ENEMY CODES AND THEIR SOLUTION
From MaRDI portal
Publication:4858705
DOI10.1080/0161-119591883863zbMATH Open0834.94003OpenAlexW1978105662MaRDI QIDQ4858705FDOQ4858705
Authors:
Publication date: 10 April 1996
Published in: Cryptologia (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/0161-119591883863
Recommendations
- Some examples of historical cryptanalysis
- Codes, ciphers and spies. Tales of military intelligence in World War I
- Breaking teleprinter ciphers at Bletchley Park. An edition of I. J. Good, D. Michie and G. Timms: General Report on Tunny with emphasis on statistical methods (1945). With introductions and notes by the authors
- WERFTSCHLÜSSEL A GERMAN NAVY HAND CIPHER SYSTEM PART I
- Enigma message procedures used by the Heer, Luftwaffe and Kriegsmarine
Cryptography (94A60) History of mathematics in the 20th century (01A60) History of information and communication theory (94-03)
Cited In (7)
- The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday
- ALL ARE WELL AT BOLDON A MID-VICTORIAN CODE SYSTEM
- An Enigma Replica and its Blueprints
- Codes, ciphers and spies. Tales of military intelligence in World War I
- Why don't we decipher an outdated cipher system? The Codex of Rohonc
- WERE THE JAPANESE ARMY CODES SECURE?
- Zimmermann Telegram: The Original Draft
This page was built for publication: ENEMY CODES AND THEIR SOLUTION
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4858705)