default search action
Cryptologia, Volume 3
Volume 3, Number 1, 1979
- David Kahn:
The Ultra Conference. 1-8 - Carl Hammer:
How did TJB Encode B2? 9-15 - Hans Rohrbach:
Report on the decipherment of the American Strip Cipher 0-2 by the German Foreign Office. 16-26 - Boshra H. Makar:
Cryptology at St. Peter's College. 27-28 - Bob Blakley, G. R. Blakley:
Security of Number Theoretic Public Key Cryptosystems against Random Attack, II. 29-42 - Louis Kruh:
A Xerograph of a Classic. 50 - A. O. Sulzberger:
Papers Disclose Allies' Edge in Knowing German Codes. 51-53 - David Shulman:
A Sherlockian Cryptogram. 54-56 - Brian J. Winkel:
There and There. 57-62
Volume 3, Number 2, 1979
- I. J. Good:
Early Work on Computers at Bletchley. 65-77 - Louis Kruh:
Devices and Machines. 78-82 - Jim Reeds:
Solution of Challenge Cipher. 83-95
- David Kahn:
American Codes: a Book Review. 96-99
- David Shulman:
The MACBETH Test Message. 100-104 - Bob Blakley, G. R. Blakley:
Security of Number Theoretic Public Key Cryptosystems against Random Attack, III. 105-118 - David Kahn:
A German Consular Cipher. 119 - David Wilson:
Littlewood's Cipher Part I: a Challenge. 120-121
- Bradford Hardie:
Book Review. 122-126
Volume 3, Number 3, 1979
- Bobby R. Inman:
The NSA Perspective on Telecommunications Protection in the Nongovernmental Sector. 129-135 - Greg E. Mellen:
J. F. Byrne and the Chaohipher Work in Progress. 136-154 - Frank Rubin:
Solving a Cipher Based on Multiple Random Number Streams. 155-157 - David Kahn:
The Futility of It All. 158-165 - Louis Kruh:
The Deadly Double Advertiesements: Pearl Harbor Warning or Coincidence? 166-171 - David Wilson:
Littlewood's Cipher Part II: a Method of Solution. 172-176 - Jack Levine, Michael Willet:
The Two-Message Problem in Cipher Text Autokey. Part I. 177-186 - Gideon Yuval:
How to Swindle Rabin. 187-191
Volume 3, Number 4, 1979
- Eric Sams:
Musical Cryptography. 193-201 - Frank Rubin:
Cryptographic Aspects of Data Compression Codes. 202-205 - Louis Kruh:
CP-III: One Time Cypher Pad Manual Encryption Device. 206-209 - David Kahn:
The Geheimschreiber. 210-214 - Philip M. Arnold:
Ciphers for the Educated Man. 215-216 - Louis Kruh:
Short Notices. 217-219 - Jack Levine, Michael Willet:
The Two-Message Problem in Cipher Text Autokey. Part II. 220-231 - Elliot Fischer:
Language Redundancy and Cryptanalysis. 233-235 - Louis Kruh:
The Day the Friedmans had a Typo in their Photo. 236-241 - H. Gary Knight:
Cryptanalysts' Corner. 242 - Philip M. Arnold:
A German Code Book. 243-245 - Bradford Hardie:
A Theory of Cryptography. 246-247 - Brian J. Winkel:
There and There. 248-251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.