Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia2.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/Arnold78,
  author       = {Philip M. Arnold},
  title        = {A Forgotten Book on Ciphers},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {232--235},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853036},
  doi          = {10.1080/0161-117891853036},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Arnold78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Barker78,
  author       = {Wayne G. Barker},
  title        = {Solving a Hagelin, Type CD-57, Cipher},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {1},
  pages        = {1--8},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852730},
  doi          = {10.1080/0161-117891852730},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Barker78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Barker78a,
  author       = {Wayne G. Barker},
  title        = {The Unsolved D'Agapeyeff Cipher},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {144--147},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852901},
  doi          = {10.1080/0161-117891852901},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Barker78a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BlakleyB78,
  author       = {Bob Blakley and
                  G. R. Blakley},
  title        = {Security of Number Theoretic Public Key Cryptosystems against Random
                  Attack, {I}},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {305--321},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853162},
  doi          = {10.1080/0161-117891853162},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BlakleyB78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Callas78,
  author       = {Nicholas P. Callas},
  title        = {An Application of Computers in Cryptography},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {350--364},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853234},
  doi          = {10.1080/0161-117891853234},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Callas78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Childs78,
  author       = {J. Rives Childs},
  title        = {My recollections of {G.2} {A.6}},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {201--214},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853018},
  doi          = {10.1080/0161-117891853018},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Childs78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours78,
  author       = {Cipher A. Deavours},
  title        = {"Cryptanalysis of the Hagelin Cryptograph" Wayne G. Barker},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {1},
  pages        = {66--67},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852794},
  doi          = {10.1080/0161-117891852794},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours78a,
  author       = {Cipher A. Deavours},
  title        = {Cryptology at Kean College},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {134--138},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852884},
  doi          = {10.1080/0161-117891852884},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours78a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Foster78,
  author       = {Caxton C. Foster},
  title        = {Cryptanalysis and Computers},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {236--237},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853045},
  doi          = {10.1080/0161-117891853045},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Foster78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Heitzenrater78,
  author       = {Richard Heitzenrater},
  title        = {Decoding Wesley's Diaries},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {260--264},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853108},
  doi          = {10.1080/0161-117891853108},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Heitzenrater78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn78,
  author       = {David Kahn},
  title        = {The Forschungsamt: Nazi Germany's Most Secret Communications Intelligence
                  Agency},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {1},
  pages        = {12--19},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852758},
  doi          = {10.1080/0161-117891852758},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn78a,
  author       = {David Kahn},
  title        = {Friedman's Life: a Book Review},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {122--123},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852857},
  doi          = {10.1080/0161-117891852857},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn78a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn78b,
  author       = {David Kahn},
  title        = {Nuggets from the Archives: Yardley Tries Again},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {139--143},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852893},
  doi          = {10.1080/0161-117891852893},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn78b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn78c,
  author       = {David Kahn},
  title        = {Pictures Galore: {A} Book Review},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {151},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852929},
  doi          = {10.1080/0161-117891852929},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn78c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn78d,
  author       = {David Kahn},
  title        = {A Famous Variation: a Book Review},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {257},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853081},
  doi          = {10.1080/0161-117891853081},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn78d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn78e,
  author       = {David Kahn},
  title        = {Reveling in Deception: a Book Review},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {258--259},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853090},
  doi          = {10.1080/0161-117891853090},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn78e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn78f,
  author       = {David Kahn},
  title        = {Short Notices - Reviews},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {265--266},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853117},
  doi          = {10.1080/0161-117891853117},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn78f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn78g,
  author       = {David Kahn},
  title        = {Extraordinary Codebreakers, Outstanding Family: a Review},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {331--333},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853199},
  doi          = {10.1080/0161-117891853199},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn78g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn78h,
  author       = {David Kahn},
  title        = {One of the Worst: a Review},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {365},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853243},
  doi          = {10.1080/0161-117891853243},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn78h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kinnucan78,
  author       = {Paul Kinnucan},
  title        = {Data Encryption Gurus: Tuchman and Meyer},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {371--381},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853270},
  doi          = {10.1080/0161-117891853270},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kinnucan78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Knight78,
  author       = {H. Gary Knight},
  title        = {Cryptanalyst's Corner},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {1},
  pages        = {68--74},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852802},
  doi          = {10.1080/0161-117891852802},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Knight78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Knight78a,
  author       = {H. Gary Knight},
  title        = {Cryptanalyst's Corner},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {124--129},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852866},
  doi          = {10.1080/0161-117891852866},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Knight78a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Knight78b,
  author       = {H. Gary Knight},
  title        = {Cryptanalysts' Corner},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {238--241},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853054},
  doi          = {10.1080/0161-117891853054},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Knight78b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Knight78c,
  author       = {H. Gary Knight},
  title        = {Cryptanalysts' Corner},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {335--337},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853216},
  doi          = {10.1080/0161-117891853216},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Knight78c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh78,
  author       = {Louis Kruh},
  title        = {The Inventions of William P. Friedman},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {1},
  pages        = {38--61},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852776},
