default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia18.bht:"
@article{DBLP:journals/cryptologia/CarrollN94, author = {John M. Carroll and Sri Nurdiati}, title = {Weak Keys and Weak Data Foiling the Two Nemeses}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {253--280}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882892}, doi = {10.1080/0161-119491882892}, timestamp = {Thu, 30 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CarrollN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Corcoran94, author = {William J. Corcoran}, title = {A Multiloop Vigen{\`{e}}Re Cipher with Exceptionally Long Component Series}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {356--371}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882937}, doi = {10.1080/0161-119491882937}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Corcoran94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Davies94, author = {Donald W. Davies}, title = {New Information on the History of the Siemens and Halske {T52} Cipher Machines}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {141--146}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882801}, doi = {10.1080/0161-119491882801}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Davies94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DawsonC94, author = {Ed Dawson and Andrew J. Clark}, title = {Divide and Conquer Attacks on Certain Classes of Stream Ciphers}, journal = {Cryptologia}, volume = {18}, number = {1}, pages = {25--40}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882757}, doi = {10.1080/0161-119491882757}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DawsonC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours94, author = {Cipher A. Deavours}, title = {Those Brilliant Brits: Book Review}, journal = {Cryptologia}, volume = {18}, number = {1}, pages = {22--24}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882748}, doi = {10.1080/0161-119491882748}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Denniston94, author = {Robin Denniston}, title = {Yardley's Diplomatic Secrets}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {81--127}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882784}, doi = {10.1080/0161-119491882784}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Denniston94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GanesanS94, author = {Ravi Ganesan and Alan T. Sherman}, title = {Statistical Techniques for Language Recognition: an Empirical Study Using Real and Simulated English}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {289--331}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882919}, doi = {10.1080/0161-119491882919}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GanesanS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Greenfield94, author = {Gary R. Greenfield}, title = {Yet Another Matrix Cryptosystem}, journal = {Cryptologia}, volume = {18}, number = {1}, pages = {41--51}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882766}, doi = {10.1080/0161-119491882766}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Greenfield94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HagelinK94, author = {Boris C. W. Hagelin and David Kahn}, title = {The Story of the Hagelin Cryptos}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {204--242}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882865}, doi = {10.1080/0161-119491882865}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HagelinK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Halligan94, author = {J. Halligan}, title = {Radio Intelligence and Communication Security}, journal = {Cryptologia}, volume = {18}, number = {1}, pages = {52--79}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882775}, doi = {10.1080/0161-119491882775}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Halligan94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn94, author = {David Kahn}, title = {From the Archives a Real Fake Message}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {150--152}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882829}, doi = {10.1080/0161-119491882829}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/King94, author = {John C. King}, title = {An Algorithm for the Complete Automated Cryptanalysis of Periodic Polyalphabetic Substitution Ciphers}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {332--355}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882928}, doi = {10.1080/0161-119491882928}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/King94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {18}, number = {1}, pages = {1--21}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882739}, doi = {10.1080/0161-119491882739}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {128--140}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882793}, doi = {10.1080/0161-119491882793}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94b, author = {Louis Kruh}, title = {The Postal Service Fails to Deliver the Goods}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {250--252}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882883}, doi = {10.1080/0161-119491882883}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {281--287}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882900}, doi = {10.1080/0161-119491882900}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94d, author = {Louis Kruh}, title = {A Pictorial Tour of the National Cryptologic Museum}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {381--389}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882955}, doi = {10.1080/0161-119491882955}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh94e, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {390--398}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882964}, doi = {10.1080/0161-119491882964}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh94e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LiHL94, author = {Chuan{-}Ming Li and Tzonelih Hwang and Narn{-}Yih Lee}, title = {Conspiracy Attacks on the Threshold {RSA} Signature Scheme}, journal = {Cryptologia}, volume = {18}, number = {4}, pages = {372--380}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882946}, doi = {10.1080/0161-119491882946}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LiHL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/McKay94, author = {Craig Graham McKay}, title = {From the Archives Arvid Damm Makes an Offer}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {243--249}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882874}, doi = {10.1080/0161-119491882874}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/McKay94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mead94, author = {David Mead}, title = {The Breaking of the Japanese Army Administrative Code}, journal = {Cryptologia}, volume = {18}, number = {3}, pages = {193--203}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882856}, doi = {10.1080/0161-119491882856}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mead94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ritter94, author = {Terry Ritter}, title = {Estimating Population from Repetitions in Accumlated Random Samples}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {155--190}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882847}, doi = {10.1080/0161-119491882847}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ritter94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin94, author = {Frank Rubin}, title = {Comments on "Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms"}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {153--154}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882838}, doi = {10.1080/0161-119491882838}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Selmer94, author = {Ernst S. Selmer}, title = {The Norwegian Modification of the Siemens and Halske T52e Cipher Machines}, journal = {Cryptologia}, volume = {18}, number = {2}, pages = {147--149}, year = {1994}, url = {https://doi.org/10.1080/0161-119491882810}, doi = {10.1080/0161-119491882810}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Selmer94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.