995
- Stephen Schlesinger:
Cryptanalysis for Peacetime: Codebreaking and the Birth and Structure of the United Nations. 217-235 - Louis Kruth:
Riverbank Laboratory Correspondence, 1919 (SRH-50). 236-246 - Michael van der Meulen:
The Book Cipher System of the Wehrmacht. 247-260 - David Alvarez:
A Dutch Enciphered Code. 261-264 - Thomas Jakobsen:
A Fast Method for Cryptanalysis of Substitution Ciphers. 265-274 - Frank Rubin:
The Quadratic and Double Quadratic Residue Ciphers. 275-284 - Peter Wayner:
Strong Theoretical Stegnography. 285-299 - Louis Kruh:
Reviews and Things Cryptologic. 300-318
Volume 19, Number 4, 1995
- Ralph E. Weber:
Seward's Other Folly: the Fight over America's First Encrypted Cable. 321-348 - Michael van der Meulen:
Werftschlüssel: A German Navy Hand Cipher System Part I. 349-364 - Louis Kruh:
Reviews and Things Cryptologic. 365-374 - Tom Johnson:
The Mystery of an Old Japanese Codebook. 380-384 - David W. Gaddy:
The Cylinder-Cipher. 385-391 - Mike Johnson:
Cryptology in Cyberspace. 392-396 - Frank Rubin:
Message Authentication Using Quadratic residues. 397-404 - James J. Gillogly:
Ciphertext-only Cryptanalysis of Enigma. 405-413
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.