Table of contents for issues of Cryptologia

Last update: Tue Sep 5 10:43:37 MDT 2023                Valid HTML 3.2!

Volume 1, Number 1, January, 1977
Volume 1, Number 2, April, 1977
Volume 1, Number 3, July, 1977
Volume 1, Number 4, October, 1977
Volume 2, Number 1, January, 1978
Volume 2, Number 2, April, 1978
Volume 2, Number 3, July, 1978
Volume 2, Number 4, October, 1978
Volume 3, Number 1, January, 1979
Volume 3, Number 2, April, 1979
Volume 3, Number 3, July, 1979
Volume 3, Number 4, October, 1979
Volume 4, Number ??, 1980
Volume 4, Number 1, January, 1980
Volume 4, Number 2, April, 1980
Volume 4, Number 3, July, 1980
Volume 4, Number 4, October, 1980
Volume 5, Number 1, January, 1981
Volume 5, Number 2, April, 1981
Volume 5, Number 3, July, 1981
Volume 5, Number 4, October, 1981
Volume 6, Number 1, January, 1982
Volume 6, Number 2, April, 1982
Volume 6, Number 3, July, 1982
Volume 6, Number 4, October, 1982
Volume 7, Number 1, January, 1983
Volume 7, Number 2, April, 1983
Volume 7, Number 3, July, 1983
Volume 7, Number 4, October, 1983
Volume 8, Number ??, 1984
Volume 8, Number 1, January, 1984
Volume 8, Number 2, April, 1984
Volume 8, Number 3, July, 1984
Volume 8, Number 4, October, 1984
Volume 9, Number 1, January, 1985
Volume 9, Number 2, April, 1985
Volume 9, Number 3, June, 1985
Volume 9, Number 4, October, 1985
Volume 10, Number 1, January, 1986
Volume 10, Number 2, April, 1986
Volume 10, Number 3, July, 1986
Volume 10, Number 4, October, 1986
Volume 11, Number 1, January, 1987
Volume 11, Number 2, April, 1987
Volume 11, Number 3, July, 1987
Volume 11, Number 4, October, 1987
Volume 12, Number ??, 1988
Volume 12, Number 1, January, 1988
Volume 12, Number 2, April, 1988
Volume 12, Number 3, July, 1988
Volume 12, Number 4, October, 1988
Volume 13, Number 1, January, 1989
Volume 13, Number 2, April, 1989
Volume 13, Number 3, July, 1989
Volume 13, Number 4, October, 1989
Volume 14, Number 1, January, 1990
Volume 14, Number 2, April, 1990
Volume 14, Number 3, July, 1990
Volume 14, Number 4, October, 1990
Volume 15, Number 1, January, 1991
Volume 15, Number 2, April, 1991
Volume 15, Number 3, July, 1991
Volume 15, Number 4, October, 1991
Volume 16, Number 1, January, 1992
Volume 16, Number 2, April, 1992
Volume 16, Number 3, July, 1992
Volume 16, Number 4, October, 1992
Volume 17, Number 1, January, 1993
Volume 17, Number 2, April, 1993
Volume 17, Number 3, July, 1993
Volume 17, Number 4, October, 1993
Volume 18, Number 1, January, 1994
Volume 18, Number 2, April, 1994
Volume 18, Number 3, July, 1994
Volume 18, Number 4, October, 1994
Volume 19, Number 1, January, 1995
Volume 19, Number 2, 1995
Volume 19, Number 3, 1995
Volume 19, Number 4, 1995
Volume 20, Number 1, 1996
Volume 20, Number 2, 1996
Volume 20, Number 3, 1996
Volume 20, Number 4, 1996
Volume 21, Number 1, 1997
Volume 21, Number 2, 1997
Volume 21, Number 3, 1997
Volume 21, Number 4, 1997
Volume 22, Number 1, 1998
Volume 22, Number 2, 1998
Volume 22, Number 3, 1998
Volume 22, Number 4, 1998
Volume 23, Number 1, 1999
Volume 23, Number 2, 1999
Volume 23, Number 3, 1999
Volume 23, Number 4, 1999
Volume 24, Number 1, 2000
Volume 24, Number 2, 2000
Volume 24, Number 3, 2000
Volume 24, Number 4, 2000
Volume 25, Number 1, 2001
Volume 25, Number 2, 2001
Volume 25, Number 3, 2001
Volume 25, Number 4, 2001
Volume 26, Number 1, 2002
Volume 26, Number 2, 2002
Volume 26, Number 3, 2002
Volume 26, Number 4, 2002
Volume 27, Number 1, 2003
Volume 27, Number 2, 2003
Volume 27, Number 3, 2003
Volume 27, Number 4, 2003
Volume 28, Number 1, January, 2004
Volume 28, Number 2, April, 2004
Volume 28, Number 3, July, 2004
Volume 28, Number 4, October, 2004
Volume 29, Number 1, January, 2005
Volume 29, Number 2, April, 2005
Volume 29, Number 3, July, 2005
Volume 29, Number 4, October, 2005
Volume 30, Number 1, January, 2006
Volume 30, Number 2, April, 2006
Volume 30, Number 3, July, 2006
Volume 30, Number 4, October, 2006
Volume 31, Number 1, January, 2007
Volume 31, Number 2, April, 2007
Volume 31, Number 3, July, 2007
Volume 31, Number 4, October, 2007
Volume 32, Number 1, January, 2008
Volume 32, Number 2, 2008
Volume 32, Number 3, 2008
Volume 32, Number 4, 2008
Volume 33, Number 1, 2009
Volume 33, Number 2, 2009
Volume 33, Number 3, 2009
Volume 33, Number 4, 2009
Volume 34, Number 1, 2010
Volume 34, Number 2, 2010
Volume 34, Number 3, 2010
Volume 34, Number 4, 2010
Volume 35, Number 1, 2011
Volume 35, Number 2, 2011
Volume 35, Number 3, 2011
Volume 35, Number 4, 2011
Volume 36, Number 1, 2012
Volume 36, Number 2, 2012
Volume 36, Number 3, 2012
Volume 36, Number 4, 2012
Volume 37, Number 1, 2013
Volume 37, Number 2, 2013
Volume 37, Number 3, 2013
Volume 37, Number 4, 2013
Volume 38, Number 1, 2014
Volume 38, Number 2, 2014
Volume 38, Number 3, 2014
Volume 38, Number 4, 2014
Volume 39, Number 1, 2015
Volume 39, Number 2, 2015
Volume 39, Number 3, 2015
Volume 39, Number 4, 2015
Volume 40, Number 1, 2016
Volume 40, Number 2, 2016
Volume 40, Number 3, 2016
Volume 40, Number 4, 2016
Volume 40, Number 5, 2016
Volume 40, Number 6, 2016
Volume 41, Number 1, 2017
Volume 41, Number 2, 2017
Volume 41, Number 3, 2017
Volume 41, Number 4, 2017
Volume 41, Number 5, 2017
Volume 41, Number 6, 2017
Volume 42, Number 1, 2018
Volume 42, Number 2, 2018
Volume 42, Number 3, 2018
Volume 42, Number 4, 2018
Volume 42, Number 5, 2018
Volume 42, Number 6, 2018
Volume 43, Number 1, 2019
Volume 43, Number 2, 2019
Volume 43, Number 3, 2019
Volume 43, Number 4, 2019
Volume 43, Number 5, 2019
Volume 43, Number 6, 2019
Volume 44, Number 1, 2020
Volume 44, Number 2, 2020
Volume 44, Number 3, 2020
Volume 44, Number 4, 2020
Volume 44, Number 5, 2020
Volume 44, Number 6, 2020
Volume 45, Number 1, 2021
Volume 45, Number 2, 2021
Volume 45, Number 3, 2021
Volume 45, Number 4, 2021
Volume 45, Number 5, 2021
Volume 45, Number 6, 2021
Volume 46, Number 1, 2022
Volume 46, Number 2, 2022
Volume 46, Number 3, 2022
Volume 46, Number 4, 2022
Volume 46, Number 5, 2022
Volume 46, Number 6, 2022
Volume 47, Number 1, 2023
Volume 47, Number 2, 2023
Volume 47, Number 3, 2023
Volume 47, Number 4, 2023
Volume 47, Number 5, 2023
Volume 14, Number 3, 1999
Volume 21, Number 4, October / December, 1999
Volume 48, Number 6, 2001
Papers beginning 2003


Cryptologia
Volume 1, Number 1, January, 1977

                Brian J. Winkel   Why Cryptologia? . . . . . . . . . . . . 1--3
             Greg E. Mellen and   
                Lloyd Greenwood   The Cryptology of Multiplex System: Part
                                  I: Simulation and Cryptanalysis  . . . . 4--16
                 Barbara Harris   A Different Kind of Column . . . . . . . 17--19
                 James A. Reeds   ``Cracking'' a Random Number Generator   20--26
                     David Kahn   The Biggest Bibliography . . . . . . . . 27--42
                  David Shulman   A Reply to Kahn's Review . . . . . . . . 43--45
             Cipher A. Deavours   Unicity Points in Cryptanalysis  . . . . 46--68
                     Louis Kruh   Cipher Equipment: Cipher Disks . . . . . 69--75
                Jack Levine and   
                Joel V. Brawley   Some Cryptographic Applications of
                                  Permutation Polynomials  . . . . . . . . 76--92
                Brian J. Winkel   Poe Challenge Cipher Finally Broken  . . 93--96
                      Anonymous   Biographies of Contributory  . . . . . . 97--99

Cryptologia
Volume 1, Number 2, April, 1977

                Blanchard Hiatt   Age of Decipherment  . . . . . . . . . . 101--105
                Blanchard Hiatt   ``Count Forward Three Score and Ten
                                  \ldots'' . . . . . . . . . . . . . . . . 106--115
                Bruce R. Schatz   Automated Analysis of Cryptogram Cipher
                                  Equipment  . . . . . . . . . . . . . . . 116--142
                     Louis Kruh   Cipher Equipment: Converter M-325(T) . . 143--149
             Greg E. Mellen and   
                Lloyd Greenwood   The Cryptology of Multiplex System: Part
                                  II . . . . . . . . . . . . . . . . . . . 150--165
                     David Kahn   ``Get Out Your Secret Decoders, Boys and
                                  Girls \ldots'' . . . . . . . . . . . . . 166--166
             Cipher A. Deavours   Analysis of the Hebern Cryptograph Using
                                  Isomorphs  . . . . . . . . . . . . . . . 167--185
                 James A. Reeds   Rotor Algebra  . . . . . . . . . . . . . 186--194
                  Walter Penney   Grille Reconstruction  . . . . . . . . . 195--201
                      Anonymous   Biographies of Contributors  . . . . . . 202--204

Cryptologia
Volume 1, Number 3, July, 1977

                     David Kahn   The Significance of Codebreaking and
                                  Intelligence in Allied Strategy and
                                  Tactics  . . . . . . . . . . . . . . . . 209--222
             Cipher A. Deavours   The Kappa Test . . . . . . . . . . . . . 223--231
                Brian J. Winkel   Word Ways, a Journal Worth Going Your
                                  Way  . . . . . . . . . . . . . . . . . . 232--234
                 James A. Reeds   Entropy Calculations and Particular
                                  Methods of Cryptanalysis . . . . . . . . 235--254
                     Louis Kruh   Cipher Equipment: Hagelin Pocket
                                  Cryptographer, Type CD-57  . . . . . . . 255--260
             Albert C. Leighton   The Earliest Use of a Dot Cipher . . . . 261--274
            Royal Canadian Mint   DPEPE DPJO: a Canadian Coin Piece With a
                                  Message  . . . . . . . . . . . . . . . . 275--277
             Cipher A. Deavours   Kullback's ``Statistical Methods in
                                  Cryptanalysis'', a Book Review . . . . . 278--280
              Robert Morris and   
          Neil J. A. Sloane and   
                 Aaron D. Wyner   Assessment of the National Bureau of
                                  Standards Proposed Federal Data
                                  Encryption Standard  . . . . . . . . . . 281--291
   National Bureau of Standards   Proposed Federal Information Processing
                                  Data Encryption Standard . . . . . . . . 292--306
                      Anonymous   Biographies of Contributors  . . . . . . 307--308
                Brian J. Winkel   Epilogue . . . . . . . . . . . . . . . . 309--309

Cryptologia
Volume 1, Number 4, October, 1977

             Cipher A. Deavours   The Ithaca Connection: Computer
                                  Cryptography in the Making --- a Special
                                  Report . . . . . . . . . . . . . . . . . 312--317
                Brian J. Winkel   Poe Challenge Cipher Solutions . . . . . 318--325
                 A. Ross Eckler   A Rapid Yes--No Computer-Aided
                                  Communicator . . . . . . . . . . . . . . 326--333
                     Louis Kruh   Cipher Equipment: MA4210 Alphanumeric
                                  Pocket Cipher  . . . . . . . . . . . . . 334--336
                     David Kahn   Ecclesiastical Cryptography --- a Review 337--337
            Joel V. Brawley and   
                    Jack Levine   Equivalence of Vigen\`ere Systems  . . . 338--361
                 D. C. B. Marsh   Courses in Cryptology --- Cryptography
                                  at the Colorado School of Mines  . . . . 362--363
              David W. Straight   Courses in Cryptology --- Cryptanalysis
                                  and Data Security Course at the
                                  University of Tennessee  . . . . . . . . 363--365
              Herbert S. Bright   Cryptanalytic Attack and Defense:
                                  Cipher-Text Only, Known-Plaintext,
                                  Chosen-Plaintext . . . . . . . . . . . . 366--370
                     David Kahn   Reports From the Reich . . . . . . . . . 371--371
                     Louis Kruh   The Churchyard Ciphers . . . . . . . . . 372--375
         Harold Joseph Highland   CENSORED: a Simulation Exercise  . . . . 376--377
                     David Kahn   German Military Eavesdroppers  . . . . . 378--380
         Cipher A. Deavours and   
                 James A. Reeds   The Enigma: Part I: Historical
                                  Perspectives . . . . . . . . . . . . . . 381--391
                Brian J. Winkel   Solution . . . . . . . . . . . . . . . . 391--391
                Peter P. Fagone   A Message in Cipher Written by General
                                  Cornwallis During the Revolutionary War  392--395
                Brian J. Winkel   There and There --- a Department . . . . 396--405
                        Unknown   They Should Be Paranoid  . . . . . . . . 400--401
        Gustavus J. Simmons and   
              Michael J. Norris   Preliminary Comments on the M.I.T.
                                  Public-Key Cryptosystem  . . . . . . . . 406--414
                      Anonymous   Biographies of Contributors  . . . . . . 415--417
                        Unknown   Letter from the Editor . . . . . . . . . ??


Cryptologia
Volume 2, Number 1, January, 1978

                Wayne G. Barker   Solving a Hagelin, Type CD-57, Cipher    1--8
                   David Wilson   Courses in Cryptology --- Cryptanalysis
                                  Course Down Under  . . . . . . . . . . . 9--11
                     David Kahn   The Forschungsamt: Nazi Germany's Most
                                  Secret Communications Intelligence
                                  Agency . . . . . . . . . . . . . . . . . 12--19
                  Hans Rohrbach   Mathematical and Mechanical Methods in
                                  Cryptography. I  . . . . . . . . . . . . 20--37
                     Louis Kruh   The Inventions of William F. Friedman    38--61
               Ronald L. Rivest   Remarks on a Proposed Cryptanalytic
                                  Attack on the M.I.T. Public-Key
                                  Cryptosystem . . . . . . . . . . . . . . 62--65
             Cipher A. Deavours   A Book Review: \booktitleCryptanalysis
                                  of the Hagelin Cryptograph, by Wayne G.
                                  Barker . . . . . . . . . . . . . . . . . 66--67
                 H. Gary Knight   Cryptanalyst's Corner  . . . . . . . . . 68--74
                 Ralph E. Weber   James Lovell and Secret Ciphers During
                                  the American Revolution  . . . . . . . . 75--88
                Brian J. Winkel   There and There --- a Department . . . . 89--94
                      Anonymous   Biographies of Contributors  . . . . . . 95--96

Cryptologia
Volume 2, Number 2, April, 1978

                  Hans Rohrbach   Mathematical and Mechanical Methods in
                                  Cryptography. II . . . . . . . . . . . . 101--121
                     David Kahn   Friedman's Life: a Book Review . . . . . 122--123
                 H. Gary Knight   Cryptanalyst's Corner  . . . . . . . . . 124--129
                     Louis Kruh   Who Wrote ``The American Black
                                  Chamber''? . . . . . . . . . . . . . . . 130--133
             Cipher A. Deavours   Courses in Cryptology --- Cryptology at
                                  Kean College . . . . . . . . . . . . . . 134--138
                     David Kahn   Nuggets from the Archives: Yardley Tries
                                  Again  . . . . . . . . . . . . . . . . . 139--143
                Wayne G. Barker   The Unsolved D'Agapeyeff Cipher  . . . . 144--147
                 David Straight   ``Modern Methods for Computer Security
                                  and Privacy'': a Book Review . . . . . . 148--150
                 David Straight   ``An Outline of Computer Security'': a
                                  Book Review  . . . . . . . . . . . . . . 148--150
                     David Kahn   ``Pictures Galore'': a Book Review . . . 151--151
                    Frank Rubin   Computer Methods for Decrypting
                                  Multiplex Ciphers  . . . . . . . . . . . 152--160
                Brian J. Winkel   Casanova and the Beaufort Cipher . . . . 161--163
                     Louis Kruh   Cryptology as a Career . . . . . . . . . 164--167
                      Anonymous   Encryption Challenge . . . . . . . . . . 168--171
                 Names Withheld   Encryption Challenge . . . . . . . . . . 168--171
                     Louis Kruh   Cipher Equipment: DH-26 Handheld
                                  Encryption Unit  . . . . . . . . . . . . 172--177
                Brian J. Winkel   A Tribute to Alf Monge . . . . . . . . . 178--185
                Brian J. Winkel   There and There --- a Department . . . . 186--194
                      Anonymous   Biographies of Contributors  . . . . . . 195--197
                        Unknown   ``Codes and Ciphers'' --- a Book Review  ??
                        Unknown   ``The Man Who Broke Purple'' --- a Book
                                  Review . . . . . . . . . . . . . . . . . ??

Cryptologia
Volume 2, Number 3, July, 1978

                J. Rives Childs   My Recollections of G.2 A.6  . . . . . . 201--214
                    Frank Rubin   Computer Methods for Decrypting Random
                                  Stream Ciphers . . . . . . . . . . . . . 215--231
               Philip M. Arnold   A Forgotten Book on Ciphers  . . . . . . 232--235
               Caxton C. Foster   Courses in Cryptology --- Cryptanalysis
                                  and Computers  . . . . . . . . . . . . . 236--237
                 H. Gary Knight   Cryptanalysts' Corner  . . . . . . . . . 238--241
                     Louis Kruh   A Catalog of Historical Interest . . . . 242--253
                Brian J. Winkel   Astle Cipher Solved  . . . . . . . . . . 254--256
                     David Kahn   A Famous Variation --- a Book Review . . 257--257
                     David Kahn   Reveling in Deception --- a Book Review  258--259
           Richard Heitzenrater   Decoding Wesley's Diaries  . . . . . . . 260--264
                     David Kahn   Short Notices --- Reviews  . . . . . . . 265--266
                  Robert Morris   The Hagelin Cipher Machine (M-209):
                                  Reconstruction of the Internal Settings  267--289
                     Louis Kruh   Capsule Reviews for Crypto Buffs . . . . 290--292
                Brian J. Winkel   There and There --- a Department . . . . 293--298
                      Anonymous   Biographies of Contributors  . . . . . . 299--300

Cryptologia
Volume 2, Number 4, October, 1978

                Bob Blakley and   
                  G. R. Blakley   Security of number-theoretic public key
                                  cryptosystems against random attack. I   305--321
                     Louis Kruh   What the Nazis Were Doing  . . . . . . . 322--323
               Howard T. Oakley   The Riverbank Publications on Cryptology 324--330
                     David Kahn   Extraordinary Codebreakers, Outstanding
                                  Family: a Review . . . . . . . . . . . . 331--333
                     Louis Kruh   A Nineteenth Century Challenge Cipher    334--334
                 H. Gary Knight   Cryptanalysts' Corner  . . . . . . . . . 335--337
                     Louis Kruh   A Catalog of Historical Interest ---
                                  Part II  . . . . . . . . . . . . . . . . 338--349
             Nicholas P. Callas   An Application of Computers to
                                  Cryptology . . . . . . . . . . . . . . . 350--364
                     David Kahn   One of the Worst --- a Book Review . . . 365--365
                     Louis Kruh   Rent a Code  . . . . . . . . . . . . . . 366--367
                Brian J. Winkel   ``Action Line'' Challenge  . . . . . . . 368--370
                  Paul Kinnucan   Data Encryption Gurus: Tuchman and Meyer 371--381
                Brian J. Winkel   There and There --- a Department . . . . 382--393
                      Anonymous   Biographies of Contributors  . . . . . . 394--395


Cryptologia
Volume 3, Number 1, January, 1979

                     David Kahn   The Ultra Conference . . . . . . . . . . 1--8
                    Carl Hammer   How Did TJB Encode B2? . . . . . . . . . 9--15
                  Hans Rohrbach   Report on the Decipherment of the
                                  American Strip Cipher O-2 by the German
                                  Foreign Office . . . . . . . . . . . . . 16--26
                Boshra H. Makar   Cryptology at St. Peter's College  . . . 27--28
                Bob Blakley and   
                  G. R. Blakley   Security of number theoretic public key
                                  cryptosystems against random attack. II  29--42
                  James R. Ford   The HP-67/97 Cryptograph . . . . . . . . 43--50
                     Louis Kruh   A Xerograph of a Classic . . . . . . . . 50--50
          A. O. Sulzberger, Jr.   Papers Disclose Allies' Edge in Knowing
                                  German Codes . . . . . . . . . . . . . . 51--53
                Brian J. Winkel   Studies on Cryptology  . . . . . . . . . 52--53
                  David Shulman   A Sherlockian Cryptogram . . . . . . . . 54--56
                Brian J. Winkel   There and There  . . . . . . . . . . . . 57--62
                      Anonymous   Biographies of Contributors  . . . . . . 63--64

Cryptologia
Volume 3, Number 2, April, 1979

                     I. J. Good   Early work on computers at Bletchley
                                  Park . . . . . . . . . . . . . . . . . . 65--77
                     Louis Kruh   Devices and Machines: The Hagelin
                                  Cryptographer, Type C-52 . . . . . . . . 78--82
                 James A. Reeds   Solution of Challenge Cipher . . . . . . 83--95
                     David Kahn   ``American Codes'': a Book Review  . . . 96--99
                  David Shulman   The Macbeth Test Message . . . . . . . . 100--104
                Bob Blakley and   
                  G. R. Blakley   Security of number theoretic public key
                                  cryptosystems against random attack. III 105--118
                     David Kahn   A German Consular Cipher . . . . . . . . 119--119
                   David Wilson   Littlewood's Cipher: Part I: a Challenge 120--121
                Bradford Hardie   Book Review: Ultra Goes to War . . . . . 122--126
                      Anonymous   Biographies of Contributors  . . . . . . 127--128

Cryptologia
Volume 3, Number 3, July, 1979

                 Bobby R. Inman   The NSA Perspective on
                                  Telecommunications Protection in the
                                  Nongovernmental Sector . . . . . . . . . 129--135
                    Greg Mellen   J. F. Byrne and the Chaocipher: Work in
                                  Progress . . . . . . . . . . . . . . . . 136--154
                    Frank Rubin   Solving a Cipher Based on Multiple
                                  Random Number Streams  . . . . . . . . . 155--157
                     David Kahn   The Futility of It All . . . . . . . . . 158--165
                     Louis Kruh   The Deadly Double Advertisements: Pearl
                                  Harbor Warning or Coincidence  . . . . . 166--171
                   David Wilson   Littlewood's Cipher: Part II: a Method
                                  of Solution  . . . . . . . . . . . . . . 172--176
                Jack Levine and   
                 Michael Willet   The Two-Message Problem in Cipher Text
                                  Autokey. Part I  . . . . . . . . . . . . 177--186
                   Gideon Yuval   How to Swindle Rabin . . . . . . . . . . 187--189
                     David Kahn   Classic Revive ??: a Review  . . . . . . 190--191
                      Anonymous   The Second Beale Cipher Symposium ---
                                  Call for Papers  . . . . . . . . . . . . 191--191
                      Anonymous   Biographies of Contributors  . . . . . . 192--192
                     David Kahn   The Significance of Codebreaking and
                                  Intelligence in Allied Strategy and
                                  Tactics  . . . . . . . . . . . . . . . . 209--222
                 C. A. Deavours   The Kappa Test . . . . . . . . . . . . . 223--231
                Brian J. Winkel   Word Ways, a Journal Worth Going Your
                                  Way  . . . . . . . . . . . . . . . . . . 232--234
                    James Reeds   Entropy Calculations and Particular
                                  Methods of Cryptanalysis . . . . . . . . 235--254
                     Louis Kruh   Cipher Equipment . . . . . . . . . . . . 255--260
             Albert C. Leighton   ``The Earliest Use of a Dot Cipher'' . . 261--274
            Royal Canadian Mint   DPEPE DPJO: a Canadian Coin Piece With a
                                  Message  . . . . . . . . . . . . . . . . 275--277
                 C. A. Deavours   Kullback's ``Statistical Methods in
                                  Cryptanalysis'' --- Book Review  . . . . 278--280
              Robert Morris and   
            N. J. A. Sloane and   
                    A. D. Wyner   Assessment of the National Bureau of
                                  Standards Proposed Federal Data
                                  Encryption Standard  . . . . . . . . . . 281--291
                      Anonymous   Proposed Federal Information Processing
                                  Data Encryption Standard . . . . . . . . 292--306
                      Anonymous   Biographies of Contributors  . . . . . . 307--308

Cryptologia
Volume 3, Number 4, October, 1979

                      Eric Sams   Musical Cryptography . . . . . . . . . . 193--201
                    Frank Rubin   Cryptographic Aspects of Data
                                  Compression Codes  . . . . . . . . . . . 202--205
                     Louis Kruh   CP-III: One Time Cypher Pad Manual
                                  Encryption Device  . . . . . . . . . . . 206--209
                     David Kahn   The Geheimschreiber  . . . . . . . . . . 210--214
                        Unknown   Interrogation on German secret
                                  teletypewriters  . . . . . . . . . . . . 211--214
               Philip M. Arnold   Ciphers for the Educated Man . . . . . . 215--216
                     Louis Kruh   Short Notices  . . . . . . . . . . . . . 217--219
                Jack Levine and   
                 Michael Willet   The Two-Message Problem in Cipher Text
                                  Autokey. Part II . . . . . . . . . . . . 220--231
                      Anonymous   A Musical Cipher . . . . . . . . . . . . 232--232
                 Elliot Fischer   Language Redundancy and Cryptanalysis    233--235
                     Louis Kruh   The Day the Friedmans Had a Typo in
                                  Their Photo  . . . . . . . . . . . . . . 236--241
                 H. Gary Knight   Cryptanalysts' Corner  . . . . . . . . . 242--242
               Philip M. Arnold   A German Code Book . . . . . . . . . . . 243--245
                Bradford Hardie   A Theory of Cryptography . . . . . . . . 246--247
                Brian J. Winkel   There and There  . . . . . . . . . . . . 248--251
                      Anonymous   Biographies of Contributors  . . . . . . 252--253


Cryptologia
Volume 4, Number ??, 1980

                   S. C. Lu and   
                      L. N. Lee   A Simple and Effective Public-Key
                                  Cryptosystem . . . . . . . . . . . . . . ??
                 Arthur Schuetz   Secret Service Unmasked  . . . . . . . . ??

