20:
292:
276:"Riverbank Publications No. 75 : Memorization Methods : Specifically Illustrated in Respect to Their Applicability to Codes and Topographic Material by ([ Riverbank Laboratories ] [ H. O. Nolan ]) from Kuenzig Books | Topsfield, MA | Bibliopolis"
39:
in the multi-discipline research facility he built in the early 20th century near
Chicago. They were published by Fabyan, often without author credit. The publications on
106:
75, Memorization
Methods: Specifically Illustrated in Respect to Their Applicability to Codes and Topographic Material, by H. O. Nolan, 1919,
192:
149:
329:
219:
177:
353:
169:
The Woman Who
Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine Who Outwitted America's Enemies
363:
71:
15, A Method of
Reconstructing the Primary Alphabet From a Single One of the Series of Secondary Alphabets, 1917
358:
63:
The
Riverbank Publications dealt with many subjects investigated at the laboratories. The ones dealing with
368:
348:
153:
24:
322:
80:
18, Synoptic Tables for the
Solution of Ciphers and A Bibliography of Cryptographic Literature, 1918
275:
100:
22, The Index of
Coincidence and Its Applications in Cryptography, imprint L. Fournier, Paris, 1922
94:
48:
234:
103:
50, The production and detection of messages in concealed writing and images, by H. O. Nolan, 1918
19:
303:
119:
51:
and others, are considered seminal in the field. In particular, Publication 22 introduced the
315:
52:
8:
205:
111:
83:
19, Formulae for the
Solution of Geometrical Transposition Ciphers, written with Capt.
215:
195:, Rufus A. Long Digital Library of Cryptography, George C. Marshal Library, 1917-1922
173:
209:
123:
44:
167:
299:
342:
115:
84:
40:
36:
64:
35:
is a series of pamphlets written by the people who worked for millionaire
251:
93:
263:
90:
20, Several
Machine Ciphers and Methods for their Solution, 1918
77:
17, An Introduction to Methods for the Solution of Ciphers, 1918
291:
254:. "No other items in the field of cryptology were published"
74:
16, Methods for the Solution of Running-Key Ciphers, 1918
110:
Except as noted, the above publications were written by
193:
Methods for the Solution of Ciphers, Publications 15-22
150:
Methods for the Solution of Ciphers, Publications 15-22
58:
235:Publications 15-22 reprinted by Aegean Park Press
152:, Rufus A. Long Digital Library of Cryptography,
55:, a powerful statistical tool for cryptanalysis.
340:
145:
143:
141:
139:
323:
211:The Codebreakers: The Story of Secret Writing
136:
16:Pamphlets written by workers of George Fabyan
247:
245:
243:
165:
330:
316:
240:
159:
27:copy of the Riverbank Publications 15-22.
67:began with number 15, and consists of:
18:
298:This cryptography-related article is a
198:
23:Inscription by William Friedman in the
341:
252:Riverbank publications WorldCat record
286:
204:
59:List of publications on cryptography
214:. New York: The Macmillan Company.
13:
166:Jason Fagone (26 September 2017).
14:
380:
290:
264:Library of Congress catalog card
268:
257:
228:
186:
1:
129:
302:. You can help Knowledge by
7:
10:
385:
285:
154:George C. Marshall Library
47:, with contributions from
354:World War I-related lists
237:, in three volumes, 1979
95:Elizebeth Smith Friedman
49:Elizebeth Smith Friedman
364:Riverbank Laboratories
120:Riverbank Laboratories
114:and were published by
33:Riverbank Publications
28:
359:Cryptographic attacks
22:
53:Index of Coincidence
43:, mostly written by
112:William F. Friedman
369:Cryptography stubs
349:Cryptography books
29:
25:Marshall Library’s
311:
310:
221:978-0-684-83130-5
179:978-0-06-243050-2
172:. HarperCollins.
376:
332:
325:
318:
294:
287:
280:
279:
272:
266:
261:
255:
249:
238:
232:
226:
225:
202:
196:
190:
184:
183:
163:
157:
147:
124:Geneva, Illinois
45:William Friedman
384:
383:
379:
378:
377:
375:
374:
373:
339:
338:
337:
336:
284:
283:
274:
273:
269:
262:
258:
250:
241:
233:
229:
222:
203:
199:
191:
187:
180:
164:
160:
148:
137:
132:
61:
17:
12:
11:
5:
382:
372:
371:
366:
361:
356:
351:
335:
334:
327:
320:
312:
309:
308:
295:
282:
281:
267:
256:
239:
227:
220:
197:
185:
178:
158:
134:
133:
131:
128:
108:
107:
104:
101:
98:
91:
88:
81:
78:
75:
72:
60:
57:
15:
9:
6:
4:
3:
2:
381:
370:
367:
365:
362:
360:
357:
355:
352:
350:
347:
346:
344:
333:
328:
326:
321:
319:
314:
313:
307:
305:
301:
296:
293:
289:
288:
277:
271:
265:
260:
253:
248:
246:
244:
236:
231:
223:
217:
213:
212:
207:
201:
194:
189:
181:
175:
171:
170:
162:
155:
151:
146:
144:
142:
140:
135:
127:
125:
121:
117:
116:George Fabyan
113:
105:
102:
99:
96:
92:
89:
86:
85:Lenox R. Lohr
82:
79:
76:
73:
70:
69:
68:
66:
56:
54:
50:
46:
42:
41:cryptanalysis
38:
37:George Fabyan
34:
26:
21:
304:expanding it
297:
270:
259:
230:
210:
200:
188:
168:
161:
109:
65:cryptography
62:
32:
30:
206:Kahn, David
156:, 1917-1922
343:Categories
130:References
208:(1967).
218:
176:
97:, 1918
87:, 1918
300:stub
216:ISBN
174:ISBN
31:The
122:in
118:'s
345::
242:^
138:^
126:.
331:e
324:t
317:v
306:.
278:.
224:.
182:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.