


default search action
Cryptologia, Volume 16
Volume 16, Number 1, 1992
- Louis Kruh:

Reviews and Things Cryptologic. 1-22 - Bill Robinson:

The Fall and Rise of Cryptanalysis in Canada. 23-38 - Ralph Erskine:

The German Naval Grid in World War II. 39-51 - John M. Carroll, Jeff Solo, Perry T. Wong:

Chaos in Cryptography: the Escape from the Strange Attractor. 52-72 - Krzysztof Gaj:

Polish Cipher Machine - Lacida. 73-80
- Louis Kruh:

Betrayal at PEARL Harbor Book Review. 81-85
- Louis Kruh:

Sliding Code Device of Unknown Origin. 86-88
Volume 16, Number 2, 1992
- Ibrahim A. Al-Kadit:

Origins of Cryptology: the Arab Contributions. 97-126 - John Rabson:

All are Well at Boldon a mid-Victorian Code System. 127-135 - Robert McLaughlin:

Yet Another Machine to Break des. 136-144 - Louis Kruh:

Army - Navy Collaboration for Cryptanalysis of Enemy Systems. 145-164 - George Sassoon:

The Application of Sukhotin's Algorithm to certain non-English Languages. 165-173 - David Alvarez:

A Papal Diplomatic Code. 174-176 - William A. Webb:

A Public Key Cryptosystem based on complementing Sets. 177-181 - Louis Kruh:

Reviews and Things Cryptologic. 182-190
Volume 16, Number 3, 1992
- Peter Wayner:

Mimic Functions. 193-214 - John C. King, Dennis R. Bahler:

An Implementation of Probabilistic Relaxation in the Cryptanalysis of Simple Substitution Ciphers. 215-225 - Ken Shirriff, Curt Welch, Andrew Kinsman:

Decoding a VCR Controller Code. 227-234 - Louis Kruh:

Reviews and Things Cryptologic. 235-249 - Douglas W. Mitchell:

"Rubik's Cube" as a Transposition Device. 250-256 - Alison L. Oswald:

William Frederick Friedman: a Pictorial Essay. 257-264 - Laurence F. Safford:

The Functions and Duties of the Cryptography Section, Naval Communications. 265-281 - Caxton C. Foster:

A Comparison of vowel Identification Methods. 282-286
Volume 16, Number 4, 1992
- David Kahn:

Roosevelt, Magic, and Ultra. 289-319 - Peter P. Fagone:

Partial Solutions of swift's 18th Century Mock Latin Passages. 327-338 - Louis Kruh:

Reviews and Things Cryptologic. 339-346 - David W. Gaddy:

Rochford's Cipher: a Discovery in Confederate Cryptography. 347-362

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