Cryptologia
Volume 4, Number 1, January, 1980

                Peter P. Fagone   The Solution of a Cromwellian Era Spy
                                  Message (Circa 1648) . . . . . . . . . . 1--4
                     Louis Kruh   Cipher Devices: The Cryptomatic HC-520   5--14
              Solomon W. Golomb   Cryptographic Reflections on the Genetic
                                  Code . . . . . . . . . . . . . . . . . . 15--19
                Michael Richter   A Note on Public-Key Cryptosystems . . . 20--22
                     David Kahn   ``Deciphered Texts'': a Book Review  . . 22--22
                     Louis Kruh   Memories of Friedman . . . . . . . . . . 23--26
                 H. Gary Knight   Cryptanalysts' Corner  . . . . . . . . . 27--29
               Ronald L. Rivest   ``Forwards and Backwards'' Encryption    30--33
                     Louis Kruh   Ciphering System for a 19th Century
                                  Challenge Cipher . . . . . . . . . . . . 34--35
                     David Kahn   Problems of the Unbreakable Cipher . . . 36--40
                  David Shulman   Another Solution to the Sherlockian
                                  Cryptogram . . . . . . . . . . . . . . . 41--41
                     David Kahn   The Market for Encryption  . . . . . . . 42--44
                  James R. Ford   The HP-67/97 Cryptograph . . . . . . . . 43--49
                     Louis Kruh   Reminiscences of a Master Cryptologist   45--50
                 A. Ross Eckler   Some Comments on the Use of the HP 67/97
                                  as a Cryptograph . . . . . . . . . . . . 51--53
                Brian J. Winkel   There and There  . . . . . . . . . . . . 54--61
                      Anonymous   Biographies of Contributors  . . . . . . 62--63

Cryptologia
Volume 4, Number 2, April, 1980

                     David Kahn   Interviews With Cryptologists  . . . . . 65--70
                Jack Levine and   
              Robert E. Hartwig   Applications of the Drazin inverse to
                                  the Hill cryptographic system. Part I    71--85
                  David Shulman   A Curious Cryptic Composition  . . . . . 86--88
            Richard Outerbridge   Some Cryptographic and Computing
                                  Applications of the Toshiba LC-836MN
                                  Memo Note 30 Pocket Calculator . . . . . 89--94
                      Anonymous   Ready-Made Love Letters  . . . . . . . . 95--95
               Philip M. Arnold   An apology for Jacopo Silvestri  . . . . 96--103
               Francis A. Raven   ``Memories of the Pacific'': Book
                                  Reviews  . . . . . . . . . . . . . . . . 104--108
               Rajendra S. Wall   Decryption of Simple Substitution
                                  Cyphers With Word Divisions Using a
                                  Content Addressable Memory . . . . . . . 109--115
              James J. Gillogly   The Beale Cypher: a Dissenting Opinion   116--119
                     David Kahn   Nuggets from the Archives: a Null Code
                                  at the White House . . . . . . . . . . . 120--121
                      Anonymous   Solutions  . . . . . . . . . . . . . . . 122--122
                Brian J. Winkel   Solution to Cryptanalysts' Corner Scotch
                                  Homophonic . . . . . . . . . . . . . . . 122--122
                Brian J. Winkel   There and There  . . . . . . . . . . . . 123--126
                      Anonymous   Biographies of Contributors  . . . . . . 127--128
                     Louis Kruh   Cipher Devices: TRS-80 Data Privacy
                                  System . . . . . . . . . . . . . . . . . 181--183

Cryptologia
Volume 4, Number 3, July, 1980

             Cipher A. Deavours   The Black Chamber: a column. How the
                                  British broke Enigma . . . . . . . . . . 129--132
              Herbert S. Bright   High-Speed Indirect Cryption . . . . . . 133--139
             Donald S. Pady and   
                 Laura S. Kline   Finger counting and the identification
                                  of James VI's secret agents  . . . . . . 140--149
                Jack Levine and   
              Robert E. Hartwig   Applications of the Drazin Inverse to
                                  the Hill Cryptographic System. Part II   150--168
                Wayne G. Barker   Opportunities for the Amateur
                                  Cryptanalyst Can Be Anywhere . . . . . . 169--172
                     Louis Kruh   ``The Work of a Diplomat'': a Book
                                  Review . . . . . . . . . . . . . . . . . 172--172
                     David Kahn   Spy Ciphers: a Book Review . . . . . . . 173--176
                 H. Gary Knight   Cryptanalysts' Corner  . . . . . . . . . 177--180
                     Louis Kruh   Cipher Devices: a Column Cryptext TRS-80
                                  Data Privacy System  . . . . . . . . . . 181--183
                   R. H. Cooper   Linear transformations in Galois fields
                                  and their application to cryptography    184--188
                      Anonymous   Biographies of Contributors  . . . . . . 189--190

Cryptologia
Volume 4, Number 4, October, 1980

               Sir Alfred Ewing   Some Special War Work: Part I  . . . . . 193--203
                M. J. Kochanski   Remarks on Lu and Lee's proposals for a
                                  public-key cryptosystem  . . . . . . . . 204--207
                 H. Gary Knight   Cryptanalysts' Corner  . . . . . . . . . 208--212
                     Jim Nelson   The Development of Commercial
                                  Cryptosystem Standards . . . . . . . . . 213--224
                     Louis Kruh   Cipher Equipment: TST-1221 . . . . . . . 225--229
                Boshra H. Makar   Transfinite Cryptography . . . . . . . . 230--237
                     Louis Kruh   ``Pearl Harbor Revisited'': a Book
                                  Review . . . . . . . . . . . . . . . . . 237--237
                     David Kahn   A Professional's Challenge . . . . . . . 238--239
             Cipher A. Deavours   The Black Chamber: a column --- la
                                  méthode des bâtons . . . . . . . . . . . . 240--247
                     Louis Kruh   A Remarkable View of Ancient America: a
                                  Book Review  . . . . . . . . . . . . . . 248--249
                      Anonymous   Results of Reader Survey . . . . . . . . 250--251
                      Anonymous   Biographies of Contributors  . . . . . . 252--253


Cryptologia
Volume 5, Number 1, January, 1981

                    Greg Mellen   Graphic Solution of a Linear
                                  Transformation Cipher  . . . . . . . . . 1--19
                     David Kahn   The Public's Secrets . . . . . . . . . . 20--26
               Ronald L. Rivest   Statistical Analysis of the Hagelin
                                  Cryptograph  . . . . . . . . . . . . . . 27--32
               Sir Alfred Ewing   Some Special War Work, Part II . . . . . 33--39
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 40--42
             Cipher A. Deavours   The Black Chamber: a Column Shutting Off
                                  the Spigot in 1981 . . . . . . . . . . . 43--45
                     Louis Kruh   Cipher Equipment: Collins CR-200/220
                                  Data Security Unit . . . . . . . . . . . 46--50
                    Frank Rubin   Decrypting a Stream Cipher Based on J--K
                                  Flip-Flops . . . . . . . . . . . . . . . 51--57
                     Louis Kruh   ``From the Ultra Conference'': a Book
                                  Review . . . . . . . . . . . . . . . . . 58--58
                 Elliot Fischer   A Theoretical Measure of Cryptographic
                                  Performance  . . . . . . . . . . . . . . 59--62
                      Anonymous   Biographies of Contributors  . . . . . . 63--63

Cryptologia
Volume 5, Number 2, April, 1981

                     David Kahn   German Spy Cryptograms . . . . . . . . . 65--66
          Robert E. Hartwig and   
                    Jack Levine   Applications of the Drazin inverse to
                                  the Hill cryptographic system. Part III  67--77
         Stephen A. Kallis, Jr.   The Code-O-Graph Cipher Disks  . . . . . 78--83
                 Gerald Sturges   The House Report on Public Cryptography  84--93
                 John P. Costas   The Hand-Held Calculator As a
                                  Cryptographic Machine  . . . . . . . . . 94--117
                    Lee Lembart   The Public Cryptography Study Group:
                                  U.S. and Mathematicians in Code Dispute  118--122
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 123--123
                     Louis Kruh   ``A Code Problem'': a Book Review  . . . 124--125
                      Anonymous   Biographies of Contributors  . . . . . . 126--126

Cryptologia
Volume 5, Number 3, July, 1981

                      Anonymous   Report of the Public Cryptography Study
                                  Group  . . . . . . . . . . . . . . . . . 130--142
               George I. Davida   The Case Against Restraints on
                                  Non-Governmental Research in
                                  Cryptography . . . . . . . . . . . . . . 143--148
               Philip M. Arnold   Palatino and Bibliander on ciphers . . . 149--154
                     Louis Kruh   ``Reward for Reading and Deciphering'':
                                  a Book Review  . . . . . . . . . . . . . 155--157
                 Elliot Fischer   Measuring Cryptographic Performance With
                                  Production Processes . . . . . . . . . . 158--162
              R. Creighton Buck   Sherlock Holmes in Babylon . . . . . . . 163--173
                     Louis Kruh   Cipher Machine Exhibit at the
                                  Smithsonian Institution  . . . . . . . . 174--174
              Oskar Stuerzinger   The A-22 Cryptograph . . . . . . . . . . 175--183
                Brian J. Winkel   There and There  . . . . . . . . . . . . 184--190
                      Anonymous   Biographies of Contributors  . . . . . . 191--191

Cryptologia
Volume 5, Number 4, October, 1981

                     David Kahn   The Genesis of the Jefferson/Bazeries
                                  Cipher Device  . . . . . . . . . . . . . 193--208
                     Louis Kruh   The Genesis of the Jefferson/Bazeries
                                  Cipher Device  . . . . . . . . . . . . . 193--208
                     Louis Kruh   ``A User's Guide in Voice and Data
                                  Communications Protection'': Book Review 208--212
                    L. Klingler   Letter to the Editor . . . . . . . . . . 209--210
                      J. Costas   Letter to the Editor . . . . . . . . . . 210--212
          Robert E. Hartwig and   
                    Jack Levine   Applications of the Drazin Inverse to
                                  the Hill Cryptographic System. Part IV   213--228
                  William Groth   Secret Writing Exhibit . . . . . . . . . 229--230
                    Carl Hammer   Higher-Order Homophonic Ciphers  . . . . 231--242
                 Jack Keil Wolf   ``Number Theory in Digital Signal
                                  Processing'': a Book Review  . . . . . . 243--246
                 C. A. Deavours   Interactive Solution of Columnar
                                  Transposition Ciphers  . . . . . . . . . 247--251
                      Anonymous   Biographies of Contributors  . . . . . . 252--253
                        Unknown   Letters to the Editor  . . . . . . . . . ??


Cryptologia
Volume 6, Number 1, January, 1982

                Marian Rejewski   Mathematical Solution of the Enigma
                                  Cipher . . . . . . . . . . . . . . . . . 1--18
       Christopher Kasparek and   
              Richard A. Woytak   In memoriam Marian Rejewski  . . . . . . 19--25
                     David Kahn   Why Germany Lost the Code War  . . . . . 26--31
              Wldyslaw Kozaczuk   Enigma Solved  . . . . . . . . . . . . . 32--33
                 C. A. Deavours   The Black Chamber  . . . . . . . . . . . 34--37
                     Louis Kruh   `Wilderness of Mirrors'': a Book Review  38--38
                     Louis Kruh   ``Beale Society Material'': Book Reviews 39--39
              Ralph V. Anderson   If I Remember  . . . . . . . . . . . . . 40--44
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 45--46
                     David Kahn   Churchill Pleads for the Intercepts  . . 47--49
              Richard A. Woytak   A Conversation With Marian Rejewski  . . 50--60
                Bradford Hardie   ``Unraveling the Enigma Story'': a Book
                                  Review . . . . . . . . . . . . . . . . . 61--64
               William P. Bundy   ``From the Depths to the Heights'': Book
                                  Reviews  . . . . . . . . . . . . . . . . 65--74
                Marian Rejewski   Remarks on Appendix 1 to ``British
                                  Intelligence in the Second World War''
                                  by F. H. Hinsley . . . . . . . . . . . . 75--83
                     David Kahn   ``Computer Cryptography'': a Book Review 84--84
                     Louis Kruh   The Navy Cipher Box Mark II  . . . . . . 85--93
                      Anonymous   Biographies of Contributors  . . . . . . 94--95

Cryptologia
Volume 6, Number 2, April, 1982

             Mel L. Barclay and   
              Joshua S. Barclay   Use of Microcomputer System for Medical
                                  Record Encryption and Decryption Using a
                                  Sequential Pseudo-Random Key . . . . . . 97--107
                 Elliot Fischer   The Performance of Hellman's Time-Memory
                                  Trade-Off Against Some Rotor Ciphers . . 108--114
                     David Kahn   A New Source for Historians: Yardley's
                                  Seized Manuscript  . . . . . . . . . . . 115--119
                     David Kahn   In Memoriam: Georges-Jean Painvin  . . . 120--127
                N. J. A. Sloane   Error-Correcting Codes and Cryptography.
                                  Part I . . . . . . . . . . . . . . . . . 128--153
                     Louis Kruh   Book Reviews: a Book With a Book Cipher  154--168
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 169--174
                 C. A. Deavours   Konheim's ``Cryptography --- A Primer'':
                                  a Book Review  . . . . . . . . . . . . . 175--176
            M. C. W. Kaiserling   Sirius . . . . . . . . . . . . . . . . . 177--178
                Brian J. Winkel   There and There --- a Column . . . . . . 179--188
                      Anonymous   Biographies of Contributors  . . . . . . 189--190

Cryptologia
Volume 6, Number 3, July, 1982

               Dundas P. Tucker   Rhapsody in Purple: a New History of
                                  Pearl Harbor --- I . . . . . . . . . . . 193--228
             Shimshon Berkovits   Factoring via superencryption  . . . . . 229--237
                     Louis Kruh   The Mystery of Colonel Decius
                                  Wadsworth's Cipher Device  . . . . . . . 238--247
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 248--252
            Richard Outerbridge   Cryptographic Features of the UNIX
                                  Operating System . . . . . . . . . . . . 253--257
                N. J. A. Sloane   Error-Correcting Codes and Cryptography.
                                  Part II  . . . . . . . . . . . . . . . . 258--278
               Donald V. Miller   Ciphertext Only Attack on the
                                  Merkle--Hellman Public-Key System under
                                  Broadcast Situations . . . . . . . . . . 279--281
            M. C. W. Kaiserling   Solution to Sirius Music Cipher  . . . . 282--282
                 C. A. Deavours   Helmich and the KL-7 . . . . . . . . . . 283--284
                      Anonymous   Biographies of Contributors  . . . . . . 285--286

Cryptologia
Volume 6, Number 4, October, 1982

               Donald W. Davies   The Siemens and Halske T52E Cipher
                                  Machine  . . . . . . . . . . . . . . . . 289--308
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 309--311
          Alkiviadis G. Akritas   Application of Vincent's Theorem in
                                  Cryptography or One-Time Pads Made
                                  Practical  . . . . . . . . . . . . . . . 312--318
                M. O. Vahle and   
                L. F. Tolendino   Breaking a Pseudo Random Number Based
                                  Cryptographic Algorithm  . . . . . . . . 319--328
                Henk Meijer and   
                      Selim Akl   Digital Signature Schemes  . . . . . . . 329--338
            Richard Outerbridge   A Pedagogical Cipher . . . . . . . . . . 339--345
               Dundas P. Tucker   Rhapsody in Purple: a New History of
                                  Pearl Harbor: Part Two of Two  . . . . . 346--367
              Stephen A. Kallis   A Child's Garden of Cryptography . . . . 368--377
                     Louis Kruh   A Basic Probe of the Beale Cipher as a
                                  Bamboozlement  . . . . . . . . . . . . . 378--382
                      Anonymous   Biographies of Contributors  . . . . . . 383--384


Cryptologia
Volume 7, Number 1, January, 1983

                     David Kahn   The Crypto '82 Conference, a Report on
                                  [the] Conference . . . . . . . . . . . . 1--5
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 6--11
                 Denis R. Floyd   Annotated bibliography in conventional
                                  and public key cryptography  . . . . . . 12--24
                S. Brent Morris   Fraternal Cryptography: Cryptographic
                                  Practices of American Fraternal
                                  Organizations  . . . . . . . . . . . . . 27--36
                   H. Jurgensen   Language Redundancy and the Unicity
                                  Point  . . . . . . . . . . . . . . . . . 37--48
                    Viiveke Fak   Cryptographic Protection of Files in An
                                  Automated Office System  . . . . . . . . 49--62
                Boshra H. Makar   Application of a certain class of
                                  infinite matrices to the Hill
                                  cryptographic system . . . . . . . . . . 63--78
                 Thomas H. Dyer   ``The Power of Magic'': a Book Review    79--82
                     Louis Kruh   Cipher Equipment: the Cryptographic Unit
                                  CSI-10 . . . . . . . . . . . . . . . . . 83--88
                 Elliot Fischer   Uncaging the Hagelin Cryptograph . . . . 89--92
                      Anonymous   Biographies of Contributors  . . . . . . 93--94

Cryptologia
Volume 7, Number 2, April, 1983

              John B. Lundstrom   A Failure of Radio Intelligence: An
                                  Episode in the Battle of the Coral Sea   97--118
    Brig. Gen. Carter W. Clarke   From the Archives: Statement for Record
                                  of Participation of Brig. Gen. Carter W.
                                  Clarke, GSC in the Transmittal of
                                  Letters from Gen. George C. Marshall to
                                  Gov. Thomas E. Dewey, the Latter Part of
                                  September, 1944  . . . . . . . . . . . . 119--131
            John F. Bratzel and   
                 Leslie B. Rout   Abwehr Ciphers in Latin America  . . . . 132--144
                 Louis Kruh and   
                 C. A. Deavours   The Typex Cryptograph  . . . . . . . . . 145--166
                    Greg Mellen   Cryptanalysis' Corner  . . . . . . . . . 167--169
      Babacar Alassane Ndam and   
                    Amadou Sarr   The Problem of Reciprocity in a
                                  Delastelle Digraphic Substitution  . . . 170--179
            Gustavus J. Simmons   A ``Weak'' Privacy Protocol Using the
                                  RSA Crypto Algorithm . . . . . . . . . . 180--182
                Henk Meijer and   
                      Selim Akl   Remarks on a Digital Signature Scheme    183--186
                 C. A. Deavours   The View From Across the Pond: An
                                  Interview With the Geneva Management
                                  Group  . . . . . . . . . . . . . . . . . 187--190
                      Anonymous   Biographies of Contributors  . . . . . . 191--192

Cryptologia
Volume 7, Number 3, July, 1983

            Gerhard F. Strasser   The Noblest Cryptologist: Duke August
                                  the Younger of Brunswick--Luneburg
                                  (Gustavus Selenus) and his Cryptological
                                  Activities . . . . . . . . . . . . . . . 193--217
              Donald H. Bennett   An Unsolved Puzzle Solved  . . . . . . . 218--234
               Donald W. Davies   The Early Models of the Siemens and
                                  Halske T52 Cipher Machine  . . . . . . . 235--253
                     David Kahn   Eurocrypt 83: a Report . . . . . . . . . 254--256
      Christian Mueller-Schloer   DES-Generated Checksums for Electronic
                                  Signatures . . . . . . . . . . . . . . . 257--273
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 274--277
                 Louis Kruh and   
                    Greg Mellen   Book, Movie, Article and Game Reviews    278--286
                      Anonymous   Biographies of Contributors  . . . . . . 287--288

Cryptologia
Volume 7, Number 4, October, 1983

                     Louis Kruh   How to Use the German Enigma Cipher
                                  Machine: a Photographic Essay  . . . . . 291--296
         Albert C. Leighton and   
              Stephen M. Matyas   The Search for the Key Book to Nicholas
                                  Trist's Book Ciphers . . . . . . . . . . 297--314
                      Anonymous   From the archives: Examples of
                                  Intelligence Obtained from
                                  Cryptanalysis, 1 August 1946 . . . . . . 315--326
                  Peter Winkler   The Advent of Cryptology in the Game of
                                  Bridge . . . . . . . . . . . . . . . . . 327--332
              Oskar Stuerzinger   The B-21 Cryptograph . . . . . . . . . . 333--346
      Hugo Brändström   A public-key cryptosystem based upon
                                  equations over a finite field  . . . . . 347--358
                    Daniel Wolf   ROTERM: a Microprocessor Based Cipher
                                  Terminal System  . . . . . . . . . . . . 359--370
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 371--374
                     Louis Kruh   Book Reviews . . . . . . . . . . . . . . 375--379
                      Anonymous   Biographies of Contributors  . . . . . . 380--381


Cryptologia
Volume 8, Number ??, 1984

                      J. Levine   U.S. Cryptographic Patents 1861--1981    ??

Cryptologia
Volume 8, Number 1, January, 1984

            Gustavus J. Simmons   A System for Verifying User Identity and
                                  Authorization at the Point-Of Sale or
                                  Access . . . . . . . . . . . . . . . . . 1--21
                  Arthur Sorkin   LUCIFER, a Cryptographic Algorithm . . . 22--42
                 Louis Kruh and   
                    Greg Mellen   Reviews of Things Cryptologic  . . . . . 43--53
                     Louis Kruh   Who Did It?  . . . . . . . . . . . . . . 54--54
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 55--57
                     David Kahn   Cipher Machine Inventor --- Boris
                                  Hagelin Dies . . . . . . . . . . . . . . 60--61
             Herbert O. Yardley   From the archives: Achievements of
                                  Cipher Bureau MI-8 During the First
                                  World War. Documents by Major Herbert O.
                                  Yardley Prepared Under the Direction of
                                  the Chief Signal Officer, 25 May 1945,
                                  SPSIS-1. Signal Security Agency.
                                  Washington, DC . . . . . . . . . . . . . 62--74
                     Louis Kruh   Because of the Freedom of Information
                                  Act (FOIA) . . . . . . . . . . . . . . . 75--77
                     Louis Kruh   Cipher Devices . . . . . . . . . . . . . 78--79
              James J. Gillogly   The Mysterious Autocryptograph . . . . . 79--81
               Donald W. Davies   The Autocryptograph  . . . . . . . . . . 82--92
                      Anonymous   Biographies of Contributors  . . . . . . 93--94

Cryptologia
Volume 8, Number 2, April, 1984

              Charles T. Retter   Cryptanalysis of a Maclaren--Marsaglia
                                  System . . . . . . . . . . . . . . . . . 97--108
                      Anonymous   Project on Secrecy and Openness in
                                  Scientific and Technical Communication   109--111
                     Louis Kruh   Hand-Held Crypto Device SEC-36 . . . . . 112--114
               Donald W. Davies   Sidney Hole's Cryptographic Machine  . . 115--126
                     Louis Kruh   Literature Reviews . . . . . . . . . . . 127--131
                     Borge Tilt   On Kullback's $ \chi $-tests for
                                  matching and non-matching multinomial
                                  distributions  . . . . . . . . . . . . . 132--141
            John M. Carroll and   
               Pierre G. Laurin   Software Protection for Microcomputers   142--160
                    Jack Levine   Corrections for Published Copy of United
                                  States Cryptographic Patents: 1861--1981 161--162
                     Louis Kruh   The Slidex RT Code . . . . . . . . . . . 163--172
                  Ralph Erskine   ``British Intelligence --- Volume II''
                                  --- Book Review  . . . . . . . . . . . . 173--180
                      Anonymous   From the Archives: Codes and Ciphers for
                                  Combined Air-Amphibian Operations  . . . 181--186
                  David Shulman   An Unknown Cipher Disk . . . . . . . . . 187--190
                      Anonymous   Biographical Sketches  . . . . . . . . . 191--192

Cryptologia
Volume 8, Number 3, July, 1984

              Thomas R. Hammant   The Origins of Russian Navy
                                  Communications Intelligence  . . . . . . 193--202
                Francis Guelker   A Cryptographer's War Memories . . . . . 203--207
                  Robert Weller   Rear Admiral Joseph N. Wenger USN (Ret)
                                  and the Naval Cryptologic Museum . . . . 208--234
               Philip M. Arnold   ``A View of Renaissance Cryptography''
                                  --- a Book Review  . . . . . . . . . . . 235--241
                 C. A. Deavours   Reflections on the ``State of the Art''  242--245
                     Louis Kruh   Cryptology and the Law . . . . . . . . . 246--248
                     Louis Kruh   Cipher Equipment . . . . . . . . . . . . 249--249
               Donald W. Davies   Sir Percy Scott's Cypher . . . . . . . . 250--252
            John M. Delaurentis   A further weakness in the Common Modulus
                                  Protocol for the RSA cryptoalgorithm . . 253--259
                John M. Carroll   The Resurrection of Multiple-Key Ciphers 262--265
                  G. R. Blakley   AAAS Crypto Sessions Proceedings: Review 266--269
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 270--275
                     Louis Kruh   Cipher Equipment: Tst 3336 and Tst 9761  278--284
             Robert R. Jueneman   IACR Announces Bulletin Board Service    285--286
                      Anonymous   Biographies of Contributors  . . . . . . 287--288

Cryptologia
Volume 8, Number 4, October, 1984

                     Louis Kruh   The Heraldry of Cryptology . . . . . . . 289--301
                O. G. Landsverk   Cryptography in Runic Inscriptions . . . 302--319
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 320--325
                     Louis Kruh   Cryptology and the Law . . . . . . . . . 326--331
                  Ralph Erskine   \booktitleAlan Turing: The Enigma ---
                                  Book Review  . . . . . . . . . . . . . . 332--336
               Solomon Kullback   Looking Back . . . . . . . . . . . . . . 337--342
              Rodney Cooper and   
                Wayne Patterson   A generalization of the knapsack
                                  algorithm using Galois fields  . . . . . 343--347
                Roland Anderson   Finding Vowels in Simple Substitution
                                  Ciphers by Computer  . . . . . . . . . . 348--359
             C. A. Deavours and   
                Brian J. Winkel   ``Cryptanalysis of Shift Stream
                                  Generated Stream Cipher Systems'': Book
                                  Review . . . . . . . . . . . . . . . . . 360--363
                     Louis Kruh   There and There --- Reviews and News . . 364--373
                      Anonymous   Biographies of Contributors  . . . . . . 379--380
                        Unknown   Alan Turing: The Enigma  . . . . . . . . ??


Cryptologia
Volume 9, Number 1, January, 1985

                     David Kahn   The Annotated The American Black Chamber 1--37
                     Louis Kruh   An Armchair View of the Smithsonian
                                  Institution Cipher Machine Exhibit . . . 38--51
                  Ralph Erskine   An Early Success Story . . . . . . . . . 52--54
              James J. Gillogly   Fast Pattern Matching for Word Lists . . 55--62
          Ole Immanuel Franksen   Expert Witness . . . . . . . . . . . . . 63--69
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 70--74
                   Robert Scott   Wide-Open Encryption Design Offers
                                  Flexible Implementations . . . . . . . . 75--91
     Master Sgt. Charles Murray   The Crypt Bug  . . . . . . . . . . . . . 92--92
                      Anonymous   Biographies of Contributors  . . . . . . 95--96

Cryptologia
Volume 9, Number 2, April, 1985

               John R. Michener   The ``Generalized Rotor'' Cryptographic
                                  Operator and Some of Its Applications    97--113
              Charles T. Retter   A Key-Search Attack on
                                  Maclaren--Marsaglia Systems  . . . . . . 114--130
            Douglas W. Mitchell   A Polygraphic Substitution Cipher Based
                                  on Multiple Interlocking Applications of
                                  Playfair . . . . . . . . . . . . . . . . 131--139
            V. Varadharajan and   
                       R. Odoni   Extension of RSA cryptosystems to matrix
                                  rings  . . . . . . . . . . . . . . . . . 140--153
                     Louis Kruh   Cipher Equipment . . . . . . . . . . . . 154--154
               Donald W. Davies   Charles Wheatstone's Cryptograph and
                                  Pletts' Cipher Machine . . . . . . . . . 155--160
                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 161--166
                   Robert Price   A conversation with Claude Shannon: one
                                  man's approach to problem solving  . . . 167--175
                     Louis Kruh   Reviews of the Literature  . . . . . . . 176--186
                      Anonymous   Biographies of Contributors  . . . . . . 188--189

Cryptologia
Volume 9, Number 3, June, 1985

               John R. Michener   Application of the Generalized Rotor
                                  Cryptographic Operator in the
                                  Construction of Substitution-Permutation
                                  Network Block Codes  . . . . . . . . . . 193--201
              Joseph R. Kruskal   A Trigraph Cipher With a Short Key for
                                  Hand Use . . . . . . . . . . . . . . . . 202--222
                 H. C. Williams   Some Public-Key Crypto-Functions as
                                  Intractable as Factorization . . . . . . 223--237
            Richard Outerbridge   DEA and Lucifer Available on Compuserve  238--239
                  Fred W. Kranz   Early History of Riverbank Acoustical
                                  Laboratories . . . . . . . . . . . . . . 240--246
                Brian J. Winkel   There and There --- a Column of News . . 247--251
                     Louis Kruh   The Kryha Liliput Ciphering Machine  . . 252--261
                  Ralph Erskine   British Intelligence --- Volume 3, Part
                                  1 --- Book Review  . . . . . . . . . . . 262--272
                     Louis Kruh   Cryptology and the Law --- III . . . . . 273--285
                      Anonymous   Biographies of Contributors  . . . . . . 287--288

Cryptologia
Volume 9, Number 4, October, 1985

                    Greg Mellen   Cryptanalysts' Corner  . . . . . . . . . 289--293
                 Louis Kruh and   
                  Ralph Erskine   Review of Things Cryptologic . . . . . . 294--305
                      Anonymous   Forty One and Strong: Arlington Hall
                                  Station  . . . . . . . . . . . . . . . . 306--310
                     Louis Kruh   Automatic Communications With the SIGABA
                                  and the M-294  . . . . . . . . . . . . . 311--315
                  Ralph Erskine   ``Enigma and the Polish Contribution'':
                                  Book Review  . . . . . . . . . . . . . . 316--323
                     Louis Kruh   Early communications security in the
                                  U.S. Navy  . . . . . . . . . . . . . . . 324--331
                 Robert I. Atha   Bombe! ``I Could Hardly Believe It!''    332--336
                Henry D. Ephron   An American Cryptanalyst in Australia    337--340
                     Louis Kruh   Cryptology and the Law --- IV  . . . . . 348--350
                   David August   Information Theoretic Approach to Secure
                                  LSFR Ciphers . . . . . . . . . . . . . . 351--359
              Masahiro Yagisawa   A New Method for Realizing Public-Key
                                  Cryptosystem . . . . . . . . . . . . . . 360--371, 380
               Russell Atkinson   Ciphers in Oriental Languages  . . . . . 373--380
                      Anonymous   Biographies of Contributors  . . . . . . 381--382


Cryptologia
Volume 10, Number 1, January, 1986

                Brian J. Winkel   Letter From One of the Editors . . . . . 1--1
                     Louis Kruh   The Control of Public Cryptography and
                                  Freedom of Speech --- a Review . . . . . 2--9
                      Anonymous   Biographies of Contributors  . . . . . . 9--9
                Roland Anderson   Improving the Machine Recognition of
                                  Vowels in Simple Substitution Ciphers    10--22
                    Mike Barlow   A Machine Solution of the AMSCO Cipher   23--33
                  Frode Weierud   Machine Secrets: a Book Review . . . . . 34--37
                     David Kahn   Secrets of the Codebreakers  . . . . . . 38--41
                     Louis Kruh   Announcements and Reviews of Things
                                  Cryptologic  . . . . . . . . . . . . . . 42--45
                 C. A. Deavours   Elle a de l'intelligence et de la
                                  conversation . . . . . . . . . . . . . . 47--49
                  Ralph Erskine   From the Archives: GC and CS Mobilizes
                                  'Men of the Professor Type'  . . . . . . 50--59
                     Louis Kruh   18th Century Shorthand Expert Needed . . 60--62
                     Louis Kruh   Cipher Equipment . . . . . . . . . . . . 63--63
               Donald W. Davies   Cipher Equipment: Bolton's Cypher Wheel  64--64

Cryptologia
Volume 10, Number 2, April, 1986

                     Louis Kruh   The Truman Memorandum  . . . . . . . . . 65--74
       Charles-Hubert Desnoyers   Cryptanalytic Essay --- Part I: Solution
                                  of Problem No. 166 Published in
                                  Elementary Cryptanalysis . . . . . . . . 75--95
                  Yves Roggeman   Remarks on the auto-correlation function
                                  of binary periodic sequences . . . . . . 96--100
                     Louis Kruh   Cryptology and the Law --- V . . . . . . 101--107
                     Louis Kruh   Reviews of Things Cryptologic  . . . . . 110--122
                   Martin Minow   No Title . . . . . . . . . . . . . . . . 123--125
                     Louis Kruh   18th Century Shorthand Expert Needed
                                  (Re-Run) . . . . . . . . . . . . . . . . 126--127
                      Anonymous   Biographies of Contributors  . . . . . . 128--128
                        Unknown   Has Dr. Thouless Survived Death? . . . . ??

