default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia45.bht:"
@article{DBLP:journals/cryptologia/BashirA21, author = {Malik Zia Ullah Bashir and Rashid Ali}, title = {Cryptanalysis and improvement of a blind multi-document signcryption scheme}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {450--464}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1755913}, doi = {10.1080/01611194.2020.1755913}, timestamp = {Sat, 01 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BashirA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bonavoglia21, author = {Paolo Bonavoglia}, title = {Review of classical cryptology at play by Silvio Coccaro}, journal = {Cryptologia}, volume = {45}, number = {1}, pages = {94--96}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1793824}, doi = {10.1080/01611194.2020.1793824}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bonavoglia21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bouchaudy21, author = {Jean{-}Fran{\c{c}}ois Bouchaudy}, title = {Enigma: the spoils of Gustave Bertrand, or "par o{\`{u}} tout a commenc{\'{e}}"}, journal = {Cryptologia}, volume = {45}, number = {4}, pages = {309--341}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1736205}, doi = {10.1080/01611194.2020.1736205}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bouchaudy21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bures21, author = {Kenneth J. Bures}, title = {Cracking {PURPLE:} cryptanalysis of the Angooki Taipu {B} switch tables}, journal = {Cryptologia}, volume = {45}, number = {1}, pages = {1--43}, year = {2021}, url = {https://doi.org/10.1080/01611194.2019.1706064}, doi = {10.1080/01611194.2019.1706064}, timestamp = {Thu, 18 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bures21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChauhanGV21, author = {Dimpy Chauhan and Indivar Gupta and Rashmi Verma}, title = {Quasigroups and their applications in cryptography}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {227--265}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1721615}, doi = {10.1080/01611194.2020.1721615}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ChauhanGV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21, author = {Chris Christensen}, title = {Review of Breaking Teleprinter Ciphers at Bletchley Park by James A. Reeds, Whitfield Diffie, and J. V. Field}, journal = {Cryptologia}, volume = {45}, number = {1}, pages = {88--93}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1804484}, doi = {10.1080/01611194.2020.1804484}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21a, author = {Chris Christensen}, title = {Review of \emph{Operation Vengeance: The Astonishing Aerial Ambush That Changed World War II} by Dan Hampton}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {474--477}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1839816}, doi = {10.1080/01611194.2020.1839816}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21b, author = {Chris Christensen}, title = {Review of \emph{The Codebreakers of Bletchley Park} by Dermot Turing}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {563--564}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1839814}, doi = {10.1080/01611194.2020.1839814}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21c, author = {Chris Christensen}, title = {Review of \emph{A Course in Cryptography} by Heiko Knospe}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {565--568}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1804483}, doi = {10.1080/01611194.2020.1804483}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21d, author = {Chris Christensen}, title = {Review of \emph{The {U.S.} Navy's On-the-Roof Gang, Volume Two, War in the Pacific} by Matt Zullo}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {569--570}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1878307}, doi = {10.1080/01611194.2021.1878307}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen21e, author = {Chris Christensen}, title = {Review of \emph{Codebreaking: {A} Practical Guide} by Elonka Dunin and Klaus Schmeh}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {497}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1873207}, doi = {10.1080/01611194.2021.1873207}, timestamp = {Tue, 12 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen21e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Courtois21, author = {Nicolas T. Courtois}, title = {A nonlinear invariant attack on {T-310} with the original Boolean function}, journal = {Cryptologia}, volume = {45}, number = {2}, pages = {178--192}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1736207}, doi = {10.1080/01611194.2020.1736207}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Courtois21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Daruka21, author = {Istv{\'{a}}n Daruka}, title = {On the Voynich manuscript}, journal = {Cryptologia}, volume = {45}, number = {1}, pages = {44--80}, year = {2021}, url = {https://doi.org/10.1080/01611194.2019.1706063}, doi = {10.1080/01611194.2019.1706063}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Daruka21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley21, author = {John F. Dooley}, title = {Review of Flight of the Fox by Gray Basnight}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {287--288}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1829182}, doi = {10.1080/01611194.2020.1829182}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine21, author = {Ralph Erskine}, title = {Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones}, journal = {Cryptologia}, volume = {45}, number = {4}, pages = {379--382}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1878308}, doi = {10.1080/01611194.2021.1878308}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/FuensantaBB21, author = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and H{\'{e}}ctor Soler Bonet and Diego Navarro Bonilla}, title = {How to make a codebook versatile. The example of the {ASLET} code}, journal = {Cryptologia}, volume = {45}, number = {2}, pages = {129--166}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1718800}, doi = {10.1080/01611194.2020.1718800}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/FuensantaBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Geraud-StewartN21, author = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and David Naccache}, title = {A French cipher from the late 19th century}, journal = {Cryptologia}, volume = {45}, number = {4}, pages = {342--370}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1753265}, doi = {10.1080/01611194.2020.1753265}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Geraud-StewartN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Griffiths21, author = {Barry J. Griffiths}, title = {Cryptography in undergraduate education: perceptions of postgraduate students}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {553--562}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1804482}, doi = {10.1080/01611194.2020.1804482}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Griffiths21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hanyok21, author = {Robert J. Hanyok}, title = {Sources and methods: Searching for cryptologic records in the findings of post-World War {II} allied technical surveys and commissions}, journal = {Cryptologia}, volume = {45}, number = {4}, pages = {371--378}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1921072}, doi = {10.1080/01611194.2021.1921072}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hanyok21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryMK21, author = {George Lasry and Be{\'{a}}ta Megyesi and Nils Kopal}, title = {Deciphering papal ciphers from the 16th to the 18th Century}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {479--540}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1755915}, doi = {10.1080/01611194.2020.1755915}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LasryNA21, author = {George Lasry and Ingo Niebel and Torbj{\"{o}}rn Andersson}, title = {Deciphering German diplomatic and naval attach{\'{e}} messages from 1900-1915}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {383--425}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1755914}, doi = {10.1080/01611194.2020.1755914}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/LasryNA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MastanP21, author = {J. Mohamedmoideen Kader Mastan and R. Pandian}, title = {Cryptanalysis of two similar chaos-based image encryption schemes}, journal = {Cryptologia}, volume = {45}, number = {6}, pages = {541--552}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1814447}, doi = {10.1080/01611194.2020.1814447}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MastanP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Nedved21, author = {Gregory J. Nedved}, title = {Herbert O. Yardley revisited: what does the new evidence say?}, journal = {Cryptologia}, volume = {45}, number = {2}, pages = {102--128}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1767706}, doi = {10.1080/01611194.2020.1767706}, timestamp = {Thu, 18 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Nedved21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Patterson21, author = {Blain Patterson}, title = {Analyzing student understanding of cryptography using the {SOLO} taxonomy}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {439--449}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1755746}, doi = {10.1080/01611194.2020.1755746}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Patterson21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/PhelanS21, author = {Ronald Phelan and David Simpson}, title = {Ludlings: not all fun and games}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {426--433}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1761482}, doi = {10.1080/01611194.2020.1761482}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/PhelanS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smoot21, author = {Betsy Rohaly Smoot}, title = {Sources and methods: uncovering the story of American Cryptology in World War {I}}, journal = {Cryptologia}, volume = {45}, number = {1}, pages = {81--87}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1858371}, doi = {10.1080/01611194.2020.1858371}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Smoot21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smoot21a, author = {Betsy Rohaly Smoot}, title = {Sources and methods for cryptologic history: researching individuals (and the biography boom)}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {465--473}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1929567}, doi = {10.1080/01611194.2021.1929567}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Smoot21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SommervollN21, author = {{\AA}vald {\AA}slaugson Sommervoll and Leif Nilsen}, title = {Genetic algorithm attack on Enigma's plugboard}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {194--226}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1721617}, doi = {10.1080/01611194.2020.1721617}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SommervollN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Tate21, author = {Kirsten Tate}, title = {Identifying concealed messages using authorship attribution}, journal = {Cryptologia}, volume = {45}, number = {2}, pages = {167--177}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1736206}, doi = {10.1080/01611194.2020.1736206}, timestamp = {Thu, 18 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Tate21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Teseleanu21, author = {George Teseleanu}, title = {Quasigroups and substitution permutation networks: a failed experiment}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {266--281}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1750506}, doi = {10.1080/01611194.2020.1750506}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Teseleanu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/TimmS21, author = {Torsten Timm and Andreas Schinner}, title = {Review of \emph{The linguistics of the Voynich manuscript} by Claire Bowern and Luke Lindemann}, journal = {Cryptologia}, volume = {45}, number = {5}, pages = {434--438}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1911875}, doi = {10.1080/01611194.2021.1911875}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/TimmS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Tokar21, author = {John A. Tokar}, title = {{NSA} honors two Cryptologia board members}, journal = {Cryptologia}, volume = {45}, number = {2}, pages = {97--101}, year = {2021}, url = {https://doi.org/10.1080/07352689.2021.1891679}, doi = {10.1080/07352689.2021.1891679}, timestamp = {Thu, 18 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Tokar21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wase21, author = {Viktor Wase}, title = {Benford's law in the Beale ciphers}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {282--286}, year = {2021}, url = {https://doi.org/10.1080/01611194.2020.1821409}, doi = {10.1080/01611194.2020.1821409}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wase21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Weierud21, author = {Frode Weierud}, title = {In memoriam: Thomas Ralph Erskine {CB} {(1933} - 2021)}, journal = {Cryptologia}, volume = {45}, number = {4}, pages = {289--308}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1935363}, doi = {10.1080/01611194.2021.1935363}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Weierud21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X21, title = {18th cryptologic history symposium}, journal = {Cryptologia}, volume = {45}, number = {3}, pages = {193}, year = {2021}, url = {https://doi.org/10.1080/01611194.2021.1915382}, doi = {10.1080/01611194.2021.1915382}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.