


default search action
Cryptologia, Volume 8
Volume 8, Number 1, 1984
- Gustavus J. Simmons:
A System for Verifying User Identity and Authorization at the Point-of Sale or Access. 1-21 - Arthur Sorkin:
Lucifer, a Cryptographic Algorithm. 22-42 - Louis Kruh, Greg E. Mellen:
Reviews of Things Cryptologic. 43-53 - Louis Kruh:
Who did IT? 54 - Greg E. Mellen:
Cryptanalysts' corner. 55-57 - David Kahn:
Cipher Machine Inventor - BORIS Hagelin dies. 60-61 - Louis Kruh:
Because of the Freedom of Information Act (Foia). 75-77 - Louis Kruh:
Cipher Devices. 78-79 - James J. Gillogly:
The Mysterious Autocryptograph. 79-81 - Donald W. Davies:
The Autocryptograph. 82-92
Volume 8, Number 2, 1984
- Charles T. Retter:
Cryptanalysis of a Maclaren-Marsaglia System. 97-108 - Louis Kruh:
Hand-held Crypto Device SEC-36. 112-114 - Donald W. Davies:
Sidney Hole's Cryptographic Machine. 115-126 - Louis Kruh:
Literature Reviews. 127-131 - Borge Tilt:
On Kullback's χ-Tests for Matching and Non-Matching Multinomial Distributions. 132-141 - John M. Carroll, Pierre G. Laurin:
Software Protection for Microcomputers. 142-160 - Jack Levine:
Corrections for Published Copy of United States Cryptographic patents: 1861-1981. 161-162 - Louis Kruh:
The Slidex RT Code. 163-172
- Ralph Erskine:
British Intelligence - Volume II - Book Review. 173-180
- David Shulman:
An Unknown Cipher Disk. 187-190
Volume 8, Number 3, 1984
- Thomas R. Hammant:
The Origins of Russian Navy Communications Intelligence. 193-202 - Francis Guelker:
A Cryptographer's War Memories. 203-207 - Robert Weller:
Rear Admiral Joseph N. Wenger USN (RET) and the Naval Cryptologic Museum. 208-234
- Philip M. Arnold:
A View of Renaissance Cryptography - a Book Review. 235-241
- Cipher A. Deavours:
Reflections on the "State of the Art". 242-245 - Louis Kruh:
Cryptology and the Law. 246-248 - Louis Kruh:
Cipher Equipment. 249 - Donald W. Davies:
Sir Percy Scott's Cypher. 250-252 - John M. DeLaurentis:
A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm. 253-259 - John M. Carroll:
The Resurrection of Multiple-Key Ciphers. 262-265 - G. R. Blakley:
Aaas Crypto Sessions Proceedings: Review. 266-269 - Greg E. Mellen:
Cryptanalysts' corner. 270-275 - Louis Kruh:
Cipher Equipment TST 3336 and TST 9761. 278-284 - Robert R. Jueneman:
Iacr Announces Bulletin Board Service. 285-286
Volume 8, Number 4, 1984
- Louis Kruh:
The Heraldry of Cryptology. 289-301 - Ole G. Landsverk:
Cryptography in Runic inscriptions. 302-319 - Greg E. Mellen:
Cryptanalysts' corner. 320-325 - Louis Kruh:
Cryptology and the Law. 326-331
- Ralph Erskine:
Alan Turing: the Enigma - Book Reviem. 332-336
- Solomon Kullback:
Looking Back. 337-342 - Rodney H. Cooper, Wayne Patterson:
A Generalization of the Knapsack Algorithm Using Galois Fields. 343-347 - Roland Anderson:
Finding Vowels in Simple Substitutions Ciphers by Computer. 348-359
- Cipher A. Deavours, Brian J. Winkel:
Cryptanalysis of Shift Stream Generated Stream Cipher Systems - Book Review. 360-363
- Louis Kruh:
There and There - Reviews and News. 364-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.