default search action
Cryptologia, Volume 23
Volume 23, Number 1, 1999
- Samuel J. Lomonaco:
A Quick Glance at Quantum Cryptography. 1-41 - Louis Kruh:
Reviews and Things Cryptologic. 42-54
- Jim Reeds:
Breakthrough in Renaissance Cryptography a Book Review. 59-62
- David Kahn:
Students Better than a Pro (Bazeries) and an Author (Candela). 63-64 - Ralph Erskine:
Kriegsmarine Short Signal Systems - and How Bletchley Park Exploited Them. 65-92
Volume 23, Number 2, 1999
- Stephen Budiansky:
A Tribute to Cecil Phillips-and Arlington Hall's "Meritocracy". 97-107 - Donald W. Davies:
The Bombe a Remarkable Logic Machine. 108-138 - H. Paul Greenough:
Cryptanalysis of the Hagelin C-52 and Similar Machines a Known Plaintext Attack. 139-156 - Stephen T. Walker, Joan D. Winston:
Cryptography Policy Update. 157-163 - Louis Kruh:
Reviews and Things Cryptologic. 171-188
Volume 23, Number 3, 1999
- Heinz Ulbricht:
Enigma-Uhr. 193-205 - Friedrich L. Bauer:
An Error in the History of Rotor Encryption Devices. 206-210 - John J. G. Savard, Richard Pekelney:
The ECM Mark II: Design, History, and Cryptology. 211-228 - Donald W. Davies:
Effectiveness of the Diagonal Board. 229-239 - Michael van der Meulen:
German Air Force Signal Intelligence 1956: a Museum of Comint and SIGINT. 240-256
- Craig Graham McKay:
Swedish Cryptanalysis and the SAGA of Arne Beurling a Book Review. 257-258
- Louis Kruh:
Vint Hill Farms Station. 259-260 - Axel Roch:
Biopolitics and Intuitive Algebra in the Mathematization of Cryptology? A Review of Shannon's "a Mathematical Theory of Cryptography" from 1945. 261-266 - James H. Ellis:
The History of Non-Secret Encryption. 267-273 - Louis Kruh:
Reviews and Things Cryptologic. 274-286
Volume 23, Number 4, 1999
- Alexander Hagerty:
An unpublished Yardley Manuscript. 289-297 - David M. Smith:
The Use of Decrypted German Weather Reports in the Operations of the Fifteenth Air Force over Europe. 298-304 - Robert L. Williams:
A Note on the Voynich Manuscript. 305-309 - Geoff Sullivan, Frode Weierud:
The Swiss NEMA Cipher Machine. 310-328 - Stephen T. Walker, Joan D. Winston:
Cryptography Policy Update. 329-342 - Louis Kruh:
Reviews and Things Cryptologic. 343-352 - Ridley Mclean:
Naval Communications. 353-379
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.