default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia19.bht:"
@article{DBLP:journals/cryptologia/Alvarez95, author = {David Alvarez}, title = {A Dutch Enciphered Code}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {261--264}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883935}, doi = {10.1080/0161-119591883935}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Alvarez95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Davies95, author = {Donald W. Davies}, title = {The Lorenz Cipher Machine Sz42}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {39--61}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883755}, doi = {10.1080/0161-119591883755}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Davies95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours95, author = {Cipher A. Deavours}, title = {The Autoscritcher}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {137--148}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883827}, doi = {10.1080/0161-119591883827}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Denniston95, author = {Robin Denniston}, title = {Fetterlein and Others}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {62--64}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883764}, doi = {10.1080/0161-119591883764}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Denniston95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Drea95, author = {Edward J. Drea}, title = {Were the Japanese Army Codes Secure?}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {113--136}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883818}, doi = {10.1080/0161-119591883818}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Drea95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine95, author = {Ralph Erskine}, title = {Ultra and Some U. S. Navy Carrier Operations}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {81--96}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883782}, doi = {10.1080/0161-119591883782}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Foster95, author = {Caxton C. Foster}, title = {Secret Musical codewords}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {216}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883890}, doi = {10.1080/0161-119591883890}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Foster95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gaddy95, author = {David W. Gaddy}, title = {The Cylinder-Cipher}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {385--391}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884033}, doi = {10.1080/0161-119591884033}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gaddy95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gillogly95, author = {James J. Gillogly}, title = {Ciphertext-only Cryptanalysis of Enigma}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {405--413}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884060}, doi = {10.1080/0161-119591884060}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Gillogly95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Jakobsen95, author = {Thomas Jakobsen}, title = {A Fast Method for Cryptanalysis of Substitution Ciphers}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {265--274}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883944}, doi = {10.1080/0161-119591883944}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Jakobsen95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Johnson95, author = {Tom Johnson}, title = {The Mystery of an Old Japanese Codebook}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {380--384}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884024}, doi = {10.1080/0161-119591884024}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Johnson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Johnson95a, author = {Mike Johnson}, title = {Cryptology in Cyberspace}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {392--396}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884042}, doi = {10.1080/0161-119591884042}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Johnson95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn95, author = {David Kahn}, title = {The Cryptologic Origin of Braille}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {151--152}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883845}, doi = {10.1080/0161-119591883845}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn95a, author = {David Kahn}, title = {Enemy Codes and their Solution}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {166--197}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883863}, doi = {10.1080/0161-119591883863}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95, author = {Louis Kruh}, title = {When a Court ruled for {BACON} Instead of Shakespeare-Temporarily}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {24--38}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883746}, doi = {10.1080/0161-119591883746}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95a, author = {Louis Kruh}, title = {In the Name of Intelligence: Essays in Honor of Walter Pforzheimer Book Review}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {97--101}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883791}, doi = {10.1080/0161-119591883791}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {102--112}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883809}, doi = {10.1080/0161-119591883809}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {209--215}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883881}, doi = {10.1080/0161-119591883881}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95d, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {300--318}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883971}, doi = {10.1080/0161-119591883971}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh95e, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {365--374}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884015}, doi = {10.1080/0161-119591884015}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh95e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruth95, author = {Louis Kruth}, title = {Riverbank Laboratory Correspondence, 1919 {(SRH-50)}}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {236--246}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883917}, doi = {10.1080/0161-119591883917}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruth95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LeeuwM95, author = {Karl de Leeuw and Hans van der Meer}, title = {A Turning grille from the Ancestral Castle of the Dutch Stadtholders}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {153--165}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883854}, doi = {10.1080/0161-119591883854}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LeeuwM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LiawL95, author = {Horng{-}Twu Liaw and Chin{-}Laung Lei}, title = {An Efficient Password Authentication Scheme Based on a Unit Circle}, journal = {Cryptologia}, volume = {19}, number = {2}, pages = {198--208}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883872}, doi = {10.1080/0161-119591883872}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LiawL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen95, author = {Michael van der Meulen}, title = {The Book Cipher System of the \emph{Wehrmacht}}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {247--260}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883926}, doi = {10.1080/0161-119591883926}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen95a, author = {Michael van der Meulen}, title = {Werftschl{\"{u}}ssel: {A} German Navy Hand Cipher System Part {I}}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {349--364}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884006}, doi = {10.1080/0161-119591884006}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Miller95, author = {A. Ray Miller}, title = {The Cryptographic Mathematics of Enigma}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {65--80}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883773}, doi = {10.1080/0161-119591883773}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Miller95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Reeds95, author = {Jim Reeds}, title = {William F. Friedman's transcription of the Voynich Manuscript}, journal = {Cryptologia}, volume = {19}, number = {1}, pages = {1--23}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883737}, doi = {10.1080/0161-119591883737}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Reeds95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin95, author = {Frank Rubin}, title = {The Quadratic and Double Quadratic Residue Ciphers}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {275--284}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883953}, doi = {10.1080/0161-119591883953}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin95a, author = {Frank Rubin}, title = {Message Authentication Using Quadratic residues}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {397--404}, year = {1995}, url = {https://doi.org/10.1080/0161-119591884051}, doi = {10.1080/0161-119591884051}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schlesinger95, author = {Stephen Schlesinger}, title = {Cryptanalysis for Peacetime: Codebreaking and the Birth and Structure of the United Nations}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {217--235}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883908}, doi = {10.1080/0161-119591883908}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schlesinger95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wayner95, author = {Peter Wayner}, title = {Strong Theoretical Stegnography}, journal = {Cryptologia}, volume = {19}, number = {3}, pages = {285--299}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883962}, doi = {10.1080/0161-119591883962}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wayner95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Weber95, author = {Ralph E. Weber}, title = {Seward's Other Folly: the Fight over America's First Encrypted Cable}, journal = {Cryptologia}, volume = {19}, number = {4}, pages = {321--348}, year = {1995}, url = {https://doi.org/10.1080/0161-119591883999}, doi = {10.1080/0161-119591883999}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Weber95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.