![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Cryptologia, Volume 41
Volume 41, Number 1, 2017
- Rohit Vobbilisetty, Fabio Di Troia, Richard M. Low, Corrado Aaron Visaggio, Mark Stamp
:
Classic cryptanalysis using hidden Markov models. 1-28 - Alan T. Sherman, John Seymour, Akshayraj Kore, William Newton:
Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario. 29-54 - Rafal Wieczorek
:
Putative duplication glyph in the rongorongo script. 55-72
- Klaus Schmeh:
Review of the 15th NSA Cryptologic History Symposium. 73-80
- Chris Christensen:
Review of The SIGABA/ECM II Cipher Machine: "A Beautiful Idea" by Timothy J. Mucklow. 81-84 - Chris Christensen:
Review of The Neglected Giant: Agnes Meyer Driscoll by K. Johnson. 85-89 - Chris Christensen:
Review of An Introduction to Number Theory with Cryptography by James S. Kraft and Lawrence Washington. 90-91 - Dominik Landwehr:
Review of Simpliciana: Schriften der Grimmelshausen Gesellschaft 2014. 92-96 - Jeffrey Ehme:
A joy to review: Two books about primes and factoring. 97-100
Volume 41, Number 2, 2017
- George Lasry, Ingo Niebel, Nils Kopal, Arno Wacker:
Deciphering ADFGVX messages from the Eastern Front of World War I. 101-136 - William Stallings:
Format-preserving encryption: Overview and NIST specification. 137-152 - Lauren De Meyer, Serge Vaudenay:
DES S-box generator. 153-171
- Klaus Schmeh:
Review of the 2nd Historical Ciphers Colloquium in Kassel, Germany. 172-177
- Chris Christensen:
Review of The Imitation Game. 178-181
- Chris Christensen:
Review of Demystifying the Bombe by Dermot Turing. 182-183 - David H. Hamer:
Review of The Secret World by Hugh Trevor-Roper. 184-185 - David H. Hamer:
Review of Solving Enigma's Secrets by John Jackson. 186-189 - Chris Christensen:
Review of The Mathematics of Encryption: An Elementary Introduction by M. Cozzens and S. Miller. 190-194
Volume 41, Number 3, 2017
- David Sherman:
The National Security Agency and the William F. Friedman Collection. 195-238 - G. Stuart Smith:
Elizebeth Friedman's security and career concerns prior to World War II. 239-246 - Gordon Rugg, Gavin Taylor:
Hoaxing statistical features of the Voynich Manuscript. 247-268 - John Alexander, John Gallehawk, John Jackson, Allen Pearce, Edward Simpson:
A German machine for differencing and testing additives. 269-280
- Chris Christensen:
A comment on a book review. 281-282 - Chris Christensen:
Review of The Triumph of Zygalski's Sheets: The Polish Enigma in the Early 1940 by Zdzisław J. Kapera. 283-285 - Chris Christensen:
Review of SIGINT: The Secret History of Signals Intelligence 1914-1945 by Peter Matthews. 286-287 - Chris Christensen:
Review of Bletchley Park: The Secret Archives by Sinclair McKay. 288
Volume 41, Number 4, 2017
- David Hamer, family man and enigma expert, remembered and missed. 289-294
- John Wright:
The Turing Bombe Victory and the first naval Enigma decrypts. 295-328 - Chris Christensen:
The evolving relationship between mathematics and cryptology, 1951-1952: SCAG and the beginnings of SCAMP and NSASAB. 329-387 - Charles Varga:
Is Zendia the Isle of Pines? 388-394
Volume 41, Number 5, 2017
- Olaf Ostwald, Frode Weierud
:
Modern breaking of Enigma ciphertexts. 395-421 - Xavier Bultel, Jannik Dreier, Pascal Lafourcade
, Malika More:
How to explain modern security concepts to your children. 422-447 - Jean-Philippe Échard
, Pierrick Gaudry:
A harmonious encoding of instrument values by a nineteenth-century Parisian violin dealer. 448-458 - Gunnar E. Wolf
, Gina Gallegos-García
:
Strengthening a curated web of trust in a geographically distributed project. 459-475 - Betsy Rohaly Smoot
:
National Security Agency releases Army Security Agency histories covering 1945-1963. 476-478
- Chris Christensen:
Review of Silence Means Security: Secrets of a WWII Code-Breaking WAC by B. Nicodemus. 479-480 - Chris Christensen:
Review of Code Warriors: NSA's Codebreakers and the Secret Intelligence War against the Soviet Union by S. Budiansky. 481-484 - Klaus Schmeh:
Review of Unsolved: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies by Craig Bauer. 485-490
Volume 41, Number 6, 2017
- Duong Hieu Phan
, Neal Koblitz:
Cryptography during the French and American Wars in Vietnam. 491-511 - Jan Bury
:
Lambda: A Cold War Polish line encryptor and the networks it served. 512-533 - Sergey Agievich
, Anastasiya Gorodilova, Valeriya Idrisova, Nikolay Kolomeec, George Shushuev, Natalia N. Tokareva:
Mathematical problems of the Second International Students' Olympiad in Cryptography. 534-565
- Editorial Board EOV.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.