


default search action
Cryptologia, Volume 19
Volume 19, Number 1, 1995
- Jim Reeds:

William F. Friedman's transcription of the Voynich Manuscript. 1-23 - Louis Kruh:

When a Court ruled for BACON Instead of Shakespeare-Temporarily. 24-38 - Donald W. Davies:

The Lorenz Cipher Machine Sz42. 39-61 - Robin Denniston:

Fetterlein and Others. 62-64 - A. Ray Miller:

The Cryptographic Mathematics of Enigma. 65-80 - Ralph Erskine:

Ultra and Some U. S. Navy Carrier Operations. 81-96
- Louis Kruh:

In the Name of Intelligence: Essays in Honor of Walter Pforzheimer Book Review. 97-101
- Louis Kruh:

Reviews and Things Cryptologic. 102-112
Volume 19, Number 2, 1995
- Edward J. Drea:

Were the Japanese Army Codes Secure? 113-136 - Cipher A. Deavours:

The Autoscritcher. 137-148 - David Kahn:

The Cryptologic Origin of Braille. 151-152 - Karl de Leeuw, Hans van der Meer:

A Turning grille from the Ancestral Castle of the Dutch Stadtholders. 153-165 - David Kahn:

Enemy Codes and their Solution. 166-197 - Horng-Twu Liaw, Chin-Laung Lei:

An Efficient Password Authentication Scheme Based on a Unit Circle. 198-208 - Louis Kruh:

Reviews and Things Cryptologic. 209-215 - Caxton C. Foster:

Secret Musical codewords. 216
Volume 19, Number 3, 1995
- Stephen Schlesinger:

Cryptanalysis for Peacetime: Codebreaking and the Birth and Structure of the United Nations. 217-235 - Louis Kruth:

Riverbank Laboratory Correspondence, 1919 (SRH-50). 236-246 - Michael van der Meulen:

The Book Cipher System of the Wehrmacht. 247-260 - David Alvarez:

A Dutch Enciphered Code. 261-264 - Thomas Jakobsen:

A Fast Method for Cryptanalysis of Substitution Ciphers. 265-274 - Frank Rubin:

The Quadratic and Double Quadratic Residue Ciphers. 275-284 - Peter Wayner:

Strong Theoretical Stegnography. 285-299 - Louis Kruh:

Reviews and Things Cryptologic. 300-318
Volume 19, Number 4, 1995
- Ralph E. Weber:

Seward's Other Folly: the Fight over America's First Encrypted Cable. 321-348 - Michael van der Meulen:

Werftschlüssel: A German Navy Hand Cipher System Part I. 349-364 - Louis Kruh:

Reviews and Things Cryptologic. 365-374 - Tom Johnson:

The Mystery of an Old Japanese Codebook. 380-384 - David W. Gaddy:

The Cylinder-Cipher. 385-391 - Mike Johnson:

Cryptology in Cyberspace. 392-396 - Frank Rubin:

Message Authentication Using Quadratic residues. 397-404 - James J. Gillogly:

Ciphertext-only Cryptanalysis of Enigma. 405-413

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














