Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia25.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/Budiansky01,
  author       = {Stephen Budiansky},
  title        = {Codebreaking with {IBM} Machines in World War {II}},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {4},
  pages        = {241--255},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889914},
  doi          = {10.1080/0161-110191889914},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Budiansky01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke01,
  author       = {Colin B. Burke},
  title        = {Kim Philby, the American Intelligence Community, and {OP-20-G:} the
                  Fox Built the Hen-House and Took the Keys},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {88--90},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889815},
  doi          = {10.1080/0161-110191889815},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gladwin01,
  author       = {Lee A. Gladwin},
  title        = {Alan Turing's Visit to Dayton},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {11--17},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889743},
  doi          = {10.1080/0161-110191889743},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gladwin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hammant01,
  author       = {Thomas R. Hammant},
  title        = {Russian and Soviet Cryptology {III} - Soviet Comint and the Civil
                  War, 1918-1921},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {50--60},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889770},
  doi          = {10.1080/0161-110191889770},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hammant01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hammant01a,
  author       = {Thomas R. Hammant},
  title        = {Russian and Soviet Cryptology {IV} - Some Incidents in the 1930's},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {61--63},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889789},
  doi          = {10.1080/0161-110191889789},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hammant01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hernandez-Castro01,
  author       = {Julio C. Hernandez{-}Castro and
                  Arturo Ribagorda and
                  Pedro Isasi and
                  Jos{\'{e}} M. Sierra},
  title        = {Genetic Algorithms Can be Used to Obtain Good Linear Congruential
                  Generators},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {3},
  pages        = {213--229},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889897},
  doi          = {10.1080/0161-110191889897},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hernandez-Castro01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ibbotson01,
  author       = {Peter Ibbotson},
  title        = {Sayers and Ciphers},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {81--87},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889806},
  doi          = {10.1080/0161-110191889806},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ibbotson01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Johnsen01,
  author       = {Ben Johnsen},
  title        = {Cryptography in Runic inscriptions: a Remark on the Article, "Cryptography
                  in Runic inscriptions, " by O. G. Landsverk},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {95--100},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889833},
  doi          = {10.1080/0161-110191889833},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Johnsen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh01,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {64--79},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889798},
  doi          = {10.1080/0161-110191889798},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh01a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {142--159},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889851},
  doi          = {10.1080/0161-110191889851},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh01b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {3},
  pages        = {230--239},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889905},
  doi          = {10.1080/0161-110191889905},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh01b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh01c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {4},
  pages        = {311--317},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889950},
  doi          = {10.1080/0161-110191889950},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh01c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Landini01,
  author       = {Gabriel Landini},
  title        = {Evidence of Linguistic Structure in the Voynich Manuscript Using Spectral
                  Analysis},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {4},
  pages        = {275--295},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889932},
  doi          = {10.1080/0161-110191889932},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Landini01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Leeuw01,
  author       = {Karl de Leeuw},
  title        = {Johann Friedrich Euler {(1741-1800):} Mathematician and Cryptologist
                  at the Court of the Dutch Stadholder William {V}},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {4},
  pages        = {256--274},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889923},
  doi          = {10.1080/0161-110191889923},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Leeuw01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Marks01,
  author       = {Philip Marks},
  title        = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {I}},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {101--141},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889842},
  doi          = {10.1080/0161-110191889842},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Marks01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Marks01a,
  author       = {Philip C. Marks},
  title        = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {II}},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {3},
  pages        = {177--212},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889888},
  doi          = {10.1080/0161-110191889888},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Marks01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Marks01b,
  author       = {Philip C. Marks},
  title        = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {III}},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {4},
  pages        = {296--310},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889941},
  doi          = {10.1080/0161-110191889941},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Marks01b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Risca01,
  author       = {Viviana I. Risca},
  title        = {DNA-Based Steganography},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {37--49},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889761},
  doi          = {10.1080/0161-110191889761},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Risca01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin01,
  author       = {Michael Rubin},
  title        = {The Telegraph, Espionage, and Cryptology in Nineteenth Century Iran},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {18--36},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889752},
  doi          = {10.1080/0161-110191889752},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Turing01,
  author       = {Alan M. Turing},
  title        = {Visit to National Cash Register Corporation of Dayton, Ohio},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {1--10},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889734},
  doi          = {10.1080/0161-110191889734},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Turing01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkler01,
  author       = {Jonathan Winkler},
  title        = {From the Archives Early Corporate espionage amid World War {I} Censorship},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {91--94},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889824},
  doi          = {10.1080/0161-110191889824},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkler01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}