default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia22.bht:"
@article{DBLP:journals/cryptologia/Burke98, author = {Colin B. Burke}, title = {A Gracious but Tragic Special Ultra Message}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {29--32}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886759}, doi = {10.1080/0161-119891886759}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Coppersmith98, author = {Don Coppersmith}, title = {Attacking Four-Round Luby-Rackoff Ciphers}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {266--278}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886920}, doi = {10.1080/0161-119891886920}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Coppersmith98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ernst98, author = {Thomas Ernst}, title = {The Numerical-Astrological Ciphers in the Third Book of Trithemius's Steganographia}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {318--341}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886957}, doi = {10.1080/0161-119891886957}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ernst98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer98, author = {David Hamer}, title = {Letter to the Editors {M2114:} a Naval Enigma}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {230}, year = {1998}, url = {https://doi.org/10.1080/01611199809350311}, doi = {10.1080/01611199809350311}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HamerSW98, author = {David H. Hamer and Geoff Sullivan and Frode Weierud}, title = {Enigma Variations: an Extended Family of Machines}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {211--229}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886885}, doi = {10.1080/0161-119891886885}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/HamerSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Heider98, author = {Franz{-}Peter Heider}, title = {A Colossal Fish}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {69--95}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886795}, doi = {10.1080/0161-119891886795}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Heider98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn98, author = {David Kahn}, title = {Soviet Comint in the Cold War}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {1--24}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886731}, doi = {10.1080/0161-119891886731}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kelly98, author = {Thomas Kelly}, title = {The Myth of the Skytale}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {244--260}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886902}, doi = {10.1080/0161-119891886902}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kelly98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KourtisM98, author = {Anastasios Kourtis and Charalampos Mantakas}, title = {Statistical Distribution of Delta Modulated Speech Signals as a Means for Cryptanalysis in Voice Encryption Systems}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {279--287}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886939}, doi = {10.1080/0161-119891886939}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KourtisM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {49--55}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886777}, doi = {10.1080/0161-119891886777}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98a, author = {Louis Kruh}, title = {Still Waiting to be Solved: Elgar's 1897 Cipher Message}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {97--98}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886803}, doi = {10.1080/0161-119891886803}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {167--191}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886867}, doi = {10.1080/0161-119891886867}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {261--265}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886911}, doi = {10.1080/0161-119891886911}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98d, author = {Louis Kruh}, title = {Another Herbert O. Yardley Mystery?}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {370--375}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886984}, doi = {10.1080/0161-119891886984}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh98e, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {376--379}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886993}, doi = {10.1080/0161-119891886993}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh98e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lewis98, author = {Graydon A. Lewis}, title = {Setting the Record Straight on Midway}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {99--101}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886812}, doi = {10.1080/0161-119891886812}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Lewis98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MendelsonWW98, author = {Kenneth A. Mendelson and Stephen T. Walker and Joan D. Winston}, title = {The Evolution of Recent Cryptographic Policy in the United States}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {193--210}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886876}, doi = {10.1080/0161-119891886876}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MendelsonWW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen98, author = {Michael van der Meulen}, title = {A First German Cryptologic Exhibition}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {33--48}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886768}, doi = {10.1080/0161-119891886768}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen98a, author = {Michael van der Meulen}, title = {The Road to German Diplomatic Ciphers - 1919 {TO} 1945}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {141--166}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886858}, doi = {10.1080/0161-119891886858}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MoldovyanM98, author = {Alexander A. Moldovyan and Nikolay A. Moldovyan}, title = {Software Encryption Algorithms for Transparent Protection Technology}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {56--68}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886786}, doi = {10.1080/0161-119891886786}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MoldovyanM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MoldovyanM98a, author = {Alexander A. Moldovyan and Nikolay A. Moldovyan}, title = {Flexible Block Cipher with Provably Inequivalent Cryptalgorithm Modifications}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {134--140}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886849}, doi = {10.1080/0161-119891886849}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MoldovyanM98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Nichols98, author = {Randall K. Nichols}, title = {The Bible Code}, journal = {Cryptologia}, volume = {22}, number = {2}, pages = {121--133}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886830}, doi = {10.1080/0161-119891886830}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Nichols98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Oye98, author = {David Schimmelpenninck van der Oye}, title = {Tsarist Codebreaking Some Background and Some Examples}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {342--353}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886966}, doi = {10.1080/0161-119891886966}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Oye98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Pfeiffer98, author = {Paul N. Pfeiffer}, title = {Breaking the German Weather Ciphers in the Mediterranean Detachment G, 849th Signal Intelligence Service}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {354--369}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886975}, doi = {10.1080/0161-119891886975}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Pfeiffer98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Reeds98, author = {Jim Reeds}, title = {Solved: the Ciphers in Book {III} of Trithemius's Steganographia}, journal = {Cryptologia}, volume = {22}, number = {4}, pages = {291--317}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886948}, doi = {10.1080/0161-119891886948}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Reeds98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Viterbo98, author = {Emanuele Viterbo}, title = {The Ciphered autobiography of a 19th Century Egyptologist}, journal = {Cryptologia}, volume = {22}, number = {3}, pages = {231--243}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886894}, doi = {10.1080/0161-119891886894}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Viterbo98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Weierud98, author = {Frode Weierud}, title = {Sweden Cryptographic Superpower a Book Review}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {25--28}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886740}, doi = {10.1080/0161-119891886740}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Weierud98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.