


default search action
Cryptologia, Volume 13
Volume 13, Number 1, 1989
- Jack Levine, Richard Chandler:

The Hill Cryptographic System with Unknown Cipher Alphabet but Known Plaintext. 1-28 - Robert A. J. Matthews:

On the Derivation of a "Chaotic" Encryption Algorithm. 29-42 - Jeff Belkora:

Belkoranic Hill Ciphering. 43-49 - Gary R. Greenfield:

A Cryptography Course for the University of Richmond. 50-60 - Roland Anderson:

Cryptanalytig Properties of Short Substitution Ciphers. 61-72 - Subhash C. Kak:

A New Method for Coin Flipping by Telephone. 73-78 - Louis Kruh:

The Heraldry of Cryptology - Addendum. 79-84 - Louis Kruh, Ralph Erskine:

Reviews and Things Cryptologic. 85-96
Volume 13, Number 2, 1989
- Wolfgang W. Mache:

The Siemens Cipher Teletype in the History of Telecommunications. 97-117 - William F. Clarke:

Post War Organization. 118-122 - Louis Kruh:

British-American Cryptanalytic Cooperation and an unprecedented Admission by Winston Churchill. 123-134 - Ralph Erskine:

From the Archives: a Bletchley Park Assessment of German Intelligence on Torch. 135-142 - Charles R. Myer:

Viet Cong SIGINT and U.S. Army COMSEC in Vietnam. 143-150 - George Georgiou:

A Method to Strengthen Ciphers. 151-160 - Roland Anderson:

Recognizing Complete and Partial Plaintext. 161-166 - Louis C. Guillou, Marc Davio, Jean-Jacques Quisquater:

Public-Key Techniques: Randomness and Redundancy. 167-189 - David Kahn:

A Soviet Wiretapping Office. 190-191
Volume 13, Number 3, 1989
- Carl Boyd:

Anguish under Siege: High-Grade Japanese Signal Intelligence and the Fall of Berlin. 193-209 - Cipher A. Deavours:

A Ku Klux Klan Cipher. 210-214 - Louis Kruh:

Reviews and Things Cryptologic. 215-242 - Daniel D. Wheeler:

Problems with Chaotic Cryptosystems. 243-250 - Cipher A. Deavours, Louis Kruh:

The Swedish HC-9 Ciphering Machine. 251-265 - Robert A. J. Matthews:

A Rotor Device for Periodic and Random-Key Encryption. 266-272 - Deane R. Blackman:

The Gromark Cipher, and Some Relatives. 273-282
Volume 13, Number 4, 1989
- David A. August:

Cryptography and Exploitation of Chinese Manual Cryptosystems Part I: the Encoding Problem. 289-302 - John M. Carroll, Lynda E. Robbins:

Computer Cryptanalysis of Product Ciphers. 303-326 - Louis Kruh:

Tales of Yardley: Some Sidelights to His Career. 327-358 - Louis Kruh:

Reviews and Things Cryptologic. 359-377

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














