default search action
Cryptologia, Volume 34
Volume 34, Number 1, 2010
- David Kahn:
How I Discovered World War II's Greatest Spy. 12-21 - Gerhard F. Strasser:
Ninth-Century Figural Poetry and Medieval Easter Tables - Possible Inspirations for the Square Tables of Trithemius and Vigenère? 22-26 - Chris Christensen:
Alan Turing's First Cryptology Textbook and Sinkov's Revision of it. 27-43 - Niels Faurholt:
E.S.Schieber German Code Device from WWII. 44-51 - Marko Hölbl, Tatjana Welzer, Bostjan Brumen:
Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme. 52-59 - Jan Bury:
Operation Lotos: An Unsuccessful Attempt on U.S. Government Communications. 60-87
- Chris Christensen:
Review of Bletchley Park: An Inmate's Story by James Thirsk. 88-89 - Clyde G. Booker:
Review of West Wind Clear: Cryptology and the Winds Message Controversy - A Documentary History. 90-95 - John F. Dooley:
Reviews of Cryptologic Fiction. 96-100
Volume 34, Number 2, 2010
- Brian J. Winkel:
David, Calm Down! On Second and More Reflective Thought, Don't! 101-103 - Jacques Patarin, Valérie Nachef:
"I Shall Love You Until Death" (Marie-Antoinette to Axel von Fersen). 104-114 - Benedek Láng:
Why Don't We Decipher an Outdated Cipher System? The Codex of Rohonc. 115-144 - Neal Koblitz:
Secret Codes and Online Security: A Seminar for Entering Students. 145-154 - Yesem Kurt:
Deciphering an Undergraduate Cryptology Course. 155-162 - William Stallings:
NIST Block Cipher Modes of Operation for Confidentiality. 163-175 - Chris Christensen:
Review of the 2009 Cryptologic History Symposium: Global Perspectives on Cryptologic History. 176-179
- John F. Dooley:
Reviews of Cryptologic Fiction. 180-185 - Clyde G. Booker:
Review of The Attack on the Liberty: The Untold Story of Israel's Deadly 1967 Assault on a U.S. Spy Ship by James Scott. 186-189 - Colin B. Burke:
Review of The Secret Sentry: The Untold Story of the National Security Agency by Matthew M. Aid. 190-193 - Emil H. Levine:
Review of Deciphering the Rising Sun: Navy and Marine Corps Codebreakers, Translators, and Interpreters in the Pacific War by Roger Dingman. 194-196
Volume 34, Number 3, 2010
- David Kahn:
Louis Kruh, Cryptologist, Editor, Activist. 197-199
- Ali Assarpour, Kent D. Boklan:
How We Broke the Union Code (148 Years Too Late). 200-210 - Jacob Konikoff, Seth Toplosky:
Analysis of Simplified DES Algorithms. 211-224 - William Stallings:
NIST Block Cipher Modes of Operation for Authentication and Combined Confidentiality and Authentication. 225-235 - Stefan Popoveniuc, Poorvi L. Vora:
Secure Electronic Voting - A Framework. 236-257 - Abhishek Parakh, Subhash C. Kak:
Internet Voting Protocol Based on Improved Implicit Security. 258-268 - Chris Christensen:
Review of Elementary Cryptanalysis: A Mathematical Approach, Second Edition by Abraham Sinkov, revised and updated by Todd Feil. 269-272 - Chris Christensen:
Review of The Real Enigma Heroes by Phil Shanahan. 273-277 - Chris Christensen:
Review of Two "Gift Books" about Cryptology. 278-279
Volume 34, Number 4, 2010
- Craig P. Bauer:
Teamwork Pays Off! 281 - Ashwin Jain, C. Hari:
A New Efficient Protocol for k-out-of-n Oblivious Transfer. 282-290 - Klaus Schmeh:
Alexander von Kryha and His Encryption Machines. 291-300 - José Ramón Soler Fuensanta, Francisco Javier López-Brea Espiau, Frode Weierud:
Spanish Enigma: A History of the Enigma in Spain. 301-328 - Dirk Rijmenants:
Enigma Message Procedures Used by the Heer, Luftwaffe and Kriegsmarine. 329-339 - Ralph Erskine:
Ultra Reveals a Late B-Dienst Success in the Atlantic. 340-358 - Colin B. Burke:
From the Archives: A Lady Codebreaker Speaks: Joan Murray, the Bombes and the Perils of Writing Crypto-History From Participants' Accounts. 359-370 - Gerhard F. Strasser:
Review of Versteckte Botschaften. Die faszinierende Geschichte der Steganografie (Hidden Messages. The Fascinating Story of Steganography). 371-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.