default search action
Louis Kruh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2009
- [j209]Louis Kruh:
A Belated Tribute to Rosario Candela. Cryptologia 33(1): 1-11 (2009) - 2008
- [j208]Louis Kruh:
Review of Figuring It Out At Bletchley Park 1939-1945 by John Gallehawk and Kerry Johnson. Cryptologia 32(2): 184-185 (2008) - 2007
- [j207]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 31(1): 92-94 (2007) - [j206]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 31(2): 196-200 (2007) - [j205]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 31(3): 284-287 (2007) - 2006
- [j204]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 30(1): 79-81 (2006) - [j203]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 30(2): 181-192 (2006) - [j202]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 30(3): 287-291 (2006) - [j201]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 30(4): 370-374 (2006) - 2005
- [j200]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 29(1): 88-93 (2005) - [j199]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 29(2): 176-187 (2005) - [j198]Louis Kruh:
Unknown Military Coding Device Can You Identify It? Cryptologia 29(2): 190-191 (2005) - [j197]Louis Kruh:
Enigma Articles from Cryptologia. Cryptologia 29(3): 272-273 (2005) - [j196]Louis Kruh:
Crypto User's Guide. Cryptologia 29(3): 273 (2005) - [j195]Louis Kruh:
Confederate Treasure Issues. Cryptologia 29(3): 274 (2005) - [j194]Louis Kruh:
Detective Notebook for Young Adults. Cryptologia 29(3): 274-275 (2005) - [j193]Louis Kruh:
College-level Math Crypto Text. Cryptologia 29(3): 275 (2005) - [j192]Louis Kruh:
Code Names Post 9/11. Cryptologia 29(3): 276 (2005) - [j191]Louis Kruh:
Coral Sea, Midway, and Aleutians Naval Intelligence. Cryptologia 29(3): 276-277 (2005) - [j190]Louis Kruh:
Broad View of Power of Mathematics. Cryptologia 29(3): 277-278 (2005) - [j189]Louis Kruh:
Friedman Legacy. Cryptologia 29(3): 278 (2005) - [j188]Louis Kruh:
Pearl Harbor Revisited. Cryptologia 29(3): 278-279 (2005) - [j187]Louis Kruh:
Global Eavesdropping. Cryptologia 29(3): 279-280 (2005) - [j186]Louis Kruh:
Cryptology in American History. Cryptologia 29(3): 280 (2005) - [j185]Louis Kruh:
Hms Dunedin Acts on Enigma Material. Cryptologia 29(3): 280-281 (2005) - [j184]Louis Kruh:
Novel Secrets. Cryptologia 29(3): 281-282 (2005) - [j183]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 29(4): 377-380 (2005) - 2004
- [j182]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 28(1): 60-95 (2004) - [j181]Louis Kruh:
Unknown German World War II Cipher Device. Cryptologia 28(2): 112-114 (2004) - [j180]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 28(2): 175-190 (2004) - [j179]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 28(3): 242-252 (2004) - [j178]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 28(4): 373-379 (2004) - 2003
- [j177]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 27(1): 55-72 (2003) - [j176]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 27(2): 182-191 (2003) - [j175]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 27(3): 230-232 (2003) - [j174]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 27(4): 375-378 (2003) - [j173]Louis Kruh:
The Shakespeare-Bacon Controversy Continues on the Stage. Cryptologia 27(4): 379-380 (2003) - 2002
- [j172]Louis Kruh, Cipher A. Deavours:
The Commercial Enigma: Beginnings of Machine Cryptography. Cryptologia 26(1): 1-16 (2002) - [j171]Louis Kruh:
The World of Codes and Ciphers at the Heinz Nixdorf Museumsforum. Cryptologia 26(1): 59-67 (2002) - [j170]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 26(1): 77-79 (2002) - [j169]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 26(2): 138-158 (2002) - [j168]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 26(3): 235-239 (2002) - [j167]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 26(4): 307-317 (2002) - 2001
