default search action
Cryptologia, Volume 30
Volume 30, Number 1, 2006
- Ralph Erskine:
The 1944 Naval Brusa Agreement and its Aftermath. 1-22 - Niels Faurholt:
Alexis Køhl: a Danish Inventor of Cryptosystems. 23-29 - Jan Bury:
Telma - a Polish Wireless Communications Security Machine of World War Ii. 31-38 - Augusto Buonafalce:
Bellaso's Reciprocal Ciphers. 39-51 - Deane R. Blackman:
Note on Geheimschreiber Cam Wheels. 53-54 - William Stallings:
The Whirlpool Secure Hash Function. 55-67 - Joshua Holden, Richard Layton, Laurence D. Merkle, Tina A. Hudson:
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest. 69-77 - Louis Kruh:
Reviews and Things Cryptologic. 79-81
Volume 30, Number 2, 2006
- Joel V. Brawley:
In Memory of Jack Levine (1907-2005). 83-97 - Peter Freeman:
The Zimmermann Telegram Revisited: A Reconciliation of the Primary Sources. 98-150 - Forrest R. Biard:
Breaking of Japanese Naval Codes: Pre-Pearl Harbor to Midway. 151-158 - Robert Talbert:
The Cycle Structure and Order of the Rail Fence Cipher. 159-172 - Kiranmayi Penumarthi, Subhash C. Kak:
Augmented Watermarking. 173-180 - Louis Kruh:
Reviews and Things Cryptologic. 181-192
Volume 30, Number 3, 2006
- John Gallehawk:
Third Person Singular (Warsaw, 1939). 193-198 - Lee A. Gladwin:
Did Sigint Seal the Fates of 19, 000 Pows? 199-211 - Peter W. Donovan:
The Indicators of Japanese Ciphers 2468, 7890, and Jn-25a1. 212-235 - David Joyner, David Kahn:
Edited Transcript of Interview with Peter Hilton for "Secrets of War". 236-250 - Klaus Schmeh:
The East German Encryption Machine T-310 and the Algorithm It Used. 251-257 - Alexander Griffing:
Solving Xor Plaintext Strings with the Viterbi Algorithm. 258-265 - Claudia Oliveira, José Antônio Xexéo, Carlos André Carvalho:
Clustering and Categorization Applied to Cryptanalysis. 266-280 - John L. Simons:
Bridge Cryptography Fundamentals. 281-286 - Louis Kruh:
Reviews and Things Cryptologic. 287-291
Volume 30, Number 4, 2006
- Brian J. Winkel:
Letter from the Editor. 293 - Ralph Erskine:
The Poles Reveal their Secrets: Alastair Denniston's Account of the July 1939 Meeting at Pyry. 294-305 - Craig P. Bauer, John Ulrich:
The Cryptologic Contributions of Dr. Donald Menzel. 306-339 - Kent D. Boklan:
How I Broke the Confederate Code (137 Years Too Late). 340-345 - Klaus Pommerening:
Kasiski's Test: Couldn't the Repetitions be by Accident? 346-352 - Augusto Buonafalce, Niels Faurholt, Bjarne Toft:
Julius Petersen - Danish Mathematician and Cryptologist. 353-360 - Alexander Griffing:
Solving the Running Key Cipher with the Viterbi Algorithm. 361-367 - Donald Mills:
Review of Introduction to Coding Theory by Ron M. Roth. 368-369 - Louis Kruh:
Reviews and Things Cryptologic. 370-374
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.