Preface | p. ix |
Cryptologic Personalities | |
Introduction | p. 1 |
Conversation with Marian Rejewski, Cryptologia, Vol. 6, No. 1, pp. 50-60 | p. 4 |
In Memoriam: Marian Rejewski, Cryptologia, Vol. 6, No. 1, pp. 19-25 | p. 15 |
In Memoriam: Georges-Jean Painvain, Cryptologia, Vol. 6, No. 2, pp. 120-127 | p. 22 |
The Day the Friedmans Had a Typo in Their Photo, Cryptologia, Vol. 3, No. 4, pp. 236-241 | p. 30 |
Interviews with Cryptologists, Cryptologia, Vol. 4, No. 2, pp. 65-70 | p. 36 |
The Noblest Cryptologist--Duke August, Cryptologia, Vol. 7, No. 3, pp. 193-217 | p. 42 |
History | |
Introduction | p. 67 |
The Significance of Codebreaking and Intelligence in Allied Strategy and Tactics, Cryptologia, Vol. 1, No. 3, pp. 209-222 | p. 68 |
Yardley's Seized Manuscript, Cryptologia, Vol. 6, No. 2, pp. 115-119 | p. 82 |
Abwehr Ciphers in Latin America, Cryptologia, Vol. 7, No. 2, pp. 132-144 | p. 87 |
GC and CS Mobilizes "Men of the Professor Type," Cryptologia, Vol. 10, No. 1, pp. 50-59 | p. 100 |
With the 849th SIS, 1942-45, Cryptologia, Vol. 11, No. 1, pp. 29-39 | p. 110 |
Some of My Wartime Experiences, Cryptologia, Vol. 11, No. 2, pp. 65-77 | p. 121 |
Who Was the Third Man at Pyry?, Cryptologia, Vol. 11, No. 2, pp. 78-80 | p. 134 |
Riverbank Publications on Cryptology, Cryptologia, Vol. 2, No. 4, pp. 324-330 | p. 137 |
Some Special War Work -- Part I, Cryptologia, Vol. 4, No. 4, pp. 193-203 | p. 144 |
Some Special War Work -- Part II, Cryptologia, Vol. 5, No. 1, pp. 33-39 | p. 155 |
The Shortsighted View of a Foresighted Admiral, Cryptologia, Vol. 11, No. 3, pp. 156-159 | p. 162 |
Stimson, The Black Chamber, and the "Gentlemen's Mail" Quote, Cryptologia, Vol. 12, No. 2, pp. 65-89 | p. 166 |
Analysis | |
Introduction | p. 191 |
Survey of Data Insecurity Packages, Cryptologia, Vol. 11, No. 1, pp. 1-15 | p. 195 |
Analysis of the Encryption Algorithm Used in the Word Perfect Word Processing Program, Cryptologia, Vol. 11, No. 4, pp. 206-210 | p. 210 |
Finding Vowels in Simple-Substitution Ciphers by Computer, Cryptologia, Vol. 8, No. 4, pp. 348-358 | p. 215 |
Improving the Machine Recognition of Vowels, Cryptologia, Vol. 10, No. 1, pp. 10-22 | p. 226 |
An Empirical Method for Finding the Keylength of Periodic Ciphers, Cryptologia, Vol. 12, No. 4, pp. 220-224 | p. 239 |
Foiling the Known-Plaintext Attack, Cryptologia, Vol. 10, No. 4, pp. 217-222 | p. 244 |
Using Binary Derivatives to Test an Enhancement of DES, Cryptologia, Vol. 12, No. 4, pp. 193-208 | p. 250 |
Language Redundancy and the Unicity Point, Cryptologia, Vol. 7, No. 1, pp. 37-48 | p. 266 |
Automated Cryptanalysis of Polyalphabetic Ciphers, Cryptologia, Vol. 11, No. 4, pp. 193-206 | p. 278 |
Cryptographic Machines | |
Introduction | p. 291 |
The Mystery of Colonel Decius Wadsworth's Cipher Device, Cryptologia, Vol. 6, No. 3, pp. 238-247 | p. 294 |
How to Use the German Enigma Cipher Machine, Cryptologia, Vol. 7, No. 4, pp. 291-296 | p. 304 |
Mathematical Solution of Enigma Cipher, Cryptologia, Vol. 6, No. 1, pp. 1-18 | p. 310 |
A Solution of the Hebern Machine, Cryptologia, Vol. 12, No. 3, pp. 144-158 | p. 328 |
Naval Enigma: M4 and Its Rotors, Cryptologia, Vol. 11, No. 4, pp. 235-244 | p. 343 |
Cipher Equipment, Cryptologia, Vol. 1, No. 2, pp. 143-149 | p. 353 |
A22 Cryptograph, Cryptologia, Vol. 5, No. 3, pp. 175-183 | p. 360 |
Sidney Hole's Cryptographic Machine, Cryptologia, Vol. 8, No. 2, pp. 115-125 | p. 369 |
The Mysterious Autocryptograph, Cryptologia, Vol. 8, No. 1, pp. 78-92 | p. 380 |
Ciphers -- Historical and Challenging | |
Introduction | p. 395 |
Fraternal Cryptography: Cryptographic Practices of American Fraternal Organizations, Cryptologia, Vol. 7, No. 1, pp. 27-36 | p. 400 |
A Message in Cipher Written by General Cornwallis During the Revolutionary War, Cryptologia, Vol. 1, No. 4, pp. 392-395. | p. 410 |
James Lovell and Secret Ciphers During the Revolutionary War, Cryptologia, Vol. 2, No. 1, pp. 75-88 | p. 414 |
German Spy Cryptograms, Cryptologia, Vol. 5, No. 2, pp. 65-66 | p. 428 |
The Earliest Use of Dot Cipher, Cryptologia, Vol. 1, No. 3, pp. 261-274 | p. 430 |
An Apology for Jacopo Silvestri, Cryptologia, Vol. 4, No. 2, pp. 96-103 | p. 444 |
The Churchyard Ciphers, Cryptologia, Vol. 1, No. 4, pp. 372-375 | p. 452 |
The Code-O-Graph Cipher Disks, Cryptologia, Vol. 5, No. 2, pp. 78-83. | p. 456 |
A Child's Garden of Cryptography, Cryptologia, Vol. 6, No. 4, pp. 368-377 | p. 462 |
Poe Challenge Cipher Finally Broken, Cryptologia, Vol. 1, No. 1, pp. 93-96 | p. 472 |
The Unsolved d'Agapeyeff Cipher, Cryptologia, Vol. 2, No. 2, pp. 144-147 | p. 476 |
Opportunities for the Amateur Cryptanalyst Can Be Anywhere, Cryptologia, Vol. 4, No. 3, pp. 169-172 | p. 480 |
How Did TJB Encode B2?, Cryptologia, Vol. 3, No. 1, pp. 9-15 | p. 484 |
The Beale Cypher: A Dissenting Opinion, Cryptologia, Vol. 4, No. 2, pp. 116-119 | p. 491 |
A Basic Probe of the Beale Cipher as a Bamboozlement -- Part I, Cryptologia, Vol. 6, No. 4, pp. 378-382 | p. 495 |
A Basic Probe of the Beale Cipher as a Bamboozlement -- Part II, Cryptologia, Vol. 12, No. 4, pp. 241-246 | p. 500 |
The Editors | p. 507 |
Table of Contents provided by Syndetics. All Rights Reserved. |