default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia43.bht:"
@article{DBLP:journals/cryptologia/AlhadawiZIL19, author = {Hussam S. Alhadawi and Mohamad Fadli Zolkipli and Saba M. Ismail and Dragan Lambic}, title = {Designing a pseudorandom bit generator based on LFSRs and a discrete chaotic map}, journal = {Cryptologia}, volume = {43}, number = {3}, pages = {190--211}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1548390}, doi = {10.1080/01611194.2018.1548390}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AlhadawiZIL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/AyatG19, author = {S. Masih Ayat and Meysam Ghahramani}, title = {A recursive algorithm for solving "a secret sharing" problem}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {497--503}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596996}, doi = {10.1080/01611194.2019.1596996}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/AyatG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BentajerHAIF19, author = {Ahmed Bentajer and Mustapha Hedabou and Karim Abouelmehdi and Zakaria Igarramen and Said El Fezazi}, title = {An IBE-based design for assured deletion in cloud storage}, journal = {Cryptologia}, volume = {43}, number = {3}, pages = {254--265}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1549123}, doi = {10.1080/01611194.2018.1549123}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BentajerHAIF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bonavoglia19, author = {Paolo Bonavoglia}, title = {Bellaso's 1552 cipher recovered in Venice}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {459--465}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596181}, doi = {10.1080/01611194.2019.1596181}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bonavoglia19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bouchaudy19, author = {Jean{-}Fran{\c{c}}ois Bouchaudy}, title = {Genuine French {WWII} {M-209} cryptograms}, journal = {Cryptologia}, volume = {43}, number = {5}, pages = {359--371}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596180}, doi = {10.1080/01611194.2019.1596180}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bouchaudy19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BussiDMD19, author = {Khushboo Bussi and Dhananjoy Dey and Prasanna Raghaw Mishra and Bal Kishan Dass}, title = {{MGR} Hash Functions}, journal = {Cryptologia}, volume = {43}, number = {5}, pages = {372--390}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596995}, doi = {10.1080/01611194.2019.1596995}, timestamp = {Tue, 05 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/BussiDMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19, author = {Chris Christensen}, title = {Review of The Spy Who Couldn't Spell by Yudhijit Bhattacharjee}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {65--68}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1471429}, doi = {10.1080/01611194.2018.1471429}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19a, author = {Chris Christensen}, title = {Review of Stanley Johnston'S Blunder: the Reporter Who Spilled the Secret Behind the {U.S.} Navy'S Victory at Midway by Elliot Carlson}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {69--76}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1503208}, doi = {10.1080/01611194.2018.1503208}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19b, author = {Chris Christensen}, title = {Review of Alastair Denniston: Code-Breaking from Room 40 to Berkeley Street and the Birth of {GCHQ} by Joel Greenberg}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {77--80}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1503209}, doi = {10.1080/01611194.2018.1503209}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19c, author = {Chris Christensen}, title = {Edward Hugh Simpson {CB} {(10} December 1922 - 5 February 2019)}, journal = {Cryptologia}, volume = {43}, number = {2}, pages = {81--83}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1583823}, doi = {10.1080/01611194.2019.1583823}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19d, author = {Chris Christensen}, title = {Review of History of Cryptography and Cryptanalysis by John Dooley}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {536--538}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1623344}, doi = {10.1080/01611194.2019.1623344}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19e, author = {Chris Christensen}, title = {Review of The Cypher Bureau by Eilidh McGinness}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {539--541}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1623937}, doi = {10.1080/01611194.2019.1623937}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen19f, author = {Chris Christensen}, title = {Review of X, {Y} {\&} {Z} by Dermot Turing}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {542--544}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1623938}, doi = {10.1080/01611194.2019.1623938}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen19f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChristensenAS19, author = {Chris Christensen and Jared Antrobus and Edward Simpson}, title = {Aligning {JN-25} messages in depth using weights when the code groups scan}, journal = {Cryptologia}, volume = {43}, number = {2}, pages = {84--137}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1528311}, doi = {10.1080/01611194.2018.1528311}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChristensenAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ClaytonG19, author = {Mike Clayton and John Gallehawk}, title = {Letter repeats in Enigma ciphertext produced by same-letter keying}, journal = {Cryptologia}, volume = {43}, number = {5}, pages = {438--457}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1565108}, doi = {10.1080/01611194.2019.1565108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ClaytonG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CourtoisGS19, author = {Nicolas T. Courtois and Marios Georgiou and Matteo Scarlata}, title = {Slide attacks and LC-weak keys in {T-310}}, journal = {Cryptologia}, volume = {43}, number = {3}, pages = {175--189}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1548392}, doi = {10.1080/01611194.2018.1548392}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CourtoisGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CourtoisOS19, author = {Nicolas T. Courtois and Maria{-}Bristena Oprisanu and Klaus Schmeh}, title = {Linear cryptanalysis and block cipher design in East Germany in the 1970s}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {2--22}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1483981}, doi = {10.1080/01611194.2018.1483981}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CourtoisOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley19, author = {John F. Dooley}, title = {The Beale ciphers in fiction}, journal = {Cryptologia}, volume = {43}, number = {4}, pages = {344--358}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1550691}, doi = {10.1080/01611194.2018.1550691}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley19a, author = {John F. Dooley}, title = {Review of 3 Ciphers by Carol Ritz}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {551--552}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1629676}, doi = {10.1080/01611194.2019.1629676}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GorodilovaACGIK19, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Svetla Nikova and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Vincent Rijmen and Natalia N. Tokareva}, title = {Problems and solutions from the fourth International Students' Olympiad in Cryptography {(NSUCRYPTO)}}, journal = {Cryptologia}, volume = {43}, number = {2}, pages = {138--174}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1517834}, doi = {10.1080/01611194.2018.1517834}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GrosekAF19, author = {Otokar Grosek and Eugen Antal and Tom{\'{a}}s Fabsic}, title = {Remarks on breaking the Vigen{\`{e}}re autokey cipher}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {486--496}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596997}, doi = {10.1080/01611194.2019.1596997}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GrosekAF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KalitaTM19, author = {Manashee Kalita and Themrichon Tuithung and Swanirbhar Majumder}, title = {An adaptive color image steganography method using adjacent pixel value differencing and {LSB} substitution technique}, journal = {Cryptologia}, volume = {43}, number = {5}, pages = {414--437}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1579122}, doi = {10.1080/01611194.2019.1579122}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/KalitaTM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KishoreR19, author = {Neha Kishore and Priya Raina}, title = {Parallel cryptographic hashing: Developments in the last 25 years}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {504--535}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1609130}, doi = {10.1080/01611194.2019.1609130}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KishoreR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryKW19, author = {George Lasry and Nils Kopal and Arno Wacker}, title = {Cryptanalysis of Enigma double indicators with hill climbing}, journal = {Cryptologia}, volume = {43}, number = {4}, pages = {267--292}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1551253}, doi = {10.1080/01611194.2018.1551253}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MaitraGM19, author = {Tanmoy Maitra and Debasis Giri and Ram N. Mohapatra}, title = {{SAS-SIP:} {A} secure authentication scheme based on {ECC} and a fuzzy extractor for session initiation protocol}, journal = {Cryptologia}, volume = {43}, number = {3}, pages = {212--232}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1548391}, doi = {10.1080/01611194.2018.1548391}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MaitraGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MathivananGV19, author = {P. Mathivanan and A. Balaji Ganesh and R. Venkatesan}, title = {{QR} code-based {ECG} signal encryption/decryption algorithm}, journal = {Cryptologia}, volume = {43}, number = {3}, pages = {233--253}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1549122}, doi = {10.1080/01611194.2018.1549122}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MathivananGV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/OmraniRB19, author = {Tasnime Omrani and Rhouma Rhouma and Rabei Becheikh}, title = {{LICID:} a lightweight image cryptosystem for IoT devices}, journal = {Cryptologia}, volume = {43}, number = {4}, pages = {313--343}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1563009}, doi = {10.1080/01611194.2018.1563009}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/OmraniRB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Peinado19, author = {Alberto Peinado}, title = {Reconstruction of a 1940 Spanish strip cipher by means of a cyclic rotation model applied to encrypted telegrams}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {47--64}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1522678}, doi = {10.1080/01611194.2018.1522678}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Peinado19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Roberto19, author = {R. Narv{\'{a}}ez Roberto}, title = {Review of Mensajes secretos. La historia de la criptograf{\'{\i}}a Espa{\~{n}}ola desde sus inicios hasta los a{\~{n}}os 50 (Secret Messages. The History of Spanish Cryptography from its beginnings until the 1950s) by Soler Fuensanta, Jos{\'{e}} Ram{\'{o}}n, and Francisco Javier L{\'{o}}pez-Brea Eespiau}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {545--550}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1609131}, doi = {10.1080/01611194.2019.1609131}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Roberto19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ShermanGLGKMRST19, author = {Alan T. Sherman and Enis Golaszewski and Edward LaFemina and Ethan Goldschen and Mohammed Khan and Lauren Mundy and Mykah Rather and Bryan Solis and Wubnyonga Tete and Edwin Valdez and Brian Weber and Damian Doyle and Casey O'Brien and Linda Oliva and Joseph Roundy and Jack Suess}, title = {The {SFS} summer research study at {UMBC:} Project-based learning inspires cybersecurity students}, journal = {Cryptologia}, volume = {43}, number = {4}, pages = {293--312}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1557298}, doi = {10.1080/01611194.2018.1557298}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ShermanGLGKMRST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SmithP19, author = {Emma May Smith and Marco Ponzi}, title = {Glyph combinations across word breaks in the Voynich manuscript}, journal = {Cryptologia}, volume = {43}, number = {6}, pages = {466--485}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1596998}, doi = {10.1080/01611194.2019.1596998}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SmithP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Tomokiyo19, author = {Satoshi Tomokiyo}, title = {Identifying Italian ciphers from continuous-figure ciphertexts {(1593)}}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {23--46}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1503207}, doi = {10.1080/01611194.2018.1503207}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Tomokiyo19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Tuncer19, author = {T{\"{u}}rker Tuncer}, title = {Block-based fuzzy-image authentication method}, journal = {Cryptologia}, volume = {43}, number = {5}, pages = {391--413}, year = {2019}, url = {https://doi.org/10.1080/01611194.2019.1582117}, doi = {10.1080/01611194.2019.1582117}, timestamp = {Fri, 06 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Tuncer19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X19, title = {2019 Symposium on Cryptologic History}, journal = {Cryptologia}, volume = {43}, number = {1}, pages = {1}, year = {2019}, url = {https://www.tandfonline.com/doi/full/10.1080/01611194.2019.1531593}, doi = {10.1080/01611194.2019.1531593}, timestamp = {Fri, 07 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/X19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.