default search action
Cryptologia, Volume 21
Volume 21, Number 1, 1997
- Peter Pesic:
François Viète, Father of Modern Cryptanalysis - Two New Manuscripts. 1-29 - John Cary Sims:
The Brusa Agreement of May 17, 1943. 30-38
- David Schimmelpenninck van der Oye:
A First Look at Russia's Codebreakers a Book Review. 39-41
- Ralph Erskine:
The First Naval Enigma Decrypts of World War II. 42-46 - David H. Hamer:
Enigma: Actions involved in the 'Double Stepping' of the Middle Rotor. 47-50 - Jacques B. M. Guy:
The Distribution of Signs C and O in the Voynich Manuscript: Evidence for a Real Language? 51-54 - Chin-Chen Chang, Jinn-Ke Jan, Huey-Cheue Kowng:
A Digital Signature Scheme Based upon the Theory of Quadratic residues. 55-70 - Paul Constance:
How Jim Bamford probed the NSA. 71-74 - Louis Kruh:
Reviews and Things Cryptologic. 75-92 - George Sassoon:
British Company Makes PGP Easier to Use. 93-94
Volume 21, Number 2, 1997
- Aviel D. Rubin:
An Experience Teaching a Graduate Course in Cryptography. 97-109 - Louis Kruh:
Reviews and Things Cryptologic. 110-128 - Andrew J. Clark, Ed Dawson:
A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher. 129-138 - Hoi Fung Chau, Hoi-Kwong Lo:
One-Way Functions in Reversible Computations. 139-148 - Norman Scott:
Solving Japanese Naval Ciphers 1943-45. 149-157 - David Kahn:
British Economic espionage. 158-164
Volume 21, Number 3, 1997
- Cipher A. Deavours:
Lobsters, Crabs, and the Abwehr Enigma. 193-199 - Michael van der Meulen:
Bundeswehrtarnverfahren. 200-217 - Louis Kruh:
Reviews and Things Cryptologic. 218-236 - Thomas R. Cain, Alan T. Sherman:
How to Break Gifford's Cipher. 237-286
Volume 21, Number 4, 1997
- Stephen J. Kelley:
The Sigcum Story: Cryptographic Failure, Cryptologic Success. 289-316 - Neal Koblitz:
Cryptography as a Teaching Tool. 317-326 - Nara-Yih Lee, Tzonelih Hwang:
On the Security of Park et al.'s Key Distribution Protocol for Digital Mobile Communications. 327-334 - Louis Kruh:
Reviews and Things Cryptologic. 335-349 - Caxton C. Foster:
Drawbacks of the One-Time Pad. 350-352 - H. Paul Greenough:
Cryptanalysis of the Swedish HC-9 a Known-Plaintext Approach. 353-367 - I. W. Comstock:
Radio Intelligence and Security. 368-377
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.