| Introduction | ix |
I | History, Literature, and Personalities | 1 |
| The Genesis of the Jefferson/Bazeries Cipher Machine, Cryptologia, Vol. 5, No. 4, Oct. 1981, pp. 193-208 | 3 |
| The Search for the Key to Nicholas Trist's Book Cipher, Cryptologia, Vol. 7, No. 4, Oct. 1983, pp. 297-314 | 21 |
| My Recollections of G2/A6, Cryptologia, Vol. 2, No. 3, July 1978, pp. 201-214 | 39 |
| Who Wrote "The American Black Chamber"? Cryptologia, Vol. 2, No. 2 April 1978, pp. 130-133 | 51 |
| The Annotated "The American Black Chamber," Cryptologia, Vol. 9, No. 1, Jan. 1985, pp. 1-37 | 55 |
| Memories of Friedman, Cryptologia, Vol. 4, No. 1, Jan. 1980, pp. 23-26 | 93 |
| Reminiscences of a Master Cryptologist, Cryptologia, Vol. 4, No. 1, Jan. 1980, pp. 45-50 | 99 |
| A Failure of Radio Intelligence: An Episode in the Battle of the Coral Sea, Cryptologia, Vol. 7, No. 2, April 1983, pp. 97-118 | 107 |
| Enigma: The Dropping of the Double Encipherment, Cryptologia, Vol. 10, No. 3, July 1986, pp. 134-141 | 129 |
II | Machines and their Solutions | 139 |
| The Cryptology of Multiplex Systems. Part 1, Cryptologia, Vol. 1, No. 1, Jan. 1977, pp. 4-16; Part 2, Vol. 1, No. 2, April 1977, pp. 150-165 | 141 |
| The Typex Cryptograph, Cryptologia, Vol. 7, No. 2, April 1983, pp. 145-165 | 165 |
| Uncaging the Hagelin Cryptograph, Cryptologia, Vol. 7, No. 1, Jan. 1983, pp. 89-92 | 189 |
| Statistical Analysis of the Hagelin Cryptograph, Cryptologia, Vol. 5, No. 1, Jan. 1981, pp. 27-32 | 193 |
| The Hagelin Cipher Machine (M-209): Reconstruction of the Internal Settings, Cryptologia, Vol. 2, No. 3, July 1978, pp. 267-289 | 201 |
| Solving a Hagelin, Type C-57, Cipher, Cryptologia, Vol. 2, No. 1, Jan. 1978, pp. 1-8 | 235 |
| Analysis of the Hebern Cryptograph Using Isomorphs, Cryptologia, Vol. 1, No. 2, April 1977, pp. 167-185 | 245 |
| The Black Chamber: La Methode des Batons, Cryptologia, Vol. 4, No. 4, Oct. 1980, pp. 240-247 | 263 |
| The Black Chamber: How the British Broke Enigma, Cryptologia, Vol. 4, No. 3, July 1980, pp. 129-132 | 275 |
| Decrypting a Stream Cipher Based on J-K Flip-Flops, Cryptologia, Vol. 5, No. 1, Jan. 1981, pp. 51-57 | 283 |
| Rotor Algebra, Cryptologia, Vol. 1, No. 2, April 1977, pp. 186-194 | 295 |
| The Siemens and Halske T52e Cipher Machine, Cryptologia, Vol. 6, No. 4, Oct. 1982, pp. 289-308 | 301 |
| The Early Models of the Siemens and Halske T52 Cipher Machine, Cryptologia, Vol. 7, No. 3, July 1983, pp. 235-253 | 319 |
| Geheimschreiber, Cryptologia, Vol. 10, No. 4, Oct. 1986, pp. 230-242 | 339 |
| Mechanics of the German Telecipher Machine, Cryptologia, Vol. 10, No. 4, Oct. 1986, pp. 243-247 | 351 |
III | Mathematics and Cryptanalysis | 357 |
| Unicity Points in Cryptanalysis, Cryptologia, Vol. 1, No. 1, Jan. 1977, pp. 46-68 | 359 |
| Entropy Calculations and Particular Methods of Cryptanalysis, Cryptologia, Vol. 1, No. 3, July 1977, pp. 235-254 | 379 |
| Automated Analysis of Cryptograms, Cryptologia, Vol. 1, No. 2, April 1977, pp. 116-142 | 397 |
| Measuring Cryptographic Performance with Production Processes, Cryptologia, Vol. 5, No. 3, July 1981, pp. 158-162 | 421 |
| A Theoretical Measure of Cryptographic Performance, Cryptologia, Vol. 5, No. 1, Jan. 1981, pp. 59-62 | 427 |
| "Forwards and Backwards" Encryption, Cryptologia, Vol. 4, No. 1, Jan. 1980, pp. 30-33 | 433 |
| Higher-Order Homomophonic Codes, Cryptologia, Vol. 5, No. 4, Oct. 1981, pp. 231-242 | 439 |
| Graphic Solution of a Linear Transformation Cipher, Cryptologia, Vol. 5, No. 1, Jan. 1981, pp. 1-19 | 453 |
| The Automated Cryptanalysis of Substitution Ciphers, Cryptologia, Vol. 10, No. 4, Oct. 1986, pp. 193-209 | 475 |
| Computer Methods for Decrypting Random Stream Ciphers, Cryptologia, Vol. 2, No. 3, July 1978, pp. 215-231 | 493 |
| "Cracking" a Random Number Generator, Cryptologia, Vol. 1, No. 1, Jan. 1977, pp. 20-26 | 509 |
| The Editors | 517 |