Abstract is missing.
- PrefaceBeáta Megyesi. [doi]
- "Encoded" Communication with Ladies in a Turkish Harem, 17th-Century StyleGerhard F. Strasser. 1-17
- HCPortal OverviewEugen Antal, Pavol Zajac. 18-20
- Diplomatic Ciphers Used by Slovak Attaché During the WW2Eugen Antal, Pavol Zajac, Otokar Grosek. 21-30
- The Use of Project Gutenberg and Hexagram Statistics to Help Solve Famous Unsolved CiphersRichard Bean 0001. 31-35
- A Partenio's Stegano-Crypto CipherPaolo Bonavoglia. 36-45
- Trithemius, Bellaso, Vigenère- Origins of the Polyalphabetic CiphersPaolo Bonavoglia. 46-51
- A Web-based Interactive Transcription Tool for Encrypted ManuscriptsJialuo Chen, Mohamed Ali Souibgui, Alicia Fornés, Beáta Megyesi. 52-59
- The Auxiliary Devices of OKW/ChiCarola Dahlke. 60-69
- Dawn of Mathematical Cryptology: Probabilists vs Algebraists; Algebraists & Probabilists?Marek Grajek. 70-76
- Of Ciphers and Neurons - Detecting the Type of Ciphers Using Artificial Neural NetworksNils Kopal. 77-86
- Was it a Sudden Shift in Professionalization? Austrian Cryptology and a Description of the Staatskanzlei Key Collection in the Haus-, Hof- und Staatsarchiv of ViennaBenedek Láng. 87-95
- Solving a Tunny Challenge with Computerized "Testery" MethodsGeorge Lasry. 96-105
- Transcription of Historical Ciphers and KeysBeáta Megyesi. 106-115
- A Hungarian Cryptological Manual in BerlinStefan Porubský. 116-125
- The Zschweigert Cryptograph - A Remarkable Early Encryption MachineKlaus Schmeh. 126-134
- Cracking Matrix Modes of Operation with Goodness-of-Fit StatisticsGeorge Teseleanu. 135-145
- Automatic Key Structure ExtractionCrina Tudor, Beáta Megyesi, Benedek Láng. 146-152
- The Role of Base 10 in the Beale PapersViktor Wase. 153-157