


default search action
Cryptologia, Volume 41
Volume 41, Number 1, 2017
- Rohit Vobbilisetty, Fabio Di Troia, Richard M. Low, Corrado Aaron Visaggio, Mark Stamp

:
Classic cryptanalysis using hidden Markov models. 1-28 - Alan T. Sherman, John Seymour, Akshayraj Kore, William Newton:

Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario. 29-54 - Rafal Wieczorek

:
Putative duplication glyph in the rongorongo script. 55-72
- Klaus Schmeh:

Review of the 15th NSA Cryptologic History Symposium. 73-80
- Chris Christensen:

Review of The SIGABA/ECM II Cipher Machine: "A Beautiful Idea" by Timothy J. Mucklow. 81-84 - Chris Christensen:

Review of The Neglected Giant: Agnes Meyer Driscoll by K. Johnson. 85-89 - Chris Christensen:

Review of An Introduction to Number Theory with Cryptography by James S. Kraft and Lawrence Washington. 90-91 - Dominik Landwehr:

Review of Simpliciana: Schriften der Grimmelshausen Gesellschaft 2014. 92-96 - Jeffrey Ehme:

A joy to review: Two books about primes and factoring. 97-100
Volume 41, Number 2, 2017
- George Lasry, Ingo Niebel, Nils Kopal, Arno Wacker:

Deciphering ADFGVX messages from the Eastern Front of World War I. 101-136 - William Stallings:

Format-preserving encryption: Overview and NIST specification. 137-152 - Lauren De Meyer, Serge Vaudenay:

DES S-box generator. 153-171
- Klaus Schmeh:

Review of the 2nd Historical Ciphers Colloquium in Kassel, Germany. 172-177
- Chris Christensen:

Review of The Imitation Game. 178-181
- Chris Christensen:

Review of Demystifying the Bombe by Dermot Turing. 182-183 - David H. Hamer:

Review of The Secret World by Hugh Trevor-Roper. 184-185 - David H. Hamer:

Review of Solving Enigma's Secrets by John Jackson. 186-189 - Chris Christensen:

Review of The Mathematics of Encryption: An Elementary Introduction by M. Cozzens and S. Miller. 190-194
Volume 41, Number 3, 2017
- David Sherman:

The National Security Agency and the William F. Friedman Collection. 195-238 - G. Stuart Smith:

Elizebeth Friedman's security and career concerns prior to World War II. 239-246 - Gordon Rugg, Gavin Taylor:

Hoaxing statistical features of the Voynich Manuscript. 247-268 - John Alexander, John Gallehawk, John Jackson, Allen Pearce, Edward Simpson:

A German machine for differencing and testing additives. 269-280
- Chris Christensen:

A comment on a book review. 281-282 - Chris Christensen:

Review of The Triumph of Zygalski's Sheets: The Polish Enigma in the Early 1940 by Zdzisław J. Kapera. 283-285 - Chris Christensen:

Review of SIGINT: The Secret History of Signals Intelligence 1914-1945 by Peter Matthews. 286-287 - Chris Christensen:

Review of Bletchley Park: The Secret Archives by Sinclair McKay. 288
Volume 41, Number 4, 2017
- David Hamer, family man and enigma expert, remembered and missed. 289-294

- John Wright:

The Turing Bombe Victory and the first naval Enigma decrypts. 295-328 - Chris Christensen:

The evolving relationship between mathematics and cryptology, 1951-1952: SCAG and the beginnings of SCAMP and NSASAB. 329-387 - Charles Varga:

Is Zendia the Isle of Pines? 388-394
Volume 41, Number 5, 2017
- Olaf Ostwald, Frode Weierud

:
Modern breaking of Enigma ciphertexts. 395-421 - Xavier Bultel, Jannik Dreier, Pascal Lafourcade

, Malika More:
How to explain modern security concepts to your children. 422-447 - Jean-Philippe Échard

, Pierrick Gaudry:
A harmonious encoding of instrument values by a nineteenth-century Parisian violin dealer. 448-458 - Gunnar E. Wolf

, Gina Gallegos-García
:
Strengthening a curated web of trust in a geographically distributed project. 459-475 - Betsy Rohaly Smoot

:
National Security Agency releases Army Security Agency histories covering 1945-1963. 476-478
- Chris Christensen:

Review of Silence Means Security: Secrets of a WWII Code-Breaking WAC by B. Nicodemus. 479-480 - Chris Christensen:

Review of Code Warriors: NSA's Codebreakers and the Secret Intelligence War against the Soviet Union by S. Budiansky. 481-484 - Klaus Schmeh:

Review of Unsolved: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies by Craig Bauer. 485-490
Volume 41, Number 6, 2017
- Duong Hieu Phan

, Neal Koblitz:
Cryptography during the French and American Wars in Vietnam. 491-511 - Jan Bury

:
Lambda: A Cold War Polish line encryptor and the networks it served. 512-533 - Sergey Agievich

, Anastasiya Gorodilova, Valeriya Idrisova, Nikolay Kolomeec, George Shushuev, Natalia N. Tokareva:
Mathematical problems of the Second International Students' Olympiad in Cryptography. 534-565
- Editorial Board EOV.


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














