default search action
Cryptologia, Volume 32
Volume 32, Number 1, 2008
- Jeffrey D. Adler, Ryan W. Fuoss, Michael J. Levin, Amanda R. Youell:
Reading Encrypted Diplomatic Correspondence: An Undergraduate Research Project. 1-12 - Raphael Chung-Wei Phan, Adi Shamir:
Improved Related-key Attacks on Desx and Desx+. 13-22 - Chris Christensen, Suzanne E. Gladfelter:
Taking a Cryptology Class to Bletchley Park. 23-32 - Wayne S. Chan:
Key Enclosed: Examining the Evidence for the Missing Key Letter of the Beale Cipher. 33-36 - Abhishek Parakh:
Oblivious Transfer Based on Key Exchange. 37-44 - Brian J. Winkel:
Lessons Learned from a Mathematical Cryptology Course. 45-55 - David Kahn:
The Future of the Past - Questions in Cryptologic History. 56-61 - Augusto Buonafalce:
Cicco Simonetta's Cipher-Breaking Rules. 62-70 - Michael J. Cowan:
Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm. 71-83 - Jan Bury:
From the Archives: Intercepting Best Friend? 84-87 - Chris Christensen:
Review of The Collective Works of Captain George P. McGinnis by George P. McGinnis. 88-89 - Chris Christensen:
Review of How to Tell a Secret: Tips, Tricks & Techniques for Breaking Codes & Conveying Covert Information by P. J. Huff and J. G. Lewin. 90-91 - Joshua Holden:
Review of Complexity and Cryptography: An Introduction by John Talbot and Dominic Welsh. 92-97 - John C. Gallehawk:
Review of Delusions of Intelligence by R. A. Ratcliff. 98-100
Volume 32, Number 2, 2008
- Marek Grajek:
Monument in Memoriam of Marian Rejewski, Jerzy Rózycki and Henryk Zygalski Unveiled in Poznan. 101-103 - Mavis Batey:
Dilly Knox - A Reminiscence of this Pioneer Enigma Cryptanalyst. 104-130 - Ching-Nung Yang, Tse-Shih Chen:
Security Analysis of Authentication of Images Using Recursive Visual Cryptography. 131-136 - Sukamol Srikwan, Markus Jakobsson:
Using Cartoons to Teach Internet Security. 137-154 - Tomi S. Melka:
Structural Observations Regarding RongoRongo Tablet 'Keiti'. 155-179 - David A. Hatch:
From the Archives: Friedman Takes the Stand. 180-183 - Louis Kruh:
Review of Figuring It Out At Bletchley Park 1939-1945 by John Gallehawk and Kerry Johnson. 184-185 - Chris Christensen:
Review of Voices of the Code Breakers: Personal Accounts of the Secret Heroes of World War Ii by Michael Paterson. 186-188 - Chris Christensen:
Review of A3 and His Algebra by Nancy E. Albert. 189-196 - Can You Break the Nku Monopoly? 197
Volume 32, Number 3, 2008
- Ralph Erskine:
Captured Kriegsmarine Enigma Documents at Bletchley Park. 199-219 - Martin R. Albrecht:
Algebraic Attacks on the Courtois Toy Cipher. 220-276 - Colin B. Burke:
From the Archives: The Last Bombe Run, 1955. 277-278 - James L. Massey:
Review of Series on Arabic Origins of Cryptology. 280-283 - Chris Christensen:
Review of The History of Information Security: A Comprehensive Handbook edited by Karl de Leeuw and Jan Bergstra. 284-294 - John F. Dooley:
Reviews of Cryptologic Fiction. 295-298
Volume 32, Number 4, 2008
- Kent D. Boklan:
How I Broke an Encrypted Diary from the War of 1812. 299-310 - Christopher Grey, Andrew Sturdy:
The 1942 Reorganization of the Government Code and Cypher School. 311-333 - Tobias Schrödel:
Breaking Short Vigenère Ciphers. 334-347 - Jerzy Jaworski:
Rejewski-Rózycki-Zygalski Lectures in Computer Science. 348-350 - Jan Bury:
From the Archives: Inside a Cold War Crypto Cell. Polish Cipher Bureau in the 1980s. 351-367 - Whitfield Diffie:
What Did We Do Before Biometric Passports? A Review of Who Are You? Identification, Deception, and Surveillance in Early Modern Europe by Valentin Groebner. 368-369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.