- [j166]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 25(1): 64-79 (2001) - [j165]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 25(2): 142-159 (2001) - [j164]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 25(3): 230-239 (2001) - [j163]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 25(4): 311-317 (2001) - 2000
- [j162]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 24(1): 67-93 (2000) - [j161]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 24(2): 168-189 (2000) - [j160]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 24(3): 269-286 (2000) - [j159]Louis Kruh:
Corrections. Cryptologia 24(4): 370 (2000)
1990 – 1999
- 1999
- [j158]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 23(1): 42-54 (1999) - [j157]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 23(2): 171-188 (1999) - [j156]Louis Kruh:
Vint Hill Farms Station. Cryptologia 23(3): 259-260 (1999) - [j155]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 23(3): 274-286 (1999) - [j154]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 23(4): 343-352 (1999) - 1998
- [j153]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 22(1): 49-55 (1998) - [j152]Louis Kruh:
Still Waiting to be Solved: Elgar's 1897 Cipher Message. Cryptologia 22(2): 97-98 (1998) - [j151]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 22(2): 167-191 (1998) - [j150]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 22(3): 261-265 (1998) - [j149]Louis Kruh:
Another Herbert O. Yardley Mystery? Cryptologia 22(4): 370-375 (1998) - [j148]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 22(4): 376-379 (1998) - 1997
- [j147]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 21(1): 75-92 (1997) - [j146]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 21(2): 110-128 (1997) - [j145]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 21(3): 218-236 (1997) - [j144]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 21(4): 335-349 (1997) - 1996
- [j143]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 20(1): 14-36 (1996) - [j142]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 20(2): 183-191 (1996) - [j141]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 20(3): 280-288 (1996) - [j140]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 20(4): 365-380 (1996) - 1995
- [j139]Louis Kruh:
When a Court ruled for BACON Instead of Shakespeare-Temporarily. Cryptologia 19(1): 24-38 (1995) - [j138]Louis Kruh:
In the Name of Intelligence: Essays in Honor of Walter Pforzheimer Book Review. Cryptologia 19(1): 97-101 (1995) - [j137]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 19(1): 102-112 (1995) - [j136]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 19(2): 209-215 (1995) - [j135]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 19(3): 300-318 (1995) - [j134]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 19(4): 365-374 (1995) - 1994
- [j133]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 18(1): 1-21 (1994) - [j132]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 18(2): 128-140 (1994) - [j131]Louis Kruh:
The Postal Service Fails to Deliver the Goods. Cryptologia 18(3): 250-252 (1994) - [j130]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 18(3): 281-287 (1994) - [j129]Louis Kruh:
A Pictorial Tour of the National Cryptologic Museum. Cryptologia 18(4): 381-389 (1994) - [j128]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 18(4): 390-398 (1994) - 1993
- [j127]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 17(2): 166-171 (1993) - [j126]Louis Kruh:
A 77-Year Old Challenge Cipher. Cryptologia 17(2): 172-174 (1993) - [j125]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 17(3): 251-263 (1993) - [j124]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 17(4): 378-394 (1993) - 1992
