


default search action
Cryptologia, Volume 9
Volume 9, Number 1, 1985
- David Kahn:

The Annotated the American Black Chamber. 1-37 - Louis Kruh:

An armchair View of the Smithsonian Institution Cipher Machine Exhibit. 38-51 - Ralph Erskine:

An Early Success Story. 52-54 - James J. Gillogly:

Fast Pattern Matching for Word Lists. 55-62 - Ole Immanuel Franksen:

Expert Witness. 63-69 - Greg E. Mellen:

Cryptanalysts' corner. 70-74 - Robert Scott:

Wide-Open Encryption Design Offers Flexible Implementations. 75-91 - Charles Murray:

The Crypt Bug. 92
Volume 9, Number 2, 1985
- John R. Michener:

The "Generalized Rotor" Cryptographic Operator and Some of its Applications. 97-113 - Charles T. Retter:

A Key-Search Attack on Maclaren-Marsaglia Systems. 114-130 - Douglas W. Mitchell:

A polygraphic Substitution Cipher Based on Multiple Interlocking Applications of Playfair. 131-139 - Vijay Varadharajan, Robert W. K. Odoni:

Extension of RSA Cryptosystems to Matrix Rings. 140-153 - Louis Kruh:

Cipher Equipment. 154 - Donald W. Davies:

Charles Wheatstone's Cryptograph and Pletts' Cipher Machine. 155-160 - Greg E. Mellen:

Cryptanalysts' corner. 161-166 - Robert Price:

A Conversation with Claude Shannon One Man's Approach to Problem Solving. 167-175 - Louis Kruh:

Reviems of the Literature. 176-186
Volume 9, Number 3, 1985
- John R. Michener:

Application of the Generalized Rotor Cryptographic Operator in the Construction of Substitution-Permutation Network Block Codes. 193-201 - Joseph R. Kruskal:

A trigraph Cipher with a Short Key for Hand Use. 202-222 - Hugh C. Williams:

Some Public-Key Crypto-Functions as Intractable as Factorization. 223-237 - Richard Outerbridge:

Dea and Lucifer Available on Compuserve. 238-239 - Fred W. Kranz:

Early History of Riverbank Acoustical Laboratories. 240-246 - Brian J. Winkel:

There and There - a Column of News. 247-251 - Louis Kruh:

The Kryha LiLiPUT Ciphering Machine. 252-261
- Ralph Erskine:

British Intelligence - Volume 3, Part 1 - Book Review. 262-272
- Louis Kruh:

Cryptology and the Law - III. 273-285
Volume 9, Number 4, 1985
- Greg E. Mellen:

Cryptanalysts' corner. 289-293 - Louis Kruh, Ralph Erskine:

Review of Things Cryptologic. 294-305 - Louis Kruh:

Automatic Communications with the Sigaba and the M-294. 311-315
- Ralph Erskine:

Enigma and the Polish Contribution: Book Review. 316-323
- Louis Kruh:

Early Communications Security in the US Navy. 324-330 - Robert I. Atha:

Bombe! "I Could Hardly Believe IT!". 332-336 - Henry D. Ephron:

An American Cryptanalyst in Australia. 337-340 - Louis Kruh:

Cryptology and the Law - IV. 348-350 - David A. August:

Information Theoretic Approach to Secure Lsfr Ciphers. 351-359 - Masahiro Yagisawa:

A New Method for Realizing Public-Key Cryptosystem. 360-372 - Russell Atkinson:

Ciphers in Oriental Languages. 373-380

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














