default search action
Search dblp for Publications
export results for "stream:journals/cryptologia:"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/cryptologia/Antal24, author = {Eugen Antal}, title = {The origin of military cryptanalysis in Czechoslovakia}, journal = {Cryptologia}, volume = {48}, number = {3}, pages = {193--218}, year = {2024}, url = {https://doi.org/10.1080/01611194.2022.2158448}, doi = {10.1080/01611194.2022.2158448}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Antal24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BiswasDR24, author = {Anindya Kumar Biswas and Mou Dasgupta and Sangram Ray}, title = {Cryptanalysis and improvement of Q. Peng et al.'s {PVSS} scheme}, journal = {Cryptologia}, volume = {48}, number = {4}, pages = {291--304}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2175185}, doi = {10.1080/01611194.2023.2175185}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BiswasDR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Boersma24, author = {Stuart Boersma}, title = {Elizebeth Smith Friedman's recovery of the wiring of two rotors from an enigma {D} machine}, journal = {Cryptologia}, volume = {48}, number = {1}, pages = {1--25}, year = {2024}, url = {https://doi.org/10.1080/01611194.2022.2109944}, doi = {10.1080/01611194.2022.2109944}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Boersma24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Chan24, author = {Wayne S. Chan}, title = {Breaking the Silk Dress cryptogram}, journal = {Cryptologia}, volume = {48}, number = {5}, pages = {387--426}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2223562}, doi = {10.1080/01611194.2023.2223562}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Chan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChauhanGMV24, author = {Dimpy Chauhan and Indivar Gupta and Prasanna Raghaw Mishra and Rashmi Verma}, title = {An ultra-lightweight block cipher with string transformations}, journal = {Cryptologia}, volume = {48}, number = {5}, pages = {437--468}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2224107}, doi = {10.1080/01611194.2023.2224107}, timestamp = {Fri, 25 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ChauhanGMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen24, author = {Chris Christensen}, title = {Review of \emph{100 People You Never Knew Were at Bletchley Park} by Sinclair McKayMcKay, Sinclair. \emph{100 People You Never Knew Were at Bletchley Park} . Safe Haven Books Ltd, London, 2021. 250 pages, Hardcover, {\textsterling}14.99. {ISBN} 978-1-8384051-2-0}, journal = {Cryptologia}, volume = {48}, number = {3}, pages = {282--284}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2197902}, doi = {10.1080/01611194.2023.2197902}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen24a, author = {Chris Christensen}, title = {Review of \emph{No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon} by Betty WebbWebb, Betty. \emph{No More Secrets: My Part in codebreaking at Bletchley Park and the Pentagon,} London: Mardle Books. 2023. 212+x pages, Paperback, {\textsterling}9.99. {ISBN} 9781837700219}, journal = {Cryptologia}, volume = {48}, number = {3}, pages = {285--288}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2246466}, doi = {10.1080/01611194.2023.2246466}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen24b, author = {Chris Christensen}, title = {Review of \emph{The Bletchley Park Codebreakers in their own words} by Joel Greenberg}, journal = {Cryptologia}, volume = {48}, number = {5}, pages = {469--473}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2246460}, doi = {10.1080/01611194.2023.2246460}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen24c, author = {Chris Christensen}, title = {Review of \emph{The First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing}: By Robert Gaw{\l}owski Translated by Agnieszka Marciniak}, journal = {Cryptologia}, volume = {48}, number = {5}, pages = {474--478}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2246470}, doi = {10.1080/01611194.2023.2246470}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen24c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen24d, author = {Chris Christensen}, title = {Review of \emph{Queen of Codes: The Secret Life of Emily Anderson, Britain's Greatest Female Codebreaker} by Jackie U{\'{\i}} Chionna: Headline Publishing Group, London, 2023. 418 pages, Hardcover, {\textsterling}25.00. {ISBN} 978-1-4722-9547-7}, journal = {Cryptologia}, volume = {48}, number = {5}, pages = {479--482}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2248141}, doi = {10.1080/01611194.2023.2248141}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen24d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen24e, author = {Chris Christensen}, title = {The Japanese Green Machine}, journal = {Cryptologia}, volume = {48}, number = {6}, pages = {519--557}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2263001}, doi = {10.1080/01611194.2023.2263001}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen24e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen24f, author = {Chris Christensen}, title = {Review of \emph{The Real Special Relationship} by Michael Smith: Smith, Michael. {A} Real Special Relationship: The True Story of How the British and {US} Secret Services Work Together. Simon {\&} Schuster {UK} Ltd., London, 2023. 553 + xxii pages, Hardcover, {\textsterling}25.00. {ISBN} 9781471186790}, journal = {Cryptologia}, volume = {48}, number = {6}, pages = {574--578}, year = {2024}, url = {https://doi.org/10.1080/01611194.2024.2316705}, doi = {10.1080/01611194.2024.2316705}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen24f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DjomouFC24, author = {Franck Rivel Kamwa Djomou and Emmanuel Fouotsa and Tadmon Calvin}, title = {Expanded low-rank parity-check codes and their application to cryptography}, journal = {Cryptologia}, volume = {48}, number = {4}, pages = {323--351}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2202960}, doi = {10.1080/01611194.2023.2202960}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DjomouFC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley24, author = {John F. Dooley}, title = {Review of \emph{From the Ground Up} by Betsy Rohaly SmootSmoot, Betsy Rohaly. 2023. \emph{From the Ground Up: American Cryptology during World War I} . Vol. 48. Series {II:} World War I. Ft. George G. Meade, {MD:} National Security Agency, Center for Cryptologic History. https://media.defense.gov/2023/Jan/26/2003150273/-1/-1/0/WWI{\_}BOOK{\_}01192023.PDF Accessed 01 February 2023}, journal = {Cryptologia}, volume = {48}, number = {1}, pages = {91--94}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2225514}, doi = {10.1080/01611194.2023.2225514}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley24a, author = {John F. Dooley}, title = {Review of \emph{The Puzzle Master} by Danielle TrussoniTrussoni, Danielle. 2023. \emph{The Puzzle Master} . New York, {NY:} Random House. https://www.randomhousebooks.com/. 362 pages, {ISBN} 978-0-593-59529-9. {\textdollar}22.95: Trussoni, Danielle. 2023. \emph{The Puzzle Master} . New York, {NY:} Random House. https://www.randomhousebooks.com/. 362 pages, {ISBN} 978-0-593-59529-9. {\textdollar}22.95}, journal = {Cryptologia}, volume = {48}, number = {1}, pages = {95--96}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2267562}, doi = {10.1080/01611194.2023.2267562}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley24b, author = {John F. Dooley}, title = {Review of \emph{The Enigma Affair} by Charlie LovettLovett, Charlie. \emph{The Enigma Affair} . Ashland, {OR:} Blackstone Publishing. 2022. 323 pages, Hardcover, {\textdollar}26.99. {ISBN} 978-1-66504-707-4. https://www.blackstonepublishing.com: Hardcover. Ashland, or: Blackstone Publishing. https://www.blackstonepublishing.com. {ISBN} 978-1-66504-707-4. 2022. 323 pages. {\textdollar}26.99}, journal = {Cryptologia}, volume = {48}, number = {4}, pages = {381--383}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2267563}, doi = {10.1080/01611194.2023.2267563}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DuninS24, author = {Elonka Dunin and Klaus Schmeh}, title = {Review of the second edition of Craig Bauer's " \emph{Secret History: The Story of Cryptology, Second Edition} "Bauer, Craig P. \emph{Secret History: The Story of Cryptology. Second Edition} . {CRC} Press, Boca Raton, FL, 2021. 650 pages, Hardcover. {ISBN} 978-1138061231.: Bauer, Craig P. {CRC} Press, Boca Raton, FL, 2021. 650 pages, hardcover. {ISBN} 978-1138061231}, journal = {Cryptologia}, volume = {48}, number = {4}, pages = {384--386}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2257696}, doi = {10.1080/01611194.2023.2257696}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DuninS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Foucrier24, author = {Jean{-}Charles Foucrier}, title = {Why the French military cryptanalysis failed to break Enigma}, journal = {Cryptologia}, volume = {48}, number = {6}, pages = {483--505}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2261121}, doi = {10.1080/01611194.2023.2261121}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Foucrier24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Killmann24, author = {Wolfgang Killmann}, title = {On security aspects of the ciphers {T-310} and {SKS} with approved long-term keys}, journal = {Cryptologia}, volume = {48}, number = {2}, pages = {140--172}, year = {2024}, url = {https://doi.org/10.1080/01611194.2022.2134752}, doi = {10.1080/01611194.2022.2134752}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Killmann24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Larsen24, author = {Thomas Larsen}, title = {Leo Marks' "mental one-time pad": an experimental cipher for British special operations in World War {II}}, journal = {Cryptologia}, volume = {48}, number = {5}, pages = {427--436}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2259376}, doi = {10.1080/01611194.2023.2259376}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Larsen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Luengo24, author = {Elena Almaraz Luengo}, title = {Statistical tests suites analysis methods. Cryptographic recommendations}, journal = {Cryptologia}, volume = {48}, number = {3}, pages = {219--251}, year = {2024}, url = {https://doi.org/10.1080/01611194.2022.2155093}, doi = {10.1080/01611194.2022.2155093}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Luengo24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Marks24, author = {Philip Marks}, title = {Review of \emph{Behind the Enigma} by John FerrisFerris, John. \emph{Behind the Enigma. The Authorized History of GCHQ, Britain's Secret Cyber-Intelligence Agency} . Bloomsbury Publishing, New York, NY, 2020. 823 pages, Hardcover, {\textdollar}36. {ISBN} 978-1-63557-465-4}, journal = {Cryptologia}, volume = {48}, number = {3}, pages = {252--281}, year = {2024}, url = {https://doi.org/10.1080/01611194.2022.2156311}, doi = {10.1080/01611194.2022.2156311}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Marks24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MegyesiTLLKLW24, author = {Be{\'{a}}ta Megyesi and Crina Tudor and Benedek L{\'{a}}ng and Anna Lehofer and Nils Kopal and Karl de Leeuw and Michelle Waldisp{\"{u}}hl}, title = {Keys with nomenclatures in the early modern Europe}, journal = {Cryptologia}, volume = {48}, number = {2}, pages = {97--139}, year = {2024}, url = {https://doi.org/10.1080/01611194.2022.2113185}, doi = {10.1080/01611194.2022.2113185}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/MegyesiTLLKLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MelkaS24, author = {Tomi S. Melka and Robert M. Schoch}, title = {Review of \emph{Rongorongo} : \emph{Inscribed Objects from Rapa Nui} Paul Horley. \emph{Rongorongo: Inscribed Objects from Rapa Nui} . Rapanui Press, Vi{\~{n}}a del Mar, 2021. xx + 637 pages, {\textdollar}52.000 Chilean pesos, Softcover. {ISBN} 978-956-9337-58-1: By Paul Horley. Rapanui Press, Vi{\~{n}}a del Mar, 2021. xx + 637 pages, {\textdollar}52.000 Chilean pesos, softcover. {ISBN} 978-956-9337-58-1}, journal = {Cryptologia}, volume = {48}, number = {4}, pages = {352--380}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2175186}, doi = {10.1080/01611194.2023.2175186}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MelkaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MillichapYPC24, author = {Christian Millichap and Yeeka Yau and Alyssa Pate and Morgan Carns}, title = {Modifying twist algorithms for determining the key length of a Vigen{\`{e}}re cipher}, journal = {Cryptologia}, volume = {48}, number = {6}, pages = {558--573}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2275583}, doi = {10.1080/01611194.2023.2275583}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/MillichapYPC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MishraKPO24, author = {Prasanna Raghaw Mishra and Arvind Kumar and Saibal K. Pal and Odelu Ojjela}, title = {Bit inclusion test: an enhanced avalanche test for stream ciphers}, journal = {Cryptologia}, volume = {48}, number = {2}, pages = {173--192}, year = {2024}, url = {https://doi.org/10.1080/01611194.2022.2155092}, doi = {10.1080/01611194.2022.2155092}, timestamp = {Fri, 25 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MishraKPO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Oberman24, author = {M. R. Oberman}, title = {The undisclosed history of the Dutch governmental telex-message security 1945-1960}, journal = {Cryptologia}, volume = {48}, number = {6}, pages = {506--518}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2258877}, doi = {10.1080/01611194.2023.2258877}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Oberman24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/OrrBGSPFJR24, author = {Selma Gomez Orr and Cyrus J. Bonyadi and Enis Golaszewski and Alan T. Sherman and Peter A. H. Peterson and Richard Forno and Sydney Johns and Jimmy Rodriguez}, title = {Shadow {IT} in higher education: survey and case study for cybersecurity}, journal = {Cryptologia}, volume = {48}, number = {1}, pages = {26--90}, year = {2024}, url = {https://doi.org/10.1080/01611194.2022.2103754}, doi = {10.1080/01611194.2022.2103754}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/OrrBGSPFJR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/TimmS24, author = {Torsten Timm and Andreas Schinner}, title = {The Voynich manuscript: discussion of text creation hypotheses}, journal = {Cryptologia}, volume = {48}, number = {4}, pages = {305--322}, year = {2024}, url = {https://doi.org/10.1080/01611194.2023.2225716}, doi = {10.1080/01611194.2023.2225716}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/TimmS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AhmedPM23, author = {Kashif Ahmed and Saibal K. Pal and Radha Mohan}, title = {A review of the tropical approach in cryptography}, journal = {Cryptologia}, volume = {47}, number = {1}, pages = {63--87}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.1994486}, doi = {10.1080/01611194.2021.1994486}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AhmedPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Anderson23, author = {Patrick D. Anderson}, title = {Review of \emph{Crypto Wars - The Fight for Privacy in the Digital Age: {A} Political History of Digital Encryption}}, journal = {Cryptologia}, volume = {47}, number = {3}, pages = {285--298}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.2002977}, doi = {10.1080/01611194.2021.2002977}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Anderson23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AntalZ23, author = {Eugen Antal and Pavol Zajac}, title = {The first Czechoslovak cipher machine}, journal = {Cryptologia}, volume = {47}, number = {3}, pages = {239--260}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.1998809}, doi = {10.1080/01611194.2021.1998809}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AntalZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer23, author = {Craig P. Bauer}, title = {The new golden age of decipherment}, journal = {Cryptologia}, volume = {47}, number = {2}, pages = {97--100}, year = {2023}, url = {https://doi.org/10.1080/01611194.2023.2170158}, doi = {10.1080/01611194.2023.2170158}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bingol23, author = {Sedat Bing{\"{o}}l}, title = {The changes in Ottoman diplomatic cryptography and its methods during the 19th century {(1811-1877)}}, journal = {Cryptologia}, volume = {47}, number = {6}, pages = {541--569}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2092916}, doi = {10.1080/01611194.2022.2092916}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bingol23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Boersma23, author = {Stuart Boersma}, title = {Elizebeth Smith Friedman and one example of a prohibition era encryption system}, journal = {Cryptologia}, volume = {47}, number = {3}, pages = {227--238}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.2003913}, doi = {10.1080/01611194.2021.2003913}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Boersma23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Boersma23a, author = {Stuart Boersma}, title = {Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923-1934}, journal = {Cryptologia}, volume = {47}, number = {5}, pages = {397--418}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.2023235}, doi = {10.1080/01611194.2021.2023235}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Boersma23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BoersmaL23, author = {Stuart Boersma and Jean Marie Linhart}, title = {Review of \emph{The Woman All Spies Fear} by Amy Butler Greenfield and \emph{Code Breaker, Spy Hunter} by Laurie Wallmark, Illustrated by Brooke Smart}, journal = {Cryptologia}, volume = {47}, number = {1}, pages = {88--92}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2134753}, doi = {10.1080/01611194.2022.2134753}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/BoersmaL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bures23, author = {Kenneth J. Bures}, title = {Cracking {PURPLE:} the identification of homologs in the cryptanalysis of the \emph{Angooki Taipu B} cipher machine}, journal = {Cryptologia}, volume = {47}, number = {5}, pages = {436--448}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2064200}, doi = {10.1080/01611194.2022.2064200}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bures23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Campanelli23, author = {Leonardo Campanelli}, title = {A statistical cryptanalysis of the Beale ciphers}, journal = {Cryptologia}, volume = {47}, number = {5}, pages = {466--473}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2116614}, doi = {10.1080/01611194.2022.2116614}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Campanelli23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChenNSW23, author = {Zhixiong Chen and Zhihua Niu and Yuqi Sang and Chenhuang Wu}, title = {Arithmetic autocorrelation of binary \emph{m}-sequences}, journal = {Cryptologia}, volume = {47}, number = {5}, pages = {449--458}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2071116}, doi = {10.1080/01611194.2022.2071116}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ChenNSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen23, author = {Chris Christensen}, title = {Review of \emph{Codebreaker Girls: {A} Secret Life at Bletchley Park} by Jan Slimming}, journal = {Cryptologia}, volume = {47}, number = {1}, pages = {93--96}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2026838}, doi = {10.1080/01611194.2022.2026838}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen23a, author = {Chris Christensen}, title = {Review of \emph{The Rohonc Code: Tracing a Historical Riddle} by Benedek L{\'{a}}ng}, journal = {Cryptologia}, volume = {47}, number = {3}, pages = {282--284}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2026841}, doi = {10.1080/01611194.2022.2026841}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen23b, author = {Chris Christensen}, title = {Genevieve Grotjan's "great discovery"}, journal = {Cryptologia}, volume = {47}, number = {4}, pages = {302--317}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2060052}, doi = {10.1080/01611194.2022.2060052}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen23c, author = {Chris Christensen}, title = {Review of \emph{Parker Hitt: The Father of American Military Cryptology} by Betsy Rohaly Smoot}, journal = {Cryptologia}, volume = {47}, number = {5}, pages = {489--492}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2101404}, doi = {10.1080/01611194.2022.2101404}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen23c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen23d, author = {Chris Christensen}, title = {Review of \emph{The Secret Life of an American Codebreaker: Codebreaker Girls} by Jan SlimmingSlimming, Jan. \emph{The Secret Life of an American Codebreaker: Codebreaker Girls} , South Yorkshire, England: Pen and Sword Books. 2022. 289 + xii pages, Hardcover, {\textsterling}25 ({\textdollar}34.95). {ISBN} 9781526784155}, journal = {Cryptologia}, volume = {47}, number = {6}, pages = {584--587}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2105179}, doi = {10.1080/01611194.2022.2105179}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen23d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Code23, author = {David L{\o}berg Code}, title = {Can musical encryption be both? {A} survey of music-based ciphers}, journal = {Cryptologia}, volume = {47}, number = {4}, pages = {318--364}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.2021565}, doi = {10.1080/01611194.2021.2021565}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Code23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley23, author = {John F. Dooley}, title = {Review of \emph{The Rose Code by Kate Quinn}}, journal = {Cryptologia}, volume = {47}, number = {4}, pages = {393--395}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2043488}, doi = {10.1080/01611194.2022.2043488}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Foxon23, author = {Floe Foxon}, title = {A treatise on the Rilke cryptogram}, journal = {Cryptologia}, volume = {47}, number = {6}, pages = {493--510}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2092784}, doi = {10.1080/01611194.2022.2092784}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Foxon23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gathen23, author = {Joachim von zur Gathen}, title = {Unicity distance of the Zodiac-340 cipher}, journal = {Cryptologia}, volume = {47}, number = {5}, pages = {474--488}, year = {2023}, url = {https://doi.org/10.1080/01611194.2023.2174821}, doi = {10.1080/01611194.2023.2174821}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gathen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Holden23, author = {Joshua Holden}, title = {Resource guide for teaching post-quantum cryptography}, journal = {Cryptologia}, volume = {47}, number = {5}, pages = {459--465}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2078077}, doi = {10.1080/01611194.2022.2078077}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Holden23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KumarGG23, author = {Satish Kumar and Indivar Gupta and Ashok Ji Gupta}, title = {A study of public key cryptosystems based on quasigroups}, journal = {Cryptologia}, volume = {47}, number = {6}, pages = {511--540}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2081824}, doi = {10.1080/01611194.2022.2081824}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KumarGG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KumarMO23, author = {Arvind Kumar and Prasanna Raghaw Mishra and Odelu Ojjela}, title = {Analysis of rotation and shift based diffusion functions}, journal = {Cryptologia}, volume = {47}, number = {5}, pages = {419--435}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2046660}, doi = {10.1080/01611194.2022.2046660}, timestamp = {Fri, 25 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KumarMO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KumarS23, author = {Santosh Kumar Ravva and Sureddi R. M. Krishna}, title = {Cryptanalysis of {RSA} with small difference of primes and two decryption exponents: Jochemsz and May approach}, journal = {Cryptologia}, volume = {47}, number = {6}, pages = {570--583}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2109943}, doi = {10.1080/01611194.2022.2109943}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KumarS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lasry23, author = {George Lasry}, title = {Cracking {SIGABA} in less than 24 hours on a consumer {PC}}, journal = {Cryptologia}, volume = {47}, number = {1}, pages = {1--37}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.1989522}, doi = {10.1080/01611194.2021.1989522}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Lasry23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lasry23a, author = {George Lasry}, title = {Analysis of a late 19th century french cipher created by Major Josse}, journal = {Cryptologia}, volume = {47}, number = {1}, pages = {48--62}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.1996484}, doi = {10.1080/01611194.2021.1996484}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Lasry23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryBT23, author = {George Lasry and Norbert Biermann and Satoshi Tomokiyo}, title = {Deciphering Mary Stuart's lost letters from 1578-1584}, journal = {Cryptologia}, volume = {47}, number = {2}, pages = {101--202}, year = {2023}, url = {https://doi.org/10.1080/01611194.2022.2160677}, doi = {10.1080/01611194.2022.2160677}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/OstwaldW23, author = {Olaf Ostwald and Frode Weierud}, title = {Modern cryptanalysis of the \emph{Truppenschl{\"{u}}ssel}}, journal = {Cryptologia}, volume = {47}, number = {3}, pages = {261--281}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.1998810}, doi = {10.1080/01611194.2021.1998810}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/OstwaldW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Relkin23, author = {Paul W. Relkin}, title = {Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers}, journal = {Cryptologia}, volume = {47}, number = {1}, pages = {38--47}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.1992686}, doi = {10.1080/01611194.2021.1992686}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Relkin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sherman23, author = {David Sherman}, title = {\emph{The Codebreakers} war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece}, journal = {Cryptologia}, volume = {47}, number = {3}, pages = {205--226}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.1998808}, doi = {10.1080/01611194.2021.1998808}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sherman23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Teseleanu23, author = {George Teseleanu}, title = {Cryptographic symmetric structures based on quasigroups}, journal = {Cryptologia}, volume = {47}, number = {4}, pages = {365--392}, year = {2023}, url = {https://doi.org/10.1080/01611194.2021.2022035}, doi = {10.1080/01611194.2021.2022035}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Teseleanu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BeanLW22, author = {Richard W. Bean and George Lasry and Frode Weierud}, title = {Eavesdropping on the Biafra-Lisbon link - breaking historical ciphers from the Biafran war}, journal = {Cryptologia}, volume = {46}, number = {1}, pages = {1--66}, year = {2022}, url = {https://doi.org/10.1080/01611194.2020.1762261}, doi = {10.1080/01611194.2020.1762261}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BeanLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bingol22, author = {Sedat Bing{\"{o}}l}, title = {Methods for encryption in early 19th-century Ottoman diplomatic correspondence}, journal = {Cryptologia}, volume = {46}, number = {6}, pages = {498--524}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1919943}, doi = {10.1080/01611194.2021.1919943}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bingol22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BlanchardRSS22, author = {Enka Blanchard and Ryan Robucci and Ted Selker and Alan T. Sherman}, title = {Phrase-verified voting: Verifiable low-tech remote boardroom voting: How We Voted on Tenure {\&} Promotion Cases during the Pandemic}, journal = {Cryptologia}, volume = {46}, number = {1}, pages = {67--101}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1975324}, doi = {10.1080/01611194.2021.1975324}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/BlanchardRSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bonavoglia22, author = {Paolo Bonavoglia}, title = {The ciphers of the Republic of Venice an overview}, journal = {Cryptologia}, volume = {46}, number = {4}, pages = {323--346}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1901797}, doi = {10.1080/01611194.2021.1901797}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bonavoglia22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bouchaudy22, author = {Jean{-}Fran{\c{c}}ois Bouchaudy}, title = {Enigma, the {XYZ} period {(1939-1940)}}, journal = {Cryptologia}, volume = {46}, number = {3}, pages = {195--271}, year = {2022}, url = {https://doi.org/10.1080/01611194.2020.1864681}, doi = {10.1080/01611194.2020.1864681}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bouchaudy22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChauhanGMV22, author = {Dimpy Chauhan and Indivar Gupta and Prasanna Raghaw Mishra and Rashmi Verma}, title = {Construction of cryptographically strong S-boxes from ternary quasigroups of order 4}, journal = {Cryptologia}, volume = {46}, number = {6}, pages = {525--551}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1934915}, doi = {10.1080/01611194.2021.1934915}, timestamp = {Fri, 25 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ChauhanGMV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChaumYSR22, author = {David Chaum and Mario Yaksetig and Alan T. Sherman and Joeri de Ruiter}, title = {{UDM:} Private user discovery with minimal information disclosure}, journal = {Cryptologia}, volume = {46}, number = {4}, pages = {347--379}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1911876}, doi = {10.1080/01611194.2021.1911876}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChaumYSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22, author = {Chris Christensen}, title = {Review of \emph{The {U.S.} Navy's On-the-Roof Gang, Volume One, Prelude to War }by Matt Zullo}, journal = {Cryptologia}, volume = {46}, number = {2}, pages = {183--184}, year = {2022}, url = {https://doi.org/10.1080/01611194.2020.1839815}, doi = {10.1080/01611194.2020.1839815}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22a, author = {Chris Christensen}, title = {Review of \emph{One Day in August} by David O'Keefe}, journal = {Cryptologia}, volume = {46}, number = {2}, pages = {185--192}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1901798}, doi = {10.1080/01611194.2021.1901798}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22b, author = {Chris Christensen}, title = {Review of \emph{Geniuses at War: Bletchley Park, Colossus, and the Dawn of the Digital Age} by David A. Price}, journal = {Cryptologia}, volume = {46}, number = {2}, pages = {193--194}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1969702}, doi = {10.1080/01611194.2021.1969702}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22c, author = {Chris Christensen}, title = {Review of \emph{Before Bletchley Park: The Codebreakers of the First World War} by Paul Gannon}, journal = {Cryptologia}, volume = {46}, number = {3}, pages = {272--276}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1949760}, doi = {10.1080/01611194.2021.1949760}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22d, author = {Chris Christensen}, title = {Review of \emph{Backing Bletchley: The Codebreaking Outstations from Eastcote to GCHQ} by Ronald Koorm: Koorm, Ronald}, journal = {Cryptologia}, volume = {46}, number = {3}, pages = {277--279}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1969705}, doi = {10.1080/01611194.2021.1969705}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22e, author = {Chris Christensen}, title = {Review of \emph{Madame {X:} The Story of '003', the {U.S.} Army Cryptologic Bombe in World War II} by Michael Barbakoff}, journal = {Cryptologia}, volume = {46}, number = {3}, pages = {280--283}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1949761}, doi = {10.1080/01611194.2021.1949761}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22f, author = {Chris Christensen}, title = {Review of \emph{Images of the National Archives Codebreakers} by Stephen Twigge}, journal = {Cryptologia}, volume = {46}, number = {3}, pages = {284--286}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1950077}, doi = {10.1080/01611194.2021.1950077}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22g, author = {Chris Christensen}, title = {Review of \emph{Reflections of Alan Turing: {A} Relative Story by Dermot Turing}: Turing, Dermot}, journal = {Cryptologia}, volume = {46}, number = {3}, pages = {287--289}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1969703}, doi = {10.1080/01611194.2021.1969703}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22h, author = {Chris Christensen}, title = {Review of \emph{USN {\&} {USMC} {WW} {II} Cryptologists' Oral Histories; Voices from the past, Volumes 1 and 2} by {U.S.} Naval Cryptologic Veterans Association}, journal = {Cryptologia}, volume = {46}, number = {4}, pages = {380--381}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1969704}, doi = {10.1080/01611194.2021.1969704}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22i, author = {Chris Christensen}, title = {Review of \emph{Radio War: The Secret Espionage War of the Radio Security Service 1938-1946} by David Abrutat: Abrutat}, journal = {Cryptologia}, volume = {46}, number = {4}, pages = {382--384}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1969706}, doi = {10.1080/01611194.2021.1969706}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22j, author = {Chris Christensen}, title = {Review of \emph{The Bombe: The Machine that Defeated Enigma} by Dermot Turing}, journal = {Cryptologia}, volume = {46}, number = {4}, pages = {385--386}, year = {2022}, url = {https://doi.org/10.1080/01611194.2022.2026840}, doi = {10.1080/01611194.2022.2026840}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen22k, author = {Chris Christensen}, title = {Review of \emph{Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain's War with Japan} by Peter Kornicki}, journal = {Cryptologia}, volume = {46}, number = {6}, pages = {552--555}, year = {2022}, url = {https://doi.org/10.1080/01611194.2022.2026839}, doi = {10.1080/01611194.2022.2026839}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen22k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CourtoisG22, author = {Nicolas T. Courtois and Marek Grajek}, title = {On latin squares, invariant differentials, random permutations and historical Enigma rotors}, journal = {Cryptologia}, volume = {46}, number = {5}, pages = {387--421}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1920070}, doi = {10.1080/01611194.2021.1920070}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/CourtoisG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley22, author = {John F. Dooley}, title = {Review of \emph{codebreaker} by \emph{Marc McMenamin}}, journal = {Cryptologia}, volume = {46}, number = {6}, pages = {556--560}, year = {2022}, url = {https://doi.org/10.1080/01611194.2022.2037929}, doi = {10.1080/01611194.2022.2037929}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DuninEHKLS22, author = {Elonka Dunin and Magnus Ekhall and Konstantin Hamidullin and Nils Kopal and George Lasry and Klaus Schmeh}, title = {How we set new world records in breaking Playfair ciphertexts}, journal = {Cryptologia}, volume = {46}, number = {4}, pages = {302--322}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1905734}, doi = {10.1080/01611194.2021.1905734}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/DuninEHKLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/EdemskiyWX22, author = {Vladimir Edemskiy and Chenhuang Wu and Chunxiang Xu}, title = {Improvements on \emph{k}-error linear complexity of \emph{q}-ary sequences derived from Euler quotients}, journal = {Cryptologia}, volume = {46}, number = {2}, pages = {148--166}, year = {2022}, url = {https://doi.org/10.1080/01611194.2020.1827312}, doi = {10.1080/01611194.2020.1827312}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/EdemskiyWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kalachi22, author = {Herv{\'{e}} Tal{\'{e}} Kalachi}, title = {On the failure of the smart approach of the {GPT} cryptosystem}, journal = {Cryptologia}, volume = {46}, number = {2}, pages = {167--182}, year = {2022}, url = {https://doi.org/10.1080/01611194.2020.1829181}, doi = {10.1080/01611194.2020.1829181}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kalachi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KopalW22, author = {Nils Kopal and Michelle Waldisp{\"{u}}hl}, title = {Deciphering three diplomatic letters sent by Maximilian {II} in 1575}, journal = {Cryptologia}, volume = {46}, number = {2}, pages = {103--127}, year = {2022}, url = {https://doi.org/10.1080/01611194.2020.1858370}, doi = {10.1080/01611194.2020.1858370}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/KopalW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lehofer22, author = {Anna Lehofer}, title = {Applying hierarchical clustering to homophonic substitution ciphers using historical corpora}, journal = {Cryptologia}, volume = {46}, number = {5}, pages = {422--438}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1918801}, doi = {10.1080/01611194.2021.1918801}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Lehofer22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MishraR22, author = {Prasanna Raghaw Mishra and S. C. Ramola}, title = {{FCSR} connection integers: efficient generation, testing and counting}, journal = {Cryptologia}, volume = {46}, number = {5}, pages = {439--460}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1914775}, doi = {10.1080/01611194.2021.1914775}, timestamp = {Fri, 25 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MishraR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Morgan22, author = {Roger J. Morgan}, title = {Rudyard Kipling's unsolved cryptogram}, journal = {Cryptologia}, volume = {46}, number = {6}, pages = {485--497}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1938297}, doi = {10.1080/01611194.2021.1938297}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Morgan22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Parmentier22, author = {Fran{\c{c}}ois Parmentier}, title = {Deciphering the Voynich manuscript: propositions to unlock research}, journal = {Cryptologia}, volume = {46}, number = {5}, pages = {461--484}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1919944}, doi = {10.1080/01611194.2021.1919944}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Parmentier22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Relkin22, author = {Paul W. Relkin}, title = {Solving the Olum 1 Cipher}, journal = {Cryptologia}, volume = {46}, number = {4}, pages = {291--301}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1974124}, doi = {10.1080/01611194.2021.1974124}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Relkin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/TuncerK22, author = {T{\"{u}}rker Tuncer and Huseyin Yuce Kurum}, title = {A novel Collatz conjecture-based digital image watermarking method}, journal = {Cryptologia}, volume = {46}, number = {2}, pages = {128--147}, year = {2022}, url = {https://doi.org/10.1080/01611194.2020.1821408}, doi = {10.1080/01611194.2020.1821408}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/TuncerK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BashirA21, author = {Malik Zia Ullah Bashir and Rashid Ali}, title = {Cryptanalysis and improvement of a blind multi-document signcryption scheme}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {450--464}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1755913}, doi = {10.1080/01611194.2020.1755913}, timestamp = {Sat, 01 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BashirA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bonavoglia21, author = {Paolo Bonavoglia}, title = {Review of classical cryptology at play by Silvio Coccaro}, journal = {Cryptologia}, volume = {45}, number = {1}, pages = {94--96}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1793824}, doi = {10.1080/01611194.2020.1793824}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bonavoglia21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bouchaudy21, author = {Jean{-}Fran{\c{c}}ois Bouchaudy}, title = {Enigma: the spoils of Gustave Bertrand, or "par o{\`{u}} tout a commenc{\'{e}}"}, journal = {Cryptologia}, volume = {45}, number = {4}, pages = {309--341}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1736205}, doi = {10.1080/01611194.2020.1736205}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bouchaudy21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bures21, author = {Kenneth J. Bures}, title = {Cracking {PURPLE:} cryptanalysis of the Angooki Taipu {B} switch tables}, journal = {Cryptologia}, volume = {45}, number = {1}, pages = {1--43}, year = {2021}, url = {https://doi.org/10.1080/01611194.2019.1706064}, doi = {10.1080/01611194.2019.1706064}, timestamp = {Thu, 18 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bures21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChauhanGV21, author = {Dimpy Chauhan and Indivar Gupta and Rashmi Verma}, title = {Quasigroups and their applications in cryptography}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {227--265}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1721615}, doi = {10.1080/01611194.2020.1721615}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ChauhanGV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21, author = {Chris Christensen}, title = {Review of Breaking Teleprinter Ciphers at Bletchley Park by James A. Reeds, Whitfield Diffie, and J. V. Field}, journal = {Cryptologia}, volume = {45}, number = {1}, pages = {88--93}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1804484}, doi = {10.1080/01611194.2020.1804484}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21a, author = {Chris Christensen}, title = {Review of \emph{Operation Vengeance: The Astonishing Aerial Ambush That Changed World War II} by Dan Hampton}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {474--477}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1839816}, doi = {10.1080/01611194.2020.1839816}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21b, author = {Chris Christensen}, title = {Review of \emph{The Codebreakers of Bletchley Park} by Dermot Turing}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {563--564}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1839814}, doi = {10.1080/01611194.2020.1839814}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21c, author = {Chris Christensen}, title = {Review of \emph{A Course in Cryptography} by Heiko Knospe}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {565--568}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1804483}, doi = {10.1080/01611194.2020.1804483}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21d, author = {Chris Christensen}, title = {Review of \emph{The {U.S.} Navy's On-the-Roof Gang, Volume Two, War in the Pacific} by Matt Zullo}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {569--570}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1878307}, doi = {10.1080/01611194.2021.1878307}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21e, author = {Chris Christensen}, title = {Review of \emph{Codebreaking: {A} Practical Guide} by Elonka Dunin and Klaus Schmeh}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {497}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1873207}, doi = {10.1080/01611194.2021.1873207}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Courtois21, author = {Nicolas T. Courtois}, title = {A nonlinear invariant attack on {T-310} with the original Boolean function}, journal = {Cryptologia}, volume = {45}, number = {2}, pages = {178--192}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1736207}, doi = {10.1080/01611194.2020.1736207}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Courtois21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Daruka21, author = {Istv{\'{a}}n Daruka}, title = {On the Voynich manuscript}, journal = {Cryptologia}, volume = {45}, number = {1}, pages = {44--80}, year = {2021}, url = {https://doi.org/10.1080/01611194.2019.1706063}, doi = {10.1080/01611194.2019.1706063}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Daruka21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley21, author = {John F. Dooley}, title = {Review of Flight of the Fox by Gray Basnight}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {287--288}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1829182}, doi = {10.1080/01611194.2020.1829182}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine21, author = {Ralph Erskine}, title = {Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones}, journal = {Cryptologia}, volume = {45}, number = {4}, pages = {379--382}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1878308}, doi = {10.1080/01611194.2021.1878308}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/FuensantaBB21, author = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and H{\'{e}}ctor Soler Bonet and Diego Navarro Bonilla}, title = {How to make a codebook versatile. The example of the {ASLET} code}, journal = {Cryptologia}, volume = {45}, number = {2}, pages = {129--166}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1718800}, doi = {10.1080/01611194.2020.1718800}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/FuensantaBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Geraud-StewartN21, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, title = {A French cipher from the late 19th century}, journal = {Cryptologia}, volume = {45}, number = {4}, pages = {342--370}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1753265}, doi = {10.1080/01611194.2020.1753265}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Geraud-StewartN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Griffiths21, author = {Barry J. Griffiths}, title = {Cryptography in undergraduate education: perceptions of postgraduate students}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {553--562}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1804482}, doi = {10.1080/01611194.2020.1804482}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Griffiths21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hanyok21, author = {Robert J. Hanyok}, title = {Sources and methods: Searching for cryptologic records in the findings of post-World War {II} allied technical surveys and commissions}, journal = {Cryptologia}, volume = {45}, number = {4}, pages = {371--378}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1921072}, doi = {10.1080/01611194.2021.1921072}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hanyok21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryMK21, author = {George Lasry and Be{\'{a}}ta Megyesi and Nils Kopal}, title = {Deciphering papal ciphers from the 16th to the 18th Century}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {479--540}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1755915}, doi = {10.1080/01611194.2020.1755915}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryNA21, author = {George Lasry and Ingo Niebel and Torbj{\"{o}}rn Andersson}, title = {Deciphering German diplomatic and naval attach{\'{e}} messages from 1900-1915}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {383--425}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1755914}, doi = {10.1080/01611194.2020.1755914}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryNA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MastanP21, author = {J. Mohamedmoideen Kader Mastan and R. Pandian}, title = {Cryptanalysis of two similar chaos-based image encryption schemes}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {541--552}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1814447}, doi = {10.1080/01611194.2020.1814447}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MastanP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Nedved21, author = {Gregory J. Nedved}, title = {Herbert O. Yardley revisited: what does the new evidence say?