


default search action
Cryptologia, Volume 11
Volume 11, Number 1, 1987
- Martin Kochanski:

A Survey of Data Insecurity Packages. 1-15 - Robert S. Winternitz, Martin E. Hellman:

Chosen-Key Attacks on a Block Cipher. 16-20 - Samuel M. Levitin:

Equivalence Classes: toward More Efficient Search. 21-28 - Joseph S. Schick:

With the 849th SIS, 1942-45. 29-39 - Bradford Hardie:

The Potus-Prime Connection: Two Notes (1) Roosevelt, Churchill, and Me. 40-43 - Cipher A. Deavours:

Cryptology Courses at Kean College. 47-50 - Louis Kruh:

Reviews and Things Cryptologic. 51-63
Volume 11, Number 2, 1987
- William P. Bundy:

Some of My Wartime Experiences. 65-77 - Patrick Beesly:

Who was the Third Man at Pyry? 78-80 - David Kahn:

The Codebreaker Behind the Footlights. 81-84 - Linda Y. Gouazé:

Needles and Haystacks: the Search for Ultra in the 1930's (an excerpt). 85-92 - James J. Gillogly:

Breaking an Eighteenth Century Shorthand System. 93-98 - Frank Rubin:

Foiling an Exhaustive Key-Search Attack. 102-107 - John R. Michener:

The Use of Complete, Nonlinear, Block Codes for Nonlinear, Noninvertible Mixing of Pseudorandom Sequences. 108-111 - Robert M. Richardson:

Digital Encryption Standard Users Group. 112-114 - Thomas Cheatham:

Message Decryption and Spelling Checkers. 115-118 - Louis Kruh:

An OBSCURE Cryptographic Device. 119-122 - Louis Kruh:

Reviews and Things Cryptologic. 123-128
Volume 11, Number 3, 1987
- Paul Whitaker, Louis Kruh:

From Bletchley Park to Berchtesgaden. 129-141 - Gilbert Bloch, Cipher A. Deavours:

Enigma before Ultra Polish Work and the French Contribution. 142-155 - Louis Kruh:

The Shortsighted View of a Foresighted Admiral. 156-159 - Cipher A. Deavours:

Sois Belle et Tais-Toi. 162-165 - John R. Michener:

The Application of Key Dependent and Variable Rotor Sets to Generalized Rotor Cryptographic Systems. 166-171 - Justo Sancho:

Enumeration of multivariable decipherable Boolean Functions. 172-181 - Subhash C. Kak:

The Study of the Indus Script General Considerations. 182-191
Volume 11, Number 4, 1987
- John M. Carroll, Lynda E. Robbins:

The Automated Cryptanalysis of Polyalphabetic Ciphers. 193-205 - John Bennett:

Analysis of the Encryption Algorithm Used in the Wordperfect Word Processing Program. 206-210 - Jack Levine, Richard Chandler:

Some Further Cryptographic Applications of Permutation Polynomials. 211-218 - William F. Clarke:

Government Code and Cypher School its Foundation and Development with Special Reference to its Naval Side. 219-226 - Gilbert Bloch, Cipher A. Deavours:

Enigma Before Ultra - the Polish Success and Check (1933-1939). 227-234 - Ralph Erskine, Frode Weierud

:
Naval Enigma: M4 and its Rotors. 235-244 - Louis Kruh:

British Rockex Cipher Machines. 245-247 - Louis Kruh, Ralph Erskine:

Reviews and Things Cryptologic. 248-253

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














