Abstract is missing.
- PrefaceArno Wacker. [doi]
- Encrypted Documents and Cipher Keys From the 18th and 19th Century in the Archives of Aristocratic Families in SlovakiaEugen Antal, Pavol Marák, Pavol Zajac, Tünde Lengyelová, Diana Duchonová. 1-12 [doi]
- The cipher of Emperor Rudolf II's "Alchemical Hand Bell"Richard Bean 0001, Corinna Gannon, Sarah Lang. 13-17 [doi]
- Ottavian Medici and the decline of Venetian cryptographyPaolo Bonavoglia. 18-27 [doi]
- The Making of Fritz Menzer - A Secret LifeCarola Dahlke, Robert Jahn. 28-35 [doi]
- A "Mirror for All Traitors". Captured Ciphertexts from a Portuguese Spy in Dutch Brazil (1646)Jörgen Dinnissen, Hugo Araújo. 36-54 [doi]
- A WW2 device for breaking the M-209 encryption machineMagnus Ekhall, Klaus Schmeh. 55-62 [doi]
- Mysteries of P.C. Cadix and its evacuation in 1942/43Marek Grajek. 63-72 [doi]
- The History of the Development and the Analysis of the Cipher Machine T-310/50 and the Procedure ARGON by the ZCOWolfgang Killmann. 73-82 [doi]
- Deciphering Secrets Throughout History: An Interdisciplinary Linguistics and Cryptology CourseEunice Kim, Christian Millichap. 83-92 [doi]
- Situating ciphers among alchemical techniques of secrecySarah Lang. 93-104 [doi]
- Armand de Bourbon's Poly-Homophonic Cipher - 1649George Lasry. 105-112 [doi]
- International Conference on the Voynich Manuscript 2022Colin Layfield, René Zandbergen, Lisa Fagin Davis, John Abela, Claire Bowern, Michael Rosner, Lonneke van der Plas. 113-119 [doi]
- Historical Language Models in Cryptanalysis: Case Studies on English and GermanBeáta Megyesi, Justyna Sikora, Filip Fornmark, Michelle Waldispühl, Nils Kopal, Vasily Mikhalev. 120-129 [doi]
- What is the Code for the Code? Historical Cryptology TerminologyVasily Mikhalev, Nils Kopal, Bernhard Esslinger, Michelle Waldispühl, Benedek Láng, Beáta Megyesi. 130-138 [doi]
- Encrypted epigraphy - the case of a mysterious inscription in the Neapolitan church of Santa Maria La NovaCosimo Palma. 139-147 [doi]
- Deciphering Charles Quint (A diplomatic letter from 1547)Cécile Pierrot, Camille Desenclos, Pierrick Gaudry, Paul Zimmermann. 148-159 [doi]
- On the Combination of Cryptography and Steganography in 17th Century GermanyEveline Szarka. 160-169 [doi]
- Scherbius and the Enigma. Political, Economic and Military ConditionsClaus Taaks. 170-179 [doi]
- "We just did it!" - Female employees in Swedish sigint during the Second World WarFredrik Wallin. 180-189 [doi]
- Runic cryptography in early epigraphic period (200-700)Sebastien Zimmermann. 190-198 [doi]
- Simulating Cryptologic HistoryPeter Krapp. 199 [doi]
- The first volume of the Venetian ciphers written by Agostino AmadiDavid Scheers. 199 [doi]