}, journal = {Cryptologia}, volume = {45}, number = {2}, pages = {102--128}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1767706}, doi = {10.1080/01611194.2020.1767706}, timestamp = {Thu, 18 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Nedved21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Patterson21, author = {Blain Patterson}, title = {Analyzing student understanding of cryptography using the {SOLO} taxonomy}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {439--449}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1755746}, doi = {10.1080/01611194.2020.1755746}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Patterson21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/PhelanS21, author = {Ronald Phelan and David Simpson}, title = {Ludlings: not all fun and games}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {426--433}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1761482}, doi = {10.1080/01611194.2020.1761482}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/PhelanS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smoot21, author = {Betsy Rohaly Smoot}, title = {Sources and methods: uncovering the story of American Cryptology in World War {I}}, journal = {Cryptologia}, volume = {45}, number = {1}, pages = {81--87}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1858371}, doi = {10.1080/01611194.2020.1858371}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Smoot21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smoot21a, author = {Betsy Rohaly Smoot}, title = {Sources and methods for cryptologic history: researching individuals (and the biography boom)}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {465--473}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1929567}, doi = {10.1080/01611194.2021.1929567}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Smoot21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SommervollN21, author = {{\AA}vald {\AA}slaugson Sommervoll and Leif Nilsen}, title = {Genetic algorithm attack on Enigma's plugboard}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {194--226}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1721617}, doi = {10.1080/01611194.2020.1721617}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SommervollN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Tate21, author = {Kirsten Tate}, title = {Identifying concealed messages using authorship attribution}, journal = {Cryptologia}, volume = {45}, number = {2}, pages = {167--177}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1736206}, doi = {10.1080/01611194.2020.1736206}, timestamp = {Thu, 18 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Tate21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Teseleanu21, author = {George Teseleanu}, title = {Quasigroups and substitution permutation networks: a failed experiment}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {266--281}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1750506}, doi = {10.1080/01611194.2020.1750506}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Teseleanu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/TimmS21, author = {Torsten Timm and Andreas Schinner}, title = {Review of \emph{The linguistics of the Voynich manuscript} by Claire Bowern and Luke Lindemann}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {434--438}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1911875}, doi = {10.1080/01611194.2021.1911875}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/TimmS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Tokar21, author = {John A. Tokar}, title = {{NSA} honors two Cryptologia board members}, journal = {Cryptologia}, volume = {45}, number = {2}, pages = {97--101}, year = {2021}, url = {https://doi.org/10.1080/07352689.2021.1891679}, doi = {10.1080/07352689.2021.1891679}, timestamp = {Thu, 18 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Tokar21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wase21, author = {Viktor Wase}, title = {Benford's law in the Beale ciphers}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {282--286}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1821409}, doi = {10.1080/01611194.2020.1821409}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wase21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Weierud21, author = {Frode Weierud}, title = {In memoriam: Thomas Ralph Erskine {CB} {(1933} - 2021)}, journal = {Cryptologia}, volume = {45}, number = {4}, pages = {289--308}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1935363}, doi = {10.1080/01611194.2021.1935363}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Weierud21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X21, title = {18th cryptologic history symposium}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {193}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1915382}, doi = {10.1080/01611194.2021.1915382}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Alin20, author = {Jonas Alin}, title = {Principal component analysis of characters in the Voynich manuscript and their classifications based on comparative analysis of writings in known languages}, journal = {Cryptologia}, volume = {44}, number = {5}, pages = {421--437}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1688203}, doi = {10.1080/01611194.2019.1688203}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Alin20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BeaverB20, author = {Cheryl L. Beaver and Stuart Boersma}, title = {Celebrating ten years of {KRYPTOS:} a series of cryptanalysis}, journal = {Cryptologia}, volume = {44}, number = {3}, pages = {257--266}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1670283}, doi = {10.1080/01611194.2019.1670283}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BeaverB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BiswasD20, author = {Anindya Kumar Biswas and Mou Dasgupta}, title = {Two polynomials based (t, n) threshold secret sharing scheme with cheating detection}, journal = {Cryptologia}, volume = {44}, number = {4}, pages = {357--370}, year = {2020}, url = {https://doi.org/10.1080/01611194.2020.1717676}, doi = {10.1080/01611194.2020.1717676}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BiswasD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bonavoglia20, author = {Paolo Bonavoglia}, title = {The cifra delle caselle a {XVI} Century superencrypted cipher}, journal = {Cryptologia}, volume = {44}, number = {1}, pages = {39--52}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1609132}, doi = {10.1080/01611194.2019.1609132}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bonavoglia20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen20, author = {Chris Christensen}, title = {Review of code cracking for kids by Jean Daigneau}, journal = {Cryptologia}, volume = {44}, number = {4}, pages = {383--384}, year = {2020}, url = {https://doi.org/10.1080/01611194.2020.1754965}, doi = {10.1080/01611194.2020.1754965}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen20a, author = {Chris Christensen}, title = {Review of The Enigma Bulletin edited by Zdzis{\l}aw J. Kapera}, journal = {Cryptologia}, volume = {44}, number = {6}, pages = {569--572}, year = {2020}, url = {https://doi.org/10.1080/01611194.2020.1732497}, doi = {10.1080/01611194.2020.1732497}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen20b, author = {Chris Christensen}, title = {Review of Bletchley Park and D-Day by David Kenyon}, journal = {Cryptologia}, volume = {44}, number = {6}, pages = {573--576}, year = {2020}, url = {https://doi.org/10.1080/01611194.2020.1732498}, doi = {10.1080/01611194.2020.1732498}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CourtoisG20, author = {Nicolas T. Courtois and Marios Georgiou}, title = {Variable elimination strategies and construction of nonlinear polynomial invariant attacks on {T-310}}, journal = {Cryptologia}, volume = {44}, number = {1}, pages = {20--38}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1650845}, doi = {10.1080/01611194.2019.1650845}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/CourtoisG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CourtoisPA20, author = {Nicolas T. Courtois and Aidan Patrick and Matteo Abbondati}, title = {Construction of a polynomial invariant annihilation attack of degree 7 for {T-310}}, journal = {Cryptologia}, volume = {44}, number = {4}, pages = {289--314}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1706062}, doi = {10.1080/01611194.2019.1706062}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CourtoisPA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DiazSJ20, author = {Alejandra Diaz and Alan T. Sherman and Anupam Joshi}, title = {Phishing in an academic community: {A} study of user susceptibility and behavior}, journal = {Cryptologia}, volume = {44}, number = {1}, pages = {53--67}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1623343}, doi = {10.1080/01611194.2019.1623343}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/DiazSJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley20, author = {John F. Dooley}, title = {Review of The Third Reich is Listening by Christian Jennings}, journal = {Cryptologia}, volume = {44}, number = {1}, pages = {91--95}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1655505}, doi = {10.1080/01611194.2019.1655505}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley20a, author = {John F. Dooley}, title = {Review of the secret world by Christopher Andrew}, journal = {Cryptologia}, volume = {44}, number = {3}, pages = {280--284}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1706210}, doi = {10.1080/01611194.2019.1706210}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley20b, author = {John F. Dooley}, title = {Review of {A} Most Enigmatic War by James Goodchild}, journal = {Cryptologia}, volume = {44}, number = {5}, pages = {477--480}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1688204}, doi = {10.1080/01611194.2019.1688204}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GorodilovaACHIK20, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Xiang{-}dong Hou and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Luca Mariot and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Razvan Rosie and Natalia N. Tokareva}, title = {The Fifth International Students' Olympiad in cryptography - {NSUCRYPTO:} Problems and their solutions}, journal = {Cryptologia}, volume = {44}, number = {3}, pages = {223--256}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1670282}, doi = {10.1080/01611194.2019.1670282}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GorodilovaACHIK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HanyokS20, author = {Robert J. Hanyok and Betsy Rohaly Smoot}, title = {Sources and methods series: considering other record groups in Nara holding cryptologic and cryptologic-related records}, journal = {Cryptologia}, volume = {44}, number = {5}, pages = {472--476}, year = {2020}, url = {https://doi.org/10.1080/01611194.2020.1792003}, doi = {10.1080/01611194.2020.1792003}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HanyokS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HanyokS20a, author = {Robert J. Hanyok and Betsy Rohaly Smoot}, title = {Sources and methods: contingency and its role in researching records of cryptologic history - a discussion and some lessons to apply for future research}, journal = {Cryptologia}, volume = {44}, number = {6}, pages = {560--568}, year = {2020}, url = {https://doi.org/10.1080/01611194.2020.1834989}, doi = {10.1080/01611194.2020.1834989}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/HanyokS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kaeding20, author = {Thomas Kaeding}, title = {Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers}, journal = {Cryptologia}, volume = {44}, number = {3}, pages = {205--222}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1655504}, doi = {10.1080/01611194.2019.1655504}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kaeding20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KenyonW20, author = {David Kenyon and Frode Weierud}, title = {Enigma {G:} The counter Enigma}, journal = {Cryptologia}, volume = {44}, number = {5}, pages = {385--420}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1661134}, doi = {10.1080/01611194.2019.1661134}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/KenyonW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KhatoonT20, author = {Shaheena Khatoon and Balwant Singh Thakur}, title = {Cryptanalysis and improvement of authentication scheme for roaming service in ubiquitous network}, journal = {Cryptologia}, volume = {44}, number = {4}, pages = {315--340}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1706061}, doi = {10.1080/01611194.2019.1706061}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KhatoonT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KumarSPP20, author = {Manoj Kumar and T. S. Suresh and Saibal K. Pal and Anupama Panigrahi}, title = {Optimal differential trails in lightweight block ciphers {ANU} and {PICO}}, journal = {Cryptologia}, volume = {44}, number = {1}, pages = {68--78}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1650844}, doi = {10.1080/01611194.2019.1650844}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/KumarSPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/McCarthy20, author = {Jerry McCarthy}, title = {Review of the 2nd International Conference on Historical Cryptology in Mons, Belgium}, journal = {Cryptologia}, volume = {44}, number = {3}, pages = {285--288}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1659447}, doi = {10.1080/01611194.2019.1659447}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/McCarthy20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MegyesiEFKLLLPW20, author = {Be{\'{a}}ta Megyesi and Bernhard Esslinger and Alicia Forn{\'{e}}s and Nils Kopal and Benedek L{\'{a}}ng and George Lasry and Karl de Leeuw and Eva Pettersson and Arno Wacker and Michelle Waldisp{\"{u}}hl}, title = {Decryption of historical manuscripts: the {DECRYPT} project}, journal = {Cryptologia}, volume = {44}, number = {6}, pages = {545--559}, year = {2020}, url = {https://doi.org/10.1080/01611194.2020.1716410}, doi = {10.1080/01611194.2020.1716410}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MegyesiEFKLLLPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MelkaS20, author = {Tomi S. Melka and Robert M. Schoch}, title = {Exploring a mysterious tablet from Easter Island: the issues of authenticity and falsifiability in rongorongo studies}, journal = {Cryptologia}, volume = {44}, number = {6}, pages = {481--544}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1706065}, doi = {10.1080/01611194.2019.1706065}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/MelkaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/NiehuesGPZ20, author = {Lucas Boppre Niehues and Joachim von zur Gathen and Lucas Pandolfo Perin and Ana Zumalac{\'{a}}rregui}, title = {Sidon sets and statistics of the ElGamal function}, journal = {Cryptologia}, volume = {44}, number = {5}, pages = {438--450}, year = {2020}, url = {https://doi.org/10.1080/01611194.2020.1790128}, doi = {10.1080/01611194.2020.1790128}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/NiehuesGPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/PandeyL20, author = {Prateek Pandey and Ratnesh Litoriya}, title = {Securing and authenticating healthcare records through blockchain technology}, journal = {Cryptologia}, volume = {44}, number = {4}, pages = {341--356}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1706060}, doi = {10.1080/01611194.2019.1706060}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/PandeyL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ParkKCY20, author = {Seongmin Park and Juneyeun Kim and Kookrae Cho and Dae Hyun Yum}, title = {Finding the key length of a Vigen{\`{e}}re cipher: How to improve the twist algorithm}, journal = {Cryptologia}, volume = {44}, number = {3}, pages = {197--204}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1657202}, doi = {10.1080/01611194.2019.1657202}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ParkKCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Parsons20, author = {Sarah Parsons}, title = {Sources and methods for cryptologic history: NSA.gov - a tour through its history and resources}, journal = {Cryptologia}, volume = {44}, number = {4}, pages = {371--382}, year = {2020}, url = {https://doi.org/10.1080/01611194.2020.1753264}, doi = {10.1080/01611194.2020.1753264}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Parsons20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SaikiaH20, author = {Monjul Saikia and Md. Anwar Hussain}, title = {Efficient data encryption technique using quaternions for wireless sensor network}, journal = {Cryptologia}, volume = {44}, number = {5}, pages = {451--471}, year = {2020}, url = {https://doi.org/10.1080/01611194.2020.1755745}, doi = {10.1080/01611194.2020.1755745}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SaikiaH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sherman20, author = {David Sherman}, title = {Sources and methods for cryptologic history: the William and Elizebeth Smith Friedman collections}, journal = {Cryptologia}, volume = {44}, number = {3}, pages = {267--279}, year = {2020}, url = {https://doi.org/10.1080/01611194.2020.1733134}, doi = {10.1080/01611194.2020.1733134}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sherman20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ShermanSH20, author = {David Sherman and Betsy Rohaly Smoot and Robert J. Hanyok}, title = {Introducing a new Cryptologia series: Sources and methods for cryptologic history}, journal = {Cryptologia}, volume = {44}, number = {1}, pages = {79--81}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1670284}, doi = {10.1080/01611194.2019.1670284}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ShermanSH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SmootH20, author = {Betsy Rohaly Smoot and Robert J. Hanyok}, title = {Sources and methods for cryptologic history: Research at the {US} National Archives-the "Big Two" Record Groups}, journal = {Cryptologia}, volume = {44}, number = {2}, pages = {172--196}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1706066}, doi = {10.1080/01611194.2019.1706066}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/SmootH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/TimmS20, author = {Torsten Timm and Andreas Schinner}, title = {A possible generating algorithm of the Voynich manuscript}, journal = {Cryptologia}, volume = {44}, number = {1}, pages = {1--19}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1596999}, doi = {10.1080/01611194.2019.1596999}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/TimmS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/WeierudZ20, author = {Frode Weierud and Sandy Zabell}, title = {German mathematicians and cryptology in {WWII}}, journal = {Cryptologia}, volume = {44}, number = {2}, pages = {97--171}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1600076}, doi = {10.1080/01611194.2019.1600076}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/WeierudZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X20, title = {Review of two collections of essays about Alan Turing}, journal = {Cryptologia}, volume = {44}, number = {1}, pages = {82--86}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1650846}, doi = {10.1080/01611194.2019.1650846}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X20a, title = {Review of Real Life Cryptology by Benedek L{\'{a}}ng}, journal = {Cryptologia}, volume = {44}, number = {1}, pages = {87--90}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1650847}, doi = {10.1080/01611194.2019.1650847}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/X20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AlhadawiZIL19, author = {Hussam S. Alhadawi and Mohamad Fadli Zolkipli and Saba M. Ismail and Dragan Lambic}, title = {Designing a pseudorandom bit generator based on LFSRs and a discrete chaotic map}, journal = {Cryptologia}, volume = {43}, number = {3}, pages = {190--211}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1548390}, doi = {10.1080/01611194.2018.1548390}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AlhadawiZIL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AyatG19, author = {S. Masih Ayat and Meysam Ghahramani}, title = {A recursive algorithm for solving "a secret sharing" problem}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {497--503}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596996}, doi = {10.1080/01611194.2019.1596996}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/AyatG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BentajerHAIF19, author = {Ahmed Bentajer and Mustapha Hedabou and Karim Abouelmehdi and Zakaria Igarramen and Said El Fezazi}, title = {An IBE-based design for assured deletion in cloud storage}, journal = {Cryptologia}, volume = {43}, number = {3}, pages = {254--265}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1549123}, doi = {10.1080/01611194.2018.1549123}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BentajerHAIF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bonavoglia19, author = {Paolo Bonavoglia}, title = {Bellaso's 1552 cipher recovered in Venice}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {459--465}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596181}, doi = {10.1080/01611194.2019.1596181}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bonavoglia19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bouchaudy19, author = {Jean{-}Fran{\c{c}}ois Bouchaudy}, title = {Genuine French {WWII} {M-209} cryptograms}, journal = {Cryptologia}, volume = {43}, number = {5}, pages = {359--371}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596180}, doi = {10.1080/01611194.2019.1596180}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bouchaudy19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BussiDMD19, author = {Khushboo Bussi and Dhananjoy Dey and Prasanna Raghaw Mishra and Bal Kishan Dass}, title = {{MGR} Hash Functions}, journal = {Cryptologia}, volume = {43}, number = {5}, pages = {372--390}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596995}, doi = {10.1080/01611194.2019.1596995}, timestamp = {Tue, 05 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/BussiDMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19, author = {Chris Christensen}, title = {Review of The Spy Who Couldn't Spell by Yudhijit Bhattacharjee}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {65--68}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1471429}, doi = {10.1080/01611194.2018.1471429}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19a, author = {Chris Christensen}, title = {Review of Stanley Johnston'S Blunder: the Reporter Who Spilled the Secret Behind the {U.S.} Navy'S Victory at Midway by Elliot Carlson}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {69--76}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1503208}, doi = {10.1080/01611194.2018.1503208}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19b, author = {Chris Christensen}, title = {Review of Alastair Denniston: Code-Breaking from Room 40 to Berkeley Street and the Birth of {GCHQ} by Joel Greenberg}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {77--80}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1503209}, doi = {10.1080/01611194.2018.1503209}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19c, author = {Chris Christensen}, title = {Edward Hugh Simpson {CB} {(10} December 1922 - 5 February 2019)}, journal = {Cryptologia}, volume = {43}, number = {2}, pages = {81--83}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1583823}, doi = {10.1080/01611194.2019.1583823}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19d, author = {Chris Christensen}, title = {Review of History of Cryptography and Cryptanalysis by John Dooley}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {536--538}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1623344}, doi = {10.1080/01611194.2019.1623344}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19e, author = {Chris Christensen}, title = {Review of The Cypher Bureau by Eilidh McGinness}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {539--541}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1623937}, doi = {10.1080/01611194.2019.1623937}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19f, author = {Chris Christensen}, title = {Review of X, {Y} {\&} {Z} by Dermot Turing}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {542--544}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1623938}, doi = {10.1080/01611194.2019.1623938}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChristensenAS19, author = {Chris Christensen and Jared Antrobus and Edward Simpson}, title = {Aligning {JN-25} messages in depth using weights when the code groups scan}, journal = {Cryptologia}, volume = {43}, number = {2}, pages = {84--137}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1528311}, doi = {10.1080/01611194.2018.1528311}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChristensenAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ClaytonG19, author = {Mike Clayton and John Gallehawk}, title = {Letter repeats in Enigma ciphertext produced by same-letter keying}, journal = {Cryptologia}, volume = {43}, number = {5}, pages = {438--457}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1565108}, doi = {10.1080/01611194.2019.1565108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ClaytonG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CourtoisGS19, author = {Nicolas T. Courtois and Marios Georgiou and Matteo Scarlata}, title = {Slide attacks and LC-weak keys in {T-310}}, journal = {Cryptologia}, volume = {43}, number = {3}, pages = {175--189}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1548392}, doi = {10.1080/01611194.2018.1548392}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CourtoisGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CourtoisOS19, author = {Nicolas T. Courtois and Maria{-}Bristena Oprisanu and Klaus Schmeh}, title = {Linear cryptanalysis and block cipher design in East Germany in the 1970s}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {2--22}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1483981}, doi = {10.1080/01611194.2018.1483981}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CourtoisOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley19, author = {John F. Dooley}, title = {The Beale ciphers in fiction}, journal = {Cryptologia}, volume = {43}, number = {4}, pages = {344--358}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1550691}, doi = {10.1080/01611194.2018.1550691}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley19a, author = {John F. Dooley}, title = {Review of 3 Ciphers by Carol Ritz}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {551--552}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1629676}, doi = {10.1080/01611194.2019.1629676}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GorodilovaACGIK19, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Svetla Nikova and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Vincent Rijmen and Natalia N. Tokareva}, title = {Problems and solutions from the fourth International Students' Olympiad in Cryptography {(NSUCRYPTO)}}, journal = {Cryptologia}, volume = {43}, number = {2}, pages = {138--174}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1517834}, doi = {10.1080/01611194.2018.1517834}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GrosekAF19, author = {Otokar Grosek and Eugen Antal and Tom{\'{a}}s Fabsic}, title = {Remarks on breaking the Vigen{\`{e}}re autokey cipher}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {486--496}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596997}, doi = {10.1080/01611194.2019.1596997}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GrosekAF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KalitaTM19, author = {Manashee Kalita and Themrichon Tuithung and Swanirbhar Majumder}, title = {An adaptive color image steganography method using adjacent pixel value differencing and {LSB} substitution technique}, journal = {Cryptologia}, volume = {43}, number = {5}, pages = {414--437}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1579122}, doi = {10.1080/01611194.2019.1579122}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/KalitaTM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KishoreR19, author = {Neha Kishore and Priya Raina}, title = {Parallel cryptographic hashing: Developments in the last 25 years}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {504--535}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1609130}, doi = {10.1080/01611194.2019.1609130}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KishoreR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryKW19, author = {George Lasry and Nils Kopal and Arno Wacker}, title = {Cryptanalysis of Enigma double indicators with hill climbing}, journal = {Cryptologia}, volume = {43}, number = {4}, pages = {267--292}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1551253}, doi = {10.1080/01611194.2018.1551253}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MaitraGM19, author = {Tanmoy Maitra and Debasis Giri and Ram N. Mohapatra}, title = {{SAS-SIP:} {A} secure authentication scheme based on {ECC} and a fuzzy extractor for session initiation protocol}, journal = {Cryptologia}, volume = {43}, number = {3}, pages = {212--232}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1548391}, doi = {10.1080/01611194.2018.1548391}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MaitraGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MathivananGV19, author = {P. Mathivanan and A. Balaji Ganesh and R. Venkatesan}, title = {{QR} code-based {ECG} signal encryption/decryption algorithm}, journal = {Cryptologia}, volume = {43}, number = {3}, pages = {233--253}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1549122}, doi = {10.1080/01611194.2018.1549122}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MathivananGV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/OmraniRB19, author = {Tasnime Omrani and Rhouma Rhouma and Rabei Becheikh}, title = {{LICID:} a lightweight image cryptosystem for IoT devices}, journal = {Cryptologia}, volume = {43}, number = {4}, pages = {313--343}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1563009}, doi = {10.1080/01611194.2018.1563009}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/OmraniRB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Peinado19, author = {Alberto Peinado}, title = {Reconstruction of a 1940 Spanish strip cipher by means of a cyclic rotation model applied to encrypted telegrams}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {47--64}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1522678}, doi = {10.1080/01611194.2018.1522678}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Peinado19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Roberto19, author = {R. Narv{\'{a}}ez Roberto}, title = {Review of Mensajes secretos. La historia de la criptograf{\'{\i}}a Espa{\~{n}}ola desde sus inicios hasta los a{\~{n}}os 50 (Secret Messages. The History of Spanish Cryptography from its beginnings until the 1950s) by Soler Fuensanta, Jos{\'{e}} Ram{\'{o}}n, and Francisco Javier L{\'{o}}pez-Brea Eespiau}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {545--550}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1609131}, doi = {10.1080/01611194.2019.1609131}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Roberto19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ShermanGLGKMRST19, author = {Alan T. Sherman and Enis Golaszewski and Edward LaFemina and Ethan Goldschen and Mohammed Khan and Lauren Mundy and Mykah Rather and Bryan Solis and Wubnyonga Tete and Edwin Valdez and Brian Weber and Damian Doyle and Casey O'Brien and Linda Oliva and Joseph Roundy and Jack Suess}, title = {The {SFS} summer research study at {UMBC:} Project-based learning inspires cybersecurity students}, journal = {Cryptologia}, volume = {43}, number = {4}, pages = {293--312}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1557298}, doi = {10.1080/01611194.2018.1557298}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ShermanGLGKMRST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SmithP19, author = {Emma May Smith and Marco Ponzi}, title = {Glyph combinations across word breaks in the Voynich manuscript}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {466--485}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596998}, doi = {10.1080/01611194.2019.1596998}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SmithP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Tomokiyo19, author = {Satoshi Tomokiyo}, title = {Identifying Italian ciphers from continuous-figure ciphertexts {(1593)}}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {23--46}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1503207}, doi = {10.1080/01611194.2018.1503207}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Tomokiyo19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Tuncer19, author = {T{\"{u}}rker Tuncer}, title = {Block-based fuzzy-image authentication method}, journal = {Cryptologia}, volume = {43}, number = {5}, pages = {391--413}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1582117}, doi = {10.1080/01611194.2019.1582117}, timestamp = {Fri, 06 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Tuncer19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X19, title = {2019 Symposium on Cryptologic History}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {1}, year = {2019}, url = {https://www.tandfonline.com/doi/full/10.1080/01611194.2019.1531593}, doi = {10.1080/01611194.2019.1531593}, timestamp = {Fri, 07 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/X19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Anderson18, author = {Deborah Anderson}, title = {Review of Code Girls: The untold story of the American women code breakers of World War {II} by Liza Mundy}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {258--261}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1428837}, doi = {10.1080/01611194.2018.1428837}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Anderson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Biermann18, author = {Norbert Biermann}, title = {Analysis of Giouan Battista Bellaso's cipher challenges of 1555}, journal = {Cryptologia}, volume = {42}, number = {5}, pages = {381--407}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1422050}, doi = {10.1080/01611194.2017.1422050}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Biermann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bonavoglia18, author = {Paolo Bonavoglia}, title = {A 1916 World War {I} notebook of Luigi Sacco}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {205--221}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1362064}, doi = {10.1080/01611194.2017.1362064}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bonavoglia18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen18, author = {Chris Christensen}, title = {Review of Code Breaking in the Pacific by Peter Donovan and John Mack}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {271--273}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1435206}, doi = {10.1080/01611194.2018.1435206}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen18a, author = {Chris Christensen}, title = {Review of The Mathematics of Secrets by Joshua Holden}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {274--277}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1435209}, doi = {10.1080/01611194.2018.1435209}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen18b, author = {Chris Christensen}, title = {Review of The New Codebreakers edited by P. Ryan, D. Naccache, and {J.-J.} Quisquater}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {278--283}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1435211}, doi = {10.1080/01611194.2018.1435211}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen18c, author = {Chris Christensen}, title = {Review of Working on the Dark Side of the Moon: Life Inside the National Security Agency by Thomas Reed Willemain}, journal = {Cryptologia}, volume = {42}, number = {4}, pages = {378--380}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1449148}, doi = {10.1080/01611194.2018.1449148}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen18c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen18d, author = {Chris Christensen}, title = {Review of Lorenz and comments on the work of William Tutte}, journal = {Cryptologia}, volume = {42}, number = {5}, pages = {445--466}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1435216}, doi = {10.1080/01611194.2018.1435216}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen18d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen18e, author = {Chris Christensen}, title = {Review of {A} Grand Gossip: The Bletchley Park Diary of Basil Cottle edited by James and Judith Hodsdon}, journal = {Cryptologia}, volume = {42}, number = {6}, pages = {540--543}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1449149}, doi = {10.1080/01611194.2018.1449149}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen18e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen18f, author = {Chris Christensen}, title = {Review of {TICOM:} The Hunt for Hitler's Codebreakers by Randy Rezabek}, journal = {Cryptologia}, volume = {42}, number = {6}, pages = {544--547}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1449150}, doi = {10.1080/01611194.2018.1449150}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen18f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Courtois18, author = {Nicolas T. Courtois}, title = {Decryption oracle slide attacks on {T-310}}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {191--204}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1362062}, doi = {10.1080/01611194.2017.1362062}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Courtois18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CourtoisDS18, author = {Nicolas T. Courtois and J{\"{o}}rg Drobick and Klaus Schmeh}, title = {Feistel ciphers in East Germany in the communist era}, journal = {Cryptologia}, volume = {42}, number = {5}, pages = {427--444}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1428835}, doi = {10.1080/01611194.2018.1428835}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CourtoisDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CourtoisO18, author = {Nicolas T. Courtois and Maria{-}Bristena Oprisanu}, title = {Ciphertext-only attacks and weak long-term keys in {T-310}}, journal = {Cryptologia}, volume = {42}, number = {4}, pages = {316--336}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1362065}, doi = {10.1080/01611194.2017.1362065}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CourtoisO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley18, author = {John F. Dooley}, title = {Review of {A} Mind at Play by Jimmy Soni and Rob Goodman}, journal = {Cryptologia}, volume = {42}, number = {2}, pages = {183--190}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1422052}, doi = {10.1080/01611194.2017.1422052}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine18, author = {Ralph Erskine}, title = {Review of The Hidden History of Bletchley Park: {A} Social and Organisational History, 1939-1945 by Christopher Smith}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {262--264}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1435208}, doi = {10.1080/01611194.2018.1435208}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Joyner18, author = {David Joyner}, title = {Review of {A} Life in Code by Stuart G. Smith and The Woman Who Smashed Codes by Jason Fagone}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {254--257}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1435215}, doi = {10.1080/01611194.2018.1435215}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Joyner18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KiralyT18, author = {Levente Zolt{\'{a}}n Kir{\'{a}}ly and G{\'{a}}bor Tokai}, title = {Cracking the code of the Rohonc Codex}, journal = {Cryptologia}, volume = {42}, number = {4}, pages = {285--315}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1449147}, doi = {10.1080/01611194.2018.1449147}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KiralyT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kuzuoglu18, author = {Ulug Kuzuoglu}, title = {Chinese cryptography: The Chinese Nationalist Party and intelligence management, 1927-1949}, journal = {Cryptologia}, volume = {42}, number = {6}, pages = {514--539}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1449146}, doi = {10.1080/01611194.2018.1449146}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kuzuoglu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryKW18, author = {George Lasry and Nils Kopal and Arno Wacker}, title = {Ciphertext-only cryptanalysis of short Hagelin {M-209} ciphertexts}, journal = {Cryptologia}, volume = {42}, number = {6}, pages = {485--513}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1428836}, doi = {10.1080/01611194.2018.1428836}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Marks18, author = {Philip Marks}, title = {Mr. Twinn's bombes}, journal = {Cryptologia}, volume = {42}, number = {1}, pages = {1--80}, year = {2018}, url = {https://doi.org/10.1080/01611194.2016.1257525}, doi = {10.1080/01611194.2016.1257525}, timestamp = {Tue, 06 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Marks18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/McDevittLG18, author = {Tim McDevitt and Jessica Lehr and Ting Gu}, title = {A parallel time-memory tradeoff attack on the Hill cipher}, journal = {Cryptologia}, volume = {42}, number = {5}, pages = {408--426}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1422051}, doi = {10.1080/01611194.2017.1422051}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/McDevittLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mishra18, author = {Dheerendra Mishra}, title = {Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security}, journal = {Cryptologia}, volume = {42}, number = {2}, pages = {146--175}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1325787}, doi = {10.1080/01611194.2017.1325787}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mishra18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MishraKPS18, author = {Prasanna Raghaw Mishra and Yogesh Kumar and N. Rajesh Pillai and Rajendra Kumar Sharma}, title = {On non-linearity and affine equivalence of permutations over an arbitrary finite commutative ring with unity}, journal = {Cryptologia}, volume = {42}, number = {1}, pages = {81--94}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1325788}, doi = {10.1080/01611194.2017.1325788}, timestamp = {Fri, 25 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MishraKPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MoufekG18, author = {Hamza Moufek and Kenza Guenda}, title = {A New variant of the McEliece cryptosystem based on the Smith form of convolutional codes}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {227--239}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1362061}, doi = {10.1080/01611194.2017.1362061}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MoufekG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Nedved18, author = {Gregory J. Nedved}, title = {The Sino-Japanese War of 1894-1895: Partially decrypted}, journal = {Cryptologia}, volume = {42}, number = {2}, pages = {95--105}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1385672}, doi = {10.1080/01611194.2017.1385672}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Nedved18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh18, author = {Klaus Schmeh}, title = {Review of the 3rd European Historical Ciphers Colloquium in Smolenice, Slovakia}, journal = {Cryptologia}, volume = {42}, number = {2}, pages = {176--182}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1422049}, doi = {10.1080/01611194.2017.1422049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh18a, author = {Klaus Schmeh}, title = {Review of The Voynich Manuscript by Raymond Clemens and The Voynich Manuscript: The world's most Mysterious and Esoteric Codex by Stephen Skinner}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {265--270}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1435196}, doi = {10.1080/01611194.2018.1435196}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Shaffer18, author = {Ryan Shaffer}, title = {Spies and signals intelligence in the early cold war}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {241--253}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1435213}, doi = {10.1080/01611194.2018.1435213}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Shaffer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ShermanDNOPSHT18, author = {Alan T. Sherman and David DeLatte and Michael Neary and Linda Oliva and Dhananjay S. Phatak and Travis Scheponik and Geoffrey L. Herman and Julia Thompson}, title = {Cybersecurity: Exploring core concepts through six scenarios}, journal = {Cryptologia}, volume = {42}, number = {4}, pages = {337--377}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1362063}, doi = {10.1080/01611194.2017.1362063}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ShermanDNOPSHT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Stallings18, author = {William Stallings}, title = {The offset codebook {(OCB)} block cipher mode of operation for authenticated encryption}, journal = {Cryptologia}, volume = {42}, number = {2}, pages = {135--145}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1422048}, doi = {10.1080/01611194.2017.1422048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Stallings18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Strasser18, author = {Gerhard F. Strasser}, title = {Review of Versteckte Botschaften. Die faszinierende Geschichte der Steganografie. 