default search action
Cryptologia, Volume 36
Volume 36, Number 1, 2012
- Craig Bauer:
Space Crunchers and GOST Busters! 1
- Nicolas T. Courtois:
Security Evaluation of GOST 28147-89 in View of International Standardisation. 2-13 - Klaus Schmeh:
The Pathology of Cryptology - A Current Survey. 14-45 - Eric Brier, Wenjie Fang, David Naccache:
How to Scatter a Secret? 46-54 - Peter Donovan:
The Flaw in the JN-25 Series of Ciphers, II. 55-61 - Kyung-Ah Shim:
Security Flaws in Three Password-Based Remote User Authentication Schemes with Smart Cards. 62-69 - Matthew V. Ball, Cyril Guyot, James P. Hughes, Luther Martin, Landon Curt Noll:
The XTS-AES Disk Encryption Algorithm and the Security of Ciphertext Stealing. 70-79 - John F. Dooley:
Review of The Mystic Cipher by Dennis L. Mangrum. 80-83
Volume 36, Number 2, 2012
- Craig Bauer:
100 Years Times Two: Alan Turing and the Voynich Manuscript. 85-87
- Chris Christensen, David Joyner, Jenna Torres:
Lester Hill's Error-Detecting Codes. 88-103 - Marine Minier, Raphael C.-W. Phan, Benjamin Pousse:
On Integral Distinguishers of Rijndael Family of Ciphers. 104-118 - Jan Bury:
Project Kalina: The Lotos Operation Conundrum. 119-128 - Alan T. Sherman, Dhananjay S. Phatak, Vivek G. Relan, Bhushan Sonawane:
Location Authentication, Tracking, and Emergency Signaling through Power Line Communication: Designs and Protocols for New Out-of-Band Strategies. 129-148 - Cheryl L. Beaver, Stuart Boersma:
KRYPTOS: A Pacific Northwest Cryptanalysis Contest for Undergraduates. 149-156
- Chris Christensen:
Review of the 2011 Cryptologic History Symposium Cryptology in War and Peace: Crisis Points in History. 157-160
- John F. Dooley:
Review of Joe Rochefort's War by Elliot Carlson. 161-163 - David H. Hamer:
Review of The Secrets of Station X - How the Bletchley Park Codebreakers Helped Win the War by Michael Smith. 164-166 - Chris Christensen:
Review of Secret Days: Code-Breaking in Bletchley Park by Asa Briggs. 167-172 - Chris Christensen:
Review of Neil Webster's Cribs for Victory edited by Joss Pearson. 173-175 - Chris Christensen:
Review of In the Shadow of Pont du Gard: The Polish Enigma in Vichy France (June 1940 to November 1942) by Zdzislaw J. Kapera. 176-178 - Chris Christensen:
Review of Inside Enigma: The Secrets of the Enigma Machine and Other Historic Cipher Machines by Tom Perera. 179-180 - Chris Christensen:
Review of The Information: A History, A Theory, A Flood by James Gleick. 181-182 - David Agard, Chris Christensen:
Review of The Theory That Would Not Die by Sharon McGrayne. 183-190
Volume 36, Number 3, 2012
- Sandy L. Zabell:
Commentary on Alan M. Turing: The Applications of Probability to Cryptography. 191-214
- Jan Bury:
Assembling the Puzzle Game: The Jacek Jurzak Spy Case. 215-229 - Gerhard F. Strasser:
Late 18th-Century French Encrypted Diplomatic "Letters of Recommendation" - Or, How to Unwittingly Carry Your Own Warrant. 230-239 - Gregory V. Bard, Shaun Van Ault, Nicolas T. Courtois:
Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers. 240-262 - José Ramón Soler Fuensanta, Francisco Javier López-Brea Espiau, Diego Navarro Bonilla:
A Cryptanalysis Service During the Spanish Civil War. 263-289
- David H. Hamer:
First Charlotte International Cryptologic Symposium and Exhibit. 290-294
Volume 36, Number 4, 2012
- Alan M. Turing, D. Bayley:
Report on Speech Secrecy System DELILAH, a Technical Description Compiled by A. M. Turing and Lieutenant D. Bayley REME, 1945-1946. 295-340 - Jan Bury:
Polish Cold War Codebreaking of 1959-1989: A Preliminary Assessment. 341-379
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.