default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia2.bht:"
@article{DBLP:journals/cryptologia/Arnold78, author = {Philip M. Arnold}, title = {A Forgotten Book on Ciphers}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {232--235}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853036}, doi = {10.1080/0161-117891853036}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Arnold78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Barker78, author = {Wayne G. Barker}, title = {Solving a Hagelin, Type CD-57, Cipher}, journal = {Cryptologia}, volume = {2}, number = {1}, pages = {1--8}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852730}, doi = {10.1080/0161-117891852730}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Barker78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Barker78a, author = {Wayne G. Barker}, title = {The Unsolved D'Agapeyeff Cipher}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {144--147}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852901}, doi = {10.1080/0161-117891852901}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Barker78a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BlakleyB78, author = {Bob Blakley and G. R. Blakley}, title = {Security of Number Theoretic Public Key Cryptosystems against Random Attack, {I}}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {305--321}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853162}, doi = {10.1080/0161-117891853162}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BlakleyB78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Callas78, author = {Nicholas P. Callas}, title = {An Application of Computers in Cryptography}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {350--364}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853234}, doi = {10.1080/0161-117891853234}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Callas78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Childs78, author = {J. Rives Childs}, title = {My recollections of {G.2} {A.6}}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {201--214}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853018}, doi = {10.1080/0161-117891853018}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Childs78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours78, author = {Cipher A. Deavours}, title = {"Cryptanalysis of the Hagelin Cryptograph" Wayne G. Barker}, journal = {Cryptologia}, volume = {2}, number = {1}, pages = {66--67}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852794}, doi = {10.1080/0161-117891852794}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours78a, author = {Cipher A. Deavours}, title = {Cryptology at Kean College}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {134--138}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852884}, doi = {10.1080/0161-117891852884}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours78a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Foster78, author = {Caxton C. Foster}, title = {Cryptanalysis and Computers}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {236--237}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853045}, doi = {10.1080/0161-117891853045}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Foster78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Heitzenrater78, author = {Richard Heitzenrater}, title = {Decoding Wesley's Diaries}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {260--264}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853108}, doi = {10.1080/0161-117891853108}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Heitzenrater78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn78, author = {David Kahn}, title = {The Forschungsamt: Nazi Germany's Most Secret Communications Intelligence Agency}, journal = {Cryptologia}, volume = {2}, number = {1}, pages = {12--19}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852758}, doi = {10.1080/0161-117891852758}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn78a, author = {David Kahn}, title = {Friedman's Life: a Book Review}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {122--123}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852857}, doi = {10.1080/0161-117891852857}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn78a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn78b, author = {David Kahn}, title = {Nuggets from the Archives: Yardley Tries Again}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {139--143}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852893}, doi = {10.1080/0161-117891852893}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn78b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn78c, author = {David Kahn}, title = {Pictures Galore: {A} Book Review}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {151}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852929}, doi = {10.1080/0161-117891852929}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn78c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn78d, author = {David Kahn}, title = {A Famous Variation: a Book Review}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {257}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853081}, doi = {10.1080/0161-117891853081}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn78d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn78e, author = {David Kahn}, title = {Reveling in Deception: a Book Review}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {258--259}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853090}, doi = {10.1080/0161-117891853090}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn78e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn78f, author = {David Kahn}, title = {Short Notices - Reviews}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {265--266}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853117}, doi = {10.1080/0161-117891853117}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn78f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn78g, author = {David Kahn}, title = {Extraordinary Codebreakers, Outstanding Family: a Review}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {331--333}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853199}, doi = {10.1080/0161-117891853199}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn78g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn78h, author = {David Kahn}, title = {One of the Worst: a Review}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {365}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853243}, doi = {10.1080/0161-117891853243}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn78h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kinnucan78, author = {Paul Kinnucan}, title = {Data Encryption Gurus: Tuchman and Meyer}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {371--381}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853270}, doi = {10.1080/0161-117891853270}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kinnucan78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Knight78, author = {H. Gary Knight}, title = {Cryptanalyst's Corner}, journal = {Cryptologia}, volume = {2}, number = {1}, pages = {68--74}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852802}, doi = {10.1080/0161-117891852802}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Knight78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Knight78a, author = {H. Gary Knight}, title = {Cryptanalyst's Corner}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {124--129}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852866}, doi = {10.1080/0161-117891852866}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Knight78a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Knight78b, author = {H. Gary Knight}, title = {Cryptanalysts' Corner}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {238--241}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853054}, doi = {10.1080/0161-117891853054}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Knight78b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Knight78c, author = {H. Gary Knight}, title = {Cryptanalysts' Corner}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {335--337}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853216}, doi = {10.1080/0161-117891853216}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Knight78c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh78, author = {Louis Kruh}, title = {The Inventions of William P. Friedman}, journal = {Cryptologia}, volume = {2}, number = {1}, pages = {38--61}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852776}, doi = {10.1080/0161-117891852776}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh78a, author = {Louis Kruh}, title = {Who Wrote "the American Black Chamber"?