2., aktualisierte und erweiterte Auflage (Hidden Messages. The Fascinating Story of Steganography. 2nd, updated and expanded edition) by Klaus Schmeh}, journal = {Cryptologia}, volume = {42}, number = {5}, pages = {467--475}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1435207}, doi = {10.1080/01611194.2018.1435207}, timestamp = {Mon, 27 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Strasser18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Tomokiyo18, author = {Satoshi Tomokiyo}, title = {How {I} reconstructed a Spanish cipher from 1591}, journal = {Cryptologia}, volume = {42}, number = {6}, pages = {477--484}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1370038}, doi = {10.1080/01611194.2017.1370038}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Tomokiyo18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/VazquezJ18, author = {Manuel V{\'{a}}zquez and Paz Jim{\'{e}}nez{-}Seral}, title = {Recovering the military Enigma using permutations - filling in the details of Rejewski's solution}, journal = {Cryptologia}, volume = {42}, number = {2}, pages = {106--134}, year = {2018}, url = {https://doi.org/10.1080/01611194.2016.1257522}, doi = {10.1080/01611194.2016.1257522}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/VazquezJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wright18, author = {John Wright}, title = {Rejewski's equations: Solving for the entry permutation}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {222--226}, year = {2018}, url = {https://doi.org/10.1080/01611194.2017.1362066}, doi = {10.1080/01611194.2017.1362066}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wright18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X18, title = {Corrections to "Review of The Triumph of Zygalski's Sheets: The Polish Enigma in the Early 1940s, " 2017. Cryptologia 41(3): 283-285}, journal = {Cryptologia}, volume = {42}, number = {3}, pages = {240}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1435205}, doi = {10.1080/01611194.2018.1435205}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/X18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X18a, title = {Editorial Board {EOV}}, journal = {Cryptologia}, volume = {42}, number = {6}, year = {2018}, url = {https://doi.org/10.1080/01611194.2018.1472455}, doi = {10.1080/01611194.2018.1472455}, timestamp = {Fri, 28 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/X18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AgievichGIKST17, author = {Sergey Agievich and Anastasiya Gorodilova and Valeriya Idrisova and Nikolay Kolomeec and George Shushuev and Natalia N. Tokareva}, title = {Mathematical problems of the Second International Students' Olympiad in Cryptography}, journal = {Cryptologia}, volume = {41}, number = {6}, pages = {534--565}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1260666}, doi = {10.1080/01611194.2016.1260666}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AgievichGIKST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AlexanderGJPS17, author = {John Alexander and John Gallehawk and John Jackson and Allen Pearce and Edward Simpson}, title = {A German machine for differencing and testing additives}, journal = {Cryptologia}, volume = {41}, number = {3}, pages = {269--280}, year = {2017}, url = {https://doi.org/10.1080/01611194.2017.1289718}, doi = {10.1080/01611194.2017.1289718}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AlexanderGJPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BultelDLM17, author = {Xavier Bultel and Jannik Dreier and Pascal Lafourcade and Malika More}, title = {How to explain modern security concepts to your children}, journal = {Cryptologia}, volume = {41}, number = {5}, pages = {422--447}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1238422}, doi = {10.1080/01611194.2016.1238422}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BultelDLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury17, author = {Jan Bury}, title = {Lambda: {A} Cold War Polish line encryptor and the networks it served}, journal = {Cryptologia}, volume = {41}, number = {6}, pages = {512--533}, year = {2017}, url = {https://doi.org/10.1080/01611194.2017.1357983}, doi = {10.1080/01611194.2017.1357983}, timestamp = {Thu, 15 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17, author = {Chris Christensen}, title = {Review of The {SIGABA/ECM} {II} Cipher Machine: "A Beautiful Idea" by Timothy J. Mucklow}, journal = {Cryptologia}, volume = {41}, number = {1}, pages = {81--84}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236634}, doi = {10.1080/01611194.2016.1236634}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17a, author = {Chris Christensen}, title = {Review of The Neglected Giant: Agnes Meyer Driscoll by K. Johnson}, journal = {Cryptologia}, volume = {41}, number = {1}, pages = {85--89}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236643}, doi = {10.1080/01611194.2016.1236643}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17b, author = {Chris Christensen}, title = {Review of An Introduction to Number Theory with Cryptography by James S. Kraft and Lawrence Washington}, journal = {Cryptologia}, volume = {41}, number = {1}, pages = {90--91}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236629}, doi = {10.1080/01611194.2016.1236629}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17c, author = {Chris Christensen}, title = {Review of The Imitation Game}, journal = {Cryptologia}, volume = {41}, number = {2}, pages = {178--181}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236639}, doi = {10.1080/01611194.2016.1236639}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17d, author = {Chris Christensen}, title = {Review of Demystifying the Bombe by Dermot Turing}, journal = {Cryptologia}, volume = {41}, number = {2}, pages = {182--183}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236632}, doi = {10.1080/01611194.2016.1236632}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17e, author = {Chris Christensen}, title = {Review of The Mathematics of Encryption: An Elementary Introduction by M. Cozzens and S. Miller}, journal = {Cryptologia}, volume = {41}, number = {2}, pages = {190--194}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236642}, doi = {10.1080/01611194.2016.1236642}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17f, author = {Chris Christensen}, title = {A comment on a book review}, journal = {Cryptologia}, volume = {41}, number = {3}, pages = {281--282}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236627}, doi = {10.1080/01611194.2016.1236627}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17g, author = {Chris Christensen}, title = {Review of The Triumph of Zygalski's Sheets: The Polish Enigma in the Early 1940 by Zdzis{\l}aw J. Kapera}, journal = {Cryptologia}, volume = {41}, number = {3}, pages = {283--285}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236646}, doi = {10.1080/01611194.2016.1236646}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17h, author = {Chris Christensen}, title = {Review of {SIGINT:} The Secret History of Signals Intelligence 1914-1945 by Peter Matthews}, journal = {Cryptologia}, volume = {41}, number = {3}, pages = {286--287}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236637}, doi = {10.1080/01611194.2016.1236637}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17i, author = {Chris Christensen}, title = {Review of Bletchley Park: The Secret Archives by Sinclair McKay}, journal = {Cryptologia}, volume = {41}, number = {3}, pages = {288}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236644}, doi = {10.1080/01611194.2016.1236644}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17j, author = {Chris Christensen}, title = {The evolving relationship between mathematics and cryptology, 1951-1952: {SCAG} and the beginnings of {SCAMP} and {NSASAB}}, journal = {Cryptologia}, volume = {41}, number = {4}, pages = {329--387}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1219788}, doi = {10.1080/01611194.2016.1219788}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17k, author = {Chris Christensen}, title = {Review of Silence Means Security: Secrets of a {WWII} Code-Breaking {WAC} by B. Nicodemus}, journal = {Cryptologia}, volume = {41}, number = {5}, pages = {479--480}, year = {2017}, url = {https://doi.org/10.1080/01611194.2017.1326272}, doi = {10.1080/01611194.2017.1326272}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen17l, author = {Chris Christensen}, title = {Review of Code Warriors: NSA's Codebreakers and the Secret Intelligence War against the Soviet Union by S. Budiansky}, journal = {Cryptologia}, volume = {41}, number = {5}, pages = {481--484}, year = {2017}, url = {https://doi.org/10.1080/01611194.2017.1326794}, doi = {10.1080/01611194.2017.1326794}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen17l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/EchardG17, author = {Jean{-}Philippe {\'{E}}chard and Pierrick Gaudry}, title = {A harmonious encoding of instrument values by a nineteenth-century Parisian violin dealer}, journal = {Cryptologia}, volume = {41}, number = {5}, pages = {448--458}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1257524}, doi = {10.1080/01611194.2016.1257524}, timestamp = {Thu, 28 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/EchardG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ehme17, author = {Jeffrey Ehme}, title = {A joy to review: Two books about primes and factoring}, journal = {Cryptologia}, volume = {41}, number = {1}, pages = {97--100}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236625}, doi = {10.1080/01611194.2016.1236625}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ehme17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer17, author = {David H. Hamer}, title = {Review of The Secret World by Hugh Trevor-Roper}, journal = {Cryptologia}, volume = {41}, number = {2}, pages = {184--185}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236623}, doi = {10.1080/01611194.2016.1236623}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer17a, author = {David H. Hamer}, title = {Review of Solving Enigma's Secrets by John Jackson}, journal = {Cryptologia}, volume = {41}, number = {2}, pages = {186--189}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236619}, doi = {10.1080/01611194.2016.1236619}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HieuK17, author = {Duong Hieu Phan and Neal Koblitz}, title = {Cryptography during the French and American Wars in Vietnam}, journal = {Cryptologia}, volume = {41}, number = {6}, pages = {491--511}, year = {2017}, url = {https://doi.org/10.1080/01611194.2017.1292825}, doi = {10.1080/01611194.2017.1292825}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HieuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Landwehr17, author = {Dominik Landwehr}, title = {Review of Simpliciana: Schriften der Grimmelshausen Gesellschaft 2014}, journal = {Cryptologia}, volume = {41}, number = {1}, pages = {92--96}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1236628}, doi = {10.1080/01611194.2016.1236628}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Landwehr17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryNKW17, author = {George Lasry and Ingo Niebel and Nils Kopal and Arno Wacker}, title = {Deciphering {ADFGVX} messages from the Eastern Front of World War {I}}, journal = {Cryptologia}, volume = {41}, number = {2}, pages = {101--136}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1169461}, doi = {10.1080/01611194.2016.1169461}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryNKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MeyerV17, author = {Lauren De Meyer and Serge Vaudenay}, title = {{DES} S-box generator}, journal = {Cryptologia}, volume = {41}, number = {2}, pages = {153--171}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1169456}, doi = {10.1080/01611194.2016.1169456}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MeyerV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/OstwaldW17, author = {Olaf Ostwald and Frode Weierud}, title = {Modern breaking of Enigma ciphertexts}, journal = {Cryptologia}, volume = {41}, number = {5}, pages = {395--421}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1238423}, doi = {10.1080/01611194.2016.1238423}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/OstwaldW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/RuggT17, author = {Gordon Rugg and Gavin Taylor}, title = {Hoaxing statistical features of the Voynich Manuscript}, journal = {Cryptologia}, volume = {41}, number = {3}, pages = {247--268}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1206753}, doi = {10.1080/01611194.2016.1206753}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/RuggT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh17, author = {Klaus Schmeh}, title = {Review of the 15th {NSA} Cryptologic History Symposium}, journal = {Cryptologia}, volume = {41}, number = {1}, pages = {73--80}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1169460}, doi = {10.1080/01611194.2016.1169460}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh17a, author = {Klaus Schmeh}, title = {Review of the 2nd Historical Ciphers Colloquium in Kassel, Germany}, journal = {Cryptologia}, volume = {41}, number = {2}, pages = {172--177}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1219787}, doi = {10.1080/01611194.2016.1219787}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh17b, author = {Klaus Schmeh}, title = {Review of Unsolved: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies by Craig Bauer}, journal = {Cryptologia}, volume = {41}, number = {5}, pages = {485--490}, year = {2017}, url = {https://doi.org/10.1080/01611194.2017.1346339}, doi = {10.1080/01611194.2017.1346339}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sherman17, author = {David Sherman}, title = {The National Security Agency and the William F. Friedman Collection}, journal = {Cryptologia}, volume = {41}, number = {3}, pages = {195--238}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1169458}, doi = {10.1080/01611194.2016.1169458}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sherman17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ShermanSKN17, author = {Alan T. Sherman and John Seymour and Akshayraj Kore and William Newton}, title = {Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario}, journal = {Cryptologia}, volume = {41}, number = {1}, pages = {29--54}, year = {2017}, url = {https://doi.org/10.1080/01611194.2015.1135487}, doi = {10.1080/01611194.2015.1135487}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ShermanSKN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smith17, author = {G. Stuart Smith}, title = {Elizebeth Friedman's security and career concerns prior to World War {II}}, journal = {Cryptologia}, volume = {41}, number = {3}, pages = {239--246}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1257523}, doi = {10.1080/01611194.2016.1257523}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Smith17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smoot17, author = {Betsy Rohaly Smoot}, title = {National Security Agency releases Army Security Agency histories covering 1945-1963}, journal = {Cryptologia}, volume = {41}, number = {5}, pages = {476--478}, year = {2017}, url = {https://doi.org/10.1080/01611194.2017.1325789}, doi = {10.1080/01611194.2017.1325789}, timestamp = {Thu, 28 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Smoot17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Stallings17, author = {William Stallings}, title = {Format-preserving encryption: Overview and {NIST} specification}, journal = {Cryptologia}, volume = {41}, number = {2}, pages = {137--152}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1169457}, doi = {10.1080/01611194.2016.1169457}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Stallings17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Varga17, author = {Charles Varga}, title = {Is Zendia the Isle of Pines?}, journal = {Cryptologia}, volume = {41}, number = {4}, pages = {388--394}, year = {2017}, url = {https://doi.org/10.1080/01611194.2017.1327698}, doi = {10.1080/01611194.2017.1327698}, timestamp = {Tue, 18 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Varga17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/VobbilisettyTLV17, author = {Rohit Vobbilisetty and Fabio Di Troia and Richard M. Low and Corrado Aaron Visaggio and Mark Stamp}, title = {Classic cryptanalysis using hidden Markov models}, journal = {Cryptologia}, volume = {41}, number = {1}, pages = {1--28}, year = {2017}, url = {https://doi.org/10.1080/01611194.2015.1126660}, doi = {10.1080/01611194.2015.1126660}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/VobbilisettyTLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wieczorek17, author = {Rafal Wieczorek}, title = {Putative duplication glyph in the rongorongo script}, journal = {Cryptologia}, volume = {41}, number = {1}, pages = {55--72}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1196052}, doi = {10.1080/01611194.2016.1196052}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wieczorek17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/WolfG17, author = {Gunnar E. Wolf and Gina Gallegos{-}Garc{\'{\i}}a}, title = {Strengthening a curated web of trust in a geographically distributed project}, journal = {Cryptologia}, volume = {41}, number = {5}, pages = {459--475}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1238421}, doi = {10.1080/01611194.2016.1238421}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/WolfG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wright17, author = {John Wright}, title = {The Turing Bombe Victory and the first naval Enigma decrypts}, journal = {Cryptologia}, volume = {41}, number = {4}, pages = {295--328}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1219786}, doi = {10.1080/01611194.2016.1219786}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Wright17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X17, title = {David Hamer, family man and enigma expert, remembered and missed}, journal = {Cryptologia}, volume = {41}, number = {4}, pages = {289--294}, year = {2017}, url = {https://doi.org/10.1080/01611194.2017.1343556}, doi = {10.1080/01611194.2017.1343556}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/X17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X17a, title = {Editorial Board {EOV}}, journal = {Cryptologia}, volume = {41}, number = {6}, year = {2017}, url = {https://doi.org/10.1080/01611194.2017.1403537}, doi = {10.1080/01611194.2017.1403537}, timestamp = {Tue, 06 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/X17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer16, author = {Craig Bauer}, title = {Review of \emph{Unveiling the Mystic Ciphers} by Dave Ramsden}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {399--401}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1159476}, doi = {10.1080/01611194.2016.1159476}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BauerLM16, author = {Craig Bauer and Gregory Link and Dante Molle}, title = {James Sanborn's Kryptos and the matrix encryption conjecture}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {541--552}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1141556}, doi = {10.1080/01611194.2016.1141556}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/BauerLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Boklan16, author = {Kent D. Boklan}, title = {How {I} deciphered a Robert E. Lee letter - and a note on the power of context in short polyalphabetic ciphers}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {406--410}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1170424}, doi = {10.1080/01611194.2016.1170424}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Boklan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BonavogliaP16, author = {Paolo Bonavoglia and Consolato Pellegrino}, title = {The last poem of Pietro Giannone - finally decrypted}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {411--427}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1087072}, doi = {10.1080/01611194.2015.1087072}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BonavogliaP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury16, author = {Jan Bury}, title = {Operation "Zachod": Sex, lies, and ciphers}, journal = {Cryptologia}, volume = {40}, number = {2}, pages = {113--140}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1113830}, doi = {10.1080/01611194.2015.1113830}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen16, author = {Chris Christensen}, title = {A review of three books about the women of Bletchley Park}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {469--476}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1159477}, doi = {10.1080/01611194.2016.1159477}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen16a, author = {Chris Christensen}, title = {Companion review of Prof: Alan Turing Decoded by Dermot Turing}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {556--562}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1236633}, doi = {10.1080/01611194.2016.1236633}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen16b, author = {Chris Christensen}, title = {Review of Codes, Ciphers and Spies: Tales of Military Intelligence in World War {I} by John F. Dooley}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {563--566}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1236631}, doi = {10.1080/01611194.2016.1236631}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen16c, author = {Chris Christensen}, title = {Review of {U.S.} Navy Codebreakers, Linguists, and Intelligence Officers against Japan, 1910-1941 by Steven E. Maffeo}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {567--569}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1236648}, doi = {10.1080/01611194.2016.1236648}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley16, author = {John F. Dooley}, title = {Review of \emph{Prisoners, Lovers, {\&} Spies} by Kristie Macrakis}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {107--112}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028684}, doi = {10.1080/01611194.2015.1028684}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/FuensantaP16, author = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and Vicente Guasch Portas}, title = {States by secrecy: Cryptography and guerrillas in the Spanish Civil War}, journal = {Cryptologia}, volume = {40}, number = {2}, pages = {203--214}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028687}, doi = {10.1080/01611194.2015.1028687}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/FuensantaP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Girard16, author = {Daniel J. Girard}, title = {Breaking "\emph{Tirpitz}": Cryptanalysis of the Japanese-German joint naval cipher}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {428--451}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1087073}, doi = {10.1080/01611194.2015.1087073}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Girard16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GoodmanD16, author = {Michael Goodman and Huw Dylan}, title = {British Intelligence and the Fear of a Soviet Attack on Allied Communications}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {15--32}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028686}, doi = {10.1080/01611194.2015.1028686}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/GoodmanD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer16, author = {David H. Hamer}, title = {Review of Prof: Alan Turing Decoded by Dermot Turing}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {553--555}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1236620}, doi = {10.1080/01611194.2016.1236620}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hoffman16, author = {Nick Hoffman}, title = {Review of \emph{Intercept: The Secret History of Computers and Spies} by Gordon Corera}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {477--480}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1129186}, doi = {10.1080/01611194.2015.1129186}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hoffman16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HwangG16, author = {Tzonelih Hwang and Prosanta Gope}, title = {{RT-OCFB:} Real-Time Based Optimized Cipher Feedback Mode}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {1--14}, year = {2016}, url = {https://doi.org/10.1080/01611194.2014.988366}, doi = {10.1080/01611194.2014.988366}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HwangG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HwangG16a, author = {Tzonelih Hwang and Prosanta Gope}, title = {PFC-CTR, {PFC-OCB:} Efficient stream cipher modes of authencryption}, journal = {Cryptologia}, volume = {40}, number = {3}, pages = {285--302}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1055386}, doi = {10.1080/01611194.2015.1055386}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HwangG16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak16, author = {Subhash C. Kak}, title = {Simulating entanglement in classical computing for cryptographic applications}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {348--354}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1084959}, doi = {10.1080/01611194.2015.1084959}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KepleyRS16, author = {Shane Kepley and David Russo and Rainer Steinwandt}, title = {Cryptanalysis of a modern rotor machine in a multicast setting}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {515--521}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1115443}, doi = {10.1080/01611194.2015.1115443}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KepleyRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kollar16, author = {Jozef Koll{\'{a}}r}, title = {Soviet {VIC} Cipher: No Respector of Kerckoff's Principles}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {33--48}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028679}, doi = {10.1080/01611194.2015.1028679}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kollar16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryKW16, author = {George Lasry and Nils Kopal and Arno Wacker}, title = {Automated Known-Plaintext Cryptanalysis of Short Hagelin {M-209} Messages}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {49--69}, year = {2016}, url = {https://doi.org/10.1080/01611194.2014.988370}, doi = {10.1080/01611194.2014.988370}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryKW16a, author = {George Lasry and Nils Kopal and Arno Wacker}, title = {Ciphertext-only cryptanalysis of Hagelin {M-209} pins and lugs}, journal = {Cryptologia}, volume = {40}, number = {2}, pages = {141--176}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028683}, doi = {10.1080/01611194.2015.1028683}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryKW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryKW16b, author = {George Lasry and Nils Kopal and Arno Wacker}, title = {Cryptanalysis of columnar transposition cipher with long keys}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {374--398}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1087074}, doi = {10.1080/01611194.2015.1087074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryKW16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryRKW16, author = {George Lasry and Moshe Rubin and Nils Kopal and Arno Wacker}, title = {Cryptanalysis of Chaocipher and solution of Exhibit 6}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {487--514}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1091797}, doi = {10.1080/01611194.2015.1091797}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryRKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LeapMNS16, author = {Tom Leap and Tim McDevitt and Kayla Novak and Nicolette Siermine}, title = {Further improvements to the Bauer-Millward attack on the Hill cipher}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {452--468}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1087075}, doi = {10.1080/01611194.2015.1087075}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LeapMNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LoebenbergerN16, author = {Daniel Loebenberger and Michael N{\"{u}}sken}, title = {Design principles of DES-like ciphers: {A} historical overview}, journal = {Cryptologia}, volume = {40}, number = {3}, pages = {221--239}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028681}, doi = {10.1080/01611194.2015.1028681}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LoebenbergerN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Narvaez16, author = {Roberto Narv{\'{a}}ez}, title = {On the cryptography of James Leander Cathcart {(1767-1843)}}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {316--326}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1055388}, doi = {10.1080/01611194.2015.1055388}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Narvaez16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/OstwaldW16, author = {Olaf Ostwald and Frode Weierud}, title = {History and Modern Cryptanalysis of Enigma's Pluggable Reflector}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {70--91}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028682}, doi = {10.1080/01611194.2015.1028682}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/OstwaldW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Pommerening16, author = {Klaus Pommerening}, title = {Cryptanalysis of nonlinear feedback shift registers}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {303--315}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1055385}, doi = {10.1080/01611194.2015.1055385}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Pommerening16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Samuels16, author = {Martin Samuels}, title = {Ludwig F{\"{o}}ppl: {A} Bavarian cryptanalyst on the Western front}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {355--373}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1084960}, doi = {10.1080/01611194.2015.1084960}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Samuels16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SanguinoLPEN16, author = {Luis Alberto Benthin Sanguino and Gregor Leander and Christof Paar and Bernhard Esslinger and Ingo Niebel}, title = {Analyzing the Spanish strip cipher by combining combinatorial and statistical methods}, journal = {Cryptologia}, volume = {40}, number = {3}, pages = {261--284}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1050332}, doi = {10.1080/01611194.2015.1050332}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SanguinoLPEN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smoot16, author = {Betsy Rohaly Smoot}, title = {Call for papers: 2017 Symposium on Cryptologic History}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {484--485}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1199447}, doi = {10.1080/01611194.2016.1199447}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Smoot16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SmootH16, author = {Betsy Rohaly Smoot and David A. Hatch}, title = {Ann Zeilinger Caracristi {(1} February 1921-10 January 2016)}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {403--405}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1169459}, doi = {10.1080/01611194.2016.1169459}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SmootH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Strasser16, author = {Gerhard F. Strasser}, title = {Samuel Zimmermann's \emph{Gehaimnussen}: The earliest cryptological book in German}, journal = {Cryptologia}, volume = {40}, number = {3}, pages = {240--260}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1093898}, doi = {10.1080/01611194.2015.1093898}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Strasser16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Thimbleby16, author = {Harold Thimbleby}, title = {Human factors and missed solutions to Enigma design weaknesses}, journal = {Cryptologia}, volume = {40}, number = {2}, pages = {177--202}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028680}, doi = {10.1080/01611194.2015.1028680}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Thimbleby16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Visco16, author = {David Visco}, title = {Somerton Man times two}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {481--483}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1135649}, doi = {10.1080/01611194.2015.1135649}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Visco16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wik16, author = {Anders Wik}, title = {Enigma {Z30} retrieved}, journal = {Cryptologia}, volume = {40}, number = {3}, pages = {215--220}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1055387}, doi = {10.1080/01611194.2015.1055387}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Wik16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wright16, author = {John Wright}, title = {Rejewski's Test Message as a Crib}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {92--106}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028685}, doi = {10.1080/01611194.2015.1028685}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wright16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wright16a, author = {John Wright}, title = {A recursive solution for Turing's {H-M} factor}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {327--347}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1062318}, doi = {10.1080/01611194.2015.1062318}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wright16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/YuZ16, author = {Qian Yu and Chang N. Zhang}, title = {A new and fast cryptographic hash function based on {RC4}}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {522--540}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1135486}, doi = {10.1080/01611194.2015.1135486}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/YuZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Anderson15, author = {Jeanne Anderson}, title = {Kaczynski's Ciphers}, journal = {Cryptologia}, volume = {39}, number = {3}, pages = {203--209}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.988368}, doi = {10.1080/01611194.2014.988368}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Anderson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AntalZ15, author = {Eugen Antal and Pavol Zajac}, title = {Key Space and Period of Fialka {M-125} Cipher Machine}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {126--144}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915264}, doi = {10.1080/01611194.2014.915264}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AntalZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BabinkostovaBKW15, author = {Liljana Babinkostova and Alyssa M. Bowden and Andrew M. Kimball and Kameryn J. Williams}, title = {A Simplified and Generalized Treatment of DES-Related Ciphers}, journal = {Cryptologia}, volume = {39}, number = {1}, pages = {3--24}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915255}, doi = {10.1080/01611194.2014.915255}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BabinkostovaBKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BarrS15, author = {Thomas H. Barr and Andrew J. Simoson}, title = {Twisting the Keyword Length from a Vigen{\`{e}}re Cipher}, journal = {Cryptologia}, volume = {39}, number = {4}, pages = {335--341}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.988365}, doi = {10.1080/01611194.2014.988365}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BarrS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer15, author = {Craig Bauer}, title = {Friedman Auditorium Times Two}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {173--177}, year = {2015}, url = {https://doi.org/10.1080/01611194.2015.1009747}, doi = {10.1080/01611194.2015.1009747}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen15, author = {Chris Christensen}, title = {Review of \emph{The Lost World of Bletchley Park} by Sinclair Mckay}, journal = {Cryptologia}, volume = {39}, number = {1}, pages = {99--100}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915689}, doi = {10.1080/01611194.2014.915689}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen15a, author = {Chris Christensen}, title = {Review of {IEEE} Milestone Award to the Polish Cipher Bureau for "The First Breaking of Enigma Code"}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {178--193}, year = {2015}, url = {https://doi.org/10.1080/01611194.2015.1009751}, doi = {10.1080/01611194.2015.1009751}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen15b, author = {Chris Christensen}, title = {Review of \emph{Marian Rejewski: The Man Who Defeated Enigma} by Zdzis{\l}aw J. Kapera}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {194--197}, year = {2015}, url = {https://doi.org/10.1080/01611194.2015.1009753}, doi = {10.1080/01611194.2015.1009753}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen15c, author = {Chris Christensen}, title = {Review of \emph{Alan Turing: His Work and Impact} Edited by S. Barry Cooper and Jan van Leeuwen}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {198--202}, year = {2015}, url = {https://doi.org/10.1080/01611194.2015.1009754}, doi = {10.1080/01611194.2015.1009754}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen15d, author = {Chris Christensen}, title = {Review of \emph{Blackett's War} by Stephen Budiansky}, journal = {Cryptologia}, volume = {39}, number = {3}, pages = {288--290}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915691}, doi = {10.1080/01611194.2014.915691}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen15e, author = {Chris Christensen}, title = {Review of \emph{Act of War: Lyndon Johnson, North Korea, and the Capture of the Spy Ship Pueblo} by Jack Cheevers}, journal = {Cryptologia}, volume = {39}, number = {4}, pages = {362--372}, year = {2015}, url = {https://doi.org/10.1080/01611194.2015.1009756}, doi = {10.1080/01611194.2015.1009756}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen15e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen15f, author = {Chris Christensen}, title = {Review of \emph{The Riddle of the Labyrinth} by Margalit Fox}, journal = {Cryptologia}, volume = {39}, number = {4}, pages = {373--375}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915693}, doi = {10.1080/01611194.2014.915693}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen15f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChristensenA15, author = {Chris Christensen and Jared Antrobus}, title = {The Story of Mamba: Aligning Messages Against Recovered Additives}, journal = {Cryptologia}, volume = {39}, number = {3}, pages = {210--243}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.988364}, doi = {10.1080/01611194.2014.988364}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChristensenA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CiunguK15, author = {Lavinia Corina Ciungu and David Kahn}, title = {A Historical Survey of Romanian Intelligence}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {105--120}, year = {2015}, url = {https://doi.org/10.1080/01611194.2015.1009746}, doi = {10.1080/01611194.2015.1009746}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CiunguK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Courtois15, author = {Nicolas T. Courtois}, title = {On Multiple Symmetric Fixed Points in {GOST}}, journal = {Cryptologia}, volume = {39}, number = {4}, pages = {322--334}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.988362}, doi = {10.1080/01611194.2014.988362}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Courtois15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CourtoisMMQS15, author = {Nicolas T. Courtois and Theodosis Mourouzis and Michal Misztal and Jean{-}Jacques Quisquater and Guangyan Song}, title = {Can {GOST} Be Made Secure Against Differential Cryptanalysis?}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {145--156}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915266}, doi = {10.1080/01611194.2014.915266}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CourtoisMMQS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley15, author = {John F. Dooley}, title = {Review of \emph{George Fabyan} by Richard Munson}, journal = {Cryptologia}, volume = {39}, number = {1}, pages = {92--98}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.974785}, doi = {10.1080/01611194.2014.974785}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GuGXC15, author = {Haihua Gu and Dawu Gu and WenLu Xie and Ray C. C. Cheung}, title = {Efficient Pairing Computation on Huff Curves}, journal = {Cryptologia}, volume = {39}, number = {3}, pages = {270--275}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915259}, doi = {10.1080/01611194.2014.915259}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GuGXC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer15, author = {David H. Hamer}, title = {Review of \emph{Gordon Welchman: Bletchley Park's Architect of Ultra Intelligence} by Joel Greenberg}, journal = {Cryptologia}, volume = {39}, number = {1}, pages = {101--103}, year = {2015}, url = {https://doi.org/10.1080/01611194.2015.982933}, doi = {10.1080/01611194.2015.982933}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Horng15, author = {Gwoboa Horng}, title = {Accelerating {DSA} Signature Generation}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {121--125}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915262}, doi = {10.1080/01611194.2014.915262}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Horng15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Konheim15, author = {Alan G. Konheim}, title = {The Impetus to Creativity in Technology}, journal = {Cryptologia}, volume = {39}, number = {4}, pages = {291--314}, year = {2015}, url = {https://doi.org/10.1080/01611194.2015.1044816}, doi = {10.1080/01611194.2015.1044816}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Konheim15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lang15, author = {Benedek L{\'{a}}ng}, title = {Shame, Love, and Alcohol: Private Ciphers in Early Modern Hungary}, journal = {Cryptologia}, volume = {39}, number = {3}, pages = {276--287}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915270}, doi = {10.1080/01611194.2014.915270}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Lang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Leeuw15, author = {Karl de Leeuw}, title = {J. F. W. Nuboer and the Reintroduction of Machine Cryptography by the Royal Netherlands Navy, 1915-1940}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {157--172}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915268}, doi = {10.1080/01611194.2014.915268}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Leeuw15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Marks15, author = {Philip Marks}, title = {Enigma Wiring Data: Interpreting Allied Conventions from World War {II}}, journal = {Cryptologia}, volume = {39}, number = {1}, pages = {25--65}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915263}, doi = {10.1080/01611194.2014.915263}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Marks15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MartinezED15, author = {Victor Gayoso Mart{\'{\i}}nez and Luis Hern{\'{a}}ndez Encinas and A. Queiruga Dios}, title = {Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme}, journal = {Cryptologia}, volume = {39}, number = {3}, pages = {244--269}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.988363}, doi = {10.1080/01611194.2014.988363}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MartinezED15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Narvaez15, author = {Roberto Narv{\'{a}}ez}, title = {Some Diplomatic Ciphers of the First Mexican Federal Republic {(1824-1830)}}, journal = {Cryptologia}, volume = {39}, number = {1}, pages = {66--83}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915267}, doi = {10.1080/01611194.2014.915267}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Narvaez15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh15, author = {Klaus Schmeh}, title = {Second Charlotte International Cryptologic Symposium}, journal = {Cryptologia}, volume = {39}, number = {1}, pages = {84--91}, year = {2015}, url = {https://doi.org/10.1080/01611194.2015.974410}, doi = {10.1080/01611194.2015.974410}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh15a, author = {Klaus Schmeh}, title = {Encrypted Books: Mysteries that Fill Hundreds of Pages}, journal = {Cryptologia}, volume = {39}, number = {4}, pages = {342--361}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.988369}, doi = {10.1080/01611194.2014.988369}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smoot15, author = {Betsy Rohaly Smoot}, title = {{NSA} Release and Transfer of Records Related to William F. Friedman}, journal = {Cryptologia}, volume = {39}, number = {1}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.1080/01611194.2015.974404}, doi = {10.1080/01611194.2015.974404}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Smoot15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smoot15a, author = {Betsy Rohaly Smoot}, title = {Parker Hitt's First Cylinder Device and the Genesis of {U.S.