


default search action
Cryptologia, Volume 33
Volume 33, Number 1, 2009
- Louis Kruh:

A Belated Tribute to Rosario Candela. 1-11 - Jean-Philippe Aumasson:

Cryptanalysis of a Hash Function Based on Norm Form Equations. 12-15 - Cheryl L. Beaver:

Cryptology in the Classroom: Analyzing a Zero-Knowledge Protocol. 16-23 - Tomi S. Melka:

Some Considerations about the Kohau Rongorongo Script in the Light of a Statistical Analysis of the 'Santiago Staff'. 24-73 - Jan Bury

:
Breaking Unbreakable Ciphers. The Asen Georgiyev Spy Case. 74-88
- Chris Christensen:

Review of Modern Cryptanalysis: Techniques for Advanced Code Breaking by Christopher Swenson. 89-94 - David Hamer:

Review of Herivelismus and the German Military Enigma by John Herivel. 95-97 - Colin B. Burke:

Review of Echoes of our Past by the Naval Cryptologic Veterans Association. 98 - James David:

Review of The U.S. Intelligence Community (Fifth Edition) by Jeffrey T. Richelson. 99-101 - Raphael C.-W. Phan:

Review of Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson. 102-103 - David Kruh:

Review of Spies of the Bible: Espionage in Israel from the Exodus to the Bar Kokhba Revolt by Rose Mary Sheldon. 104-105
Volume 33, Number 2, 2009
- Craig P. Bauer:

Dedication to Dr. Jay Anderson. 107
- John F. Dooley

, Yvonne I. Ramirez:
Who Wrote The Blonde Countess? A Stylometric Analysis of Herbert O. Yardley's Fiction. 108-117 - José Ramón Soler Fuensanta:

Treaty of Cryptography by Joaquín García Carmona? 118-124 - Blake Rice, Bill Yankosky:

Elliptic Curve Cryptography with the TI-83. 125-141 - Tim McDevitt, Tom Leap:

Multimedia Cryptology. 142-150 - Mike May:

Using Maple Worksheets to Enable Student Explorations of Cryptography. 151-157 - David E. Boliver:

Cryptology as College Outreach to Young Teens. 158-165 - David Link:

Resurrecting Bomba Kryptologiczna: Archaeology of Algorithmic Artefacts, I. 166-182 - Jiqiang Liu, Sheng Zhong:

Analysis of Kim-Jeon-Yoo Password Authentication Schemes. 183-187 - José de Jesús Angel Angel, Guillermo Morales-Luna:

Cryptographic Methods During the Mexican Revolution. 188-196
- Colin B. Burke:

Review of American Cryptology during the Cold War, 1945-1989 by Thomas R. Johnson. 197-200 - Chris Christensen:

Review of An Introduction to Mathematical Cryptography by Hoffstein, Pipher, and Silverman. 201-204 - Howard E. Brandt:

Review of Protecting Information: From Classical Error Correction to Quantum Cryptography by Susan Loepp and William K. Wootters. 205-207 - David Joyner:

Review of Algorithmic Number Theory: Lattices, Curves and Cryptography, Edited by J. P. Buhler and P. Stevenhagen. 208-211 - John F. Dooley:

Reviews of Cryptologic Fiction. 212-215
Volume 33, Number 3, 2009
- Eimear Gallery, Chris J. Mitchell

:
Trusted Computing: Security and Applications. 217-245 - Jongsung Kim, Raphael C.-W. Phan

:
Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher. 246-270
- Chris Christensen:

Reviews of Two Post-Quantum Cryptography Books. 271-273 - David Hamer:

Review of From Bletchley with Love by Mavis Batey. 274-275
- John F. Dooley

:
Another Yardley Mystery. 276-282 - David Chaum, Benjamin Hosp, Stefan Popoveniuc, Poorvi L. Vora:

Accessible Voter-Verifiability. 283-291
- Stephen Budiansky:

Review of Decoding the IRA by Tom Mahon and James J. Gillogly. 292-294
Volume 33, Number 4, 2009
- Kathryn A. Schwartz

:
Charting Arabic Cryptology's Evolution. 297-304 - Sean Simmons:

Algebraic Cryptanalysis of Simplified AES. 305-314 - Haihua Gu, Dawu Gu:

Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication. 315-320 - Sujith Ravi, Kevin Knight:

Attacking Letter Substitution Ciphers with Integer Programming. 321-334 - Dae Hyun Yum, Pil Joong Lee:

Cracking Hill Ciphers with Goodness-of-Fit Statistics. 335-342 - Klaus Schmeh:

Enigma's Contemporary Witness: Gisbert Hasenjaeger. 343-346 - Jan Bury

:
From the Archives: CX-52 Messages Read by Red Poles? 347-352
- Henry B. Wolfe:

Review of Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and Holocaust, 1939-1945 by Robert J. Hanyok. 353-355 - Chris Christensen:

Review of The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America by James Bamford. 356-358 - Chris Christensen:

Review of Random Curves by Neal Koblitz. 359-365 - Chris Christensen:

Review of Ultra Versus U-Boats: Enigma Decrypts in The National Archives by Roy Conyers Nesbit. 366-369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














