


default search action
Cryptologia, Volume 28
Volume 28, Number 1, 2004
- David Kahn:
Charles J. Mendelsohn and Why I Envy Him. 1-17 - Urban Zetterström:
Swedish SA Teleprinter Cipher System. 18-30 - Gordon Rugg:
An Elegant Hoax? A Possible Solution to the Voynich Manuscript. 31-46 - Martin Kochanski:
The Comedy of Commercial Encryption Software. 50-54 - Stuart E. Savory:
Pocket Enigma: the Review. 55-59 - Louis Kruh:
Reviews and Things Cryptologic. 60-95
Volume 28, Number 2, 2004
- Joshua Holden
:
A Comparison of Cryptography Courses. 97-111 - Louis Kruh:
Unknown German World War II Cipher Device. 112-114 - Michael J. Cowan:
RasterschlüSsel 44 - the epitome of Hand Field Ciphers. 115-148 - John Lawrence:
The Versatility of Rejewski's Method: Solving for the Wiring of the Second Rotor. 149-152 - Arturo Quirantes:
Model Z: a Numbers-only Enigma Version. 153-156 - Lisa Driskell:
Wavelet-Based Steganography. 157-174 - Louis Kruh:
Reviews and Things Cryptologic. 175-190
Volume 28, Number 3, 2004
- Jan Bury:
Polish Codebreaking during the Russo-Polish War of 1919-1920. 193-203 - Mike Koss:
The Paper Enigma Machine. 204-210 - Ralph Erskine, Philip Marks:
Naval Enigma: Seahorse and Other Kriegsmarine Cipher Blunders. 211-241 - Louis Kruh:
Reviews and Things Cryptologic. 242-252 - Augusto Buonafalce:
Sir Samuel Morland's Machina Cyclologica Cryptographica. 253-264 - José Ramón Soler Fuensanta:
Mechanical Cipher Systems in the Spanish Civil War. 265-276 - Graham Niblo:
The University of Southampton National Cipher Challenge. 277-286
Volume 28, Number 4, 2004
- Joseph E. Richard:
The Breaking of the Japanese Army's Codes. 289-308 - Joachim von zur Gathen:
Friederich Johann buck: Arithmetic Puzzles in Cryptography. 309-324 - Peter Donovan:
The Flaw in the Jn25 Series of Ciphers. 325-340 - Damien Stehlé:
Breaking Littlewood's Cipher. 341-357 - Mahmood Khalel Ibrahem Al-Ubaidy:
Black-Box Attack Using Neuro-Identifier. 358-372 - Louis Kruh:
Reviews and Things Cryptologic. 373-379

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.