} Army Cylinder and Strip Devices}, journal = {Cryptologia}, volume = {39}, number = {4}, pages = {315--321}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.988371}, doi = {10.1080/01611194.2014.988371}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Smoot15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BertoniDPA14, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {The Making of {KECCAK}}, journal = {Cryptologia}, volume = {38}, number = {1}, pages = {26--60}, year = {2014}, url = {https://doi.org/10.1080/01611194.2013.856818}, doi = {10.1080/01611194.2013.856818}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/BertoniDPA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Boklan14, author = {Kent D. Boklan}, title = {How {I} Decrypted a Confederate Diary - And the Question of the Race of Mrs. Jefferson Davis}, journal = {Cryptologia}, volume = {38}, number = {4}, pages = {333--347}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.942143}, doi = {10.1080/01611194.2014.942143}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Boklan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury14, author = {Jan Bury}, title = {Pinpointing the Mark: On the Cold War {SIGINT} Capability}, journal = {Cryptologia}, volume = {38}, number = {2}, pages = {147--151}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.885802}, doi = {10.1080/01611194.2014.885802}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CalofHR14, author = {Jeff Calof and Jeff Hill and Moshe Rubin}, title = {Chaocipher Exhibit 5: History, Analysis, and Solution of \emph{Cryptologia}'s 1990 Challenge}, journal = {Cryptologia}, volume = {38}, number = {1}, pages = {1--25}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.856653}, doi = {10.1080/01611194.2014.856653}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CalofHR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChangLS14, author = {Kelly Chang and Richard M. Low and Mark Stamp}, title = {Cryptanalysis of Typex}, journal = {Cryptologia}, volume = {38}, number = {2}, pages = {116--132}, year = {2014}, url = {https://doi.org/10.1080/01611194.2013.797051}, doi = {10.1080/01611194.2013.797051}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChangLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen14, author = {Chris Christensen}, title = {The National Cash Register Company Additive Recovery Machine}, journal = {Cryptologia}, volume = {38}, number = {2}, pages = {152--177}, year = {2014}, url = {https://doi.org/10.1080/01611194.2013.797050}, doi = {10.1080/01611194.2013.797050}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen14a, author = {Chris Christensen}, title = {Review of \emph{Secret History: The Story of Cryptology} by Craig P. Bauer}, journal = {Cryptologia}, volume = {38}, number = {2}, pages = {192--193}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.885805}, doi = {10.1080/01611194.2014.885805}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen14b, author = {Chris Christensen}, title = {Review of the 2013 Cryptologic History Symposium, \emph{Technological Change and Cryptology: Meeting the Historical Challenge}}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {276--281}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915682}, doi = {10.1080/01611194.2014.915682}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen14c, author = {Chris Christensen}, title = {Review of \emph{A Brief History of Cryptology and Cryptographic Algorithms} by John F. Dooley}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {285--286}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915686}, doi = {10.1080/01611194.2014.915686}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen14c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen14d, author = {Chris Christensen}, title = {Review of \emph{The History of Traffic Analysis: World War {I} - Vietnam} by Donald A. Borrmann et al}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {287--290}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915687}, doi = {10.1080/01611194.2014.915687}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen14d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen14e, author = {Chris Christensen}, title = {Review of \emph{Bletchley Park: The Code-Breakers of Station X} by Michael Smith}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {291--292}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915688}, doi = {10.1080/01611194.2014.915688}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen14e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen14f, author = {Chris Christensen}, title = {Lester Hill Revisited}, journal = {Cryptologia}, volume = {38}, number = {4}, pages = {293--332}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915260}, doi = {10.1080/01611194.2014.915260}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen14f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Courtois14, author = {Nicolas T. Courtois}, title = {Cryptanalysis of Two {GOST} Variants with 128-Bit Keys}, journal = {Cryptologia}, volume = {38}, number = {4}, pages = {348--361}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915706}, doi = {10.1080/01611194.2014.915706}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Courtois14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley14, author = {John F. Dooley}, title = {Review of \emph{Inferno} by Dan Brown}, journal = {Cryptologia}, volume = {38}, number = {1}, pages = {89--92}, year = {2014}, url = {https://doi.org/10.1080/01611194.2013.856820}, doi = {10.1080/01611194.2013.856820}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley14a, author = {John F. Dooley}, title = {Review of \emph{Mr. Penumbra's 24-Hour Bookstore} by Robin Sloan}, journal = {Cryptologia}, volume = {38}, number = {1}, pages = {93--95}, year = {2014}, url = {https://doi.org/10.1080/01611194.2013.856819}, doi = {10.1080/01611194.2013.856819}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DooleyK14, author = {John F. Dooley and Elizabeth Anne King}, title = {John Matthews Manly: The \emph{Collier's} Articles}, journal = {Cryptologia}, volume = {38}, number = {1}, pages = {77--88}, year = {2014}, url = {https://doi.org/10.1080/01611194.2013.797049}, doi = {10.1080/01611194.2013.797049}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DooleyK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Grey14, author = {Christopher Grey}, title = {From the Archives: Colonel Butler's Satire of Bletchley Park}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {266--275}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915258}, doi = {10.1080/01611194.2014.915258}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Grey14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer14, author = {David H. Hamer}, title = {Review of \emph{D{\"{o}}nitz, U-Boats, Convoys} by Jak P. Mallmann Showell}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {282--284}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915684}, doi = {10.1080/01611194.2014.915684}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/JungY14, author = {Ki{-}Hyun Jung and Kee{-}Young Yoo}, title = {Three-Directional Data Hiding Method for Digital Images}, journal = {Cryptologia}, volume = {38}, number = {2}, pages = {178--191}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.885817}, doi = {10.1080/01611194.2014.885817}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/JungY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn14, author = {David Kahn}, title = {The Naval Intercept Station at Bainbridge Island, Washington}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {244--247}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915677}, doi = {10.1080/01611194.2014.915677}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KakP14, author = {Subhash C. Kak and Monisha Prabhu}, title = {Cryptographic Applications of Primitive Pythagorean Triples}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {215--222}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915257}, doi = {10.1080/01611194.2014.915257}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KakP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Koss14, author = {Lorelei Koss}, title = {Writing and Information Literacy in a Cryptology First-Year Seminar}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {223--231}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915256}, doi = {10.1080/01611194.2014.915256}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Koss14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryKW14, author = {George Lasry and Nils Kopal and Arno Wacker}, title = {Solving the Double Transposition Challenge with a Divide-and-Conquer Approach}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {197--214}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915269}, doi = {10.1080/01611194.2014.915269}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ListG14, author = {David List and John Gallehawk}, title = {Revelation for Cilli's}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {248--265}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.891398}, doi = {10.1080/01611194.2014.891398}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ListG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rescher14, author = {Nicholas Rescher}, title = {Leibniz's \emph{Machina Deciphratoria}: {A} Seventeenth-Century Proto-Enigma}, journal = {Cryptologia}, volume = {38}, number = {2}, pages = {103--115}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.885789}, doi = {10.1080/01611194.2014.885789}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rescher14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rezabek14, author = {Randy Rezabek}, title = {The Russian Fish with Caviar}, journal = {Cryptologia}, volume = {38}, number = {1}, pages = {61--76}, year = {2014}, url = {https://doi.org/10.1080/01611194.2013.797046}, doi = {10.1080/01611194.2013.797046}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Rezabek14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rocca14, author = {Charles F. Rocca Jr.}, title = {Mathematics in the History of Cryptography}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {232--243}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915254}, doi = {10.1080/01611194.2014.915254}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rocca14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rojas14, author = {Ra{\'{u}}l Rojas}, title = {Konrad Zuse's Proposal for a Cipher Machine}, journal = {Cryptologia}, volume = {38}, number = {4}, pages = {362--369}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915265}, doi = {10.1080/01611194.2014.915265}, timestamp = {Mon, 23 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Rojas14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schwartz14, author = {Kathryn A. Schwartz}, title = {From Text to Technological Context: Medieval Arabic Cryptology's Relation to Paper, Numbers, and the Post}, journal = {Cryptologia}, volume = {38}, number = {2}, pages = {133--146}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.885801}, doi = {10.1080/01611194.2014.885801}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schwartz14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smoot14, author = {Betsy Rohaly Smoot}, title = {Review of \emph{World War {I} and the Origins of {U.S.} Military Intelligence} by James L. Gilbert}, journal = {Cryptologia}, volume = {38}, number = {2}, pages = {194--196}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.885806}, doi = {10.1080/01611194.2014.885806}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Smoot14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Strasser14, author = {Gerhard F. Strasser}, title = {Review of \emph{Mechanisches Memorieren und Chiffrieren um 1430}: \emph{Johannes Fontanas Tractatus de instrumentis artis memorie} by Horst Kranz and Walter Oberschelp}, journal = {Cryptologia}, volume = {38}, number = {1}, pages = {96--101}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.857884}, doi = {10.1080/01611194.2014.857884}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Strasser14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/WangD14, author = {Qinglong Wang and Jintai Ding}, title = {Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol}, journal = {Cryptologia}, volume = {38}, number = {4}, pages = {370--376}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915261}, doi = {10.1080/01611194.2014.915261}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/WangD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AlexanderCWMG13, author = {John Alexander and Kevin Coleman and David White and Nick Miers and John Gallehawk}, title = {Whittingham-Collingwood Cipher Machine}, journal = {Cryptologia}, volume = {37}, number = {4}, pages = {289--304}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.798523}, doi = {10.1080/01611194.2013.798523}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AlexanderCWMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Anderson13, author = {Jeanne Anderson}, title = {Breaking the {BTK} Killer's Cipher}, journal = {Cryptologia}, volume = {37}, number = {3}, pages = {204--209}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.797047}, doi = {10.1080/01611194.2013.797047}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Anderson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AziziA13, author = {Abdelmalek Azizi and Mostafa Azizi}, title = {Instances of Arabic Cryptography in Morocco {II}}, journal = {Cryptologia}, volume = {37}, number = {4}, pages = {328--337}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.797042}, doi = {10.1080/01611194.2013.797042}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AziziA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CampbellGS13, author = {Samantha Campbell and Max Grinchenko and William Smith}, title = {Linear Cryptanalysis of Simplified {AES} Under Change of S-Box}, journal = {Cryptologia}, volume = {37}, number = {2}, pages = {120--138}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.660236}, doi = {10.1080/01611194.2012.660236}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CampbellGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CamposGLF13, author = {Fco. Alberto Campos and Alberto Gasc{\'{o}}n and Jes{\'{u}}s Mar{\'{\i}}a Latorre and Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta}, title = {Genetic Algorithms and Mathematical Programming to Crack the Spanish Strip Cipher}, journal = {Cryptologia}, volume = {37}, number = {1}, pages = {51--68}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.660235}, doi = {10.1080/01611194.2012.660235}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CamposGLF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen13, author = {Chris Christensen}, title = {Review of \emph{Secret Postings: Bletchley Park to the Pentagon} by Charlott WebbBook Tower Publishing, Redditch, Worcestershire, UK, 2011, 72 pages, Paperback, {\textsterling}6.99. {ISBN} 978-0-9557164-1-6}, journal = {Cryptologia}, volume = {37}, number = {1}, pages = {99--101}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.689598}, doi = {10.1080/01611194.2012.689598}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen13a, author = {Chris Christensen}, title = {Review of \emph{Introduction to Cryptography with Mathematical Foundations and Computer Implementation} by Alexander StanoyevitchChapman and Hall/CRC, Boca Raton, FL, 2010, 699 pages, Hardcover, {\textdollar}89.95. {ISBN} 1439817634}, journal = {Cryptologia}, volume = {37}, number = {1}, pages = {102--104}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.689599}, doi = {10.1080/01611194.2012.689599}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen13b, author = {Chris Christensen}, title = {Announcement of the 2013 Cryptologic History Symposium "Technological Change and Cryptology: Meeting the Historical Challenges" 17-18 October 2013}, journal = {Cryptologia}, volume = {37}, number = {2}, pages = {105--106}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.767671}, doi = {10.1080/01611194.2013.767671}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen13c, author = {Chris Christensen}, title = {Review of \emph{Memories of My Work at the Cipher Bureau of the General Staff Second Department 1930-1945} by Marian Rejewski}, journal = {Cryptologia}, volume = {37}, number = {2}, pages = {167--174}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.767678}, doi = {10.1080/01611194.2013.767678}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen13d, author = {Chris Christensen}, title = {Review of \emph{Decoding Organization: Bletchley Park, Codebreaking and Organization Studies} by Christopher Grey}, journal = {Cryptologia}, volume = {37}, number = {2}, pages = {184--188}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.767681}, doi = {10.1080/01611194.2013.767681}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen13e, author = {Chris Christensen}, title = {Review of \emph{Code Talker} by C. Nez (with J. S. Avila)}, journal = {Cryptologia}, volume = {37}, number = {3}, pages = {282--284}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.798526}, doi = {10.1080/01611194.2013.798526}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen13f, author = {Chris Christensen}, title = {Review of Two Software-Based Textbooks}, journal = {Cryptologia}, volume = {37}, number = {3}, pages = {285--288}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.798527}, doi = {10.1080/01611194.2013.798527}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen13g, author = {Chris Christensen}, title = {Review of Biographies of Alan Turing}, journal = {Cryptologia}, volume = {37}, number = {4}, pages = {356--367}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.827532}, doi = {10.1080/01611194.2013.827532}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Courtois13, author = {Nicolas T. Courtois}, title = {Low-Complexity Key Recovery Attacks on {GOST} Block Cipher}, journal = {Cryptologia}, volume = {37}, number = {1}, pages = {1--10}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.739587}, doi = {10.1080/01611194.2012.739587}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Courtois13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dang13, author = {Quynh Dang}, title = {Changes in Federal Information Processing Standard {(FIPS)} 180-4, Secure Hash Standard}, journal = {Cryptologia}, volume = {37}, number = {1}, pages = {69--73}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.687431}, doi = {10.1080/01611194.2012.687431}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DhavareLS13, author = {Amrapali Dhavare and Richard M. Low and Mark Stamp}, title = {Efficient Cryptanalysis of Homophonic Substitution Ciphers}, journal = {Cryptologia}, volume = {37}, number = {3}, pages = {250--281}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.797041}, doi = {10.1080/01611194.2013.797041}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DhavareLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley13, author = {John F. Dooley}, title = {1929-1931: {A} Transition Period in {U.S.} Cryptologic History}, journal = {Cryptologia}, volume = {37}, number = {1}, pages = {84--98}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.687432}, doi = {10.1080/01611194.2012.687432}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/FlynnM13, author = {William G. Flynn and Sharon Maneki}, title = {The Jack Butcher Case: {A} Story of Courage, Commitment, and Concern}, journal = {Cryptologia}, volume = {37}, number = {3}, pages = {210--214}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.798513}, doi = {10.1080/01611194.2013.798513}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/FlynnM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Fronczak13, author = {Maria Fronczak}, title = {Atbah-Type Ciphers in the Christian Orient and Numerical Rules in the Construction of Christian Substitution Ciphers}, journal = {Cryptologia}, volume = {37}, number = {4}, pages = {338--344}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.797040}, doi = {10.1080/01611194.2013.797040}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Fronczak13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/FuensantaEB13, author = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and Francisco Javier L{\'{o}}pez{-}Brea Espiau and Diego Navarro Bonilla}, title = {Revealing Secrets in Two Wars: The Spanish Codebreakers at {PC} Bruno and {PC} Cadix}, journal = {Cryptologia}, volume = {37}, number = {3}, pages = {233--249}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.797048}, doi = {10.1080/01611194.2013.797048}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/FuensantaEB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Glass13, author = {Darren B. Glass}, title = {A First-Year Seminar on Cryptography}, journal = {Cryptologia}, volume = {37}, number = {4}, pages = {305--310}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.797043}, doi = {10.1080/01611194.2013.797043}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Glass13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer13, author = {David H. Hamer}, title = {Review of \emph{Hitler's Codebreakers - German Signals Intelligence in World War 2} by John Jackson}, journal = {Cryptologia}, volume = {37}, number = {4}, pages = {368--370}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.827533}, doi = {10.1080/01611194.2013.827533}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Holden13, author = {Joshua Holden}, title = {Demitasse: {A} "Small" Version of the Tiny Encryption Algorithm and Its Use in a Classroom Setting}, journal = {Cryptologia}, volume = {37}, number = {1}, pages = {74--83}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.660237}, doi = {10.1080/01611194.2012.660237}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Holden13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Holden13a, author = {Joshua Holden}, title = {A Good Hash Function is Hard to Find, and Vice Versa}, journal = {Cryptologia}, volume = {37}, number = {2}, pages = {107--119}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.687429}, doi = {10.1080/01611194.2012.687429}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Holden13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Joyner13, author = {David Joyner}, title = {Review of \emph{Algebraic Shift Register Sequences} by Mark Goresky and Andrew Klapper}, journal = {Cryptologia}, volume = {37}, number = {2}, pages = {175--183}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.767680}, doi = {10.1080/01611194.2013.767680}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Joyner13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Joyner13a, author = {David Joyner}, title = {Review of \emph{Cryptographic Boolean Functions and Applications} by Thomas Cusick and Pantelimon St{\u{a}}nic{\u{a}}}, journal = {Cryptologia}, volume = {37}, number = {2}, pages = {189--192}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.767683}, doi = {10.1080/01611194.2013.767683}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Joyner13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kelly13, author = {Saul Kelly}, title = {Room 47: The Persian Prelude to the Zimmermann Telegram}, journal = {Cryptologia}, volume = {37}, number = {1}, pages = {11--50}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.739586}, doi = {10.1080/01611194.2012.739586}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kelly13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KumarS13, author = {Sachin Kumar and Rajendra Kumar Sharma}, title = {Recursive Information Hiding of Secrets by Random Grids}, journal = {Cryptologia}, volume = {37}, number = {2}, pages = {154--161}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.739585}, doi = {10.1080/01611194.2012.739585}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/KumarS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Leeuw13, author = {Karl de Leeuw}, title = {Review of \emph{Forschungsstelle Langeveld: Duits Afluisterstation in bezet Nederland} by Hans Knap}, journal = {Cryptologia}, volume = {37}, number = {2}, pages = {162--166}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.741460}, doi = {10.1080/01611194.2013.741460}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Leeuw13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mateer13, author = {Todd D. Mateer}, title = {Cryptanalysis of Beale Cipher Number Two}, journal = {Cryptologia}, volume = {37}, number = {3}, pages = {215--232}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.798517}, doi = {10.1080/01611194.2013.798517}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mateer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rezabek13, author = {Randy Rezabek}, title = {{TICOM} and the Search for OKW/\emph{Chi}}, journal = {Cryptologia}, volume = {37}, number = {2}, pages = {139--153}, year = {2013}, url = {https://doi.org/10.1080/01611194.2012.687430}, doi = {10.1080/01611194.2012.687430}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rezabek13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh13, author = {Klaus Schmeh}, title = {A Milestone in Voynich Manuscript Research: Voynich 100 Conference in Monte Porzio Catone, Italy}, journal = {Cryptologia}, volume = {37}, number = {3}, pages = {193--203}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.797045}, doi = {10.1080/01611194.2013.797045}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Stallings13, author = {William Stallings}, title = {Digital Signature Algorithms}, journal = {Cryptologia}, volume = {37}, number = {4}, pages = {311--327}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.797044}, doi = {10.1080/01611194.2013.797044}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Stallings13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SunC13, author = {Da{-}Zhi Sun and Zhen{-}Fu Cao}, title = {On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity}, journal = {Cryptologia}, volume = {37}, number = {4}, pages = {345--355}, year = {2013}, url = {https://doi.org/10.1080/01611194.2013.797039}, doi = {10.1080/01611194.2013.797039}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SunC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AgardC12, author = {David Agard and Chris Christensen}, title = {Review of \emph{The Theory That Would Not Die} by Sharon McGrayne}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {183--190}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.661307}, doi = {10.1080/01611194.2012.661307}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/AgardC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BallGHMN12, author = {Matthew V. Ball and Cyril Guyot and James P. Hughes and Luther Martin and Landon Curt Noll}, title = {The {XTS-AES} Disk Encryption Algorithm and the Security of Ciphertext Stealing}, journal = {Cryptologia}, volume = {36}, number = {1}, pages = {70--79}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.635115}, doi = {10.1080/01611194.2012.635115}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BallGHMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BardAC12, author = {Gregory V. Bard and Shaun Van Ault and Nicolas T. Courtois}, title = {Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers}, journal = {Cryptologia}, volume = {36}, number = {3}, pages = {240--262}, year = {2012}, url = {https://doi.org/10.1080/01611194.2011.632806}, doi = {10.1080/01611194.2011.632806}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BardAC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer12, author = {Craig Bauer}, title = {Space Crunchers and {GOST} Busters!}, journal = {Cryptologia}, volume = {36}, number = {1}, pages = {1}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.653772}, doi = {10.1080/01611194.2012.653772}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer12a, author = {Craig Bauer}, title = {100 Years Times Two: Alan Turing and the Voynich Manuscript}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {85--87}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.660846}, doi = {10.1080/01611194.2012.660846}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BeaverB12, author = {Cheryl L. Beaver and Stuart Boersma}, title = {{KRYPTOS:} {A} Pacific Northwest Cryptanalysis Contest for Undergraduates}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {149--156}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.660238}, doi = {10.1080/01611194.2012.660238}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BeaverB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BrierFN12, author = {Eric Brier and Wenjie Fang and David Naccache}, title = {How to Scatter a Secret?}, journal = {Cryptologia}, volume = {36}, number = {1}, pages = {46--54}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.635100}, doi = {10.1080/01611194.2012.635100}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/BrierFN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury12, author = {Jan Bury}, title = {Project Kalina: The Lotos Operation Conundrum}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {119--128}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.660854}, doi = {10.1080/01611194.2012.660854}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury12a, author = {Jan Bury}, title = {Assembling the Puzzle Game: The Jacek Jurzak Spy Case}, journal = {Cryptologia}, volume = {36}, number = {3}, pages = {215--229}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.688692}, doi = {10.1080/01611194.2012.688692}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury12b, author = {Jan Bury}, title = {Polish Cold War Codebreaking of 1959-1989: {A} Preliminary Assessment}, journal = {Cryptologia}, volume = {36}, number = {4}, pages = {341--379}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.713804}, doi = {10.1080/01611194.2012.713804}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen12, author = {Chris Christensen}, title = {Review of the 2011 Cryptologic History Symposium \emph{Cryptology in War and Peace: Crisis Points in History}}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {157--160}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.661296}, doi = {10.1080/01611194.2012.661296}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen12a, author = {Chris Christensen}, title = {Review of \emph{Secret Days: Code-Breaking in Bletchley Park} by Asa Briggs}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {167--172}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.661300}, doi = {10.1080/01611194.2012.661300}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen12b, author = {Chris Christensen}, title = {Review of \emph{Neil Webster's Cribs for Victory} edited by Joss Pearson}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {173--175}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.661302}, doi = {10.1080/01611194.2012.661302}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen12c, author = {Chris Christensen}, title = {Review of \emph{In the Shadow of Pont du Gard: The Polish Enigma in Vichy France (June 1940 to November 1942)} by Zdzislaw J. Kapera}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {176--178}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.661303}, doi = {10.1080/01611194.2012.661303}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen12d, author = {Chris Christensen}, title = {Review of \emph{Inside Enigma: The Secrets of the Enigma Machine and Other Historic Cipher Machines} by Tom Perera}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {179--180}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.661304}, doi = {10.1080/01611194.2012.661304}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen12e, author = {Chris Christensen}, title = {Review of \emph{The Information: {A} History, {A} Theory, {A} Flood} by James Gleick}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {181--182}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.661306}, doi = {10.1080/01611194.2012.661306}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen12e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChristensenJT12, author = {Chris Christensen and David Joyner and Jenna Torres}, title = {Lester Hill's Error-Detecting Codes}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {88--103}, year = {2012}, url = {https://doi.org/10.1080/01611194.2011.632805}, doi = {10.1080/01611194.2011.632805}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChristensenJT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Courtois12, author = {Nicolas T. Courtois}, title = {Security Evaluation of {GOST} 28147-89 in View of International Standardisation}, journal = {Cryptologia}, volume = {36}, number = {1}, pages = {2--13}, year = {2012}, url = {https://doi.org/10.1080/01611194.2011.632807}, doi = {10.1080/01611194.2011.632807}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Courtois12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Donovan12, author = {Peter Donovan}, title = {The Flaw in the {JN-25} Series of Ciphers, {II}}, journal = {Cryptologia}, volume = {36}, number = {1}, pages = {55--61}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.635107}, doi = {10.1080/01611194.2012.635107}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Donovan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley12, author = {John F. Dooley}, title = {Review of \emph{The Mystic Cipher} by Dennis L. Mangrum}, journal = {Cryptologia}, volume = {36}, number = {1}, pages = {80--83}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.635117}, doi = {10.1080/01611194.2012.635117}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley12a, author = {John F. Dooley}, title = {Review of \emph{Joe Rochefort's War} by Elliot Carlson}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {161--163}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.660239}, doi = {10.1080/01611194.2012.660239}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/FuensantaEB12, author = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and Francisco Javier L{\'{o}}pez{-}Brea Espiau and Diego Navarro Bonilla}, title = {A Cryptanalysis Service During the Spanish Civil War}, journal = {Cryptologia}, volume = {36}, number = {3}, pages = {263--289}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.687428}, doi = {10.1080/01611194.2012.687428}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/FuensantaEB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer12, author = {David H. Hamer}, title = {Review of \emph{The Secrets of Station {X} - How the Bletchley Park Codebreakers Helped Win the War} by Michael Smith}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {164--166}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.661298}, doi = {10.1080/01611194.2012.661298}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer12a, author = {David H. Hamer}, title = {First Charlotte International Cryptologic Symposium and Exhibit}, journal = {Cryptologia}, volume = {36}, number = {3}, pages = {290--294}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.703037}, doi = {10.1080/01611194.2012.703037}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MinierPP12, author = {Marine Minier and Raphael C.{-}W. Phan and Benjamin Pousse}, title = {On Integral Distinguishers of Rijndael Family of Ciphers}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {104--118}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.635110}, doi = {10.1080/01611194.2012.635110}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MinierPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh12, author = {Klaus Schmeh}, title = {The Pathology of Cryptology - {A} Current Survey}, journal = {Cryptologia}, volume = {36}, number = {1}, pages = {14--45}, year = {2012}, url = {https://doi.org/10.1080/01611194.2011.632803}, doi = {10.1080/01611194.2011.632803}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ShermanPRS12, author = {Alan T. Sherman and Dhananjay S. Phatak and Vivek G. Relan and Bhushan Sonawane}, title = {Location Authentication, Tracking, and Emergency Signaling through Power Line Communication: Designs and Protocols for New Out-of-Band Strategies}, journal = {Cryptologia}, volume = {36}, number = {2}, pages = {129--148}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.660370}, doi = {10.1080/01611194.2012.660370}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ShermanPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Shim12, author = {Kyung{-}Ah Shim}, title = {Security Flaws in Three Password-Based Remote User Authentication Schemes with Smart Cards}, journal = {Cryptologia}, volume = {36}, number = {1}, pages = {62--69}, year = {2012}, url = {https://doi.org/10.1080/01611194.2011.606352}, doi = {10.1080/01611194.2011.606352}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Shim12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Strasser12, author = {Gerhard F. Strasser}, title = {Late 18th-Century French Encrypted Diplomatic "Letters of Recommendation" - Or, How to Unwittingly Carry Your Own Warrant}, journal = {Cryptologia}, volume = {36}, number = {3}, pages = {230--239}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.688694}, doi = {10.1080/01611194.2012.688694}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Strasser12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/TuringB12, author = {Alan M. Turing and D. Bayley}, title = {Report on Speech Secrecy System DELILAH, a Technical Description Compiled by A. M. Turing and Lieutenant D. Bayley REME, 1945-1946}, journal = {Cryptologia}, volume = {36}, number = {4}, pages = {295--340}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.713803}, doi = {10.1080/01611194.2012.713803}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/TuringB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Zabell12, author = {Sandy L. Zabell}, title = {Commentary on Alan M. Turing: The Applications of Probability to Cryptography}, journal = {Cryptologia}, volume = {36}, number = {3}, pages = {191--214}, year = {2012}, url = {https://doi.org/10.1080/01611194.2012.697811}, doi = {10.1080/01611194.2012.697811}, timestamp = {Mon, 21 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Zabell12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AziziA11, author = {Abdelmalek Azizi and Mostafa Azizi}, title = {Instances of Arabic Cryptography in Morocco}, journal = {Cryptologia}, volume = {35}, number = {1}, pages = {47--57}, year = {2011}, url = {https://doi.org/10.1080/01611194.2010.509173}, doi = {10.1080/01611194.2010.509173}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AziziA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bellovin11, author = {Steven M. Bellovin}, title = {Frank Miller: Inventor of the One-Time Pad}, journal = {Cryptologia}, volume = {35}, number = {3}, pages = {203--222}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.583711}, doi = {10.1080/01611194.2011.583711}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bellovin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury11, author = {Jan Bury}, title = {From the Archives: Breaking {OTP} Ciphers}, journal = {Cryptologia}, volume = {35}, number = {2}, pages = {176--188}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.571159}, doi = {10.1080/01611194.2011.571159}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury11a, author = {Jan Bury}, title = {Operation \emph{Stonka}. An Ultimate Deception Spy Game}, journal = {Cryptologia}, volume = {35}, number = {4}, pages = {297--327}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.583709}, doi = {10.1080/01611194.2011.583709}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Carter11, author = {Frank L. Carter}, title = {Keith Batey and John Herivel: Two Distinguished Bletchley Park Cryptographers}, journal = {Cryptologia}, volume = {35}, number = {3}, pages = {277--281}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.595623}, doi = {10.1080/01611194.2011.595623}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Carter11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Child11, author = {Paul W. Child}, title = {Cipher against Ciphers: Jonathan Swift's Latino-Anglicus Satire of Medicine}, journal = {Cryptologia}, volume = {35}, number = {3}, pages = {257--266}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.558608}, doi = {10.1080/01611194.2011.558608}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Child11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen11, author = {Chris Christensen}, title = {Review of \emph{Cryptography and Network Security: Principles and Practice, Fifth Edition}}, journal = {Cryptologia}, volume = {35}, number = {1}, pages = {97--99}, year = {2011}, url = {https://doi.org/10.1080/01611194.2010.533253}, doi = {10.1080/01611194.2010.533253}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen11a, author = {Chris Christensen}, title = {Review of \emph{Algebraic Cryptanalysis}}, journal = {Cryptologia}, volume = {35}, number = {1}, pages = {100--105}, year = {2011}, url = {https://doi.org/10.1080/01611194.2010.509282}, doi = {10.1080/01611194.2010.509282}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen11b, author = {Chris Christensen}, title = {Review of \emph{Understanding Cryptography}}, journal = {Cryptologia}, volume = {35}, number = {1}, pages = {106--107}, year = {2011}, url = {https://doi.org/10.1080/01611194.2010.509014}, doi = {10.1080/01611194.2010.509014}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen11c, author = {Chris Christensen}, title = {Review of \emph{The Secret Life of Bletchley Park: The World War {II} Codebreaking Centre and the Men and Women Who Were There}}, journal = {Cryptologia}, volume = {35}, number = {2}, pages = {189--191}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.558983}, doi = {10.1080/01611194.2011.558983}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen11d, author = {Chris Christensen}, title = {Review of Bletchley Park Trust Reports by Frank Carter}, journal = {Cryptologia}, volume = {35}, number = {2}, pages = {192--195}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.558984}, doi = {10.1080/01611194.2011.558984}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen11e, author = {Chris Christensen}, title = {{US} Navy Cryptologic Mathematicians during World War {II}}, journal = {Cryptologia}, volume = {35}, number = {3}, pages = {267--276}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.558609}, doi = {10.1080/01611194.2011.558609}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChristensenA11, author = {Chris Christensen and David Agard}, title = {William Dean Wray {(1910-1962)} the Evolution of a Cryptanalyst}, journal = {Cryptologia}, volume = {35}, number = {1}, pages = {73--96}, year = {2011}, url = {https://doi.org/10.1080/01611194.2010.485410}, doi = {10.1080/01611194.2010.485410}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChristensenA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Das11, author = {Manik Lal Das}, title = {A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel}, journal = {Cryptologia}, volume = {35}, number = {1}, pages = {58--72}, year = {2011}, url = {https://doi.org/10.1080/01611194.2010.515905}, doi = {10.1080/01611194.2010.515905}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Das11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley11, author = {John F. Dooley}, title = {Was Herbert O. Yardley a Traitor?}, journal = {Cryptologia}, volume = {35}, number = {1}, pages = {1--15}, year = {2011}, url = {https://doi.org/10.1080/01611194.2010.533254}, doi = {10.1080/01611194.2010.533254}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ErtelJHF11, author = {Wolfgang Ertel and Lucia Jans and Walter Herzhauser and Joachim Fessler}, title = {An Enigma Replica and its Blueprints}, journal = {Cryptologia}, volume = {35}, number = {1}, pages = {16--21}, year = {2011}, url = {https://doi.org/10.1080/01611194.2010.533256}, doi = {10.1080/01611194.2010.533256}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ErtelJHF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HajnyZ11, author = {Jan Hajny and Vaclav Zeman}, title = {Anonymous Authentication with Spread Revelation}, journal = {Cryptologia}, volume = {35}, number = {3}, pages = {235--246}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.584777}, doi = {10.1080/01611194.2011.584777}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HajnyZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer11, author = {David Hamer}, title = {The David Kahn Collection at NSA's National Cryptologic Museum}, journal = {Cryptologia}, volume = {35}, number = {2}, pages = {110--113}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.558980}, doi = {10.1080/01611194.2011.558980}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer11a, author = {David Hamer}, title = {Review of '\emph{Dilly - The Man Who Broke Enigmas}' by Mavis Batey}, journal = {Cryptologia}, volume = {35}, number = {2}, pages = {196--197}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.558981}, doi = {10.1080/01611194.2011.558981}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn11, author = {David Kahn}, title = {Letter to the Editor}, journal = {Cryptologia}, volume = {35}, number = {2}, pages = {109}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.559803}, doi = {10.1080/01611194.2011.559803}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kapera11, author = {Zdzislaw J. Kapera}, title = {Summary Report of the State of the Soviet Military Sigint in November 1942 Noticing "ENIGMA"}, journal = {Cryptologia}, volume = {35}, number = {3}, pages = {247--256}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.559790}, doi = {10.1080/01611194.2011.559790}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kapera11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lewand11, author = {Robert Edward Lewand}, title = {Secret Keeping 101 - Dr. Janice Martin Benario and the Women's College Connection to {ULTRA}}, journal = {Cryptologia}, volume = {35}, number = {1}, pages = {42--46}, year = {2011}, url = {https://doi.org/10.1080/01611194.2010.533255}, doi = {10.1080/01611194.2010.533255}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Lewand11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Marks11, author = {Philip Marks}, title = {Operational Use and Cryptanalysis of the Kryha Cipher Machine}, journal = {Cryptologia}, volume = {35}, number = {2}, pages = {114--155}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.558978}, doi = {10.1080/01611194.2011.558978}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Marks11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Patterson11, author = {Wayne Patterson}, title = {The Cryptology of Baseball}, journal = {Cryptologia}, volume = {35}, number = {2}, pages = {156--163}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.558979}, doi = {10.1080/01611194.2011.558979}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Patterson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Preparata11, author = {Franco P. Preparata}, title = {Steps Toward Unraveling a Vatican Cipher of the 1930s}, journal = {Cryptologia}, volume = {35}, number = {3}, pages = {223--234}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.583710}, doi = {10.1080/01611194.2011.583710}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Preparata11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Reeds11, author = {Jim Reeds}, title = {American Dragon}, journal = {Cryptologia}, volume = {35}, number = {1}, pages = {22--41}, year = {2011}, url = {https://doi.org/10.1080/01611194.2010.509182}, doi = {10.1080/01611194.2010.509182}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Reeds11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin11, author = {Moshe Rubin}, title = {John F. Byrne's Chaocipher Revealed: An Historical and Technical Appraisal}, journal = {Cryptologia}, volume = {35}, number = {4}, pages = {328--379}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.606751}, doi = {10.1080/01611194.2011.606751}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smoot11, author = {Betsy Rohaly Smoot}, title = {An Accidental Cryptologist: The Brief Career of Genevieve Young Hitt}, journal = {Cryptologia}, volume = {35}, number = {2}, pages = {164--175}, year = {2011}, url = {https://doi.org/10.1080/01611194.2011.558982}, doi = {10.1080/01611194.2011.558982}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Smoot11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AssarpourB10, author = {Ali Assarpour and Kent D. Boklan}, title = {How We Broke the Union Code {(148} Years Too Late)}, journal = {Cryptologia}, volume = {34}, number = {3}, pages = {200--210}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.485435}, doi = {10.1080/01611194.2010.485435}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AssarpourB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer10, author = {Craig P. Bauer}, title = {Teamwork Pays Off!