Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia43.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/AlhadawiZIL19,
  author       = {Hussam S. Alhadawi and
                  Mohamad Fadli Zolkipli and
                  Saba M. Ismail and
                  Dragan Lambic},
  title        = {Designing a pseudorandom bit generator based on LFSRs and a discrete
                  chaotic map},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {3},
  pages        = {190--211},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1548390},
  doi          = {10.1080/01611194.2018.1548390},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AlhadawiZIL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AyatG19,
  author       = {S. Masih Ayat and
                  Meysam Ghahramani},
  title        = {A recursive algorithm for solving "a secret sharing" problem},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {497--503},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596996},
  doi          = {10.1080/01611194.2019.1596996},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AyatG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BentajerHAIF19,
  author       = {Ahmed Bentajer and
                  Mustapha Hedabou and
                  Karim Abouelmehdi and
                  Zakaria Igarramen and
                  Said El Fezazi},
  title        = {An IBE-based design for assured deletion in cloud storage},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {3},
  pages        = {254--265},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1549123},
  doi          = {10.1080/01611194.2018.1549123},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BentajerHAIF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bonavoglia19,
  author       = {Paolo Bonavoglia},
  title        = {Bellaso's 1552 cipher recovered in Venice},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {459--465},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596181},
  doi          = {10.1080/01611194.2019.1596181},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bonavoglia19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bouchaudy19,
  author       = {Jean{-}Fran{\c{c}}ois Bouchaudy},
  title        = {Genuine French {WWII} {M-209} cryptograms},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {5},
  pages        = {359--371},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596180},
  doi          = {10.1080/01611194.2019.1596180},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bouchaudy19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BussiDMD19,
  author       = {Khushboo Bussi and
                  Dhananjoy Dey and
                  Prasanna Raghaw Mishra and
                  Bal Kishan Dass},
  title        = {{MGR} Hash Functions},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {5},
  pages        = {372--390},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596995},
  doi          = {10.1080/01611194.2019.1596995},
  timestamp    = {Tue, 05 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BussiDMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19,
  author       = {Chris Christensen},
  title        = {Review of The Spy Who Couldn't Spell by Yudhijit Bhattacharjee},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {65--68},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1471429},
  doi          = {10.1080/01611194.2018.1471429},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19a,
  author       = {Chris Christensen},
  title        = {Review of Stanley Johnston'S Blunder: the Reporter Who Spilled the
                  Secret Behind the {U.S.} Navy'S Victory at Midway by Elliot Carlson},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {69--76},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1503208},
  doi          = {10.1080/01611194.2018.1503208},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19b,
  author       = {Chris Christensen},
  title        = {Review of Alastair Denniston: Code-Breaking from Room 40 to Berkeley
                  Street and the Birth of {GCHQ} by Joel Greenberg},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {77--80},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1503209},
  doi          = {10.1080/01611194.2018.1503209},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19c,
  author       = {Chris Christensen},
  title        = {Edward Hugh Simpson {CB} {(10} December 1922 - 5 February 2019)},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {2},
  pages        = {81--83},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1583823},
  doi          = {10.1080/01611194.2019.1583823},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19d,
  author       = {Chris Christensen},
  title        = {Review of History of Cryptography and Cryptanalysis by John Dooley},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {536--538},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1623344},
  doi          = {10.1080/01611194.2019.1623344},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19e,
  author       = {Chris Christensen},
  title        = {Review of The Cypher Bureau by Eilidh McGinness},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {539--541},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1623937},
  doi          = {10.1080/01611194.2019.1623937},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19f,
  author       = {Chris Christensen},
  title        = {Review of X, {Y} {\&} {Z} by Dermot Turing},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {542--544},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1623938},
  doi          = {10.1080/01611194.2019.1623938},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChristensenAS19,
  author       = {Chris Christensen and
                  Jared Antrobus and
                  Edward Simpson},
  title        = {Aligning {JN-25} messages in depth using weights when the code groups
                  scan},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {2},
  pages        = {84--137},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1528311},
  doi          = {10.1080/01611194.2018.1528311},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChristensenAS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ClaytonG19,
  author       = {Mike Clayton and
                  John Gallehawk},
  title        = {Letter repeats in Enigma ciphertext produced by same-letter keying},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {5},
  pages        = {438--457},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1565108},
  doi          = {10.1080/01611194.2019.1565108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ClaytonG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CourtoisGS19,
  author       = {Nicolas T. Courtois and
                  Marios Georgiou and
                  Matteo Scarlata},
  title        = {Slide attacks and LC-weak keys in {T-310}},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {3},
  pages        = {175--189},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1548392},
  doi          = {10.1080/01611194.2018.1548392},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CourtoisGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CourtoisOS19,
  author       = {Nicolas T. Courtois and
                  Maria{-}Bristena Oprisanu and
                  Klaus Schmeh},
  title        = {Linear cryptanalysis and block cipher design in East Germany in the
                  1970s},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {2--22},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1483981},
  doi          = {10.1080/01611194.2018.1483981},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CourtoisOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley19,
  author       = {John F. Dooley},
  title        = {The Beale ciphers in fiction},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {4},
  pages        = {344--358},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1550691},
  doi          = {10.1080/01611194.2018.1550691},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley19a,
  author       = {John F. Dooley},