Cryptologia
Volume 10, Number 3, July, 1986

                     Louis Kruh   Cryptology and the Law --- VI  . . . . . 129--133
              Gilbert Bloch and   
                  Ralph Erskine   Enigma: the Dropping of the Double
                                  Encipherment . . . . . . . . . . . . . . 134--141
            Richard Outerbridge   Some Design Criteria for Feistel-Cipher
                                  Key Schedules  . . . . . . . . . . . . . 142--156
       Charles-Hubert Desnoyers   Cryptanalytic Essay --- Part II:
                                  Solution of Problem No. 166 Published in
                                  Elementary Cryptanalysis . . . . . . . . 158--183
                     Louis Kruh   Reviews of Things Cryptologic  . . . . . 184--191
                      Anonymous   Biographies of Contributors  . . . . . . 192--192

Cryptologia
Volume 10, Number 4, October, 1986

            John M. Carroll and   
                   Steve Martin   The Automated Cryptanalysis of
                                  Substitution Ciphers . . . . . . . . . . 193--209
                 Michael Barlow   The Voynich Manuscript --- By Voynich?   210--216
                    Frank Rubin   Foiling the Known-Plaintext Attack . . . 217--223
                      Anonymous   Free IBM-PC Encryption Software  . . . . 224--224
            Richard Outerbridge   Cadbury Code Confidential  . . . . . . . 225--226
                  Ralph Erskine   ``A Link With Pearl Harbor?'' Book
                                  Review . . . . . . . . . . . . . . . . . 227--229
              Wolfgang W. Mache   Geheimschreiber  . . . . . . . . . . . . 230--242
         Cipher A. Deavours and   
                     Louis Kruh   Appendix: Mechanics of the German
                                  Telecipher Machine . . . . . . . . . . . 243--247
                     Louis Kruh   Cryptology and the Law --- VII . . . . . 248--253
                      Anonymous   Biographies of Contributors  . . . . . . 254--255


Cryptologia
Volume 11, Number 1, January, 1987

               Martin Kochanski   A Survey of Data Insecurity Packages . . 1--15
          Robert Winternitz and   
                 Martin Hellman   Chosen-Key Attacks on a Block Cipher . . 16--20
              Samuel M. Levitin   Equivalence Classes: Toward More
                                  Efficient Search . . . . . . . . . . . . 21--28
               Joseph S. Schick   With the 849th SIS, 1942--45 . . . . . . 29--39
                Bradford Hardie   The POTUS-Prime Connection: Two Notes
                                  (1) Roosevelt, Churchill, and Me . . . . 40--43
                      Anonymous   (2) History of Converter M-134-C Top
                                  Secret Chapter XVIII. the Zero Machine   44--46
                 C. A. Deavours   Cryptology Courses at Kean College . . . 47--50
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 51--63

Cryptologia
Volume 11, Number 2, April, 1987

               William P. Bundy   Some of My Wartime Experiences . . . . . 65--77
                 Patrick Beesly   Who Was the Third Man at Pyry? . . . . . 78--80
                     David Kahn   The Codebreaker Behind the Footlights    81--84
                 Linda Y. Gouaz   Needles and Haystacks: the Search for
                                  Ultra in the 1930's (An Excerpt) . . . . 85--92
              James J. Gillogly   Breaking An Eighteenth Century Shorthand
                                  System . . . . . . . . . . . . . . . . . 93--98
                      Anonymous   Cadbury Caper or Cipher? . . . . . . . . 99--101
                    Frank Rubin   Foiling An Exhaustive Key-Search Attack  102--107
               John R. Michener   The Use of Complete, Nonlinear, Block
                                  Codes for Nonlinear, Noninvertible
                                  Mixing of Pseudorandom Sequences . . . . 108--111
           Robert M. Richardson   Digital Encryption Standard Users Group  112--114
                   Tom Cheatham   Message Decryption and Spelling Checkers 115--118
                     Louis Kruh   An Obscure Cryptographic Device  . . . . 119--122
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 123--128

Cryptologia
Volume 11, Number 3, July, 1987

              Paul Whitaker and   
                     Louis Kruh   From Bletchley Park to Berchtesgaden . . 129--141
              Gilbert Bloch and   
                 C. A. Deavours   ENIGMA Before ULTRA: Polish Work and the
                                  French Contribution  . . . . . . . . . . 142--155
                     Louis Kruh   The Shortsighted View of a Foresighted
                                  Admiral  . . . . . . . . . . . . . . . . 156--159
                      Anonymous   From the Archives: Memorandum on
                                  Non-Military Codes and Ciphers . . . . . 160--161
                 C. A. Deavours   Sois Belle et Tais-Toi . . . . . . . . . 162--165
               John R. Michener   The Application of Key Dependent and
                                  Variable Rotor Sets to Generalized Rotor
                                  Cryptographic Systems  . . . . . . . . . 166--171
                   Justo Sancho   Enumeration of multivariable
                                  decipherable Boolean functions . . . . . 172--181
                 Subhash C. Kak   The Study of the Indus Script General
                                  Considerations . . . . . . . . . . . . . 182--191

Cryptologia
Volume 11, Number 4, October, 1987

            John M. Carroll and   
                  Lynda Robbins   The Automated Cryptanalysis of
                                  Polyalphabetic Ciphers . . . . . . . . . 193--205
                   John Bennett   Analysis of the Encryption Algorithm
                                  Used in the WordPerfect Word Processing
                                  Program  . . . . . . . . . . . . . . . . 206--210
                Jack Levine and   
               Richard Chandler   Some further cryptographic applications
                                  of permutation polynomials . . . . . . . 211--218
              William F. Clarke   Government Code and Cypher School: Its
                                  Foundation and Development With Special
                                  Reference to Its Naval Side  . . . . . . 219--226
              Gilbert Bloch and   
                 C. A. Deavours   Enigma Before Ultra: the Polish Success
                                  and Check (1933--1939) . . . . . . . . . 227--234
              Ralph Erskine and   
                  Frode Weierud   Naval Enigma: M4 and Its Rotors  . . . . 235--244
                     Louis Kruh   British Rockex Cipher Machines . . . . . 245--247
                 Louis Kruh and   
                  Ralph Erskine   Reviews and Things Cryptologic . . . . . 248--253


Cryptologia
Volume 12, Number ??, 1988

                 Michael Barlow   Voynich Solved?  . . . . . . . . . . . . ??

Cryptologia
Volume 12, Number 1, January, 1988

               Peter K. Pearson   Cryptanalysis of the Ciarcia Circuit
                                  Cellar Data Encryptor  . . . . . . . . . 1--10
                    Carl Hammer   Second Order Homophonic Ciphers  . . . . 11--20
                  John Michener   Recent Developments in Electronic
                                  Circuitry and Their Effects on the
                                  Implementation of
                                  Substitution-Permutation Block Codes . . 21--24
                    Frank Rubin   The cryptographic uses of Post tag
                                  systems  . . . . . . . . . . . . . . . . 25--33
                 Louis Kruh and   
              Ralph Erskine and   
                 Michael Barlow   Reviews and Things Cryptologic . . . . . 37--51
              William F. Clarke   The Years Between  . . . . . . . . . . . 52--58
                  Ralph Erskine   From the Archives: Tunny Decrypts  . . . 59--61
             Jonathan P. Arnold   Herbert O. Yardley, Gangbuster . . . . . 62--64

Cryptologia
Volume 12, Number 2, April, 1988

                     Louis Kruh   Stimson, the Black Chamber, and the
                                  ``Gentlemen's Mail'' Quote . . . . . . . 65--89
              William F. Clarke   Bletchley Park 1941--1945  . . . . . . . 90--97
                  Ralph Erskine   From the Archives: U-Boat HF WT
                                  Signalling . . . . . . . . . . . . . . . 98--106
                   Peter Wayner   A Redundancy Reducing Cipher . . . . . . 107--112
                    Subhash Kak   The \=Aryabha\dta cipher . . . . . . . . 113--117
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 118--127

Cryptologia
Volume 12, Number 3, July, 1988

                 Subhash C. Kak   A Frequency Analysis of the Indus Script 129--143
                Carl M. Ellison   A solution of the Hebern messages  . . . 144--158
                   Peter Jamnig   Securing the RSA-cryptosystem against
                                  cycling attacks  . . . . . . . . . . . . 159--164
               Martin Kochanski   Another Data Insecurity Package  . . . . 165--173 (or 165--177??)
              William F. Clarke   Post War Organization  . . . . . . . . . 174--177
              Gilbert Bloch and   
                 C. A. Deavours   Enigma Avant Ultra, Enigma Before Ultra  178--184
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 185--192

Cryptologia
Volume 12, Number 4, October, 1988

            John M. Carroll and   
               Lynda E. Robbins   Using binary derivatives to test an
                                  enhancement of DES . . . . . . . . . . . 193--208
               Donald V. Miller   Cryptanalysis of a Two Round Version of
                                  DES Using Index Implications . . . . . . 209--219
                Robert Matthews   An Empirical Method for Finding the
                                  Keylength of Periodic Ciphers  . . . . . 220--224
             Kaoru Kurosawa and   
                Toshiya Ito and   
               Masashi Takeuchi   Public key cryptosystem using a
                                  reciprocal number with the same
                                  intractability as factoring a large
                                  number . . . . . . . . . . . . . . . . . 225--233
               Richard I. Polis   European Needs and Attitudes Towards
                                  Information Security . . . . . . . . . . 234--239
                 Louis Kruh and   
                 Johnnie Murray   A Pulp Magazine Cipher . . . . . . . . . 240--240
                     Louis Kruh   The Beale Cipher As a Bamboozlement ---
                                  Part II  . . . . . . . . . . . . . . . . 241--246
                 C. A. Deavours   Interactive Solution of Beaufort
                                  Enciphered Text With Overlapping Keys    247--255
                    Mike Barlow   A Mathematical Word Block Cipher . . . . 256--264
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 265--269


Cryptologia
Volume 13, Number 1, January, 1989

                Jack Levine and   
               Richard Chandler   The Hill cryptographic system with
                                  unknown cipher alphabet but known
                                  plaintext  . . . . . . . . . . . . . . . 1--28
                Robert Matthews   On the derivation of a ``chaotic''
                                  encryption algorithm . . . . . . . . . . 29--42
                   Jeff Belkora   Belkoranic Hill Ciphering  . . . . . . . 43--49
             Gary R. Greenfield   A Cryptography Course for the University
                                  of Richmond  . . . . . . . . . . . . . . 50--60
                Roland Anderson   Cryptanalytic Properties of Short
                                  Substitution Ciphers . . . . . . . . . . 61--72
                 Subhash C. Kak   A New Method for Coin Flipping by
                                  Telephone  . . . . . . . . . . . . . . . 73--78
                     Louis Kruh   The Heraldry of Cryptology --- Addendum  79--84
                 Louis Kruh and   
                  Ralph Erskine   Reviews and Things Cryptologic . . . . . 85--96

Cryptologia
Volume 13, Number 2, April, 1989

              Wolfgang W. Mache   The Siemens Cipher Teletype in the
                                  History of Telecommunications  . . . . . 97--117
              William F. Clarke   Post War Organization  . . . . . . . . . 118--122
                     Louis Kruh   British--American Cryptanalytic
                                  Cooperation and an Unprecedented
                                  Admission by Winston Churchill . . . . . 123--134
                  Ralph Erskine   From the Archives: a Bletchley Park
                                  Assessment of German Intelligence on
                                  Torch  . . . . . . . . . . . . . . . . . 135--142
       Lt. Gen. Charles R. Myer   Viet Cong Sigint and U.S. Army COMSEC in
                                  Vietnam  . . . . . . . . . . . . . . . . 143--150
                George Georgiou   A Method to Strengthen Ciphers . . . . . 151--160
                Roland Anderson   Recognizing Complete and Partial
                                  Plaintext  . . . . . . . . . . . . . . . 161--166
           Louis C. Guillou and   
                 Marc Davio and   
        Jean-Jacques Quisquater   Public-Key Techniques: Randomness and
                                  Redundancy . . . . . . . . . . . . . . . 167--189
                     David Kahn   A Soviet Wiretapping Office  . . . . . . 190--191

Cryptologia
Volume 13, Number 3, July, 1989

                      Carl Boyd   Anguish under Siege: High-Grade Japanese
                                  Signal Intelligence and the Fall of
                                  Berlin . . . . . . . . . . . . . . . . . 193--209
                 C. A. Deavours   A Ku Klux Klan Cipher  . . . . . . . . . 210--214
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 215--242
              Daniel D. Wheeler   Problems With Chaotic Cryptosystems  . . 243--250
             C. A. Deavours and   
                     Louis Kruh   The Swedish HC-9 Ciphering Machine . . . 251--265
                Robert Matthews   A Rotor Device for Periodic and
                                  Random-Key Encryption  . . . . . . . . . 266--272
              Deane R. Blackman   The Gromark Cipher, and Some Relatives   273--282
                        Unknown   OSS Cryptographic Plan . . . . . . . . . 283--287

Cryptologia
Volume 13, Number 4, October, 1989

                David A. August   Cryptography and Exploitation of Chinese
                                  Manual Cryptosystems: Part I: The
                                  Encoding Problem . . . . . . . . . . . . 289--302
            John M. Carroll and   
               Lynda E. Robbins   Computer Cryptanalysis of Product
                                  Ciphers  . . . . . . . . . . . . . . . . 303--326
                     Louis Kruh   Tales of Yardley: Some Sidelights to His
                                  Career . . . . . . . . . . . . . . . . . 327--358
                   David August   Information theoretic approach to secure
                                  LSFR ciphers . . . . . . . . . . . . . . 351--359
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 359--377
                        Unknown   From the archives: Compromise of a Navy
                                  Code . . . . . . . . . . . . . . . . . . 378--381


Cryptologia
Volume 14, Number 1, January, 1990

                  F. H. Hinsley   British Intelligence in the Second World
                                  War: An Overview . . . . . . . . . . . . 1--10
                 Frank W. Lewis   The Day of the Dodo  . . . . . . . . . . 11--27
          Stanley H. Lipson and   
                Francine Abeles   The Matrix Cipher of C. L. Dodgson . . . 28--36
                Daniel S. Vogel   Inside a KGB Cipher  . . . . . . . . . . 37--52
                John Rabson and   
                    Hugo Rabson   The War Office HK POW Cypher System  . . 53--60
                David A. August   Cryptography and Exploitation of Chinese
                                  Manual Cryptosystems. Part II: The
                                  Encrypting Problem . . . . . . . . . . . 61--78
                 Subhash C. Kak   The Vararuchi Cipher . . . . . . . . . . 79--82
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 83--89

Cryptologia
Volume 14, Number 2, April, 1990

Rear Admiral (disch.) Luigi Donini and   
             Augusto Buonafalce   The Cryptographic Services of the Royal
                                  British and Italian Navies . . . . . . . 97--127
            Francine Abeles and   
              Stanley H. Lipson   Some Victorian Periodic Polyalphabetic
                                  Ciphers  . . . . . . . . . . . . . . . . 128--134
       Brian Leigh Dunnigan and   
                Frank Lewis and   
                    Mike Barlow   The Niagara Cipher --- Part I  . . . . . 135--138
             C. A. Deavours and   
                     Louis Kruh   The Swedish HC-9 Ciphering Machine
                                  Challenge  . . . . . . . . . . . . . . . 139--144
              H. Paul Greenough   Cryptanalysis of the Uncaged Hagelin . . 145--161
                 C. A. Deavours   Solution of C-35 Texts With Partial Key
                                  Overlaps . . . . . . . . . . . . . . . . 162--168
                 Subhash C. Kak   Indus and Brahmi --- Further Connections 169--183
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 184--191

Cryptologia
Volume 14, Number 3, July, 1990

                 John Byrne and   
         Cipher A. Deavours and   
                     Louis Kruh   Chaocipher Enters the Computer Age When
                                  its Method Is Disclosed to Cryptologia
                                  Editors  . . . . . . . . . . . . . . . . 193--198
       Brian Leigh Dunnigan and   
                Frank Lewis and   
                    Mike Barlow   The Niagara cipher --- Part II . . . . . 199--203
             Wladyslaw Kozaczuk   A New Challenge for an Old ENIGMA ---
                                  Buster . . . . . . . . . . . . . . . . . 204--216
                Charles Connell   An Analysis of NEWDES: a Modified
                                  Version of DES . . . . . . . . . . . . . 217--224
               William A. Kiele   A Tensor --- Theoretic Enhancement to
                                  the Hill Cipher System . . . . . . . . . 225--233
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 234--252
                     Louis Kruh   Why Was Safford Pessimistic About
                                  Breaking the German ENIGMA Cipher
                                  Machine in 1942? . . . . . . . . . . . . 253--257
          Robert W. Baldwin and   
                Alan T. Sherman   How We Solved the US\$100,000} Decipher
                                  Puzzle (16 Hours Too Late) . . . . . . . 258--284
               Ross J. Anderson   Solving a Class of Stream Ciphers  . . . 285--288

Cryptologia
Volume 14, Number 4, October, 1990

                   Terry Ritter   Substitution Cipher with Pseudo-Random
                                  Shuffling The Dynamic Substitution
                                  Combiner . . . . . . . . . . . . . . . . 289--303
                Henry D. Ephron   S. I. S./CB  . . . . . . . . . . . . . . 304--330
             C. A. Deavours and   
                     Louis Kruh   The Turing0 Bombe: Was it Enough?  . . . 331--349
            Douglas W. Mitchell   Nonlinear Key Generators . . . . . . . . 350--354
               Caxton C. Foster   Vowel Distribution as a Clue to Vowel
                                  Identification . . . . . . . . . . . . . 355--362
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 363--373
                 Ralph E. Weber   A Masked Dispatch  . . . . . . . . . . . 374--380


Cryptologia
Volume 15, Number 1, January, 1991

                   Terry Ritter   Transposition Cipher with Pseudo-random
                                  Shuffling: The Dynamic Transposition
                                  Combiner . . . . . . . . . . . . . . . . 1--17
          Stanley H. Lipson and   
                Francine Abeles   The Key--Vowel Cipher of Charles S.
                                  Dodgson  . . . . . . . . . . . . . . . . 18--24
                     Louis Kruh   Military Intelligence Corps Hall of Fame 25--28
                     Louis Kruh   Correspondence in Cipher --- a Cipher
                                  Typewriter Catalogue . . . . . . . . . . 29--42
               Charles Schwartz   A New Graphical Method for Encryption of
                                  Computer Data  . . . . . . . . . . . . . 43--46
       Lt. Susan M. Lujan, USNR   Agnes Meyer Driscoll . . . . . . . . . . 47--56
               H. A. Bergen and   
                   W. J. Caelli   File Security in WordPerfect 5.0 . . . . 57--66
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 67--80

Cryptologia
Volume 15, Number 2, April, 1991

                   Terry Ritter   The Efficient Generation of
                                  Cryptographic Confusion Sequences  . . . 81--139
          Daniel D. Wheeler and   
          Robert A. J. Matthews   Supercomputer Investigations of a
                                  Chaotic Encryption Algorithm . . . . . . 140--152
                Colin Burke and   
                  Ralph Erskine   Letters to the Editor: Re: Safford
                                  Article  . . . . . . . . . . . . . . . . 153--160
              Jacques B. M. Guy   Letter to the Editor: Re: Voynich
                                  Manuscript . . . . . . . . . . . . . . . 161--166
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 167--176

Cryptologia
Volume 15, Number 3, July, 1991

               Gilles Garon and   
            Richard Outerbridge   DES Watch: An Examination of the
                                  Sufficiency of the Data Encryption
                                  Standard for Financial Institution
                                  Information Security in the 1990's . . . 177--193
               Ross J. Anderson   Tree Functions and Cipher Systems  . . . 194--202
                 Yvo G. Desmedt   The ``$A$'' cipher does not necessarily
                                  strengthen security  . . . . . . . . . . 203--206
              Jacques B. M. Guy   Statistical Properties of the Two Folios
                                  of the Voynich Manuscript  . . . . . . . 207--218
          Lambros D. Callimahos   The Legendary William F. Friedman  . . . 219--236
                 Louis Kruh and   
                     Paul Edden   Seizing the ENIGMA: Two Reviews of One
                                  Book . . . . . . . . . . . . . . . . . . 237--240
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 241--246
            William F. Friedman   Information Regarding Cryptographic
                                  Systems Submitted for Use by the
                                  Military Service and Forms to be Used    247--257
              Jacques B. M. Guy   Vowel Identification: An Old (But Good)
                                  Algorithm  . . . . . . . . . . . . . . . 258--262
            William F. Friedman   A Brief History of the Signal
                                  Intelligence Service by the Military
                                  Service and Forms to be Used . . . . . . 263--272

Cryptologia
Volume 15, Number 4, October, 1991

                     David Kahn   Pearl Harbor and the Inadequacy of
                                  Cryptanalysis  . . . . . . . . . . . . . 273--294
            Frederick D. Parker   The Unsolved Messages of Pearl Harbor    295--313
                Roland Anderson   Extending the Concept of Interval  . . . 314--324
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 325--334
                      Anonymous   From the Archives: Security of Ultra
                                  Dexter and Rabid Intelligence War
                                  Department . . . . . . . . . . . . . . . 341--354
              Daniel D. Wheeler   Problems with Mitchell's Nonlinear Key
                                  Generators . . . . . . . . . . . . . . . 355--363


Cryptologia
Volume 16, Number 1, January, 1992

                     Louis Kruh   Reviews and Things Cryptologic . . . . . 1--22
                  Bill Robinson   The Fall and Rise of Cryptanalysis in
                                  Canada . . . . . . . . . . . . . . . . . 23--38
                  Ralph Erskine   The German Naval Grid in World War II    39--51
            John M. Carroll and   
              Jeff Verhagen and   
                  Perry T. Wong   Chaos in Cryptography: The Escape from
                                  the Strange Attractor  . . . . . . . . . 52--72
                  Krzysztof Gaj   Polish Cipher Machine --- LUCIDA . . . . 73--80
                     Louis Kruh   ``Betrayal at Pearl Harbor'': Book
                                  Review . . . . . . . . . . . . . . . . . 81--85
                     Louis Kruh   Sliding Code Device of Unknown Origin    86--88

Cryptologia
Volume 16, Number 2, April, 1992

            Ibrahim A. Al-Kadit   Origins of cryptology: The Arab
                                  contributions  . . . . . . . . . . . . . 97--126
                    John Rabson   All Are Well at Boldon: a Mid-Victorian
                                  Code System  . . . . . . . . . . . . . . 127--135
              Robert McLaughlin   Yet Another Machine to Break DES . . . . 136--144
                     Louis Kruh   Army--Navy Collaboration for
                                  Cryptanalysis of Enemy Systems . . . . . 145--164
              George T. Sassoon   The Application of Sukhotin's Algorithm
                                  to Certain Non-English Languages . . . . 165--173
                  David Alvarez   A Papal Diplomatic Code  . . . . . . . . 174--176
                William A. Webb   A Public-Key Cryptosystem Based on
                                  Complementing Sets . . . . . . . . . . . 177--181
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 182--190

Cryptologia
Volume 16, Number 3, July, 1992

                   Peter Wayner   Mimic Functions  . . . . . . . . . . . . 193--214
               John C. King and   
               Dennis R. Bahler   An Implementation of Probabilistic
                                  Relaxation in the Cryptanalysis of
                                  Simple Substitution Ciphers  . . . . . . 215--225
                  Ross Anderson   Chaos and Random Numbers . . . . . . . . 226--226
               Ken Shirriff and   
                 Curt Welch and   
                 Andrew Kinsman   Decoding a VCR Controller Code . . . . . 227--234
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 235--249
            Douglas W. Mitchell   ``Rubik's Cube'' As a Transposition
                                  Device . . . . . . . . . . . . . . . . . 250--256
               Alison L. Oswald   William Frederick Friedman: a Pictorial
                                  Essay  . . . . . . . . . . . . . . . . . 257--264
       Lieutenant L. F. Safford   From the Archives: The Functions and
                                  Duties of the Cryptography Section,
                                  Naval Communications . . . . . . . . . . 265--281
               Caxton C. Foster   A Comparison of Vowel Identification
                                  Methods  . . . . . . . . . . . . . . . . 282--286

Cryptologia
Volume 16, Number 4, October, 1992

                     David Kahn   Roosevelt, MAGIC, and ULTRA  . . . . . . 289--319
                      Anonymous   From the Archives: Strategic Use of
                                  Communications During the World War  . . 320--326
                Peter P. Fagone   Partial Solutions of Swift's 18th
                                  Century Mock Latin Passages  . . . . . . 327--338
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 339--346
                 David W. Gaddy   Rochford's Cipher: a Discovery in
                                  Confederate Cryptography . . . . . . . . 347--362


Cryptologia
Volume 17, Number 1, January, 1993

                Jack Levine and   
               Richard Chandler   The Two-message Problem in the Hill
                                  Cryptographic System with Unknown Cipher
                                  Alphabet . . . . . . . . . . . . . . . . 1--30
           Richard Spillman and   
               Mark Janssen and   
                 Bob Nelson and   
                  Martin Kepner   Use of a Genetic Algorithm in the
                                  Cryptanalysis of Simple Substitution
                                  Ciphers  . . . . . . . . . . . . . . . . 31--44
               John C. King and   
               Dennis R. Bahler   A Framework for the Study of Homophonic
                                  Ciphers in Classical Encryption and
                                  Genetic Systems  . . . . . . . . . . . . 45--54
            Douglas W. Mitchell   A Nonlinear Random Number Generator with
                                  Known, Long Cycle Length . . . . . . . . 55--62
                  Luke O'Connor   The Inclusion--Exclusion Principle and
                                  its Applications to Cryptography . . . . 63--79
                     Louis Kruh   A Cryptological Travelogue: Riverbank
                                  --- 1992 . . . . . . . . . . . . . . . . 80--94
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 95--110

Cryptologia
Volume 17, Number 2, April, 1993

                    Colin Burke   An Introduction to an Historic Computer
                                  Document: The 1946 Pendergass Report
                                  Cryptanalysis and the Digital Computer   113--123
                       C. Burke   Cryptanalytic Use of High-Speed Digital
                                  Computing Machines . . . . . . . . . . . 124--147
               John C. King and   
               Dennis R. Bahler   An Algorithmic Solution of Sequential
                                  Homophonic Ciphers . . . . . . . . . . . 148--165
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 166--171
                     Louis Kruh   A 77-Year Old Challenge Cipher Known,
                                  Long Cycle Length  . . . . . . . . . . . 172--174
            Chin-Chen Chang and   
                 Ren-Junn Hwang   Master Keys for an $ M^3 $ Cryptoscheme  175--186
          Robert A. J. Matthews   The Use of Genetic Algorithms in
                                  Cryptanalysis  . . . . . . . . . . . . . 187--201
               R. S. Ramesh and   
                G. Athithan and   
               K. Thiruvengadam   An Automated Approach to Solve Simple
                                  Substitution Ciphers . . . . . . . . . . 202--218
                  David Alvarez   The Papal Cipher Section in the Early
                                  Nineteenth Century . . . . . . . . . . . 219--224

Cryptologia
Volume 17, Number 3, July, 1993

              Karl De Leeuw and   
              Hans Van Der Meer   A Homophonic Substitution in the
                                  Archives of the Last Great Pensionary of
                                  Holland  . . . . . . . . . . . . . . . . 225--236
                     David Kahn   An Enigma Chronology . . . . . . . . . . 237--246
                     David Kahn   From the Archives: Compromise of Naval
                                  Code F-3 . . . . . . . . . . . . . . . . 247--250
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 251--263
             S. J. Shepherd and   
              P. W. Sanders and   
                  C. T. Stockel   The Quadratic Residue Cipher and Some
                                  Notes on Implementation  . . . . . . . . 264--282
           Timothy K. Nenninger   From The Archives: Japanese Codebook
                                  Found  . . . . . . . . . . . . . . . . . 283--284
               Christoph Ruland   Realizing Digital Signatures with
                                  One-Way Hash Functions . . . . . . . . . 285--300
            Yuan-Chung Chin and   
               PeCheng Wang and   
                Jing-Jang Hwang   Cryptanalysis on Schwartz Graphical
                                  Encryption method  . . . . . . . . . . . 301--304
                   John C. King   A Reconstruction of the Key to Beale
                                  Cipher Number Two  . . . . . . . . . . . 305--317
                         Editor   Stimson Quote  . . . . . . . . . . . . . 318

Cryptologia
Volume 17, Number 4, October, 1993

               Ravi Ganesan and   
                Alan T. Sherman   Statistical Techniques for Language
                                  Recognition: An Introduction and Guide
                                  for Cryptanalysts  . . . . . . . . . . . 321--366
               Richard Spillman   Cryptanalysis of Knapsack Ciphers Using
                                  Genetic Algorithms . . . . . . . . . . . 367--377
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 378--394
             Albert C. Leighton   The Statesman Who Could Not Read His Own
                                  Mail . . . . . . . . . . . . . . . . . . 395--402
                      Anonymous   Riverbank's 1917 Cryptologic
                                  Contributions to the United States
                                  Officially Recognized as National
                                  Security Agency Adopts Editor's
                                  Suggestion . . . . . . . . . . . . . . . 403--406
              W. S. Forsyth and   
                R. Safavi-Naini   Automated Cryptanalysis of Substitution
                                  Ciphers  . . . . . . . . . . . . . . . . 407--418


Cryptologia
Volume 18, Number 1, January, 1994

                     Louis Kruh   Reviews and Things Cryptologic . . . . . 1--21
                 C. A. Deavours   ``Those Brilliant Brits'': Book Review   22--24
                  Ed Dawson and   
                   Andrew Clark   Divide and Conquer Attacks on Certain
                                  Classes of Stream Ciphers  . . . . . . . 25--40
             Gary R. Greenfield   Yet Another Matrix Cryptosystem  . . . . 41--51
                    J. Halligan   From the Archives: Radio Intelligence
                                  and Communication Security . . . . . . . 52--79

Cryptologia
Volume 18, Number 2, April, 1994

                Robin Denniston   Yardley's Diplomatic Secrets . . . . . . 81--127
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 128--140
                   D. W. Davies   New Information on the History of the
                                  Siemens and Halske T52 Cipher Machines   141--146
                Ernst S. Selmer   The Norwegian Modifications of the
                                  Siemens and Halske T52e Cipher Machines  147--149
                     David Kahn   From the Archives: a Real Fake Message   150--152
                    Frank Rubin   Comments on ``Cryptanalysis of Knapsack
                                  Ciphers Using Genetic Algorithms'' . . . 153--154
                   Terry Ritter   Estimating Population from Repetitions
                                  in Accumulated Random Samples  . . . . . 155--190

Cryptologia
Volume 18, Number 3, July, 1994

                     David Mead   The Breaking of the Japanese Army
                                  Administrative Code  . . . . . . . . . . 193--203
        Boris C. W. Hagelin and   
                     David Kahn   The Story of the Hagelin Cryptos . . . . 204--242
                    C. G. McKay   From the archives: Arvid Damm makes an
                                  offer  . . . . . . . . . . . . . . . . . 243--249
                     Louis Kruh   The Postal Service Fails to Deliver the
                                  Goods  . . . . . . . . . . . . . . . . . 250--252
            John M. Carroll and   
                   Sri Nurdiati   On Weak Keys and Weak Data: Foiling the
                                  Two Nemeses  . . . . . . . . . . . . . . 253--280
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 281--287

Cryptologia
Volume 18, Number 4, October, 1994

               Ravi Ganesan and   
                Alan T. Sherman   Statistical Techniques for Language
                                  Recognition: An Empirical Study Using
                                  Real and Simulated English . . . . . . . 289--331
                   John C. King   An Algorithm for the Complete Automated
                                  Cryptanalysis of Periodic Polyalphabetic
                                  Substitution Ciphers . . . . . . . . . . 332--355
            William J. Corcoran   A Multiloop Vigen\`ere Cipher with
                                  Exceptionally Long Component Series  . . 356--371
              Chuan-Ming Li and   
             Tzonelih Hwang and   
                   Narn-Yih Lee   Conspiracy Attacks on the Threshold RSA
                                  Signature Scheme . . . . . . . . . . . . 372--380
                     Louis Kruh   A Pictorial Tour of the National
                                  Cryptologic Museum . . . . . . . . . . . 381--389
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 390--398