}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {130--133}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852875}, doi = {10.1080/0161-117891852875}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh78a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh78b, author = {Louis Kruh}, title = {Cryptology as a Career}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {164--167}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852956}, doi = {10.1080/0161-117891852956}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh78b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh78c, author = {Louis Kruh}, title = {Dh-26 Handheld Encryption Machine}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {172--177}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852974}, doi = {10.1080/0161-117891852974}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh78c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh78d, author = {Louis Kruh}, title = {A Catalog of Historical Interest}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {242--253}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853063}, doi = {10.1080/0161-117891853063}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh78d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh78e, author = {Louis Kruh}, title = {Capsule Reviews for Crypto Buffs}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {290--292}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853135}, doi = {10.1080/0161-117891853135}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh78e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh78f, author = {Louis Kruh}, title = {What the Nazis Were Doing}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {322--323}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853171}, doi = {10.1080/0161-117891853171}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh78f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh78g, author = {Louis Kruh}, title = {A 19th-Century Challenge Cipher}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {334}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853207}, doi = {10.1080/0161-117891853207}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh78g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh78h, author = {Louis Kruh}, title = {A Catalog of Historical Interest}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {338--349}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853225}, doi = {10.1080/0161-117891853225}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh78h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh78i, author = {Louis Kruh}, title = {Rent a Code}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {366--367}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853252}, doi = {10.1080/0161-117891853252}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh78i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Morris78, author = {Robert H. Morris Sr.}, title = {The Hagelin Cipher Machine {(M-209)} Reconstruction of the Internal Settings}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {267--289}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853126}, doi = {10.1080/0161-117891853126}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Morris78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Oakley78, author = {Howard T. Oakley}, title = {The Riverbank Publications on Cryptology}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {324--330}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853180}, doi = {10.1080/0161-117891853180}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Oakley78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rivest78, author = {Ronald L. Rivest}, title = {Remarks on a Proposed Cryptanalytic Attack on the {M.I.T.} Public-Key Cryptosystem}, journal = {Cryptologia}, volume = {2}, number = {1}, pages = {62--65}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852785}, doi = {10.1080/0161-117891852785}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rivest78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rohrbach78, author = {Hans Rohrbach}, title = {Mathematical and Mechanical Methods in Cryptography}, journal = {Cryptologia}, volume = {2}, number = {1}, pages = {20--37}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852767}, doi = {10.1080/0161-117891852767}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rohrbach78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rohrbach78a, author = {Hans Rohrbach}, title = {Mathematical and Mechanical Methods in Cryptography}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {101--121}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852848}, doi = {10.1080/0161-117891852848}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rohrbach78a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin78, author = {Frank Rubin}, title = {Computer Methods for Decrypting Multiplex Ciphers}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {152--160}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852938}, doi = {10.1080/0161-117891852938}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin78a, author = {Frank Rubin}, title = {Computer Methods for Decrypting Random Stream Ciphers}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {215--231}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853027}, doi = {10.1080/0161-117891853027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin78a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Straight78, author = {David W. Straight}, title = {An Outline of Computer Security; a Book Review}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {148--150}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852910}, doi = {10.1080/0161-117891852910}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Straight78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Weber78, author = {Ralph E. Weber}, title = {James Lovell and Secret Ciphers during the American Revolution}, journal = {Cryptologia}, volume = {2}, number = {1}, pages = {75--88}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852811}, doi = {10.1080/0161-117891852811}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Weber78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wilson78, author = {David Wilson}, title = {Cryptanalysis Course Down Under}, journal = {Cryptologia}, volume = {2}, number = {1}, pages = {9--11}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852749}, doi = {10.1080/0161-117891852749}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wilson78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel78, author = {Brian J. Winkel}, title = {There and There}, journal = {Cryptologia}, volume = {2}, number = {1}, pages = {89--94}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852820}, doi = {10.1080/0161-117891852820}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel78a, author = {Brian J. Winkel}, title = {Casanova and the Beaufort Cipher}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {161--163}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852947}, doi = {10.1080/0161-117891852947}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel78a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel78b, author = {Brian J. Winkel}, title = {There and There}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {186--194}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852992}, doi = {10.1080/0161-117891852992}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel78b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel78c, author = {Brian J. Winkel}, title = {There and There}, journal = {Cryptologia}, volume = {2}, number = {3}, pages = {293--298}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853144}, doi = {10.1080/0161-117891853144}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel78c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel78d, author = {Brian J. Winkel}, title = {There and There}, journal = {Cryptologia}, volume = {2}, number = {4}, pages = {382--393}, year = {1978}, url = {https://doi.org/10.1080/0161-117891853289}, doi = {10.1080/0161-117891853289}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel78d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X78, title = {Encryption Challenge}, journal = {Cryptologia}, volume = {2}, number = {2}, pages = {168--171}, year = {1978}, url = {https://doi.org/10.1080/0161-117891852965}, doi = {10.1080/0161-117891852965}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/X78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.