


default search action
Cryptologia, Volume 2
Volume 2, Number 1, 1978
- Wayne G. Barker:

Solving a Hagelin, Type CD-57, Cipher. 1-8 - David Wilson:

Cryptanalysis Course Down Under. 9-11 - David Kahn:

The Forschungsamt: Nazi Germany's Most Secret Communications Intelligence Agency. 12-19 - Hans Rohrbach:

Mathematical and Mechanical Methods in Cryptography. 20-37 - Louis Kruh:

The Inventions of William P. Friedman. 38-61 - Ronald L. Rivest:

Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem. 62-65 - Cipher A. Deavours:

"Cryptanalysis of the Hagelin Cryptograph" Wayne G. Barker. 66-67 - H. Gary Knight:

Cryptanalyst's Corner. 68-74 - Ralph E. Weber:

James Lovell and Secret Ciphers during the American Revolution. 75-88 - Brian J. Winkel:

There and There. 89-94
Volume 2, Number 2, 1978
- Hans Rohrbach:

Mathematical and Mechanical Methods in Cryptography. 101-121
- David Kahn:

Friedman's Life: a Book Review. 122-123
- H. Gary Knight:

Cryptanalyst's Corner. 124-129 - Louis Kruh:

Who Wrote "the American Black Chamber"? 130-133 - Cipher A. Deavours:

Cryptology at Kean College. 134-138 - David Kahn:

Nuggets from the Archives: Yardley Tries Again. 139-143 - Wayne G. Barker:

The Unsolved D'Agapeyeff Cipher. 144-147
- David W. Straight:

An Outline of Computer Security; a Book Review. 148-150 - David Kahn:

Pictures Galore: A Book Review. 151
- Frank Rubin:

Computer Methods for Decrypting Multiplex Ciphers. 152-160 - Brian J. Winkel:

Casanova and the Beaufort Cipher. 161-163 - Louis Kruh:

Cryptology as a Career. 164-167 - Encryption Challenge. 168-171

- Louis Kruh:

Dh-26 Handheld Encryption Machine. 172-177 - Brian J. Winkel:

There and There. 186-194
Volume 2, Number 3, 1978
- J. Rives Childs:

My recollections of G.2 A.6. 201-214 - Frank Rubin:

Computer Methods for Decrypting Random Stream Ciphers. 215-231 - Philip M. Arnold:

A Forgotten Book on Ciphers. 232-235 - Caxton C. Foster:

Cryptanalysis and Computers. 236-237 - H. Gary Knight:

Cryptanalysts' Corner. 238-241 - Louis Kruh:

A Catalog of Historical Interest. 242-253
- David Kahn:

A Famous Variation: a Book Review. 257 - David Kahn:

Reveling in Deception: a Book Review. 258-259
- Richard Heitzenrater:

Decoding Wesley's Diaries. 260-264 - David Kahn:

Short Notices - Reviews. 265-266 - Robert H. Morris Sr.:

The Hagelin Cipher Machine (M-209) Reconstruction of the Internal Settings. 267-289 - Louis Kruh:

Capsule Reviews for Crypto Buffs. 290-292 - Brian J. Winkel:

There and There. 293-298
Volume 2, Number 4, 1978
- Bob Blakley, G. R. Blakley:

Security of Number Theoretic Public Key Cryptosystems against Random Attack, I. 305-321 - Louis Kruh:

What the Nazis Were Doing. 322-323 - Howard T. Oakley:

The Riverbank Publications on Cryptology. 324-330 - David Kahn:

Extraordinary Codebreakers, Outstanding Family: a Review. 331-333 - Louis Kruh:

A 19th-Century Challenge Cipher. 334 - H. Gary Knight:

Cryptanalysts' Corner. 335-337 - Louis Kruh:

A Catalog of Historical Interest. 338-349 - Nicholas P. Callas:

An Application of Computers in Cryptography. 350-364 - David Kahn:

One of the Worst: a Review. 365 - Louis Kruh:

Rent a Code. 366-367 - Paul Kinnucan:

Data Encryption Gurus: Tuchman and Meyer. 371-381 - Brian J. Winkel:

There and There. 382-393

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