  doi          = {10.1080/0161-117891852776},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh78a,
  author       = {Louis Kruh},
  title        = {Who Wrote "the American Black Chamber"?},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {130--133},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852875},
  doi          = {10.1080/0161-117891852875},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh78a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh78b,
  author       = {Louis Kruh},
  title        = {Cryptology as a Career},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {164--167},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852956},
  doi          = {10.1080/0161-117891852956},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh78b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh78c,
  author       = {Louis Kruh},
  title        = {Dh-26 Handheld Encryption Machine},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {172--177},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852974},
  doi          = {10.1080/0161-117891852974},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh78c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh78d,
  author       = {Louis Kruh},
  title        = {A Catalog of Historical Interest},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {242--253},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853063},
  doi          = {10.1080/0161-117891853063},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh78d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh78e,
  author       = {Louis Kruh},
  title        = {Capsule Reviews for Crypto Buffs},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {290--292},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853135},
  doi          = {10.1080/0161-117891853135},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh78e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh78f,
  author       = {Louis Kruh},
  title        = {What the Nazis Were Doing},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {322--323},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853171},
  doi          = {10.1080/0161-117891853171},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh78f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh78g,
  author       = {Louis Kruh},
  title        = {A 19th-Century Challenge Cipher},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {334},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853207},
  doi          = {10.1080/0161-117891853207},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh78g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh78h,
  author       = {Louis Kruh},
  title        = {A Catalog of Historical Interest},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {338--349},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853225},
  doi          = {10.1080/0161-117891853225},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh78h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh78i,
  author       = {Louis Kruh},
  title        = {Rent a Code},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {366--367},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853252},
  doi          = {10.1080/0161-117891853252},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh78i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Morris78,
  author       = {Robert H. Morris Sr.},
  title        = {The Hagelin Cipher Machine {(M-209)} Reconstruction of the Internal
                  Settings},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {267--289},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853126},
  doi          = {10.1080/0161-117891853126},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Morris78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Oakley78,
  author       = {Howard T. Oakley},
  title        = {The Riverbank Publications on Cryptology},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {324--330},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853180},
  doi          = {10.1080/0161-117891853180},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Oakley78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rivest78,
  author       = {Ronald L. Rivest},
  title        = {Remarks on a Proposed Cryptanalytic Attack on the {M.I.T.} Public-Key
                  Cryptosystem},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {1},
  pages        = {62--65},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852785},
  doi          = {10.1080/0161-117891852785},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rivest78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rohrbach78,
  author       = {Hans Rohrbach},
  title        = {Mathematical and Mechanical Methods in Cryptography},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {1},
  pages        = {20--37},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852767},
  doi          = {10.1080/0161-117891852767},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rohrbach78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rohrbach78a,
  author       = {Hans Rohrbach},
  title        = {Mathematical and Mechanical Methods in Cryptography},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {101--121},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852848},
  doi          = {10.1080/0161-117891852848},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rohrbach78a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin78,
  author       = {Frank Rubin},
  title        = {Computer Methods for Decrypting Multiplex Ciphers},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {152--160},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852938},
  doi          = {10.1080/0161-117891852938},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin78a,
  author       = {Frank Rubin},
  title        = {Computer Methods for Decrypting Random Stream Ciphers},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {215--231},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853027},
  doi          = {10.1080/0161-117891853027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin78a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Straight78,
  author       = {David W. Straight},
  title        = {An Outline of Computer Security; a Book Review},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {148--150},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852910},
  doi          = {10.1080/0161-117891852910},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Straight78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Weber78,
  author       = {Ralph E. Weber},
  title        = {James Lovell and Secret Ciphers during the American Revolution},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {1},
  pages        = {75--88},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852811},
  doi          = {10.1080/0161-117891852811},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Weber78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wilson78,
  author       = {David Wilson},
  title        = {Cryptanalysis Course Down Under},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {1},
  pages        = {9--11},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852749},
  doi          = {10.1080/0161-117891852749},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wilson78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel78,
  author       = {Brian J. Winkel},
  title        = {There and There},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {1},
  pages        = {89--94},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852820},
  doi          = {10.1080/0161-117891852820},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel78a,
  author       = {Brian J. Winkel},
  title        = {Casanova and the Beaufort Cipher},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {161--163},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852947},
  doi          = {10.1080/0161-117891852947},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel78a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel78b,
  author       = {Brian J. Winkel},
  title        = {There and There},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {186--194},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852992},
  doi          = {10.1080/0161-117891852992},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel78b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel78c,
  author       = {Brian J. Winkel},
  title        = {There and There},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {3},
  pages        = {293--298},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853144},
  doi          = {10.1080/0161-117891853144},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel78c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel78d,
  author       = {Brian J. Winkel},
  title        = {There and There},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {4},
  pages        = {382--393},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891853289},
  doi          = {10.1080/0161-117891853289},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel78d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X78,
  title        = {Encryption Challenge},
  journal      = {Cryptologia},
  volume       = {2},
  number       = {2},
  pages        = {168--171},
  year         = {1978},
  url          = {https://doi.org/10.1080/0161-117891852965},
  doi          = {10.1080/0161-117891852965},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}