


default search action
Cryptologia, Volume 24
Volume 24, Number 1, 2000
- Brian J. Winkel:

Annual Greg Mellen Memorial Cryptology Scholarship Prize. 1-3 - Heidi Williams:

Applying Statistical Language Recognition Techniques in the Ciphertext-only Cryptanalysis of Enigma. 4-17 - Bruce Schneier:

A Self-Study Course in Block-Cipher Cryptanalysis. 18-33 - Hideki Sawada, Takahiro Abe:

Groups and RSA Cryptosystems. 34-40 - David H. Hamer:

G-312: An Abwehr Enigma. 41-54 - Philip Marks, Frode Weierud

:
Recovering the Wiring of Enigma's Umkehrwalze A. 55-66 - Louis Kruh:

Reviews and Things Cryptologic. 67-93
Volume 24, Number 2, 2000
- Ralph Erskine:

What did the Sinkov Mission Receive from Bletchley Park? 97-109 - Philip H. Jacobsen:

A Cryptologic Veteran's Analysis of "Day of Deceit" - a Book Review. 110-118 - Stephen Budiansky:

Closing the Book on Pearl Harbor. 119-130 - Donald W. Davies:

An Unidentified Cipher Device. 131-134 - Lars R. Knudsen, Vincent Rijmen

:
Ciphertext-only Attack on Akelarre. 135-147 - Chih-Hung Wang, Tzonelih Hwang:

(T, M) Threshold and Generalized ID-Based Conference Key Distribution System. 148-159 - Rebecca A. Ratcliff:

Cryptology through the Centuries: NSA's 1999 History Symposium. 160-167
- Louis Kruh:

Reviews and Things Cryptologic. 168-189
Volume 24, Number 3, 2000
- Peter Pesic:

The Clue to the Labyrinth: Francis BACON and the Decryption of Nature. 193-211 - Frederick D. Parker:

How OP-20-G got Rid of Joe Rochefort. 212-234 - Thomas R. Hammant:

Russian and Soviet Cryptology I - Some Communications Intelligence in Tsarist Russia. 235-249 - Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee, Juin-Jang Tsai:

(T, N) Threshold-Multisignature Scheme and Generalized-Multisignature Scheme Where suspected Forgery Implies Traceability of Adversarial Shareholders. 250-268
- Louis Kruh:

Reviews and Things Cryptologic. 269-286
Volume 24, Number 4, 2000
- Stephen Huffman:

The Navajo Code Talkers: a Cryptologic and Linguistic Perspective. 289-320 - Craig Graham McKay:

From the Archives Japanese fears and the Ironies of Interception. 321-323 - Cecil Phillips:

The American Solution of a German One-Time-Pad Cryptographic System (G-OTP). 324-332 - Thomas R. Hammant:

Russian and Soviet Cryptology II - the Magdeburg Incident: the Russian View. 333-338 - John R. Schindler:

A hopeless Struggle: Austro-Hungarian Cryptology during World War I. 339-350
- Colin B. Burke:

Letter to the Editor. 351-352
- Shahrokh Saeednia:

How to Make the Hill Cipher Secure. 353-360 - Russell Atkinson:

David Brian Kern Theft of Trade Secrets. 361-369
- Louis Kruh:

Corrections. 370

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