Cryptologia
Volume 19, Number 1, January, 1995

                      Jim Reeds   William F. Friedman's Transcription of
                                  the Voynich Manuscript . . . . . . . . . 1--23
                     Louis Kruh   When a Court Ruled for Bacon Instead of
                                  Shakespeare --- Temporarily  . . . . . . 24--38
               Donald W. Davies   The Lorenz Cipher Machine SZ42 . . . . . 39--61
                Robin Denniston   Fetterlein and Others  . . . . . . . . . 62--64
                  A. Ray Miller   The Cryptographic Mathematics of Enigma  65--80
                  Ralph Erskine   Ultra and Some U. S. Navy Carrier
                                  Operations . . . . . . . . . . . . . . . 81--96

Cryptologia
Volume 19, Number 2, 1995

                 Edward J. Drea   Were the Japanese Army Codes Secure? . . 113--136
                 C. A. Deavours   The Autoscritcher  . . . . . . . . . . . 137--148
                      Anonymous   In Memoriam: Solomon Kullback  . . . . . 149--150
                     David Kahn   The Cryptologic Origin of Braille  . . . 151--152
              Karl de Leeuw and   
              Hans van der Meer   A Turning Grille from the Ancestral
                                  Castle of the Dutch Stadtholders . . . . 153--165
                     David Kahn   Enemy Codes and Their Solution . . . . . 166--197
             Horng-Twu Liaw and   
                 Chin-Laung Lei   An Efficient Password Authentication
                                  Scheme Based on a Unit Circle  . . . . . 198--208
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 209--215

Cryptologia
Volume 19, Number 3, 1995

            Stephen Schlesinger   Cryptanalysis for Peacetime:
                                  Codebreaking and the Birth and Structure
                                  of the United Nations  . . . . . . . . . 217--235
                    Louis Kruth   Riverbank Laboratory Correspondence,
                                  1919 (SRH-50)  . . . . . . . . . . . . . 236--246
         Michael van der Meulen   The Book Cipher System of the \em
                                  Wehrmacht  . . . . . . . . . . . . . . . 247--260
                  David Alvarez   A Dutch Enciphered Code  . . . . . . . . 261--264
                Thomas Jakobsen   A Fast Method for Cryptanalysis of
                                  Substitution Ciphers . . . . . . . . . . 265--274
                    Frank Rubin   The Quadratic and Double Quadratic
                                  Residue Ciphers  . . . . . . . . . . . . 275--284
                   Peter Wayner   Strong Theoretical Steganography . . . . 285--299
                    Louis Kruth   Reviews and Things Cryptologic . . . . . 300--318
                      Anonymous   Change and Structure . . . . . . . . . . 319--320

Cryptologia
Volume 19, Number 4, 1995

                 Ralph E. Weber   Seward's Other Folly: the Fight over
                                  America's First Encrypted Cable  . . . . 321--348
         Michael van der Meulen   Werftschlüssel: a German Navy Hand Cipher
                                  System Part I  . . . . . . . . . . . . . 349--364
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 365--374
                    Tom Johnson   The Mystery of an Old Japanese Codebook  380--384
                 David W. Gaddy   The Cylinder-Cipher  . . . . . . . . . . 385--391
                   Mike Johnson   Cryptology in Cyberspace . . . . . . . . 392--396
                    Frank Rubin   Message Authentication Using Quadratic
                                  Residues . . . . . . . . . . . . . . . . 397--404
              James J. Gillogly   Ciphertext-Only Cryptanalysis of Enigma  405--413


Cryptologia
Volume 20, Number 1, 1996

                  David Alvarez   Italian Diplomatic Cryptanalysis in
                                  World War I  . . . . . . . . . . . . . . 1--10
             Friedrich L. Bauer   Cryptological Devices and Machines in
                                  the Deutsches Museum, Munich . . . . . . 11--13
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 14--36
         Michael van der Meulen   Werftschlüssel: a German Navy Hand Cipher
                                  System Part II . . . . . . . . . . . . . 37--54
                  Charles David   A World War II German Army Field Cipher
                                  and How We Broke It  . . . . . . . . . . 55--76
             Edward F. Schaefer   A Simplified Data Encryption Standard
                                  Algorithm  . . . . . . . . . . . . . . . 77--84
               Andrew Clark and   
                  Ed Dawson and   
                   Helen Bergen   Combinatorial Optimization and the
                                  Knapsack Cipher  . . . . . . . . . . . . 85--93

Cryptologia
Volume 20, Number 2, 1996

                  David Alvarez   Faded Lustre: Vatican Cryptography,
                                  1815--1920 . . . . . . . . . . . . . . . 97--131
             Augusto Buonafalce   The Alberti Exhibition . . . . . . . . . 132--134
               Rebecca Ratcliff   Cryptology and World War II: NSA's 1995
                                  History Symposium  . . . . . . . . . . . 135--140
         Michael van der Meulen   Reihenschieber . . . . . . . . . . . . . 141--154
                    Greg Mellen   Some Adventures in Cryptoland  . . . . . 155--164
                  E. Dawson and   
                     L. Nielsen   Automated Cryptanalysis of XOR Plaintext
                                  Strings  . . . . . . . . . . . . . . . . 165--181
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 183--191

Cryptologia
Volume 20, Number 3, 1996

               Prescott Currier   My ``Purple'' Trip to England in 1941    193--201
         Michael van der Meulen   Cryptology in the Early Bundesrepublik   202--222
            Thomas (Penn) Leary   Cryptology in the 15th and 16th Century  223--242
              Solomon W. Golomb   On Factoring Jevons' Number  . . . . . . 243--246
                    Frank Rubin   Designing a High-Security Cipher . . . . 247--257
             Howard M. Heys and   
            Stafford E. Tavares   Cryptanalysis of
                                  Substitution-Permutation Networks Using
                                  Key-Dependent Degeneracy . . . . . . . . 258--274
                 Subhash C. Kak   An Indus--Sarasvat\=\i Signboard . . . . 275--279
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 280--288

Cryptologia
Volume 20, Number 4, 1996

                David Whitehead   Cobra and Other Bombes . . . . . . . . . 289--307
                  Harry Hinsley   The Counterfactual History of No Ultra   308--324
          James J. Gillogly and   
                 Larry Harnisch   Cryptograms from the Crypt . . . . . . . 325--329
                  Ralph Erskine   Kriegsmarine Signal Indicators . . . . . 330--340
                     David Kahn   Some Early Hungarian Communist Ciphers   347--358
                    Frank Rubin   One-Time Pad Cryptography  . . . . . . . 359--364
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 365--380


Cryptologia
Volume 21, Number 1, 1997

                    Peter Pesic   François Vi\`ete, Father of Modern
                                  Cryptanalysis --- Two New Manuscripts    1--29
                 John Cary Sims   The Brusa Agreement of May 17, 1943  . . 30--38
David Schimmelpenninck van der Oye   A First Look at Russia's Codebreakers: a
                                  Book Review  . . . . . . . . . . . . . . 39--41
                  Ralph Erskine   The First Naval Enigma Decrypts of World
                                  War II . . . . . . . . . . . . . . . . . 42--46
                 David H. Hamer   Enigma: Actions Involved in the 'Double
                                  Stepping' of the Middle Rotor  . . . . . 47--50
              Jacques B. M. Guy   The Distribution of Signs \em c and \em
                                  o in the Voynich Manuscript: Evidence
                                  for a real language? . . . . . . . . . . 51--54
                C. C. Chang and   
                  J. K. Jan and   
                    H. C. Kowng   A Digital Signature Scheme Based upon
                                  the Theory of Quadratic Residues . . . . 55--70
                 Paul Constance   How Jim Bamford Probed the NSA . . . . . 71--74
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 75--92
                 George Sassoon   British Company Makes PGP Easier to Use  93--94

Cryptologia
Volume 21, Number 2, 1997

                 Aviel D. Rubin   An Experience Teaching a Graduate Course
                                  in Cryptography  . . . . . . . . . . . . 97--109
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 110--128
               Andrew Clark and   
                      Ed Dawson   A Parallel Genetic Algorithm for
                                  Cryptanalysis of the Polyalphabetic
                                  Substitution Cipher  . . . . . . . . . . 129--138
                 H. F. Chau and   
                       H.-K. Lo   One-Way Functions in Reversible
                                  Computations . . . . . . . . . . . . . . 139--148
                   Norman Scott   Solving Japanese Naval Ciphers 1943--45  149--157
                     David Kahn   British Economic Espionage . . . . . . . 158--164
                      Anonymous   German Wireless Intercept Organization   165--190

Cryptologia
Volume 21, Number 3, 1997

                 C. A. Deavours   Lobsters, Crabs, and the Abwehr Enigma   193--199
         Michael van der Meulen   Bundeswehrtarnverfahren  . . . . . . . . 200--217
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 218--236
             Thomas R. Cain and   
                Alan T. Sherman   How to Break Gifford's Cipher  . . . . . 237--286

Cryptologia
Volume 21, Number 4, 1997

              Stephen J. Kelley   The SIGCUM Story: Cryptographic Failure,
                                  Cryptologic Success  . . . . . . . . . . 289--316
                   Neal Koblitz   Cryptography As a Teaching Tool  . . . . 317--326
               Nara-Yih Lee and   
                 Tzonelih Hwang   On the Security of Park et al.'s Key
                                  Distribution Protocol for Digital Mobile
                                  Communications . . . . . . . . . . . . . 327--334
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 335--349
               Caxton C. Foster   Drawbacks of the One-Time Pad  . . . . . 350--352
              H. Paul Greenough   Cryptanalysis of the Swedish HC-9: a
                                  Known-Plaintext Approach . . . . . . . . 353--367
Lieutenant Commander I. W. Comstock   Radio Intelligence and Security  . . . . 368--377


Cryptologia
Volume 22, Number 1, 1998

                     David Kahn   Soviet Comint in the Cold War  . . . . . 1--24
                  Frode Weierud   Sweden Cryptographic Superpower: a Book
                                  Review . . . . . . . . . . . . . . . . . 25--28
                    Colin Burke   A Gracious but Tragic Special Ultra
                                  Message  . . . . . . . . . . . . . . . . 29--32
         Michael van der Meulen   A First German Cryptologic Exhibition    33--48
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 49--55
            A. A. Moldovyan and   
                N. A. Moldovyan   Software Encryption Algorithms for
                                  Transparent Protection Technology  . . . 56--68
             Franz-Peter Heider   A Colossal Fish  . . . . . . . . . . . . 69--95

Cryptologia
Volume 22, Number 2, 1998

                     Louis Kruh   Still Waiting to Be Solved: Elgar's 1897
                                  Cipher Message . . . . . . . . . . . . . 97--98
               Graydon A. Lewis   Setting the Record Straight on Midway    99--101
                      Anonymous   Elementary Cipher Solution . . . . . . . 102--120
             Randall K. Nichols   The Bible Code . . . . . . . . . . . . . 121--133
            A. A. Moldovyan and   
                N. A. Moldovyan   Flexible Block Cipher with Provably
                                  Inequivalent Cryptalgorithm
                                  Modifications  . . . . . . . . . . . . . 134--140
         Michael van der Meulen   The Road to German Diplomatic Ciphers
                                  --- 1919 to 1945 . . . . . . . . . . . . 141--166
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 167--191

Cryptologia
Volume 22, Number 3, 1998

       Kenneth A. Mendelson and   
          Stephen T. Walker and   
                Joan D. Winston   The Evolution of Recent Cryptographic
                                  Policy in the United States  . . . . . . 193--210
             David H. Hamer and   
             Geoff Sullivan and   
                  Frode Weierud   Enigma Variations: an Extended Family of
                                  Machines . . . . . . . . . . . . . . . . 211--229
               Emanuele Viterbo   The Ciphered Autobiography of a 19th
                                  Century Egyptologist . . . . . . . . . . 231--243
                   Thomas Kelly   The Myth of the Skytale  . . . . . . . . 244--260
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 261--265
                Don Coppersmith   Attacking Four-Round Luby--Rackoff
                                  Ciphers  . . . . . . . . . . . . . . . . 266--278
                 A. Kourtis and   
                   Ch. Mantakas   Statistical Distribution of Delta
                                  Modulated Speech Signals as a Means for
                                  Cryptanalysis in Voice Encryption
                                  Systems  . . . . . . . . . . . . . . . . 279--287

Cryptologia
Volume 22, Number 4, 1998

                      Jim Reeds   Solved: the Ciphers in Book III of
                                  Trithemius's Steganographia  . . . . . . 291--317
                   Thomas Ernst   The Numerical--Astrological Ciphers in
                                  the Third Book of Trithemius's
                                  Steganographia . . . . . . . . . . . . . 318--341
David Schimmelpenninck van der Oye   Tsarist Codebreaking: Some Background
                                  and Some Examples  . . . . . . . . . . . 342--353
               Paul N. Pfeiffer   Breaking the German Weather Ciphers in
                                  the Mediterranean Detachment G, 849th
                                  Signal Intelligence Service  . . . . . . 354--369
                     Louis Kruh   Another Herbert O. Yardley Mystery?  . . 370--375
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 376--379


Cryptologia
Volume 23, Number 1, 1999

             Samuel J. Lomonaco   A Quick Glance at Quantum Cryptography   1--41
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 42--54
                      Jim Reeds   Breakthrough in Renaissance
                                  Cryptography: a Book Review  . . . . . . 59--62
                     David Kahn   Students Better Than a Pro (Bazeries)
                                  and an Author (Candela)  . . . . . . . . 63--64
                  Ralph Erskine   Kriegsmarine Short Signal Systems ---
                                  and how Bletchley Park Exploited Them    65--92

Cryptologia
Volume 23, Number 2, 1999

              Stephen Budiansky   A Tribute to Cecil Phillips---and
                                  Arlington Hall's ``Meritocracy'' . . . . 97--107
               Donald W. Davies   The Bombe: a Remarkable Logic Machine    108--138
              H. Paul Greenough   Cryptanalysis of the Hagelin C-52 and
                                  Similar Machines a Known Plaintext
                                  Attack . . . . . . . . . . . . . . . . . 139--156
          Stephen T. Walker and   
                Joan D. Winston   Cryptography Policy Update . . . . . . . 157--163
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 171--188

Cryptologia
Volume 23, Number 3, 1999

                 Heinz Ulbricht   Enigma-Uhr . . . . . . . . . . . . . . . 193--205
             Friedrich L. Bauer   An Error in the History of Rotor
                                  Encryption Devices . . . . . . . . . . . 206--210
          John J. G. Savard and   
            Richard S. Pekelney   The ECM Mark II: Design, History, and
                                  Cryptology . . . . . . . . . . . . . . . 211--228
               Donald W. Davies   Effectiveness of the Diagonal Board  . . 229--239
         Michael van der Meulen   German Air Force Signal Intelligence
                                  1956: a Museum of Comint and Sigint  . . 240--256
             Craig Graham McKay   Swedish Cryptanalysis and the Saga of
                                  Arne Beurling: a Book Review . . . . . . 257--258
                     Louis Kruh   Vint Hill Farms Station  . . . . . . . . 259--260
                      Axel Roch   Biopolitics and Intuitive Algebra in the
                                  Mathematization of Cryptology? a Review
                                  of Shannon's ``A Mathematical Theory of
                                  Cryptography'' from 1945 . . . . . . . . 261--266
                    J. H. Ellis   The History of Non-Secret Encryption . . 267--273
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 274--286

Cryptologia
Volume 23, Number 4, 1999

              Alexander Hagerty   An Unpublished Yardley Manuscript  . . . 289--297
                 David M. Smith   The Use of Decrypted German Weather
                                  Reports in the Operations of the
                                  Fifteenth Air Force over Europe  . . . . 298--304
             Robert L. Williams   A Note on the Voynich Manuscript . . . . 305--309
             Geoff Sullivan and   
                  Frode Weierud   The Swiss NEMA Cipher Machine  . . . . . 310--328
          Stephen T. Walker and   
                Joan D. Winston   Cryptography Policy Update . . . . . . . 329--342
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 343--352
                  Ridley Mclean   Naval Communications . . . . . . . . . . 353--379


Cryptologia
Volume 24, Number 1, 2000

                Brian J. Winkel   Annual Greg Mellen Memorial Cryptology
                                  Scholarship Prize  . . . . . . . . . . . 1--3
                 Heidi Williams   Applying Statistical Language
                                  Recognition Techniques in the
                                  Ciphertext-Only Cryptanalysis of Enigma  4--17
                 Bruce Schneier   A Self-Study Course in Block-Cipher
                                  Cryptanalysis  . . . . . . . . . . . . . 18--33
              Hideki Sawada and   
                   Takahiro Abe   Groups and RSA Cryptosystems . . . . . . 34--40
                 David H. Hamer   G-312: an Abwehr Enigma  . . . . . . . . 41--54
               Philip Marks and   
                  Frode Weierud   Recovering the Wiring of Enigma's
                                  Umkehrwalze A  . . . . . . . . . . . . . 55--66
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 67--93

Cryptologia
Volume 24, Number 2, 2000

                  Ralph Erskine   What Did the Sinkov Mission Receive from
                                  Bletchley Park?  . . . . . . . . . . . . 97--109
             Philip H. Jacobsen   A Cryptologic Veteran's Analysis of
                                  ``Day of Deceit'' --- a Book Review  . . 110--118
              Stephen Budiansky   Closing the Book on Pearl Harbor . . . . 119--130
               Donald W. Davies   An Unidentified Cipher Device  . . . . . 131--134
            Lars R. Knudsen and   
                 Vincent Rijmen   Ciphertext-Only Attack on Akelarre . . . 135--147
             Chih-Hung Wang and   
                 Tzonelih Hwang   $ (t, m) $ Threshold and Generalized
                                  ID-based Conference Key Distribution
                                  System . . . . . . . . . . . . . . . . . 148--159
            Rebecca A. Ratcliff   Cryptology Through the Centuries: NSA's
                                  1999 History Symposium . . . . . . . . . 160--167
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 168--189

Cryptologia
Volume 24, Number 3, 2000

                    Peter Pesic   The Clue to the Labyrinth: Francis Bacon
                                  and the Decryption of Nature . . . . . . 193--211
            Frederick D. Parker   How OP-20-G Got Rid of Joe Rochefort . . 212--234
              Thomas R. Hammant   Russian and Soviet Cryptology I --- Some
                                  Communications Intelligence in Tsarist
                                  Russia . . . . . . . . . . . . . . . . . 235--249
              Chuan-Ming Li and   
             Tzonelih Hwang and   
               Narn-Yih Lee and   
                 Juin-Jang Tsai   $ (t, n) $ Threshold-Multisignature
                                  Scheme and Generalized-Multisignature
                                  Scheme where Suspected Forgery Implies
                                  Traceability of Adversarial Shareholders 250--268
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 269--286

Cryptologia
Volume 24, Number 4, 2000

                Stephen Huffman   The Navajo Code Talkers: a Cryptologic
                                  and Linguistic Perspective . . . . . . . 289--320
                    Craig McKay   From the Archives: Japanese Fears and
                                  the Ironies of Interception  . . . . . . 321--323
                 Cecil Phillips   The American Solution of a German
                                  One-Time-Pad Cryptographic System
                                  (G-OTP)  . . . . . . . . . . . . . . . . 324--332
              Thomas R. Hammant   II --- the Magdeburg Incident: the
                                  Russian View . . . . . . . . . . . . . . 333--338
              John R. Schindler   A Hopeless Struggle: Austro-Hungarian
                                  Cryptology During World War I  . . . . . 339--350
                    Colin Burke   Letter to the Editor . . . . . . . . . . 351--352
              Shahrokh Saeednia   How to Make the Hill Cipherh Secure  . . 353--360
               Russell Atkinson   David Brian Kern: Theft of Trade Secrets 361--369


Cryptologia
Volume 25, Number 1, 2001

                 Alan M. Turing   Visit to National Cash Register
                                  Corporation of Dayton, Ohio  . . . . . . 1--10
                 Lee A. Gladwin   Alan Turing's Visit to Dayton  . . . . . 11--17
                  Michael Rubin   The Telegraph, Espionage, and Cryptology
                                  in Nineteenth Century Iran . . . . . . . 18--36
               Viviana I. Risca   DNA-Based Steganography  . . . . . . . . 37--49
              Thomas R. Hammant   Russian and Soviet Cryptology III ---
                                  Soviet Comint and the Civil War,
                                  1918--1921 . . . . . . . . . . . . . . . 50--60
              Thomas R. Hammant   Russian and Soviet Cryptology IV ---
                                  Some Incidents in the 1930's . . . . . . 61--63
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 64--79

Cryptologia
Volume 25, Number 2, 2001

                 Peter Ibbotson   Sayers and Ciphers . . . . . . . . . . . 81--87
                    Colin Burke   Kim Philby, the American Intelligence
                                  Community, and OP-20-G: the Fox Built
                                  the Hen-House and Took the Keys  . . . . 88--90
               Jonathan Winkler   From the Archives: Early Corporate
                                  Espionage amid World War I Censorship    91--94
                    Ben Johnsen   Cryptography in Runic Inscriptions: a
                                  Remark on the Article, ``Cryptography in
                                  Runic Inscriptions,'' by O. G. Landsverk 95--100
                   Philip Marks   Umkehrwalze D: Enigma's Rewirable
                                  Reflector --- Part I . . . . . . . . . . 101--141
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 142--159

Cryptologia
Volume 25, Number 3, 2001

                      Anonymous   The Glow-Lamp Ciphering and Deciphering
                                  Machine: Enigma  . . . . . . . . . . . . 161--173
                      Anonymous   The Noncryptanalytic Headaches of
                                  Cryptanalysts  . . . . . . . . . . . . . 174--176
                Philip C. Marks   Umkehrwalze D: Enigma's Rewirable
                                  Reflector --- Part II  . . . . . . . . . 177--212
     J. C. Hernández and   
               A. Ribagorda and   
                   P. Isasi and   
                   J. M. Sierra   Genetic Algorithms Can Be Used to Obtain
                                  Good Linear Congruential Generators  . . 213--229
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 230--239

Cryptologia
Volume 25, Number 4, 2001

              Stephen Budiansky   Codebreaking with IBM Machines in World
                                  War II . . . . . . . . . . . . . . . . . 241--255
                  Karl de Leeuw   Johann Friedrich Euler (1741--1800):
                                  Mathematician and Cryptologist at the
                                  Court of the Dutch Stadholder William V  256--274
                Gabriel Landini   Evidence of Linguistic Structure in the
                                  Voynich Manuscript Using Spectral
                                  Analysis . . . . . . . . . . . . . . . . 275--295
                Philip C. Marks   Umkehrwalze D: Enigma's Rewirable
                                  Reflector --- Part III . . . . . . . . . 296--310
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 311--317


Cryptologia
Volume 26, Number 1, 2002

                 Louis Kruh and   
                Cipher Deavours   The Commercial Enigma: Beginnings of
                                  Machine Cryptography . . . . . . . . . . 1--16
                  Donald Michie   Colossus and the Breaking of the Wartime
                                  ``Fish'' Codes . . . . . . . . . . . . . 17--58
                     Louis Kruh   The World of Codes and Ciphers at the
                                  Heinz Nixdorf Museumsforum . . . . . . . 59--67
   Meenakshi Gnanaguruparan and   
                    Subhash Kak   Recursive Hiding of Secrets in Visual
                                  Cryptography . . . . . . . . . . . . . . 68--76
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 77--79

Cryptologia
Volume 26, Number 2, 2002

         Georg Glünder and   
                  Paul Whitaker   Wireless and ``Geheimschreiber''
                                  Operator in the War, 1941--1945  . . . . 81--96
                 Geoff Sullivan   The ECM Mark II: Some Observations on
                                  the Rotor Stepping . . . . . . . . . . . 97--100
                        H. Koot   Expert's Opinion on the Enigma Ciphering
                                  Machine  . . . . . . . . . . . . . . . . 101--102
                 Keith P. Clive   The Battle of the Seals  . . . . . . . . 103--112
                  Bengt Beckman   An Early Cipher Device: Fredrik
                                  Gripenstierna's Machine  . . . . . . . . 113--123
                      Anonymous   Britain Reveals Its Bombe to America
                                  from the Archives  . . . . . . . . . . . 124--128
         Raphael Chung-Wei Phan   Further Notes for a Self-Study Course in
                                  Block-Cipher Cryptanalysis . . . . . . . 129--137
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 138--158

Cryptologia
Volume 26, Number 3, 2002

                     David Kahn   A Riverbank Trove  . . . . . . . . . . . 161--164
              William Stallings   The Advanced Encryption Standard . . . . 165--188
                 Howard M. Heys   A Tutorial on Linear and Differential
                                  Cryptanalysis  . . . . . . . . . . . . . 189--221
                 Henry B. Wolfe   Non-Cryptanalytic Attacks  . . . . . . . 222--234
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 235--239

Cryptologia
Volume 26, Number 4, 2002

                      Anonymous   Codetalkers Recognition not Just the
                                  Navajos  . . . . . . . . . . . . . . . . 241--256
                 Geoff Sullivan   Cryptanalysis of Hagelin Machine Pin
                                  Wheels . . . . . . . . . . . . . . . . . 257--273
                Craig Bauer and   
           Christian N. S. Tate   A Statistical Attack on the Running Key
                                  Cipher . . . . . . . . . . . . . . . . . 274--282
         Raphael Chung-Wei Phan   Mini Advanced Encryption Standard
                                  (Mini-AES): a Testbed for Cryptanalysis
                                  Students . . . . . . . . . . . . . . . . 283--306
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 307--317


Cryptologia
Volume 27, Number 1, 2003

                Wes Freeman and   
             Geoff Sullivan and   
                  Frode Weierud   Purple Revealed: Simulation and
                                  Computer-Aided Cryptanalysis of Angooki
                                  Taipu B  . . . . . . . . . . . . . . . . 1--43
                 Alan M. Turing   Critique of ``Running Short Cribs on the
                                  U. S. Navy Bombe'' . . . . . . . . . . . 44--49
                 Lee A. Gladwin   Alan M. Turing's Critique of Running
                                  Short Cribs on the US Navy Bombe . . . . 50--54
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 55--72
                  Karl de Leeuw   The Dutch Invention of the Rotor
                                  Machine, 1915--1923  . . . . . . . . . . 73--94

Cryptologia
Volume 27, Number 2, 2003

                 David H. Hamer   The Enigmas --- and Other Recovered
                                  Artefacts --- of U-85  . . . . . . . . . 97--110
                  Ralph Erskine   From the Archives: What the Sinkov
                                  Mission Brought to Bletchley Park  . . . 111--118
                 R. A. Ratcliff   How Statistics Led the Germans to
                                  Believe Enigma Secure and Why They Were
                                  Wrong: Neglecting the Practical
                                  Mathematics of Cipher Machines . . . . . 119--131
             Augusto Buonafalce   From the Skytale to the Enigma: Book
                                  Review . . . . . . . . . . . . . . . . . 132--134
                    James David   Soviet Secrets in the Ether ---
                                  Clandestine Radio Stations at the New
                                  York and San Francisco Consulates in
                                  World War II . . . . . . . . . . . . . . 135--147
           Mohammad A. Musa and   
         Edward F. Schaefer and   
                  Stephen Wedig   A Simplified AES Algorithm and Its
                                  Linear and Differential Cryptanalyses    148--177
                Brian J. Winkel   Extraordinary Cryptology Collection  . . 180--181
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 182--191

Cryptologia
Volume 27, Number 3, 2003

             Philip H. Jacobsen   Foreknowledge of Pearl Harbor? No!: the
                                  Story of the US Navy's Efforts on JN-25B 193--205
                 Niels Faurholt   Urkryptografen (``The Clock
                                  Cryptograph'') . . . . . . . . . . . . . 206--208
               Dorothy Clarkson   Cypher Machines Maintenance and
                                  Restoration Spanning Sixty Years . . . . 209--216
             Francine F. Abeles   The Memoria Technica Cipher  . . . . . . 217--229
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 230--232
              Rose Mary Sheldon   The Sator Rebus: an Unsolved Cryptogram? 233--287

Cryptologia
Volume 27, Number 4, 2003

              Ralph Erskine and   
                  Peter Freeman   Brigadier John Tiltman: One of Britain's
                                  Finest Cryptologists . . . . . . . . . . 289--318
           Francesco Fabris and   
                   Myron Curtis   A Nomenclator Used by Propaganda Fide
                                  During the Chinese Rites Controversy . . 319--338
         Joachim von zur Gathen   Claude Comiers: the First Arithmetical
                                  Cryptography . . . . . . . . . . . . . . 339--349
               Bob Anderson and   
                George McGinnis   Naval Security Group Command Display . . 350--360
         Raphael Chung-Wei Phan   Impossible Differential Cryptanalysis of
                                  Mini-AES . . . . . . . . . . . . . . . . 361--374
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 375--378
                     Louis Kruh   The Shakespeare--Bacon Controversy
                                  Continues on the Stage . . . . . . . . . 379--380


Cryptologia
Volume 28, Number 1, January, 2004

                     David Kahn   Charles J. Mendelsohn and Why I Envy Him 1--17
         Urban Zetterström   Swedish SA Teleprinter Cipher System . . 18--30
                    Gordon Rugg   An Elegant Hoax? A Possible Solution to
                                  the Voynich Manuscript . . . . . . . . . 31--46
                      Anonymous   Enigma and Friends Exhibit: Bletchley
                                  Park Exhibit Opens . . . . . . . . . . . 47--49
               Martin Kochanski   The Comedy of Commercial Encryption
                                  Software . . . . . . . . . . . . . . . . 50--54
                  Stuart Savory   Pocket Enigma: The Review  . . . . . . . 55--59
                     Louis Kruh   Reviews and Things Cryptologic: Kruh,
                                  David. Riverbank: The Trial of William
                                  Shakespeare, a play. Eldridge Publishing
                                  Co., P. O. Box 14367, Tallahassee FL
                                  32317 USA. 2003. 70 pp. \$6.50};
                                  {Jackson, John, Ed. {\em The secret War
                                  of Hut 3: The First Story of How
                                  Intelligence from Enigma Signals Decoded
                                  at Bletchley Park Was Used During World
                                  War II}. The Military Press, 1 Gallagher
                                  Close, Milton Keynes MK8 01Q UK. 2002.
                                  115 pp. 8 1/2in by 11 3/4in. Hardback
                                  25.00/839.30; Paperback \pounds
                                  15.00\slash \$23.60.0 pp. \$24.95};
                                  {Kennedy, Shawn. {\em Funny
                                  Cryptograms}. Sterling Publishing Co.,
                                  387 Park Ave. South, New York NY
                                  10016-8810 USA. 2003. 96 pp. \$6.95;
                                  Petitcolas, Fabien A. P., Editor. \em
                                  Information Hiding. 5th International
                                  Workshop, Noordwijkerhout, The
                                  Netherlands, Oct., 2000.
                                  Springer-Verlag, 175 Fifth Ave., New
                                  York NY 10010 USA. 2003. 427 pp.
                                  \$69.00}; {Boyd, Colin and Anish
                                  Mathuria. {\em Protocols for
                                  Authentication and Key Establishment}.
                                  Springer-Verlag, 175 Fifth Avenue, New
                                  York, NY 10010 USA. 2003. 321 pp.
                                  \$54.95; Smith, Sarah. \em Chasing
                                  Shakespeare. Atria Books, 1230 Avenue of
                                  the America, New York NY 10020 USA.
                                  2003. 337 pp. \$24.00}; {Farago,
                                  Ladislas. {\em Burn After Reading: The
                                  Espionage History of World War II}.
                                  Naval Institute Press, 291 Wood Road,
                                  Annapolis MD 21402 USA. 2003 reprint.
                                  319 pp. \$18.95  . . . . . . . . . . . . 60--95

