Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia18.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/CarrollN94,
  author       = {John M. Carroll and
                  Sri Nurdiati},
  title        = {Weak Keys and Weak Data Foiling the Two Nemeses},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {253--280},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882892},
  doi          = {10.1080/0161-119491882892},
  timestamp    = {Thu, 30 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CarrollN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Corcoran94,
  author       = {William J. Corcoran},
  title        = {A Multiloop Vigen{\`{e}}Re Cipher with Exceptionally Long Component
                  Series},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {356--371},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882937},
  doi          = {10.1080/0161-119491882937},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Corcoran94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Davies94,
  author       = {Donald W. Davies},
  title        = {New Information on the History of the Siemens and Halske {T52} Cipher
                  Machines},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {141--146},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882801},
  doi          = {10.1080/0161-119491882801},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Davies94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DawsonC94,
  author       = {Ed Dawson and
                  Andrew J. Clark},
  title        = {Divide and Conquer Attacks on Certain Classes of Stream Ciphers},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {1},
  pages        = {25--40},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882757},
  doi          = {10.1080/0161-119491882757},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DawsonC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours94,
  author       = {Cipher A. Deavours},
  title        = {Those Brilliant Brits: Book Review},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {1},
  pages        = {22--24},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882748},
  doi          = {10.1080/0161-119491882748},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Denniston94,
  author       = {Robin Denniston},
  title        = {Yardley's Diplomatic Secrets},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {81--127},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882784},
  doi          = {10.1080/0161-119491882784},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Denniston94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GanesanS94,
  author       = {Ravi Ganesan and
                  Alan T. Sherman},
  title        = {Statistical Techniques for Language Recognition: an Empirical Study
                  Using Real and Simulated English},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {289--331},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882919},
  doi          = {10.1080/0161-119491882919},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GanesanS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Greenfield94,
  author       = {Gary R. Greenfield},
  title        = {Yet Another Matrix Cryptosystem},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {1},
  pages        = {41--51},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882766},
  doi          = {10.1080/0161-119491882766},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Greenfield94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HagelinK94,
  author       = {Boris C. W. Hagelin and
                  David Kahn},
  title        = {The Story of the Hagelin Cryptos},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {204--242},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882865},
  doi          = {10.1080/0161-119491882865},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HagelinK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Halligan94,
  author       = {J. Halligan},
  title        = {Radio Intelligence and Communication Security},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {1},
  pages        = {52--79},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882775},
  doi          = {10.1080/0161-119491882775},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Halligan94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn94,
  author       = {David Kahn},
  title        = {From the Archives a Real Fake Message},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {150--152},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882829},
  doi          = {10.1080/0161-119491882829},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/King94,
  author       = {John C. King},
  title        = {An Algorithm for the Complete Automated Cryptanalysis of Periodic
                  Polyalphabetic Substitution Ciphers},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {332--355},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882928},
  doi          = {10.1080/0161-119491882928},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/King94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {1},
  pages        = {1--21},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882739},
  doi          = {10.1080/0161-119491882739},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {128--140},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882793},
  doi          = {10.1080/0161-119491882793},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94b,
  author       = {Louis Kruh},
  title        = {The Postal Service Fails to Deliver the Goods},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {250--252},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882883},
  doi          = {10.1080/0161-119491882883},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {281--287},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882900},
  doi          = {10.1080/0161-119491882900},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94d,
  author       = {Louis Kruh},
  title        = {A Pictorial Tour of the National Cryptologic Museum},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {381--389},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882955},
  doi          = {10.1080/0161-119491882955},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94e,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {390--398},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882964},
  doi          = {10.1080/0161-119491882964},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LiHL94,
  author       = {Chuan{-}Ming Li and
                  Tzonelih Hwang and
                  Narn{-}Yih Lee},
  title        = {Conspiracy Attacks on the Threshold {RSA} Signature Scheme},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {372--380},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882946},
  doi          = {10.1080/0161-119491882946},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LiHL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/McKay94,
  author       = {Craig Graham McKay},
  title        = {From the Archives Arvid Damm Makes an Offer},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {243--249},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882874},
  doi          = {10.1080/0161-119491882874},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/McKay94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mead94,
  author       = {David Mead},
  title        = {The Breaking of the Japanese Army Administrative Code},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {193--203},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882856},
  doi          = {10.1080/0161-119491882856},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mead94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ritter94,
  author       = {Terry Ritter},
  title        = {Estimating Population from Repetitions in Accumlated Random Samples},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {155--190},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882847},
  doi          = {10.1080/0161-119491882847},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ritter94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin94,
  author       = {Frank Rubin},
  title        = {Comments on "Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms"},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {153--154},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882838},
  doi          = {10.1080/0161-119491882838},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Selmer94,
  author       = {Ernst S. Selmer},
  title        = {The Norwegian Modification of the Siemens and Halske T52e Cipher Machines},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {147--149},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882810},
  doi          = {10.1080/0161-119491882810},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Selmer94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}