- 2008
- Jeffrey D. Adler, Ryan W. Fuoss, Michael J. Levin, Amanda R. Youell:
Reading Encrypted Diplomatic Correspondence: An Undergraduate Research Project. Cryptologia 32(1): 1-12 (2008) - Martin R. Albrecht:
Algebraic Attacks on the Courtois Toy Cipher. Cryptologia 32(3): 220-276 (2008) - Mavis Batey:
Dilly Knox - A Reminiscence of this Pioneer Enigma Cryptanalyst. Cryptologia 32(2): 104-130 (2008) - Kent D. Boklan:
How I Broke an Encrypted Diary from the War of 1812. Cryptologia 32(4): 299-310 (2008) - Augusto Buonafalce:
Cicco Simonetta's Cipher-Breaking Rules. Cryptologia 32(1): 62-70 (2008) - Colin B. Burke:
From the Archives: The Last Bombe Run, 1955. Cryptologia 32(3): 277-278 (2008) - Jan Bury:
From the Archives: Intercepting Best Friend? Cryptologia 32(1): 84-87 (2008) - Jan Bury:
From the Archives: Inside a Cold War Crypto Cell. Polish Cipher Bureau in the 1980s. Cryptologia 32(4): 351-367 (2008) - Wayne S. Chan:
Key Enclosed: Examining the Evidence for the Missing Key Letter of the Beale Cipher. Cryptologia 32(1): 33-36 (2008) - Chris Christensen:
Review of The Collective Works of Captain George P. McGinnis by George P. McGinnis. Cryptologia 32(1): 88-89 (2008) - Chris Christensen:
Review of How to Tell a Secret: Tips, Tricks & Techniques for Breaking Codes & Conveying Covert Information by P. J. Huff and J. G. Lewin. Cryptologia 32(1): 90-91 (2008) - Chris Christensen:
Review of Voices of the Code Breakers: Personal Accounts of the Secret Heroes of World War Ii by Michael Paterson. Cryptologia 32(2): 186-188 (2008) - Chris Christensen:
Review of A3 and His Algebra by Nancy E. Albert. Cryptologia 32(2): 189-196 (2008) - Chris Christensen:
Review of The History of Information Security: A Comprehensive Handbook edited by Karl de Leeuw and Jan Bergstra. Cryptologia 32(3): 284-294 (2008) - Chris Christensen, Suzanne E. Gladfelter:
Taking a Cryptology Class to Bletchley Park. Cryptologia 32(1): 23-32 (2008) - Michael J. Cowan:
Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm. Cryptologia 32(1): 71-83 (2008) - Whitfield Diffie:
What Did We Do Before Biometric Passports? A Review of Who Are You? Identification, Deception, and Surveillance in Early Modern Europe by Valentin Groebner. Cryptologia 32(4): 368-369 (2008) - John F. Dooley:
Reviews of Cryptologic Fiction. Cryptologia 32(3): 295-298 (2008) - Ralph Erskine:
Captured Kriegsmarine Enigma Documents at Bletchley Park. Cryptologia 32(3): 199-219 (2008) - Louis Kruh:
Review of Figuring It Out At Bletchley Park 1939-1945 by John Gallehawk and Kerry Johnson. Cryptologia 32(2): 184-185 (2008) - John C. Gallehawk:
Review of Delusions of Intelligence by R. A. Ratcliff. Cryptologia 32(1): 98-100 (2008) - Marek Grajek:
Monument in Memoriam of Marian Rejewski, Jerzy Rózycki and Henryk Zygalski Unveiled in Poznan. Cryptologia 32(2): 101-103 (2008) - Christopher Grey, Andrew Sturdy:
The 1942 Reorganization of the Government Code and Cypher School. Cryptologia 32(4): 311-333 (2008) - David A. Hatch:
From the Archives: Friedman Takes the Stand. Cryptologia 32(2): 180-183 (2008) - Joshua Holden:
Review of Complexity and Cryptography: An Introduction by John Talbot and Dominic Welsh. Cryptologia 32(1): 92-97 (2008) - Jerzy Jaworski:
Rejewski-Rózycki-Zygalski Lectures in Computer Science. Cryptologia 32(4): 348-350 (2008) - David Kahn:
The Future of the Past - Questions in Cryptologic History. Cryptologia 32(1): 56-61 (2008) - James L. Massey:
Review of Series on Arabic Origins of Cryptology. Cryptologia 32(3): 280-283 (2008) - Tomi S. Melka:
Structural Observations Regarding RongoRongo Tablet 'Keiti'. Cryptologia 32(2): 155-179 (2008) - Abhishek Parakh:
Oblivious Transfer Based on Key Exchange. Cryptologia 32(1): 37-44 (2008)