default search action
Cryptologia, Volume 6
Volume 6, Number 1, 1982
- Marian Rejewski:
Mathematical Solution of the Enigma Cipher. 1-18 - Christopher Kasparek, Richard A. Woytak:
In Memoriam Marian Rejewski. 19-25 - David Kahn:
Why Germany Lost the Code War. 26-31 - Wladyslaw Kozaczuk:
Enigma Solved. 32-33 - Cipher A. Deavours:
The Black Chamber. 34-37
- Louis Kruh:
Wilderness of Mirrors: a Book Review. 38 - Louis Kruh:
Beale Society Material: Book Reviews. 39
- Ralph V. Anderson:
If I Remember. 40-44 - Greg E. Mellen:
Cryptanalysts' corner. 45-46 - David Kahn:
Churchill Pleads for the Intercepts. 47-49 - Richard A. Woytak:
A Conversation with MARIAN Rejewski. 50-60
- Bradford Hardie:
Unraveling the Enigma Story: a Book Review. 61-64 - William P. Bundy:
From the Depths to the Heights: Book Reviews. 65-74
- Marian Rejewski:
Remarks on Appendix 1 to British Intelligence in the Second World War by F. H. Hinsley. 75-83
- David Kahn:
Computer Cryptography: a Book Review. 84
- Louis Kruh:
The Navy Cipher Box Mark II. 85-93
Volume 6, Number 2, 1982
- Mel L. Barclay, Joshua S. Barclay:
Use of microcomputer System for Medical Record Encryption and Decryption Using a Sequential Pseudo-Random Key. 97-107 - Elliot Fischer:
The Performance of Hellman's Time-Memory Trade-Off against Some Rotor Ciphers. 108-114 - David Kahn:
A New Source for historians: Yardley's Seized Manuscript. 115-119 - David Kahn:
In Memoriam: Georges-Jean Painvin. 120-127 - Neil J. A. Sloane:
Error-Correcting Codes and Cryptography Part I. 128-153
- Louis Kruh:
Book Reviews: a Book with a Book Cipher. 154-168
- Greg E. Mellen:
Cryptanalysts' corner. 169-174
- Cipher A. Deavours:
Konheim's Cryptography-a Primer: a Book Review. 175-176
- M. C. W. Kaiserling:
Sirius. 177-178 - Brian J. Winkel:
There and There - a Column. 179-188
Volume 6, Number 3, 1982
- Dundas P. Tucker:
Rhapsody in Purple a New History of Pearl Harbor - I. 193-228 - Shimshon Berkovits:
Factoring via Superencyrption. 229-237 - Louis Kruh:
The Mystery of Colonel Decius Wadsworth's Cipher Device. 238-247 - Greg E. Mellen:
Cryptanalysts' corner. 248-252 - Richard Outerbridge:
Cryptographic Features of the UNIX Operating System. 253-257 - Neil J. A. Sloane:
Error-Correcting Codes and Cryptography Part II. 258-278 - Donald V. Miller:
Ciphertext only Attack on the Merkle-Hellman Public-Key System under Broadcast Situations. 279-281 - M. C. W. Kaiserling:
Solution to SIRIUS Music Cipher. 282 - Cipher A. Deavours:
Helmich and the KL-7. 283-284
Volume 6, Number 4, 1982
- Donald W. Davies:
The Siemens and Halske T52e Cipher Machine. 289-308 - Greg E. Mellen:
Cryptanalysts' corner. 309-311 - Alkiviadis G. Akritas:
Application of Vincent's Theorem in Cryptography or One-Time Pads Made Practical. 312-318 - Michael O. Vahle, Lawrence Tolendino:
Breaking a Pseudo Random Number Based Cryptographic Algorithm. 319-328 - Henk Meijer, Selim G. Akl:
Digital Signature Schemes. 329-338 - Richard Outerbridge:
A Pedagogical Cipher (This paper is the winner of the CRYPTOLOGIA First Annual Undergraduate Paper Competition in Cryptology.). 339-345 - Dundas P. Tucker:
Rhapsody in Purple: a New History of PEARL Harbor Part Two of Two. 346-367 - Stephen A. Kallis:
A Child's Garden of Cryptography. 368-377 - Louis Kruh:
A Basic Probe of the Beale Cipher as a Bamboozlement. 378-382
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.