Russian and Soviet cryptology: II–the Magdeburg incident: The Russian view
Hammant, Thomas R
RUSSIAN AND SOVIET CRYPTOLOGY
I…
Browsing Category
Cryptologia
34 posts
Codebreaking with IBM machines in World War II
Codebreaking with IBM machines in World War II
Budiansky, Stephen
CODEBREAKING WITH IBM MACHINES
IN WORLD WAR II*
ABST…
Genetic algorithms can be used to obtain good linear congruential generators
Genetic algorithms can be used to obtain good linear congruential generators
Hernandez, J C
ADDRESS: Computer Science Department, Ca…
I–some communications intelligence in Tsarist Russia
Russian and Soviet cryptology: I–some communications intelligence in Tsarist Russia
Hammant, Thomas R
RUSSIAN AND SOVIET CRYPTOLOGY…
Basic and C++ crypto
Basic and C++ crypto
Kruh, Louis
Held, Gilbert. Learn Encryption Techniques with BASIC and C++. Wordware Publishing, Inc., 2320 Los …
SIGNAL INTELLIGENCE IN VIETNAM
SIGNAL INTELLIGENCE IN VIETNAM
Kruh, Louis
SIGNAL INTELLIGENCE IN VIETNAM Gilbert, James L. The Most secret War: Army Signals Intell…
Impossible differential cryptanalysis of Mini-AES
Impossible differential cryptanalysis of Mini-AES
Phan, Raphael Chung-Wei
ABSTRACT: Impossible differential cryptanalysis is one of …
AN ELEGANT HOAX? A POSSIBLE SOLUTION TO THE VOYNICH MANUSCRIPT
AN ELEGANT HOAX? A POSSIBLE SOLUTION TO THE VOYNICH MANUSCRIPT
Rugg, Gordon
ABSTRACT: The Voynich manuscript is a substantial docume…
A cryptologic veteran’s analysis of “day of deceit”–a book review
A cryptologic veteran’s analysis of “day of deceit”–a book review
Jacobsen, Philip H
ADDRESS: 1171 Dawnell Drive, San Diego CA 9215…
CODEBREAKING FOR KIDS AND MORE
CODEBREAKING FOR KIDS AND MORE
Kruh, Louis
CODEBREAKING FOR KIDS AND MORE Adams, Simon. Codebreakers: From Hieroglyphs to Hackers. D…