


default search action
Cryptologia, Volume 38
Volume 38, Number 1, 2014
- Jeff Calof, Jeff Hill, Moshe Rubin

:
Chaocipher Exhibit 5: History, Analysis, and Solution of Cryptologia's 1990 Challenge. 1-25 - Guido Bertoni

, Joan Daemen, Michaël Peeters, Gilles Van Assche:
The Making of KECCAK. 26-60 - Randy Rezabek:

The Russian Fish with Caviar. 61-76 - John F. Dooley

, Elizabeth Anne King:
John Matthews Manly: The Collier's Articles. 77-88
- John F. Dooley:

Review of Inferno by Dan Brown. 89-92 - John F. Dooley:

Review of Mr. Penumbra's 24-Hour Bookstore by Robin Sloan. 93-95 - Gerhard F. Strasser:

Review of Mechanisches Memorieren und Chiffrieren um 1430: Johannes Fontanas Tractatus de instrumentis artis memorie by Horst Kranz and Walter Oberschelp. 96-101
Volume 38, Number 2, 2014
- Nicholas Rescher:

Leibniz's Machina Deciphratoria: A Seventeenth-Century Proto-Enigma. 103-115 - Kelly Chang, Richard M. Low, Mark Stamp

:
Cryptanalysis of Typex. 116-132 - Kathryn A. Schwartz

:
From Text to Technological Context: Medieval Arabic Cryptology's Relation to Paper, Numbers, and the Post. 133-146 - Jan Bury

:
Pinpointing the Mark: On the Cold War SIGINT Capability. 147-151 - Chris Christensen:

The National Cash Register Company Additive Recovery Machine. 152-177 - Ki-Hyun Jung, Kee-Young Yoo:

Three-Directional Data Hiding Method for Digital Images. 178-191
- Chris Christensen:

Review of Secret History: The Story of Cryptology by Craig P. Bauer. 192-193 - Betsy Rohaly Smoot:

Review of World War I and the Origins of U.S. Military Intelligence by James L. Gilbert. 194-196
Volume 38, Number 3, 2014
- George Lasry, Nils Kopal, Arno Wacker:

Solving the Double Transposition Challenge with a Divide-and-Conquer Approach. 197-214 - Subhash C. Kak, Monisha Prabhu:

Cryptographic Applications of Primitive Pythagorean Triples. 215-222 - Lorelei Koss:

Writing and Information Literacy in a Cryptology First-Year Seminar. 223-231 - Charles F. Rocca Jr.:

Mathematics in the History of Cryptography. 232-243 - David Kahn:

The Naval Intercept Station at Bainbridge Island, Washington. 244-247 - David List, John Gallehawk:

Revelation for Cilli's. 248-265 - Christopher Grey

:
From the Archives: Colonel Butler's Satire of Bletchley Park. 266-275
- Chris Christensen:

Review of the 2013 Cryptologic History Symposium, Technological Change and Cryptology: Meeting the Historical Challenge. 276-281
- David H. Hamer:

Review of Dönitz, U-Boats, Convoys by Jak P. Mallmann Showell. 282-284 - Chris Christensen:

Review of A Brief History of Cryptology and Cryptographic Algorithms by John F. Dooley. 285-286 - Chris Christensen:

Review of The History of Traffic Analysis: World War I - Vietnam by Donald A. Borrmann et al. 287-290 - Chris Christensen:

Review of Bletchley Park: The Code-Breakers of Station X by Michael Smith. 291-292
Volume 38, Number 4, 2014
- Chris Christensen:

Lester Hill Revisited. 293-332 - Kent D. Boklan:

How I Decrypted a Confederate Diary - And the Question of the Race of Mrs. Jefferson Davis. 333-347 - Nicolas T. Courtois:

Cryptanalysis of Two GOST Variants with 128-Bit Keys. 348-361 - Raúl Rojas:

Konrad Zuse's Proposal for a Cipher Machine. 362-369 - Qinglong Wang, Jintai Ding

:
Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol. 370-376

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














