default search action
Cryptologia, Volume 27
Volume 27, Number 1, 2003
- Wes Freeman, Geoff Sullivan, Frode Weierud:
Purple Revealed: Simulation and Computer-Aided Cryptanalysis of Angooki Taipu B. 1-43 - Alan M. Turing:
Alan M. Turing's Critique of Running Short Cribs on the U. S. Navy Bombe. 44-49 - Lee A. Gladwin:
Alan M. Turing's Critique of Running Short Cribs on the US Navy Bombe. 50-54 - Louis Kruh:
Reviews and Things Cryptologic. 55-72 - Karl de Leeuw:
The Dutch Invention of the Rotor Machine, 1915-1923. 73-94
Volume 27, Number 2, 2003
- David H. Hamer:
The Enigmas - and Other Recovered Artefacts - of U-85. 97-110 - Ralph Erskine:
From the Archives What the Sinkov Mission Brought to Bletchley Park. 111-118 - Rebecca A. Ratcliff:
How Statistics LED the Germans to Believe Enigma Secure and Why They Were Wrong: neglecting the Practical Mathematics of Cipher Machines. 119-131
- Augusto Buonafalce:
From the Skytale to the Enigma: Book Review. 132-134
- James David:
Soviet Secrets in the ether - Clandestine Radio Stations at the New York and SAN Francisco Consulates in World War II. 135-147 - Mohammad A. Musa, Edward F. Schaefer, Stephen Wedig:
A Simplified AES Algorithm and its Linear and Differential Cryptanalyses. 148-177 - Brian J. Winkel:
Extraordinary Cryptology Collection. 180-181 - Louis Kruh:
Reviews and Things Cryptologic. 182-191
Volume 27, Number 3, 2003
- Philip H. Jacobsen:
Foreknowledge of PEARL Harbor? No!: the Story of the U. S. Navy's Efforts on Jn-25b. 193-205 - Niels Faurholt:
Urkryptografen ("the Clock Cryptograph"). 206-208 - Dorothy Clarkson:
Cypher Machines Maintenance and Restoration Spanning sixty Years. 209-216 - Francine F. Abeles:
The Memoria Technica Cipher. 217-229 - Louis Kruh:
Reviews and Things Cryptologic. 230-232 - Rose Mary Sheldon:
The Sator Rebus: an Unsolved Cryptogram? 233-287
Volume 27, Number 4, 2003
- Ralph Erskine, Peter Freeman:
Brigadier John Tiltman: One of Britain's finest Cryptologists. 289-318 - Francesco Fabris, Myron Curtis:
A Nomenclator Used by propaganda fide during the Chinese rites Controversy. 319-338 - Joachim von zur Gathen:
Claude Comiers: the First Arithmetical Cryptography. 339-349 - Bob Anderson, George McGinnis:
Naval Security Group Command Display. 350-360 - Raphael Chung-Wei Phan:
Impossible Differential Cryptanalysis of Mini-AES. 361-374 - Louis Kruh:
Reviews and Things Cryptologic. 375-378 - Louis Kruh:
The Shakespeare-Bacon Controversy Continues on the Stage. 379-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.