ebook img

Cryptologia 2005: Vol 29 Index PDF

2005·0.72 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Cryptologia 2005: Vol 29 Index

Index by Author C2¥PCOLOGiA INDEX BY AUTHOR CRYPTOLOGIA VOLUME 29 (2005) Christopher G. Andrews and Rodney H. Cooper The Public Key Covert Channel Craig Bauer and Suzanne E. Gladfelter Cryptology in York Pennsylvania Craig Bauer and Elliot J. Gottlieb Results of An Automated Attack on the Running Key Ciphers Hilmar-Detlef Briickner Germany’s First Crytanalysis on the Western Front: Decrypting British and French Naval Ciphers in World War I Rodney H. Cooper and Christopher G. Andrews The Public Key Covert Channel Robert Cordery and Leon Pintsov History and Role of Information Security in Postage Evidencing and Payment John F. Dooley Codes and Ciphers in Fiction: An Overview Suzanne E. Gladfelter and Craig Bauer Cryptology in York Pennsylvania Lee A. Gladwin The Diplomacy of Security: Behind the Negotiations of Article 18 of the Sino-American Cooperative Agreement Elliot J. Gottlieb and Craig Bauer Results of An Automated Attack on the Running Key Ciphers Peter Zilahy Ingerman Two Hebern Cryptographic Machines Philip H. Jacobsen Pearl Harbor: Radio Officer Leslie Grogan of the SS Lurline and his Misidentified Signals David Kahn The Man in the Iron Mask — Encore et Enfin, Cryptologically From the Archives: Codetalkers Not Wanted David Shulman Dies — The Bibliographer of Cryptology The Polish Enigma Conference and Some Excursions How Garbles Tickled History Subhash Kak and Navneet Mandhani Watermarking Using Decimal Sequences 381 cC3¥PTOLOGiA October 2005 Volume XXIX Number 4 Louis Kruh Reviews and Things Cryptologic Reviews and Things Cryptologic Unknown Military Coding Device — Can You Identify It? Reviews and Things Cryptologic Reviews and Things Cryptologic John Lawrence A Study of Rejewski’s Equations Factoring for the Plugboard — Was Rejewski’s Proposed Solution for Breaking the Enigma Feasible? Navneet Mandhani and Subhash Kak Watermarking Using Decimal Sequences Jeffrey Overby, William Traves, and Jerzy Wojdylo On the Keyspace of the Hill Cipher tichard Pekelny Excellent, Exceptional, Enormous Crypto Source Raphael C.-W. Phan How to Explain Block Cipher Cryptanalysis to Your Kids Leon Pintsov and Robert Cordery History and Role of Information Security in Postage Evidencing and Payment Cryptology in General Education kK. Rajalakshmi and B. Thilaka An Extension of Hill Cipher Using Generalised Inverses and m‘ Residue Modulo m Joseph E. Richard Letter to the Editor Charles F. Rocca Jr. Cryptology in General Education B. Thilaka and K. Rajalakshmi An Extension of Hill Cipher Using Generalised Inverses and m*® Residue Modulo m William Traves, Jeffrey Overby, and Jerzy Wojdylo On the Keyspace of the Hill Cipher Geoff Sullivan and Frode Weierud Breaking German Army Ciphers Frode Weierud and Geoff Sullivan Breaking German Army Ciphers Brian J. Winkel Letter from the Editor Jerzy Wojdylo, Jeffrey Overby, and William Traves On the Keyspace of the Hill Cipher Index by author - Volume 29 (2005)

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.