![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia40.bht:"
@article{DBLP:journals/cryptologia/Bauer16, author = {Craig Bauer}, title = {Review of \emph{Unveiling the Mystic Ciphers} by Dave Ramsden}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {399--401}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1159476}, doi = {10.1080/01611194.2016.1159476}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BauerLM16, author = {Craig Bauer and Gregory Link and Dante Molle}, title = {James Sanborn's Kryptos and the matrix encryption conjecture}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {541--552}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1141556}, doi = {10.1080/01611194.2016.1141556}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/BauerLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Boklan16, author = {Kent D. Boklan}, title = {How {I} deciphered a Robert E. Lee letter - and a note on the power of context in short polyalphabetic ciphers}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {406--410}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1170424}, doi = {10.1080/01611194.2016.1170424}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Boklan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BonavogliaP16, author = {Paolo Bonavoglia and Consolato Pellegrino}, title = {The last poem of Pietro Giannone - finally decrypted}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {411--427}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1087072}, doi = {10.1080/01611194.2015.1087072}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BonavogliaP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury16, author = {Jan Bury}, title = {Operation "Zachod": Sex, lies, and ciphers}, journal = {Cryptologia}, volume = {40}, number = {2}, pages = {113--140}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1113830}, doi = {10.1080/01611194.2015.1113830}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen16, author = {Chris Christensen}, title = {A review of three books about the women of Bletchley Park}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {469--476}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1159477}, doi = {10.1080/01611194.2016.1159477}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen16a, author = {Chris Christensen}, title = {Companion review of Prof: Alan Turing Decoded by Dermot Turing}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {556--562}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1236633}, doi = {10.1080/01611194.2016.1236633}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen16b, author = {Chris Christensen}, title = {Review of Codes, Ciphers and Spies: Tales of Military Intelligence in World War {I} by John F. Dooley}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {563--566}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1236631}, doi = {10.1080/01611194.2016.1236631}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen16c, author = {Chris Christensen}, title = {Review of {U.S.} Navy Codebreakers, Linguists, and Intelligence Officers against Japan, 1910-1941 by Steven E. Maffeo}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {567--569}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1236648}, doi = {10.1080/01611194.2016.1236648}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley16, author = {John F. Dooley}, title = {Review of \emph{Prisoners, Lovers, {\&} Spies} by Kristie Macrakis}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {107--112}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028684}, doi = {10.1080/01611194.2015.1028684}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/FuensantaP16, author = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and Vicente Guasch Portas}, title = {States by secrecy: Cryptography and guerrillas in the Spanish Civil War}, journal = {Cryptologia}, volume = {40}, number = {2}, pages = {203--214}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028687}, doi = {10.1080/01611194.2015.1028687}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/FuensantaP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Girard16, author = {Daniel J. Girard}, title = {Breaking "\emph{Tirpitz}": Cryptanalysis of the Japanese-German joint naval cipher}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {428--451}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1087073}, doi = {10.1080/01611194.2015.1087073}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Girard16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GoodmanD16, author = {Michael Goodman and Huw Dylan}, title = {British Intelligence and the Fear of a Soviet Attack on Allied Communications}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {15--32}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028686}, doi = {10.1080/01611194.2015.1028686}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/GoodmanD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hamer16, author = {David H. Hamer}, title = {Review of Prof: Alan Turing Decoded by Dermot Turing}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {553--555}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1236620}, doi = {10.1080/01611194.2016.1236620}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hamer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hoffman16, author = {Nick Hoffman}, title = {Review of \emph{Intercept: The Secret History of Computers and Spies} by Gordon Corera}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {477--480}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1129186}, doi = {10.1080/01611194.2015.1129186}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hoffman16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HwangG16, author = {Tzonelih Hwang and Prosanta Gope}, title = {{RT-OCFB:} Real-Time Based Optimized Cipher Feedback Mode}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {1--14}, year = {2016}, url = {https://doi.org/10.1080/01611194.2014.988366}, doi = {10.1080/01611194.2014.988366}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HwangG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HwangG16a, author = {Tzonelih Hwang and Prosanta Gope}, title = {PFC-CTR, {PFC-OCB:} Efficient stream cipher modes of authencryption}, journal = {Cryptologia}, volume = {40}, number = {3}, pages = {285--302}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1055386}, doi = {10.1080/01611194.2015.1055386}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HwangG16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak16, author = {Subhash C. Kak}, title = {Simulating entanglement in classical computing for cryptographic applications}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {348--354}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1084959}, doi = {10.1080/01611194.2015.1084959}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KepleyRS16, author = {Shane Kepley and David Russo and Rainer Steinwandt}, title = {Cryptanalysis of a modern rotor machine in a multicast setting}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {515--521}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1115443}, doi = {10.1080/01611194.2015.1115443}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KepleyRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kollar16, author = {Jozef Koll{\'{a}}r}, title = {Soviet {VIC} Cipher: No Respector of Kerckoff's Principles}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {33--48}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028679}, doi = {10.1080/01611194.2015.1028679}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kollar16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryKW16, author = {George Lasry and Nils Kopal and Arno Wacker}, title = {Automated Known-Plaintext Cryptanalysis of Short Hagelin {M-209} Messages}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {49--69}, year = {2016}, url = {https://doi.org/10.1080/01611194.2014.988370}, doi = {10.1080/01611194.2014.988370}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryKW16a, author = {George Lasry and Nils Kopal and Arno Wacker}, title = {Ciphertext-only cryptanalysis of Hagelin {M-209} pins and lugs}, journal = {Cryptologia}, volume = {40}, number = {2}, pages = {141--176}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028683}, doi = {10.1080/01611194.2015.1028683}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryKW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryKW16b, author = {George Lasry and Nils Kopal and Arno Wacker}, title = {Cryptanalysis of columnar transposition cipher with long keys}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {374--398}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1087074}, doi = {10.1080/01611194.2015.1087074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryKW16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryRKW16, author = {George Lasry and Moshe Rubin and Nils Kopal and Arno Wacker}, title = {Cryptanalysis of Chaocipher and solution of Exhibit 6}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {487--514}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1091797}, doi = {10.1080/01611194.2015.1091797}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryRKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LeapMNS16, author = {Tom Leap and Tim McDevitt and Kayla Novak and Nicolette Siermine}, title = {Further improvements to the Bauer-Millward attack on the Hill cipher}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {452--468}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1087075}, doi = {10.1080/01611194.2015.1087075}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LeapMNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LoebenbergerN16, author = {Daniel Loebenberger and Michael N{\"{u}}sken}, title = {Design principles of DES-like ciphers: {A} historical overview}, journal = {Cryptologia}, volume = {40}, number = {3}, pages = {221--239}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028681}, doi = {10.1080/01611194.2015.1028681}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LoebenbergerN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Narvaez16, author = {Roberto Narv{\'{a}}ez}, title = {On the cryptography of James Leander Cathcart {(1767-1843)}}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {316--326}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1055388}, doi = {10.1080/01611194.2015.1055388}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Narvaez16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/OstwaldW16, author = {Olaf Ostwald and Frode Weierud}, title = {History and Modern Cryptanalysis of Enigma's Pluggable Reflector}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {70--91}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028682}, doi = {10.1080/01611194.2015.1028682}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/OstwaldW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Pommerening16, author = {Klaus Pommerening}, title = {Cryptanalysis of nonlinear feedback shift registers}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {303--315}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1055385}, doi = {10.1080/01611194.2015.1055385}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Pommerening16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Samuels16, author = {Martin Samuels}, title = {Ludwig F{\"{o}}ppl: {A} Bavarian cryptanalyst on the Western front}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {355--373}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1084960}, doi = {10.1080/01611194.2015.1084960}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Samuels16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SanguinoLPEN16, author = {Luis Alberto Benthin Sanguino and Gregor Leander and Christof Paar and Bernhard Esslinger and Ingo Niebel}, title = {Analyzing the Spanish strip cipher by combining combinatorial and statistical methods}, journal = {Cryptologia}, volume = {40}, number = {3}, pages = {261--284}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1050332}, doi = {10.1080/01611194.2015.1050332}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/SanguinoLPEN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smoot16, author = {Betsy Rohaly Smoot}, title = {Call for papers: 2017 Symposium on Cryptologic History}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {484--485}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1199447}, doi = {10.1080/01611194.2016.1199447}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Smoot16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SmootH16, author = {Betsy Rohaly Smoot and David A. Hatch}, title = {Ann Zeilinger Caracristi {(1} February 1921-10 January 2016)}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {403--405}, year = {2016}, url = {https://doi.org/10.1080/01611194.2016.1169459}, doi = {10.1080/01611194.2016.1169459}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SmootH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Strasser16, author = {Gerhard F. Strasser}, title = {Samuel Zimmermann's \emph{Gehaimnussen}: The earliest cryptological book in German}, journal = {Cryptologia}, volume = {40}, number = {3}, pages = {240--260}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1093898}, doi = {10.1080/01611194.2015.1093898}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Strasser16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Thimbleby16, author = {Harold Thimbleby}, title = {Human factors and missed solutions to Enigma design weaknesses}, journal = {Cryptologia}, volume = {40}, number = {2}, pages = {177--202}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028680}, doi = {10.1080/01611194.2015.1028680}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Thimbleby16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Visco16, author = {David Visco}, title = {Somerton Man times two}, journal = {Cryptologia}, volume = {40}, number = {5}, pages = {481--483}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1135649}, doi = {10.1080/01611194.2015.1135649}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Visco16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wik16, author = {Anders Wik}, title = {Enigma {Z30} retrieved}, journal = {Cryptologia}, volume = {40}, number = {3}, pages = {215--220}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1055387}, doi = {10.1080/01611194.2015.1055387}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Wik16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wright16, author = {John Wright}, title = {Rejewski's Test Message as a Crib}, journal = {Cryptologia}, volume = {40}, number = {1}, pages = {92--106}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1028685}, doi = {10.1080/01611194.2015.1028685}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wright16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wright16a, author = {John Wright}, title = {A recursive solution for Turing's {H-M} factor}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {327--347}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1062318}, doi = {10.1080/01611194.2015.1062318}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wright16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/YuZ16, author = {Qian Yu and Chang N. Zhang}, title = {A new and fast cryptographic hash function based on {RC4}}, journal = {Cryptologia}, volume = {40}, number = {6}, pages = {522--540}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1135486}, doi = {10.1080/01611194.2015.1135486}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/YuZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.