- Louis Kruh:
What the Nazis Were Doing. Cryptologia 2(4): 322-323 (1978) - Louis Kruh:
A 19th-Century Challenge Cipher. Cryptologia 2(4): 334 (1978) - Louis Kruh:
A Catalog of Historical Interest. Cryptologia 2(4): 338-349 (1978) - Louis Kruh:
Rent a Code. Cryptologia 2(4): 366-367 (1978) - Robert H. Morris Sr.:
The Hagelin Cipher Machine (M-209) Reconstruction of the Internal Settings. Cryptologia 2(3): 267-289 (1978) - Howard T. Oakley:
The Riverbank Publications on Cryptology. Cryptologia 2(4): 324-330 (1978) - Ronald L. Rivest:
Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem. Cryptologia 2(1): 62-65 (1978) - Hans Rohrbach:
Mathematical and Mechanical Methods in Cryptography. Cryptologia 2(1): 20-37 (1978) - Hans Rohrbach:
Mathematical and Mechanical Methods in Cryptography. Cryptologia 2(2): 101-121 (1978) - Frank Rubin:
Computer Methods for Decrypting Multiplex Ciphers. Cryptologia 2(2): 152-160 (1978) - Frank Rubin:
Computer Methods for Decrypting Random Stream Ciphers. Cryptologia 2(3): 215-231 (1978) - David W. Straight:
An Outline of Computer Security; a Book Review. Cryptologia 2(2): 148-150 (1978) - Ralph E. Weber:
James Lovell and Secret Ciphers during the American Revolution. Cryptologia 2(1): 75-88 (1978) - David Wilson:
Cryptanalysis Course Down Under. Cryptologia 2(1): 9-11 (1978) - Brian J. Winkel:
There and There. Cryptologia 2(1): 89-94 (1978) - Brian J. Winkel:
Casanova and the Beaufort Cipher. Cryptologia 2(2): 161-163 (1978) - Brian J. Winkel:
There and There. Cryptologia 2(2): 186-194 (1978) - Brian J. Winkel:
There and There. Cryptologia 2(3): 293-298 (1978) - Brian J. Winkel:
There and There. Cryptologia 2(4): 382-393 (1978) - Encryption Challenge. Cryptologia 2(2): 168-171 (1978)