


default search action
Cryptologia, Volume 27
Volume 27, Number 1, 2003
- Wes Freeman, Geoff Sullivan, Frode Weierud

:
Purple Revealed: Simulation and Computer-Aided Cryptanalysis of Angooki Taipu B. 1-43 - Alan M. Turing:

Alan M. Turing's Critique of Running Short Cribs on the U. S. Navy Bombe. 44-49 - Lee A. Gladwin:

Alan M. Turing's Critique of Running Short Cribs on the US Navy Bombe. 50-54 - Louis Kruh:

Reviews and Things Cryptologic. 55-72 - Karl de Leeuw:

The Dutch Invention of the Rotor Machine, 1915-1923. 73-94
Volume 27, Number 2, 2003
- David H. Hamer:

The Enigmas - and Other Recovered Artefacts - of U-85. 97-110 - Ralph Erskine:

From the Archives What the Sinkov Mission Brought to Bletchley Park. 111-118 - Rebecca A. Ratcliff:

How Statistics LED the Germans to Believe Enigma Secure and Why They Were Wrong: neglecting the Practical Mathematics of Cipher Machines. 119-131
- Augusto Buonafalce:

From the Skytale to the Enigma: Book Review. 132-134
- James David:

Soviet Secrets in the ether - Clandestine Radio Stations at the New York and SAN Francisco Consulates in World War II. 135-147 - Mohammad A. Musa, Edward F. Schaefer, Stephen Wedig:

A Simplified AES Algorithm and its Linear and Differential Cryptanalyses. 148-177 - Brian J. Winkel:

Extraordinary Cryptology Collection. 180-181 - Louis Kruh:

Reviews and Things Cryptologic. 182-191
Volume 27, Number 3, 2003
- Philip H. Jacobsen:

Foreknowledge of PEARL Harbor? No!: the Story of the U. S. Navy's Efforts on Jn-25b. 193-205 - Niels Faurholt:

Urkryptografen ("the Clock Cryptograph"). 206-208 - Dorothy Clarkson:

Cypher Machines Maintenance and Restoration Spanning sixty Years. 209-216 - Francine F. Abeles:

The Memoria Technica Cipher. 217-229 - Louis Kruh:

Reviews and Things Cryptologic. 230-232 - Rose Mary Sheldon:

The Sator Rebus: an Unsolved Cryptogram? 233-287
Volume 27, Number 4, 2003
- Ralph Erskine, Peter Freeman:

Brigadier John Tiltman: One of Britain's finest Cryptologists. 289-318 - Francesco Fabris

, Myron Curtis:
A Nomenclator Used by propaganda fide during the Chinese rites Controversy. 319-338 - Joachim von zur Gathen:

Claude Comiers: the First Arithmetical Cryptography. 339-349 - Bob Anderson, George McGinnis:

Naval Security Group Command Display. 350-360 - Raphael Chung-Wei Phan

:
Impossible Differential Cryptanalysis of Mini-AES. 361-374 - Louis Kruh:

Reviews and Things Cryptologic. 375-378 - Louis Kruh:

The Shakespeare-Bacon Controversy Continues on the Stage. 379-380

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