Cryptologia
Volume 28, Number 2, April, 2004

                  Joshua Holden   A Comparison of Cryptography Courses . . 97--111
                     Louis Kruh   Unknown German World War II Cipher
                                  Device . . . . . . . . . . . . . . . . . 112--114
               Michael J. Cowan   Rasterschlüssel 44 --- The Epitome of
                                  Hand Field Ciphers . . . . . . . . . . . 115--148
                  John Lawrence   The Versatility of Rejewski's Method:
                                  Solving for the Wiring of the Second
                                  Rotor  . . . . . . . . . . . . . . . . . 149--152
               Arturo Quirantes   Model Z: a Numbers-Only Enigma Version   153--156
                  Lisa Driskell   Wavelet-based Steganography  . . . . . . 157--174
                     Louis Kruh   Reviews and Things Cryptologic: Jackson,
                                  John, Ed. \em The Secret War of Hut 3:
                                  The First Story of How Intelligence from
                                  Enigma Signals Decoded at Bletchley Park
                                  Was Used During World War II. The
                                  Military Press, 1 Gallagher Close,
                                  Milton Keynes MK8 01Q, United Kingdom.
                                  2002, 115 pp., 8 1/2in by 11 3/4in.
                                  Hardback \pounds 25.00/\$39.30;
                                  Paperback \pounds15.00\slash \$23.60;
                                  Carter, Philip and Ken Russell. \em
                                  Brain Sizzlers. Sterling Publishing Co.,
                                  Inc., 387 Park Avenue South, New York NY
                                  10016-8810 USA. 2003. 304 p. \$5.95};
                                  {Jenkins, Gerald and Magdalen Bear. {\em
                                  Codes and Ciphers: Clever Devices for
                                  Coding and Decoding to cut out and
                                  make}. Parkwest Publications Inc., P. O.
                                  Box 20261, New York NY 10025 USA. 2003.
                                  32 pp. \$12.00; Jenkins, Gerald and Anne
                                  Wild. \em Be a Codebreaker! Mystery
                                  messages to puzzle over and decipher.
                                  Parkwest Publications Inc., P. O. Box
                                  20261, New York NY 10025 USA. 2003. 32
                                  pp. \$10.00}; {Praham, Jill. {\em So
                                  Power Can Be Brought into Play: SIGINT
                                  and the Pusan Perimeter}. Center for
                                  Cryptologic History, National Security
                                  Agency, 9800 Savage Road, Fort Meade MD
                                  20755-6886 USA. 2000. 18 pp}; {Nickles,
                                  David Paull. {\em Under the Wire: How
                                  the Telegraph Changed Diplomacy}.
                                  Harvard University Press, Cambridge MA
                                  02138 USA. 2003. 265 pp. \$30.95; Mowry,
                                  David P. \em German Cipher Machines of
                                  World War II. Center for Cryptologic
                                  History, National Security Agency, 9800
                                  Savage Road, Fort Meade MD 20755-6886
                                  USA. 2003. 32 pp; Myers, Katherine. \em
                                  Codebreaker. Salvo Press, 61428 Elder
                                  Ridge Street, Bend OR 97702 USA. 2000.
                                  289 pp. \$16.95 paperback}; {Mao, Wenbo.
                                  {\em Modern Cryptography: Theory and
                                  Practice}. Pearson Education, Prentice
                                  Hall Professional Technical Reference,
                                  Upper Saddle River NJ 07458 USA. 2004.
                                  707 pp. \$54.99  . . . . . . . . . . . . 175--190

Cryptologia
Volume 28, Number 3, July, 2004

                       Jan Bury   Polish Codebreaking During the
                                  Russo--Polish War of 1919--1920  . . . . 193--203
                      Mike Koss   The Paper Enigma Machine . . . . . . . . 204--210
              Ralph Erskine and   
                   Philip Marks   Naval Enigma: Seahorse and Other
                                  Kriegsmarine Cipher Blunders . . . . . . 211--241
                     Louis Kruh   Reviews and Things Cryptologic: Mohamad
                                  Mrayati, Yahya Meer Alain, and M. Hassan
                                  al-Tayyan, Eds. \em Ibn Adlan's
                                  Treatise: A Manual on Cryptanalysis
                                  written for King alAsraf. Volume Two of
                                  Series, Arabic Origins of Cryptology.
                                  King Faisal Center for Research and
                                  Islamic Studies, P. O. Box 51049, Riyadh
                                  11543, SAUDI ARABIA. 2003. 113 pp.
                                  \$15.00} . . . . . . . . . . . . . . . . 242--252
             Augusto Buonafalce   Sir Samuel Morland's Machina Cyclologica
                                  Cryptographica . . . . . . . . . . . . . 253--264
José Ramón Soler Fuensanta   Mechanical Cipher Systems in the Spanish
                                  Civil War  . . . . . . . . . . . . . . . 265--276
                Graham A. Niblo   The University of Southampton National
                                  Cipher Challenge . . . . . . . . . . . . 277--286
                      Anonymous   Correction: \em Model Z: A Numbers-Only
                                  Enigma Version, Arturo Quirantes, Volume
                                  XXVII, Number 2, pp. 153--156, April
                                  2004 . . . . . . . . . . . . . . . . . . ??

Cryptologia
Volume 28, Number 4, October, 2004

              Joseph E. Richard   The Breaking of the Japanese Army's
                                  Codes  . . . . . . . . . . . . . . . . . 289--308
         Joachim von zur Gathen   Friederich Johann Buck: Arithmetic
                                  Puzzles in Cryptography  . . . . . . . . 309--324
                  Peter Donovan   The Flaw in the JN25 Series of Ciphers   325--340
           Damien Stehlé   Breaking Littlewood's cipher . . . . . . 341--357
Mahmood Khalel Ibrahem Al-Ubaidy   Black-Box Attack Using Neuro-Identifier  358--372
                     Louis Kruh   Reviews and Things Cryptologic: Young,
                                  Adam L. and Moti Yung. Malicious
                                  Cryptography: Exposing Cryptovirology.
                                  Wiley Publishing, Inc., 10475 Crosspoint
                                  Blvd., Indianapolis IN 46256 USA. 2004,
                                  392 pp. \$45.00} . . . . . . . . . . . . 373--379
                      Anonymous   Corrections: \em Rasterschlüssel 44 ---
                                  The Epitome of Hand Field Ciphers,
                                  Cryptologia XXVIII(2): 115--149, April
                                  2004 . . . . . . . . . . . . . . . . . . ??
                    David Gaddy   Letter to the Editor: Vigen\`ere
                                  Decryption . . . . . . . . . . . . . . . ??


Cryptologia
Volume 29, Number 1, January, 2005

    Hilmar-Detlef Brückner   Germany's First Cryptanalysis on the
                                  Western Front: Decrypting British and
                                  French Naval Ciphers in World War I  . . 1--22
                 Lee A. Gladwin   The Diplomacy of Security: Behind the
                                  Negotiations of Article 18 of the
                                  Sino-American Cooperative Agreement  . . 23--42
                     David Kahn   The Man in the Iron Mask --- Encore et
                                  Enfin, Cryptologically . . . . . . . . . 43--49
           Navneet Mandhani and   
                    Subhash Kak   Watermarking Using Decimal Sequences . . 50--58
            Jeffrey Overbey and   
             William Traves and   
                  Jerzy Wojdylo   On the Keyspace of the Hill Cipher . . . 59--72
           Rodney H. Cooper and   
         Christopher G. Andrews   The Public Key Covert Channel  . . . . . 73--75
                     David Kahn   From the Archives: Codetalkers not
                                  wanted . . . . . . . . . . . . . . . . . 76--87
                     Louis Kruh   Reviews and Things Cryptologic: Bamford,
                                  James. \em A Pretext For War: 9/11,
                                  Iraq, and the Abuse of America's
                                  Intelligence Agencies. Doubleday. 2004.
                                  420 pp. \$26.95}; {Goldreich, Oded.
                                  Foundations of Cryptography: Volume II:
                                  Basic Applications. Cambridge University
                                  Press, 40 West 20th Street, New York NY
                                  10011-4211 USA. 2004. 798 pp. \$75.00;
                                  McBain. Ed. \em Hark!. Simon & Schuster,
                                  1230 Avenue of the Americas, New York NY
                                  10020 USA. 2004. 293 pp. \$24.95};
                                  {Spillman, Richard J. Classical and
                                  Contemporary Cryptology. Pearson
                                  Prentice Hall, Pearson Education, Inc.,
                                  Upper Saddle River NJ 07458 USA. 2005.
                                  285 pp. \$54.00; Teuscher, Christof
                                  (Ed.) Alan Turing: Life and Legacy of a
                                  Great Thinker. Springer-Verlag, 175
                                  Fifth Ave., New York NY 10010 USA. 2004.
                                  542 pp. \$69.95}; {Balliett, Blue and
                                  Brett Helquist, Illustrator. {\em
                                  Chasing Vermeer}. Scholastic Press, 557
                                  Broadway, New York NY 10012 USA. 2004.
                                  254 pp. \$16.96; Caldwell, Ian and
                                  Dustin Thomason. \em The Rule of Four.
                                  The Dial Press/Random House, Inc., 1745
                                  Broadway NY 10019 USA. 2004. 372 pp.
                                  \$24.00/\$34 Canada  . . . . . . . . . . 88--93
                     David Kahn   David Shulman Dies --- The Bibliographer
                                  of Cryptology  . . . . . . . . . . . . . 94--95

Cryptologia
Volume 29, Number 2, April, 2005

             Philip H. Jacobsen   Pearl Harbor: Radio Officer Leslie
                                  Grogan of the SS Lurline and His
                                  Misidentified Signals  . . . . . . . . . 97--120
                     David Kahn   The Polish Enigma Conference and some
                                  Excursions . . . . . . . . . . . . . . . 121--126
          Peter Zilahy Ingerman   Two Hebern Cryptographic Machines  . . . 127--147
             Raphael C.-W. Phan   How to Explain Block Cipher
                                  Cryptanalysis to Your Kids . . . . . . . 148--158
                Craig Bauer and   
          Suzanne E. Gladfelter   Cryptology in York, Pennsylvania . . . . 159--175
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 176--187
                     Louis Kruh   Unknown Military Coding Device: Can You
                                  Identify It? . . . . . . . . . . . . . . 190--191
                      Anonymous   Letter to the Editor . . . . . . . . . . ??

Cryptologia
Volume 29, Number 3, July, 2005

             Geoff Sullivan and   
                  Frode Weierud   Breaking German Army Ciphers . . . . . . 193--232
                  John Lawrence   A Study of Rejewski's Equations  . . . . 233--247
                Craig Bauer and   
            Elliott J. Gottloeb   Results of an Automated Attack on the
                                  Running Key Cipher . . . . . . . . . . . 248--254
               Richard Pekelney   Excellent, Exceptional, Enormous Crypto
                                  Source . . . . . . . . . . . . . . . . . 255--256
             Robert Cordery and   
                   Leon Pintsov   History and Role of Information Security
                                  in Postage Evidencing and Payment  . . . 257--271
                     Louis Kruh   Enigma Articles from Cryptologia . . . . 272--273
                     Louis Kruh   Crypto User's Guide  . . . . . . . . . . 273--273
                     Louis Kruh   Confederate Treasure Issues  . . . . . . 274--274
                     Louis Kruh   Detective Notebook for Young Adults  . . 274--275
                     Louis Kruh   College-level Math Crypto Text . . . . . 275--275
                     Louis Kruh   Code Names Post 9/11 . . . . . . . . . . 276--276
                     Louis Kruh   Coral Sea, Midway, and Aleutians Naval
                                  Intelligence . . . . . . . . . . . . . . 276--277
                     Louis Kruh   Broad View of Power of Mathematics . . . 277--278
                     Louis Kruh   Friedman Legacy  . . . . . . . . . . . . 278--278
                     Louis Kruh   Pearl Harbor Revisited . . . . . . . . . 278--279
                     Louis Kruh   Global Eavesdropping . . . . . . . . . . 279--280
                     Louis Kruh   Cryptology in American History . . . . . 280--280
                     Louis Kruh   HMS Dunedin Acts on Enigma Material  . . 280--281
                     Louis Kruh   Novel Secrets  . . . . . . . . . . . . . 281--282
                     Louis Kruh   Reviews and Things Cryptologic . . . . . ??

Cryptologia
Volume 29, Number 4, October, 2005

                 John F. Dooley   Codes and Ciphers in Fiction: An
                                  Overview . . . . . . . . . . . . . . . . 290--328
                     David Kahn   How Garbles Tickled History  . . . . . . 329--336
               Charles F. Rocca   Cryptology in General Education  . . . . 337--342
                  John Lawrence   Factoring for the Plugboard --- Was
                                  Rejewski's Proposed Solution for
                                  Breaking the Enigma Feasible?  . . . . . 343--366
                 B. Thilaka and   
                 K. Rajalakshmi   An Extension of Hill Cipher Using
                                  Generalised Inverses and $m$ th Residue
                                  Modulo $n$ . . . . . . . . . . . . . . . 367--376
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 377--380
                      Anonymous   Letter from the Editor . . . . . . . . . ??


Cryptologia
Volume 30, Number 1, January, 2006

                  Ralph Erskine   The 1944 Naval BRUSA Agreement and its
                                  Aftermath  . . . . . . . . . . . . . . . 1--22
                 Niels Faurholt   Alexis Kòhl: a Danish Inventor of
                                  Cryptosystems  . . . . . . . . . . . . . 23--29
                       Jan Bury   TELMA --- a Polish Wireless
                                  Communications Security Machine of World
                                  War II . . . . . . . . . . . . . . . . . 31--38
             Augusto Buonafalce   Bellaso's Reciprocal Ciphers . . . . . . 39--51
              Deane R. Blackman   Note on Geheimschreiber Cam Wheels . . . 53--54
              William Stallings   The Whirlpool Secure Hash Function . . . 55--67
              Joshua Holden and   
             Richard Layton and   
            Laurence Merkle and   
                    Tina Hudson   Underwater Hacker Missile Wars: a
                                  Cryptography and Engineering Contest . . 69--77
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 79--81

Cryptologia
Volume 30, Number 2, April, 2006

                Joel V. Brawley   In Memory of Jack Levine (1907--2005)    83--97
                  Peter Freeman   The Zimmermann Telegram Revisited: a
                                  Reconciliation of the Primary Sources    98--150
               Forrest R. Biard   Breaking of Japanese Naval Codes:
                                  Pre-Pearl Harbor to Midway . . . . . . . 151--158
                 Robert Talbert   The Cycle Structure and Order of the
                                  Rail Fence Cipher  . . . . . . . . . . . 159--172
       Kiranmayi Penumarthi and   
                    Subhash Kak   Augmented Watermarking . . . . . . . . . 173--180
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 181--192

Cryptologia
Volume 30, Number 3, July, 2006

                 John Gallehawk   Third Person Singular (Warsaw, 1939) . . 193--198
                 Lee A. Gladwin   Did Sigint Seal The Fates of 19,000
                                  POWs?  . . . . . . . . . . . . . . . . . 199--211
               Peter W. Donovan   The Indicators of Japanese Ciphers 2468,
                                  7890, and JN-25A1  . . . . . . . . . . . 212--235
               David Joyner and   
                     David Kahn   Edited Transcript of Interview with
                                  Peter Hilton for ``Secrets of War''  . . 236--250
                   Klaus Schmeh   The East German Encryption Machine T-310
                                  and the Algorithm It Used  . . . . . . . 251--257
             Alexander Griffing   Solving XOR Plaintext Strings with the
                                  Viterbi Algorithm  . . . . . . . . . . . 258--265
           Claudia Oliveira and   
José António Xexéo and   
   Carlos André Carvalho   Clustering and Categorization Applied to
                                  Cryptanalysis  . . . . . . . . . . . . . 266--280
                 John L. Simons   Bridge Cryptography Fundamentals . . . . 281--286
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 287--291

Cryptologia
Volume 30, Number 4, October, 2006

                Brian J. Winkel   Letter from the Editor . . . . . . . . . 293--293
                  Ralph Erskine   The Poles Reveal their Secrets: Alastair
                                  Denniston's Account of the July 1939
                                  Meeting at Pyry  . . . . . . . . . . . . 294--305
                Craig Bauer and   
                    John Ulrich   The Cryptologic Contributions of Dr.
                                  Donald Menzel  . . . . . . . . . . . . . 306--339
                 Kent D. Boklan   How I Broke the Confederate Code (137
                                  Years Too Late)  . . . . . . . . . . . . 340--345
              Klaus Pommerening   Kasiski's Test: Couldn't the Repetitions
                                  be by Accident?  . . . . . . . . . . . . 346--352
         Augusto Buonafalce and   
             Niels Faurholt and   
                    Bjarne Toft   Julius Petersen---Danish Mathematician
                                  and Cryptologist . . . . . . . . . . . . 353--360
             Alexander Griffing   Solving the Running Key Cipher with the
                                  Viterbi Algorithm  . . . . . . . . . . . 361--367
                   Donald Mills   Review of ``Introduction to Coding
                                  Theory'' by Ron M. Roth  . . . . . . . . 368--369
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 370--374


Cryptologia
Volume 31, Number 1, January, 2007

                    Craig Bauer   Letter from the Editor . . . . . . . . . 1--1
         Joachim von zur Gathen   Zimmermann Telegram: The Original Draft  2--37
                 David A. Hatch   The Punitive Expedition Military Reform
                                  and Communications Intelligence  . . . . 38--45
José Ramón Soler Fuensanta and   
Francisco Javier López-Brea Espiau   The Strip Cipher---The Spanish Official
                                  Method . . . . . . . . . . . . . . . . . 46--56
             Philip H. Jacobsen   Station AL---Guadalcanal: a Full Service
                                  WWII Cryptologic Unit  . . . . . . . . . 57--75
                Craig Bauer and   
             Katherine Millward   Cracking Matrix Encryption Row by Row    76--83
                    Colin Burke   From the Archives: Codebreaking (or not)
                                  in Shanghai  . . . . . . . . . . . . . . 84--86
                   Donald Mills   Review of ``Cryptography: Theory and
                                  Practice'' by D. R. Stinson  . . . . . . 87--88
                   David Joyner   Review of ``Authentication Codes and
                                  Combinatorial Designs'' by Dingyi Pei    89--91
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 92--94

Cryptologia
Volume 31, Number 2, April, 2007

               Andreas Schinner   The Voynich Manuscript: Evidence of the
                                  Hoax Hypothesis  . . . . . . . . . . . . 95--107
                  Robert Lewand   A Cryptology Course at Bletchley Park    108--111
  António Machiavelo and   
            Rogério Reis   Automated Ciphertext---Only
                                  Cryptanalysis of the Bifid Cipher  . . . 112--124
                Abhishek Parakh   Oblivious Transfer Using Elliptic Curves 125--132
          Stelios I. Marnas and   
           Lefteris Angelis and   
               George L. Bleris   An Application of Quasigroups in
                                  All-Or-Nothing Transform . . . . . . . . 133--142
                   Nick Hoffman   A Simplified IDEA Algorithm  . . . . . . 143--151
                  David Alvarez   Wilhelm Fenner and the Development of
                                  the German Cipher Bureau, 1922--1939 . . 152--163
                 Herbert Paulis   The Scheuble Apparatus . . . . . . . . . 164--178
                Craig Bauer and   
                Joel Burkholder   From the Archives: Reading Stimson's
                                  Mail . . . . . . . . . . . . . . . . . . 179--184
              Chris Christensen   Review of ``Mathematical Ciphers from
                                  Caesar to RSA'' by Anne L. Young . . . . 185--187
                     David Kahn   The Old Master of Austrian Cryptology    188--191
                 John F. Dooley   Reviews of Cryptologic Fiction . . . . . 192--195
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 196--200

Cryptologia
Volume 31, Number 3, July, 2007

                 Mark Stamp and   
                   Wing On Chan   SIGABA: Cryptanalysis of the Full
                                  Keyspace . . . . . . . . . . . . . . . . 201--222
             Philip H. Jacobsen   Radio Silence of the Pearl Harbor Strike
                                  Force Confirmed Again: The Saga of
                                  Secret Message Serial (SMS) Numbers  . . 223--232
              Simon J. Shepherd   The Tiny Encryption Algorithm  . . . . . 233--245
              Indivar Gupta and   
               Jasbir Singh and   
              Roopika Chaudhary   Cryptanalysis of an Extension of the
                                  Hill Cipher  . . . . . . . . . . . . . . 246--253
                    James David   Bourbon Operations in China Following
                                  World War II . . . . . . . . . . . . . . 254--262
                 Jukka Rislakki   Searching for Cryptology's Great Wreck   263--267
                       Jan Bury   From the Archives: Polish Interwar MFA's
                                  Cipher Compromised?  . . . . . . . . . . 268--277
                     David Kahn   ``Histoire cryptologique'' --- a Book
                                  Review . . . . . . . . . . . . . . . . . 278--280
              Chris Christensen   Review of ``Decrypted Secrets: Methods
                                  and Maxims of Cryptology'', Fourth
                                  Edition by F. L. Bauer . . . . . . . . . 281--283
                     Louis Kruh   Reviews and Things Cryptologic . . . . . 284--287

Cryptologia
Volume 31, Number 4, October, 2007

                    Olin Sibert   Robert W. Baldwin, 1957--2007  . . . . . 289--291
             W. Olin Sibert and   
              Robert W. Baldwin   The Multics \tt encipher\_Algorithm  . . 292--304
                 Lee A. Gladwin   Bulldozer: a Cribless Rapid Analytical
                                  Machine (RAM) Solution to Enigma and its
                                  Variations . . . . . . . . . . . . . . . 305--315
           Judy A. Holdener and   
               Eric J. Holdener   A Cryptographic Scavenger Hunt . . . . . 316--323
                    Sheng Zhong   An Attack on the Zhou--Fan--Li
                                  Authenticated Multiple-Key Agreement
                                  Protocol . . . . . . . . . . . . . . . . 324--325
                      Alex Kuhl   Rejewski's Catalog . . . . . . . . . . . 326--331
                    Edwin Olson   Robust Dictionary Attack of Short Simple
                                  Substitution Ciphers . . . . . . . . . . 332--342
                       Jan Bury   From the Archives: The U.S. and West
                                  German Agent Radio Ciphers . . . . . . . 343--357
                    David Hamer   Review of ``Thirty Secret Years: A. G.
                                  Denniston's Work in Signals
                                  Intelligence: 1914--1944'' by Robin
                                  Denniston  . . . . . . . . . . . . . . . 358--360
             Augusto Buonafalce   Review of ``The Curse of the Voynich.
                                  The Secret History of the World's Most
                                  Mysterious Manuscript'' by Nicholas
                                  Pelling  . . . . . . . . . . . . . . . . 361--362
                 John F. Dooley   Reviews of Cryptologic Fiction . . . . . 363--366
          Chris Christensen and   
               Robert E. Lewand   2008 Joint Mathematics Meetings
                                  Contributed Paper Session: Cryptology
                                  for Undergraduates . . . . . . . . . . . 367--367
                    Craig Bauer   A Note of Thanks . . . . . . . . . . . . 368--368


Cryptologia
Volume 32, Number 1, January, 2008

           Jeffrey D. Adler and   
              Ryan W. Fuoss and   
           Michael J. Levin and   
               Amanda R. Youell   Reading Encrypted Diplomatic
                                  Correspondence: An Undergraduate
                                  Research Project . . . . . . . . . . . . 1--12
         Raphael C.-W. Phan and   
                     Adi Shamir   Improved Related-key Attacks on DESX and
                                  DESX+  . . . . . . . . . . . . . . . . . 13--22
          Chris Christensen and   
             Suzanne Gladfelter   Taking a Cryptology Class to Bletchley
                                  Park . . . . . . . . . . . . . . . . . . 23--32
                  Wayne S. Chan   Key Enclosed: Examining the Evidence for
                                  the Missing Key Letter of the Beale
                                  Cipher . . . . . . . . . . . . . . . . . 33--36
                Abhishek Parakh   Oblivious Transfer Based on Key Exchange 37--44
                   Brian Winkel   Lessons Learned from a Mathematical
                                  Cryptology Course  . . . . . . . . . . . 45--55
                     David Kahn   The Future of the Past---Questions in
                                  Cryptologic History  . . . . . . . . . . 56--61
             Augusto Buonafalce   Cicco Simonetta's Cipher-Breaking Rules  62--70
               Michael J. Cowan   Breaking Short Playfair Ciphers with the
                                  Simulated Annealing Algorithm  . . . . . 71--83
                       Jan Bury   From the Archives: Intercepting Best
                                  Friend?  . . . . . . . . . . . . . . . . 84--87
              Chris Christensen   Review of ``The Collective Works of
                                  Captain George P. McGinnis'' by George
                                  P. McGinnis  . . . . . . . . . . . . . . 88--89
              Chris Christensen   Review of ``How to Tell a Secret: Tips,
                                  Tricks & Techniques for Breaking Codes &
                                  Conveying Covert Information'' by P. J.
                                  Huff and J. G. Lewin . . . . . . . . . . 90--91
                  Joshua Holden   Review of ``Complexity and Cryptography:
                                  An Introduction'' by John Talbot and
                                  Dominic Welsh  . . . . . . . . . . . . . 92--97
              John C. Gallehawk   Review of ``Delusions of Intelligence''
                                  by R. A. Ratcliff  . . . . . . . . . . . 98--100

Cryptologia
Volume 32, Number 2, 2008

                   Marek Grajek   Monument in Memoriam of Marian Rejewski,
                                  Jerzy Ró\.zycki and Henryk Zygalski
                                  Unveiled in Pozna\'n . . . . . . . . . . 101--103
                    Mavis Batey   Dilly Knox --- a Reminiscence of this
                                  Pioneer Enigma Cryptanalyst  . . . . . . 104--130
            Ching-Nung Yang and   
                  Tse-Shih Chen   Security Analysis of Authentication of
                                  Images Using Recursive Visual
                                  Cryptography . . . . . . . . . . . . . . 131--136
            Sukamol Srikwan and   
               Markus Jakobsson   Using Cartoons to Teach Internet
                                  Security . . . . . . . . . . . . . . . . 137--154
                  Tomi S. Melka   Structural Observations Regarding
                                  RongoRongo Tablet 'Keiti'  . . . . . . . 155--179
                 David A. Hatch   From the Archives: Friedman Takes the
                                  Stand  . . . . . . . . . . . . . . . . . 180--183
                     Louis Kruh   Review of ``Figuring It Out At Bletchley
                                  Park 1939--1945'' by John Gallehawk and
                                  Kerry Johnson  . . . . . . . . . . . . . 184--185
              Chris Christensen   Review of ``Voices of the Code Breakers:
                                  Personal Accounts of the Secret Heroes
                                  of World War II'' by Michael Paterson    186--188
              Chris Christensen   Review of ``$ A^3 $ and His Algebra'' by
                                  Nancy E. Albert  . . . . . . . . . . . . 189--196
                      Anonymous   Can You Break the NKU Monopoly?  . . . . 197--197

Cryptologia
Volume 32, Number 3, 2008

                  Ralph Erskine   Captured \em Kriegsmarine Enigma
                                  Documents at Bletchley Park  . . . . . . 199--219
                Martin Albrecht   Algebraic Attacks on the Courtois Toy
                                  Cipher . . . . . . . . . . . . . . . . . 220--276
                    Colin Burke   From the Archives: The Last Bombe Run,
                                  1955 . . . . . . . . . . . . . . . . . . 277--278
                James L. Massey   Review of Series on Arabic Origins of
                                  Cryptology . . . . . . . . . . . . . . . 280--283
              Chris Christensen   Review of \booktitleThe History of
                                  Information Security: A Comprehensive
                                  Handbook edited by Karl de Leeuw and Jan
                                  Bergstra . . . . . . . . . . . . . . . . 284--294
                 John F. Dooley   Reviews of Cryptologic Fiction . . . . . 295--298

Cryptologia
Volume 32, Number 4, 2008

                 Kent D. Boklan   How I Broke an Encrypted Diary from the
                                  War of 1812  . . . . . . . . . . . . . . 299--310
           Christopher Grey and   
                  Andrew Sturdy   The 1942 Reorganization of the
                                  Government Code and Cypher School  . . . 311--333
           Tobias Schrödel   Breaking Short Vigen\`ere Ciphers  . . . 334--347
                 Jerzy Jaworski   Rejewski--Ró\.zycki--Zygalski Lectures in
                                  Computer Science . . . . . . . . . . . . 348--350
                       Jan Bury   From the Archives: Inside a Cold War
                                  Crypto Cell. Polish Cipher Bureau in the
                                  1980s  . . . . . . . . . . . . . . . . . 351--367
               Whitfield Diffie   What Did We Do Before Biometric
                                  Passports? A Review of \em Who Are You?
                                  Identification, Deception, and
                                  Surveillance in Early Modern Europe by
                                  Valentin Groebner  . . . . . . . . . . . 368--369


Cryptologia
Volume 33, Number 1, 2009

                 Louis Kruh Esq   A Belated Tribute to Rosario Candela . . 1--11
         Jean-Philippe Aumasson   Cryptanalysis of a Hash Function Based
                                  on Norm Form Equations . . . . . . . . . 12--15
                  Cheryl Beaver   Cryptology in the Classroom: Analyzing a
                                  Zero-Knowledge Protocol  . . . . . . . . 16--23
                  Tomi S. Melka   Some Considerations about the \em Kohau
                                  Rongorongo Script in the Light of a
                                  Statistical Analysis of the `Santiago
                                  Staff' . . . . . . . . . . . . . . . . . 24--73
                       Jan Bury   Breaking Unbreakable Ciphers. The Asen
                                  Georgiyev Spy Case . . . . . . . . . . . 74--88
              Chris Christensen   Review of \booktitleModern
                                  Cryptanalysis: Techniques for Advanced
                                  Code Breaking by Christopher Swenson . . 89--94
                 David H. Hamer   Review of \booktitleHerivelismus and the
                                  German Military Enigma by John Herivel   95--97
                    James David   Review of \booktitleThe U.S.
                                  Intelligence Community (Fifth Edition)
                                  by Jeffrey T. Richelson  . . . . . . . . 99--101
             Raphael C.-W. Phan   Review of \booktitleSecurity
                                  Engineering: A Guide to Building
                                  Dependable Distributed Systems, 2nd
                                  Edition by Ross J. Anderson  . . . . . . 102--103
                     David Kruh   Review of \booktitleSpies of the Bible:
                                  Espionage in Israel from the Exodus to
                                  the Bar Kokhba Revolt by Rose Mary
                                  Sheldon  . . . . . . . . . . . . . . . . 104--105

