Norman Lathrop Enterprises  
nleindex.com | Norman Lathrop Enterprises
Index To How To Do It Information
Lathrop Report On Newspaper Indexes
A profile of Norman Lathrop Enterprises
 
NLEIndex.com
Last Updated
03/31/2019
 
Sitemap
 
  Index Home  |   A-Z Subject Heading Guide    |   Keyword Search  |   Union List 

Detailed entries for one subject from the INDEX TO HOW TO DO IT INFORMATION.
Click on a see also (sa) or tracing (xx) to view detailed entries about a related subject.
The entries are in alphabetical order by magazine name and then in chronological sequence.
To obtain a copy of any magazine article contact your local public library or the publisher.

DATA COMPRESSION & ENCRYPTION
x   ENCRYPTION (DATA)
x   TEXT COMPRESSION
xx   CODING
xx   COMPUTER APPLICATIONS
xx   DATA COMMUNICATION

The standard data encryption algorithm. Part 1. An overview.
BYTE Mar 1979 (v.4#3) pg. 66

The standard data encryption algorithm. Part 2. Implementing the algorithm on a KIM-1 computer.
BYTE Apr 1979 (v.4#4) pg. 110

Text compression. Using Huffman code to save up to 50% storage space in text. Other methods also noted.
BYTE Dec 1979 (v.4#12) pg. 106

An introduction to data compression. Techniques to transfer and store information using fewer data bits. Emphasis is on the use of Huffman code.
BYTE Apr 1981 (v.6#4) pg. 218

An effective text-compression algorithm. Reduce the size of text files about 25% by identifying common pairs of letters.
BYTE Jan 1982 (v.7#1) pg. 397

Binary-coded text. A text-compression method. Trim text size by encoding common character strings.
BYTE Apr 1982 (v.7#4) pg. 398

A BASIC program that produces a Huffman code for a set of characters and phrases.
BYTE Jul 1982 (v.7#7) pg. 441

Dictionary compression and decompression. An elegant algorithm.
BYTE Sep 1984 (v.9#10) pg. 457

Compression and decompression methods. What is available in hardware and software produycts that increase your hard disk capacity. Includes tips on using PKZIP and PKUNZIP.
COMPUTERCRAFT Nov 1991 (v.1#8) pg. 42

Cyber Key. Cybernetic key attached to the serial port on your computer performs several functions (limits outside access, provides data encryption, generates CRC and FEC codes for long-distance and wide-area networks, and converts printer control codes). Est. cost: $70.
COMPUTERCRAFT Aug 1993 (v.3#8) pg. 10

Encryption decyphered. How encoding locks your data away from anyone not possessing the key.
COMPUTERS & ELECTRONICS Jun 1984 (v.22#6) pg. 64

Data compression techniques. Using easily understood principles of coding and information theory, you can reduce the space your data takes by at least 40%.
COMPUTERS & ELECTRONICS Dec 1984 (v.22#12) pg. 67
Correction COMPUTERS & ELECTRONICS Mar 1985 (v.23#3) pg. 6

Hashing revisited. Turn alphabetic data into numbers and store and retrieve with ease.
KILOBAUD MICROCOMPUTING #41 May 1980 pg. 78

CP/M encryption prescription. File encryption program uses Vernam's algorithm with three keywords.
KILOBAUD MICROCOMPUTING #47 Nov 1980 pg. 42

Efficient data storage for Microsoft BASIC. Pack most single- and double-precision numbers into three- or four-byte strings instead of four- or eight-byte strings.
KILOBAUD MICROCOMPUTING #47 Nov 1980 pg. 68

Hashing it out. Demonstration of code hashing which will save time and memory in storing and retrieving information.
KILOBAUD MICROCOMPUTING #47 Nov 1980 pg. 198

Protect your files from prying eyes. Data encryption program written in 6800 assembler language.
KILOBAUD MICROCOMPUTING #51 Mar 1981 (v.5#3) pg. 106

Numeric storage programming technique for BASIC will let you store integers from 0 through 255 in a single byte or integers from 0 through 65279 in two bytes.
MICROCOMPUTING Jul 1982 (v.6#7) pg. 58
Added Info MICROCOMPUTING #73 Jan 1983 (v.7#1) pg. 30

Speech-scrambling techniques as used in many RTTY transmissions.
RADIO-ELECTRONICS Mar 1982 (v.53#3) pg. 74

Data compression. A look at the fundamentals of data and image compression, text compression, fax compression, hardware considerations, etc.
RADIO-ELECTRONICS Aug 1990 (v.61#8) pg. 67
Added Info RADIO-ELECTRONICS Dec 1990 (v.61#12) pg. 73

Building electrical circuits that can synchronize chaos. Building two systems that exhibit exactly the same chaotic behavior. May be useful for encrypted communications.
SCIENTIFIC AMERICAN Aug 1993 (v.269#2) pg. 120