default search action
Cryptologia, Volume 4
Volume 4, Number 1, 1980
- Peter P. Fagone:
The Solution of a Cromwellian Era Spy Message (circa 1648). 1-4 - Louis Kruth:
The CRYPTOMATIC HC-520. 5-14 - Solomon W. Golomb:
Cryptographic Reflections on the Genetic Code. 15-19 - Michael Richter:
A Note on Public-Key Cryptosystems. 20-22
- David Kahn:
Deciphered Texts: a Book Review. 22
- Louis Kruh:
Memories of Friedman. 23-26 - H. Gary Knight:
Cryptanalysts' Corner. 27-29 - Ronald L. Rivest:
"Forwards and Backwards" Encryption. 30-33 - Louis Kruh:
The Ciphering System for a 19th Century Challenge Cipher. 34-35 - David Kahn:
Problems of the Unbreakable Cipher. 36-40 - David Shulman:
Another Solution to the Sherlockian Cryptogram. 41 - David Kahn:
The Market for Encryption. 42-44 - James R. Ford:
The HP-67/97 Cryptograph. 43-49 - Louis Kruh:
Reminiscences of a Master Cryptologist. 45-50 - A. Ross Eckler:
Some Comments on the Use of the HP 67/97 as a Cryptograph. 51-53 - Brian J. Winkel:
There and There. 54-61
Volume 4, Number 2, 1980
- David Kahn:
Interviews with Cryptologists. 65-70 - Jack Levine, Robert E. Hartwig:
Applications of the Drazin Inverse to the Hill Cryptographic System. Part I. 71-85 - David Shulman:
A Curious Cryptic Composition. 86-88 - Richard Outerbridge:
Some Cryptographic and Computing Applications of the Toshiba LC-836MN Memo Note 30 pocket Calculator. 89-94 - Philip M. Arnold:
An Apology for Jacopo Silvestri. 96-103
- Francis A. Raven:
Memories of the Pacific: Book Reviews. 104-108
- Rajendra S. Wall:
Decryption of Simple Substitution Cyphers with Word Divisions Using a Content Addressable Memory. 109-115 - James J. Gillogly:
The Beale Cipher: a Dissenting Opinion. 116-119 - David Kahn:
Nuggets from the Archives a Null Code at the White House. 120-121 - Brian J. Winkel:
There and There. 123-126
Volume 4, Number 3, 1980
- Cipher A. Deavours:
The Black Chamber: a Column How the British Broke Enigma. 129-132 - Herbert S. Bright:
High-Speed Indirect Cryption. 133-139 - Donald S. Pady, Laura S. Kline:
Finger Counting and the Identification of James VI's Secret Agents. 140-149 - Jack Levine, Robert E. Hartwig:
Applications of the Drazin Inverse to the Hill Cryptographic System. Part II. 150-168 - Wayne G. Barker:
Opportunities for the Amateur Cryptanalyst Can be Anywhere. 169-172
- David Kahn:
Spy Ciphers: a Book Review. 173-176
- H. Gary Knight:
Cryptanalysts' Corner. 177-180 - Louis Kruh:
CIPHER DEVICES: A Column Cryptext TRS-80 Data Privacy System. 181-183 - Rodney H. Cooper:
Linear Transformations in Galois Fields and their Application to Cryptography. 184-188
Volume 4, Number 4, 1980
- Alfred Ewing:
Some Special War Work Part I. 193-203 - Martin Kochanski:
Remarks on Lu and Lee's Proposals for a Public-Key Cryptosystem. 204-207 - H. Gary Knight:
Cryptanalysts' Corner. 208-212 - Jim Nelson:
The Development of Commercial Cryptosystem Standards. 213-224 - Louis Kruh:
Cipher Equipment: TST-1221. 225-229 - Boshra H. Makar:
Transfinite Cryptography. 230-237
- Louis Kruh:
Pearl Harbor Revisited: a Book Review. 237
- David Kahn:
A Professional's Challenge. 238-239 - Cipher A. Deavours:
The Black Chamber: a Column; La Methode des Batons. 240-247 - Louis Kruh:
A Remarkable View of Ancient America: a Book Review. 248-249
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.