


default search action
Cryptologia, Volume 21
Volume 21, Number 1, 1997
- Peter Pesic:

François Viète, Father of Modern Cryptanalysis - Two New Manuscripts. 1-29 - John Cary Sims:

The Brusa Agreement of May 17, 1943. 30-38
- David Schimmelpenninck van der Oye:

A First Look at Russia's Codebreakers a Book Review. 39-41
- Ralph Erskine:

The First Naval Enigma Decrypts of World War II. 42-46 - David H. Hamer:

Enigma: Actions involved in the 'Double Stepping' of the Middle Rotor. 47-50 - Jacques B. M. Guy:

The Distribution of Signs C and O in the Voynich Manuscript: Evidence for a Real Language? 51-54 - Chin-Chen Chang, Jinn-Ke Jan, Huey-Cheue Kowng:

A Digital Signature Scheme Based upon the Theory of Quadratic residues. 55-70 - Paul Constance:

How Jim Bamford probed the NSA. 71-74 - Louis Kruh:

Reviews and Things Cryptologic. 75-92 - George Sassoon:

British Company Makes PGP Easier to Use. 93-94
Volume 21, Number 2, 1997
- Aviel D. Rubin:

An Experience Teaching a Graduate Course in Cryptography. 97-109 - Louis Kruh:

Reviews and Things Cryptologic. 110-128 - Andrew J. Clark, Ed Dawson

:
A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher. 129-138 - Hoi Fung Chau, Hoi-Kwong Lo:

One-Way Functions in Reversible Computations. 139-148 - Norman Scott:

Solving Japanese Naval Ciphers 1943-45. 149-157 - David Kahn:

British Economic espionage. 158-164
Volume 21, Number 3, 1997
- Cipher A. Deavours:

Lobsters, Crabs, and the Abwehr Enigma. 193-199 - Michael van der Meulen:

Bundeswehrtarnverfahren. 200-217 - Louis Kruh:

Reviews and Things Cryptologic. 218-236 - Thomas R. Cain, Alan T. Sherman:

How to Break Gifford's Cipher. 237-286
Volume 21, Number 4, 1997
- Stephen J. Kelley:

The Sigcum Story: Cryptographic Failure, Cryptologic Success. 289-316 - Neal Koblitz:

Cryptography as a Teaching Tool. 317-326 - Nara-Yih Lee, Tzonelih Hwang:

On the Security of Park et al.'s Key Distribution Protocol for Digital Mobile Communications. 327-334 - Louis Kruh:

Reviews and Things Cryptologic. 335-349 - Caxton C. Foster:

Drawbacks of the One-Time Pad. 350-352 - H. Paul Greenough:

Cryptanalysis of the Swedish HC-9 a Known-Plaintext Approach. 353-367 - I. W. Comstock:

Radio Intelligence and Security. 368-377

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














