default search action
Cryptologia, Volume 2
Volume 2, Number 1, 1978
- Wayne G. Barker:
Solving a Hagelin, Type CD-57, Cipher. 1-8 - David Wilson:
Cryptanalysis Course Down Under. 9-11 - David Kahn:
The Forschungsamt: Nazi Germany's Most Secret Communications Intelligence Agency. 12-19 - Hans Rohrbach:
Mathematical and Mechanical Methods in Cryptography. 20-37 - Louis Kruh:
The Inventions of William P. Friedman. 38-61 - Ronald L. Rivest:
Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem. 62-65 - Cipher A. Deavours:
"Cryptanalysis of the Hagelin Cryptograph" Wayne G. Barker. 66-67 - H. Gary Knight:
Cryptanalyst's Corner. 68-74 - Ralph E. Weber:
James Lovell and Secret Ciphers during the American Revolution. 75-88 - Brian J. Winkel:
There and There. 89-94
Volume 2, Number 2, 1978
- Hans Rohrbach:
Mathematical and Mechanical Methods in Cryptography. 101-121
- David Kahn:
Friedman's Life: a Book Review. 122-123
- H. Gary Knight:
Cryptanalyst's Corner. 124-129 - Louis Kruh:
Who Wrote "the American Black Chamber"? 130-133 - Cipher A. Deavours:
Cryptology at Kean College. 134-138 - David Kahn:
Nuggets from the Archives: Yardley Tries Again. 139-143 - Wayne G. Barker:
The Unsolved D'Agapeyeff Cipher. 144-147
- David W. Straight:
An Outline of Computer Security; a Book Review. 148-150 - David Kahn:
Pictures Galore: A Book Review. 151
- Frank Rubin:
Computer Methods for Decrypting Multiplex Ciphers. 152-160 - Brian J. Winkel:
Casanova and the Beaufort Cipher. 161-163 - Louis Kruh:
Cryptology as a Career. 164-167 - Encryption Challenge. 168-171
- Louis Kruh:
Dh-26 Handheld Encryption Machine. 172-177 - Brian J. Winkel:
There and There. 186-194
Volume 2, Number 3, 1978
- J. Rives Childs:
My recollections of G.2 A.6. 201-214 - Frank Rubin:
Computer Methods for Decrypting Random Stream Ciphers. 215-231 - Philip M. Arnold:
A Forgotten Book on Ciphers. 232-235 - Caxton C. Foster:
Cryptanalysis and Computers. 236-237 - H. Gary Knight:
Cryptanalysts' Corner. 238-241 - Louis Kruh:
A Catalog of Historical Interest. 242-253
- David Kahn:
A Famous Variation: a Book Review. 257 - David Kahn:
Reveling in Deception: a Book Review. 258-259
- Richard Heitzenrater:
Decoding Wesley's Diaries. 260-264 - David Kahn:
Short Notices - Reviews. 265-266 - Robert H. Morris Sr.:
The Hagelin Cipher Machine (M-209) Reconstruction of the Internal Settings. 267-289 - Louis Kruh:
Capsule Reviews for Crypto Buffs. 290-292 - Brian J. Winkel:
There and There. 293-298
Volume 2, Number 4, 1978
- Bob Blakley, G. R. Blakley:
Security of Number Theoretic Public Key Cryptosystems against Random Attack, I. 305-321 - Louis Kruh:
What the Nazis Were Doing. 322-323 - Howard T. Oakley:
The Riverbank Publications on Cryptology. 324-330 - David Kahn:
Extraordinary Codebreakers, Outstanding Family: a Review. 331-333 - Louis Kruh:
A 19th-Century Challenge Cipher. 334 - H. Gary Knight:
Cryptanalysts' Corner. 335-337 - Louis Kruh:
A Catalog of Historical Interest. 338-349 - Nicholas P. Callas:
An Application of Computers in Cryptography. 350-364 - David Kahn:
One of the Worst: a Review. 365 - Louis Kruh:
Rent a Code. 366-367 - Paul Kinnucan:
Data Encryption Gurus: Tuchman and Meyer. 371-381 - Brian J. Winkel:
There and There. 382-393
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.