- Greg E. Mellen:
Cryptanalysts' corner. Cryptologia 6(3): 248-252 (1982) - Greg E. Mellen:
Cryptanalysts' corner. Cryptologia 6(4): 309-311 (1982) - Donald V. Miller:
Ciphertext only Attack on the Merkle-Hellman Public-Key System under Broadcast Situations. Cryptologia 6(3): 279-281 (1982) - Richard Outerbridge:
Cryptographic Features of the UNIX Operating System. Cryptologia 6(3): 253-257 (1982) - Richard Outerbridge:
A Pedagogical Cipher (This paper is the winner of the CRYPTOLOGIA First Annual Undergraduate Paper Competition in Cryptology.). Cryptologia 6(4): 339-345 (1982) - Marian Rejewski:
Mathematical Solution of the Enigma Cipher. Cryptologia 6(1): 1-18 (1982) - Marian Rejewski:
Remarks on Appendix 1 to British Intelligence in the Second World War by F. H. Hinsley. Cryptologia 6(1): 75-83 (1982) - Neil J. A. Sloane:
Error-Correcting Codes and Cryptography Part I. Cryptologia 6(2): 128-153 (1982) - Neil J. A. Sloane:
Error-Correcting Codes and Cryptography Part II. Cryptologia 6(3): 258-278 (1982) - Dundas P. Tucker:
Rhapsody in Purple a New History of Pearl Harbor - I. Cryptologia 6(3): 193-228 (1982) - Dundas P. Tucker:
Rhapsody in Purple: a New History of PEARL Harbor Part Two of Two. Cryptologia 6(4): 346-367 (1982) - Michael O. Vahle, Lawrence Tolendino:
Breaking a Pseudo Random Number Based Cryptographic Algorithm. Cryptologia 6(4): 319-328 (1982) - Brian J. Winkel:
There and There - a Column. Cryptologia 6(2): 179-188 (1982) - Richard A. Woytak:
A Conversation with MARIAN Rejewski. Cryptologia 6(1): 50-60 (1982)