Introduction | p. ix |
History, Literature, and Personalities | p. 1 |
The Genesis of the Jefferson/Bazeries Cipher Machine, Cryptologia, Vol. 5, No. 4, Oct. 1981, pp. 193-208 | p. 3 |
The Search for the Key to Nicholas Trist's Book Cipher, Cryptologia, Vol. 7, No. 4, Oct. 1983, pp. 297-314 | p. 21 |
My Recollections of G2/A6, Cryptologia, Vol. 2, No. 3, July 1978, pp. 201-214 | p. 39 |
Who Wrote "The American Black Chamber"? Cryptologia, Vol. 2, No. 2 April 1978, pp. 130-133 | p. 51 |
The Annotated "The American Black Chamber," Cryptologia, Vol. 9, No. 1, Jan. 1985, pp. 1-37 | p. 55 |
Memories of Friedman, Cryptologia, Vol. 4, No. 1, Jan. 1980, pp. 23-26 | p. 93 |
Reminiscences of a Master Cryptologist, Cryptologia, Vol. 4, No. 1, Jan. 1980, pp. 45-50 | p. 99 |
A Failure of Radio Intelligence: An Episode in the Battle of the Coral Sea, Cryptologia, Vol. 7, No. 2, April 1983, pp. 97-118 | p. 107 |
Enigma: The Dropping of the Double Encipherment, Cryptologia, Vol. 10, No. 3, July 1986, pp. 134-141 | p. 129 |
Machines and their Solutions | p. 139 |
The Cryptology of Multiplex Systems. Part 1, Cryptologia, Vol. 1, No. 1, Jan. 1977, pp. 4-16; Part 2, Vol. 1, No. 2, April 1977, pp. 150-165 | p. 141 |
The Typex Cryptograph, Cryptologia, Vol. 7, No. 2, April 1983, pp. 145-165 | p. 165 |
Uncaging the Hagelin Cryptograph, Cryptologia, Vol. 7, No. 1, Jan. 1983, pp. 89-92 | p. 189 |
Statistical Analysis of the Hagelin Cryptograph, Cryptologia, Vol. 5, No. 1, Jan. 1981, pp. 27-32 | p. 193 |
The Hagelin Cipher Machine (M-209): Reconstruction of the Internal Settings, Cryptologia, Vol. 2, No. 3, July 1978, pp. 267-289 | p. 201 |
Solving a Hagelin, Type C-57, Cipher, Cryptologia, Vol. 2, No. 1, Jan. 1978, pp. 1-8 | p. 235 |
Analysis of the Hebern Cryptograph Using Isomorphs, Cryptologia, Vol. 1, No. 2, April 1977, pp. 167-185 | p. 245 |
The Black Chamber: La Methode des Batons, Cryptologia, Vol. 4, No. 4, Oct. 1980, pp. 240-247 | p. 263 |
The Black Chamber: How the British Broke Enigma, Cryptologia, Vol. 4, No. 3, July 1980, pp. 129-132 | p. 275 |
Decrypting a Stream Cipher Based on J-K Flip-Flops, Cryptologia, Vol. 5, No. 1, Jan. 1981, pp. 51-57 | p. 283 |
Rotor Algebra, Cryptologia, Vol. 1, No. 2, April 1977, pp. 186-194 | p. 295 |
The Siemens and Halske T52e Cipher Machine, Cryptologia, Vol. 6, No. 4, Oct. 1982, pp. 289-308 | p. 301 |
The Early Models of the Siemens and Halske T52 Cipher Machine, Cryptologia, Vol. 7, No. 3, July 1983, pp. 235-253 | p. 319 |
Geheimschreiber, Cryptologia, Vol. 10, No. 4, Oct. 1986, pp. 230-242 | p. 339 |
Mechanics of the German Telecipher Machine, Cryptologia, Vol. 10, No. 4, Oct. 1986, pp. 243-247 | p. 351 |
Mathematics and Cryptanalysis | p. 357 |
Unicity Points in Cryptanalysis, Cryptologia, Vol. 1, No. 1, Jan. 1977, pp. 46-68 | p. 359 |
Entropy Calculations and Particular Methods of Cryptanalysis, Cryptologia, Vol. 1, No. 3, July 1977, pp. 235-254 | p. 379 |
Automated Analysis of Cryptograms, Cryptologia, Vol. 1, No. 2, April 1977, pp. 116-142 | p. 397 |
Measuring Cryptographic Performance with Production Processes, Cryptologia, Vol. 5, No. 3, July 1981, pp. 158-162 | p. 421 |
A Theoretical Measure of Cryptographic Performance, Cryptologia, Vol. 5, No. 1, Jan. 1981, pp. 59-62 | p. 427 |
"Forwards and Backwards" Encryption, Cryptologia, Vol. 4, No. 1, Jan. 1980, pp. 30-33 | p. 433 |
Higher-Order Homomophonic Codes, Cryptologia, Vol. 5, No. 4, Oct. 1981, pp. 231-242 | p. 439 |
Graphic Solution of a Linear Transformation Cipher, Cryptologia, Vol. 5, No. 1, Jan. 1981, pp. 1-19 | p. 453 |
The Automated Cryptanalysis of Substitution Ciphers, Cryptologia, Vol. 10, No. 4, Oct. 1986, pp. 193-209 | p. 475 |
Computer Methods for Decrypting Random Stream Ciphers, Cryptologia, Vol. 2, No. 3, July 1978, pp. 215-231 | p. 493 |
"Cracking" a Random Number Generator, Cryptologia, Vol. 1, No. 1, Jan. 1977, pp. 20-26 | p. 509 |
The Editors | p. 517 |
Table of Contents provided by Syndetics. All Rights Reserved. |