Cryptologia
Volume 33, Number 2, 2009

             John F. Dooley and   
              Yvonne I. Ramirez   Who Wrote \booktitleThe Blonde Countess?
                                  A Stylometric Analysis of Herbert O.
                                  Yardley's Fiction  . . . . . . . . . . . 108--117
José Ramón Soler Fuensanta   \booktitleTreaty of Cryptography by
                                  Joaquín García Carmona?  . . . . . . . . . 118--124
                 Blake Rice and   
                  Bill Yankosky   Elliptic Curve Cryptography with the
                                  TI-83  . . . . . . . . . . . . . . . . . 125--141
               Tim McDevitt and   
                       Tom Leap   Multimedia Cryptology  . . . . . . . . . 142--150
                Mike May, S. J.   Using Maple Worksheets to Enable Student
                                  Explorations of Cryptography . . . . . . 151--157
               David E. Boliver   Cryptology as College Outreach to Young
                                  Teens  . . . . . . . . . . . . . . . . . 158--165
                     David Link   Resurrecting \em Bomba Kryptologiczna:
                                  Archaeology of Algorithmic Artefacts, I  166--182
                Jiqiang Liu and   
                    Sheng Zhong   Analysis of Kim-Jeon-Yoo Password
                                  Authentication Schemes . . . . . . . . . 183--187
José de Jesús Angel Angel and   
         Guillermo Morales-Luna   Cryptographic Methods During the Mexican
                                  Revolution . . . . . . . . . . . . . . . 188--196
                    Colin Burke   Review of \booktitleAmerican Cryptology
                                  during the Cold War, 1945--1989 by
                                  Thomas R. Johnson  . . . . . . . . . . . 197--200
              Chris Christensen   Review of \booktitleAn Introduction to
                                  Mathematical Cryptography by Hoffstein,
                                  Pipher, and Silverman  . . . . . . . . . 201--204
               Howard E. Brandt   Review of \booktitleProtecting
                                  Information: From Classical Error
                                  Correction to Quantum Cryptography by
                                  Susan Loepp and William K. Wootters  . . 205--207
                   David Joyner   Review of \booktitleAlgorithmic Number
                                  Theory: Lattices, Curves and
                                  Cryptography, Edited by J. P. Buhler and
                                  P. Stevenhagen . . . . . . . . . . . . . 208--211
                 John F. Dooley   Reviews of Cryptologic Fiction . . . . . 212--215

Cryptologia
Volume 33, Number 3, 2009

             Eimear Gallery and   
              Chris J. Mitchell   Trusted Computing: Security and
                                  Applications . . . . . . . . . . . . . . 217--245
               Jongsung Kim and   
             Raphael C.-W. Phan   Advanced Differential-Style
                                  Cryptanalysis of the NSA's Skipjack
                                  Block Cipher . . . . . . . . . . . . . . 246--270
              Chris Christensen   Reviews of Two \em Post-Quantum
                                  Cryptography Books . . . . . . . . . . . 271--273
                 David H. Hamer   Review of \booktitleFrom Bletchley with
                                  Love by Mavis Batey  . . . . . . . . . . 274--275
                 John F. Dooley   Another Yardley Mystery  . . . . . . . . 276--282
                David Chaum and   
                   Ben Hosp and   
          Stefan Popoveniuc and   
                 Poorvi L. Vora   Accessible Voter-Verifiability . . . . . 283--291
              Stephen Budiansky   Review of \booktitleDecoding the IRA by
                                  Tom Mahon and James J. Gillogly  . . . . 292--294

Cryptologia
Volume 33, Number 4, 2009

            Kathryn A. Schwartz   Charting Arabic Cryptology's Evolution   297--304
                   Sean Simmons   Algebraic Cryptanalysis of Simplified
                                  AES  . . . . . . . . . . . . . . . . . . 305--314
                  Haihua Gu and   
                        Dawu Gu   Speeding Up the Double-Base Recoding
                                  Algorithm of Scalar Multiplication . . . 315--320
                Sujith Ravi and   
                   Kevin Knight   Attacking Letter Substitution Ciphers
                                  with Integer Programming . . . . . . . . 321--334
               Dae Hyun Yum and   
                  Pil Joong Lee   Cracking Hill Ciphers with
                                  Goodness-of-Fit Statistics . . . . . . . 335--342
                   Klaus Schmeh   Enigma's Contemporary Witness: Gisbert
                                  Hasenjaeger  . . . . . . . . . . . . . . 343--346
                       Jan Bury   From the Archives: CX--52 Messages Read
                                  by Red Poles?  . . . . . . . . . . . . . 347--352
                 Henry B. Wolfe   Review of \booktitleEavesdropping on
                                  Hell: Historical Guide to Western
                                  Communications Intelligence and
                                  Holocaust, 1939--1945 by Robert J.
                                  Hanyok . . . . . . . . . . . . . . . . . 353--355
              Chris Christensen   Review of \booktitleThe Shadow Factory:
                                  The Ultra-Secret NSA from 9/11 to the
                                  Eavesdropping on America by James
                                  Bamford  . . . . . . . . . . . . . . . . 356--358
              Chris Christensen   Review of \booktitleRandom Curves by
                                  Neal Koblitz . . . . . . . . . . . . . . 359--365
              Chris Christensen   Review of \booktitleUltra Versus
                                  U-Boats: Enigma Decrypts in The National
                                  Archives by Roy Conyers Nesbit . . . . . 366--369


Cryptologia
Volume 34, Number 1, 2010

                      Anonymous   A Tribute to David Kahn  . . . . . . . . 1--11
                     David Kahn   How I Discovered World War II's Greatest
                                  Spy  . . . . . . . . . . . . . . . . . . 12--21
            Gerhard F. Strasser   Ninth-Century Figural Poetry and
                                  Medieval Easter Tables---Possible
                                  Inspirations for the Square Tables of
                                  Trithemius and Vigen\`ere? . . . . . . . 22--26
              Chris Christensen   Alan Turing's First Cryptology Textbook
                                  and Sinkov's Revision of it  . . . . . . 27--43
                 Niels Faurholt   E. S. Schieber German Code Device from
                                  WWII . . . . . . . . . . . . . . . . . . 44--51
           Marko Hölbl and   
             Tatjana Welzer and   
               Bo\vstjan Brumen   Attacks and Improvement of an Efficient
                                  Remote Mutual Authentication and Key
                                  Agreement Scheme . . . . . . . . . . . . 52--59
                       Jan Bury   Operation Lotos: An Unsuccessful Attempt
                                  on U.S. Government Communications  . . . 60--87
              Chris Christensen   Review of \booktitleBletchley Park: An
                                  Inmate's Story by James Thirsk . . . . . 88--89
                Clyde G. Booker   Review of \booktitleWest Wind Clear:
                                  Cryptology and the Winds Message
                                  Controversy -- A Documentary History . . 90--95
                 John F. Dooley   Reviews of Cryptologic Fiction . . . . . 96--100

Cryptologia
Volume 34, Number 2, 2010

                   Brian Winkel   David, Calm Down! On Second and More
                                  Reflective Thought, Don't! . . . . . . . 101--103
            Jacques Patarin and   
          Valérie Nachef   ``I Shall Love You Until Death''
                                  (Marie-Antoinette to Axel von Fersen)    104--114
            Benedek Láng   Why Don't We Decipher an Outdated Cipher
                                  System? The Codex of Rohonc  . . . . . . 115--144
                   Neal Koblitz   Secret Codes and Online Security: a
                                  Seminar for Entering Students  . . . . . 145--154
                     Yesem Kurt   Deciphering an Undergraduate Cryptology
                                  Course . . . . . . . . . . . . . . . . . 155--162
              William Stallings   NIST Block Cipher Modes of Operation for
                                  Confidentiality  . . . . . . . . . . . . 163--175
              Chris Christensen   Review of the 2009 Cryptologic History
                                  Symposium: \booktitleGlobal Perspectives
                                  on Cryptologic History . . . . . . . . . 176--179
                 John F. Dooley   Reviews of Cryptologic Fiction . . . . . 180--185
                Clyde G. Booker   Review of \booktitleThe Attack on the
                                  Liberty: The Untold Story of Israel's
                                  Deadly 1967 Assault on a U.S. Spy Ship
                                  by James Scott . . . . . . . . . . . . . 186--189
                    Colin Burke   Review of \booktitleThe Secret Sentry:
                                  The Untold Story of the National
                                  Security Agency by Matthew M. Aid  . . . 190--193
                 Emil H. Levine   Review of \booktitleDeciphering the
                                  Rising Sun: Navy and Marine Corps
                                  Codebreakers, Translators, and
                                  Interpreters in the Pacific War by Roger
                                  Dingman  . . . . . . . . . . . . . . . . 194--196

Cryptologia
Volume 34, Number 3, 2010

                     David Kahn   Louis Kruh, Cryptologist, Editor,
                                  Activist . . . . . . . . . . . . . . . . 197--199
              Ali Assarpour and   
                 Kent D. Boklan   How We Broke the Union Code (148 Years
                                  Too Late)  . . . . . . . . . . . . . . . 200--210
             Jacob Konikoff and   
                  Seth Toplosky   Analysis of Simplified DES Algorithms    211--224
              William Stallings   NIST Block Cipher Modes of Operation for
                                  Authentication and Combined
                                  Confidentiality and Authentication . . . 225--235
          Stefan Popoveniuc and   
                 Poorvi L. Vora   Secure Electronic Voting --- a Framework 236--257
            Abhishek Parakh and   
                    Subhash Kak   Internet Voting Protocol Based on
                                  Improved Implicit Security . . . . . . . 258--268
              Chris Christensen   Review of \booktitleElementary
                                  Cryptanalysis: A Mathematical Approach,
                                  Second Edition, by Abraham Sinkov,
                                  revised and updated by Todd Feil . . . . 269--272
              Chris Christensen   Review of \booktitleThe Real Enigma
                                  Heroes by Phil Shanahan  . . . . . . . . 273--277
              Chris Christensen   Review of Two ``Gift Books'' about
                                  Cryptology . . . . . . . . . . . . . . . 278--279

Cryptologia
Volume 34, Number 4, 2010

                Ashwin Jain and   
                        C. Hari   A New Efficient Protocol for
                                  $k$-out-of-$n$ Oblivious Transfer  . . . 282--290
                   Klaus Schmeh   Alexander von Kryha and His Encryption
                                  Machines . . . . . . . . . . . . . . . . 291--300
José Ramón Soler Fuensanta and   
Francisco Javier López-Brea Espiau and   
                  Frode Weierud   Spanish Enigma: a History of the Enigma
                                  in Spain . . . . . . . . . . . . . . . . 301--328
                Dirk Rijmenants   Enigma Message Procedures Used by the
                                  Heer, Luftwaffe and Kriegsmarine . . . . 329--339
                  Ralph Erskine   Ultra Reveals a Late \em B-Dienst
                                  Success in the Atlantic  . . . . . . . . 340--358
                    Colin Burke   From the Archives: a Lady Codebreaker
                                  Speaks: Joan Murray, the Bombes and the
                                  Perils of Writing Crypto-History From
                                  Participants' Accounts . . . . . . . . . 359--370
            Gerhard F. Strasser   Review of \booktitleVersteckte
                                  Botschaften. Die faszinierende
                                  Geschichte der Steganografie (Hidden
                                  Messages. The Fascinating Story of
                                  Steganography) . . . . . . . . . . . . . 371--380


Cryptologia
Volume 35, Number 1, 2011

                 John F. Dooley   Was Herbert O. Yardley a Traitor?  . . . 1--15
             Wolfgang Ertel and   
                 Lucia Jans and   
          Walter Herzhauser and   
                Joachim Fessler   An Enigma Replica and its Blueprints . . 16--21
                      Jim Reeds   American Dragon  . . . . . . . . . . . . 22--41
           Robert Edward Lewand   Secret Keeping 101---Dr. Janice Martin
                                  Benario and the Women's College
                                  Connection to ULTRA  . . . . . . . . . . 42--46
           Abdelmalek Azizi and   
                  Mostafa Azizi   Instances of Arabic Cryptography in
                                  Morocco  . . . . . . . . . . . . . . . . 47--57
                  Manik Lal Das   A Key Escrow-Free Identity-Based
                                  Signature Scheme without using Secure
                                  Channel  . . . . . . . . . . . . . . . . 58--72
          Chris Christensen and   
                    David Agard   William Dean Wray (1910--1962): the
                                  Evolution of a Cryptanalyst  . . . . . . 73--96
              Chris Christensen   Review of \booktitleCryptography and
                                  Network Security: Principles and
                                  Practice, Fifth Edition  . . . . . . . . 97--99
              Chris Christensen   Review of \booktitleAlgebraic
                                  Cryptanalysis  . . . . . . . . . . . . . 100--105
              Chris Christensen   Review of \booktitleUnderstanding
                                  Cryptography . . . . . . . . . . . . . . 106--107

Cryptologia
Volume 35, Number 2, 2011

                     David Kahn   Letter to the Editor . . . . . . . . . . 109--109
                 David H. Hamer   The David Kahn Collection at NSA's
                                  National Cryptologic Museum  . . . . . . 110--113
                   Philip Marks   Operational Use and Cryptanalysis of the
                                  Kryha Cipher Machine . . . . . . . . . . 114--155
                Wayne Patterson   The Cryptology of Baseball . . . . . . . 156--163
             Betsy Rohaly Smoot   An Accidental Cryptologist: The Brief
                                  Career of Genevieve Young Hitt . . . . . 164--175
                       Jan Bury   From the Archives: Breaking OTP Ciphers  176--188
              Chris Christensen   Review of \booktitleThe Secret Life of
                                  Bletchley Park: The World War II
                                  Codebreaking Centre and the Men and
                                  Women Who Were There . . . . . . . . . . 189--191
              Chris Christensen   Review of Bletchley Park Trust Reports
                                  by Frank Carter  . . . . . . . . . . . . 192--195
                 David H. Hamer   Review of \booktitleDilly---The Man Who
                                  Broke Enigmas by Mavis Batey . . . . . . 196--197

Cryptologia
Volume 35, Number 3, 2011

              Stephen Budiansky   Letter to the Editor . . . . . . . . . . 199--202
             Steven M. Bellovin   Frank Miller: Inventor of the One-Time
                                  Pad  . . . . . . . . . . . . . . . . . . 203--222
            Franco P. Preparata   Steps Toward Unraveling a Vatican Cipher
                                  of the 1930s . . . . . . . . . . . . . . 223--234
                  Jan Hajny and   
                   Vaclav Zeman   Anonymous Authentication with Spread
                                  Revelation . . . . . . . . . . . . . . . 235--246
             Zdzis aw J. Kapera   Summary Report of the State of the
                                  Soviet Military Sigint in November 1942
                                  Noticing ``ENIGMA''  . . . . . . . . . . 247--256
                  Paul W. Child   Cipher against Ciphers: Jonathan Swift's
                                  Latino--Anglicus Satire of Medicine  . . 257--266
              Chris Christensen   US Navy Cryptologic Mathematicians
                                  during World War II  . . . . . . . . . . 267--276
                   Frank Carter   Keith Batey and John Herivel: Two
                                  Distinguished Bletchley Park
                                  Cryptographers . . . . . . . . . . . . . 277--281
              Chris Christensen   Review of \booktitleInside Room 40: The
                                  Codebreakers of World War I by Paul
                                  Grannon  . . . . . . . . . . . . . . . . 282--288
                  Anthony Glees   Review of \booktitleGCHQ: The Uncensored
                                  Story of Britain's Most Secret
                                  Intelligence Agency by Richard J.
                                  Aldrich  . . . . . . . . . . . . . . . . 289--292
              Chris Christensen   Review of \booktitleThe Bletchley Park
                                  Codebreakers by Ralph Erskine and
                                  Michael Smith  . . . . . . . . . . . . . 293--296

Cryptologia
Volume 35, Number 4, 2011

                       Jan Bury   Operation \em Stonka. An Ultimate
                                  Deception Spy Game . . . . . . . . . . . 297--327
                    Moshe Rubin   John F. Byrne's Chaocipher Revealed: An
                                  Historical and Technical Appraisal . . . 328--379
                      Anonymous   Editorial Board EOV  . . . . . . . . . . ebi--ebi


Cryptologia
Volume 36, Number 1, 2012

                    Craig Bauer   Space Crunchers and GOST Busters!  . . . 1--1
            Nicolas T. Courtois   Security Evaluation of GOST 28147-89 in
                                  View of International Standardisation    2--13
                   Klaus Schmeh   The Pathology of Cryptology --- a
                                  Current Survey . . . . . . . . . . . . . 14--45
                 Eric Brier and   
                Wenjie Fang and   
                 David Naccache   How to Scatter a Secret? . . . . . . . . 46--54
                  Peter Donovan   The Flaw in the JN-25 Series of Ciphers,
                                  II . . . . . . . . . . . . . . . . . . . 55--61
                  Kyung-Ah Shim   Security Flaws in Three Password-Based
                                  Remote User Authentication Schemes with
                                  Smart Cards  . . . . . . . . . . . . . . 62--69
            Matthew V. Ball and   
                Cyril Guyot and   
            James P. Hughes and   
              Luther Martin and   
               Landon Curt Noll   The XTS--AES Disk Encryption Algorithm
                                  and the Security of Ciphertext Stealing  70--79
                 John F. Dooley   Review of \booktitleThe Mystic Cipher by
                                  Dennis L. Mangrum  . . . . . . . . . . . 80--83

Cryptologia
Volume 36, Number 2, 2012

                    Craig Bauer   100 Years Times Two: Alan Turing and the
                                  Voynich Manuscript . . . . . . . . . . . 85--87
          Chris Christensen and   
               David Joyner and   
                   Jenna Torres   Lester Hill's Error-Detecting Codes  . . 88--103
              Marine Minier and   
         Raphael C.-W. Phan and   
                Benjamin Pousse   On Integral Distinguishers of Rijndael
                                  Family of Ciphers  . . . . . . . . . . . 104--118
                       Jan Bury   Project Kalina: The Lotos Operation
                                  Conundrum  . . . . . . . . . . . . . . . 119--128
            Alan T. Sherman and   
           Dhananjay Phatak and   
             Vivek G. Relan and   
               Bhushan Sonawane   Location Authentication, Tracking, and
                                  Emergency Signaling through Power Line
                                  Communication: Designs and Protocols for
                                  New Out-of-Band Strategies . . . . . . . 129--148
              Cheryl Beaver and   
                 Stuart Boersma   KRYPTOS: a Pacific Northwest
                                  Cryptanalysis Contest for Undergraduates 149--156
              Chris Christensen   Review of the 2011 Cryptologic History
                                  Symposium \em Cryptology in War and
                                  Peace: Crisis Points in History  . . . . 157--160
                 John F. Dooley   Review of \booktitleJoe Rochefort's War
                                  by Elliot Carlson  . . . . . . . . . . . 161--163
                 David H. Hamer   Review of \booktitleThe Secrets of
                                  Station X --- How the Bletchley Park
                                  Codebreakers Helped Win the War by
                                  Michael Smith  . . . . . . . . . . . . . 164--166
              Chris Christensen   Review of \booktitleSecret Days:
                                  Code-Breaking in Bletchley Park by Asa
                                  Briggs . . . . . . . . . . . . . . . . . 167--172
              Chris Christensen   Review of \booktitleNeil Webster's Cribs
                                  for Victory edited by Joss Pearson . . . 173--175
              Chris Christensen   Review of \booktitleIn the Shadow of
                                  Pont du Gard: The Polish Enigma in Vichy
                                  France (June 1940 to November 1942) by
                                  Zdzislaw J. Kapera . . . . . . . . . . . 176--178
              Chris Christensen   Review of \booktitleInside Enigma: The
                                  Secrets of the Enigma Machine and Other
                                  Historic Cipher Machines by Tom Perera   179--180
              Chris Christensen   Review of \booktitleThe Information: A
                                  History, A Theory, A Flood by James
                                  Gleick . . . . . . . . . . . . . . . . . 181--182
                David Agard and   
              Chris Christensen   Review of \booktitleThe Theory That
                                  Would Not Die by Sharon McGrayne . . . . 183--190

Cryptologia
Volume 36, Number 3, 2012

                   Sandy Zabell   Commentary on Alan M. Turing: The
                                  Applications of Probability to
                                  Cryptography . . . . . . . . . . . . . . 191--214
                       Jan Bury   Assembling the Puzzle Game: The Jacek
                                  Jurzak Spy Case  . . . . . . . . . . . . 215--229
            Gerhard F. Strasser   Late 18th-Century French Encrypted
                                  Diplomatic ``Letters of Recommendation''
                                  --- Or, How to Unwittingly Carry Your
                                  Own Warrant  . . . . . . . . . . . . . . 230--239
            Gregory V. Bard and   
              Shaun V. Ault and   
            Nicolas T. Courtois   Statistics of Random Permutations and
                                  the Cryptanalysis of Periodic Block
                                  Ciphers  . . . . . . . . . . . . . . . . 240--262
J. Ramón Soler Fuensanta and   
Francisco Javier López-Brea Espiau and   
          Diego Navarro Bonilla   A Cryptanalysis Service During the
                                  Spanish Civil War  . . . . . . . . . . . 263--289
                 David H. Hamer   First Charlotte International
                                  Cryptologic Symposium and Exhibit  . . . 290--294

Cryptologia
Volume 36, Number 4, 2012

             Alan M. Turing and   
                      D. Bayley   Report on Speech Secrecy System DELILAH,
                                  a Technical Description Compiled by A.
                                  M. Turing and Lieutenant D. Bayley REME,
                                  1945--1946 . . . . . . . . . . . . . . . 295--340
                       Jan Bury   Polish Cold War Codebreaking of
                                  1959--1989: a Preliminary Assessment . . 341--379
                      Anonymous   Editorial Board EOV  . . . . . . . . . . ebi--ebi


Cryptologia
Volume 37, Number 1, 2013

            Nicolas T. Courtois   Low-Complexity Key Recovery Attacks on
                                  GOST Block Cipher  . . . . . . . . . . . 1--10
                     Saul Kelly   Room 47: The Persian Prelude to the
                                  Zimmermann Telegram  . . . . . . . . . . 11--50
        Fco. Alberto Campos and   
      Alberto Gascón and   
Jesús María Latorre and   
          J. Ramón Soler   Genetic Algorithms and Mathematical
                                  Programming to Crack the Spanish Strip
                                  Cipher . . . . . . . . . . . . . . . . . 51--68
                     Quynh Dang   Changes in Federal Information
                                  Processing Standard (FIPS) 180-4, Secure
                                  Hash Standard  . . . . . . . . . . . . . 69--73
                  Joshua Holden   Demitasse: a `Small' Version of the Tiny
                                  Encryption Algorithm and Its Use in a
                                  Classroom Setting  . . . . . . . . . . . 74--83
                 John F. Dooley   1929--1931: a Transition Period in U.S.
                                  Cryptologic History  . . . . . . . . . . 84--98
              Chris Christensen   Review of \booktitleSecret Postings:
                                  Bletchley Park to the Pentagon by
                                  Charlotte Webb. Book Tower Publishing,
                                  Redditch, Worcestershire, UK, 2011. 72
                                  pages, Paperback, \pounds 6.99. ISBN
                                  978-0-9557164-1-6  . . . . . . . . . . . 99--101
              Chris Christensen   Review of \booktitleIntroduction to
                                  Cryptography with Mathematical
                                  Foundations and Computer Implementation
                                  by Alexander Stanoyevitch. Chapman and
                                  Hall/CRC, Boca Raton, FL, 2010. 699
                                  pages, Hardcover, \$89.95. ISBN
                                  1-4398-1763-4} . . . . . . . . . . . . . 102--104

Cryptologia
Volume 37, Number 2, 2013

              Chris Christensen   Announcement of the 2013 Cryptologic
                                  History Symposium ``Technological Change
                                  and Cryptology: Meeting the Historical
                                  Challenges'' 17-18 October 2013  . . . . 105--106
                  Joshua Holden   A Good Hash Function is Hard to Find,
                                  and Vice Versa . . . . . . . . . . . . . 107--119
          Samantha Campbell and   
             Max Grinchenko and   
                  William Smith   Linear Cryptanalysis of Simplified AES
                                  Under Change of S-Box  . . . . . . . . . 120--138
                  Randy Rezabek   TICOM and the Search for OKW / \em Chi   139--153
               Sachin Kumar and   
                   R. K. Sharma   Recursive Information Hiding of Secrets
                                  by Random Grids  . . . . . . . . . . . . 154--161
                  Karl de Leeuw   Review of \booktitleForschungsstelle
                                  Langeveld: Duits Afluisterstation in
                                  bezet Nederland by Hans Knap . . . . . . 162--166
              Chris Christensen   Review of \booktitleMemories of My Work
                                  at the Cipher Bureau of the General
                                  Staff Second Department 1930--1945 by
                                  Marian Rejewski  . . . . . . . . . . . . 167--174
                   David Joyner   Review of \booktitleAlgebraic Shift
                                  Register Sequences by Mark Goresky and
                                  Andrew Klapper . . . . . . . . . . . . . 175--183
              Chris Christensen   Review of \booktitleDecoding
                                  Organization: Bletchley Park,
                                  Codebreaking and Organization Studies by
                                  Christopher Grey . . . . . . . . . . . . 184--188
                   David Joyner   Review of \booktitleCryptographic
                                  Boolean Functions and Applications by
                                  Thomas Cusick and Pantelimon Stanica . . 189--192

Cryptologia
Volume 37, Number 3, 2013

                   Klaus Schmeh   A Milestone in Voynich Manuscript
                                  Research: Voynich 100 Conference in
                                  Monte Porzio Catone, Italy . . . . . . . 193--203
                Jeanne Anderson   Breaking the BTK Killer's Cipher . . . . 204--209
           William G. Flynn and   
                  Sharon Maneki   The Jack Butcher Case: A Story of
                                  Courage, Commitment, and Concern . . . . 210--214
                 Todd D. Mateer   Cryptanalysis of Beale Cipher Number Two 215--232
José Ramón Soler Fuensanta and   
Francisco Javier López-Brea Espiau and   
          Diego Navarro Bonilla   Revealing Secrets in Two Wars: The
                                  Spanish Codebreakers at PC Bruno and PC
                                  Cadix  . . . . . . . . . . . . . . . . . 233--249
           Amrapali Dhavare and   
             Richard M. Low and   
                     Mark Stamp   Efficient Cryptanalysis of Homophonic
                                  Substitution Ciphers . . . . . . . . . . 250--281
              Chris Christensen   Review of \booktitleCode Talker by C.
                                  Nez (with J. S. Avila) . . . . . . . . . 282--284
              Chris Christensen   Review of Two Software-Based Textbooks   285--288

Cryptologia
Volume 37, Number 4, 2013

             John Alexander and   
              Kevin Coleman and   
                David White and   
                 Nick Miers and   
                 John Gallehawk   Whittingham--Collingwood Cipher Machine  289--304
                   Darren Glass   A First-Year Seminar on Cryptography . . 305--310
              William Stallings   Digital Signature Algorithms . . . . . . 311--327
           Abdelmalek Azizi and   
                  Mostafa Azizi   Instances of Arabic Cryptography in
                                  Morocco II . . . . . . . . . . . . . . . 328--337
                 Maria Fronczak   Atbah-Type Ciphers in the Christian
                                  Orient and Numerical Rules in the
                                  Construction of Christian Substitution
                                  Ciphers  . . . . . . . . . . . . . . . . 338--344
                 Da-Zhi Sun and   
                    Zhen-Fu Cao   On the Privacy of Khan et al.'s Dynamic
                                  ID-Based Remote Authentication Scheme
                                  with User Anonymity  . . . . . . . . . . 345--355
              Chris Christensen   Review of Biographies of Alan Turing . . 356--367
                 David H. Hamer   Review of \booktitleHitler's
                                  Codebreakers --- German Signals
                                  Intelligence in World War 2 by John
                                  Jackson  . . . . . . . . . . . . . . . . 368--370
                      Anonymous   Editorial Board EOV  . . . . . . . . . . ebi--ebi


Cryptologia
Volume 38, Number 1, 2014

                 Jeff Calof and   
                  Jeff Hill and   
                    Moshe Rubin   Chaocipher Exhibit 5: History, Analysis,
                                  and Solution of \booktitleCryptologia's
                                  1990 Challenge . . . . . . . . . . . . . 1--25
              Guido Bertoni and   
                Joan Daemen and   
       Michaël Peeters and   
              Gilles Van Assche   The Making of KECCAK . . . . . . . . . . 26--60
                  Randy Rezabek   The Russian Fish with Caviar . . . . . . 61--76
             John F. Dooley and   
            Elizabeth Anne King   John Matthews Manly: The
                                  \booktitleCollier's Articles . . . . . . 77--88
                 John F. Dooley   Review of \booktitleInferno by Dan Brown 89--92
                 John F. Dooley   Review of \booktitleMr. Penumbra's
                                  24-Hour Bookstore by Robin Sloan . . . . 93--95
            Gerhard F. Strasser   Review of \booktitleMechanisches
                                  Memorieren und Chiffrieren um 1430:
                                  Johannes Fontanas Tractatus de
                                  instrumentis artis memorie by Horst
                                  Kranz and Walter Oberschelp  . . . . . . 96--101

Cryptologia
Volume 38, Number 2, 2014

               Nicholas Rescher   Leibniz's \em Machina Deciphratoria: A
                                  Seventeenth-Century Proto-Enigma . . . . 103--115
                Kelly Chang and   
             Richard M. Low and   
                     Mark Stamp   Cryptanalysis of Typex . . . . . . . . . 116--132
            Kathryn A. Schwartz   From Text to Technological Context:
                                  Medieval Arabic Cryptology's Relation to
                                  Paper, Numbers, and the Post . . . . . . 133--146
                       Jan Bury   Pinpointing the Mark: On the Cold War
                                  SIGINT Capability  . . . . . . . . . . . 147--151
              Chris Christensen   The National Cash Register Company
                                  Additive Recovery Machine  . . . . . . . 152--177
               Ki-Hyun Jung and   
                  Kee-Young Yoo   Three-Directional Data Hiding Method for
                                  Digital Images . . . . . . . . . . . . . 178--191
              Chris Christensen   Review of \booktitleSecret History: The
                                  Story of Cryptology by Craig P. Bauer    192--193
             Betsy Rohaly Smoot   Review of \booktitleWorld War I and the
                                  Origins of U.S. Military Intelligence by
                                  James L. Gilbert . . . . . . . . . . . . 194--196

