


default search action
Cryptologia, Volume 12
Volume 12, Number 1, 1988
- Peter K. Pearson:

Cryptanalysis of the Ciarcia Circuit Cellar Data Encryptor. 1-10 - Carl Hammer:

Second order Homophonic Ciphers. 11-20 - John R. Michener:

Recent Developments in Electronic Circuitry and their effects on the Implementation of Substitution-Permutation Block codes. 21-24 - Frank Rubin:

The Cryptographic Uses of Post Tag Systems. 25-33 - Louis Kruh, Ralph Erskine, Michael Barlow:

Reviews and Things Cryptologic. 37-51 - William F. Clarke:

The Years between. 52-58 - Ralph Erskine:

From the Archives Tunny Decrypts. 59-61 - Jonathan P. Arnold:

Herbert O. Yardley, Gangbuster. 62-64
Volume 12, Number 2, 1988
- Louis Kruh:

Stimson, the Black Chamber, and the "gentlemen's Mail" Quote. 65-89 - William F. Clarke:

Bletchley Park 1941-1945. 90-97 - Ralph Erskine:

From the Archives: U-boat HF WT signalling. 98-106 - Peter Wayner:

A Redundancy Reducing Cipher. 107-112 - Subhash C. Kak:

The Aryabhata Cipher. 113-117 - Louis Kruh:

Reviews and Things Cryptologic. 118-127
Volume 12, Number 3, 1988
- Subhash C. Kak:

A frequency Analysis of the Indus Script. 129-143 - Carl M. Ellison:

A solution of the Hebern Messages. 144-158 - Peter Jamnig:

Securing the RSA-Cryptosystem against cycling Attacks. 159-164 - Martin Kochanski:

Another Data Insecurity package. 165-173 - William F. Clarke:

Post War Organization. 174-177 - Gilbert Bloch, Cipher A. Deavours:

Enigma Avant ultra Enigma before ultra. 178-184 - Louis Kruh:

Reviews and Things Cryptologic. 185-192
Volume 12, Number 4, 1988
- John M. Carroll, Lynda E. Robbins:

Using Binary derivatives to Test an enhancement of des. 193-208 - Donald V. Miller:

Cryptanalysis of a two Round Version of des using Index Implications. 209-219 - Robert A. J. Matthews:

An Empirical Method for Finding the Keylength of periodic Ciphers. 220-224 - Kaoru Kurosawa, Toshiya Itoh, Masashi Takeuchi:

Public Key Cryptosystem using a reciprocal number with the same Intractability as Factoring a Large number. 225-233 - Richard I. Polis:

European Needs and Attitudes towards Information Security. 234-239 - Louis Kruh, Johnnie Murray:

A pulp Magazine Cipher. 240 - Louis Kruh:

The Beale Cipher as a Bamboozlement - Part II. 241-246 - Cipher A. Deavours:

Interactive solution of Beaufort Enciphered Text with Overlapping Keys. 247-255 - Mike Barlow:

A Mathematical Word Block Cipher. 256-264 - Louis Kruh:

Reviews and Things Cryptologic. 265-269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