  title        = {Review of 3 Ciphers by Carol Ritz},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {551--552},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1629676},
  doi          = {10.1080/01611194.2019.1629676},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GorodilovaACGIK19,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Vincent Rijmen and
                  Natalia N. Tokareva},
  title        = {Problems and solutions from the fourth International Students' Olympiad
                  in Cryptography {(NSUCRYPTO)}},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {2},
  pages        = {138--174},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1517834},
  doi          = {10.1080/01611194.2018.1517834},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GrosekAF19,
  author       = {Otokar Grosek and
                  Eugen Antal and
                  Tom{\'{a}}s Fabsic},
  title        = {Remarks on breaking the Vigen{\`{e}}re autokey cipher},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {486--496},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596997},
  doi          = {10.1080/01611194.2019.1596997},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GrosekAF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KalitaTM19,
  author       = {Manashee Kalita and
                  Themrichon Tuithung and
                  Swanirbhar Majumder},
  title        = {An adaptive color image steganography method using adjacent pixel
                  value differencing and {LSB} substitution technique},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {5},
  pages        = {414--437},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1579122},
  doi          = {10.1080/01611194.2019.1579122},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KalitaTM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KishoreR19,
  author       = {Neha Kishore and
                  Priya Raina},
  title        = {Parallel cryptographic hashing: Developments in the last 25 years},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {504--535},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1609130},
  doi          = {10.1080/01611194.2019.1609130},
  timestamp    = {Sat, 12 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KishoreR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryKW19,
  author       = {George Lasry and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Cryptanalysis of Enigma double indicators with hill climbing},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {4},
  pages        = {267--292},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1551253},
  doi          = {10.1080/01611194.2018.1551253},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MaitraGM19,
  author       = {Tanmoy Maitra and
                  Debasis Giri and
                  Ram N. Mohapatra},
  title        = {{SAS-SIP:} {A} secure authentication scheme based on {ECC} and a fuzzy
                  extractor for session initiation protocol},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {3},
  pages        = {212--232},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1548391},
  doi          = {10.1080/01611194.2018.1548391},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MaitraGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MathivananGV19,
  author       = {P. Mathivanan and
                  A. Balaji Ganesh and
                  R. Venkatesan},
  title        = {{QR} code-based {ECG} signal encryption/decryption algorithm},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {3},
  pages        = {233--253},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1549122},
  doi          = {10.1080/01611194.2018.1549122},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MathivananGV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/OmraniRB19,
  author       = {Tasnime Omrani and
                  Rhouma Rhouma and
                  Rabei Becheikh},
  title        = {{LICID:} a lightweight image cryptosystem for IoT devices},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {4},
  pages        = {313--343},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1563009},
  doi          = {10.1080/01611194.2018.1563009},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/OmraniRB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Peinado19,
  author       = {Alberto Peinado},
  title        = {Reconstruction of a 1940 Spanish strip cipher by means of a cyclic
                  rotation model applied to encrypted telegrams},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {47--64},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1522678},
  doi          = {10.1080/01611194.2018.1522678},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Peinado19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Roberto19,
  author       = {R. Narv{\'{a}}ez Roberto},
  title        = {Review of Mensajes secretos. La historia de la criptograf{\'{\i}}a
                  Espa{\~{n}}ola desde sus inicios hasta los a{\~{n}}os 50 (Secret Messages.
                  The History of Spanish Cryptography from its beginnings until the
                  1950s) by Soler Fuensanta, Jos{\'{e}} Ram{\'{o}}n, and Francisco
                  Javier L{\'{o}}pez-Brea Eespiau},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {545--550},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1609131},
  doi          = {10.1080/01611194.2019.1609131},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Roberto19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ShermanGLGKMRST19,
  author       = {Alan T. Sherman and
                  Enis Golaszewski and
                  Edward LaFemina and
                  Ethan Goldschen and
                  Mohammed Khan and
                  Lauren Mundy and
                  Mykah Rather and
                  Bryan Solis and
                  Wubnyonga Tete and
                  Edwin Valdez and
                  Brian Weber and
                  Damian Doyle and
                  Casey O'Brien and
                  Linda Oliva and
                  Joseph Roundy and
                  Jack Suess},
  title        = {The {SFS} summer research study at {UMBC:} Project-based learning
                  inspires cybersecurity students},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {4},
  pages        = {293--312},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1557298},
  doi          = {10.1080/01611194.2018.1557298},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ShermanGLGKMRST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SmithP19,
  author       = {Emma May Smith and
                  Marco Ponzi},
  title        = {Glyph combinations across word breaks in the Voynich manuscript},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {466--485},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596998},
  doi          = {10.1080/01611194.2019.1596998},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SmithP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Tomokiyo19,
  author       = {Satoshi Tomokiyo},
  title        = {Identifying Italian ciphers from continuous-figure ciphertexts {(1593)}},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {23--46},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1503207},
  doi          = {10.1080/01611194.2018.1503207},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Tomokiyo19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Tuncer19,
  author       = {T{\"{u}}rker Tuncer},
  title        = {Block-based fuzzy-image authentication method},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {5},
  pages        = {391--413},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1582117},
  doi          = {10.1080/01611194.2019.1582117},
  timestamp    = {Fri, 06 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Tuncer19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X19,
  title        = {2019 Symposium on Cryptologic History},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {1},
  year         = {2019},
  url          = {https://www.tandfonline.com/doi/full/10.1080/01611194.2019.1531593},
  doi          = {10.1080/01611194.2019.1531593},
  timestamp    = {Fri, 07 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}