


default search action
Cryptologia, Volume 10
Volume 10, Number 1, 1986
- Brian J. Winkel:

Letter from One of the Editors. 1 - Louis Kruh:

The Control of Public Cryptography and Freedom of Speech - a Review. 2-9 - Roland Anderson:

Improving the Machine Recognition of Vowels in Simple Substitution Ciphers. 10-22 - Mike Barlow:

A Machine Solution of the Amsco Cipher. 23-33
- Frode Weierud

:
Machine Secrets: a Book Review. 34-37
- David Kahn:

Secrets of the Codebreakers. 38-41 - Louis Kruh:

Announcements and Reviews of Things Cryptologic. 42-45 - Cipher A. Deavours:

Elle a de l'intelligence et de la Conversation. 47-49 - Ralph Erskine:

From the Archives GC and CS Mobilizes "Men of the Professor Type". 50-59 - Louis Kruh:

18th Century Shorthand Expert Needed. 60-62 - Louis Kruh:

Cipher Equipment. 63 - Donald W. Davies:

Bolton's Cypher Wheel. 64
Volume 10, Number 2, 1986
- Louis Kruh:

The Truman Memorandum. 65-74 - Charles-Hubert Desnoyers:

Cryptanalytic Essay - Part I Solution of Problem no. 166, Published in Elementary Cryptanalysis. 75-95 - Yves Roggeman:

Remarks on the Auto-Correlation Function of Binary Periodic Sequences. 96-100 - Louis Kruh:

Cryptology and the Law - V. 101-107 - Louis Kruh:

Reviews of Things Cryptologic. 110-122 - Martin Minow:

No title. 123-125 - Louis Kruh:

18th Century Shorthand Expert Needed (Re-Run). 126-127
Volume 10, Number 3, 1986
- Louis Kruh:

Cryptology and the Law - VI. 129-133 - Gilbert Bloch, Ralph Erskine:

Enigma: the Dropping of the Double Encipherment. 134-141 - Richard Outerbridge:

Some Design Criteria for Feistel-Cipher Key Schedules. 142-156 - Charles-Hubert Desnoyers:

Cryptanalytic Essay - Part II Solution of Problem no. 166, Published in Elementary Cryptanalysis. 158-183 - Louis Kruh:

Reviews of Things Cryptologic. 184-191
Volume 10, Number 4, 1986
- John M. Carroll, Steve Martin:

The Automated Cryptanalysis of Substitution Ciphers. 193-209 - Michael Barlow:

The Voynich Manuscript - by Voynich? 210-216 - Frank Rubin:

Foiling the Known-Plaintext Attack. 217-223 - Richard Outerbridge:

Cadbury Code Confidential. 225-226
- Ralph Erskine:

A Link with PEARL Harbor? Book Review. 227-229
- Wolfgang Mache:

Geheimschreiber. 230-242 - Cipher A. Deavours, Louis Kruh:

Appendix mechanics of the German Telecipher Machine. 243-247 - Louis Kruh:

Cryptology and the Law - VII. 248-253

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