}, journal = {Cryptologia}, volume = {34}, number = {4}, pages = {281}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.509674}, doi = {10.1080/01611194.2010.509674}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Booker10, author = {Clyde G. Booker}, title = {Review of \emph{West Wind Clear: Cryptology and the Winds Message Controversy - {A} Documentary History}}, journal = {Cryptologia}, volume = {34}, number = {1}, pages = {90--95}, year = {2010}, url = {https://doi.org/10.1080/01611190903409173}, doi = {10.1080/01611190903409173}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Booker10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Booker10a, author = {Clyde G. Booker}, title = {Review of \emph{The Attack on the Liberty: The Untold Story of Israel's Deadly 1967 Assault on a {U.S.} Spy Ship} by James Scott}, journal = {Cryptologia}, volume = {34}, number = {2}, pages = {186--189}, year = {2010}, url = {https://doi.org/10.1080/01611191003600653}, doi = {10.1080/01611191003600653}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Booker10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke10, author = {Colin B. Burke}, title = {Review of \emph{The Secret Sentry: The Untold Story of the National Security Agency} by Matthew M. Aid}, journal = {Cryptologia}, volume = {34}, number = {2}, pages = {190--193}, year = {2010}, url = {https://doi.org/10.1080/01611191003621956}, doi = {10.1080/01611191003621956}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke10a, author = {Colin B. Burke}, title = {From the Archives: {A} Lady Codebreaker Speaks: Joan Murray, the Bombes and the Perils of Writing Crypto-History From Participants' Accounts}, journal = {Cryptologia}, volume = {34}, number = {4}, pages = {359--370}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.485452}, doi = {10.1080/01611194.2010.485452}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury10, author = {Jan Bury}, title = {Operation Lotos: An Unsuccessful Attempt on {U.S.} Government Communications}, journal = {Cryptologia}, volume = {34}, number = {1}, pages = {60--87}, year = {2010}, url = {https://doi.org/10.1080/01611190903388039}, doi = {10.1080/01611190903388039}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen10, author = {Chris Christensen}, title = {Alan Turing's First Cryptology Textbook and Sinkov's Revision of it}, journal = {Cryptologia}, volume = {34}, number = {1}, pages = {27--43}, year = {2010}, url = {https://doi.org/10.1080/01611190902908175}, doi = {10.1080/01611190902908175}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen10a, author = {Chris Christensen}, title = {Review of \emph{Bletchley Park: An Inmate's Story} by James Thirsk}, journal = {Cryptologia}, volume = {34}, number = {1}, pages = {88--89}, year = {2010}, url = {https://doi.org/10.1080/01611190903385068}, doi = {10.1080/01611190903385068}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen10b, author = {Chris Christensen}, title = {Review of the 2009 Cryptologic History Symposium: \emph{Global Perspectives on Cryptologic History}}, journal = {Cryptologia}, volume = {34}, number = {2}, pages = {176--179}, year = {2010}, url = {https://doi.org/10.1080/01611191003598113}, doi = {10.1080/01611191003598113}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen10c, author = {Chris Christensen}, title = {Review of \emph{Elementary Cryptanalysis: {A} Mathematical Approach, Second Edition} by Abraham Sinkov, revised and updated by Todd Feil}, journal = {Cryptologia}, volume = {34}, number = {3}, pages = {269--272}, year = {2010}, url = {https://doi.org/10.1080/01611191003600794}, doi = {10.1080/01611191003600794}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen10d, author = {Chris Christensen}, title = {Review of \emph{The Real Enigma Heroes} by Phil Shanahan}, journal = {Cryptologia}, volume = {34}, number = {3}, pages = {273--277}, year = {2010}, url = {https://doi.org/10.1080/01611191003600695}, doi = {10.1080/01611191003600695}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen10e, author = {Chris Christensen}, title = {Review of Two "Gift Books" about Cryptology}, journal = {Cryptologia}, volume = {34}, number = {3}, pages = {278--279}, year = {2010}, url = {https://doi.org/10.1080/01611191003598063}, doi = {10.1080/01611191003598063}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen10e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley10, author = {John F. Dooley}, title = {Reviews of Cryptologic Fiction}, journal = {Cryptologia}, volume = {34}, number = {1}, pages = {96--100}, year = {2010}, url = {https://doi.org/10.1080/01611190903384053}, doi = {10.1080/01611190903384053}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley10a, author = {John F. Dooley}, title = {Reviews of Cryptologic Fiction}, journal = {Cryptologia}, volume = {34}, number = {2}, pages = {180--185}, year = {2010}, url = {https://doi.org/10.1080/01611191003600778}, doi = {10.1080/01611191003600778}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine10, author = {Ralph Erskine}, title = {Ultra Reveals a Late \emph{B-Dienst} Success in the Atlantic}, journal = {Cryptologia}, volume = {34}, number = {4}, pages = {340--358}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.485412}, doi = {10.1080/01611194.2010.485412}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Faurholt10, author = {Niels Faurholt}, title = {E.S.Schieber German Code Device from {WWII}}, journal = {Cryptologia}, volume = {34}, number = {1}, pages = {44--51}, year = {2010}, url = {https://doi.org/10.1080/01611190903225942}, doi = {10.1080/01611190903225942}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Faurholt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/FuensantaEW10, author = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and Francisco Javier L{\'{o}}pez{-}Brea Espiau and Frode Weierud}, title = {Spanish Enigma: {A} History of the Enigma in Spain}, journal = {Cryptologia}, volume = {34}, number = {4}, pages = {301--328}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.485414}, doi = {10.1080/01611194.2010.485414}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/FuensantaEW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HolblWB10, author = {Marko H{\"{o}}lbl and Tatjana Welzer and Bostjan Brumen}, title = {Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme}, journal = {Cryptologia}, volume = {34}, number = {1}, pages = {52--59}, year = {2010}, url = {https://doi.org/10.1080/01611190903030912}, doi = {10.1080/01611190903030912}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/HolblWB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/JainH10, author = {Ashwin Jain and C. Hari}, title = {A New Efficient Protocol for k-out-of-n Oblivious Transfer}, journal = {Cryptologia}, volume = {34}, number = {4}, pages = {282--290}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.509284}, doi = {10.1080/01611194.2010.509284}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/JainH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn10, author = {David Kahn}, title = {How {I} Discovered World War II's Greatest Spy}, journal = {Cryptologia}, volume = {34}, number = {1}, pages = {12--21}, year = {2010}, url = {https://doi.org/10.1080/01611190903385019}, doi = {10.1080/01611190903385019}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn10a, author = {David Kahn}, title = {Louis Kruh, Cryptologist, Editor, Activist}, journal = {Cryptologia}, volume = {34}, number = {3}, pages = {197--199}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.496278}, doi = {10.1080/01611194.2010.496278}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Koblitz10, author = {Neal Koblitz}, title = {Secret Codes and Online Security: {A} Seminar for Entering Students}, journal = {Cryptologia}, volume = {34}, number = {2}, pages = {145--154}, year = {2010}, url = {https://doi.org/10.1080/01611191003590821}, doi = {10.1080/01611191003590821}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Koblitz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KonikoffT10, author = {Jacob Konikoff and Seth Toplosky}, title = {Analysis of Simplified {DES} Algorithms}, journal = {Cryptologia}, volume = {34}, number = {3}, pages = {211--224}, year = {2010}, url = {https://doi.org/10.1080/01611191003646433}, doi = {10.1080/01611191003646433}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KonikoffT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kurt10, author = {Yesem Kurt}, title = {Deciphering an Undergraduate Cryptology Course}, journal = {Cryptologia}, volume = {34}, number = {2}, pages = {155--162}, year = {2010}, url = {https://doi.org/10.1080/01611190903225421}, doi = {10.1080/01611190903225421}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kurt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lang10, author = {Benedek L{\'{a}}ng}, title = {Why Don't We Decipher an Outdated Cipher System? The Codex of Rohonc}, journal = {Cryptologia}, volume = {34}, number = {2}, pages = {115--144}, year = {2010}, url = {https://doi.org/10.1080/01611191003605587}, doi = {10.1080/01611191003605587}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Lang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Levine10, author = {Emil H. Levine}, title = {Review of \emph{Deciphering the Rising Sun: Navy and Marine Corps Codebreakers, Translators, and Interpreters in the Pacific War} by Roger Dingman}, journal = {Cryptologia}, volume = {34}, number = {2}, pages = {194--196}, year = {2010}, url = {https://doi.org/10.1080/01611191003600596}, doi = {10.1080/01611191003600596}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Levine10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ParakhK10, author = {Abhishek Parakh and Subhash C. Kak}, title = {Internet Voting Protocol Based on Improved Implicit Security}, journal = {Cryptologia}, volume = {34}, number = {3}, pages = {258--268}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.485421}, doi = {10.1080/01611194.2010.485421}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ParakhK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/PatarinN10, author = {Jacques Patarin and Val{\'{e}}rie Nachef}, title = {"I Shall Love You Until Death" (Marie-Antoinette to Axel von Fersen)}, journal = {Cryptologia}, volume = {34}, number = {2}, pages = {104--114}, year = {2010}, url = {https://doi.org/10.1080/01611191003621212}, doi = {10.1080/01611191003621212}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/PatarinN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/PopoveniucV10, author = {Stefan Popoveniuc and Poorvi L. Vora}, title = {Secure Electronic Voting - {A} Framework}, journal = {Cryptologia}, volume = {34}, number = {3}, pages = {236--257}, year = {2010}, url = {https://doi.org/10.1080/01611190902894961}, doi = {10.1080/01611190902894961}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/PopoveniucV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rijmenants10, author = {Dirk Rijmenants}, title = {Enigma Message Procedures Used by the Heer, Luftwaffe and Kriegsmarine}, journal = {Cryptologia}, volume = {34}, number = {4}, pages = {329--339}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.486257}, doi = {10.1080/01611194.2010.486257}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rijmenants10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh10, author = {Klaus Schmeh}, title = {Alexander von Kryha and His Encryption Machines}, journal = {Cryptologia}, volume = {34}, number = {4}, pages = {291--300}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.485440}, doi = {10.1080/01611194.2010.485440}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Stallings10, author = {William Stallings}, title = {{NIST} Block Cipher Modes of Operation for Confidentiality}, journal = {Cryptologia}, volume = {34}, number = {2}, pages = {163--175}, year = {2010}, url = {https://doi.org/10.1080/01611190903185401}, doi = {10.1080/01611190903185401}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Stallings10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Stallings10a, author = {William Stallings}, title = {{NIST} Block Cipher Modes of Operation for Authentication and Combined Confidentiality and Authentication}, journal = {Cryptologia}, volume = {34}, number = {3}, pages = {225--235}, year = {2010}, url = {https://doi.org/10.1080/01611191003598295}, doi = {10.1080/01611191003598295}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Stallings10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Strasser10, author = {Gerhard F. Strasser}, title = {Ninth-Century Figural Poetry and Medieval Easter Tables - Possible Inspirations for the Square Tables of Trithemius and Vigen{\`{e}}re?}, journal = {Cryptologia}, volume = {34}, number = {1}, pages = {22--26}, year = {2010}, url = {https://doi.org/10.1080/01611190903384970}, doi = {10.1080/01611190903384970}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Strasser10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Strasser10a, author = {Gerhard F. Strasser}, title = {Review of \emph{Versteckte Botschaften. Die faszinierende Geschichte der Steganografie} (Hidden Messages. The Fascinating Story of Steganography)}, journal = {Cryptologia}, volume = {34}, number = {4}, pages = {371--380}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.509160}, doi = {10.1080/01611194.2010.509160}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Strasser10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel10, author = {Brian J. Winkel}, title = {David, Calm Down! On Second and More Reflective Thought, Don't!}, journal = {Cryptologia}, volume = {34}, number = {2}, pages = {101--103}, year = {2010}, url = {https://doi.org/10.1080/01611191003590763}, doi = {10.1080/01611191003590763}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AngelM09, author = {Jos{\'{e}} de Jes{\'{u}}s Angel Angel and Guillermo Morales{-}Luna}, title = {Cryptographic Methods During the Mexican Revolution}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {188--196}, year = {2009}, url = {https://doi.org/10.1080/01611190902744059}, doi = {10.1080/01611190902744059}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AngelM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Aumasson09, author = {Jean{-}Philippe Aumasson}, title = {Cryptanalysis of a Hash Function Based on Norm Form Equations}, journal = {Cryptologia}, volume = {33}, number = {1}, pages = {12--15}, year = {2009}, url = {https://doi.org/10.1080/01611190802306793}, doi = {10.1080/01611190802306793}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Aumasson09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer09, author = {Craig P. Bauer}, title = {Dedication to Dr. Jay Anderson}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {107}, year = {2009}, url = {https://doi.org/10.1080/01611190802565976}, doi = {10.1080/01611190802565976}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Beaver09, author = {Cheryl L. Beaver}, title = {Cryptology in the Classroom: Analyzing a Zero-Knowledge Protocol}, journal = {Cryptologia}, volume = {33}, number = {1}, pages = {16--23}, year = {2009}, url = {https://doi.org/10.1080/01611190802550911}, doi = {10.1080/01611190802550911}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Beaver09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Boliver09, author = {David E. Boliver}, title = {Cryptology as College Outreach to Young Teens}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {158--165}, year = {2009}, url = {https://doi.org/10.1080/01611190802253359}, doi = {10.1080/01611190802253359}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Boliver09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Brandt09, author = {Howard E. Brandt}, title = {Review of \emph{Protecting Information: From Classical Error Correction to Quantum Cryptography} by Susan Loepp and William K. Wootters}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {205--207}, year = {2009}, url = {https://doi.org/10.1080/01611190902740453}, doi = {10.1080/01611190902740453}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Brandt09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Budiansky09, author = {Stephen Budiansky}, title = {Review of \emph{Decoding the IRA} by Tom Mahon and James J. Gillogly}, journal = {Cryptologia}, volume = {33}, number = {3}, pages = {292--294}, year = {2009}, url = {https://doi.org/10.1080/01611190902967023}, doi = {10.1080/01611190902967023}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Budiansky09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke09, author = {Colin B. Burke}, title = {Review of \emph{Echoes of our Past} by the Naval Cryptologic Veterans Association}, journal = {Cryptologia}, volume = {33}, number = {1}, pages = {98}, year = {2009}, url = {https://doi.org/10.1080/01611190802551786}, doi = {10.1080/01611190802551786}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke09a, author = {Colin B. Burke}, title = {Review of \emph{American Cryptology during the Cold War, 1945-1989} by Thomas R. Johnson}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {197--200}, year = {2009}, url = {https://doi.org/10.1080/01611190902740461}, doi = {10.1080/01611190902740461}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury09, author = {Jan Bury}, title = {Breaking Unbreakable Ciphers. The Asen Georgiyev Spy Case}, journal = {Cryptologia}, volume = {33}, number = {1}, pages = {74--88}, year = {2009}, url = {https://doi.org/10.1080/01611190802319093}, doi = {10.1080/01611190802319093}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury09a, author = {Jan Bury}, title = {From the Archives: {CX-52} Messages Read by Red Poles?}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {347--352}, year = {2009}, url = {https://doi.org/10.1080/01611190902742467}, doi = {10.1080/01611190902742467}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChaumHPV09, author = {David Chaum and Benjamin Hosp and Stefan Popoveniuc and Poorvi L. Vora}, title = {Accessible Voter-Verifiability}, journal = {Cryptologia}, volume = {33}, number = {3}, pages = {283--291}, year = {2009}, url = {https://doi.org/10.1080/01611190902894946}, doi = {10.1080/01611190902894946}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ChaumHPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen09, author = {Chris Christensen}, title = {Review of \emph{Modern Cryptanalysis: Techniques for Advanced Code Breaking} by Christopher Swenson}, journal = {Cryptologia}, volume = {33}, number = {1}, pages = {89--94}, year = {2009}, url = {https://doi.org/10.1080/01611190802293397}, doi = {10.1080/01611190802293397}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen09a, author = {Chris Christensen}, title = {Review of \emph{An Introduction to Mathematical Cryptography} by Hoffstein, Pipher, and Silverman}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {201--204}, year = {2009}, url = {https://doi.org/10.1080/01611190902721016}, doi = {10.1080/01611190902721016}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen09b, author = {Chris Christensen}, title = {Reviews of Two \emph{Post-Quantum Cryptography} Books}, journal = {Cryptologia}, volume = {33}, number = {3}, pages = {271--273}, year = {2009}, url = {https://doi.org/10.1080/01611190902742749}, doi = {10.1080/01611190902742749}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen09b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen09c, author = {Chris Christensen}, title = {Review of \emph{The Shadow Factory: The Ultra-Secret {NSA} from 9/11 to the Eavesdropping on America} by James Bamford}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {356--358}, year = {2009}, url = {https://doi.org/10.1080/01611190903115150}, doi = {10.1080/01611190903115150}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen09c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen09d, author = {Chris Christensen}, title = {Review of \emph{Random Curves} by Neal Koblitz}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {359--365}, year = {2009}, url = {https://doi.org/10.1080/01611190903115119}, doi = {10.1080/01611190903115119}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen09d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen09e, author = {Chris Christensen}, title = {Review of \emph{Ultra Versus U-Boats: Enigma Decrypts in The National Archives} by Roy Conyers Nesbit}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {366--369}, year = {2009}, url = {https://doi.org/10.1080/01611190903185179}, doi = {10.1080/01611190903185179}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen09e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/David09, author = {James David}, title = {Review of The {U.S.} Intelligence Community (Fifth Edition) by Jeffrey T. Richelson}, journal = {Cryptologia}, volume = {33}, number = {1}, pages = {99--101}, year = {2009}, url = {https://doi.org/10.1080/01611190802160588}, doi = {10.1080/01611190802160588}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/David09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley09, author = {John F. Dooley}, title = {Reviews of Cryptologic Fiction}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {212--215}, year = {2009}, url = {https://doi.org/10.1080/01611190902740529}, doi = {10.1080/01611190902740529}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley09a, author = {John F. Dooley}, title = {Another Yardley Mystery}, journal = {Cryptologia}, volume = {33}, number = {3}, pages = {276--282}, year = {2009}, url = {https://doi.org/10.1080/01611190902894938}, doi = {10.1080/01611190902894938}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DooleyR09, author = {John F. Dooley and Yvonne I. Ramirez}, title = {Who Wrote \emph{The Blonde Countess}? {A} Stylometric Analysis of Herbert O. Yardley's Fiction}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {108--117}, year = {2009}, url = {https://doi.org/10.1080/01611190802653244}, doi = {10.1080/01611190802653244}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DooleyR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Fuensanta09, author = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta}, title = {\emph{Treaty of Cryptography} by Joaqu{\'{\i}}n Garc{\'{\i}}a Carmona?}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {118--124}, year = {2009}, url = {https://doi.org/10.1080/01611190902742681}, doi = {10.1080/01611190902742681}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Fuensanta09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GalleryM09, author = {Eimear Gallery and Chris J. Mitchell}, title = {Trusted Computing: Security and Applications}, journal = {Cryptologia}, volume = {33}, number = {3}, pages = {217--245}, year = {2009}, url = {https://doi.org/10.1080/01611190802231140}, doi = {10.1080/01611190802231140}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GalleryM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GuG09, author = {Haihua Gu and Dawu Gu}, title = {Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {315--320}, year = {2009}, url = {https://doi.org/10.1080/01611190903185344}, doi = {10.1080/01611190903185344}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GuG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer09, author = {David Hamer}, title = {Review of \emph{Herivelismus and the German Military Enigma} by John Herivel}, journal = {Cryptologia}, volume = {33}, number = {1}, pages = {95--97}, year = {2009}, url = {https://doi.org/10.1080/01611190802549012}, doi = {10.1080/01611190802549012}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer09a, author = {David Hamer}, title = {Review of \emph{From Bletchley with Love} by Mavis Batey}, journal = {Cryptologia}, volume = {33}, number = {3}, pages = {274--275}, year = {2009}, url = {https://doi.org/10.1080/01611190902788825}, doi = {10.1080/01611190902788825}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Joyner09, author = {David Joyner}, title = {Review of \emph{Algorithmic Number Theory: Lattices, Curves and Cryptography}, Edited by J. P. Buhler and P. Stevenhagen}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {208--211}, year = {2009}, url = {https://doi.org/10.1080/01611190902740602}, doi = {10.1080/01611190902740602}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Joyner09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KimP09, author = {Jongsung Kim and Raphael C.{-}W. Phan}, title = {Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher}, journal = {Cryptologia}, volume = {33}, number = {3}, pages = {246--270}, year = {2009}, url = {https://doi.org/10.1080/01611190802653228}, doi = {10.1080/01611190802653228}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/KimP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh09, author = {David Kruh}, title = {Review of Spies of the Bible: Espionage in Israel from the Exodus to the Bar Kokhba Revolt by Rose Mary Sheldon}, journal = {Cryptologia}, volume = {33}, number = {1}, pages = {104--105}, year = {2009}, url = {https://doi.org/10.1080/01611190802548899}, doi = {10.1080/01611190802548899}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruth09, author = {Louis Kruh}, title = {A Belated Tribute to Rosario Candela}, journal = {Cryptologia}, volume = {33}, number = {1}, pages = {1--11}, year = {2009}, url = {https://doi.org/10.1080/01611190802293314}, doi = {10.1080/01611190802293314}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruth09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Link09, author = {David Link}, title = {Resurrecting \emph{Bomba Kryptologiczna}: Archaeology of Algorithmic Artefacts, {I}}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {166--182}, year = {2009}, url = {https://doi.org/10.1080/01611190802562809}, doi = {10.1080/01611190802562809}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Link09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LiuZ09, author = {Jiqiang Liu and Sheng Zhong}, title = {Analysis of Kim-Jeon-Yoo Password Authentication Schemes}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {183--187}, year = {2009}, url = {https://doi.org/10.1080/01611190802653236}, doi = {10.1080/01611190802653236}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LiuZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/May09, author = {Mike May}, title = {Using Maple Worksheets to Enable Student Explorations of Cryptography}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {151--157}, year = {2009}, url = {https://doi.org/10.1080/01611190802323798}, doi = {10.1080/01611190802323798}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/May09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/McDevittL09, author = {Tim McDevitt and Tom Leap}, title = {Multimedia Cryptology}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {142--150}, year = {2009}, url = {https://doi.org/10.1080/01611190802300408}, doi = {10.1080/01611190802300408}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/McDevittL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Melka09, author = {Tomi S. Melka}, title = {Some Considerations about the \emph{Kohau Rongorongo} Script in the Light of a Statistical Analysis of the 'Santiago Staff'}, journal = {Cryptologia}, volume = {33}, number = {1}, pages = {24--73}, year = {2009}, url = {https://doi.org/10.1080/01611190802548998}, doi = {10.1080/01611190802548998}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Melka09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Phan09, author = {Raphael C.{-}W. Phan}, title = {Review of Security Engineering: {A} Guide to Building Dependable Distributed Systems, 2nd Edition by Ross J. Anderson}, journal = {Cryptologia}, volume = {33}, number = {1}, pages = {102--103}, year = {2009}, url = {https://doi.org/10.1080/01611190802550804}, doi = {10.1080/01611190802550804}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Phan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/RaviK09, author = {Sujith Ravi and Kevin Knight}, title = {Attacking Letter Substitution Ciphers with Integer Programming}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {321--334}, year = {2009}, url = {https://doi.org/10.1080/01611190903030920}, doi = {10.1080/01611190903030920}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/RaviK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/RiceY09, author = {Blake Rice and Bill Yankosky}, title = {Elliptic Curve Cryptography with the {TI-83}}, journal = {Cryptologia}, volume = {33}, number = {2}, pages = {125--141}, year = {2009}, url = {https://doi.org/10.1080/01611190802214914}, doi = {10.1080/01611190802214914}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/RiceY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh09, author = {Klaus Schmeh}, title = {Enigma's Contemporary Witness: Gisbert Hasenjaeger}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {343--346}, year = {2009}, url = {https://doi.org/10.1080/01611190903186003}, doi = {10.1080/01611190903186003}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schwartz09, author = {Kathryn A. Schwartz}, title = {Charting Arabic Cryptology's Evolution}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {297--304}, year = {2009}, url = {https://doi.org/10.1080/01611190903030904}, doi = {10.1080/01611190903030904}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schwartz09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Simmons09, author = {Sean Simmons}, title = {Algebraic Cryptanalysis of Simplified {AES}}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {305--314}, year = {2009}, url = {https://doi.org/10.1080/01611190903185328}, doi = {10.1080/01611190903185328}, timestamp = {Thu, 01 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Simmons09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wolfe09, author = {Henry B. Wolfe}, title = {Review of \emph{Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and Holocaust, 1939-1945} by Robert J. Hanyok}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {353--355}, year = {2009}, url = {https://doi.org/10.1080/01611190903115192}, doi = {10.1080/01611190903115192}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wolfe09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/YumL09, author = {Dae Hyun Yum and Pil Joong Lee}, title = {Cracking Hill Ciphers with Goodness-of-Fit Statistics}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {335--342}, year = {2009}, url = {https://doi.org/10.1080/01611190903185369}, doi = {10.1080/01611190903185369}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/YumL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AdlerFLY08, author = {Jeffrey D. Adler and Ryan W. Fuoss and Michael J. Levin and Amanda R. Youell}, title = {Reading Encrypted Diplomatic Correspondence: An Undergraduate Research Project}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {1--12}, year = {2008}, url = {https://doi.org/10.1080/01611190701498212}, doi = {10.1080/01611190701498212}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AdlerFLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Albrecht08, author = {Martin R. Albrecht}, title = {Algebraic Attacks on the Courtois Toy Cipher}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {220--276}, year = {2008}, url = {https://doi.org/10.1080/01611190802058139}, doi = {10.1080/01611190802058139}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Albrecht08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Batey08, author = {Mavis Batey}, title = {Dilly Knox - {A} Reminiscence of this Pioneer Enigma Cryptanalyst}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {104--130}, year = {2008}, url = {https://doi.org/10.1080/01611190801914290}, doi = {10.1080/01611190801914290}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Batey08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Boklan08, author = {Kent D. Boklan}, title = {How {I} Broke an Encrypted Diary from the War of 1812}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {299--310}, year = {2008}, url = {https://doi.org/10.1080/01611190802232155}, doi = {10.1080/01611190802232155}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Boklan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Buonafalce08, author = {Augusto Buonafalce}, title = {Cicco Simonetta's Cipher-Breaking Rules}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {62--70}, year = {2008}, url = {https://doi.org/10.1080/01611190701756585}, doi = {10.1080/01611190701756585}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Buonafalce08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke08, author = {Colin B. Burke}, title = {From the Archives: The Last Bombe Run, 1955}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {277--278}, year = {2008}, url = {https://doi.org/10.1080/01611190802113777}, doi = {10.1080/01611190802113777}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury08, author = {Jan Bury}, title = {From the Archives: Intercepting Best Friend?}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {84--87}, year = {2008}, url = {https://doi.org/10.1080/01611190701743609}, doi = {10.1080/01611190701743609}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury08a, author = {Jan Bury}, title = {From the Archives: Inside a Cold War Crypto Cell. Polish Cipher Bureau in the 1980s}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {351--367}, year = {2008}, url = {https://doi.org/10.1080/01611190802319036}, doi = {10.1080/01611190802319036}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Chan08, author = {Wayne S. Chan}, title = {Key Enclosed: Examining the Evidence for the Missing Key Letter of the Beale Cipher}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {33--36}, year = {2008}, url = {https://doi.org/10.1080/01611190701577759}, doi = {10.1080/01611190701577759}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Chan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen08, author = {Chris Christensen}, title = {Review of The Collective Works of Captain George P. McGinnis by George P. McGinnis}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {88--89}, year = {2008}, url = {https://doi.org/10.1080/01611190701743625}, doi = {10.1080/01611190701743625}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen08a, author = {Chris Christensen}, title = {Review of How to Tell a Secret: Tips, Tricks {\&} Techniques for Breaking Codes {\&} Conveying Covert Information by P. J. Huff and J. G. Lewin}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {90--91}, year = {2008}, url = {https://doi.org/10.1080/01611190701582460}, doi = {10.1080/01611190701582460}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen08b, author = {Chris Christensen}, title = {Review of Voices of the Code Breakers: Personal Accounts of the Secret Heroes of World War Ii by Michael Paterson}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {186--188}, year = {2008}, url = {https://doi.org/10.1080/01611190701856641}, doi = {10.1080/01611190701856641}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen08c, author = {Chris Christensen}, title = {Review of A\({}^{\mbox{3}}\) and His Algebra by Nancy E. Albert}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {189--196}, year = {2008}, url = {https://doi.org/10.1080/01611190701869461}, doi = {10.1080/01611190701869461}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen08d, author = {Chris Christensen}, title = {Review of \emph{The History of Information Security: {A} Comprehensive Handbook} edited by Karl de Leeuw and Jan Bergstra}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {284--294}, year = {2008}, url = {https://doi.org/10.1080/01611190802125854}, doi = {10.1080/01611190802125854}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChristensenG08, author = {Chris Christensen and Suzanne E. Gladfelter}, title = {Taking a Cryptology Class to Bletchley Park}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {23--32}, year = {2008}, url = {https://doi.org/10.1080/01611190701548271}, doi = {10.1080/01611190701548271}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChristensenG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Cowan08, author = {Michael J. Cowan}, title = {Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {71--83}, year = {2008}, url = {https://doi.org/10.1080/01611190701743658}, doi = {10.1080/01611190701743658}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Cowan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Diffie08, author = {Whitfield Diffie}, title = {What Did We Do Before Biometric Passports? {A} Review of \emph{Who Are You? Identification, Deception, and Surveillance in Early Modern Europe} by Valentin Groebner}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {368--369}, year = {2008}, url = {https://doi.org/10.1080/01611190802215077}, doi = {10.1080/01611190802215077}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Diffie08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley08, author = {John F. Dooley}, title = {Reviews of Cryptologic Fiction}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {295--298}, year = {2008}, url = {https://doi.org/10.1080/01611190802114445}, doi = {10.1080/01611190802114445}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine08, author = {Ralph Erskine}, title = {Captured \emph{Kriegsmarine} Enigma Documents at Bletchley Park}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {199--219}, year = {2008}, url = {https://doi.org/10.1080/01611190802088318}, doi = {10.1080/01611190802088318}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/EsqX08, author = {Louis Kruh}, title = {Review of Figuring It Out At Bletchley Park 1939-1945 by John Gallehawk and Kerry Johnson}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {184--185}, year = {2008}, url = {https://doi.org/10.1080/01611190801917087}, doi = {10.1080/01611190801917087}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/EsqX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gallehawk08, author = {John C. Gallehawk}, title = {Review of Delusions of Intelligence by R. A. Ratcliff}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {98--100}, year = {2008}, url = {https://doi.org/10.1080/01611190701758045}, doi = {10.1080/01611190701758045}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gallehawk08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Grajek08, author = {Marek Grajek}, title = {Monument \emph{in Memoriam} of Marian Rejewski, Jerzy R{\'{o}}zycki and Henryk Zygalski Unveiled in Poznan}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {101--103}, year = {2008}, url = {https://doi.org/10.1080/01611190801916634}, doi = {10.1080/01611190801916634}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Grajek08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GreyS08, author = {Christopher Grey and Andrew Sturdy}, title = {The 1942 Reorganization of the Government Code and Cypher School}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {311--333}, year = {2008}, url = {https://doi.org/10.1080/01611190802114411}, doi = {10.1080/01611190802114411}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GreyS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hatch08, author = {David A. Hatch}, title = {From the Archives: Friedman Takes the Stand}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {180--183}, year = {2008}, url = {https://doi.org/10.1080/01611190801916121}, doi = {10.1080/01611190801916121}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hatch08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Holden08, author = {Joshua Holden}, title = {Review of Complexity and Cryptography: An Introduction by John Talbot and Dominic Welsh}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {92--97}, year = {2008}, url = {https://doi.org/10.1080/01611190701582619}, doi = {10.1080/01611190701582619}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Holden08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Jaworski08, author = {Jerzy Jaworski}, title = {Rejewski-R{\'{o}}zycki-Zygalski Lectures in Computer Science}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {348--350}, year = {2008}, url = {https://doi.org/10.1080/01611190802253128}, doi = {10.1080/01611190802253128}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Jaworski08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn08, author = {David Kahn}, title = {The Future of the Past - Questions in Cryptologic History}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {56--61}, year = {2008}, url = {https://doi.org/10.1080/01611190701752915}, doi = {10.1080/01611190701752915}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Massey08, author = {James L. Massey}, title = {Review of Series on Arabic Origins of Cryptology}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {280--283}, year = {2008}, url = {https://doi.org/10.1080/01611190802129104}, doi = {10.1080/01611190802129104}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Massey08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Melka08, author = {Tomi S. Melka}, title = {Structural Observations Regarding \emph{RongoRongo} Tablet 'Keiti'}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {155--179}, year = {2008}, url = {https://doi.org/10.1080/01611190801911361}, doi = {10.1080/01611190801911361}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Melka08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Parakh08, author = {Abhishek Parakh}, title = {Oblivious Transfer Based on Key Exchange}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {37--44}, year = {2008}, url = {https://doi.org/10.1080/01611190701593228}, doi = {10.1080/01611190701593228}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Parakh08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/PhanS08, author = {Raphael Chung{-}Wei Phan and Adi Shamir}, title = {Improved Related-key Attacks on Desx and Desx+}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {13--22}, year = {2008}, url = {https://doi.org/10.1080/01611190701743690}, doi = {10.1080/01611190701743690}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/PhanS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schrodel08, author = {Tobias Schr{\"{o}}del}, title = {Breaking Short Vigen{\`{e}}re Ciphers}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {334--347}, year = {2008}, url = {https://doi.org/10.1080/01611190802336097}, doi = {10.1080/01611190802336097}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Schrodel08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SrikwanJ08, author = {Sukamol Srikwan and Markus Jakobsson}, title = {Using Cartoons to Teach Internet Security}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {137--154}, year = {2008}, url = {https://doi.org/10.1080/01611190701743724}, doi = {10.1080/01611190701743724}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SrikwanJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel08, author = {Brian J. Winkel}, title = {Lessons Learned from a Mathematical Cryptology Course}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {45--55}, year = {2008}, url = {https://doi.org/10.1080/01611190701489732}, doi = {10.1080/01611190701489732}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X08, title = {Can You Break the Nku Monopoly?}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {197}, year = {2008}, url = {https://doi.org/10.1080/01611190801920263}, doi = {10.1080/01611190801920263}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/X08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/YangC08, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, title = {Security Analysis of Authentication of Images Using Recursive Visual Cryptography}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {131--136}, year = {2008}, url = {https://doi.org/10.1080/01611190701869669}, doi = {10.1080/01611190701869669}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/YangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Alvarez07, author = {David {\'{A}}lvarez}, title = {Wilhelm Fenner and the Development of the German Cipher Bureau, 1922-1939}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {152--163}, year = {2007}, url = {https://doi.org/10.1080/01611190601038225}, doi = {10.1080/01611190601038225}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Alvarez07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer07, author = {Craig P. Bauer}, title = {Letter from the Editor}, journal = {Cryptologia}, volume = {31}, number = {1}, pages = {1}, year = {2007}, url = {https://doi.org/10.1080/01611190601071986}, doi = {10.1080/01611190601071986}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer07a, author = {Craig P. Bauer}, title = {A Note of Thanks}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {368}, year = {2007}, url = {https://doi.org/10.1080/01611190701583427}, doi = {10.1080/01611190701583427}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BauerB07, author = {Craig P. Bauer and Joel Burkholder}, title = {From the Archives: Reading Stimson's Mail}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {179--184}, year = {2007}, url = {https://doi.org/10.1080/01611190701216499}, doi = {10.1080/01611190701216499}, timestamp = {Sat, 31 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BauerB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BauerM07, author = {Craig P. Bauer and Katherine Millward}, title = {Cracking Matrix Encryption Row by Row}, journal = {Cryptologia}, volume = {31}, number = {1}, pages = {76--83}, year = {2007}, url = {https://doi.org/10.1080/01611190600947806}, doi = {10.1080/01611190600947806}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BauerM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Buonafalce07, author = {Augusto Buonafalce}, title = {Review of The Curse of the Voynich. The Secret History of the World's Most Mysterious Manuscript by Nicholas Pelling}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {361--362}, year = {2007}, url = {https://doi.org/10.1080/01611190701244541}, doi = {10.1080/01611190701244541}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Buonafalce07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke07, author = {Colin B. Burke}, title = {From the Archives: Codebreaking (or not) in Shanghai}, journal = {Cryptologia}, volume = {31}, number = {1}, pages = {84--86}, year = {2007}, url = {https://doi.org/10.1080/01611190601039686}, doi = {10.1080/01611190601039686}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury07, author = {Jan Bury}, title = {From the Archives: Polish Interwar Mfa's Cipher Compromised?}, journal = {Cryptologia}, volume = {31}, number = {3}, pages = {268--277}, year = {2007}, url = {https://doi.org/10.1080/01611190701399857}, doi = {10.1080/01611190701399857}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury07a, author = {Jan Bury}, title = {From the Archives: The {U.S.