default search action
Cryptologia, Volume 5
Volume 5, Number 1, 1981
- Greg E. Mellen:
Graphic Solution of a Linear Transformation Cipher. 1-19 - David Kahn:
The Public's Secrets. 20-26 - Ronald L. Rivest:
Statistical Analysis of the Hagelin Cryptograph. 27-32 - Alfred Ewing:
Some Special War Work Part II. 33-39 - Greg E. Mellen:
Cryptanalysts' corner. 40-42 - Cipher A. Deavours:
The Black Chamber: a Column Shutting Off the Spigot in 1981. 43-45 - Louis Kruh:
Cipher Equipment. 46-50 - Frank Rubin:
Decrypting a Stream Cipher Based on j-k Flip-Flops. 51-57
- Louis Kruh:
From the Ultra Conference: a Book Review. 58
- Elliot Fischer:
A Theoretical Measure of Cryptographic Performance. 59-62
Volume 5, Number 2, 1981
- David Kahn:
German Spy Cryptograms. 65-66 - Robert E. Hartwig, Jack Levine:
Applications of the Drazin Inverse to the Hill Cryptographic System. Part III. 67-77 - Stephen A. Kallis:
The Code-0-Graph Cipher Disks. 78-83 - Gerald Sturges:
The House Report on Public Cryptography. 84-93 - John P. Costas:
The Hand-held Calculator as a Cryptographic Machine. 94-117 - Lee Lembart:
The Public Cryptography Study Group. 118-122 - Greg E. Mellen:
Cryptanalysts' corner. 123
- Louis Kruh:
A Code Problem: a Book Review. 124-125
Volume 5, Number 3, 1981
- George I. Davida:
The Case against restraints on Non-Governmental Research in Cryptography. 143-148 - Philip M. Arnold:
Palatino and Biblianber on Ciphers. 149-154
- Louis Kruh:
Reward for Reading and Deciphering: a Book Review. 155-157
- Elliot Fischer:
Measuring Cryptographic Performance with Production Processes. 158-162 - R. Creighton Buck:
Sherlock Holmes in BABYLON. 163-173 - Louis Kruh:
Cipher Machine Exhibit at Smithsonian Institution. 174 - Oskar Stuerzinger:
The A-22 Cryptograph. 175-183 - Brian J. Winkel:
There and There. 184-190
Volume 5, Number 4, 1981
- Louis Kruh:
The Genesis of the Jefferson/Bazeries Cipher Device. 193-208
- Louis Kruh:
A User's Guide in Voice and Data Communications Protection: Book Review. 208-212
- Robert E. Hartwig, Jack Levine:
Applications of the Drazin Inverse to the Hill Cryptographic System. Part IV. 213-228 - William Groth:
Secret Writing Exhibit. 229-230 - Carl Hammer:
Higher-Order Homophonic Ciphers. 231-242
- Jack Keil Wolf:
Number Theory in Digital Signal Processing: a Book Review. 243-246
- Cipher A. Deavours:
Interactive Solution of Columnar Transposition Ciphers. 247-251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.