


default search action
Cryptologia, Volume 23
Volume 23, Number 1, 1999
- Samuel J. Lomonaco:

A Quick Glance at Quantum Cryptography. 1-41 - Louis Kruh:

Reviews and Things Cryptologic. 42-54
- Jim Reeds:

Breakthrough in Renaissance Cryptography a Book Review. 59-62
- David Kahn:

Students Better than a Pro (Bazeries) and an Author (Candela). 63-64 - Ralph Erskine:

Kriegsmarine Short Signal Systems - and How Bletchley Park Exploited Them. 65-92
Volume 23, Number 2, 1999
- Stephen Budiansky:

A Tribute to Cecil Phillips-and Arlington Hall's "Meritocracy". 97-107 - Donald W. Davies:

The Bombe a Remarkable Logic Machine. 108-138 - H. Paul Greenough:

Cryptanalysis of the Hagelin C-52 and Similar Machines a Known Plaintext Attack. 139-156 - Stephen T. Walker, Joan D. Winston:

Cryptography Policy Update. 157-163 - Louis Kruh:

Reviews and Things Cryptologic. 171-188
Volume 23, Number 3, 1999
- Heinz Ulbricht:

Enigma-Uhr. 193-205 - Friedrich L. Bauer:

An Error in the History of Rotor Encryption Devices. 206-210 - John J. G. Savard, Richard Pekelney:

The ECM Mark II: Design, History, and Cryptology. 211-228 - Donald W. Davies:

Effectiveness of the Diagonal Board. 229-239 - Michael van der Meulen:

German Air Force Signal Intelligence 1956: a Museum of Comint and SIGINT. 240-256
- Craig Graham McKay:

Swedish Cryptanalysis and the SAGA of Arne Beurling a Book Review. 257-258
- Louis Kruh:

Vint Hill Farms Station. 259-260 - Axel Roch:

Biopolitics and Intuitive Algebra in the Mathematization of Cryptology? A Review of Shannon's "a Mathematical Theory of Cryptography" from 1945. 261-266 - James H. Ellis:

The History of Non-Secret Encryption. 267-273 - Louis Kruh:

Reviews and Things Cryptologic. 274-286
Volume 23, Number 4, 1999
- Alexander Hagerty:

An unpublished Yardley Manuscript. 289-297 - David M. Smith:

The Use of Decrypted German Weather Reports in the Operations of the Fifteenth Air Force over Europe. 298-304 - Robert L. Williams:

A Note on the Voynich Manuscript. 305-309 - Geoff Sullivan, Frode Weierud

:
The Swiss NEMA Cipher Machine. 310-328 - Stephen T. Walker, Joan D. Winston:

Cryptography Policy Update. 329-342 - Louis Kruh:

Reviews and Things Cryptologic. 343-352 - Ridley Mclean:

Naval Communications. 353-379

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














