default search action
Cryptologia, Volume 43
Volume 43, Number 1, 2019
- 2019 Symposium on Cryptologic History. 1
- Nicolas T. Courtois, Maria-Bristena Oprisanu, Klaus Schmeh:
Linear cryptanalysis and block cipher design in East Germany in the 1970s. 2-22 - Satoshi Tomokiyo:
Identifying Italian ciphers from continuous-figure ciphertexts (1593). 23-46 - Alberto Peinado:
Reconstruction of a 1940 Spanish strip cipher by means of a cyclic rotation model applied to encrypted telegrams. 47-64
- Chris Christensen:
Review of The Spy Who Couldn't Spell by Yudhijit Bhattacharjee. 65-68 - Chris Christensen:
Review of Stanley Johnston'S Blunder: the Reporter Who Spilled the Secret Behind the U.S. Navy'S Victory at Midway by Elliot Carlson. 69-76 - Chris Christensen:
Review of Alastair Denniston: Code-Breaking from Room 40 to Berkeley Street and the Birth of GCHQ by Joel Greenberg. 77-80
Volume 43, Number 2, 2019
- Chris Christensen:
Edward Hugh Simpson CB (10 December 1922 - 5 February 2019). 81-83
- Chris Christensen, Jared Antrobus, Edward Simpson:
Aligning JN-25 messages in depth using weights when the code groups scan. 84-137 - Anastasiya Gorodilova, Sergey Agievich, Claude Carlet, Evgeny Gorkunov, Valeriya Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Svetla Nikova, Alexey Oblaukhov, Stjepan Picek, Bart Preneel, Vincent Rijmen, Natalia N. Tokareva:
Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO). 138-174
Volume 43, Number 3, 2019
- Nicolas T. Courtois, Marios Georgiou, Matteo Scarlata:
Slide attacks and LC-weak keys in T-310. 175-189 - Hussam S. Alhadawi, Mohamad Fadli Zolkipli, Saba M. Ismail, Dragan Lambic:
Designing a pseudorandom bit generator based on LFSRs and a discrete chaotic map. 190-211 - Tanmoy Maitra, Debasis Giri, Ram N. Mohapatra:
SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol. 212-232 - P. Mathivanan, A. Balaji Ganesh, R. Venkatesan:
QR code-based ECG signal encryption/decryption algorithm. 233-253 - Ahmed Bentajer, Mustapha Hedabou, Karim Abouelmehdi, Zakaria Igarramen, Said El Fezazi:
An IBE-based design for assured deletion in cloud storage. 254-265
Volume 43, Number 4, 2019
- George Lasry, Nils Kopal, Arno Wacker:
Cryptanalysis of Enigma double indicators with hill climbing. 267-292
- Alan T. Sherman, Enis Golaszewski, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess:
The SFS summer research study at UMBC: Project-based learning inspires cybersecurity students. 293-312
- Tasnime Omrani, Rhouma Rhouma, Rabei Becheikh:
LICID: a lightweight image cryptosystem for IoT devices. 313-343
- John F. Dooley:
The Beale ciphers in fiction. 344-358
Volume 43, Number 5, 2019
Articles
- Jean-François Bouchaudy:
Genuine French WWII M-209 cryptograms. 359-371 - Khushboo Bussi, Dhananjoy Dey, Prasanna Raghaw Mishra, Bal Kishan Dass:
MGR Hash Functions. 372-390 - Türker Tuncer:
Block-based fuzzy-image authentication method. 391-413 - Manashee Kalita, Themrichon Tuithung, Swanirbhar Majumder:
An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique. 414-437 - Mike Clayton, John Gallehawk:
Letter repeats in Enigma ciphertext produced by same-letter keying. 438-457
Volume 43, Number 6, 2019
- Emma May Smith, Marco Ponzi:
Glyph combinations across word breaks in the Voynich manuscript. 466-485 - Otokar Grosek, Eugen Antal, Tomás Fabsic:
Remarks on breaking the Vigenère autokey cipher. 486-496 - S. Masih Ayat, Meysam Ghahramani:
A recursive algorithm for solving "a secret sharing" problem. 497-503 - Neha Kishore, Priya Raina:
Parallel cryptographic hashing: Developments in the last 25 years. 504-535
- Chris Christensen:
Review of History of Cryptography and Cryptanalysis by John Dooley. 536-538 - Chris Christensen:
Review of The Cypher Bureau by Eilidh McGinness. 539-541 - Chris Christensen:
Review of X, Y & Z by Dermot Turing. 542-544 - R. Narváez Roberto:
Review of Mensajes secretos. La historia de la criptografía Española desde sus inicios hasta los años 50 (Secret Messages. The History of Spanish Cryptography from its beginnings until the 1950s) by Soler Fuensanta, José Ramón, and Francisco Javier López-Brea Eespiau. 545-550 - John F. Dooley:
Review of 3 Ciphers by Carol Ritz. 551-552
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.