- 1982
- Alkiviadis G. Akritas:
Application of Vincent's Theorem in Cryptography or One-Time Pads Made Practical. Cryptologia 6(4): 312-318 (1982) - Ralph V. Anderson:
If I Remember. Cryptologia 6(1): 40-44 (1982) - Mel L. Barclay, Joshua S. Barclay:
Use of microcomputer System for Medical Record Encryption and Decryption Using a Sequential Pseudo-Random Key. Cryptologia 6(2): 97-107 (1982) - Shimshon Berkovits:
Factoring via Superencyrption. Cryptologia 6(3): 229-237 (1982) - William P. Bundy:
From the Depths to the Heights: Book Reviews. Cryptologia 6(1): 65-74 (1982) - Donald W. Davies:
The Siemens and Halske T52e Cipher Machine. Cryptologia 6(4): 289-308 (1982) - Cipher A. Deavours:
The Black Chamber. Cryptologia 6(1): 34-37 (1982) - Cipher A. Deavours:
Konheim's Cryptography-a Primer: a Book Review. Cryptologia 6(2): 175-176 (1982) - Cipher A. Deavours:
Helmich and the KL-7. Cryptologia 6(3): 283-284 (1982) - Elliot Fischer:
The Performance of Hellman's Time-Memory Trade-Off against Some Rotor Ciphers. Cryptologia 6(2): 108-114 (1982) - Bradford Hardie:
Unraveling the Enigma Story: a Book Review. Cryptologia 6(1): 61-64 (1982) - David Kahn:
Why Germany Lost the Code War. Cryptologia 6(1): 26-31 (1982) - David Kahn:
Churchill Pleads for the Intercepts. Cryptologia 6(1): 47-49 (1982) - David Kahn:
Computer Cryptography: a Book Review. Cryptologia 6(1): 84 (1982) - David Kahn:
A New Source for historians: Yardley's Seized Manuscript. Cryptologia 6(2): 115-119 (1982) - David Kahn:
In Memoriam: Georges-Jean Painvin. Cryptologia 6(2): 120-127 (1982) - M. C. W. Kaiserling:
Sirius. Cryptologia 6(2): 177-178 (1982) - M. C. W. Kaiserling:
Solution to SIRIUS Music Cipher. Cryptologia 6(3): 282 (1982) - Stephen A. Kallis:
A Child's Garden of Cryptography. Cryptologia 6(4): 368-377 (1982) - Christopher Kasparek, Richard A. Woytak:
In Memoriam Marian Rejewski. Cryptologia 6(1): 19-25 (1982) - Wladyslaw Kozaczuk:
Enigma Solved. Cryptologia 6(1): 32-33 (1982) - Louis Kruh:
Wilderness of Mirrors: a Book Review. Cryptologia 6(1): 38 (1982) - Louis Kruh:
Beale Society Material: Book Reviews. Cryptologia 6(1): 39 (1982) - Louis Kruh:
The Navy Cipher Box Mark II. Cryptologia 6(1): 85-93 (1982) - Louis Kruh:
Book Reviews: a Book with a Book Cipher. Cryptologia 6(2): 154-168 (1982) - Louis Kruh:
The Mystery of Colonel Decius Wadsworth's Cipher Device. Cryptologia 6(3): 238-247 (1982) - Louis Kruh:
A Basic Probe of the Beale Cipher as a Bamboozlement. Cryptologia 6(4): 378-382 (1982) - Henk Meijer, Selim G. Akl:
Digital Signature Schemes. Cryptologia 6(4): 329-338 (1982) - Greg E. Mellen:
Cryptanalysts' corner. Cryptologia 6(1): 45-46 (1982) - Greg E. Mellen:
Cryptanalysts' corner. Cryptologia 6(2): 169-174 (1982)