} and West German Agent Radio Ciphers}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {343--357}, year = {2007}, url = {https://doi.org/10.1080/01611190701578104}, doi = {10.1080/01611190701578104}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen07, author = {Chris Christensen}, title = {Review of Mathematical Ciphers from Caesar to Rsa by Anne L. Young}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {185--187}, year = {2007}, url = {https://doi.org/10.1080/01611190601185810}, doi = {10.1080/01611190601185810}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen07a, author = {Chris Christensen}, title = {Review of Decrypted Secrets: Methods and Maxims of Cryptology, Fourth Edition by F. L. Bauer}, journal = {Cryptologia}, volume = {31}, number = {3}, pages = {281--283}, year = {2007}, url = {https://doi.org/10.1080/01611190701404962}, doi = {10.1080/01611190701404962}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChristensenL07, author = {Chris Christensen and Robert E. Lewand}, title = {2008 Joint Mathematics Meetings Contributed Paper Session: Cryptology for Undergraduates}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {367}, year = {2007}, url = {https://doi.org/10.1080/01611190701582775}, doi = {10.1080/01611190701582775}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChristensenL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/David07, author = {James David}, title = {Bourbon Operations in China following World War Ii}, journal = {Cryptologia}, volume = {31}, number = {3}, pages = {254--262}, year = {2007}, url = {https://doi.org/10.1080/01611190701313957}, doi = {10.1080/01611190701313957}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/David07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley07, author = {John F. Dooley}, title = {Reviews of Cryptologic Fiction}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {192--195}, year = {2007}, url = {https://doi.org/10.1080/01611190701216333}, doi = {10.1080/01611190701216333}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley07a, author = {John F. Dooley}, title = {Reviews of Cryptologic Fiction}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {363--366}, year = {2007}, url = {https://doi.org/10.1080/01611190701582353}, doi = {10.1080/01611190701582353}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Esq07, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {31}, number = {1}, pages = {92--94}, year = {2007}, url = {https://doi.org/10.1080/01611190601072257}, doi = {10.1080/01611190601072257}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Esq07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/EsqX07, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {31}, number = {3}, pages = {284--287}, year = {2007}, url = {https://doi.org/10.1080/01611190701405357}, doi = {10.1080/01611190701405357}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/EsqX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/FuensantaE07, author = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and Francisco Javier L{\'{o}}pez{-}Brea Espiau}, title = {The Strip Cipher-The Spanish Official Method}, journal = {Cryptologia}, volume = {31}, number = {1}, pages = {46--56}, year = {2007}, url = {https://doi.org/10.1080/01611190600954836}, doi = {10.1080/01611190600954836}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/FuensantaE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gathen07, author = {Joachim von zur Gathen}, title = {Zimmermann Telegram: The Original Draft}, journal = {Cryptologia}, volume = {31}, number = {1}, pages = {2--37}, year = {2007}, url = {https://doi.org/10.1080/01611190600921165}, doi = {10.1080/01611190600921165}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Gathen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gladwin07, author = {Lee A. Gladwin}, title = {Bulldozer: a Cribless Rapid Analytical Machine (ram) Solution to Enigma and its Variations}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {305--315}, year = {2007}, url = {https://doi.org/10.1080/01611190701506022}, doi = {10.1080/01611190701506022}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gladwin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GuptaSC07, author = {Indivar Gupta and Jasbir Singh and Roopika Chaudhary}, title = {Cryptanalysis of an Extension of the Hill Cipher}, journal = {Cryptologia}, volume = {31}, number = {3}, pages = {246--253}, year = {2007}, url = {https://doi.org/10.1080/01611190701202465}, doi = {10.1080/01611190701202465}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GuptaSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer07, author = {David Hamer}, title = {Review of Thirty Secret Years: {A.G.} Denniston's Work in Signals Intelligence: 1914-1944 by Robin Denniston}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {358--360}, year = {2007}, url = {https://doi.org/10.1080/01611190701583088}, doi = {10.1080/01611190701583088}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hatch07, author = {David A. Hatch}, title = {The Punitive Expedition Military Reform and Communications Intelligence}, journal = {Cryptologia}, volume = {31}, number = {1}, pages = {38--45}, year = {2007}, url = {https://doi.org/10.1080/01611190600964264}, doi = {10.1080/01611190600964264}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hatch07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hoffman07, author = {Nick Hoffman}, title = {A Simplified Idea Algorithm}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {143--151}, year = {2007}, url = {https://doi.org/10.1080/01611190701215640}, doi = {10.1080/01611190701215640}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hoffman07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HoldenerH07, author = {Judy A. Holdener and Eric J. Holdener}, title = {A Cryptographic Scavenger Hunt}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {316--323}, year = {2007}, url = {https://doi.org/10.1080/01611190701245050}, doi = {10.1080/01611190701245050}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HoldenerH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Jacobsen07, author = {Philip H. Jacobsen}, title = {Station Al - Guadalcanal: a Full Service Wwii Cryptologic Unit}, journal = {Cryptologia}, volume = {31}, number = {1}, pages = {57--75}, year = {2007}, url = {https://doi.org/10.1080/01611190600921124}, doi = {10.1080/01611190600921124}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Jacobsen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Jacobsen07a, author = {Philip H. Jacobsen}, title = {Radio Silence of the Pearl Harbor Strike Force Confirmed Again: the Saga of Secret Message Serial (sms) Numbers}, journal = {Cryptologia}, volume = {31}, number = {3}, pages = {223--232}, year = {2007}, url = {https://doi.org/10.1080/01611190701313940}, doi = {10.1080/01611190701313940}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Jacobsen07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Joyner07, author = {David Joyner}, title = {Review of Authentication Codes and Combinatorial Designs by Dingyi Pei}, journal = {Cryptologia}, volume = {31}, number = {1}, pages = {89--91}, year = {2007}, url = {https://doi.org/10.1080/01611190600961443}, doi = {10.1080/01611190600961443}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Joyner07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn07, author = {David Kahn}, title = {The Old Master of Austrian Cryptology}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {188--191}, year = {2007}, url = {https://doi.org/10.1080/01611190701216341}, doi = {10.1080/01611190701216341}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn07a, author = {David Kahn}, title = {Histoire Cryptologique - {A} Book Review}, journal = {Cryptologia}, volume = {31}, number = {3}, pages = {278--280}, year = {2007}, url = {https://doi.org/10.1080/01611190701244335}, doi = {10.1080/01611190701244335}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh07, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {196--200}, year = {2007}, url = {https://doi.org/10.1080/01611190701215392}, doi = {10.1080/01611190701215392}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kuhl07, author = {Alex Kuhl}, title = {Rejewski's Catalog}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {326--331}, year = {2007}, url = {https://doi.org/10.1080/01611190701299487}, doi = {10.1080/01611190701299487}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kuhl07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lewand07, author = {Robert E. Lewand}, title = {A Cryptology Course at Bletchley Park}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {108--111}, year = {2007}, url = {https://doi.org/10.1080/01611190601013582}, doi = {10.1080/01611190601013582}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Lewand07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MachiaveloR07, author = {Ant{\'{o}}nio Machiavelo and Rog{\'{e}}rio Reis}, title = {Automated Ciphertext - Only Cryptanalysis of the Bifid Cipher}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {112--124}, year = {2007}, url = {https://doi.org/10.1080/01611190601134222}, doi = {10.1080/01611190601134222}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MachiaveloR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MarnasAB07, author = {Stelios I. Marnas and Lefteris Angelis and Georgios L. Bleris}, title = {An Application of Quasigroups in All-Or-Nothing Transform}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {133--142}, year = {2007}, url = {https://doi.org/10.1080/01611190601186255}, doi = {10.1080/01611190601186255}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MarnasAB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mills07, author = {Donald Mills}, title = {Review of Cryptography: Theory and Practice by D. R. Stinson}, journal = {Cryptologia}, volume = {31}, number = {1}, pages = {87--88}, year = {2007}, url = {https://doi.org/10.1080/01611190600964785}, doi = {10.1080/01611190600964785}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mills07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Olson07, author = {Edwin Olson}, title = {Robust Dictionary Attack of Short Simple Substitution Ciphers}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {332--342}, year = {2007}, url = {https://doi.org/10.1080/01611190701272369}, doi = {10.1080/01611190701272369}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Olson07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Parakh07, author = {Abhishek Parakh}, title = {Oblivious Transfer Using Elliptic Curves}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {125--132}, year = {2007}, url = {https://doi.org/10.1080/01611190601144478}, doi = {10.1080/01611190601144478}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Parakh07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Paulis07, author = {Herbert Paulis}, title = {The Scheuble Apparatus}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {164--178}, year = {2007}, url = {https://doi.org/10.1080/01611190601013624}, doi = {10.1080/01611190601013624}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Paulis07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rislakki07, author = {Jukka Rislakki}, title = {Searching for Cryptology's Great Wreck}, journal = {Cryptologia}, volume = {31}, number = {3}, pages = {263--267}, year = {2007}, url = {https://doi.org/10.1080/01611190701244392}, doi = {10.1080/01611190701244392}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rislakki07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schinner07, author = {Andreas Schinner}, title = {The Voynich Manuscript: Evidence of the Hoax Hypothesis}, journal = {Cryptologia}, volume = {31}, number = {2}, pages = {95--107}, year = {2007}, url = {https://doi.org/10.1080/01611190601133539}, doi = {10.1080/01611190601133539}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Schinner07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Shepherd07, author = {Simon J. Shepherd}, title = {The Tiny Encryption Algorithm}, journal = {Cryptologia}, volume = {31}, number = {3}, pages = {233--245}, year = {2007}, url = {https://doi.org/10.1080/01611190601090606}, doi = {10.1080/01611190601090606}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Shepherd07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sibert07, author = {Olin Sibert}, title = {Robert W. Baldwin, 1957-2007}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {289--291}, year = {2007}, url = {https://doi.org/10.1080/01611190701653279}, doi = {10.1080/01611190701653279}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sibert07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SibertB07, author = {W. Olin Sibert and Robert W. Baldwin}, title = {The Multics encipher{\_}Algorithm}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {292--304}, year = {2007}, url = {https://doi.org/10.1080/01611190701506105}, doi = {10.1080/01611190701506105}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SibertB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/StampC07, author = {Mark Stamp and Wing On Chan}, title = {Sigaba: Cryptanalysis of the Full Keyspace}, journal = {Cryptologia}, volume = {31}, number = {3}, pages = {201--222}, year = {2007}, url = {https://doi.org/10.1080/01611190701394650}, doi = {10.1080/01611190701394650}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/StampC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Zhong07, author = {Sheng Zhong}, title = {An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol}, journal = {Cryptologia}, volume = {31}, number = {4}, pages = {324--325}, year = {2007}, url = {https://doi.org/10.1080/01611190701548180}, doi = {10.1080/01611190701548180}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Zhong07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BauerU06, author = {Craig P. Bauer and John Ulrich}, title = {The Cryptologic Contributions of Dr. Donald Menzel}, journal = {Cryptologia}, volume = {30}, number = {4}, pages = {306--339}, year = {2006}, url = {https://doi.org/10.1080/01611190600920951}, doi = {10.1080/01611190600920951}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BauerU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Biard06, author = {Forrest R. Biard}, title = {Breaking of Japanese Naval Codes: Pre-Pearl Harbor to Midway}, journal = {Cryptologia}, volume = {30}, number = {2}, pages = {151--158}, year = {2006}, url = {https://doi.org/10.1080/01611190500380074}, doi = {10.1080/01611190500380074}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Biard06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Blackman06, author = {Deane R. Blackman}, title = {Note on Geheimschreiber Cam Wheels}, journal = {Cryptologia}, volume = {30}, number = {1}, pages = {53--54}, year = {2006}, url = {https://doi.org/10.1080/01611190500371818}, doi = {10.1080/01611190500371818}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Blackman06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Boklan06, author = {Kent D. Boklan}, title = {How {I} Broke the Confederate Code {(137} Years Too Late)}, journal = {Cryptologia}, volume = {30}, number = {4}, pages = {340--345}, year = {2006}, url = {https://doi.org/10.1080/01611190600826729}, doi = {10.1080/01611190600826729}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Boklan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Brawley06, author = {Joel V. Brawley}, title = {In Memory of Jack Levine {(1907-2005)}}, journal = {Cryptologia}, volume = {30}, number = {2}, pages = {83--97}, year = {2006}, url = {https://doi.org/10.1080/01611190600557050}, doi = {10.1080/01611190600557050}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Brawley06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Buonafalce06, author = {Augusto Buonafalce}, title = {Bellaso's Reciprocal Ciphers}, journal = {Cryptologia}, volume = {30}, number = {1}, pages = {39--51}, year = {2006}, url = {https://doi.org/10.1080/01611190500383581}, doi = {10.1080/01611190500383581}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Buonafalce06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BuonafalceFT06, author = {Augusto Buonafalce and Niels Faurholt and Bjarne Toft}, title = {Julius Petersen - Danish Mathematician and Cryptologist}, journal = {Cryptologia}, volume = {30}, number = {4}, pages = {353--360}, year = {2006}, url = {https://doi.org/10.1080/01611190600920969}, doi = {10.1080/01611190600920969}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BuonafalceFT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury06, author = {Jan Bury}, title = {Telma - a Polish Wireless Communications Security Machine of World War Ii}, journal = {Cryptologia}, volume = {30}, number = {1}, pages = {31--38}, year = {2006}, url = {https://doi.org/10.1080/01611190500401102}, doi = {10.1080/01611190500401102}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Donovan06, author = {Peter W. Donovan}, title = {The Indicators of Japanese Ciphers 2468, 7890, and Jn-25a1}, journal = {Cryptologia}, volume = {30}, number = {3}, pages = {212--235}, year = {2006}, url = {https://doi.org/10.1080/01611190500544695}, doi = {10.1080/01611190500544695}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Donovan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine06, author = {Ralph Erskine}, title = {The 1944 Naval Brusa Agreement and its Aftermath}, journal = {Cryptologia}, volume = {30}, number = {1}, pages = {1--22}, year = {2006}, url = {https://doi.org/10.1080/01611190500401086}, doi = {10.1080/01611190500401086}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine06a, author = {Ralph Erskine}, title = {The Poles Reveal their Secrets: Alastair Denniston's Account of the July 1939 Meeting at Pyry}, journal = {Cryptologia}, volume = {30}, number = {4}, pages = {294--305}, year = {2006}, url = {https://doi.org/10.1080/01611190600920944}, doi = {10.1080/01611190600920944}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Faurholt06, author = {Niels Faurholt}, title = {Alexis K{\o}hl: a Danish Inventor of Cryptosystems}, journal = {Cryptologia}, volume = {30}, number = {1}, pages = {23--29}, year = {2006}, url = {https://doi.org/10.1080/01611190500380066}, doi = {10.1080/01611190500380066}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Faurholt06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Freeman06, author = {Peter Freeman}, title = {The Zimmermann Telegram Revisited: {A} Reconciliation of the Primary Sources}, journal = {Cryptologia}, volume = {30}, number = {2}, pages = {98--150}, year = {2006}, url = {https://doi.org/10.1080/01611190500428634}, doi = {10.1080/01611190500428634}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Freeman06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gallehawk06, author = {John Gallehawk}, title = {Third Person Singular (Warsaw, 1939)}, journal = {Cryptologia}, volume = {30}, number = {3}, pages = {193--198}, year = {2006}, url = {https://doi.org/10.1080/01611190600612129}, doi = {10.1080/01611190600612129}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gallehawk06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gladwin06, author = {Lee A. Gladwin}, title = {Did Sigint Seal the Fates of 19, 000 Pows?}, journal = {Cryptologia}, volume = {30}, number = {3}, pages = {199--211}, year = {2006}, url = {https://doi.org/10.1080/01611190600724387}, doi = {10.1080/01611190600724387}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gladwin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Griffing06, author = {Alexander Griffing}, title = {Solving Xor Plaintext Strings with the Viterbi Algorithm}, journal = {Cryptologia}, volume = {30}, number = {3}, pages = {258--265}, year = {2006}, url = {https://doi.org/10.1080/01611190600630386}, doi = {10.1080/01611190600630386}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Griffing06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Griffing06a, author = {Alexander Griffing}, title = {Solving the Running Key Cipher with the Viterbi Algorithm}, journal = {Cryptologia}, volume = {30}, number = {4}, pages = {361--367}, year = {2006}, url = {https://doi.org/10.1080/01611190600789117}, doi = {10.1080/01611190600789117}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Griffing06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HoldenLMH06, author = {Joshua Holden and Richard Layton and Laurence D. Merkle and Tina A. Hudson}, title = {Underwater Hacker Missile Wars: {A} Cryptography and Engineering Contest}, journal = {Cryptologia}, volume = {30}, number = {1}, pages = {69--77}, year = {2006}, url = {https://doi.org/10.1080/01611190500401144}, doi = {10.1080/01611190500401144}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HoldenLMH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/JoynerK06, author = {David Joyner and David Kahn}, title = {Edited Transcript of Interview with Peter Hilton for "Secrets of War"}, journal = {Cryptologia}, volume = {30}, number = {3}, pages = {236--250}, year = {2006}, url = {https://doi.org/10.1080/01611190500379894}, doi = {10.1080/01611190500379894}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/JoynerK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh06, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {30}, number = {1}, pages = {79--81}, year = {2006}, url = {https://doi.org/10.1080/01611190500403702}, doi = {10.1080/01611190500403702}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh06a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {30}, number = {2}, pages = {181--192}, year = {2006}, url = {https://doi.org/10.1080/01611190600548042}, doi = {10.1080/01611190600548042}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh06b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {30}, number = {3}, pages = {287--291}, year = {2006}, url = {https://doi.org/10.1080/01611190600726341}, doi = {10.1080/01611190600726341}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh06b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh06c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {30}, number = {4}, pages = {370--374}, year = {2006}, url = {https://doi.org/10.1080/01611190600921058}, doi = {10.1080/01611190600921058}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh06c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mills06, author = {Donald Mills}, title = {Review of \emph{Introduction to Coding Theory} by Ron M. Roth}, journal = {Cryptologia}, volume = {30}, number = {4}, pages = {368--369}, year = {2006}, url = {https://doi.org/10.1080/01611190600921041}, doi = {10.1080/01611190600921041}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mills06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/OliveiraXC06, author = {Claudia Oliveira and Jos{\'{e}} Ant{\^{o}}nio Xex{\'{e}}o and Carlos Andr{\'{e}} Carvalho}, title = {Clustering and Categorization Applied to Cryptanalysis}, journal = {Cryptologia}, volume = {30}, number = {3}, pages = {266--280}, year = {2006}, url = {https://doi.org/10.1080/01611190600694457}, doi = {10.1080/01611190600694457}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/OliveiraXC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/PenumarthiK06, author = {Kiranmayi Penumarthi and Subhash C. Kak}, title = {Augmented Watermarking}, journal = {Cryptologia}, volume = {30}, number = {2}, pages = {173--180}, year = {2006}, url = {https://doi.org/10.1080/01611190500541824}, doi = {10.1080/01611190500541824}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/PenumarthiK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Pommerening06, author = {Klaus Pommerening}, title = {Kasiski's Test: Couldn't the Repetitions be by Accident?}, journal = {Cryptologia}, volume = {30}, number = {4}, pages = {346--352}, year = {2006}, url = {https://doi.org/10.1080/01611190600803819}, doi = {10.1080/01611190600803819}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Pommerening06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schmeh06, author = {Klaus Schmeh}, title = {The East German Encryption Machine {T-310} and the Algorithm It Used}, journal = {Cryptologia}, volume = {30}, number = {3}, pages = {251--257}, year = {2006}, url = {https://doi.org/10.1080/01611190600632457}, doi = {10.1080/01611190600632457}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schmeh06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Simons06, author = {John L. Simons}, title = {Bridge Cryptography Fundamentals}, journal = {Cryptologia}, volume = {30}, number = {3}, pages = {281--286}, year = {2006}, url = {https://doi.org/10.1080/01611190600726358}, doi = {10.1080/01611190600726358}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Simons06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Stallings06, author = {William Stallings}, title = {The Whirlpool Secure Hash Function}, journal = {Cryptologia}, volume = {30}, number = {1}, pages = {55--67}, year = {2006}, url = {https://doi.org/10.1080/01611190500380090}, doi = {10.1080/01611190500380090}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Stallings06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Talbert06, author = {Robert Talbert}, title = {The Cycle Structure and Order of the Rail Fence Cipher}, journal = {Cryptologia}, volume = {30}, number = {2}, pages = {159--172}, year = {2006}, url = {https://doi.org/10.1080/01611190500380082}, doi = {10.1080/01611190500380082}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Talbert06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel06, author = {Brian J. Winkel}, title = {Letter from the Editor}, journal = {Cryptologia}, volume = {30}, number = {4}, pages = {293}, year = {2006}, url = {https://doi.org/10.1080/01611190600921132}, doi = {10.1080/01611190600921132}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BauerG05, author = {Craig P. Bauer and Suzanne E. Gladfelter}, title = {Cryptology in York Pennsylvania}, journal = {Cryptologia}, volume = {29}, number = {2}, pages = {159--175}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893861}, doi = {10.1080/0161-110591893861}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BauerG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BauerG05a, author = {Craig P. Bauer and Elliott J. Gottloeb}, title = {Results of an Automated Attack on the Running Key Cipher}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {248--254}, year = {2005}, url = {https://doi.org/10.1080/01611190508951301}, doi = {10.1080/01611190508951301}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BauerG05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bruckner05, author = {Hilmar{-}Detlef Br{\"{u}}ckner}, title = {Germany's First Cryptanalysis on the Western Front: Decrypting British and French Naval Ciphers in World War {I}}, journal = {Cryptologia}, volume = {29}, number = {1}, pages = {1--22}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893735}, doi = {10.1080/0161-110591893735}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bruckner05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CooperA05, author = {Rodney H. Cooper and Christopher G. Andrews}, title = {The Public Key Covert Channel}, journal = {Cryptologia}, volume = {29}, number = {1}, pages = {73--75}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893780}, doi = {10.1080/0161-110591893780}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CooperA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CorderyP05, author = {Robert Cordery and Leon Pintsov}, title = {History and Role of Information Security in Postage Evidencing and Payment}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {257--271}, year = {2005}, url = {https://doi.org/10.1080/01611190508951303}, doi = {10.1080/01611190508951303}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CorderyP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley05, author = {John F. Dooley}, title = {Codes and Ciphers in Fiction: an Overview}, journal = {Cryptologia}, volume = {29}, number = {4}, pages = {290--328}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893898}, doi = {10.1080/0161-110591893898}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gladwin05, author = {Lee A. Gladwin}, title = {The Diplomacy of Security: behind the Negotiations of Article 18 of the Sino-american Cooperative Agreement}, journal = {Cryptologia}, volume = {29}, number = {1}, pages = {23--42}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893744}, doi = {10.1080/0161-110591893744}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gladwin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ingerman05, author = {Peter Zilahy Ingerman}, title = {Two Hebern Cryptographic Machines}, journal = {Cryptologia}, volume = {29}, number = {2}, pages = {127--147}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893843}, doi = {10.1080/0161-110591893843}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ingerman05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Jacobsen05, author = {Philip H. Jacobsen}, title = {Pearl Harbor: Radio Officer Leslie Grogan of the Ss Lurline and his Misidentified Signals}, journal = {Cryptologia}, volume = {29}, number = {2}, pages = {97--120}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893825}, doi = {10.1080/0161-110591893825}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Jacobsen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn05, author = {David Kahn}, title = {The Man in the Iron Mask - Encore Et Enfin, Cryptologically}, journal = {Cryptologia}, volume = {29}, number = {1}, pages = {43--49}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893753}, doi = {10.1080/0161-110591893753}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn05a, author = {David Kahn}, title = {From the Archives: Codetalkers not Wanted}, journal = {Cryptologia}, volume = {29}, number = {1}, pages = {76--87}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893799}, doi = {10.1080/0161-110591893799}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn05b, author = {David Kahn}, title = {David Shulman Dies - the Bibliographer of Cryptology}, journal = {Cryptologia}, volume = {29}, number = {1}, pages = {94--95}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893816}, doi = {10.1080/0161-110591893816}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn05c, author = {David Kahn}, title = {The Polish Enigma Conference and some Excursions}, journal = {Cryptologia}, volume = {29}, number = {2}, pages = {121--126}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893834}, doi = {10.1080/0161-110591893834}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn05d, author = {David Kahn}, title = {How Garbles Tickled History}, journal = {Cryptologia}, volume = {29}, number = {4}, pages = {329--336}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893906}, doi = {10.1080/0161-110591893906}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {29}, number = {1}, pages = {88--93}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893807}, doi = {10.1080/0161-110591893807}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {29}, number = {2}, pages = {176--187}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893870}, doi = {10.1080/0161-110591893870}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05b, author = {Louis Kruh}, title = {Unknown Military Coding Device Can You Identify It?}, journal = {Cryptologia}, volume = {29}, number = {2}, pages = {190--191}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893889}, doi = {10.1080/0161-110591893889}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05c, author = {Louis Kruh}, title = {Enigma Articles from Cryptologia}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {272--273}, year = {2005}, url = {https://doi.org/10.1080/01611190508951304}, doi = {10.1080/01611190508951304}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05d, author = {Louis Kruh}, title = {Crypto User's Guide}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {273}, year = {2005}, url = {https://doi.org/10.1080/01611190508951305}, doi = {10.1080/01611190508951305}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05e, author = {Louis Kruh}, title = {Confederate Treasure Issues}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {274}, year = {2005}, url = {https://doi.org/10.1080/01611190508951306}, doi = {10.1080/01611190508951306}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05f, author = {Louis Kruh}, title = {Detective Notebook for Young Adults}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {274--275}, year = {2005}, url = {https://doi.org/10.1080/01611190508951307}, doi = {10.1080/01611190508951307}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05g, author = {Louis Kruh}, title = {College-level Math Crypto Text}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {275}, year = {2005}, url = {https://doi.org/10.1080/01611190508951308}, doi = {10.1080/01611190508951308}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05h, author = {Louis Kruh}, title = {Code Names Post 9/11}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {276}, year = {2005}, url = {https://doi.org/10.1080/01611190508951309}, doi = {10.1080/01611190508951309}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05i, author = {Louis Kruh}, title = {Coral Sea, Midway, and Aleutians Naval Intelligence}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {276--277}, year = {2005}, url = {https://doi.org/10.1080/01611190508951310}, doi = {10.1080/01611190508951310}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05j, author = {Louis Kruh}, title = {Broad View of Power of Mathematics}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {277--278}, year = {2005}, url = {https://doi.org/10.1080/01611190508951311}, doi = {10.1080/01611190508951311}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05k, author = {Louis Kruh}, title = {Friedman Legacy}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {278}, year = {2005}, url = {https://doi.org/10.1080/01611190508951312}, doi = {10.1080/01611190508951312}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05l, author = {Louis Kruh}, title = {Pearl Harbor Revisited}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {278--279}, year = {2005}, url = {https://doi.org/10.1080/01611190508951313}, doi = {10.1080/01611190508951313}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05m, author = {Louis Kruh}, title = {Global Eavesdropping}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {279--280}, year = {2005}, url = {https://doi.org/10.1080/01611190508951314}, doi = {10.1080/01611190508951314}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05n, author = {Louis Kruh}, title = {Cryptology in American History}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {280}, year = {2005}, url = {https://doi.org/10.1080/01611190508951315}, doi = {10.1080/01611190508951315}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05o, author = {Louis Kruh}, title = {Hms Dunedin Acts on Enigma Material}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {280--281}, year = {2005}, url = {https://doi.org/10.1080/01611190508951316}, doi = {10.1080/01611190508951316}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05p, author = {Louis Kruh}, title = {Novel Secrets}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {281--282}, year = {2005}, url = {https://doi.org/10.1080/01611190508951317}, doi = {10.1080/01611190508951317}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh05q, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {29}, number = {4}, pages = {377--380}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893942}, doi = {10.1080/0161-110591893942}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh05q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lawrence05, author = {John Lawrence}, title = {A Study of Rejewski's Equations}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {233--247}, year = {2005}, url = {https://doi.org/10.1080/01611190508951300}, doi = {10.1080/01611190508951300}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Lawrence05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lawrence05a, author = {John Lawrence}, title = {Factoring for the Plugboard - Was Rejewski's Proposed Solution for Breaking the Enigma Feasible?}, journal = {Cryptologia}, volume = {29}, number = {4}, pages = {343--366}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893924}, doi = {10.1080/0161-110591893924}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Lawrence05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MandhaniK05, author = {Navneet Mandhani and Subhash C. Kak}, title = {Watermarking Using Decimal Sequences}, journal = {Cryptologia}, volume = {29}, number = {1}, pages = {50--58}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893762}, doi = {10.1080/0161-110591893762}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MandhaniK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/OverbeyTW05, author = {Jeffrey Overbey and William N. Traves and Jerzy Wojdylo}, title = {On the Keyspace of the Hill Cipher}, journal = {Cryptologia}, volume = {29}, number = {1}, pages = {59--72}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893771}, doi = {10.1080/0161-110591893771}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/OverbeyTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Pekelney05, author = {Richard Pekelney}, title = {Excellent, Exceptional, Enormous Crypto Source}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {255--256}, year = {2005}, url = {https://doi.org/10.1080/01611190508951302}, doi = {10.1080/01611190508951302}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Pekelney05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Phan05, author = {Raphael C.{-}W. Phan}, title = {How to Explain Block Cipher Cryptanalysis to your Kids}, journal = {Cryptologia}, volume = {29}, number = {2}, pages = {148--158}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893852}, doi = {10.1080/0161-110591893852}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Phan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rocca05, author = {Charles F. Rocca}, title = {Cryptology in General Education}, journal = {Cryptologia}, volume = {29}, number = {4}, pages = {337--342}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893915}, doi = {10.1080/0161-110591893915}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rocca05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SullivanW05, author = {Geoff Sullivan and Frode Weierud}, title = {Breaking German Army Ciphers}, journal = {Cryptologia}, volume = {29}, number = {3}, pages = {193--232}, year = {2005}, url = {https://doi.org/10.1080/01611190508951299}, doi = {10.1080/01611190508951299}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/SullivanW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ThilakaR05, author = {B. Thilaka and K. Rajalakshmi}, title = {An Extension of Hill Cipher Using Generalised Inverses and Mth Residue Modulo {N}}, journal = {Cryptologia}, volume = {29}, number = {4}, pages = {367--376}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893933}, doi = {10.1080/0161-110591893933}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ThilakaR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Al-Ubaidy04, author = {Mahmood Khalel Ibrahem Al{-}Ubaidy}, title = {Black-Box Attack Using Neuro-Identifier}, journal = {Cryptologia}, volume = {28}, number = {4}, pages = {358--372}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892980}, doi = {10.1080/0161-110491892980}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Al-Ubaidy04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Buonafalce04, author = {Augusto Buonafalce}, title = {Sir Samuel Morland's Machina Cyclologica Cryptographica}, journal = {Cryptologia}, volume = {28}, number = {3}, pages = {253--264}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892917}, doi = {10.1080/0161-110491892917}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Buonafalce04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury04, author = {Jan Bury}, title = {Polish Codebreaking during the Russo-Polish War of 1919-1920}, journal = {Cryptologia}, volume = {28}, number = {3}, pages = {193--203}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892872}, doi = {10.1080/0161-110491892872}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Cowan04, author = {Michael J. Cowan}, title = {Rasterschl{\"{u}}Ssel 44 - the epitome of Hand Field Ciphers}, journal = {Cryptologia}, volume = {28}, number = {2}, pages = {115--148}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892827}, doi = {10.1080/0161-110491892827}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Cowan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Donovan04, author = {Peter Donovan}, title = {The Flaw in the Jn25 Series of Ciphers}, journal = {Cryptologia}, volume = {28}, number = {4}, pages = {325--340}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892962}, doi = {10.1080/0161-110491892962}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Donovan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Driskell04, author = {Lisa Driskell}, title = {Wavelet-Based Steganography}, journal = {Cryptologia}, volume = {28}, number = {2}, pages = {157--174}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892854}, doi = {10.1080/0161-110491892854}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Driskell04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ErskineM04, author = {Ralph Erskine and Philip Marks}, title = {Naval Enigma: Seahorse and Other Kriegsmarine Cipher Blunders}, journal = {Cryptologia}, volume = {28}, number = {3}, pages = {211--241}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892890}, doi = {10.1080/0161-110491892890}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ErskineM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Fuensanta04, author = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta}, title = {Mechanical Cipher Systems in the Spanish Civil War}, journal = {Cryptologia}, volume = {28}, number = {3}, pages = {265--276}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892926}, doi = {10.1080/0161-110491892926}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Fuensanta04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gathen04, author = {Joachim von zur Gathen}, title = {Friederich Johann buck: Arithmetic Puzzles in Cryptography}, journal = {Cryptologia}, volume = {28}, number = {4}, pages = {309--324}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892953}, doi = {10.1080/0161-110491892953}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gathen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Holden04, author = {Joshua Holden}, title = {A Comparison of Cryptography Courses}, journal = {Cryptologia}, volume = {28}, number = {2}, pages = {97--111}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892809}, doi = {10.1080/0161-110491892809}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Holden04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn04, author = {David Kahn}, title = {Charles J. Mendelsohn and Why {I} Envy Him}, journal = {Cryptologia}, volume = {28}, number = {1}, pages = {1--17}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892737}, doi = {10.1080/0161-110491892737}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kochanski04, author = {Martin Kochanski}, title = {The Comedy of Commercial Encryption Software}, journal = {Cryptologia}, volume = {28}, number = {1}, pages = {50--54}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892773}, doi = {10.1080/0161-110491892773}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kochanski04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Koss04, author = {Mike Koss}, title = {The Paper Enigma Machine}, journal = {Cryptologia}, volume = {28}, number = {3}, pages = {204--210}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892881}, doi = {10.1080/0161-110491892881}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Koss04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh04, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {28}, number = {1}, pages = {60--95}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892791}, doi = {10.1080/0161-110491892791}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh04a, author = {Louis Kruh}, title = {Unknown German World War {II} Cipher Device}, journal = {Cryptologia}, volume = {28}, number = {2}, pages = {112--114}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892818}, doi = {10.1080/0161-110491892818}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh04b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {28}, number = {2}, pages = {175--190}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892863}, doi = {10.1080/0161-110491892863}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh04c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {28}, number = {3}, pages = {242--252}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892908}, doi = {10.1080/0161-110491892908}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh04c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh04d, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {28}, number = {4}, pages = {373--379}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892999}, doi = {10.1080/0161-110491892999}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh04d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lawrence04, author = {John Lawrence}, title = {The Versatility of Rejewski's Method: Solving for the Wiring of the Second Rotor}, journal = {Cryptologia}, volume = {28}, number = {2}, pages = {149--152}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892836}, doi = {10.1080/0161-110491892836}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Lawrence04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Niblo04, author = {Graham Niblo}, title = {The University of Southampton National Cipher Challenge}, journal = {Cryptologia}, volume = {28}, number = {3}, pages = {277--286}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892935}, doi = {10.1080/0161-110491892935}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Niblo04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Quirantes04, author = {Arturo Quirantes}, title = {Model {Z:} a Numbers-only Enigma Version}, journal = {Cryptologia}, volume = {28}, number = {2}, pages = {153--156}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892845}, doi = {10.1080/0161-110491892845}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Quirantes04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Richard04, author = {Joseph E. Richard}, title = {The Breaking of the Japanese Army's Codes}, journal = {Cryptologia}, volume = {28}, number = {4}, pages = {289--308}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892944}, doi = {10.1080/0161-110491892944}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Richard04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rugg04, author = {Gordon Rugg}, title = {An Elegant Hoax? {A} Possible Solution to the Voynich Manuscript}, journal = {Cryptologia}, volume = {28}, number = {1}, pages = {31--46}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892755}, doi = {10.1080/0161-110491892755}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Rugg04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Savory04, author = {Stuart E. Savory}, title = {Pocket Enigma: the