


default search action
Cryptologia, Volume 40
Volume 40, Number 1, 2016
- Tzonelih Hwang, Prosanta Gope:

RT-OCFB: Real-Time Based Optimized Cipher Feedback Mode. 1-14 - Michael Goodman

, Huw Dylan
:
British Intelligence and the Fear of a Soviet Attack on Allied Communications. 15-32 - Jozef Kollár:

Soviet VIC Cipher: No Respector of Kerckoff's Principles. 33-48 - George Lasry, Nils Kopal, Arno Wacker:

Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages. 49-69 - Olaf Ostwald, Frode Weierud

:
History and Modern Cryptanalysis of Enigma's Pluggable Reflector. 70-91 - John Wright:

Rejewski's Test Message as a Crib. 92-106
- John F. Dooley:

Review of Prisoners, Lovers, & Spies by Kristie Macrakis. 107-112
Volume 40, Number 2, 2016
- Jan Bury

:
Operation "Zachod": Sex, lies, and ciphers. 113-140 - George Lasry, Nils Kopal, Arno Wacker:

Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs. 141-176 - Harold Thimbleby:

Human factors and missed solutions to Enigma design weaknesses. 177-202 - José Ramón Soler Fuensanta, Vicente Guasch Portas:

States by secrecy: Cryptography and guerrillas in the Spanish Civil War. 203-214
Volume 40, Number 3, 2016
- Anders Wik:

Enigma Z30 retrieved. 215-220 - Daniel Loebenberger

, Michael Nüsken:
Design principles of DES-like ciphers: A historical overview. 221-239 - Gerhard F. Strasser:

Samuel Zimmermann's Gehaimnussen: The earliest cryptological book in German. 240-260 - Luis Alberto Benthin Sanguino, Gregor Leander

, Christof Paar, Bernhard Esslinger, Ingo Niebel:
Analyzing the Spanish strip cipher by combining combinatorial and statistical methods. 261-284 - Tzonelih Hwang, Prosanta Gope:

PFC-CTR, PFC-OCB: Efficient stream cipher modes of authencryption. 285-302
Volume 40, Number 4, 2016
- Klaus Pommerening:

Cryptanalysis of nonlinear feedback shift registers. 303-315 - Roberto Narváez:

On the cryptography of James Leander Cathcart (1767-1843). 316-326 - John Wright:

A recursive solution for Turing's H-M factor. 327-347 - Subhash C. Kak:

Simulating entanglement in classical computing for cryptographic applications. 348-354 - Martin Samuels

:
Ludwig Föppl: A Bavarian cryptanalyst on the Western front. 355-373 - George Lasry, Nils Kopal, Arno Wacker:

Cryptanalysis of columnar transposition cipher with long keys. 374-398
- Craig Bauer:

Review of Unveiling the Mystic Ciphers by Dave Ramsden. 399-401
Volume 40, Number 5, 2016
- Betsy Rohaly Smoot, David A. Hatch:

Ann Zeilinger Caracristi (1 February 1921-10 January 2016). 403-405
- Kent D. Boklan:

How I deciphered a Robert E. Lee letter - and a note on the power of context in short polyalphabetic ciphers. 406-410 - Daniel J. Girard:

Breaking "Tirpitz": Cryptanalysis of the Japanese-German joint naval cipher. 428-451 - Tom Leap, Tim McDevitt, Kayla Novak, Nicolette Siermine:

Further improvements to the Bauer-Millward attack on the Hill cipher. 452-468
- Chris Christensen:

A review of three books about the women of Bletchley Park. 469-476 - Nick Hoffman:

Review of Intercept: The Secret History of Computers and Spies by Gordon Corera. 477-480 - David Visco:

Somerton Man times two. 481-483
- Betsy Rohaly Smoot:

Call for papers: 2017 Symposium on Cryptologic History. 484-485
Volume 40, Number 6, 2016
- George Lasry, Moshe Rubin

, Nils Kopal, Arno Wacker:
Cryptanalysis of Chaocipher and solution of Exhibit 6. 487-514 - Shane Kepley, David Russo, Rainer Steinwandt:

Cryptanalysis of a modern rotor machine in a multicast setting. 515-521 - Qian Yu, Chang N. Zhang:

A new and fast cryptographic hash function based on RC4. 522-540 - Craig Bauer, Gregory Link, Dante Molle:

James Sanborn's Kryptos and the matrix encryption conjecture. 541-552
- David H. Hamer:

Review of Prof: Alan Turing Decoded by Dermot Turing. 553-555 - Chris Christensen:

Companion review of Prof: Alan Turing Decoded by Dermot Turing. 556-562 - Chris Christensen:

Review of Codes, Ciphers and Spies: Tales of Military Intelligence in World War I by John F. Dooley. 563-566 - Chris Christensen:

Review of U.S. Navy Codebreakers, Linguists, and Intelligence Officers against Japan, 1910-1941 by Steven E. Maffeo. 567-569

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














