default search action
Cryptologia, Volume 38
Volume 38, Number 1, 2014
- Jeff Calof, Jeff Hill, Moshe Rubin:
Chaocipher Exhibit 5: History, Analysis, and Solution of Cryptologia's 1990 Challenge. 1-25 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
The Making of KECCAK. 26-60 - Randy Rezabek:
The Russian Fish with Caviar. 61-76 - John F. Dooley, Elizabeth Anne King:
John Matthews Manly: The Collier's Articles. 77-88
- John F. Dooley:
Review of Inferno by Dan Brown. 89-92 - John F. Dooley:
Review of Mr. Penumbra's 24-Hour Bookstore by Robin Sloan. 93-95 - Gerhard F. Strasser:
Review of Mechanisches Memorieren und Chiffrieren um 1430: Johannes Fontanas Tractatus de instrumentis artis memorie by Horst Kranz and Walter Oberschelp. 96-101
Volume 38, Number 2, 2014
- Nicholas Rescher:
Leibniz's Machina Deciphratoria: A Seventeenth-Century Proto-Enigma. 103-115 - Kelly Chang, Richard M. Low, Mark Stamp:
Cryptanalysis of Typex. 116-132 - Kathryn A. Schwartz:
From Text to Technological Context: Medieval Arabic Cryptology's Relation to Paper, Numbers, and the Post. 133-146 - Jan Bury:
Pinpointing the Mark: On the Cold War SIGINT Capability. 147-151 - Chris Christensen:
The National Cash Register Company Additive Recovery Machine. 152-177 - Ki-Hyun Jung, Kee-Young Yoo:
Three-Directional Data Hiding Method for Digital Images. 178-191
- Chris Christensen:
Review of Secret History: The Story of Cryptology by Craig P. Bauer. 192-193 - Betsy Rohaly Smoot:
Review of World War I and the Origins of U.S. Military Intelligence by James L. Gilbert. 194-196
Volume 38, Number 3, 2014
- George Lasry, Nils Kopal, Arno Wacker:
Solving the Double Transposition Challenge with a Divide-and-Conquer Approach. 197-214 - Subhash C. Kak, Monisha Prabhu:
Cryptographic Applications of Primitive Pythagorean Triples. 215-222 - Lorelei Koss:
Writing and Information Literacy in a Cryptology First-Year Seminar. 223-231 - Charles F. Rocca Jr.:
Mathematics in the History of Cryptography. 232-243 - David Kahn:
The Naval Intercept Station at Bainbridge Island, Washington. 244-247 - David List, John Gallehawk:
Revelation for Cilli's. 248-265 - Christopher Grey:
From the Archives: Colonel Butler's Satire of Bletchley Park. 266-275
- Chris Christensen:
Review of the 2013 Cryptologic History Symposium, Technological Change and Cryptology: Meeting the Historical Challenge. 276-281
- David H. Hamer:
Review of Dönitz, U-Boats, Convoys by Jak P. Mallmann Showell. 282-284 - Chris Christensen:
Review of A Brief History of Cryptology and Cryptographic Algorithms by John F. Dooley. 285-286 - Chris Christensen:
Review of The History of Traffic Analysis: World War I - Vietnam by Donald A. Borrmann et al. 287-290 - Chris Christensen:
Review of Bletchley Park: The Code-Breakers of Station X by Michael Smith. 291-292
Volume 38, Number 4, 2014
- Chris Christensen:
Lester Hill Revisited. 293-332 - Kent D. Boklan:
How I Decrypted a Confederate Diary - And the Question of the Race of Mrs. Jefferson Davis. 333-347 - Nicolas T. Courtois:
Cryptanalysis of Two GOST Variants with 128-Bit Keys. 348-361 - Raúl Rojas:
Konrad Zuse's Proposal for a Cipher Machine. 362-369 - Qinglong Wang, Jintai Ding:
Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol. 370-376
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.