Review}, journal = {Cryptologia}, volume = {28}, number = {1}, pages = {55--59}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892782}, doi = {10.1080/0161-110491892782}, timestamp = {Wed, 01 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Savory04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Stehle04, author = {Damien Stehl{\'{e}}}, title = {Breaking Littlewood's Cipher}, journal = {Cryptologia}, volume = {28}, number = {4}, pages = {341--357}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892971}, doi = {10.1080/0161-110491892971}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Stehle04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Zetterstrom04, author = {Urban Zetterstr{\"{o}}m}, title = {Swedish {SA} Teleprinter Cipher System}, journal = {Cryptologia}, volume = {28}, number = {1}, pages = {18--30}, year = {2004}, url = {https://doi.org/10.1080/0161-110491892746}, doi = {10.1080/0161-110491892746}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Zetterstrom04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Abeles03, author = {Francine F. Abeles}, title = {The Memoria Technica Cipher}, journal = {Cryptologia}, volume = {27}, number = {3}, pages = {217--229}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891892}, doi = {10.1080/0161-110391891892}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Abeles03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AndersonM03, author = {Bob Anderson and George McGinnis}, title = {Naval Security Group Command Display}, journal = {Cryptologia}, volume = {27}, number = {4}, pages = {350--360}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891955}, doi = {10.1080/0161-110391891955}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AndersonM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Buonafalce03, author = {Augusto Buonafalce}, title = {From the Skytale to the Enigma: Book Review}, journal = {Cryptologia}, volume = {27}, number = {2}, pages = {132--134}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891810}, doi = {10.1080/0161-110391891810}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Buonafalce03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Clarkson03, author = {Dorothy Clarkson}, title = {Cypher Machines Maintenance and Restoration Spanning sixty Years}, journal = {Cryptologia}, volume = {27}, number = {3}, pages = {209--216}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891883}, doi = {10.1080/0161-110391891883}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Clarkson03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/David03, author = {James David}, title = {Soviet Secrets in the ether - Clandestine Radio Stations at the New York and {SAN} Francisco Consulates in World War {II}}, journal = {Cryptologia}, volume = {27}, number = {2}, pages = {135--147}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891829}, doi = {10.1080/0161-110391891829}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/David03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine03, author = {Ralph Erskine}, title = {From the Archives What the Sinkov Mission Brought to Bletchley Park}, journal = {Cryptologia}, volume = {27}, number = {2}, pages = {111--118}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891793}, doi = {10.1080/0161-110391891793}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ErskineF03, author = {Ralph Erskine and Peter Freeman}, title = {Brigadier John Tiltman: One of Britain's finest Cryptologists}, journal = {Cryptologia}, volume = {27}, number = {4}, pages = {289--318}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891928}, doi = {10.1080/0161-110391891928}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ErskineF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/FabrisC03, author = {Francesco Fabris and Myron Curtis}, title = {A Nomenclator Used by propaganda fide during the Chinese rites Controversy}, journal = {Cryptologia}, volume = {27}, number = {4}, pages = {319--338}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891937}, doi = {10.1080/0161-110391891937}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/FabrisC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Faurholt03, author = {Niels Faurholt}, title = {Urkryptografen ("the Clock Cryptograph")}, journal = {Cryptologia}, volume = {27}, number = {3}, pages = {206--208}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891874}, doi = {10.1080/0161-110391891874}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Faurholt03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/FreemanSW03, author = {Wes Freeman and Geoff Sullivan and Frode Weierud}, title = {Purple Revealed: Simulation and Computer-Aided Cryptanalysis of Angooki Taipu {B}}, journal = {Cryptologia}, volume = {27}, number = {1}, pages = {1--43}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891739}, doi = {10.1080/0161-110391891739}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/FreemanSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gathen03, author = {Joachim von zur Gathen}, title = {Claude Comiers: the First Arithmetical Cryptography}, journal = {Cryptologia}, volume = {27}, number = {4}, pages = {339--349}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891946}, doi = {10.1080/0161-110391891946}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gathen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gladwin03, author = {Lee A. Gladwin}, title = {Alan M. Turing's Critique of Running Short Cribs on the {US} Navy Bombe}, journal = {Cryptologia}, volume = {27}, number = {1}, pages = {50--54}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891757}, doi = {10.1080/0161-110391891757}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gladwin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer03, author = {David H. Hamer}, title = {The Enigmas - and Other Recovered Artefacts - of {U-85}}, journal = {Cryptologia}, volume = {27}, number = {2}, pages = {97--110}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891784}, doi = {10.1080/0161-110391891784}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Jacobsen03, author = {Philip H. Jacobsen}, title = {Foreknowledge of {PEARL} Harbor? No!: the Story of the U. S. Navy's Efforts on Jn-25b}, journal = {Cryptologia}, volume = {27}, number = {3}, pages = {193--205}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891865}, doi = {10.1080/0161-110391891865}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Jacobsen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh03, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {27}, number = {1}, pages = {55--72}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891766}, doi = {10.1080/0161-110391891766}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh03a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {27}, number = {2}, pages = {182--191}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891856}, doi = {10.1080/0161-110391891856}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh03b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {27}, number = {3}, pages = {230--232}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891900}, doi = {10.1080/0161-110391891900}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh03c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {27}, number = {4}, pages = {375--378}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891973}, doi = {10.1080/0161-110391891973}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh03d, author = {Louis Kruh}, title = {The Shakespeare-Bacon Controversy Continues on the Stage}, journal = {Cryptologia}, volume = {27}, number = {4}, pages = {379--380}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891982}, doi = {10.1080/0161-110391891982}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh03d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Leeuw03, author = {Karl de Leeuw}, title = {The Dutch Invention of the Rotor Machine, 1915-1923}, journal = {Cryptologia}, volume = {27}, number = {1}, pages = {73--94}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891775}, doi = {10.1080/0161-110391891775}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Leeuw03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MusaSW03, author = {Mohammad A. Musa and Edward F. Schaefer and Stephen Wedig}, title = {A Simplified {AES} Algorithm and its Linear and Differential Cryptanalyses}, journal = {Cryptologia}, volume = {27}, number = {2}, pages = {148--177}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891838}, doi = {10.1080/0161-110391891838}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MusaSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Phan03, author = {Raphael Chung{-}Wei Phan}, title = {Impossible Differential Cryptanalysis of Mini-AES}, journal = {Cryptologia}, volume = {27}, number = {4}, pages = {361--374}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891964}, doi = {10.1080/0161-110391891964}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Phan03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ratcliff03, author = {Rebecca A. Ratcliff}, title = {How Statistics {LED} the Germans to Believe Enigma Secure and Why They Were Wrong: neglecting the Practical Mathematics of Cipher Machines}, journal = {Cryptologia}, volume = {27}, number = {2}, pages = {119--131}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891801}, doi = {10.1080/0161-110391891801}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Ratcliff03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sheldon03, author = {Rose Mary Sheldon}, title = {The Sator Rebus: an Unsolved Cryptogram?}, journal = {Cryptologia}, volume = {27}, number = {3}, pages = {233--287}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891919}, doi = {10.1080/0161-110391891919}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sheldon03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Turing03, author = {Alan M. Turing}, title = {Alan M. Turing's Critique of Running Short Cribs on the U. S. Navy Bombe}, journal = {Cryptologia}, volume = {27}, number = {1}, pages = {44--49}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891748}, doi = {10.1080/0161-110391891748}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Turing03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel03, author = {Brian J. Winkel}, title = {Extraordinary Cryptology Collection}, journal = {Cryptologia}, volume = {27}, number = {2}, pages = {180--181}, year = {2003}, url = {https://doi.org/10.1080/0161-110391891847}, doi = {10.1080/0161-110391891847}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BauerT02, author = {Craig Bauer and Christian N. S. Tate}, title = {A Statistical Attack on the Running Key Cipher}, journal = {Cryptologia}, volume = {26}, number = {4}, pages = {274--282}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890939}, doi = {10.1080/0161-110291890939}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BauerT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Beckman02, author = {Bengt Beckman}, title = {An Early Cipher Device: Fredrik Gripenstierna's Machine}, journal = {Cryptologia}, volume = {26}, number = {2}, pages = {113--123}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890821}, doi = {10.1080/0161-110291890821}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Beckman02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Clive02, author = {Keith P. Clive}, title = {The Battle of the seals}, journal = {Cryptologia}, volume = {26}, number = {2}, pages = {103--112}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890812}, doi = {10.1080/0161-110291890812}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Clive02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GlunderW02, author = {Georg Gl{\"{u}}nder and Paul Whitaker}, title = {Wireless and "Geheimschreiber" Operator in the War, 1941 - 1945}, journal = {Cryptologia}, volume = {26}, number = {2}, pages = {81--96}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890786}, doi = {10.1080/0161-110291890786}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GlunderW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GnanaguruparanK02, author = {Meenakshi Gnanaguruparan and Subhash C. Kak}, title = {Recursive Hiding of Secrets in Visual Cryptography}, journal = {Cryptologia}, volume = {26}, number = {1}, pages = {68--76}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890768}, doi = {10.1080/0161-110291890768}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GnanaguruparanK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Heys02, author = {Howard M. Heys}, title = {A Tutorial on Linear and Differential Cryptanalysis}, journal = {Cryptologia}, volume = {26}, number = {3}, pages = {189--221}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890885}, doi = {10.1080/0161-110291890885}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Heys02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn02, author = {David Kahn}, title = {A Riverbank {TROVE}}, journal = {Cryptologia}, volume = {26}, number = {3}, pages = {161--164}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890867}, doi = {10.1080/0161-110291890867}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Koot02, author = {H. Koot}, title = {Expert's Opinion on the Enigma Ciphering Machine}, journal = {Cryptologia}, volume = {26}, number = {2}, pages = {101--102}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890803}, doi = {10.1080/0161-110291890803}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Koot02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh02, author = {Louis Kruh}, title = {The World of Codes and Ciphers at the Heinz Nixdorf Museumsforum}, journal = {Cryptologia}, volume = {26}, number = {1}, pages = {59--67}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890759}, doi = {10.1080/0161-110291890759}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh02a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {26}, number = {1}, pages = {77--79}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890777}, doi = {10.1080/0161-110291890777}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh02b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {26}, number = {2}, pages = {138--158}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890858}, doi = {10.1080/0161-110291890858}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh02c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {26}, number = {3}, pages = {235--239}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890902}, doi = {10.1080/0161-110291890902}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh02c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh02d, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {26}, number = {4}, pages = {307--317}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890957}, doi = {10.1080/0161-110291890957}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh02d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KruhD02, author = {Louis Kruh and Cipher A. Deavours}, title = {The Commercial Enigma: Beginnings of Machine Cryptography}, journal = {Cryptologia}, volume = {26}, number = {1}, pages = {1--16}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890731}, doi = {10.1080/0161-110291890731}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/KruhD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Michie02, author = {Donald Michie}, title = {Colossus and the Breaking of the Wartime "Fish" Codes}, journal = {Cryptologia}, volume = {26}, number = {1}, pages = {17--58}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890740}, doi = {10.1080/0161-110291890740}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Michie02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Phan02, author = {Raphael Chung{-}Wei Phan}, title = {Further Notes for a Self-Study Course in Block-Cipher Cryptanalysis}, journal = {Cryptologia}, volume = {26}, number = {2}, pages = {129--137}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890849}, doi = {10.1080/0161-110291890849}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Phan02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Phan02a, author = {Raphael Chung{-}Wei Phan}, title = {Mini Advanced Encryption Standard (Mini-AES): a Testbed for Cryptanalysis Students}, journal = {Cryptologia}, volume = {26}, number = {4}, pages = {283--306}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890948}, doi = {10.1080/0161-110291890948}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Phan02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Stallings02, author = {William Stallings}, title = {The Advanced Encryption Standard}, journal = {Cryptologia}, volume = {26}, number = {3}, pages = {165--188}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890876}, doi = {10.1080/0161-110291890876}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Stallings02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sullivan02, author = {Geoff Sullivan}, title = {The {ECM} Mark {II:} Some Observations on the Rotor Stepping}, journal = {Cryptologia}, volume = {26}, number = {2}, pages = {97--100}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890795}, doi = {10.1080/0161-110291890795}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sullivan02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sullivan02a, author = {Geoff Sullivan}, title = {Cryptanalysis of Hagelin Machine Pin wheels}, journal = {Cryptologia}, volume = {26}, number = {4}, pages = {257--273}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890920}, doi = {10.1080/0161-110291890920}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Sullivan02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wolfe02, author = {Henry B. Wolfe}, title = {Non-Cryptanalytic Attacks}, journal = {Cryptologia}, volume = {26}, number = {3}, pages = {222--234}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890894}, doi = {10.1080/0161-110291890894}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wolfe02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Budiansky01, author = {Stephen Budiansky}, title = {Codebreaking with {IBM} Machines in World War {II}}, journal = {Cryptologia}, volume = {25}, number = {4}, pages = {241--255}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889914}, doi = {10.1080/0161-110191889914}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Budiansky01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke01, author = {Colin B. Burke}, title = {Kim Philby, the American Intelligence Community, and {OP-20-G:} the Fox Built the Hen-House and Took the Keys}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {88--90}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889815}, doi = {10.1080/0161-110191889815}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gladwin01, author = {Lee A. Gladwin}, title = {Alan Turing's Visit to Dayton}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {11--17}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889743}, doi = {10.1080/0161-110191889743}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gladwin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hammant01, author = {Thomas R. Hammant}, title = {Russian and Soviet Cryptology {III} - Soviet Comint and the Civil War, 1918-1921}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {50--60}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889770}, doi = {10.1080/0161-110191889770}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hammant01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hammant01a, author = {Thomas R. Hammant}, title = {Russian and Soviet Cryptology {IV} - Some Incidents in the 1930's}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {61--63}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889789}, doi = {10.1080/0161-110191889789}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hammant01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hernandez-Castro01, author = {Julio C. Hernandez{-}Castro and Arturo Ribagorda and Pedro Isasi and Jos{\'{e}} M. Sierra}, title = {Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators}, journal = {Cryptologia}, volume = {25}, number = {3}, pages = {213--229}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889897}, doi = {10.1080/0161-110191889897}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hernandez-Castro01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ibbotson01, author = {Peter Ibbotson}, title = {Sayers and Ciphers}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {81--87}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889806}, doi = {10.1080/0161-110191889806}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ibbotson01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Johnsen01, author = {Ben Johnsen}, title = {Cryptography in Runic inscriptions: a Remark on the Article, "Cryptography in Runic inscriptions, " by O. G. Landsverk}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {95--100}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889833}, doi = {10.1080/0161-110191889833}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Johnsen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh01, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {64--79}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889798}, doi = {10.1080/0161-110191889798}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh01a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {142--159}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889851}, doi = {10.1080/0161-110191889851}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh01b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {25}, number = {3}, pages = {230--239}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889905}, doi = {10.1080/0161-110191889905}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh01b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh01c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {25}, number = {4}, pages = {311--317}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889950}, doi = {10.1080/0161-110191889950}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh01c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Landini01, author = {Gabriel Landini}, title = {Evidence of Linguistic Structure in the Voynich Manuscript Using Spectral Analysis}, journal = {Cryptologia}, volume = {25}, number = {4}, pages = {275--295}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889932}, doi = {10.1080/0161-110191889932}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Landini01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Leeuw01, author = {Karl de Leeuw}, title = {Johann Friedrich Euler {(1741-1800):} Mathematician and Cryptologist at the Court of the Dutch Stadholder William {V}}, journal = {Cryptologia}, volume = {25}, number = {4}, pages = {256--274}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889923}, doi = {10.1080/0161-110191889923}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Leeuw01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Marks01, author = {Philip Marks}, title = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {I}}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {101--141}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889842}, doi = {10.1080/0161-110191889842}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Marks01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Marks01a, author = {Philip C. Marks}, title = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {II}}, journal = {Cryptologia}, volume = {25}, number = {3}, pages = {177--212}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889888}, doi = {10.1080/0161-110191889888}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Marks01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Marks01b, author = {Philip C. Marks}, title = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {III}}, journal = {Cryptologia}, volume = {25}, number = {4}, pages = {296--310}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889941}, doi = {10.1080/0161-110191889941}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Marks01b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Risca01, author = {Viviana I. Risca}, title = {DNA-Based Steganography}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {37--49}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889761}, doi = {10.1080/0161-110191889761}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Risca01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin01, author = {Michael Rubin}, title = {The Telegraph, Espionage, and Cryptology in Nineteenth Century Iran}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {18--36}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889752}, doi = {10.1080/0161-110191889752}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Turing01, author = {Alan M. Turing}, title = {Visit to National Cash Register Corporation of Dayton, Ohio}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {1--10}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889734}, doi = {10.1080/0161-110191889734}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Turing01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkler01, author = {Jonathan Winkler}, title = {From the Archives Early Corporate espionage amid World War {I} Censorship}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {91--94}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889824}, doi = {10.1080/0161-110191889824}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkler01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Atkinson00, author = {Russell Atkinson}, title = {David Brian Kern Theft of Trade Secrets}, journal = {Cryptologia}, volume = {24}, number = {4}, pages = {361--369}, year = {2000}, url = {https://doi.org/10.1080/01611190008984254}, doi = {10.1080/01611190008984254}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Atkinson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Budiansky00, author = {Stephen Budiansky}, title = {Closing the Book on Pearl Harbor}, journal = {Cryptologia}, volume = {24}, number = {2}, pages = {119--130}, year = {2000}, url = {https://doi.org/10.1080/01611190008984236}, doi = {10.1080/01611190008984236}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Budiansky00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke00, author = {Colin B. Burke}, title = {Letter to the Editor}, journal = {Cryptologia}, volume = {24}, number = {4}, pages = {351--352}, year = {2000}, url = {https://doi.org/10.1080/01611190008984252}, doi = {10.1080/01611190008984252}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Davies00, author = {Donald W. Davies}, title = {An Unidentified Cipher Device}, journal = {Cryptologia}, volume = {24}, number = {2}, pages = {131--134}, year = {2000}, url = {https://doi.org/10.1080/01611190008984237}, doi = {10.1080/01611190008984237}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Davies00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine00, author = {Ralph Erskine}, title = {What did the Sinkov Mission Receive from Bletchley Park?}, journal = {Cryptologia}, volume = {24}, number = {2}, pages = {97--109}, year = {2000}, url = {https://doi.org/10.1080/01611190008984234}, doi = {10.1080/01611190008984234}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer00, author = {David H. Hamer}, title = {{G-312:} An Abwehr Enigma}, journal = {Cryptologia}, volume = {24}, number = {1}, pages = {41--54}, year = {2000}, url = {https://doi.org/10.1080/0161-110091888772}, doi = {10.1080/0161-110091888772}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hammant00, author = {Thomas R. Hammant}, title = {Russian and Soviet Cryptology {I} - Some Communications Intelligence in Tsarist Russia}, journal = {Cryptologia}, volume = {24}, number = {3}, pages = {235--249}, year = {2000}, url = {https://doi.org/10.1080/01611190008984244}, doi = {10.1080/01611190008984244}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hammant00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hammant00a, author = {Thomas R. Hammant}, title = {Russian and Soviet Cryptology {II} - the Magdeburg Incident: the Russian View}, journal = {Cryptologia}, volume = {24}, number = {4}, pages = {333--338}, year = {2000}, url = {https://doi.org/10.1080/01611190008984250}, doi = {10.1080/01611190008984250}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hammant00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Huffman00, author = {Stephen Huffman}, title = {The Navajo Code Talkers: a Cryptologic and Linguistic Perspective}, journal = {Cryptologia}, volume = {24}, number = {4}, pages = {289--320}, year = {2000}, url = {https://doi.org/10.1080/01611190008984247}, doi = {10.1080/01611190008984247}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Huffman00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Jacobsen00, author = {Philip H. Jacobsen}, title = {A Cryptologic Veteran's Analysis of "Day of Deceit" - a Book Review}, journal = {Cryptologia}, volume = {24}, number = {2}, pages = {110--118}, year = {2000}, url = {https://doi.org/10.1080/01611190008984235}, doi = {10.1080/01611190008984235}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Jacobsen00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KnudsenR00, author = {Lars R. Knudsen and Vincent Rijmen}, title = {Ciphertext-only Attack on Akelarre}, journal = {Cryptologia}, volume = {24}, number = {2}, pages = {135--147}, year = {2000}, url = {https://doi.org/10.1080/01611190008984238}, doi = {10.1080/01611190008984238}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KnudsenR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh00, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {24}, number = {1}, pages = {67--93}, year = {2000}, url = {https://doi.org/10.1080/0161-110091888790}, doi = {10.1080/0161-110091888790}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh00a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {24}, number = {2}, pages = {168--189}, year = {2000}, url = {https://doi.org/10.1080/01611190008984241}, doi = {10.1080/01611190008984241}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh00b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {24}, number = {3}, pages = {269--286}, year = {2000}, url = {https://doi.org/10.1080/01611190008984246}, doi = {10.1080/01611190008984246}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh00c, author = {Louis Kruh}, title = {Corrections}, journal = {Cryptologia}, volume = {24}, number = {4}, pages = {370}, year = {2000}, url = {https://doi.org/10.1080/01611190008984255}, doi = {10.1080/01611190008984255}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh00c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LiHLT00, author = {Chuan{-}Ming Li and Tzonelih Hwang and Narn{-}Yih Lee and Juin{-}Jang Tsai}, title = {(T, {N)} Threshold-Multisignature Scheme and Generalized-Multisignature Scheme Where suspected Forgery Implies Traceability of Adversarial Shareholders}, journal = {Cryptologia}, volume = {24}, number = {3}, pages = {250--268}, year = {2000}, url = {https://doi.org/10.1080/01611190008984245}, doi = {10.1080/01611190008984245}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LiHLT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MarksW00, author = {Philip Marks and Frode Weierud}, title = {Recovering the Wiring of Enigma's Umkehrwalze {A}}, journal = {Cryptologia}, volume = {24}, number = {1}, pages = {55--66}, year = {2000}, url = {https://doi.org/10.1080/0161-110091888781}, doi = {10.1080/0161-110091888781}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/MarksW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/McKay00, author = {Craig Graham McKay}, title = {From the Archives Japanese fears and the Ironies of Interception}, journal = {Cryptologia}, volume = {24}, number = {4}, pages = {321--323}, year = {2000}, url = {https://doi.org/10.1080/01611190008984248}, doi = {10.1080/01611190008984248}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/McKay00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Parker00, author = {Frederick D. Parker}, title = {How {OP-20-G} got Rid of Joe Rochefort}, journal = {Cryptologia}, volume = {24}, number = {3}, pages = {212--234}, year = {2000}, url = {https://doi.org/10.1080/01611190008984243}, doi = {10.1080/01611190008984243}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Parker00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Pesic00, author = {Peter Pesic}, title = {The Clue to the Labyrinth: Francis {BACON} and the Decryption of Nature}, journal = {Cryptologia}, volume = {24}, number = {3}, pages = {193--211}, year = {2000}, url = {https://doi.org/10.1080/01611190008984242}, doi = {10.1080/01611190008984242}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Pesic00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Phillips00, author = {Cecil Phillips}, title = {The American Solution of a German One-Time-Pad Cryptographic System {(G-OTP)}}, journal = {Cryptologia}, volume = {24}, number = {4}, pages = {324--332}, year = {2000}, url = {https://doi.org/10.1080/01611190008984249}, doi = {10.1080/01611190008984249}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Phillips00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ratcliff00, author = {Rebecca A. Ratcliff}, title = {Cryptology through the Centuries: NSA's 1999 History Symposium}, journal = {Cryptologia}, volume = {24}, number = {2}, pages = {160--167}, year = {2000}, url = {https://doi.org/10.1080/01611190008984240}, doi = {10.1080/01611190008984240}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ratcliff00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Saeednia00, author = {Shahrokh Saeednia}, title = {How to Make the Hill Cipher Secure}, journal = {Cryptologia}, volume = {24}, number = {4}, pages = {353--360}, year = {2000}, url = {https://doi.org/10.1080/01611190008984253}, doi = {10.1080/01611190008984253}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Saeednia00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SawadaA00, author = {Hideki Sawada and Takahiro Abe}, title = {Groups and {RSA} Cryptosystems}, journal = {Cryptologia}, volume = {24}, number = {1}, pages = {34--40}, year = {2000}, url = {https://doi.org/10.1080/0161-110091888763}, doi = {10.1080/0161-110091888763}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SawadaA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schindler00, author = {John R. Schindler}, title = {A hopeless Struggle: Austro-Hungarian Cryptology during World War {I}}, journal = {Cryptologia}, volume = {24}, number = {4}, pages = {339--350}, year = {2000}, url = {https://doi.org/10.1080/01611190008984251}, doi = {10.1080/01611190008984251}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schindler00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schneier00, author = {Bruce Schneier}, title = {A Self-Study Course in Block-Cipher Cryptanalysis}, journal = {Cryptologia}, volume = {24}, number = {1}, pages = {18--33}, year = {2000}, url = {https://doi.org/10.1080/0161-110091888754}, doi = {10.1080/0161-110091888754}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Schneier00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/WangH00, author = {Chih{-}Hung Wang and Tzonelih Hwang}, title = {(T, {M)} Threshold and Generalized ID-Based Conference Key Distribution System}, journal = {Cryptologia}, volume = {24}, number = {2}, pages = {148--159}, year = {2000}, url = {https://doi.org/10.1080/01611190008984239}, doi = {10.1080/01611190008984239}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/WangH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Williams00, author = {Heidi Williams}, title = {Applying Statistical Language Recognition Techniques in the Ciphertext-only Cryptanalysis of Enigma}, journal = {Cryptologia}, volume = {24}, number = {1}, pages = {4--17}, year = {2000}, url = {https://doi.org/10.1080/0161-110091888745}, doi = {10.1080/0161-110091888745}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Williams00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel00, author = {Brian J. Winkel}, title = {Annual Greg Mellen Memorial Cryptology Scholarship Prize}, journal = {Cryptologia}, volume = {24}, number = {1}, pages = {1--3}, year = {2000}, url = {https://doi.org/10.1080/0161-110091888736}, doi = {10.1080/0161-110091888736}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer99, author = {Friedrich L. Bauer}, title = {An Error in the History of Rotor Encryption Devices}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {206--210}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887847}, doi = {10.1080/0161-119991887847}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Budiansky99, author = {Stephen Budiansky}, title = {A Tribute to Cecil Phillips-and Arlington Hall's "Meritocracy"}, journal = {Cryptologia}, volume = {23}, number = {2}, pages = {97--107}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887784}, doi = {10.1080/0161-119991887784}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Budiansky99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Davies99, author = {Donald W. Davies}, title = {The Bombe a Remarkable Logic Machine}, journal = {Cryptologia}, volume = {23}, number = {2}, pages = {108--138}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887793}, doi = {10.1080/0161-119991887793}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Davies99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Davies99a, author = {Donald W. Davies}, title = {Effectiveness of the Diagonal Board}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {229--239}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887865}, doi = {10.1080/0161-119991887865}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Davies99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ellis99, author = {James H. Ellis}, title = {The History of Non-Secret Encryption}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {267--273}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887919}, doi = {10.1080/0161-119991887919}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ellis99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine99, author = {Ralph Erskine}, title = {Kriegsmarine Short Signal Systems - and How Bletchley Park Exploited Them}, journal = {Cryptologia}, volume = {23}, number = {1}, pages = {65--92}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887775}, doi = {10.1080/0161-119991887775}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Greenough99, author = {H. Paul Greenough}, title = {Cryptanalysis of the Hagelin {C-52} and Similar Machines a Known Plaintext Attack}, journal = {Cryptologia}, volume = {23}, number = {2}, pages = {139--156}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887801}, doi = {10.1080/0161-119991887801}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Greenough99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hagerty99, author = {Alexander Hagerty}, title = {An unpublished Yardley Manuscript}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {289--297}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887946}, doi = {10.1080/0161-119991887946}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hagerty99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn99, author = {David Kahn}, title = {Students Better than a Pro (Bazeries) and an Author (Candela)}, journal = {Cryptologia}, volume = {23}, number = {1}, pages = {63--64}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887766}, doi = {10.1080/0161-119991887766}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh99, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {23}, number = {1}, pages = {42--54}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887748}, doi = {10.1080/0161-119991887748}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh99a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {23}, number = {2}, pages = {171--188}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887829}, doi = {10.1080/0161-119991887829}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh99b, author = {Louis Kruh}, title = {Vint Hill Farms Station}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {259--260}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887892}, doi = {10.1080/0161-119991887892}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh99b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh99c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {274--286}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887928}, doi = {10.1080/0161-119991887928}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh99c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh99d, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {343--352}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887991}, doi = {10.1080/0161-119991887991}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh99d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lomonaco99, author = {Samuel J. Lomonaco}, title = {A Quick Glance at Quantum Cryptography}, journal = {Cryptologia}, volume = {23}, number = {1}, pages = {1--41}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887739}, doi = {10.1080/0161-119991887739}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Lomonaco99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/McKay99, author = {Craig Graham McKay}, title = {Swedish Cryptanalysis and the {SAGA} of Arne Beurling a Book Review}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {257--258}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887883}, doi = {10.1080/0161-119991887883}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/McKay99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mclean99, author = {Ridley Mclean}, title = {Naval Communications}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {353--379}, year = {1999}, url = {https://doi.org/10.1080/0161-119991888008}, doi = {10.1080/0161-119991888008}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mclean99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen99, author = {Michael van der Meulen}, title = {German Air Force Signal Intelligence 1956: a Museum of Comint and {SIGINT}}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {240--256}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887874}, doi = {10.1080/0161-119991887874}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Reeds99, author = {Jim Reeds}, title = {Breakthrough in Renaissance Cryptography a Book Review}, journal = {Cryptologia}, volume = {23}, number = {1}, pages = {59--62}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887757}, doi = {10.1080/0161-119991887757}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Reeds99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Roch99, author = {Axel Roch}, title = {Biopolitics and Intuitive Algebra in the Mathematization of Cryptology? {A} Review of Shannon's "a Mathematical Theory of Cryptography" from 1945}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {261--266}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887900}, doi = {10.1080/0161-119991887900}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Roch99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SavardP99, author = {John J. G. Savard and Richard Pekelney}, title = {The {ECM} Mark {II:} Design, History, and Cryptology}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {211--228}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887856}, doi = {10.1080/0161-119991887856}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SavardP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smith99, author = {David M. Smith}, title = {The Use of Decrypted German Weather Reports in the Operations of the Fifteenth Air Force over Europe}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {298--304}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887955}, doi = {10.1080/0161-119991887955}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Smith99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SullivanW99, author = {Geoff Sullivan and Frode Weierud}, title = {The Swiss {NEMA} Cipher Machine}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {310--328}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887973}, doi = {10.1080/0161-119991887973}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SullivanW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ulbricht99, author = {Heinz Ulbricht}, title = {Enigma-Uhr}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {193--205}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887838}, doi = {10.1080/0161-119991887838}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ulbricht99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/WalkerW99, author = {Stephen T. Walker and Joan D. Winston}, title = {Cryptography Policy Update}, journal = {Cryptologia}, volume = {23}, number = {2}, pages = {157--163}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887810}, doi = {10.1080/0161-119991887810}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/WalkerW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/WalkerW99a, author = {Stephen T. Walker and Joan D. Winston}, title = {Cryptography Policy Update}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {329--342}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887982}, doi = {10.1080/0161-119991887982}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/WalkerW99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Williams99, author = {Robert L. Williams}, title = {A Note on the Voynich Manuscript}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {305--309}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887964}, doi = {10.1080/0161-119991887964}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Williams99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke98, author = {Colin B. Burke}, title = {A Gracious but Tragic Special Ultra Message}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {29--32}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886759}, doi = {10.1080/0161-119891886759}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Coppersmith98, author = {Don Coppersmith}, title = {Attacking Four-Round Luby-Rackoff Ciphers}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {266--278}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886920}, doi = {10.1080/0161-119891886920}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Coppersmith98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ernst98, author = {Thomas Ernst}, title = {The Numerical-Astrological Ciphers in the Third Book of Trithemius's Steganographia}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {318--341}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886957}, doi = {10.1080/0161-119891886957}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ernst98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer98, author = {David Hamer}, title = {Letter to the Editors {M2114:} a Naval Enigma}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {230}, year = {1998}, url = {https://doi.org/10.1080/01611199809350311}, doi = {10.1080/01611199809350311}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HamerSW98, author = {David H. Hamer and Geoff Sullivan and Frode Weierud}, title = {Enigma Variations: an Extended Family of Machines}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {211--229}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886885}, doi = {10.1080/0161-119891886885}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/HamerSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Heider98, author = {Franz{-}Peter Heider}, title = {A Colossal Fish}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {69--95}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886795}, doi = {10.1080/0161-119891886795}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Heider98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn98, author = {David Kahn}, title = {Soviet Comint in the Cold War}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {1--24}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886731}, doi = {10.1080/0161-119891886731}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kelly98, author = {Thomas Kelly}, title = {The Myth of the Skytale}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {244--260}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886902}, doi = {10.1080/0161-119891886902}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kelly98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KourtisM98, author = {Anastasios Kourtis and Charalampos Mantakas}, title = {Statistical Distribution of Delta Modulated Speech Signals as a Means for Cryptanalysis in Voice Encryption Systems}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {279--287}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886939}, doi = {10.1080/0161-119891886939}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KourtisM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {49--55}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886777}, doi = {10.1080/0161-119891886777}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98a, author = {Louis Kruh}, title = {Still Waiting to be Solved: Elgar's 1897 Cipher Message}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {97--98}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886803}, doi = {10.1080/0161-119891886803}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {167--191}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886867}, doi = {10.1080/0161-119891886867}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {261--265}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886911}, doi = {10.1080/0161-119891886911}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98d, author = {Louis Kruh}, title = {Another Herbert O. Yardley Mystery?