Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia19.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/Alvarez95,
  author       = {David Alvarez},
  title        = {A Dutch Enciphered Code},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {261--264},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883935},
  doi          = {10.1080/0161-119591883935},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Alvarez95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Davies95,
  author       = {Donald W. Davies},
  title        = {The Lorenz Cipher Machine Sz42},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {39--61},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883755},
  doi          = {10.1080/0161-119591883755},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Davies95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours95,
  author       = {Cipher A. Deavours},
  title        = {The Autoscritcher},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {137--148},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883827},
  doi          = {10.1080/0161-119591883827},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Denniston95,
  author       = {Robin Denniston},
  title        = {Fetterlein and Others},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {62--64},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883764},
  doi          = {10.1080/0161-119591883764},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Denniston95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Drea95,
  author       = {Edward J. Drea},
  title        = {Were the Japanese Army Codes Secure?},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {113--136},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883818},
  doi          = {10.1080/0161-119591883818},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Drea95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine95,
  author       = {Ralph Erskine},
  title        = {Ultra and Some U. S. Navy Carrier Operations},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {81--96},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883782},
  doi          = {10.1080/0161-119591883782},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Foster95,
  author       = {Caxton C. Foster},
  title        = {Secret Musical codewords},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {216},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883890},
  doi          = {10.1080/0161-119591883890},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Foster95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gaddy95,
  author       = {David W. Gaddy},
  title        = {The Cylinder-Cipher},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {385--391},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884033},
  doi          = {10.1080/0161-119591884033},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gaddy95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gillogly95,
  author       = {James J. Gillogly},
  title        = {Ciphertext-only Cryptanalysis of Enigma},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {405--413},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884060},
  doi          = {10.1080/0161-119591884060},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gillogly95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Jakobsen95,
  author       = {Thomas Jakobsen},
  title        = {A Fast Method for Cryptanalysis of Substitution Ciphers},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {265--274},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883944},
  doi          = {10.1080/0161-119591883944},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Jakobsen95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Johnson95,
  author       = {Tom Johnson},
  title        = {The Mystery of an Old Japanese Codebook},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {380--384},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884024},
  doi          = {10.1080/0161-119591884024},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Johnson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Johnson95a,
  author       = {Mike Johnson},
  title        = {Cryptology in Cyberspace},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {392--396},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884042},
  doi          = {10.1080/0161-119591884042},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Johnson95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn95,
  author       = {David Kahn},
  title        = {The Cryptologic Origin of Braille},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {151--152},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883845},
  doi          = {10.1080/0161-119591883845},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn95a,
  author       = {David Kahn},
  title        = {Enemy Codes and their Solution},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {166--197},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883863},
  doi          = {10.1080/0161-119591883863},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95,
  author       = {Louis Kruh},
  title        = {When a Court ruled for {BACON} Instead of Shakespeare-Temporarily},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {24--38},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883746},
  doi          = {10.1080/0161-119591883746},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95a,
  author       = {Louis Kruh},
  title        = {In the Name of Intelligence: Essays in Honor of Walter Pforzheimer
                  Book Review},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {97--101},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883791},
  doi          = {10.1080/0161-119591883791},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {102--112},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883809},
  doi          = {10.1080/0161-119591883809},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {209--215},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883881},
  doi          = {10.1080/0161-119591883881},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95d,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {300--318},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883971},
  doi          = {10.1080/0161-119591883971},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95e,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {365--374},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884015},
  doi          = {10.1080/0161-119591884015},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruth95,
  author       = {Louis Kruth},
  title        = {Riverbank Laboratory Correspondence, 1919 {(SRH-50)}},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {236--246},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883917},
  doi          = {10.1080/0161-119591883917},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruth95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LeeuwM95,
  author       = {Karl de Leeuw and
                  Hans van der Meer},
  title        = {A Turning grille from the Ancestral Castle of the Dutch Stadtholders},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {153--165},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883854},
  doi          = {10.1080/0161-119591883854},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LeeuwM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LiawL95,
  author       = {Horng{-}Twu Liaw and
                  Chin{-}Laung Lei},
  title        = {An Efficient Password Authentication Scheme Based on a Unit Circle},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {198--208},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883872},
  doi          = {10.1080/0161-119591883872},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LiawL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen95,
  author       = {Michael van der Meulen},
  title        = {The Book Cipher System of the \emph{Wehrmacht}},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {247--260},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883926},
  doi          = {10.1080/0161-119591883926},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen95a,
  author       = {Michael van der Meulen},
  title        = {Werftschl{\"{u}}ssel: {A} German Navy Hand Cipher System Part
                  {I}},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {349--364},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884006},
  doi          = {10.1080/0161-119591884006},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Miller95,
  author       = {A. Ray Miller},
  title        = {The Cryptographic Mathematics of Enigma},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {65--80},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883773},
  doi          = {10.1080/0161-119591883773},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Miller95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Reeds95,
  author       = {Jim Reeds},
  title        = {William F. Friedman's transcription of the Voynich Manuscript},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {1--23},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883737},
  doi          = {10.1080/0161-119591883737},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Reeds95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin95,
  author       = {Frank Rubin},
  title        = {The Quadratic and Double Quadratic Residue Ciphers},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {275--284},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883953},
  doi          = {10.1080/0161-119591883953},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin95a,
  author       = {Frank Rubin},
  title        = {Message Authentication Using Quadratic residues},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {397--404},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884051},
  doi          = {10.1080/0161-119591884051},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schlesinger95,
  author       = {Stephen Schlesinger},
  title        = {Cryptanalysis for Peacetime: Codebreaking and the Birth and Structure
                  of the United Nations},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {217--235},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883908},
  doi          = {10.1080/0161-119591883908},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schlesinger95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wayner95,
  author       = {Peter Wayner},
  title        = {Strong Theoretical Stegnography},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {285--299},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883962},
  doi          = {10.1080/0161-119591883962},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wayner95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Weber95,
  author       = {Ralph E. Weber},
  title        = {Seward's Other Folly: the Fight over America's First Encrypted Cable},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {321--348},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883999},
  doi          = {10.1080/0161-119591883999},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Weber95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}