


default search action
Cryptologia, Volume 8
Volume 8, Number 1, 1984
- Gustavus J. Simmons:

A System for Verifying User Identity and Authorization at the Point-of Sale or Access. 1-21 - Arthur Sorkin:

Lucifer, a Cryptographic Algorithm. 22-42 - Louis Kruh, Greg E. Mellen:

Reviews of Things Cryptologic. 43-53 - Louis Kruh:

Who did IT? 54 - Greg E. Mellen:

Cryptanalysts' corner. 55-57 - David Kahn:

Cipher Machine Inventor - BORIS Hagelin dies. 60-61 - Louis Kruh:

Because of the Freedom of Information Act (Foia). 75-77 - Louis Kruh:

Cipher Devices. 78-79 - James J. Gillogly:

The Mysterious Autocryptograph. 79-81 - Donald W. Davies:

The Autocryptograph. 82-92
Volume 8, Number 2, 1984
- Charles T. Retter:

Cryptanalysis of a Maclaren-Marsaglia System. 97-108 - Louis Kruh:

Hand-held Crypto Device SEC-36. 112-114 - Donald W. Davies:

Sidney Hole's Cryptographic Machine. 115-126 - Louis Kruh:

Literature Reviews. 127-131 - Borge Tilt:

On Kullback's χ-Tests for Matching and Non-Matching Multinomial Distributions. 132-141 - John M. Carroll, Pierre G. Laurin:

Software Protection for Microcomputers. 142-160 - Jack Levine:

Corrections for Published Copy of United States Cryptographic patents: 1861-1981. 161-162 - Louis Kruh:

The Slidex RT Code. 163-172
- Ralph Erskine:

British Intelligence - Volume II - Book Review. 173-180
- David Shulman:

An Unknown Cipher Disk. 187-190
Volume 8, Number 3, 1984
- Thomas R. Hammant:

The Origins of Russian Navy Communications Intelligence. 193-202 - Francis Guelker:

A Cryptographer's War Memories. 203-207 - Robert Weller:

Rear Admiral Joseph N. Wenger USN (RET) and the Naval Cryptologic Museum. 208-234
- Philip M. Arnold:

A View of Renaissance Cryptography - a Book Review. 235-241
- Cipher A. Deavours:

Reflections on the "State of the Art". 242-245 - Louis Kruh:

Cryptology and the Law. 246-248 - Louis Kruh:

Cipher Equipment. 249 - Donald W. Davies:

Sir Percy Scott's Cypher. 250-252 - John M. DeLaurentis:

A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm. 253-259 - John M. Carroll:

The Resurrection of Multiple-Key Ciphers. 262-265 - G. R. Blakley:

Aaas Crypto Sessions Proceedings: Review. 266-269 - Greg E. Mellen:

Cryptanalysts' corner. 270-275 - Louis Kruh:

Cipher Equipment TST 3336 and TST 9761. 278-284 - Robert R. Jueneman:

Iacr Announces Bulletin Board Service. 285-286
Volume 8, Number 4, 1984
- Louis Kruh:

The Heraldry of Cryptology. 289-301 - Ole G. Landsverk:

Cryptography in Runic inscriptions. 302-319 - Greg E. Mellen:

Cryptanalysts' corner. 320-325 - Louis Kruh:

Cryptology and the Law. 326-331
- Ralph Erskine:

Alan Turing: the Enigma - Book Reviem. 332-336
- Solomon Kullback:

Looking Back. 337-342 - Rodney H. Cooper, Wayne Patterson:

A Generalization of the Knapsack Algorithm Using Galois Fields. 343-347 - Roland Anderson:

Finding Vowels in Simple Substitutions Ciphers by Computer. 348-359
- Cipher A. Deavours, Brian J. Winkel:

Cryptanalysis of Shift Stream Generated Stream Cipher Systems - Book Review. 360-363
- Louis Kruh:

There and There - Reviews and News. 364-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














