Japanese cryptology from the 1500s to Meiji

Results: 7



#Item
1Activity: Codes  You will need... Paper A pen There are many ways to make up codes; the more creative you are, the less likely

Activity: Codes You will need... Paper A pen There are many ways to make up codes; the more creative you are, the less likely

Add to Reading List

Source URL: invigorate.royalsociety.org

Language: English - Date: 2011-09-26 12:10:29
2Microsoft Word - Classified File 6 Unpredictive Text

Microsoft Word - Classified File 6 Unpredictive Text

Add to Reading List

Source URL: conspiracy365.com.au

Language: English - Date: 2012-01-26 23:33:39
3© [removed]Wisconsin Science Olympiad Inc. Division C  CODE BUSTERS 1. DESCRIPTION: Contestants will decode encrypted messages using cryptanalysis techniques. 2. TEAMS OF UP TO: 3

© [removed]Wisconsin Science Olympiad Inc. Division C CODE BUSTERS 1. DESCRIPTION: Contestants will decode encrypted messages using cryptanalysis techniques. 2. TEAMS OF UP TO: 3

Add to Reading List

Source URL: soinc.org

Language: English - Date: 2014-05-08 16:29:36
4Probabilistic Methods for a Japanese Syllable Cipher Sujith Ravi and Kevin Knight Information Sciences Institute Computer Science Department University of Southern California

Probabilistic Methods for a Japanese Syllable Cipher Sujith Ravi and Kevin Knight Information Sciences Institute Computer Science Department University of Southern California

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2009-04-13 11:31:05
5A Global Forum for Naval Historical Scholarship

A Global Forum for Naval Historical Scholarship

Add to Reading List

Source URL: www.ijnhonline.org

Language: English - Date: 2012-02-02 09:47:40
6e:;. . --  •.

e:;. . -- •.

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-01-23 11:14:40
7UNCLASSIFIED  (b) (3)-P.L.

UNCLASSIFIED (b) (3)-P.L.

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-04 19:38:04