Cryptologia
Volume 38, Number 3, 2014

               George Lasry and   
                 Nils Kopal and   
                    Arno Wacker   Solving the Double Transposition
                                  Challenge with a Divide-and-Conquer
                                  Approach . . . . . . . . . . . . . . . . 197--214
                Subhash Kak and   
                 Monisha Prabhu   Cryptographic Applications of Primitive
                                  Pythagorean Triples  . . . . . . . . . . 215--222
                   Lorelei Koss   Writing and Information Literacy in a
                                  Cryptology First-Year Seminar  . . . . . 223--231
           Charles F. Rocca Jr.   Mathematics in the History of
                                  Cryptography . . . . . . . . . . . . . . 232--243
                     David Kahn   The Naval Intercept Station at
                                  Bainbridge Island, Washington  . . . . . 244--247
                 David List and   
                 John Gallehawk   Revelation for Cilli's . . . . . . . . . 248--265
               Christopher Grey   From the Archives: Colonel Butler's
                                  Satire of Bletchley Park . . . . . . . . 266--275
              Chris Christensen   Review of the 2013 Cryptologic History
                                  Symposium, \em Technological Change and
                                  Cryptology: Meeting the Historical
                                  Challenge  . . . . . . . . . . . . . . . 276--281
                 David H. Hamer   Book Review: \booktitleDönitz, U-Boats,
                                  Convoys by Jak P. Mallmann Showell . . . 282--284
              Chris Christensen   Book Review: \booktitleA Brief History
                                  of Cryptology and Cryptographic
                                  Algorithms by John F. Dooley . . . . . . 285--286
              Chris Christensen   Book Review: \booktitleThe History of
                                  Traffic Analysis: World War I--Vietnam
                                  by Donald A. Borrmann et al. . . . . . . 287--290
              Chris Christensen   Book Review: \booktitleBletchley Park:
                                  The Code-Breakers of Station X by
                                  Michael Smith  . . . . . . . . . . . . . 291--292

Cryptologia
Volume 38, Number 4, 2014

              Chris Christensen   Lester Hill Revisited  . . . . . . . . . 293--332
                 Kent D. Boklan   How I Decrypted a Confederate Diary ---
                                  And the Question of the Race of Mrs.
                                  Jefferson Davis  . . . . . . . . . . . . 333--347
            Nicolas T. Courtois   Cryptanalysis of Two GOST Variants with
                                  $ 128$-Bit Keys  . . . . . . . . . . . . 348--361
                     Raul Rojas   Konrad Zuse's Proposal for a Cipher
                                  Machine  . . . . . . . . . . . . . . . . 362--369
              Qinglong Wang and   
                    Jintai Ding   Cryptanalysis and Improvement of a
                                  $k$-out-of-$n$ Oblivious Transfer
                                  Protocol . . . . . . . . . . . . . . . . 370--376
                      Anonymous   Editorial Board EOV  . . . . . . . . . . ebi--ebi


Cryptologia
Volume 39, Number 1, 2015

             Betsy Rohaly Smoot   NSA Release and Transfer of Records
                                  Related to William F. Friedman . . . . . 1--2
            L. Babinkostova and   
               A. M. Bowden and   
              A. M. Kimball and   
                 K. J. Williams   A Simplified and Generalized Treatment
                                  of DES-Related Ciphers . . . . . . . . . 3--24
                   Philip Marks   Enigma Wiring Data: Interpreting Allied
                                  Conventions from World War II  . . . . . 25--65
         Roberto Narváez   Some Diplomatic Ciphers of the First
                                  Mexican Federal Republic (1824--1830)    66--83
                   Klaus Schmeh   Second Charlotte International
                                  Cryptologic Symposium  . . . . . . . . . 84--91
                 John F. Dooley   Book Review: \booktitleGeorge Fabyan by
                                  Richard Munson . . . . . . . . . . . . . 92--98
              Chris Christensen   Book Review: \booktitleThe Lost World of
                                  Bletchley Park by Sinclair McKay . . . . 99--100
                 David H. Hamer   Book Review: \booktitleGordon Welchman:
                                  Bletchley Park's Architect of Ultra
                                  Intelligence by Joel Greenberg . . . . . 101--103

Cryptologia
Volume 39, Number 2, 2015

      Lavinia Corina Ciungu and   
                     David Kahn   A Historical Survey of Romanian
                                  Intelligence . . . . . . . . . . . . . . 105--120
                   Gwoboa Horng   Accelerating DSA Signature Generation    121--125
                Eugen Antal and   
                    Pavol Zajac   Key Space and Period of Fialka M-125
                                  Cipher Machine . . . . . . . . . . . . . 126--144
        Nicolas T. Courtois and   
        Theodosis Mourouzis and   
             Michal Misztal and   
    Jean-Jacques Quisquater and   
                  Guangyan Song   Can GOST Be Made Secure Against
                                  Differential Cryptanalysis?  . . . . . . 145--156
                  Karl de Leeuw   J. F. W. Nuboer and the Reintroduction
                                  of Machine Cryptography by the Royal
                                  Netherlands Navy, 1915--1940 . . . . . . 157--172
                    Craig Bauer   Friedman Auditorium Times Two  . . . . . 173--177
              Chris Christensen   Review of IEEE Milestone Award to the
                                  Polish Cipher Bureau for ``The First
                                  Breaking of Enigma Code''  . . . . . . . 178--193
              Chris Christensen   Book Review: \booktitleMarian Rejewski:
                                  The Man Who Defeated Enigma by Zdzis\law
                                  Jan Kapera . . . . . . . . . . . . . . . 194--197
              Chris Christensen   Book Review: \booktitleAlan Turing: His
                                  Work and Impact, edited by S. Barry
                                  Cooper and Jan van Leeuwen . . . . . . . 198--202

Cryptologia
Volume 39, Number 3, 2015

                Jeanne Anderson   Kaczynski's Ciphers  . . . . . . . . . . 203--209
          Chris Christensen and   
                 Jared Antrobus   The Story of Mamba: Aligning Messages
                                  Against Recovered Additives  . . . . . . 210--243
  V. Gayoso Martínez and   
L. Hernández Encinas and   
               A. Queiruga Dios   Security and Practical Considerations
                                  When Implementing the Elliptic Curve
                                  Integrated Encryption Scheme . . . . . . 244--269
                  Haihua Gu and   
                    Dawu Gu and   
                  Wenlu Xie and   
               Ray C. C. Cheung   Efficient Pairing Computation on Huff
                                  Curves . . . . . . . . . . . . . . . . . 270--275
            Benedek Láng   Shame, Love, and Alcohol: Private
                                  Ciphers in Early Modern Hungary  . . . . 276--287
              Chris Christensen   Book Review: \booktitleBlackett's War by
                                  Stephen Budiansky  . . . . . . . . . . . 288--290

Cryptologia
Volume 39, Number 4, 2015

                Alan G. Konheim   The Impetus to Creativity in Technology  291--314
             Betsy Rohaly Smoot   Parker Hitt's First Cylinder Device and
                                  the Genesis of U.S. Army Cylinder and
                                  Strip Devices  . . . . . . . . . . . . . 315--321
               Nicolas Courtois   On Multiple Symmetric Fixed Points in
                                  GOST . . . . . . . . . . . . . . . . . . 322--334
             Thomas H. Barr and   
              Andrew J. Simoson   Twisting the Keyword Length from a
                                  Vigen\`ere Cipher  . . . . . . . . . . . 335--341
                   Klaus Schmeh   Encrypted Books: Mysteries that Fill
                                  Hundreds of Pages  . . . . . . . . . . . 342--361
              Chris Christensen   Book Review: \booktitleAct of War:
                                  Lyndon Johnson, North Korea, and the
                                  Capture of the Spy Ship Pueblo by Jack
                                  Cheevers . . . . . . . . . . . . . . . . 362--372
              Chris Christensen   Book Review: \booktitleThe Riddle of the
                                  Labyrinth by Margalit Fox  . . . . . . . 373--375
                      Anonymous   Editorial Board EOV  . . . . . . . . . . ebi--ebi


Cryptologia
Volume 40, Number 1, 2016

             Tzonelih Hwang and   
                  Prosanta Gope   RT-OCFB: Real-Time Based Optimized
                                  Cipher Feedback Mode . . . . . . . . . . 1--14
            Michael Goodman and   
                      Huw Dylan   British Intelligence and the Fear of a
                                  Soviet Attack on Allied Communications   15--32
            Jozef Kollár   Soviet VIC Cipher: No Respector of
                                  Kerckoff's Principles  . . . . . . . . . 33--48
               George Lasry and   
                 Nils Kopal and   
                    Arno Wacker   Automated Known-Plaintext Cryptanalysis
                                  of Short Hagelin M-209 Messages  . . . . 49--69
               Olaf Ostwald and   
                  Frode Weierud   History and Modern Cryptanalysis of
                                  Enigma's Pluggable Reflector . . . . . . 70--91
                    John Wright   Rejewski's Test Message as a Crib  . . . 92--106
                 John F. Dooley   Review of \booktitlePrisoners, Lovers, &
                                  Spies, by Kristie Macrakis . . . . . . . 107--112

Cryptologia
Volume 40, Number 2, 2016

                       Jan Bury   Operation ``Zachod'': Sex, lies, and
                                  ciphers  . . . . . . . . . . . . . . . . 113--140
               George Lasry and   
                 Nils Kopal and   
                    Arno Wacker   Ciphertext-only cryptanalysis of Hagelin
                                  M-209 pins and lugs  . . . . . . . . . . 141--176
               Harold Thimbleby   Human factors and missed solutions to
                                  Enigma design weaknesses . . . . . . . . 177--202
José Ramón Soler Fuensanta and   
          Vicente Guasch Portas   States by secrecy: Cryptography and
                                  guerrillas in the Spanish Civil War  . . 203--214

Cryptologia
Volume 40, Number 3, 2016

                     Anders Wik   Enigma Z30 retrieved . . . . . . . . . . 215--220
        Daniel Loebenberger and   
            Michael Nüsken   Design principles of DES-like ciphers: A
                                  historical overview  . . . . . . . . . . 221--239
            Gerhard F. Strasser   Samuel Zimmermann's \em Gehaimnussen:
                                  The earliest cryptological book in
                                  German . . . . . . . . . . . . . . . . . 240--260
Luis Alberto Benthin Sanguino and   
             Gregor Leander and   
              Christof Paar and   
         Bernhard Esslinger and   
                    Ingo Niebel   Analyzing the Spanish strip cipher by
                                  combining combinatorial and statistical
                                  methods  . . . . . . . . . . . . . . . . 261--284
             Tzonelih Hwang and   
                  Prosanta Gope   PFC-CTR, PFC-OCB: Efficient stream
                                  cipher modes of authencryption . . . . . 285--302

Cryptologia
Volume 40, Number 4, 2016

              Klaus Pommerening   Cryptanalysis of nonlinear feedback
                                  shift registers  . . . . . . . . . . . . 303--315
         Roberto Narváez   On the cryptography of James Leander
                                  Cathcart (1767--1843)  . . . . . . . . . 316--326
                    John Wright   A recursive solution for Turing's
                                  $H$-$M$ factor . . . . . . . . . . . . . 327--347
                    Subhash Kak   Simulating entanglement in classical
                                  computing for cryptographic applications 348--354
                 Martin Samuels   Ludwig Föppl: A Bavarian cryptanalyst on
                                  the Western front  . . . . . . . . . . . 355--373
               George Lasry and   
                 Nils Kopal and   
                    Arno Wacker   Cryptanalysis of columnar transposition
                                  cipher with long keys  . . . . . . . . . 374--398
                    Craig Bauer   Review of \booktitleUnveiling the Mystic
                                  Ciphers by Dave Ramsden  . . . . . . . . 399--401

Cryptologia
Volume 40, Number 5, 2016

         Betsy Rohaly Smoot and   
                    David Hatch   Ann Zeilinger Caracristi (1 February
                                  1921--10 January 2016) . . . . . . . . . 403
                 Kent D. Boklan   How I deciphered a Robert E. Lee letter
                                  --- and a note on the power of context
                                  in short polyalphabetic ciphers  . . . . 406
           Paolo Bonavoglia and   
           Consolato Pellegrino   The last poem of Pietro Giannone ---
                                  finally decrypted  . . . . . . . . . . . 411
               Daniel J. Girard   Breaking ``Tirpitz'': Cryptanalysis of
                                  the Japanese--German joint naval cipher  428
                   Tom Leap and   
               Tim McDevitt and   
                Kayla Novak and   
             Nicolette Siermine   Further improvements to the
                                  Bauer--Millward attack on the Hill
                                  cipher . . . . . . . . . . . . . . . . . 452
              Chris Christensen   A review of three books about the women
                                  of Bletchley Park  . . . . . . . . . . . 469
                   Nick Hoffman   Review of \booktitleIntercept: The
                                  Secret History of Computers and Spies by
                                  Gordon Corera  . . . . . . . . . . . . . 477
                    David Visco   Somerton Man times two . . . . . . . . . 481
             Betsy Rohaly Smoot   Call for papers: 2017 Symposium on
                                  Cryptologic History  . . . . . . . . . . 484

Cryptologia
Volume 40, Number 6, 2016

               George Lasry and   
                Moshe Rubin and   
                 Nils Kopal and   
                    Arno Wacker   Cryptanalysis of Chaocipher and solution
                                  of Exhibit 6 . . . . . . . . . . . . . . 487--514
               Shane Kepley and   
                David Russo and   
              Rainer Steinwandt   Cryptanalysis of a modern rotor machine
                                  in a multicast setting . . . . . . . . . 515--521
                    Qian Yu and   
                 Chang N. Zhang   A new and fast cryptographic hash
                                  function based on RC4  . . . . . . . . . 522--540
                Craig Bauer and   
               Gregory Link and   
                    Dante Molle   James Sanborn's \em Kryptos and the
                                  matrix encryption conjecture . . . . . . 541--552
                 David H. Hamer   Review of \booktitleProf: Alan Turing
                                  Decoded by Dermot Turing . . . . . . . . 553--555
              Chris Christensen   Companion review of \booktitleProf: Alan
                                  Turing Decoded by Dermot Turing  . . . . 556--562
              Chris Christensen   Review of \booktitleCodes, Ciphers and
                                  Spies: Tales of Military Intelligence in
                                  World War I by John F. Dooley  . . . . . 563--566
              Chris Christensen   Review of \booktitleU.S. Navy
                                  Codebreakers, Linguists, and
                                  Intelligence Officers against Japan,
                                  1910--1941 by Steven E. Maffeo . . . . . 567--569
                      Anonymous   Editorial Board  . . . . . . . . . . . . ebi--ebi


Cryptologia
Volume 41, Number 1, 2017

         Rohit Vobbilisetty and   
             Fabio Di Troia and   
             Richard M. Low and   
     Corrado Aaron Visaggio and   
                     Mark Stamp   Classic cryptanalysis using hidden
                                  Markov models  . . . . . . . . . . . . . 1--28
            Alan T. Sherman and   
               John Seymour and   
             Akshayraj Kore and   
                 William Newton   Chaum's protocol for detecting
                                  man-in-the-middle: Explanation,
                                  demonstration, and timing studies for a
                                  text-messaging scenario  . . . . . . . . 29--54
                Rafal Wieczorek   Putative duplication glyph in the
                                  Rongorongo script  . . . . . . . . . . . 55--72
                   Klaus Schmeh   Review of the 15th NSA Cryptologic
                                  History Symposium  . . . . . . . . . . . 73--80
              Chris Christensen   Review of \booktitleThe SIGABA/ECM II
                                  Cipher Machine: ``A Beautiful Idea'' by
                                  Timothy J. Mucklow . . . . . . . . . . . 81--84
              Chris Christensen   Review of \booktitleThe Neglected Giant:
                                  Agnes Meyer Driscoll by K. Johnson . . . 85--89
              Chris Christensen   Review of \booktitleAn Introduction to
                                  Number Theory with Cryptography by James
                                  S. Kraft and Lawrence Washington . . . . 90--91
               Dominik Landwehr   Review of \booktitleSimpliciana:
                                  Schriften der Grimmelshausen
                                  Gesellschaft 2014  . . . . . . . . . . . 92--96
                   Jeffrey Ehme   A joy to review: Two books about primes
                                  and factoring: [Rempe-Gillen, Lasse, and
                                  Rebecca Waldecker. \booktitlePrimality
                                  Testing for Beginners. Student
                                  Mathematical Library, American
                                  Mathematical Society, 2013, 244 pages,
                                  Paperback, \$39. ISBN 978-0-8218-9883-3.
                                  Wagstaff, Jr., Samuel. \booktitle{The
                                  Joy of Factoring}, Student Mathematical
                                  Library, American Mathematical Society,
                                  2013. 293 pages. Paperback, \$43.39.
                                  ISBN 978-1-4704-1048-3]  . . . . . . . . 97--100

Cryptologia
Volume 41, Number 2, 2017

               George Lasry and   
                Ingo Niebel and   
                 Nils Kopal and   
                    Arno Wacker   Deciphering ADFGVX messages from the
                                  Eastern Front of World War I . . . . . . 101--136
              William Stallings   Format-preserving encryption: Overview
                                  and NIST specification . . . . . . . . . 137--152
            Lauren De Meyer and   
                 Serge Vaudenay   DES S-box generator  . . . . . . . . . . 153--171
                   Klaus Schmeh   Review of the 2nd Historical Ciphers
                                  Colloquium in Kassel, Germany  . . . . . 172--177
              Chris Christensen   Review of \em The Imitation Game . . . . 178--181
              Chris Christensen   Review of \booktitleDemystifying the
                                  Bombe by Dermot Turing . . . . . . . . . 182--183
                 David H. Hamer   Review of \booktitleThe Secret World by
                                  Hugh Trevor-Roper  . . . . . . . . . . . 184--185
                 David H. Hamer   Review of \booktitleSolving Enigma's
                                  Secrets by John Jackson  . . . . . . . . 186--189
              Chris Christensen   Review of \booktitleThe Mathematics of
                                  Encryption: An Elementary Introduction
                                  by M. Cozzens and S. Miller  . . . . . . 190--194

Cryptologia
Volume 41, Number 3, 2017

                  David Sherman   The National Security Agency and the
                                  William F. Friedman Collection . . . . . 195--238
                G. Stuart Smith   Elizebeth Friedman's security and career
                                  concerns prior to World War II . . . . . 239--246
                Gordon Rugg and   
                   Gavin Taylor   Hoaxing statistical features of the
                                  Voynich Manuscript . . . . . . . . . . . 247--268
             John Alexander and   
             John Gallehawk and   
               John Jackson and   
               Allen Pearce and   
                 Edward Simpson   A German machine for differencing and
                                  testing additives  . . . . . . . . . . . 269--280
              Chris Christensen   A comment on a book review . . . . . . . 281--282
              Chris Christensen   Review of \booktitleThe Triumph of
                                  Zygalski's Sheets: The Polish Enigma in
                                  the Early 1940 by Zdzis\law J. Kapera    283--285
              Chris Christensen   Review of \booktitleSIGINT: The Secret
                                  History of Signals Intelligence
                                  1914--1945 by Peter Matthews . . . . . . 286--287
              Chris Christensen   Review of \booktitleBletchley Park: The
                                  Secret Archives by Sinclair McKay  . . . 288

Cryptologia
Volume 41, Number 4, 2017

                      Anonymous   David Hamer, family man and Enigma
                                  expert, remembered and missed  . . . . . 289--294
                    John Wright   The Turing Bombe \em Victory and the
                                  first naval Enigma decrypts  . . . . . . 295--328
              Chris Christensen   The evolving relationship between
                                  mathematics and cryptology, 1951--1952:
                                  SCAG and the beginnings of SCAMP and
                                  NSASAB . . . . . . . . . . . . . . . . . 329--387
                  Charles Varga   Is Zendia the Isle of Pines? . . . . . . 388--394

Cryptologia
Volume 41, Number 5, 2017

               Olaf Ostwald and   
                  Frode Weierud   Modern breaking of Enigma ciphertexts    395--421
              Xavier Bultel and   
              Jannik Dreier and   
          Pascal Lafourcade and   
                    Malika More   How to explain modern security concepts
                                  to your children . . . . . . . . . . . . 422--447
Jean-Philippe Échard and   
                Pierrick Gaudry   A harmonious encoding of instrument
                                  values by a nineteenth-century Parisian
                                  violin dealer  . . . . . . . . . . . . . 448--458
             Gunnar E. Wolf and   
    Gina Gallegos-García   Strengthening a curated web of trust in
                                  a geographically distributed project . . 459--475
             Betsy Rohaly Smoot   National Security Agency releases Army
                                  Security Agency histories covering
                                  1945--1963 . . . . . . . . . . . . . . . 476--478
              Chris Christensen   Review of \booktitleSilence Means
                                  Security: Secrets of a WWII
                                  Code-Breaking WAC by B. Nicodemus  . . . 479--480
              Chris Christensen   Review of \booktitleCode Warriors: NSA's
                                  Codebreakers and the Secret Intelligence
                                  War against the Soviet Union by S.
                                  Budiansky  . . . . . . . . . . . . . . . 481--484
                   Klaus Schmeh   Review of \booktitleUnsolved: The
                                  History and Mystery of the World's
                                  Greatest Ciphers from Ancient Egypt to
                                  Online Secret Societies by Craig Bauer   485--490

Cryptologia
Volume 41, Number 6, 2017

  Phan Du'o'ng Hi\dêu and   
                   Neal Koblitz   Cryptography during the French and
                                  American Wars in Vietnam . . . . . . . . 491--511
                       Jan Bury   Lambda: A Cold War Polish line encryptor
                                  and the networks it served . . . . . . . 512--533
                S. Agievich and   
              A. Gorodilova and   
                V. Idrisova and   
                N. Kolomeec and   
                G. Shushuev and   
                    N. Tokareva   Mathematical problems of the Second
                                  International Students' Olympiad in
                                  Cryptography . . . . . . . . . . . . . . 534--565
                      Anonymous   Editorial Board EOV  . . . . . . . . . . ??


Cryptologia
Volume 42, Number 1, 2018

                   Philip Marks   Mr. Twinn's bombes . . . . . . . . . . . 1--80
               P. R. Mishra and   
               Yogesh Kumar and   
               N. R. Pillai and   
                   R. K. Sharma   On non-linearity and affine equivalence
                                  of permutations over an arbitrary finite
                                  commutative ring with unity  . . . . . . 81--94

Cryptologia
Volume 42, Number 2, 2018

              Gregory J. Nedved   The Sino--Japanese War of 1894--1895:
                                  Partially decrypted  . . . . . . . . . . 95--105
      Manuel Vázquez and   
       Paz Jiménez-Seral   Recovering the military Enigma using
                                  permutations --- filling in the details
                                  of Rejewski's solution . . . . . . . . . 106--134
              William Stallings   The offset codebook (OCB) block cipher
                                  mode of operation for authenticated
                                  encryption . . . . . . . . . . . . . . . 135--145
              Dheerendra Mishra   Efficient and secure two-factor dynamic
                                  ID-based password authentication scheme
                                  with provable security . . . . . . . . . 146--175
                   Klaus Schmeh   Review of the 3rd European Historical
                                  Ciphers Colloquium in Smolenice,
                                  Slovakia . . . . . . . . . . . . . . . . 176--182
                 John F. Dooley   Review of \booktitleA Mind at Play by
                                  Jimmy Soni and Rob Goodman . . . . . . . 183--190

Cryptologia
Volume 42, Number 3, 2018

               Nicolas Courtois   Decryption oracle slide attacks on T-310 191--204
               Paolo Bonavoglia   A 1916 World War I notebook of Luigi
                                  Sacco  . . . . . . . . . . . . . . . . . 205--221
                    John Wright   Rejewski's equations: Solving for the
                                  entry permutation  . . . . . . . . . . . 222--226
               Hamza Moufek and   
                   Kenza Guenda   A new variant of the McEliece
                                  cryptosystem based on the Smith form of
                                  convolutional codes  . . . . . . . . . . 227--239
                      Anonymous   Corrections to ``Review of \booktitleThe
                                  Triumph of Zygalski's Sheets: The Polish
                                  Enigma in the Early 1940s'' 2017.
                                  \booktitleCryptologia \bf 41(3):
                                  283--285 . . . . . . . . . . . . . . . . 240
                   Ryan Shaffer   Spies and signals intelligence in the
                                  early Cold War . . . . . . . . . . . . . 241--253
                   David Joyner   Review of \booktitleA Life in Code by
                                  Stuart G. Smith and \booktitleThe Woman
                                  Who Smashed Codes by Jason Fagone  . . . 254--257
               Deborah Anderson   Review of \booktitleCode Girls: The
                                  untold story of the American women code
                                  breakers of World War II by Liza Mundy   258--261
                  Ralph Erskine   Review of \booktitleThe Hidden History
                                  of Bletchley Park: A Social and
                                  Organisational History, 1939--1945 by
                                  Christopher Smith  . . . . . . . . . . . 262--264
                   Klaus Schmeh   Review of \booktitleThe Voynich
                                  Manuscript by Raymond Clemens and
                                  \booktitleThe Voynich Manuscript: The
                                  world's most Mysterious and Esoteric
                                  Codex by Stephen Skinner . . . . . . . . 265--270
              Chris Christensen   Review of \booktitleCode Breaking in the
                                  Pacific by Peter Donovan and John Mack   271--273
              Chris Christensen   Review of \booktitleThe Mathematics of
                                  Secrets by Joshua Holden . . . . . . . . 274--277
              Chris Christensen   Review of \booktitleThe New Codebreakers
                                  edited by P. Ryan, D. Naccache, and
                                  J.-J. Quisquater . . . . . . . . . . . . 278--283

Cryptologia
Volume 42, Number 4, 2018

Levente Zoltán Király and   
             Gábor Tokai   Cracking the code of the Rohonc Codex    285--315
        Nicolas T. Courtois and   
        Maria-Bristena Oprisanu   Ciphertext-only attacks and weak
                                  long-term keys in T-310  . . . . . . . . 316--336
            Alan T. Sherman and   
              David DeLatte and   
              Michael Neary and   
                Linda Oliva and   
           Dhananjay Phatak and   
           Travis Scheponik and   
         Geoffrey L. Herman and   
                 Julia Thompson   Cybersecurity: Exploring core concepts
                                  through six scenarios  . . . . . . . . . 337--377
              Chris Christensen   Review of \booktitleWorking on the Dark
                                  Side of the Moon: Life Inside the
                                  National Security Agency by Thomas Reed
                                  Willemain  . . . . . . . . . . . . . . . 378--380

Cryptologia
Volume 42, Number 5, 2018

               Norbert Biermann   Analysis of Giouan Battista Bellaso's
                                  cipher challenges of 1555  . . . . . . . 381--407
               Tim McDevitt and   
               Jessica Lehr and   
                        Ting Gu   A parallel time--memory tradeoff attack
                                  on the Hill cipher . . . . . . . . . . . 408--426
           Nicolas Courtois and   
          Jörg Drobick and   
                   Klaus Schmeh   Feistel ciphers in East Germany in the
                                  communist era  . . . . . . . . . . . . . 427--444
              Chris Christensen   Review of \booktitleLorenz and comments
                                  on the work of William Tutte: Roberts,
                                  Captain Jerry. \booktitleLorenz:
                                  Breaking Hitler's Top Secret Code at
                                  Bletchley Park. The History Press,
                                  Stroud, Gloucestershire UK, 2017. 240
                                  pages, Hardcover, \pounds 20. ISBN
                                  978-0-7509-7885-9  . . . . . . . . . . . 445--466
            Gerhard F. Strasser   Review of \booktitleVersteckte
                                  Botschaften. Die faszinierende
                                  Geschichte der Steganografie. 2.,
                                  aktualisierte und erweiterte Auflage
                                  (\booktitleHidden Messages. The
                                  Fascinating Story of Steganography. 2nd,
                                  updated and expanded edition) by Klaus
                                  Schmeh . . . . . . . . . . . . . . . . . 467--475

Cryptologia
Volume 42, Number 6, 2018

               Satoshi Tomokiyo   How I reconstructed a Spanish cipher
                                  from 1591  . . . . . . . . . . . . . . . 477--484
               George Lasry and   
                 Nils Kopal and   
                    Arno Wacker   Ciphertext-only cryptanalysis of short
                                  Hagelin M-209 ciphertexts  . . . . . . . 485--513
                  Ulug Kuzuoglu   Chinese cryptography: The Chinese
                                  Nationalist Party and intelligence
                                  management, 1927--1949 . . . . . . . . . 514--539
              Chris Christensen   Review of \booktitleA Grand Gossip: The
                                  Bletchley Park Diary of Basil Cottle
                                  edited by James and Judith Hodsdon . . . 540--543
              Chris Christensen   Review of \booktitleTICOM: The Hunt for
                                  Hitler's Codebreakers by Randy Rezabek   544--547
                      Anonymous   Editorial Board EOV  . . . . . . . . . . ??


