default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia25.bht:"
@article{DBLP:journals/cryptologia/Budiansky01, author = {Stephen Budiansky}, title = {Codebreaking with {IBM} Machines in World War {II}}, journal = {Cryptologia}, volume = {25}, number = {4}, pages = {241--255}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889914}, doi = {10.1080/0161-110191889914}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Budiansky01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke01, author = {Colin B. Burke}, title = {Kim Philby, the American Intelligence Community, and {OP-20-G:} the Fox Built the Hen-House and Took the Keys}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {88--90}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889815}, doi = {10.1080/0161-110191889815}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gladwin01, author = {Lee A. Gladwin}, title = {Alan Turing's Visit to Dayton}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {11--17}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889743}, doi = {10.1080/0161-110191889743}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gladwin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hammant01, author = {Thomas R. Hammant}, title = {Russian and Soviet Cryptology {III} - Soviet Comint and the Civil War, 1918-1921}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {50--60}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889770}, doi = {10.1080/0161-110191889770}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hammant01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hammant01a, author = {Thomas R. Hammant}, title = {Russian and Soviet Cryptology {IV} - Some Incidents in the 1930's}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {61--63}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889789}, doi = {10.1080/0161-110191889789}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hammant01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hernandez-Castro01, author = {Julio C. Hernandez{-}Castro and Arturo Ribagorda and Pedro Isasi and Jos{\'{e}} M. Sierra}, title = {Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators}, journal = {Cryptologia}, volume = {25}, number = {3}, pages = {213--229}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889897}, doi = {10.1080/0161-110191889897}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hernandez-Castro01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ibbotson01, author = {Peter Ibbotson}, title = {Sayers and Ciphers}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {81--87}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889806}, doi = {10.1080/0161-110191889806}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ibbotson01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Johnsen01, author = {Ben Johnsen}, title = {Cryptography in Runic inscriptions: a Remark on the Article, "Cryptography in Runic inscriptions, " by O. G. Landsverk}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {95--100}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889833}, doi = {10.1080/0161-110191889833}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Johnsen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh01, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {64--79}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889798}, doi = {10.1080/0161-110191889798}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh01a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {142--159}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889851}, doi = {10.1080/0161-110191889851}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh01b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {25}, number = {3}, pages = {230--239}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889905}, doi = {10.1080/0161-110191889905}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh01b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh01c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {25}, number = {4}, pages = {311--317}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889950}, doi = {10.1080/0161-110191889950}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh01c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Landini01, author = {Gabriel Landini}, title = {Evidence of Linguistic Structure in the Voynich Manuscript Using Spectral Analysis}, journal = {Cryptologia}, volume = {25}, number = {4}, pages = {275--295}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889932}, doi = {10.1080/0161-110191889932}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Landini01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Leeuw01, author = {Karl de Leeuw}, title = {Johann Friedrich Euler {(1741-1800):} Mathematician and Cryptologist at the Court of the Dutch Stadholder William {V}}, journal = {Cryptologia}, volume = {25}, number = {4}, pages = {256--274}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889923}, doi = {10.1080/0161-110191889923}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Leeuw01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Marks01, author = {Philip Marks}, title = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {I}}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {101--141}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889842}, doi = {10.1080/0161-110191889842}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Marks01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Marks01a, author = {Philip C. Marks}, title = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {II}}, journal = {Cryptologia}, volume = {25}, number = {3}, pages = {177--212}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889888}, doi = {10.1080/0161-110191889888}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Marks01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Marks01b, author = {Philip C. Marks}, title = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {III}}, journal = {Cryptologia}, volume = {25}, number = {4}, pages = {296--310}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889941}, doi = {10.1080/0161-110191889941}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Marks01b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Risca01, author = {Viviana I. Risca}, title = {DNA-Based Steganography}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {37--49}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889761}, doi = {10.1080/0161-110191889761}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Risca01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin01, author = {Michael Rubin}, title = {The Telegraph, Espionage, and Cryptology in Nineteenth Century Iran}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {18--36}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889752}, doi = {10.1080/0161-110191889752}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Turing01, author = {Alan M. Turing}, title = {Visit to National Cash Register Corporation of Dayton, Ohio}, journal = {Cryptologia}, volume = {25}, number = {1}, pages = {1--10}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889734}, doi = {10.1080/0161-110191889734}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Turing01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkler01, author = {Jonathan Winkler}, title = {From the Archives Early Corporate espionage amid World War {I} Censorship}, journal = {Cryptologia}, volume = {25}, number = {2}, pages = {91--94}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889824}, doi = {10.1080/0161-110191889824}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkler01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.