default search action
Cryptologia, Volume 31
Volume 31, Number 1, 2007
- Craig P. Bauer:
Letter from the Editor. 1 - Joachim von zur Gathen:
Zimmermann Telegram: The Original Draft. 2-37 - David A. Hatch:
The Punitive Expedition Military Reform and Communications Intelligence. 38-45 - José Ramón Soler Fuensanta, Francisco Javier López-Brea Espiau:
The Strip Cipher-The Spanish Official Method. 46-56 - Philip H. Jacobsen:
Station Al - Guadalcanal: a Full Service Wwii Cryptologic Unit. 57-75 - Craig P. Bauer, Katherine Millward:
Cracking Matrix Encryption Row by Row. 76-83 - Colin B. Burke:
From the Archives: Codebreaking (or not) in Shanghai. 84-86 - Donald Mills:
Review of Cryptography: Theory and Practice by D. R. Stinson. 87-88 - David Joyner:
Review of Authentication Codes and Combinatorial Designs by Dingyi Pei. 89-91 - Louis Kruh:
Reviews and Things Cryptologic. 92-94
Volume 31, Number 2, 2007
- Andreas Schinner:
The Voynich Manuscript: Evidence of the Hoax Hypothesis. 95-107 - Robert E. Lewand:
A Cryptology Course at Bletchley Park. 108-111 - António Machiavelo, Rogério Reis:
Automated Ciphertext - Only Cryptanalysis of the Bifid Cipher. 112-124 - Abhishek Parakh:
Oblivious Transfer Using Elliptic Curves. 125-132 - Stelios I. Marnas, Lefteris Angelis, Georgios L. Bleris:
An Application of Quasigroups in All-Or-Nothing Transform. 133-142 - Nick Hoffman:
A Simplified Idea Algorithm. 143-151 - David Álvarez:
Wilhelm Fenner and the Development of the German Cipher Bureau, 1922-1939. 152-163 - Herbert Paulis:
The Scheuble Apparatus. 164-178 - Craig P. Bauer, Joel Burkholder:
From the Archives: Reading Stimson's Mail. 179-184 - Chris Christensen:
Review of Mathematical Ciphers from Caesar to Rsa by Anne L. Young. 185-187 - David Kahn:
The Old Master of Austrian Cryptology. 188-191 - John F. Dooley:
Reviews of Cryptologic Fiction. 192-195 - Louis Kruh:
Reviews and Things Cryptologic. 196-200
Volume 31, Number 3, 2007
- Mark Stamp, Wing On Chan:
Sigaba: Cryptanalysis of the Full Keyspace. 201-222 - Philip H. Jacobsen:
Radio Silence of the Pearl Harbor Strike Force Confirmed Again: the Saga of Secret Message Serial (sms) Numbers. 223-232 - Simon J. Shepherd:
The Tiny Encryption Algorithm. 233-245 - Indivar Gupta, Jasbir Singh, Roopika Chaudhary:
Cryptanalysis of an Extension of the Hill Cipher. 246-253 - James David:
Bourbon Operations in China following World War Ii. 254-262 - Jukka Rislakki:
Searching for Cryptology's Great Wreck. 263-267 - Jan Bury:
From the Archives: Polish Interwar Mfa's Cipher Compromised? 268-277 - David Kahn:
Histoire Cryptologique - A Book Review. 278-280 - Chris Christensen:
Review of Decrypted Secrets: Methods and Maxims of Cryptology, Fourth Edition by F. L. Bauer. 281-283 - Louis Kruh:
Reviews and Things Cryptologic. 284-287
Volume 31, Number 4, 2007
- Olin Sibert:
Robert W. Baldwin, 1957-2007. 289-291 - W. Olin Sibert, Robert W. Baldwin:
The Multics encipher_Algorithm. 292-304 - Lee A. Gladwin:
Bulldozer: a Cribless Rapid Analytical Machine (ram) Solution to Enigma and its Variations. 305-315 - Judy A. Holdener, Eric J. Holdener:
A Cryptographic Scavenger Hunt. 316-323 - Sheng Zhong:
An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol. 324-325 - Alex Kuhl:
Rejewski's Catalog. 326-331 - Edwin Olson:
Robust Dictionary Attack of Short Simple Substitution Ciphers. 332-342 - Jan Bury:
From the Archives: The U.S. and West German Agent Radio Ciphers. 343-357 - David Hamer:
Review of Thirty Secret Years: A.G. Denniston's Work in Signals Intelligence: 1914-1944 by Robin Denniston. 358-360 - Augusto Buonafalce:
Review of The Curse of the Voynich. The Secret History of the World's Most Mysterious Manuscript by Nicholas Pelling. 361-362 - John F. Dooley:
Reviews of Cryptologic Fiction. 363-366 - Chris Christensen, Robert E. Lewand:
2008 Joint Mathematics Meetings Contributed Paper Session: Cryptology for Undergraduates. 367 - Craig P. Bauer:
A Note of Thanks. 368
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.