


default search action
Cryptologia, Volume 17
Volume 17, Number 2, 1993
- Colin B. Burke:

An Introduction to an Historic Computer Document the 1946 Pendergass Report Cryptanalysis and the Digital Computer. 113-123 - James T. Pendergrass:

Cryptanalytic Use of High-Speed Digital Computing Machines. 124-147 - John C. King, Dennis R. Bahler:

An Algorithmic Solution of Sequential Homophonic Ciphers. 148-165 - Louis Kruh:

Reviews and Things Cryptologic. 166-171 - Louis Kruh:

A 77-Year Old Challenge Cipher. 172-174 - Chin-Chen Chang, Ren-Junn Hwang:

Master Keys for an M 3 Cryptoscheme. 175-186 - Robert A. J. Matthews:

The Use of Genetic Algorithms in Cryptanalysis. 187-201 - R. S. Ramesh, G. Athithan, K. Thiruvengadam:

An Automated Approach to Solve Simple Substitution Ciphers. 202-218 - David Alvarez:

The Papal Cipher Section in the Early Nineteenth Century. 219-224
Volume 17, Number 3, 1993
- Karl de Leeuw, Hans van der Meer:

A Homophonic Substitution in the Archives of the Last Great Pensionary of Holland. 225-236 - David Kahn:

An Enigma Chronology. 237-246 - David Kahn:

Compromise of Naval Code F-3. 247-250 - Louis Kruh:

Reviews and Things Cryptologic. 251-263 - Simon J. Shepherd, Peter W. Sanders, Colin T. Stockel:

The Quadratic Residue Cipher and Some Notes on Implementation. 264-282 - Timothy K. Nenninger:

Japanese Codebook Find. 283-284 - Christoph Ruland

:
Realizing Digital Signatures with One-Way Hash Functions. 285-300 - Yuan-Chung Chin, PeCheng Wang, Jing-Jang Hwang:

Cryptanalysis on Schwartz Graphical Encryption Method. 301-304 - John C. King:

A Reconstruction of the Key to Beale Cipher Number Two. 305-317
Volume 17, Number 4, 1993
- Ravi Ganesan, Alan T. Sherman:

Statistical Techniques for Language Recognition: an Introduction and Guide for Cryptanalysts. 321-366 - Richard J. Spillman:

Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms. 367-377 - Louis Kruh:

Reviews and Things Cryptologic. 378-394 - Albert C. Leighton:

The Statesman Who Could not Read His Own Mail. 395-402 - William F. Smyth, Reihaneh Safavi-Naini:

Automated Cryptanalysis of Substitution Ciphers. 407-418

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














