default search action
Cryptologia, Volume 47
Volume 47, Number 1, January 2023
- George Lasry:
Cracking SIGABA in less than 24 hours on a consumer PC. 1-37 - Paul W. Relkin:
Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers. 38-47 - George Lasry:
Analysis of a late 19th century french cipher created by Major Josse. 48-62 - Kashif Ahmed, Saibal K. Pal, Radha Mohan:
A review of the tropical approach in cryptography. 63-87 - Stuart Boersma, Jean Marie Linhart:
Review of The Woman All Spies Fear by Amy Butler Greenfield and Code Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart. 88-92 - Chris Christensen:
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming. 93-96
Volume 47, Number 2, March 2023
- Craig P. Bauer:
The new golden age of decipherment. 97-100 - George Lasry, Norbert Biermann, Satoshi Tomokiyo:
Deciphering Mary Stuart's lost letters from 1578-1584. 101-202
Volume 47, Number 3, May 2023
- David Sherman:
The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece. 205-226 - Stuart Boersma:
Elizebeth Smith Friedman and one example of a prohibition era encryption system. 227-238 - Eugen Antal, Pavol Zajac:
The first Czechoslovak cipher machine. 239-260 - Olaf Ostwald, Frode Weierud:
Modern cryptanalysis of the Truppenschlüssel. 261-281 - Chris Christensen:
Review of The Rohonc Code: Tracing a Historical Riddle by Benedek Láng. 282-284 - Patrick D. Anderson:
Review of Crypto Wars - The Fight for Privacy in the Digital Age: A Political History of Digital Encryption. 285-298
Volume 47, Number 4, July 2023
- Chris Christensen:
Genevieve Grotjan's "great discovery". 302-317 - David Løberg Code:
Can musical encryption be both? A survey of music-based ciphers. 318-364 - George Teseleanu:
Cryptographic symmetric structures based on quasigroups. 365-392 - John F. Dooley:
Review of The Rose Code by Kate Quinn. 393-395
Volume 47, Number 5, September 2023
- Stuart Boersma:
Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923-1934. 397-418 - Arvind Kumar, Prasanna Raghaw Mishra, Odelu Ojjela:
Analysis of rotation and shift based diffusion functions. 419-435 - Kenneth J. Bures:
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine. 436-448 - Zhixiong Chen, Zhihua Niu, Yuqi Sang, Chenhuang Wu:
Arithmetic autocorrelation of binary m-sequences. 449-458 - Joshua Holden:
Resource guide for teaching post-quantum cryptography. 459-465 - Leonardo Campanelli:
A statistical cryptanalysis of the Beale ciphers. 466-473 - Joachim von zur Gathen:
Unicity distance of the Zodiac-340 cipher. 474-488 - Chris Christensen:
Review of Parker Hitt: The Father of American Military Cryptology by Betsy Rohaly Smoot. 489-492
Volume 47, Number 6, November 2023
- Floe Foxon:
A treatise on the Rilke cryptogram. 493-510 - Satish Kumar, Indivar Gupta, Ashok Ji Gupta:
A study of public key cryptosystems based on quasigroups. 511-540 - Sedat Bingöl:
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811-1877). 541-569 - Santosh Kumar Ravva, Sureddi R. M. Krishna:
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach. 570-583 - Chris Christensen:
Review of The Secret Life of an American Codebreaker: Codebreaker Girls by Jan SlimmingSlimming, Jan. The Secret Life of an American Codebreaker: Codebreaker Girls , South Yorkshire, England: Pen and Sword Books. 2022. 289 + xii pages, Hardcover, £25 ($34.95). ISBN 9781526784155. 584-587
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.