- [j123]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 16(1): 1-22 (1992) - [j122]Louis Kruh:
Betrayal at PEARL Harbor Book Review. Cryptologia 16(1): 81-85 (1992) - [j121]Louis Kruh:
Sliding Code Device of Unknown Origin. Cryptologia 16(1): 86-88 (1992) - [j120]Louis Kruh:
Army - Navy Collaboration for Cryptanalysis of Enemy Systems. Cryptologia 16(2): 145-164 (1992) - [j119]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 16(2): 182-190 (1992) - [j118]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 16(3): 235-249 (1992) - [j117]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 16(4): 339-346 (1992) - 1991
- [j116]Louis Kruh:
Military Intelligence Corps Hall of FAME. Cryptologia 15(1): 25-28 (1991) - [j115]Louis Kruh:
Correspondence in Cipher a Cipher Typewriter Trade Catalogue. Cryptologia 15(1): 29-42 (1991) - [j114]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 15(1): 67-80 (1991) - [j113]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 15(2): 167-176 (1991) - [j112]Louis Kruh, Paul Edelen:
Seizing the Enigma Two Reviews of One Book. Cryptologia 15(3): 237-240 (1991) - [j111]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 15(3): 241-246 (1991) - [j110]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 15(4): 325-334 (1991) - 1990
- [j109]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 14(1): 83-89 (1990) - [j108]Cipher A. Deavours, Louis Kruh:
The Swedish HC-9 Ciphering Machine Challenge. Cryptologia 14(2): 139-144 (1990) - [j107]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 14(2): 184-191 (1990) - [j106]John Byrne, Cipher A. Deavours, Louis Kruh:
Chaocipher Enters the Computer Age when its Method is disclosed to Cryptologia Editors. Cryptologia 14(3): 193-198 (1990) - [j105]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 14(3): 234-252 (1990) - [j104]Louis Kruh:
Why was Safford Pessimistic about Breaking the German Enigma Cipher Machine in 1942? Cryptologia 14(3): 253-257 (1990) - [j103]Cipher A. Deavours, Louis Kruh:
The Turing Bombe: was IT Enough? Cryptologia 14(4): 331-349 (1990) - [j102]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 14(4): 363-373 (1990)
1980 – 1989
- 1989
- [j101]Louis Kruh:
The Heraldry of Cryptology - Addendum. Cryptologia 13(1): 79-84 (1989) - [j100]Louis Kruh, Ralph Erskine:
Reviews and Things Cryptologic. Cryptologia 13(1): 85-96 (1989) - [j99]Louis Kruh:
British-American Cryptanalytic Cooperation and an unprecedented Admission by Winston Churchill. Cryptologia 13(2): 123-134 (1989) - [j98]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 13(3): 215-242 (1989) - [j97]Cipher A. Deavours, Louis Kruh:
The Swedish HC-9 Ciphering Machine. Cryptologia 13(3): 251-265 (1989) - [j96]Louis Kruh:
Tales of Yardley: Some Sidelights to His Career. Cryptologia 13(4): 327-358 (1989) - [j95]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 13(4): 359-377 (1989) - 1988
- [j94]Louis Kruh, Ralph Erskine, Michael Barlow:
Reviews and Things Cryptologic. Cryptologia 12(1): 37-51 (1988) - [j93]Louis Kruh:
Stimson, the Black Chamber, and the "gentlemen's Mail" Quote. Cryptologia 12(2): 65-89 (1988) - [j92]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 12(2): 118-127 (1988) - [j91]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 12(3): 185-192 (1988) - [j90]Louis Kruh, Johnnie Murray:
A pulp Magazine Cipher. Cryptologia 12(4): 240 (1988) - [j89]Louis Kruh:
The Beale Cipher as a Bamboozlement - Part II. Cryptologia 12(4): 241-246 (1988) - [j88]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 12(4): 265-269 (1988) - 1987
- [j87]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 11(1): 51-63 (1987) - [j86]Louis Kruh:
An OBSCURE Cryptographic Device. Cryptologia 11(2): 119-122 (1987) - [j85]Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 11(2): 123-128 (1987) - [j84]Paul Whitaker, Louis Kruh:
From Bletchley Park to Berchtesgaden. Cryptologia 11(3): 129-141 (1987) - [j83]Louis Kruh:
The Shortsighted View of a Foresighted Admiral. Cryptologia 11(3): 156-159 (1987) - [j82]Louis Kruh:
British Rockex Cipher Machines. Cryptologia 11(4): 245-247 (1987) - [j81]Louis Kruh, Ralph Erskine:
Reviews and Things Cryptologic. Cryptologia 11(4): 248-253 (1987) - 1986
- [j80]Louis Kruh:
The Control of Public Cryptography and Freedom of Speech - a Review. Cryptologia 10(1): 2-9 (1986) - [j79]Louis Kruh:
Announcements and Reviews of Things Cryptologic. Cryptologia 10(1): 42-45 (1986) - [j78]Louis Kruh:
18th Century Shorthand Expert Needed. Cryptologia 10(1): 60-62 (1986) - [j77]Louis Kruh:
Cipher Equipment. Cryptologia 10(1): 63 (1986) - [j76]Louis Kruh:
The Truman Memorandum. Cryptologia 10(2): 65-74 (1986) - [j75]Louis Kruh:
Cryptology and the Law - V. Cryptologia 10(2): 101-107 (1986) - [j74]Louis Kruh:
Reviews of Things Cryptologic. Cryptologia 10(2): 110-122 (1986) - [j73]Louis Kruh:
18th Century Shorthand Expert Needed (Re-Run). Cryptologia 10(2): 126-127 (1986) - [j72]Louis Kruh:
Cryptology and the Law - VI. Cryptologia 10(3): 129-133 (1986) - [j71]Louis Kruh:
Reviews of Things Cryptologic. Cryptologia 10(3): 184-191 (1986) - [j70]Cipher A. Deavours, Louis Kruh:
Appendix mechanics of the German Telecipher Machine. Cryptologia 10(4): 243-247 (1986) - [j69]Louis Kruh:
Cryptology and the Law - VII. Cryptologia 10(4): 248-253 (1986) - 1985
- [j68]Louis Kruh:
An armchair View of the Smithsonian Institution Cipher Machine Exhibit. Cryptologia 9(1): 38-51 (1985) - [j67]Louis Kruh:
Cipher Equipment. Cryptologia 9(2): 154 (1985) - [j66]Louis Kruh:
Reviems of the Literature. Cryptologia 9(2): 176-186 (1985) - [j65]Louis Kruh:
The Kryha LiLiPUT Ciphering Machine. Cryptologia 9(3): 252-261 (1985) - [j64]Louis Kruh:
Cryptology and the Law - III. Cryptologia 9(3): 273-285 (1985) - [j63]Louis Kruh, Ralph Erskine:
Review of Things Cryptologic. Cryptologia 9(4): 294-305 (1985) - [j62]Louis Kruh:
Automatic Communications with the Sigaba and the M-294. Cryptologia 9(4): 311-315 (1985) - [j61]Louis Kruh:
Early Communications Security in the US Navy. Cryptologia 9(4): 324-330 (1985) - [j60]Louis Kruh:
Cryptology and the Law - IV. Cryptologia 9(4): 348-350 (1985) - 1984
- [j59]Louis Kruh, Greg E. Mellen:
Reviews of Things Cryptologic. Cryptologia 8(1): 43-53 (1984) - [j58]Louis Kruh:
Who did IT? Cryptologia 8(1): 54 (1984) - [j57]Louis Kruh:
Because of the Freedom of Information Act (Foia). Cryptologia 8(1): 75-77 (1984) - [j56]Louis Kruh:
Cipher Devices. Cryptologia 8(1): 78-79 (1984) - [j55]Louis Kruh:
Hand-held Crypto Device SEC-36. Cryptologia 8(2): 112-114 (1984) - [j54]Louis Kruh:
Literature Reviews. Cryptologia 8(2): 127-131 (1984) - [j53]Louis Kruh:
The Slidex RT Code. Cryptologia 8(2): 163-172 (1984) - [j52]Louis Kruh:
Cryptology and the Law. Cryptologia 8(3): 246-248 (1984) - [j51]Louis Kruh:
Cipher Equipment. Cryptologia 8(3): 249 (1984) - [j50]Louis Kruh:
Cipher Equipment TST 3336 and TST 9761. Cryptologia 8(3): 278-284 (1984) - [j49]Louis Kruh:
The Heraldry of Cryptology. Cryptologia 8(4): 289-301 (1984) - [j48]Louis Kruh:
Cryptology and the Law. Cryptologia 8(4): 326-331 (1984) - [j47]Louis Kruh:
There and There - Reviews and News. Cryptologia 8(4): 364-373 (1984) - 1983
- [j46]Louis Kruh:
Cipher Equipment the Cryptographic Unit CSI-10. Cryptologia 7(1): 83-88 (1983) - [j45]Louis Kruh, Cipher A. Deavours:
The Typex Cryptograph. Cryptologia 7(2): 145-166 (1983) - [j44]Louis Kruh, Greg E. Mellen:
Book, Movie, Article and Game Reviews. Cryptologia 7(3): 278-286 (1983) - [j43]Louis Kruh:
How to Use the German Enigma Cipher Machine: a Photographic Essay. Cryptologia 7(4): 291-296 (1983) - [j42]Louis Kruh:
Book Reviews. Cryptologia 7(4): 375-379 (1983) - 1982
- [j41]Louis Kruh:
Wilderness of Mirrors: a Book Review. Cryptologia 6(1): 38 (1982) - [j40]Louis Kruh:
Beale Society Material: Book Reviews. Cryptologia 6(1): 39 (1982) - [j39]Louis Kruh:
The Navy Cipher Box Mark II. Cryptologia 6(1): 85-93 (1982) - [j38]Louis Kruh:
Book Reviews: a Book with a Book Cipher. Cryptologia 6(2): 154-168 (1982) - [j37]Louis Kruh:
The Mystery of Colonel Decius Wadsworth's Cipher Device. Cryptologia 6(3): 238-247 (1982) - [j36]Louis Kruh:
A Basic Probe of the Beale Cipher as a Bamboozlement. Cryptologia 6(4): 378-382 (1982) - 1981
- [j35]Louis Kruh:
Cipher Equipment. Cryptologia 5(1): 46-50 (1981) - [j34]Louis Kruh:
From the Ultra Conference: a Book Review. Cryptologia 5(1): 58 (1981) - [j33]Louis Kruh:
A Code Problem: a Book Review. Cryptologia 5(2): 124-125 (1981) - [j32]Louis Kruh:
Reward for Reading and Deciphering: a Book Review. Cryptologia 5(3): 155-157 (1981) - [j31]Louis Kruh:
Cipher Machine Exhibit at Smithsonian Institution. Cryptologia 5(3): 174 (1981) - [j30]Louis Kruh:
The Genesis of the Jefferson/Bazeries Cipher Device. Cryptologia 5(4): 193-208 (1981) - [j29]Louis Kruh:
A User's Guide in Voice and Data Communications Protection: Book Review. Cryptologia 5(4): 208-212 (1981) - 1980
- [j28]Louis Kruh:
Memories of Friedman. Cryptologia 4(1): 23-26 (1980) - [j27]Louis Kruh:
The Ciphering System for a 19th Century Challenge Cipher. Cryptologia 4(1): 34-35 (1980) - [j26]Louis Kruh:
Reminiscences of a Master Cryptologist. Cryptologia 4(1): 45-50 (1980) - [j25]Louis Kruh:
CIPHER DEVICES: A Column Cryptext TRS-80 Data Privacy System. Cryptologia 4(3): 181-183 (1980) - [j24]Louis Kruh:
Cipher Equipment: TST-1221. Cryptologia 4(4): 225-229 (1980) - [j23]Louis Kruh:
Pearl Harbor Revisited: a Book Review. Cryptologia 4(4): 237 (1980) - [j22]Louis Kruh:
A Remarkable View of Ancient America: a Book Review. Cryptologia 4(4): 248-249 (1980)
1970 – 1979
- 1979
- [j21]Louis Kruh:
A Xerograph of a Classic. Cryptologia 3(1): 50 (1979) - [j20]Louis Kruh:
Devices and Machines. Cryptologia 3(2): 78-82 (1979) - [j19]Louis Kruh:
The Deadly Double Advertiesements: Pearl Harbor Warning or Coincidence? Cryptologia 3(3): 166-171 (1979) - [j18]Louis Kruh:
CP-III: One Time Cypher Pad Manual Encryption Device. Cryptologia 3(4): 206-209 (1979) - [j17]Louis Kruh:
Short Notices. Cryptologia 3(4): 217-219 (1979) - [j16]Louis Kruh:
The Day the Friedmans had a Typo in their Photo. Cryptologia 3(4): 236-241 (1979) - 1978
- [j15]Louis Kruh:
The Inventions of William P. Friedman. Cryptologia 2(1): 38-61 (1978) - [j14]Louis Kruh:
Who Wrote "the American Black Chamber"? Cryptologia 2(2): 130-133 (1978) - [j13]Louis Kruh:
Cryptology as a Career. Cryptologia 2(2): 164-167 (1978) - [j12]Louis Kruh:
Dh-26 Handheld Encryption Machine. Cryptologia 2(2): 172-177 (1978) - [j11]Louis Kruh:
A Catalog of Historical Interest. Cryptologia 2(3): 242-253 (1978) - [j10]Louis Kruh:
Capsule Reviews for Crypto Buffs. Cryptologia 2(3): 290-292 (1978) - [j9]Louis Kruh:
What the Nazis Were Doing. Cryptologia 2(4): 322-323 (1978) - [j8]Louis Kruh:
A 19th-Century Challenge Cipher. Cryptologia 2(4): 334 (1978) - [j7]Louis Kruh:
A Catalog of Historical Interest. Cryptologia 2(4): 338-349 (1978) - [j6]Louis Kruh:
Rent a Code. Cryptologia 2(4): 366-367 (1978) - 1977
- [j5]Louis Kruh:
Cipher Equipment. Cryptologia 1(1): 69-75 (1977) - [j4]Louis Kruh:
Cipher Equipment. Cryptologia 1(2): 143-149 (1977) - [j3]Louis Kruh:
Cipher Equipment. Cryptologia 1(3): 255-260 (1977) - [j2]Louis Kruh:
MA4210 Alphanumeric pocket Cipher. Cryptologia 1(4): 334-336 (1977) - [j1]Louis Kruh:
The Churchyard Ciphers. Cryptologia 1(4): 372-375 (1977)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint