


default search action
Cryptologia, Volume 32
Volume 32, Number 1, 2008
- Jeffrey D. Adler

, Ryan W. Fuoss, Michael J. Levin, Amanda R. Youell:
Reading Encrypted Diplomatic Correspondence: An Undergraduate Research Project. 1-12 - Raphael Chung-Wei Phan

, Adi Shamir:
Improved Related-key Attacks on Desx and Desx+. 13-22 - Chris Christensen, Suzanne E. Gladfelter:

Taking a Cryptology Class to Bletchley Park. 23-32 - Wayne S. Chan:

Key Enclosed: Examining the Evidence for the Missing Key Letter of the Beale Cipher. 33-36 - Abhishek Parakh:

Oblivious Transfer Based on Key Exchange. 37-44 - Brian J. Winkel:

Lessons Learned from a Mathematical Cryptology Course. 45-55 - David Kahn:

The Future of the Past - Questions in Cryptologic History. 56-61 - Augusto Buonafalce:

Cicco Simonetta's Cipher-Breaking Rules. 62-70 - Michael J. Cowan:

Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm. 71-83 - Jan Bury

:
From the Archives: Intercepting Best Friend? 84-87 - Chris Christensen:

Review of The Collective Works of Captain George P. McGinnis by George P. McGinnis. 88-89 - Chris Christensen:

Review of How to Tell a Secret: Tips, Tricks & Techniques for Breaking Codes & Conveying Covert Information by P. J. Huff and J. G. Lewin. 90-91 - Joshua Holden

:
Review of Complexity and Cryptography: An Introduction by John Talbot and Dominic Welsh. 92-97 - John C. Gallehawk:

Review of Delusions of Intelligence by R. A. Ratcliff. 98-100
Volume 32, Number 2, 2008
- Marek Grajek:

Monument in Memoriam of Marian Rejewski, Jerzy Rózycki and Henryk Zygalski Unveiled in Poznan. 101-103 - Mavis Batey:

Dilly Knox - A Reminiscence of this Pioneer Enigma Cryptanalyst. 104-130 - Ching-Nung Yang

, Tse-Shih Chen:
Security Analysis of Authentication of Images Using Recursive Visual Cryptography. 131-136 - Sukamol Srikwan, Markus Jakobsson:

Using Cartoons to Teach Internet Security. 137-154 - Tomi S. Melka:

Structural Observations Regarding RongoRongo Tablet 'Keiti'. 155-179 - David A. Hatch:

From the Archives: Friedman Takes the Stand. 180-183 - Louis Kruh:

Review of Figuring It Out At Bletchley Park 1939-1945 by John Gallehawk and Kerry Johnson. 184-185 - Chris Christensen:

Review of Voices of the Code Breakers: Personal Accounts of the Secret Heroes of World War Ii by Michael Paterson. 186-188 - Chris Christensen:

Review of A3 and His Algebra by Nancy E. Albert. 189-196 - Can You Break the Nku Monopoly? 197

Volume 32, Number 3, 2008
- Ralph Erskine:

Captured Kriegsmarine Enigma Documents at Bletchley Park. 199-219 - Martin R. Albrecht:

Algebraic Attacks on the Courtois Toy Cipher. 220-276 - Colin B. Burke:

From the Archives: The Last Bombe Run, 1955. 277-278 - James L. Massey:

Review of Series on Arabic Origins of Cryptology. 280-283 - Chris Christensen:

Review of The History of Information Security: A Comprehensive Handbook edited by Karl de Leeuw and Jan Bergstra. 284-294 - John F. Dooley:

Reviews of Cryptologic Fiction. 295-298
Volume 32, Number 4, 2008
- Kent D. Boklan:

How I Broke an Encrypted Diary from the War of 1812. 299-310 - Christopher Grey

, Andrew Sturdy
:
The 1942 Reorganization of the Government Code and Cypher School. 311-333 - Tobias Schrödel:

Breaking Short Vigenère Ciphers. 334-347 - Jerzy Jaworski:

Rejewski-Rózycki-Zygalski Lectures in Computer Science. 348-350 - Jan Bury

:
From the Archives: Inside a Cold War Crypto Cell. Polish Cipher Bureau in the 1980s. 351-367 - Whitfield Diffie:

What Did We Do Before Biometric Passports? A Review of Who Are You? Identification, Deception, and Surveillance in Early Modern Europe by Valentin Groebner. 368-369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














