Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia45.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/BashirA21,
  author       = {Malik Zia Ullah Bashir and
                  Rashid Ali},
  title        = {Cryptanalysis and improvement of a blind multi-document signcryption
                  scheme},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {450--464},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1755913},
  doi          = {10.1080/01611194.2020.1755913},
  timestamp    = {Sat, 01 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BashirA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bonavoglia21,
  author       = {Paolo Bonavoglia},
  title        = {Review of classical cryptology at play by Silvio Coccaro},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {1},
  pages        = {94--96},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1793824},
  doi          = {10.1080/01611194.2020.1793824},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bonavoglia21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bouchaudy21,
  author       = {Jean{-}Fran{\c{c}}ois Bouchaudy},
  title        = {Enigma: the spoils of Gustave Bertrand, or "par o{\`{u}} tout a commenc{\'{e}}"},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {4},
  pages        = {309--341},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1736205},
  doi          = {10.1080/01611194.2020.1736205},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bouchaudy21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bures21,
  author       = {Kenneth J. Bures},
  title        = {Cracking {PURPLE:} cryptanalysis of the Angooki Taipu {B} switch tables},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {1},
  pages        = {1--43},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2019.1706064},
  doi          = {10.1080/01611194.2019.1706064},
  timestamp    = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bures21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChauhanGV21,
  author       = {Dimpy Chauhan and
                  Indivar Gupta and
                  Rashmi Verma},
  title        = {Quasigroups and their applications in cryptography},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {227--265},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1721615},
  doi          = {10.1080/01611194.2020.1721615},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChauhanGV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21,
  author       = {Chris Christensen},
  title        = {Review of Breaking Teleprinter Ciphers at Bletchley Park by James
                  A. Reeds, Whitfield Diffie, and J. V. Field},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {1},
  pages        = {88--93},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1804484},
  doi          = {10.1080/01611194.2020.1804484},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21a,
  author       = {Chris Christensen},
  title        = {Review of \emph{Operation Vengeance: The Astonishing Aerial Ambush
                  That Changed World War II} by Dan Hampton},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {474--477},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1839816},
  doi          = {10.1080/01611194.2020.1839816},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21b,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Codebreakers of Bletchley Park} by Dermot Turing},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {563--564},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1839814},
  doi          = {10.1080/01611194.2020.1839814},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21c,
  author       = {Chris Christensen},
  title        = {Review of \emph{A Course in Cryptography} by Heiko Knospe},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {565--568},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1804483},
  doi          = {10.1080/01611194.2020.1804483},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21d,
  author       = {Chris Christensen},
  title        = {Review of \emph{The {U.S.} Navy's On-the-Roof Gang, Volume Two, War
                  in the Pacific} by Matt Zullo},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {569--570},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1878307},
  doi          = {10.1080/01611194.2021.1878307},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21e,
  author       = {Chris Christensen},
  title        = {Review of \emph{Codebreaking: {A} Practical Guide} by Elonka Dunin
                  and Klaus Schmeh},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {497},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1873207},
  doi          = {10.1080/01611194.2021.1873207},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Courtois21,
  author       = {Nicolas T. Courtois},
  title        = {A nonlinear invariant attack on {T-310} with the original Boolean
                  function},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {2},
  pages        = {178--192},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1736207},
  doi          = {10.1080/01611194.2020.1736207},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Courtois21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Daruka21,
  author       = {Istv{\'{a}}n Daruka},
  title        = {On the Voynich manuscript},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {1},
  pages        = {44--80},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2019.1706063},
  doi          = {10.1080/01611194.2019.1706063},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Daruka21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley21,
  author       = {John F. Dooley},
  title        = {Review of Flight of the Fox by Gray Basnight},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {287--288},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1829182},
  doi          = {10.1080/01611194.2020.1829182},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine21,
  author       = {Ralph Erskine},
  title        = {Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {4},
  pages        = {379--382},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1878308},
  doi          = {10.1080/01611194.2021.1878308},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/FuensantaBB21,
  author       = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and
                  H{\'{e}}ctor Soler Bonet and
                  Diego Navarro Bonilla},
  title        = {How to make a codebook versatile. The example of the {ASLET} code},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {2},
  pages        = {129--166},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1718800},
  doi          = {10.1080/01611194.2020.1718800},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/FuensantaBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Geraud-StewartN21,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  title        = {A French cipher from the late 19th century},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {4},
  pages        = {342--370},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1753265},
  doi          = {10.1080/01611194.2020.1753265},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Geraud-StewartN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Griffiths21,
  author       = {Barry J. Griffiths},
  title        = {Cryptography in undergraduate education: perceptions of postgraduate
                  students},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {553--562},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1804482},