Cryptologia
Volume 43, Number 1, 2019

                      Anonymous   2019 Symposium on Cryptologic History    1--1
        Nicolas T. Courtois and   
    Maria-Bristena Oprisanu and   
                   Klaus Schmeh   Linear cryptanalysis and block cipher
                                  design in East Germany in the 1970s  . . 2--22
               Satoshi Tomokiyo   Identifying Italian ciphers from
                                  continuous-figure ciphertexts (1593) . . 23--46
                Alberto Peinado   Reconstruction of a 1940 Spanish strip
                                  cipher by means of a cyclic rotation
                                  model applied to encrypted telegrams . . 47--64
              Chris Christensen   Review of \booktitleThe Spy Who Couldn't
                                  Spell by Yudhijit Bhattacharjee  . . . . 65--68
              Chris Christensen   Review of \booktitleStanley Johnston's
                                  Blunder: the Reporter Who Spilled the
                                  Secret Behind the U.S. Navy's Victory at
                                  Midway by Elliot Carlson . . . . . . . . 69--76
              Chris Christensen   Review of \booktitleAlastair Denniston:
                                  Code-Breaking from Room 40 to Berkeley
                                  Street and the Birth of GCHQ by Joel
                                  Greenberg  . . . . . . . . . . . . . . . 77--80

Cryptologia
Volume 43, Number 2, 2019

              Chris Christensen   Edward Hugh Simpson CB (10 December
                                  1922--5 February 2019) . . . . . . . . . 81--83
          Chris Christensen and   
             Jared Antrobus and   
                 Edward Simpson   Aligning JN-25 messages in depth using
                                  weights when the code groups scan  . . . 84--137
              A. Gorodilova and   
                S. Agievich and   
                  C. Carlet and   
                E. Gorkunov and   
                V. Idrisova and   
                N. Kolomeec and   
                A. Kutsenko and   
                  S. Nikova and   
               A. Oblaukhov and   
                   S. Picek and   
                 B. Preneel and   
                  V. Rijmen and   
                    N. Tokareva   Problems and solutions from the fourth
                                  International Students' Olympiad in
                                  Cryptography (NSUCRYPTO) . . . . . . . . 138--174

Cryptologia
Volume 43, Number 3, 2019

        Nicolas T. Courtois and   
            Marios Georgiou and   
                Matteo Scarlata   Slide attacks and LC-weak keys in T-310  175--189
         Hussam S. Alhadawi and   
     Mohamad Fadli Zolkipli and   
             Saba M. Ismail and   
                Dragan Lambi\'c   Designing a pseudorandom bit generator
                                  based on LFSRs and a discrete chaotic
                                  map  . . . . . . . . . . . . . . . . . . 190--211
              Tanmoy Maitra and   
               Debasis Giri and   
               Ram N. Mohapatra   SAS-SIP: A secure authentication scheme
                                  based on ECC and a fuzzy extractor for
                                  session initiation protocol  . . . . . . 212--232
              P. Mathivanan and   
           A. Balaji Ganesh and   
                  R. Venkatesan   QR code-based ECG signal
                                  encryption/decryption algorithm  . . . . 233--253
             Ahmed Bentajer and   
           Mustapha Hedabou and   
          Karim Abouelmehdi and   
          Zakaria Igarramen and   
                 Said El Fezazi   An IBE-based design for assured deletion
                                  in cloud storage . . . . . . . . . . . . 254--265

Cryptologia
Volume 43, Number 4, 2019

               George Lasry and   
                 Nils Kopal and   
                    Arno Wacker   Cryptanalysis of Enigma double
                                  indicators with hill climbing  . . . . . 267--292
               Alan Sherman and   
           Enis Golaszewski and   
            Edward LaFemina and   
            Ethan Goldschen and   
              Mohammed Khan and   
               Lauren Mundy and   
               Mykah Rather and   
                Bryan Solis and   
             Wubnyonga Tete and   
               Edwin Valdez and   
                Brian Weber and   
               Damian Doyle and   
              Casey O'Brien and   
                Linda Oliva and   
              Joseph Roundy and   
                     Jack Suess   The SFS summer research study at UMBC:
                                  Project-based learning inspires
                                  cybersecurity students . . . . . . . . . 293--312
             Tasnime Omrani and   
              Rhouma Rhouma and   
                 Rabei Becheikh   LICID: a lightweight image cryptosystem
                                  for IoT devices  . . . . . . . . . . . . 313--343
                 John F. Dooley   The Beale ciphers in fiction . . . . . . 344--358

Cryptologia
Volume 43, Number 5, 2019

 Jean-François Bouchaudy   Genuine French WWII M-209 cryptograms    359--371
             Khushboo Bussi and   
              Dhananjoy Dey and   
               P. R. Mishra and   
                     B. K. Dass   MGR Hash Functions . . . . . . . . . . . 372--390
             Türker Tuncer   Block-based fuzzy-image authentication
                                  method . . . . . . . . . . . . . . . . . 391--413
            Manashee Kalita and   
        Themrichon Tuithung and   
            Swanirbhar Majumder   An adaptive color image steganography
                                  method using adjacent pixel value
                                  differencing and LSB substitution
                                  technique  . . . . . . . . . . . . . . . 414--437
               Mike Clayton and   
                 John Gallehawk   Letter repeats in Enigma ciphertext
                                  produced by same-letter keying . . . . . 438--457

Cryptologia
Volume 43, Number 6, 2019

               Paolo Bonavoglia   Bellaso's 1552 cipher recovered in
                                  Venice . . . . . . . . . . . . . . . . . 459--465
             Emma May Smith and   
                    Marco Ponzi   Glyph combinations across word breaks in
                                  the Voynich manuscript . . . . . . . . . 466--485
              Otokar Grosek and   
                Eugen Antal and   
            Tomás Fabsic   Remarks on breaking the Vigen\`ere
                                  autokey cipher . . . . . . . . . . . . . 486--496
              S. Masih Ayat and   
              Meysam Ghahramani   A recursive algorithm for solving ``a
                                  secret sharing'' problem . . . . . . . . 497--503
               Neha Kishore and   
                    Priya Raina   Parallel cryptographic hashing:
                                  Developments in the last 25 years  . . . 504--535
              Chris Christensen   Review of \booktitleHistory of
                                  Cryptography and Cryptanalysis by John
                                  Dooley . . . . . . . . . . . . . . . . . 536--538
              Chris Christensen   Review of \booktitleThe Cypher Bureau by
                                  Eilidh McGinness . . . . . . . . . . . . 539--541
              Chris Christensen   Review of \booktitleX, Y & Z by Dermot
                                  Turing . . . . . . . . . . . . . . . . . 542--544
      R. Narváez Roberto   Review of \booktitleMensajes secretos.
                                  La historia de la criptografía Española
                                  desde sus inicios hasta los años 50
                                  (Secret Messages. The History of Spanish
                                  Cryptography from its beginnings until
                                  the 1950s) by Soler Fuensanta, José Ramón,
                                  and Francisco Javier López-Brea Eespiau   545--550
                 John F. Dooley   Review of \booktitle3 Ciphers by Carol
                                  Ritz . . . . . . . . . . . . . . . . . . 551--552


Cryptologia
Volume 44, Number 1, 2020

               Torsten Timm and   
               Andreas Schinner   A possible generating algorithm of the
                                  Voynich manuscript . . . . . . . . . . . 1--19
        Nicolas T. Courtois and   
                Marios Georgiou   Variable elimination strategies and
                                  construction of nonlinear polynomial
                                  invariant attacks on T-310 . . . . . . . 20--38
               Paolo Bonavoglia   The cifra delle caselle: a XVI Century
                                  superencrypted cipher  . . . . . . . . . 39--52
             Alejandra Diaz and   
            Alan T. Sherman and   
                   Anupam Joshi   Phishing in an academic community: A
                                  study of user susceptibility and
                                  behavior . . . . . . . . . . . . . . . . 53--67
                Manoj Kumar and   
               T. S. Suresh and   
              Saibal K. Pal and   
              Anupama Panigrahi   Optimal differential trails in
                                  lightweight block ciphers ANU and PICO   68--78
              David Sherman and   
         Betsy Rohaly Smoot and   
               Robert J. Hanyok   Introducing a new \booktitleCryptologia
                                  series: Sources and methods for
                                  cryptologic history  . . . . . . . . . . 79--81
                      Anonymous   Review of two collections of essays
                                  about Alan Turing: Copeland, Jack,
                                  Jonathan Bowen, Mark Sprevak, Robin
                                  Wilson, and others, \booktitleThe Turing
                                  Guide, Oxford University Press, Oxford,
                                  2017. 546 pages, Paperback, \$29.95.
                                  ISBN 978-0-19-874783-3. Floyd, Juliet
                                  and Alisa Bokulich (eds.),
                                  \booktitle{Philosophical Explorations of
                                  the Legacy of Alan Turing: Turing 100},
                                  Springer International Publishing, Cham,
                                  Switzerland, 2017. 361 pages, Hardcover,
                                  \$139.99. ISBN 978-3-319-53278-3 . . . . 82--86
                      Anonymous   Review of \booktitleReal Life Cryptology
                                  by Benedek Láng . . . . . . . . . . . . . 87--90
                 John F. Dooley   Review of \booktitleThe Third Reich is
                                  Listening by Christian Jennings  . . . . 91--95

Cryptologia
Volume 44, Number 2, 2020

              Frode Weierud and   
                   Sandy Zabell   German mathematicians and cryptology in
                                  WWII . . . . . . . . . . . . . . . . . . 97--171
         Betsy Rohaly Smoot and   
               Robert J. Hanyok   Sources and methods for cryptologic
                                  history: Research at the US National
                                  Archives --- the ``Big Two'' Record
                                  Groups . . . . . . . . . . . . . . . . . 172--196

Cryptologia
Volume 44, Number 3, 2020

              Seongmin Park and   
               Juneyeun Kim and   
                Kookrae Cho and   
                   Dae Hyun Yum   Finding the key length of a Vigen\`ere
                                  cipher: How to improve the twist
                                  algorithm  . . . . . . . . . . . . . . . 197--204
                 Thomas Kaeding   Slippery hill-climbing technique for
                                  ciphertext-only cryptanalysis of
                                  periodic polyalphabetic substitution
                                  ciphers  . . . . . . . . . . . . . . . . 205--222
      Anastasiya Gorodilova and   
            Sergey Agievich and   
              Claude Carlet and   
             Xiang-dong Hou and   
           Valeria Idrisova and   
           Nikolay Kolomeec and   
          Alexandr Kutsenko and   
                Luca Mariot and   
           Alexey Oblaukhov and   
              Stjepan Picek and   
               Bart Preneel and   
               Razvan Rosie and   
               Natalia Tokareva   The Fifth International Students'
                                  Olympiad in cryptography --- NSUCRYPTO:
                                  Problems and their solutions . . . . . . 223--256
              Cheryl Beaver and   
                 Stuart Boersma   Celebrating ten years of KRYPTOS: a
                                  series of cryptanalysis  . . . . . . . . 257--266
                  David Sherman   Sources and methods for cryptologic
                                  history: the William and Elizebeth Smith
                                  Friedman collections . . . . . . . . . . 267--279
                 John F. Dooley   Review of \booktitleThe Secret World by
                                  Christopher Andrew . . . . . . . . . . . 280--284
                 Jerry McCarthy   Review of the 2nd International
                                  Conference on Historical Cryptology in
                                  Mons, Belgium  . . . . . . . . . . . . . 285--288

Cryptologia
Volume 44, Number 4, 2020

        Nicolas T. Courtois and   
              Aidan Patrick and   
               Matteo Abbondati   Construction of a polynomial invariant
                                  annihilation attack of degree 7 for
                                  T-310  . . . . . . . . . . . . . . . . . 289--314
           Shaheena Khatoon and   
           Balwant Singh Thakur   Cryptanalysis and improvement of
                                  authentication scheme for roaming
                                  service in ubiquitous network  . . . . . 315--340
             Prateek Pandey and   
               Ratnesh Litoriya   Securing and authenticating healthcare
                                  records through blockchain technology    341--356
       Anindya Kumar Biswas and   
                   Mou Dasgupta   Two polynomials based $ (t, n) $
                                  threshold secret sharing scheme with
                                  cheating detection . . . . . . . . . . . 357--370
                  Sarah Parsons   Sources and methods for cryptologic
                                  history: NSA.gov --- a tour through its
                                  history and resources  . . . . . . . . . 371--382
              Chris Christensen   Review of \booktitleCode Cracking for
                                  Kids, by Jean Daigneau . . . . . . . . . 383--384

Cryptologia
Volume 44, Number 5, 2020

               David Kenyon and   
                  Frode Weierud   Enigma G: The counter Enigma . . . . . . 385--420
                     Jonas Alin   Principal component analysis of
                                  characters in the Voynich manuscript and
                                  their classifications based on
                                  comparative analysis of writings in
                                  known languages  . . . . . . . . . . . . 421--437
Lucas Boppré Niehues and   
     Joachim von zur Gathen and   
       Lucas Pandolfo Perin and   
      Ana Zumalacárregui   Sidon sets and statistics of the ElGamal
                                  function . . . . . . . . . . . . . . . . 438--450
              Monjul Saikia and   
              Md. Anwar Hussain   Efficient data encryption technique
                                  using quaternions for wireless sensor
                                  network  . . . . . . . . . . . . . . . . 451--471
           Robert J. Hanyok and   
             Betsy Rohaly Smoot   Sources and methods series: considering
                                  other record groups in Nara holding
                                  cryptologic and cryptologic-related
                                  records  . . . . . . . . . . . . . . . . 472--476
                 John F. Dooley   Review of \booktitleA Most Enigmatic
                                  War, by James Goodchild  . . . . . . . . 477--480

Cryptologia
Volume 44, Number 6, 2020

              Tomi S. Melka and   
               Robert M. Schoch   Exploring a mysterious tablet from
                                  Easter Island: the issues of
                                  authenticity and falsifiability in \em
                                  rongorongo studies . . . . . . . . . . . 481--544
       Beáta Megyesi and   
         Bernhard Esslinger and   
       Alicia Fornés and   
                 Nils Kopal and   
        Benedek Láng and   
               George Lasry and   
              Karl de Leeuw and   
             Eva Pettersson and   
                Arno Wacker and   
       Michelle Waldispühl   Decryption of historical manuscripts:
                                  the DECRYPT project  . . . . . . . . . . 545--559
           Robert J. Hanyok and   
             Betsy Rohaly Smoot   Sources and methods: contingency and its
                                  role in researching records of
                                  cryptologic history --- a discussion and
                                  some lessons to apply for future
                                  research . . . . . . . . . . . . . . . . 560--568
              Chris Christensen   Review of \booktitleThe Enigma Bulletin
                                  edited by Zdzis\law J. Kapera  . . . . . 569--572
              Chris Christensen   Review of \booktitleBletchley Park and
                                  D-Day by David Kenyon  . . . . . . . . . 573--576


Cryptologia
Volume 45, Number 1, 2021

               Kenneth J. Bures   Cracking PURPLE: cryptanalysis of the
                                  \em Angooki Taipu B switch tables  . . . 1--43
           István Daruka   On the Voynich manuscript  . . . . . . . 44--80
             Betsy Rohaly Smoot   Sources and methods: uncovering the
                                  story of American Cryptology in World
                                  War I  . . . . . . . . . . . . . . . . . 81--87
              Chris Christensen   Review of \booktitleBreaking Teleprinter
                                  Ciphers at Bletchley Park by James A.
                                  Reeds, Whitfield Diffie, and J. V. Field 88--93
               Paolo Bonavoglia   Review of \booktitleClassical cryptology
                                  at play by Silvio Coccaro  . . . . . . . 94--96

Cryptologia
Volume 45, Number 2, 2021

                  John A. Tokar   NSA honors two \booktitleCryptologia
                                  board members  . . . . . . . . . . . . . 97--101
              Gregory J. Nedved   Herbert O. Yardley revisited: what does
                                  the new evidence say?  . . . . . . . . . 102--128
José Ramón Soler Fuensanta and   
  Héctor Soler Bonet and   
          Diego Navarro Bonilla   How to make a codebook versatile. The
                                  example of the ASLET code  . . . . . . . 129--166
                   Kirsten Tate   Identifying concealed messages using
                                  authorship attribution . . . . . . . . . 167--177
            Nicolas T. Courtois   A nonlinear invariant attack on T-310
                                  with the original Boolean function . . . 178--192

Cryptologia
Volume 45, Number 3, 2021

                      Anonymous   18th Cryptologic History Symposium . . . 193--193
Åvald Åslaugson Sommervoll and   
                    Leif Nilsen   Genetic algorithm attack on Enigma's
                                  plugboard  . . . . . . . . . . . . . . . 194--226
              Dimpy Chauhan and   
              Indivar Gupta and   
                   Rashmi Verma   Quasigroups and their applications in
                                  cryptography . . . . . . . . . . . . . . 227--265
               George Teseleanu   Quasigroups and substitution permutation
                                  networks: a failed experiment  . . . . . 266--281
                    Viktor Wase   Benford's Law in the Beale ciphers . . . 282--286
                    John Dooley   Review of \booktitleFlight of the Fox by
                                  Gray Basnight  . . . . . . . . . . . . . 287--288

Cryptologia
Volume 45, Number 4, 2021

                  Frode Weierud   In memoriam: Thomas Ralph Erskine CB
                                  (1933--2021) . . . . . . . . . . . . . . 289--308
 Jean-François Bouchaudy   Enigma: the spoils of Gustave Bertrand,
                                  or ``par o\`u tout a commencé'' . . . . . 309--341
Rémi Géraud-Stewart and   
                 David Naccache   A French cipher from the late 19$^{th}$
                                  century  . . . . . . . . . . . . . . . . 342--370
                  Robert Hanyok   Sources and methods: Searching for
                                  cryptologic records in the findings of
                                  post-World War II allied technical
                                  surveys and commissions  . . . . . . . . 371--378
                  Ralph Erskine   Review of \booktitleThe Nazi Spy Ring in
                                  America by Rhodri Jeffreys-Jones . . . . 379--382

Cryptologia
Volume 45, Number 5, 2021

               George Lasry and   
                Ingo Niebel and   
        Torbjörn Andersson   Deciphering German diplomatic and naval
                                  attaché messages from 1900--1915  . . . . 383--425
              Ronald Phelan and   
                  David Simpson   Ludlings: not all fun and games  . . . . 426--433
               Torsten Timm and   
               Andreas Schinner   Review of \booktitleThe linguistics of
                                  the Voynich manuscript by Claire Bowern
                                  and Luke Lindemann . . . . . . . . . . . 434--438
                Blain Patterson   Analyzing student understanding of
                                  cryptography using the SOLO taxonomy . . 439--449
     Malik Zia Ullah Bashir and   
                     Rashid Ali   Cryptanalysis and improvement of a blind
                                  multi-document signcryption scheme . . . 450--464
             Betsy Rohaly Smoot   Sources and methods for cryptologic
                                  history: researching individuals (and
                                  the biography boom)  . . . . . . . . . . 465--473
              Chris Christensen   Review of \booktitleOperation Vengeance:
                                  The Astonishing Aerial Ambush That
                                  Changed World War II by Dan Hampton  . . 474--477

Cryptologia
Volume 45, Number 6, 2021

               George Lasry and   
       Beáta Megyesi and   
                     Nils Kopal   Deciphering papal ciphers from the 16th
                                  to the 18th Century  . . . . . . . . . . 479--540
J. Mohamedmoideen Kader Mastan and   
                     R. Pandian   Cryptanalysis of two similar chaos-based
                                  image encryption schemes . . . . . . . . 541--552
             Barry J. Griffiths   Cryptography in undergraduate education:
                                  perceptions of postgraduate students . . 553--562
              Chris Christensen   Review of \booktitleThe Codebreakers of
                                  Bletchley Park by Dermot Turing  . . . . 563--564
              Chris Christensen   Review of \booktitleA Course in
                                  Cryptography by Heiko Knospe . . . . . . 565--568
              Chris Christensen   Review of \booktitleThe U.S. Navy's
                                  On-the-Roof Gang, Volume Two, War in the
                                  Pacific by Matt Zullo  . . . . . . . . . 569--570
              Chris Christensen   Review of \booktitleCodebreaking: A
                                  Practical Guide by Elonka Dunin and
                                  Klaus Schmeh . . . . . . . . . . . . . . 571--572


Cryptologia
Volume 46, Number 1, 2022

            Richard W. Bean and   
               George Lasry and   
                  Frode Weierud   Eavesdropping on the Biafra--Lisbon link
                                  --- breaking historical ciphers from the
                                  Biafran war  . . . . . . . . . . . . . . 1--66
             Enka Blanchard and   
               Ryan Robucci and   
                 Ted Selker and   
                Alan T. Sherman   Phrase-verified voting: Verifiable
                                  low-tech remote boardroom voting . . . . 67--101

Cryptologia
Volume 46, Number 2, 2022

                 Nils Kopal and   
       Michelle Waldispühl   Deciphering three diplomatic letters
                                  sent by Maximilian II in 1575  . . . . . 103--127
         Türker Tuncer and   
             Huseyin Yuce Kurum   A novel Collatz conjecture-based digital
                                  image watermarking method  . . . . . . . 128--147
          Vladimir Edemskiy and   
               Chenhuang Wu and   
                   Chunxiang Xu   Improvements on $k$-error linear
                                  complexity of $q$-ary sequences derived
                                  from Euler quotients . . . . . . . . . . 148--166
Hervé Talé Kalachi   On the failure of the smart approach of
                                  the GPT cryptosystem . . . . . . . . . . 167--182
              Chris Christensen   Review of \booktitleThe U.S. Navy's
                                  On-the-Roof Gang, Volume One, Prelude to
                                  War by Matt Zullo  . . . . . . . . . . . 183--184
              Chris Christensen   Review of \booktitleOne Day in August by
                                  David O'Keefe  . . . . . . . . . . . . . 185--192
              Chris Christensen   Review of \booktitleGeniuses at War:
                                  Bletchley Park, Colossus, and the Dawn
                                  of the Digital Age by David A. Price . . 193--194

Cryptologia
Volume 46, Number 3, 2022

 Jean-François Bouchaudy   Enigma, the XYZ period (1939--1940)  . . 195--271
              Chris Christensen   Review of \booktitleBefore Bletchley
                                  Park: The Codebreakers of the First
                                  World War by Paul Gannon . . . . . . . . 272--276
              Chris Christensen   Review of \booktitleBacking Bletchley:
                                  The Codebreaking Outstations from
                                  Eastcote to GCHQ by Ronald Koorm . . . . 277--279
              Chris Christensen   Review of \booktitleMadame X: The Story
                                  of `003', the U.S. Army Cryptologic
                                  Bombe in World War II by Michael
                                  Barbakoff  . . . . . . . . . . . . . . . 280--283
              Chris Christensen   Review of \booktitleImages of the
                                  National Archives Codebreakers by
                                  Stephen Twigge . . . . . . . . . . . . . 284--286
              Chris Christensen   Review of \booktitleReflections of Alan
                                  Turing: a Relative Story by Dermot
                                  Turing . . . . . . . . . . . . . . . . . 287--289
                      Anonymous   Correction . . . . . . . . . . . . . . . 290--290

Cryptologia
Volume 46, Number 4, 2022

                 Paul W. Relkin   Solving the Olum 1 Cipher  . . . . . . . 291--301
               Elonka Dunin and   
              Magnus Ekhall and   
      Konstantin Hamidullin and   
                 Nils Kopal and   
               George Lasry and   
                   Klaus Schmeh   How we set new world records in breaking
                                  Playfair ciphertexts . . . . . . . . . . 302--322
               Paolo Bonavoglia   The ciphers of the Republic of Venice:
                                  an overview  . . . . . . . . . . . . . . 323--346
                David Chaum and   
             Mario Yaksetig and   
            Alan T. Sherman and   
                Joeri de Ruiter   UDM: Private user discovery with minimal
                                  information disclosure . . . . . . . . . 347--379
              Chris Christensen   Review of \booktitleUSN & USMC WW II
                                  Cryptologists' Oral Histories; Voices
                                  from the past, Volumes 1 and 2 by U.S.
                                  Naval Cryptologic Veterans Association.
                                  Volume 1 of 2 (A--L). 2019. 450 + vi
                                  pages, Softcover, \$16.95. ISBN
                                  978-1-7988-8747-9. Volume 2 of 2 (M--Z).
                                  2019. 365 + iv pages, Softcover,
                                  \$16.95. ISBN 978-1-7988-8811-7  . . . . 380--381
              Chris Christensen   Review of \booktitleRadio War: The
                                  Secret Espionage War of the Radio
                                  Security Service 1938--1946 by David
                                  Abrutat. Fonthill Media, Stroud,
                                  Gloucestershire, UK. 2019. 192 pages,
                                  Hardcover, \pounds 25.00 (\$38.00). ISBN
                                  978-1-78155-759-4} . . . . . . . . . . . 382--384
              Chris Christensen   Review of \booktitleThe Bombe: The
                                  Machine that Defeated Enigma by Dermot
                                  Turing. Arcturus Publishing Limited,
                                  London, 2021. 64 pages, Trade paperback
                                  A-5, \pounds 11.20. ISBN
                                  978-1-3988-1244-4  . . . . . . . . . . . 385--386

Cryptologia
Volume 46, Number 5, 2022

        Nicolas T. Courtois and   
                   Marek Grajek   On latin squares, invariant
                                  differentials, random permutations and
                                  historical Enigma rotors . . . . . . . . 387--421
                   Anna Lehofer   Applying hierarchical clustering to
                                  homophonic substitution ciphers using
                                  historical corpora . . . . . . . . . . . 422--438
               P. R. Mishra and   
                   S. C. Ramola   FCSR connection integers: efficient
                                  generation, testing and counting . . . . 439--460
     François Parmentier   Deciphering the Voynich manuscript:
                                  propositions to unlock research  . . . . 461--484

Cryptologia
Volume 46, Number 6, 2022

                Roger J. Morgan   Rudyard Kipling's unsolved cryptogram    485--497
              Sedat Bingöl   Methods for encryption in early
                                  19th-century Ottoman diplomatic
                                  correspondence . . . . . . . . . . . . . 498--524
              Dimpy Chauhan and   
              Indivar Gupta and   
               P. R. Mishra and   
                   Rashmi Verma   Construction of cryptographically strong
                                  S-boxes from ternary quasigroups of
                                  order 4  . . . . . . . . . . . . . . . . 525--551
              Chris Christensen   Review of \booktitleEavesdropping on the
                                  Emperor: Interrogators and Codebreakers
                                  in Britain's War with Japan by Peter
                                  Kornicki . . . . . . . . . . . . . . . . 552--555
                 John F. Dooley   Review of \booktitleCodebreaker by Marc
                                  McMenamin  . . . . . . . . . . . . . . . 556--560


Cryptologia
Volume 47, Number 1, 2023

                   George Lasry   Cracking SIGABA in less than 24 hours on
                                  a consumer PC  . . . . . . . . . . . . . 1--37
                 Paul W. Relkin   Solving the Olum 2 cipher: a new
                                  approach to cryptanalysis of
                                  transposition ciphers  . . . . . . . . . 38--47
                   George Lasry   Analysis of a late 19th century French
                                  cipher created by Major Josse  . . . . . 48--62
                   K. Ahmed and   
                     S. Pal and   
                       R. Mohan   A review of the tropical approach in
                                  cryptography . . . . . . . . . . . . . . 63--87
             Stuart Boersma and   
             Jean Marie Linhart   Review of \booktitleThe Woman All Spies
                                  Fear by Amy Butler Greenfield and
                                  \booktitleCode Breaker, Spy Hunter by
                                  Laurie Wallmark, Illustrated by Brooke
                                  Smart  . . . . . . . . . . . . . . . . . 88--92
              Chris Christensen   Review of \booktitleCodebreaker Girls: A
                                  Secret Life at Bletchley Park by Jan
                                  Slimming . . . . . . . . . . . . . . . . 93--96

Cryptologia
Volume 47, Number 2, 2023

                 Craig P. Bauer   The new golden age of decipherment . . . 97--100
               George Lasry and   
           Norbert Biermann and   
               Satoshi Tomokiyo   Deciphering Mary Stuart's lost letters
                                  from 1578--1584  . . . . . . . . . . . . 101--202

Cryptologia
Volume 47, Number 3, 2023

                  David Sherman   \booktitleThe Codebreakers war: David
                                  Kahn, Macmillan, the government, and the
                                  making of a cryptologic history
                                  masterpiece  . . . . . . . . . . . . . . 205--226
                 Stuart Boersma   Elizebeth Smith Friedman and one example
                                  of a prohibition era encryption system   227--238
                Eugen Antal and   
                    Pavol Zajac   The first Czechoslovak cipher machine    239--260
               Olaf Ostwald and   
                  Frode Weierud   Modern cryptanalysis of the \em
                                  Truppenschlüssel  . . . . . . . . . . . . 261--281
              Chris Christensen   Review of \booktitleThe Rohonc Code:
                                  Tracing a Historical Riddle by Benedek
                                  Láng  . . . . . . . . . . . . . . . . . . 282--284
            Patrick D. Anderson   Review of \booktitleCrypto Wars --- The
                                  Fight for Privacy in the Digital Age: A
                                  Political History of Digital Encryption  285--298

Cryptologia
Volume 47, Number 4, 2023

                      Anonymous   Cryptologic History Symposium, May
                                  8--10, 2024  . . . . . . . . . . . . . . 299--301
              Chris Christensen   Genevieve Grotjan's ``great discovery''  302--317
       David Lòberg Code   Can musical encryption be both? A survey
                                  of music-based ciphers . . . . . . . . . 318--364
               George Teseleanu   Cryptographic symmetric structures based
                                  on quasigroups . . . . . . . . . . . . . 365--392
                 John F. Dooley   Review of \booktitleThe Rose Code by
                                  Kate Quinn . . . . . . . . . . . . . . . 393--395

Cryptologia
Volume 47, Number 5, 2023

                 Stuart Boersma   Complete examples of encryption systems
                                  broken by Elizebeth Smith Friedman:
                                  1923--1934 . . . . . . . . . . . . . . . 397--418
               Arvind Kumar and   
               P. R. Mishra and   
                   Odelu Ojjela   Analysis of rotation and shift based
                                  diffusion functions  . . . . . . . . . . 419--435
               Kenneth J. Bures   Cracking PURPLE: the identification of
                                  homologs in the cryptanalysis of the \em
                                  Angooki Taipu B cipher machine . . . . . 436--448
              Zhixiong Chen and   
                 Zhihua Niu and   
                  Yuqi Sang and   
                   Chenhuang Wu   Arithmetic autocorrelation of binary
                                  $m$-sequences  . . . . . . . . . . . . . 449--458
                  Joshua Holden   Resource guide for teaching post-quantum
                                  cryptography . . . . . . . . . . . . . . 459--465
            Leonardo Campanelli   A statistical cryptanalysis of the Beale
                                  ciphers  . . . . . . . . . . . . . . . . 466--473
         Joachim von zur Gathen   Unicity distance of the Zodiac-340
                                  cipher . . . . . . . . . . . . . . . . . 474--488
              Chris Christensen   Review of \booktitleParker Hitt: The
                                  Father of American Military Cryptology
                                  by Betsy Rohaly Smoot  . . . . . . . . . 489--492


Intelligence and national security
Volume 14, Number 3, 1999

                     R. Erskine   Cipher A. Deavours, David Kahn, Louis
                                  Kruh, Greg Mellen, Brian J. Winkel
                                  (eds.), Selections from Cryptologia:
                                  History, People and Technology . . . . . 247


IEEE Annals of the History of Computing
Volume 21, Number 4, October / December, 1999

          Peggy Aldrich Kidwell   Departments --- Reviews --- Electronic
                                  Genie Rescuing Prometheus; Forbes'
                                  Greatest Technology Stories; Information
                                  Ages; The Mathematical Theory of
                                  Communication; LEO: The Incredible Story
                                  of the World's First Business; Computer
                                  Architects of the Information Society;
                                  Cryptologia; The Supply of Information
                                  Technology Workers in the US . . . . . . 81--84


Notices of the {American Mathematical Society}
Volume 48, Number 6, 2001

                      Anonymous   Departments: For Your Information: Proof
                                  Playright Wins Pulitzer; Call for
                                  Mathematician Mentors; 45th Reunion
                                  Conference for Ross Program;
                                  Undergraduate Paper Competitions in
                                  Cryptologia; Volunteers Sought for AWM
                                  Essay Contest; Corrections . . . . . . . 607--608


The Times [London, UK]
Papers beginning 2003

                      Anonymous   Alec Dakin: codebreaker who was among
                                  the first at Bletchley Park to see the
                                  news that Hitler was dead  . . . . . . . 1