default search action
Cryptologia, Volume 17
Volume 17, Number 2, 1993
- Colin B. Burke:
An Introduction to an Historic Computer Document the 1946 Pendergass Report Cryptanalysis and the Digital Computer. 113-123 - James T. Pendergrass:
Cryptanalytic Use of High-Speed Digital Computing Machines. 124-147 - John C. King, Dennis R. Bahler:
An Algorithmic Solution of Sequential Homophonic Ciphers. 148-165 - Louis Kruh:
Reviews and Things Cryptologic. 166-171 - Louis Kruh:
A 77-Year Old Challenge Cipher. 172-174 - Chin-Chen Chang, Ren-Junn Hwang:
Master Keys for an M 3 Cryptoscheme. 175-186 - Robert A. J. Matthews:
The Use of Genetic Algorithms in Cryptanalysis. 187-201 - R. S. Ramesh, G. Athithan, K. Thiruvengadam:
An Automated Approach to Solve Simple Substitution Ciphers. 202-218 - David Alvarez:
The Papal Cipher Section in the Early Nineteenth Century. 219-224
Volume 17, Number 3, 1993
- Karl de Leeuw, Hans van der Meer:
A Homophonic Substitution in the Archives of the Last Great Pensionary of Holland. 225-236 - David Kahn:
An Enigma Chronology. 237-246 - David Kahn:
Compromise of Naval Code F-3. 247-250 - Louis Kruh:
Reviews and Things Cryptologic. 251-263 - Simon J. Shepherd, Peter W. Sanders, Colin T. Stockel:
The Quadratic Residue Cipher and Some Notes on Implementation. 264-282 - Timothy K. Nenninger:
Japanese Codebook Find. 283-284 - Christoph Ruland:
Realizing Digital Signatures with One-Way Hash Functions. 285-300 - Yuan-Chung Chin, PeCheng Wang, Jing-Jang Hwang:
Cryptanalysis on Schwartz Graphical Encryption Method. 301-304 - John C. King:
A Reconstruction of the Key to Beale Cipher Number Two. 305-317
Volume 17, Number 4, 1993
- Ravi Ganesan, Alan T. Sherman:
Statistical Techniques for Language Recognition: an Introduction and Guide for Cryptanalysts. 321-366 - Richard Spillman:
Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms. 367-377 - Louis Kruh:
Reviews and Things Cryptologic. 378-394 - Albert C. Leighton:
The Statesman Who Could not Read His Own Mail. 395-402 - William F. Smyth, Reihaneh Safavi-Naini:
Automated Cryptanalysis of Substitution Ciphers. 407-418
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.