}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {370--375}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886984}, doi = {10.1080/0161-119891886984}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98e, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {376--379}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886993}, doi = {10.1080/0161-119891886993}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lewis98, author = {Graydon A. Lewis}, title = {Setting the Record Straight on Midway}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {99--101}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886812}, doi = {10.1080/0161-119891886812}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Lewis98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MendelsonWW98, author = {Kenneth A. Mendelson and Stephen T. Walker and Joan D. Winston}, title = {The Evolution of Recent Cryptographic Policy in the United States}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {193--210}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886876}, doi = {10.1080/0161-119891886876}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MendelsonWW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen98, author = {Michael van der Meulen}, title = {A First German Cryptologic Exhibition}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {33--48}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886768}, doi = {10.1080/0161-119891886768}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen98a, author = {Michael van der Meulen}, title = {The Road to German Diplomatic Ciphers - 1919 {TO} 1945}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {141--166}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886858}, doi = {10.1080/0161-119891886858}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MoldovyanM98, author = {Alexander A. Moldovyan and Nikolay A. Moldovyan}, title = {Software Encryption Algorithms for Transparent Protection Technology}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {56--68}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886786}, doi = {10.1080/0161-119891886786}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MoldovyanM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MoldovyanM98a, author = {Alexander A. Moldovyan and Nikolay A. Moldovyan}, title = {Flexible Block Cipher with Provably Inequivalent Cryptalgorithm Modifications}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {134--140}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886849}, doi = {10.1080/0161-119891886849}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MoldovyanM98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Nichols98, author = {Randall K. Nichols}, title = {The Bible Code}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {121--133}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886830}, doi = {10.1080/0161-119891886830}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Nichols98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Oye98, author = {David Schimmelpenninck van der Oye}, title = {Tsarist Codebreaking Some Background and Some Examples}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {342--353}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886966}, doi = {10.1080/0161-119891886966}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Oye98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Pfeiffer98, author = {Paul N. Pfeiffer}, title = {Breaking the German Weather Ciphers in the Mediterranean Detachment G, 849th Signal Intelligence Service}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {354--369}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886975}, doi = {10.1080/0161-119891886975}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Pfeiffer98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Reeds98, author = {Jim Reeds}, title = {Solved: the Ciphers in Book {III} of Trithemius's Steganographia}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {291--317}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886948}, doi = {10.1080/0161-119891886948}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Reeds98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Viterbo98, author = {Emanuele Viterbo}, title = {The Ciphered autobiography of a 19th Century Egyptologist}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {231--243}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886894}, doi = {10.1080/0161-119891886894}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Viterbo98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Weierud98, author = {Frode Weierud}, title = {Sweden Cryptographic Superpower a Book Review}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {25--28}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886740}, doi = {10.1080/0161-119891886740}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Weierud98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CainS97, author = {Thomas R. Cain and Alan T. Sherman}, title = {How to Break Gifford's Cipher}, journal = {Cryptologia}, volume = {21}, number = {3}, pages = {237--286}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885931}, doi = {10.1080/0161-119791885931}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CainS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChangJK97, author = {Chin{-}Chen Chang and Jinn{-}Ke Jan and Huey{-}Cheue Kowng}, title = {A Digital Signature Scheme Based upon the Theory of Quadratic residues}, journal = {Cryptologia}, volume = {21}, number = {1}, pages = {55--70}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885797}, doi = {10.1080/0161-119791885797}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChangJK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChauL97, author = {Hoi Fung Chau and Hoi{-}Kwong Lo}, title = {One-Way Functions in Reversible Computations}, journal = {Cryptologia}, volume = {21}, number = {2}, pages = {139--148}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885869}, doi = {10.1080/0161-119791885869}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ChauL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ClarkD97, author = {Andrew J. Clark and Ed Dawson}, title = {A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher}, journal = {Cryptologia}, volume = {21}, number = {2}, pages = {129--138}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885850}, doi = {10.1080/0161-119791885850}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ClarkD97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Comstock97, author = {I. W. Comstock}, title = {Radio Intelligence and Security}, journal = {Cryptologia}, volume = {21}, number = {4}, pages = {368--377}, year = {1997}, url = {https://doi.org/10.1080/0161-119791886002}, doi = {10.1080/0161-119791886002}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Comstock97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Constance97, author = {Paul Constance}, title = {How Jim Bamford probed the {NSA}}, journal = {Cryptologia}, volume = {21}, number = {1}, pages = {71--74}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885805}, doi = {10.1080/0161-119791885805}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Constance97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours97, author = {Cipher A. Deavours}, title = {Lobsters, Crabs, and the Abwehr Enigma}, journal = {Cryptologia}, volume = {21}, number = {3}, pages = {193--199}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885904}, doi = {10.1080/0161-119791885904}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine97, author = {Ralph Erskine}, title = {The First Naval Enigma Decrypts of World War {II}}, journal = {Cryptologia}, volume = {21}, number = {1}, pages = {42--46}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885760}, doi = {10.1080/0161-119791885760}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Foster97, author = {Caxton C. Foster}, title = {Drawbacks of the One-Time Pad}, journal = {Cryptologia}, volume = {21}, number = {4}, pages = {350--352}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885986}, doi = {10.1080/0161-119791885986}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Foster97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Greenough97, author = {H. Paul Greenough}, title = {Cryptanalysis of the Swedish {HC-9} a Known-Plaintext Approach}, journal = {Cryptologia}, volume = {21}, number = {4}, pages = {353--367}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885995}, doi = {10.1080/0161-119791885995}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Greenough97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Guy97, author = {Jacques B. M. Guy}, title = {The Distribution of Signs {C} and {O} in the Voynich Manuscript: Evidence for a Real Language?}, journal = {Cryptologia}, volume = {21}, number = {1}, pages = {51--54}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885788}, doi = {10.1080/0161-119791885788}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Guy97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer97, author = {David H. Hamer}, title = {Enigma: Actions involved in the 'Double Stepping' of the Middle Rotor}, journal = {Cryptologia}, volume = {21}, number = {1}, pages = {47--50}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885779}, doi = {10.1080/0161-119791885779}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn97, author = {David Kahn}, title = {British Economic espionage}, journal = {Cryptologia}, volume = {21}, number = {2}, pages = {158--164}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885887}, doi = {10.1080/0161-119791885887}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kelley97, author = {Stephen J. Kelley}, title = {The Sigcum Story: Cryptographic Failure, Cryptologic Success}, journal = {Cryptologia}, volume = {21}, number = {4}, pages = {289--316}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885940}, doi = {10.1080/0161-119791885940}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kelley97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Koblitz97, author = {Neal Koblitz}, title = {Cryptography as a Teaching Tool}, journal = {Cryptologia}, volume = {21}, number = {4}, pages = {317--326}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885959}, doi = {10.1080/0161-119791885959}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Koblitz97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh97, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {21}, number = {1}, pages = {75--92}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885814}, doi = {10.1080/0161-119791885814}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh97a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {21}, number = {2}, pages = {110--128}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885841}, doi = {10.1080/0161-119791885841}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh97b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {21}, number = {3}, pages = {218--236}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885922}, doi = {10.1080/0161-119791885922}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh97b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh97c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {21}, number = {4}, pages = {335--349}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885977}, doi = {10.1080/0161-119791885977}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh97c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LeeH97, author = {Nara{-}Yih Lee and Tzonelih Hwang}, title = {On the Security of Park et al.'s Key Distribution Protocol for Digital Mobile Communications}, journal = {Cryptologia}, volume = {21}, number = {4}, pages = {327--334}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885968}, doi = {10.1080/0161-119791885968}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LeeH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen97, author = {Michael van der Meulen}, title = {Bundeswehrtarnverfahren}, journal = {Cryptologia}, volume = {21}, number = {3}, pages = {200--217}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885913}, doi = {10.1080/0161-119791885913}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Oye97, author = {David Schimmelpenninck van der Oye}, title = {A First Look at Russia's Codebreakers a Book Review}, journal = {Cryptologia}, volume = {21}, number = {1}, pages = {39--41}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885751}, doi = {10.1080/0161-119791885751}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Oye97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Pesic97, author = {Peter Pesic}, title = {Fran{\c{c}}ois Vi{\`{e}}te, Father of Modern Cryptanalysis - Two New Manuscripts}, journal = {Cryptologia}, volume = {21}, number = {1}, pages = {1--29}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885733}, doi = {10.1080/0161-119791885733}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Pesic97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin97, author = {Aviel D. Rubin}, title = {An Experience Teaching a Graduate Course in Cryptography}, journal = {Cryptologia}, volume = {21}, number = {2}, pages = {97--109}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885832}, doi = {10.1080/0161-119791885832}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sassoon97, author = {George Sassoon}, title = {British Company Makes {PGP} Easier to Use}, journal = {Cryptologia}, volume = {21}, number = {1}, pages = {93--94}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885823}, doi = {10.1080/0161-119791885823}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sassoon97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Scott97, author = {Norman Scott}, title = {Solving Japanese Naval Ciphers 1943-45}, journal = {Cryptologia}, volume = {21}, number = {2}, pages = {149--157}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885878}, doi = {10.1080/0161-119791885878}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Scott97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sims97, author = {John Cary Sims}, title = {The Brusa Agreement of May 17, 1943}, journal = {Cryptologia}, volume = {21}, number = {1}, pages = {30--38}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885742}, doi = {10.1080/0161-119791885742}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sims97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Alvarez96, author = {David {\'{A}}lvarez}, title = {Italian Diplomatic Cryptanalysis in World War {I}}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {1--10}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884735}, doi = {10.1080/0161-119691884735}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Alvarez96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Alvarez96a, author = {David {\'{A}}lvarez}, title = {Faded Lustre: Vatican Cryptography, 1815-1920}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {97--131}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884825}, doi = {10.1080/0161-119691884825}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Alvarez96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer96, author = {Friedrich L. Bauer}, title = {Cryptological Devices and Machines in the Deutsches Museum, Munich}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {11--13}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884744}, doi = {10.1080/0161-119691884744}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Buonafalce96, author = {Augusto Buonafalce}, title = {The Alberti Exhibition}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {132--134}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884834}, doi = {10.1080/0161-119691884834}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Buonafalce96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ClarkDB96, author = {Andrew J. Clark and Ed Dawson and Helen Bergen}, title = {Combinatorial Optimization and the Knapsack Cipher}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {85--93}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884807}, doi = {10.1080/0161-119691884807}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ClarkDB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Currier96, author = {Prescott Currier}, title = {My "Purple" Trip to England in 1941}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {193--201}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884906}, doi = {10.1080/0161-119691884906}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Currier96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/David96, author = {Charles David}, title = {A World War {II} German Army Field Cipher and How We Broke {IT}}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {55--76}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884780}, doi = {10.1080/0161-119691884780}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/David96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DawsonN96, author = {Ed Dawson and Lauren Nielsen}, title = {Automated Cryptanalysis of {XOR} Plaintext Strings}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {165--181}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884870}, doi = {10.1080/0161-119691884870}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DawsonN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine96, author = {Ralph Erskine}, title = {Kriegsmarine Signal Indicators}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {330--340}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885013}, doi = {10.1080/0161-119691885013}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GilloglyH96, author = {James J. Gillogly and Larry Harnisch}, title = {Cryptograms from the Crypt}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {325--329}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885004}, doi = {10.1080/0161-119691885004}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GilloglyH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Golomb96, author = {Solomon W. Golomb}, title = {On Factoring Jevons' Number}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {243--246}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884933}, doi = {10.1080/0161-119691884933}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Golomb96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HeysT96, author = {Howard M. Heys and Stafford E. Tavares}, title = {Cryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {258--274}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884951}, doi = {10.1080/0161-119691884951}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HeysT96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hinsley96, author = {Harry Hinsley}, title = {The Counterfactual History of no Ultra}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {308--324}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884997}, doi = {10.1080/0161-119691884997}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hinsley96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn96, author = {David Kahn}, title = {Some Early Hungarian communist Ciphers}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {347--358}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885031}, doi = {10.1080/0161-119691885031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak96, author = {Subhash C. Kak}, title = {An Indus-Sarasvat{\={\i}} Signboard}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {275--279}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884960}, doi = {10.1080/0161-119691884960}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh96, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {14--36}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884753}, doi = {10.1080/0161-119691884753}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh96a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {183--191}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884898}, doi = {10.1080/0161-119691884898}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh96b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {280--288}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884979}, doi = {10.1080/0161-119691884979}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh96b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh96c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {365--380}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885059}, doi = {10.1080/0161-119691885059}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh96c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Leary96, author = {Thomas Leary}, title = {Cryptology in the 15th and 16th Century}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {223--242}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884924}, doi = {10.1080/0161-119691884924}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Leary96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LeightonM96, author = {Albert C. Leighton and Greg E. Mellen}, title = {A Mystery Solved}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {346}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885022}, doi = {10.1080/0161-119691885022}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LeightonM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mellen96, author = {Greg E. Mellen}, title = {Some Adventures in Cryptoland}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {155--164}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884861}, doi = {10.1080/0161-119691884861}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mellen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen96, author = {Michael van der Meulen}, title = {Werftschl{\"{u}}ssel: {A} German Navy Hand Cipher System Part {II}}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {37--54}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884771}, doi = {10.1080/0161-119691884771}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen96a, author = {Michael van der Meulen}, title = {Reihenschieber}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {141--154}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884852}, doi = {10.1080/0161-119691884852}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen96b, author = {Michael van der Meulen}, title = {Cryptology in the Early Bundesrepublik}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {202--222}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884915}, doi = {10.1080/0161-119691884915}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen96b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ratcliff96, author = {Rebecca A. Ratcliff}, title = {Cryptology and World War {II:} NSA's 1995 History Symposium}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {135--140}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884843}, doi = {10.1080/0161-119691884843}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ratcliff96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin96, author = {Frank Rubin}, title = {Designing a High-Security Cipher}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {247--257}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884942}, doi = {10.1080/0161-119691884942}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin96a, author = {Frank Rubin}, title = {One-Time Pad Cryptography}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {359--364}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885040}, doi = {10.1080/0161-119691885040}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schaefer96, author = {Edward F. Schaefer}, title = {A Simplified Data Encryption Standard Algorithm}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {77--84}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884799}, doi = {10.1080/0161-119691884799}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Schaefer96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Whitehead96, author = {David Whitehead}, title = {Cobra and Other Bombes}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {289--307}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884988}, doi = {10.1080/0161-119691884988}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Whitehead96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel96, author = {Brian J. Winkel}, title = {Twenty Years and Counting}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {381}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885068}, doi = {10.1080/0161-119691885068}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Alvarez95, author = {David Alvarez}, title = {A Dutch Enciphered Code}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {261--264}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883935}, doi = {10.1080/0161-119591883935}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Alvarez95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Davies95, author = {Donald W. Davies}, title = {The Lorenz Cipher Machine Sz42}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {39--61}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883755}, doi = {10.1080/0161-119591883755}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Davies95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours95, author = {Cipher A. Deavours}, title = {The Autoscritcher}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {137--148}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883827}, doi = {10.1080/0161-119591883827}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Denniston95, author = {Robin Denniston}, title = {Fetterlein and Others}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {62--64}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883764}, doi = {10.1080/0161-119591883764}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Denniston95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Drea95, author = {Edward J. Drea}, title = {Were the Japanese Army Codes Secure?}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {113--136}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883818}, doi = {10.1080/0161-119591883818}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Drea95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine95, author = {Ralph Erskine}, title = {Ultra and Some U. S. Navy Carrier Operations}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {81--96}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883782}, doi = {10.1080/0161-119591883782}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Foster95, author = {Caxton C. Foster}, title = {Secret Musical codewords}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {216}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883890}, doi = {10.1080/0161-119591883890}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Foster95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gaddy95, author = {David W. Gaddy}, title = {The Cylinder-Cipher}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {385--391}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884033}, doi = {10.1080/0161-119591884033}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gaddy95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gillogly95, author = {James J. Gillogly}, title = {Ciphertext-only Cryptanalysis of Enigma}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {405--413}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884060}, doi = {10.1080/0161-119591884060}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Gillogly95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Jakobsen95, author = {Thomas Jakobsen}, title = {A Fast Method for Cryptanalysis of Substitution Ciphers}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {265--274}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883944}, doi = {10.1080/0161-119591883944}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Jakobsen95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Johnson95, author = {Tom Johnson}, title = {The Mystery of an Old Japanese Codebook}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {380--384}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884024}, doi = {10.1080/0161-119591884024}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Johnson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Johnson95a, author = {Mike Johnson}, title = {Cryptology in Cyberspace}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {392--396}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884042}, doi = {10.1080/0161-119591884042}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Johnson95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn95, author = {David Kahn}, title = {The Cryptologic Origin of Braille}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {151--152}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883845}, doi = {10.1080/0161-119591883845}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn95a, author = {David Kahn}, title = {Enemy Codes and their Solution}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {166--197}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883863}, doi = {10.1080/0161-119591883863}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95, author = {Louis Kruh}, title = {When a Court ruled for {BACON} Instead of Shakespeare-Temporarily}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {24--38}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883746}, doi = {10.1080/0161-119591883746}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95a, author = {Louis Kruh}, title = {In the Name of Intelligence: Essays in Honor of Walter Pforzheimer Book Review}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {97--101}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883791}, doi = {10.1080/0161-119591883791}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {102--112}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883809}, doi = {10.1080/0161-119591883809}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {209--215}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883881}, doi = {10.1080/0161-119591883881}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95d, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {300--318}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883971}, doi = {10.1080/0161-119591883971}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95e, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {365--374}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884015}, doi = {10.1080/0161-119591884015}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruth95, author = {Louis Kruth}, title = {Riverbank Laboratory Correspondence, 1919 {(SRH-50)}}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {236--246}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883917}, doi = {10.1080/0161-119591883917}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruth95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LeeuwM95, author = {Karl de Leeuw and Hans van der Meer}, title = {A Turning grille from the Ancestral Castle of the Dutch Stadtholders}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {153--165}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883854}, doi = {10.1080/0161-119591883854}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LeeuwM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LiawL95, author = {Horng{-}Twu Liaw and Chin{-}Laung Lei}, title = {An Efficient Password Authentication Scheme Based on a Unit Circle}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {198--208}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883872}, doi = {10.1080/0161-119591883872}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LiawL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen95, author = {Michael van der Meulen}, title = {The Book Cipher System of the \emph{Wehrmacht}}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {247--260}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883926}, doi = {10.1080/0161-119591883926}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen95a, author = {Michael van der Meulen}, title = {Werftschl{\"{u}}ssel: {A} German Navy Hand Cipher System Part {I}}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {349--364}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884006}, doi = {10.1080/0161-119591884006}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Miller95, author = {A. Ray Miller}, title = {The Cryptographic Mathematics of Enigma}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {65--80}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883773}, doi = {10.1080/0161-119591883773}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Miller95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Reeds95, author = {Jim Reeds}, title = {William F. Friedman's transcription of the Voynich Manuscript}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {1--23}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883737}, doi = {10.1080/0161-119591883737}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Reeds95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin95, author = {Frank Rubin}, title = {The Quadratic and Double Quadratic Residue Ciphers}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {275--284}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883953}, doi = {10.1080/0161-119591883953}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin95a, author = {Frank Rubin}, title = {Message Authentication Using Quadratic residues}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {397--404}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884051}, doi = {10.1080/0161-119591884051}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schlesinger95, author = {Stephen Schlesinger}, title = {Cryptanalysis for Peacetime: Codebreaking and the Birth and Structure of the United Nations}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {217--235}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883908}, doi = {10.1080/0161-119591883908}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schlesinger95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wayner95, author = {Peter Wayner}, title = {Strong Theoretical Stegnography}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {285--299}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883962}, doi = {10.1080/0161-119591883962}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wayner95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Weber95, author = {Ralph E. Weber}, title = {Seward's Other Folly: the Fight over America's First Encrypted Cable}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {321--348}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883999}, doi = {10.1080/0161-119591883999}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Weber95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CarrollN94, author = {John M. Carroll and Sri Nurdiati}, title = {Weak Keys and Weak Data Foiling the Two Nemeses}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {253--280}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882892}, doi = {10.1080/0161-119491882892}, timestamp = {Thu, 30 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CarrollN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Corcoran94, author = {William J. Corcoran}, title = {A Multiloop Vigen{\`{e}}Re Cipher with Exceptionally Long Component Series}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {356--371}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882937}, doi = {10.1080/0161-119491882937}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Corcoran94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Davies94, author = {Donald W. Davies}, title = {New Information on the History of the Siemens and Halske {T52} Cipher Machines}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {141--146}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882801}, doi = {10.1080/0161-119491882801}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Davies94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DawsonC94, author = {Ed Dawson and Andrew J. Clark}, title = {Divide and Conquer Attacks on Certain Classes of Stream Ciphers}, journal = {Cryptologia}, volume = {18}, number = {1}, pages = {25--40}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882757}, doi = {10.1080/0161-119491882757}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DawsonC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours94, author = {Cipher A. Deavours}, title = {Those Brilliant Brits: Book Review}, journal = {Cryptologia}, volume = {18}, number = {1}, pages = {22--24}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882748}, doi = {10.1080/0161-119491882748}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Denniston94, author = {Robin Denniston}, title = {Yardley's Diplomatic Secrets}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {81--127}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882784}, doi = {10.1080/0161-119491882784}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Denniston94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GanesanS94, author = {Ravi Ganesan and Alan T. Sherman}, title = {Statistical Techniques for Language Recognition: an Empirical Study Using Real and Simulated English}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {289--331}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882919}, doi = {10.1080/0161-119491882919}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GanesanS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Greenfield94, author = {Gary R. Greenfield}, title = {Yet Another Matrix Cryptosystem}, journal = {Cryptologia}, volume = {18}, number = {1}, pages = {41--51}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882766}, doi = {10.1080/0161-119491882766}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Greenfield94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HagelinK94, author = {Boris C. W. Hagelin and David Kahn}, title = {The Story of the Hagelin Cryptos}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {204--242}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882865}, doi = {10.1080/0161-119491882865}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HagelinK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Halligan94, author = {J. Halligan}, title = {Radio Intelligence and Communication Security}, journal = {Cryptologia}, volume = {18}, number = {1}, pages = {52--79}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882775}, doi = {10.1080/0161-119491882775}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Halligan94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn94, author = {David Kahn}, title = {From the Archives a Real Fake Message}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {150--152}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882829}, doi = {10.1080/0161-119491882829}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/King94, author = {John C. King}, title = {An Algorithm for the Complete Automated Cryptanalysis of Periodic Polyalphabetic Substitution Ciphers}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {332--355}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882928}, doi = {10.1080/0161-119491882928}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/King94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {18}, number = {1}, pages = {1--21}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882739}, doi = {10.1080/0161-119491882739}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {128--140}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882793}, doi = {10.1080/0161-119491882793}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94b, author = {Louis Kruh}, title = {The Postal Service Fails to Deliver the Goods}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {250--252}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882883}, doi = {10.1080/0161-119491882883}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {281--287}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882900}, doi = {10.1080/0161-119491882900}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94d, author = {Louis Kruh}, title = {A Pictorial Tour of the National Cryptologic Museum}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {381--389}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882955}, doi = {10.1080/0161-119491882955}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94e, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {390--398}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882964}, doi = {10.1080/0161-119491882964}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LiHL94, author = {Chuan{-}Ming Li and Tzonelih Hwang and Narn{-}Yih Lee}, title = {Conspiracy Attacks on the Threshold {RSA} Signature Scheme}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {372--380}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882946}, doi = {10.1080/0161-119491882946}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LiHL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/McKay94, author = {Craig Graham McKay}, title = {From the Archives Arvid Damm Makes an Offer}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {243--249}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882874}, doi = {10.1080/0161-119491882874}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/McKay94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mead94, author = {David Mead}, title = {The Breaking of the Japanese Army Administrative Code}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {193--203}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882856}, doi = {10.1080/0161-119491882856}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mead94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ritter94, author = {Terry Ritter}, title = {Estimating Population from Repetitions in Accumlated Random Samples}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {155--190}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882847}, doi = {10.1080/0161-119491882847}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ritter94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin94, author = {Frank Rubin}, title = {Comments on "Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms"}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {153--154}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882838}, doi = {10.1080/0161-119491882838}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Selmer94, author = {Ernst S. Selmer}, title = {The Norwegian Modification of the Siemens and Halske T52e Cipher Machines}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {147--149}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882810}, doi = {10.1080/0161-119491882810}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Selmer94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Alvarez93, author = {David Alvarez}, title = {The Papal Cipher Section in the Early Nineteenth Century}, journal = {Cryptologia}, volume = {17}, number = {2}, pages = {219--224}, year = {1993}, url = {https://doi.org/10.1080/0161-119391867881}, doi = {10.1080/0161-119391867881}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Alvarez93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke93, author = {Colin B. Burke}, title = {An Introduction to an Historic Computer Document the 1946 Pendergass Report Cryptanalysis and the Digital Computer}, journal = {Cryptologia}, volume = {17}, number = {2}, pages = {113--123}, year = {1993}, url = {https://doi.org/10.1080/0161-119391867809}, doi = {10.1080/0161-119391867809}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChangH93, author = {Chin{-}Chen Chang and Ren{-}Junn Hwang}, title = {Master Keys for an {M} \({}^{\mbox{ 3 }}\) Cryptoscheme}, journal = {Cryptologia}, volume = {17}, number = {2}, pages = {175--186}, year = {1993}, url = {https://doi.org/10.1080/0161-119391867854}, doi = {10.1080/0161-119391867854}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChangH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChinWH93, author = {Yuan{-}Chung Chin and PeCheng Wang and Jing{-}Jang Hwang}, title = {Cryptanalysis on Schwartz Graphical Encryption Method}, journal = {Cryptologia}, volume = {17}, number = {3}, pages = {301--304}, year = {1993}, url = {https://doi.org/10.1080/0161-119391867962}, doi = {10.1080/0161-119391867962}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ChinWH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GanesanS93, author = {Ravi Ganesan and Alan T. Sherman}, title = {Statistical Techniques for Language Recognition: an Introduction and Guide for Cryptanalysts}, journal = {Cryptologia}, volume = {17}, number = {4}, pages = {321--366}, year = {1993}, url = {https://doi.org/10.1080/0161-119391867980}, doi = {10.1080/0161-119391867980}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GanesanS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.