default search action
Cryptologia, Volume 24
Volume 24, Number 1, 2000
- Brian J. Winkel:
Annual Greg Mellen Memorial Cryptology Scholarship Prize. 1-3 - Heidi Williams:
Applying Statistical Language Recognition Techniques in the Ciphertext-only Cryptanalysis of Enigma. 4-17 - Bruce Schneier:
A Self-Study Course in Block-Cipher Cryptanalysis. 18-33 - Hideki Sawada, Takahiro Abe:
Groups and RSA Cryptosystems. 34-40 - David H. Hamer:
G-312: An Abwehr Enigma. 41-54 - Philip Marks, Frode Weierud:
Recovering the Wiring of Enigma's Umkehrwalze A. 55-66 - Louis Kruh:
Reviews and Things Cryptologic. 67-93
Volume 24, Number 2, 2000
- Ralph Erskine:
What did the Sinkov Mission Receive from Bletchley Park? 97-109 - Philip H. Jacobsen:
A Cryptologic Veteran's Analysis of "Day of Deceit" - a Book Review. 110-118 - Stephen Budiansky:
Closing the Book on Pearl Harbor. 119-130 - Donald W. Davies:
An Unidentified Cipher Device. 131-134 - Lars R. Knudsen, Vincent Rijmen:
Ciphertext-only Attack on Akelarre. 135-147 - Chih-Hung Wang, Tzonelih Hwang:
(T, M) Threshold and Generalized ID-Based Conference Key Distribution System. 148-159 - Rebecca A. Ratcliff:
Cryptology through the Centuries: NSA's 1999 History Symposium. 160-167
- Louis Kruh:
Reviews and Things Cryptologic. 168-189
Volume 24, Number 3, 2000
- Peter Pesic:
The Clue to the Labyrinth: Francis BACON and the Decryption of Nature. 193-211 - Frederick D. Parker:
How OP-20-G got Rid of Joe Rochefort. 212-234 - Thomas R. Hammant:
Russian and Soviet Cryptology I - Some Communications Intelligence in Tsarist Russia. 235-249 - Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee, Juin-Jang Tsai:
(T, N) Threshold-Multisignature Scheme and Generalized-Multisignature Scheme Where suspected Forgery Implies Traceability of Adversarial Shareholders. 250-268
- Louis Kruh:
Reviews and Things Cryptologic. 269-286
Volume 24, Number 4, 2000
- Stephen Huffman:
The Navajo Code Talkers: a Cryptologic and Linguistic Perspective. 289-320 - Craig Graham McKay:
From the Archives Japanese fears and the Ironies of Interception. 321-323 - Cecil Phillips:
The American Solution of a German One-Time-Pad Cryptographic System (G-OTP). 324-332 - Thomas R. Hammant:
Russian and Soviet Cryptology II - the Magdeburg Incident: the Russian View. 333-338 - John R. Schindler:
A hopeless Struggle: Austro-Hungarian Cryptology during World War I. 339-350
- Colin B. Burke:
Letter to the Editor. 351-352
- Shahrokh Saeednia:
How to Make the Hill Cipher Secure. 353-360 - Russell Atkinson:
David Brian Kern Theft of Trade Secrets. 361-369
- Louis Kruh:
Corrections. 370
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.