default search action
Cryptologia, Volume 39
Volume 39, Number 1, 2015
- Betsy Rohaly Smoot:
NSA Release and Transfer of Records Related to William F. Friedman. 1-2 - Liljana Babinkostova, Alyssa M. Bowden, Andrew M. Kimball, Kameryn J. Williams:
A Simplified and Generalized Treatment of DES-Related Ciphers. 3-24 - Philip Marks:
Enigma Wiring Data: Interpreting Allied Conventions from World War II. 25-65 - Roberto Narváez:
Some Diplomatic Ciphers of the First Mexican Federal Republic (1824-1830). 66-83
- Klaus Schmeh:
Second Charlotte International Cryptologic Symposium. 84-91
- John F. Dooley:
Review of George Fabyan by Richard Munson. 92-98 - Chris Christensen:
Review of The Lost World of Bletchley Park by Sinclair Mckay. 99-100 - David H. Hamer:
Review of Gordon Welchman: Bletchley Park's Architect of Ultra Intelligence by Joel Greenberg. 101-103
Volume 39, Number 2, 2015
- Lavinia Corina Ciungu, David Kahn:
A Historical Survey of Romanian Intelligence. 105-120 - Gwoboa Horng:
Accelerating DSA Signature Generation. 121-125 - Eugen Antal, Pavol Zajac:
Key Space and Period of Fialka M-125 Cipher Machine. 126-144 - Nicolas T. Courtois, Theodosis Mourouzis, Michal Misztal, Jean-Jacques Quisquater, Guangyan Song:
Can GOST Be Made Secure Against Differential Cryptanalysis? 145-156 - Karl de Leeuw:
J. F. W. Nuboer and the Reintroduction of Machine Cryptography by the Royal Netherlands Navy, 1915-1940. 157-172 - Craig Bauer:
Friedman Auditorium Times Two. 173-177
- Chris Christensen:
Review of IEEE Milestone Award to the Polish Cipher Bureau for "The First Breaking of Enigma Code". 178-193
- Chris Christensen:
Review of Marian Rejewski: The Man Who Defeated Enigma by Zdzisław J. Kapera. 194-197 - Chris Christensen:
Review of Alan Turing: His Work and Impact Edited by S. Barry Cooper and Jan van Leeuwen. 198-202
Volume 39, Number 3, 2015
- Jeanne Anderson:
Kaczynski's Ciphers. 203-209 - Chris Christensen, Jared Antrobus:
The Story of Mamba: Aligning Messages Against Recovered Additives. 210-243 - Victor Gayoso Martínez, Luis Hernández Encinas, A. Queiruga Dios:
Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme. 244-269 - Haihua Gu, Dawu Gu, WenLu Xie, Ray C. C. Cheung:
Efficient Pairing Computation on Huff Curves. 270-275 - Benedek Láng:
Shame, Love, and Alcohol: Private Ciphers in Early Modern Hungary. 276-287
- Chris Christensen:
Review of Blackett's War by Stephen Budiansky. 288-290
Volume 39, Number 4, 2015
- Alan G. Konheim:
The Impetus to Creativity in Technology. 291-314 - Betsy Rohaly Smoot:
Parker Hitt's First Cylinder Device and the Genesis of U.S. Army Cylinder and Strip Devices. 315-321 - Nicolas T. Courtois:
On Multiple Symmetric Fixed Points in GOST. 322-334 - Thomas H. Barr, Andrew J. Simoson:
Twisting the Keyword Length from a Vigenère Cipher. 335-341 - Klaus Schmeh:
Encrypted Books: Mysteries that Fill Hundreds of Pages. 342-361
- Chris Christensen:
Review of Act of War: Lyndon Johnson, North Korea, and the Capture of the Spy Ship Pueblo by Jack Cheevers. 362-372 - Chris Christensen:
Review of The Riddle of the Labyrinth by Margalit Fox. 373-375
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.