default search action
Cryptologia, Volume 7
Volume 7, Number 1, 1983
- David Kahn:
The Crypto '82 Conference, Santa Barbara a Report on a Conference. 1-5 - Greg E. Mellen:
Cryptanalysts' Corner. 6-11 - Denis R. Floyd:
Annotated Bibiliography in Conventional and Public Key Cryptography. 12-24 - S. Brent Morris:
Fraternal Cryptography Cryptographic Practices of American fraternal Organizations. 27-36 - Helmut Jürgensen:
Language Redundancy and the Unicity Point. 37-48 - Viiveke Fåk:
Cryptographic Protection of Files in an Automated Office System. 49-62 - Boshra H. Makar:
Application of a certain class of Infinite matrices to the Hill Cryptographic System. 63-78
- Thomas H. Dyer:
The Power of Magic: a Book Review. 79-82
- Louis Kruh:
Cipher Equipment the Cryptographic Unit CSI-10. 83-88 - Elliot Fischer:
Uncaging the Hagelin Cryptograph. 89-92
Volume 7, Number 2, 1983
- John B. Lundstrom:
A Failure of Radio Intelligence: An Episode in the Battle of the Coral Sea. 97-118 - Carter W. Clarke:
From the Archives Statement for Record of Participation of Brig. Gen Carter W. Clarke, GSC in the transmittal of Letters from Gen. George C. Marshall to Gov. Thomas E. Dewey the Latter Part of September 1944. 119-131 - John F. Bratzel, Leslie B. Rout:
Abwehr Ciphers in Latin America. 132-144 - Louis Kruh, Cipher A. Deavours:
The Typex Cryptograph. 145-166 - Greg E. Mellen:
Cryptanalysis' Corner. 167-169 - Babacar Alassane Ndam, Amadou Sarr:
The Problem of Reciprocity in a Delastelle Digraphic Substitution. 170-179 - Gustavus J. Simmons:
A "Weak" Privacy Protocol using the RSA Crypto Algorithm. 180-182 - Henk Meijer, Selim G. Akl:
Remarks on a Digital Signature Scheme. 183-186 - Cipher A. Deavours:
The Viem from across the Pond an Interview with the Geneva Management Group. 187-190
Volume 7, Number 3, 1983
- Gerhard F. Strasser:
The Noblest Cryptologist. 193-217 - Donald H. Bennett:
An Unsolved Puzzle Solved. 218-234 - Donald W. Davies:
The Early Models of the Seimens and Halske T52 Cipher Machine. 235-253 - David Kahn:
Eurocrypt 83: a Report. 254-256 - Christian Müller-Schloer:
Des-Generated Checksums for Electronic Signatures. 257-273 - Greg E. Mellen:
Cryptanalysts' Corner. 274-277 - Louis Kruh, Greg E. Mellen:
Book, Movie, Article and Game Reviews. 278-286
Volume 7, Number 4, 1983
- Louis Kruh:
How to Use the German Enigma Cipher Machine: a Photographic Essay. 291-296 - Albert C. Leighton, Stephen M. Matyas:
The Search for the Key Book to Nicholas Trist's Book Ciphers. 297-314 - Peter Winkler:
The Advent of Cryptology in the Game of Bridge. 327-332 - Oskar Stuerzinger:
The B-21 Cryptograph. 333-346 - Hugo Brändström:
A Public-Key Cryptosystem Based upon Equations over a Finite Field. 347-358 - Daniel Wolf:
Roterm: a Microprocessor Based Cipher terminal System. 359-370 - Greg E. Mellen:
Cryptanalysts' Corner. 371-374
- Louis Kruh:
Book Reviews. 375-379
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.