  doi          = {10.1080/01611194.2020.1804482},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Griffiths21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hanyok21,
  author       = {Robert J. Hanyok},
  title        = {Sources and methods: Searching for cryptologic records in the findings
                  of post-World War {II} allied technical surveys and commissions},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {4},
  pages        = {371--378},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1921072},
  doi          = {10.1080/01611194.2021.1921072},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hanyok21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryMK21,
  author       = {George Lasry and
                  Be{\'{a}}ta Megyesi and
                  Nils Kopal},
  title        = {Deciphering papal ciphers from the 16th to the 18th Century},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {479--540},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1755915},
  doi          = {10.1080/01611194.2020.1755915},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryNA21,
  author       = {George Lasry and
                  Ingo Niebel and
                  Torbj{\"{o}}rn Andersson},
  title        = {Deciphering German diplomatic and naval attach{\'{e}} messages
                  from 1900-1915},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {383--425},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1755914},
  doi          = {10.1080/01611194.2020.1755914},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryNA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MastanP21,
  author       = {J. Mohamedmoideen Kader Mastan and
                  R. Pandian},
  title        = {Cryptanalysis of two similar chaos-based image encryption schemes},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {541--552},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1814447},
  doi          = {10.1080/01611194.2020.1814447},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MastanP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Nedved21,
  author       = {Gregory J. Nedved},
  title        = {Herbert O. Yardley revisited: what does the new evidence say?},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {2},
  pages        = {102--128},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1767706},
  doi          = {10.1080/01611194.2020.1767706},
  timestamp    = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Nedved21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Patterson21,
  author       = {Blain Patterson},
  title        = {Analyzing student understanding of cryptography using the {SOLO} taxonomy},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {439--449},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1755746},
  doi          = {10.1080/01611194.2020.1755746},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Patterson21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/PhelanS21,
  author       = {Ronald Phelan and
                  David Simpson},
  title        = {Ludlings: not all fun and games},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {426--433},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1761482},
  doi          = {10.1080/01611194.2020.1761482},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/PhelanS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smoot21,
  author       = {Betsy Rohaly Smoot},
  title        = {Sources and methods: uncovering the story of American Cryptology in
                  World War {I}},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {1},
  pages        = {81--87},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1858371},
  doi          = {10.1080/01611194.2020.1858371},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smoot21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smoot21a,
  author       = {Betsy Rohaly Smoot},
  title        = {Sources and methods for cryptologic history: researching individuals
                  (and the biography boom)},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {465--473},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1929567},
  doi          = {10.1080/01611194.2021.1929567},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smoot21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SommervollN21,
  author       = {{\AA}vald {\AA}slaugson Sommervoll and
                  Leif Nilsen},
  title        = {Genetic algorithm attack on Enigma's plugboard},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {194--226},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1721617},
  doi          = {10.1080/01611194.2020.1721617},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SommervollN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Tate21,
  author       = {Kirsten Tate},
  title        = {Identifying concealed messages using authorship attribution},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {2},
  pages        = {167--177},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1736206},
  doi          = {10.1080/01611194.2020.1736206},
  timestamp    = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Tate21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Teseleanu21,
  author       = {George Teseleanu},
  title        = {Quasigroups and substitution permutation networks: a failed experiment},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {266--281},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1750506},
  doi          = {10.1080/01611194.2020.1750506},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Teseleanu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/TimmS21,
  author       = {Torsten Timm and
                  Andreas Schinner},
  title        = {Review of \emph{The linguistics of the Voynich manuscript} by Claire
                  Bowern and Luke Lindemann},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {434--438},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1911875},
  doi          = {10.1080/01611194.2021.1911875},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/TimmS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Tokar21,
  author       = {John A. Tokar},
  title        = {{NSA} honors two Cryptologia board members},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {2},
  pages        = {97--101},
  year         = {2021},
  url          = {https://doi.org/10.1080/07352689.2021.1891679},
  doi          = {10.1080/07352689.2021.1891679},
  timestamp    = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Tokar21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wase21,
  author       = {Viktor Wase},
  title        = {Benford's law in the Beale ciphers},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {282--286},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1821409},
  doi          = {10.1080/01611194.2020.1821409},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wase21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Weierud21,
  author       = {Frode Weierud},
  title        = {In memoriam: Thomas Ralph Erskine {CB} {(1933} - 2021)},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {4},
  pages        = {289--308},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1935363},
  doi          = {10.1080/01611194.2021.1935363},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Weierud21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X21,
  title        = {18th cryptologic history symposium},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {193},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1915382},
  doi          = {10.1080/01611194.2021.1915382},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}