


default search action
Cryptologia, Volume 29
Volume 29, Number 1, 2005
- Hilmar-Detlef Brückner:

Germany's First Cryptanalysis on the Western Front: Decrypting British and French Naval Ciphers in World War I. 1-22 - Lee A. Gladwin:

The Diplomacy of Security: behind the Negotiations of Article 18 of the Sino-american Cooperative Agreement. 23-42 - David Kahn:

The Man in the Iron Mask - Encore Et Enfin, Cryptologically. 43-49 - Navneet Mandhani, Subhash C. Kak:

Watermarking Using Decimal Sequences. 50-58 - Jeffrey Overbey, William N. Traves, Jerzy Wojdylo:

On the Keyspace of the Hill Cipher. 59-72 - Rodney H. Cooper, Christopher G. Andrews:

The Public Key Covert Channel. 73-75 - David Kahn:

From the Archives: Codetalkers not Wanted. 76-87 - Louis Kruh:

Reviews and Things Cryptologic. 88-93 - David Kahn:

David Shulman Dies - the Bibliographer of Cryptology. 94-95
Volume 29, Number 2, 2005
- Philip H. Jacobsen:

Pearl Harbor: Radio Officer Leslie Grogan of the Ss Lurline and his Misidentified Signals. 97-120 - David Kahn:

The Polish Enigma Conference and some Excursions. 121-126 - Peter Zilahy Ingerman:

Two Hebern Cryptographic Machines. 127-147 - Raphael C.-W. Phan:

How to Explain Block Cipher Cryptanalysis to your Kids. 148-158 - Craig P. Bauer, Suzanne E. Gladfelter:

Cryptology in York Pennsylvania. 159-175 - Louis Kruh:

Reviews and Things Cryptologic. 176-187 - Louis Kruh:

Unknown Military Coding Device Can You Identify It? 190-191
Volume 29, Number 3, 2005
- Geoff Sullivan, Frode Weierud

:
Breaking German Army Ciphers. 193-232 - John Lawrence:

A Study of Rejewski's Equations. 233-247 - Craig P. Bauer, Elliott J. Gottloeb:

Results of an Automated Attack on the Running Key Cipher. 248-254 - Richard Pekelney:

Excellent, Exceptional, Enormous Crypto Source. 255-256 - Robert Cordery, Leon Pintsov:

History and Role of Information Security in Postage Evidencing and Payment. 257-271 - Louis Kruh:

Enigma Articles from Cryptologia. 272-273 - Louis Kruh:

Crypto User's Guide. 273 - Louis Kruh:

Confederate Treasure Issues. 274 - Louis Kruh:

Detective Notebook for Young Adults. 274-275 - Louis Kruh:

College-level Math Crypto Text. 275 - Louis Kruh:

Code Names Post 9/11. 276 - Louis Kruh:

Coral Sea, Midway, and Aleutians Naval Intelligence. 276-277 - Louis Kruh:

Broad View of Power of Mathematics. 277-278 - Louis Kruh:

Friedman Legacy. 278 - Louis Kruh:

Pearl Harbor Revisited. 278-279 - Louis Kruh:

Global Eavesdropping. 279-280 - Louis Kruh:

Cryptology in American History. 280 - Louis Kruh:

Hms Dunedin Acts on Enigma Material. 280-281 - Louis Kruh:

Novel Secrets. 281-282
Volume 29, Number 4, 2005
- John F. Dooley

:
Codes and Ciphers in Fiction: an Overview. 290-328 - David Kahn:

How Garbles Tickled History. 329-336 - Charles F. Rocca:

Cryptology in General Education. 337-342 - John Lawrence:

Factoring for the Plugboard - Was Rejewski's Proposed Solution for Breaking the Enigma Feasible? 343-366 - B. Thilaka, K. Rajalakshmi:

An Extension of Hill Cipher Using Generalised Inverses and Mth Residue Modulo N. 367-376 - Louis Kruh:

Reviews and Things Cryptologic. 377-380

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














