default search action
Cryptologia, Volume 29
Volume 29, Number 1, 2005
- Hilmar-Detlef Brückner:
Germany's First Cryptanalysis on the Western Front: Decrypting British and French Naval Ciphers in World War I. 1-22 - Lee A. Gladwin:
The Diplomacy of Security: behind the Negotiations of Article 18 of the Sino-american Cooperative Agreement. 23-42 - David Kahn:
The Man in the Iron Mask - Encore Et Enfin, Cryptologically. 43-49 - Navneet Mandhani, Subhash C. Kak:
Watermarking Using Decimal Sequences. 50-58 - Jeffrey Overbey, William N. Traves, Jerzy Wojdylo:
On the Keyspace of the Hill Cipher. 59-72 - Rodney H. Cooper, Christopher G. Andrews:
The Public Key Covert Channel. 73-75 - David Kahn:
From the Archives: Codetalkers not Wanted. 76-87 - Louis Kruh:
Reviews and Things Cryptologic. 88-93 - David Kahn:
David Shulman Dies - the Bibliographer of Cryptology. 94-95
Volume 29, Number 2, 2005
- Philip H. Jacobsen:
Pearl Harbor: Radio Officer Leslie Grogan of the Ss Lurline and his Misidentified Signals. 97-120 - David Kahn:
The Polish Enigma Conference and some Excursions. 121-126 - Peter Zilahy Ingerman:
Two Hebern Cryptographic Machines. 127-147 - Raphael C.-W. Phan:
How to Explain Block Cipher Cryptanalysis to your Kids. 148-158 - Craig P. Bauer, Suzanne E. Gladfelter:
Cryptology in York Pennsylvania. 159-175 - Louis Kruh:
Reviews and Things Cryptologic. 176-187 - Louis Kruh:
Unknown Military Coding Device Can You Identify It? 190-191
Volume 29, Number 3, 2005
- Geoff Sullivan, Frode Weierud:
Breaking German Army Ciphers. 193-232 - John Lawrence:
A Study of Rejewski's Equations. 233-247 - Craig P. Bauer, Elliott J. Gottloeb:
Results of an Automated Attack on the Running Key Cipher. 248-254 - Richard Pekelney:
Excellent, Exceptional, Enormous Crypto Source. 255-256 - Robert Cordery, Leon Pintsov:
History and Role of Information Security in Postage Evidencing and Payment. 257-271 - Louis Kruh:
Enigma Articles from Cryptologia. 272-273 - Louis Kruh:
Crypto User's Guide. 273 - Louis Kruh:
Confederate Treasure Issues. 274 - Louis Kruh:
Detective Notebook for Young Adults. 274-275 - Louis Kruh:
College-level Math Crypto Text. 275 - Louis Kruh:
Code Names Post 9/11. 276 - Louis Kruh:
Coral Sea, Midway, and Aleutians Naval Intelligence. 276-277 - Louis Kruh:
Broad View of Power of Mathematics. 277-278 - Louis Kruh:
Friedman Legacy. 278 - Louis Kruh:
Pearl Harbor Revisited. 278-279 - Louis Kruh:
Global Eavesdropping. 279-280 - Louis Kruh:
Cryptology in American History. 280 - Louis Kruh:
Hms Dunedin Acts on Enigma Material. 280-281 - Louis Kruh:
Novel Secrets. 281-282
Volume 29, Number 4, 2005
- John F. Dooley:
Codes and Ciphers in Fiction: an Overview. 290-328 - David Kahn:
How Garbles Tickled History. 329-336 - Charles F. Rocca:
Cryptology in General Education. 337-342 - John Lawrence:
Factoring for the Plugboard - Was Rejewski's Proposed Solution for Breaking the Enigma Feasible? 343-366 - B. Thilaka, K. Rajalakshmi:
An Extension of Hill Cipher Using Generalised Inverses and Mth Residue Modulo N. 367-376 - Louis Kruh:
Reviews and Things Cryptologic. 377-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.