Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia47.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/AhmedPM23,
  author       = {Kashif Ahmed and
                  Saibal K. Pal and
                  Radha Mohan},
  title        = {A review of the tropical approach in cryptography},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {63--87},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1994486},
  doi          = {10.1080/01611194.2021.1994486},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AhmedPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Anderson23,
  author       = {Patrick D. Anderson},
  title        = {Review of \emph{Crypto Wars - The Fight for Privacy in the Digital
                  Age: {A} Political History of Digital Encryption}},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {285--298},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.2002977},
  doi          = {10.1080/01611194.2021.2002977},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Anderson23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AntalZ23,
  author       = {Eugen Antal and
                  Pavol Zajac},
  title        = {The first Czechoslovak cipher machine},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {239--260},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1998809},
  doi          = {10.1080/01611194.2021.1998809},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AntalZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer23,
  author       = {Craig P. Bauer},
  title        = {The new golden age of decipherment},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {2},
  pages        = {97--100},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2023.2170158},
  doi          = {10.1080/01611194.2023.2170158},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bingol23,
  author       = {Sedat Bing{\"{o}}l},
  title        = {The changes in Ottoman diplomatic cryptography and its methods during
                  the 19th century {(1811-1877)}},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {6},
  pages        = {541--569},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2092916},
  doi          = {10.1080/01611194.2022.2092916},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bingol23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boersma23,
  author       = {Stuart Boersma},
  title        = {Elizebeth Smith Friedman and one example of a prohibition era encryption
                  system},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {227--238},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.2003913},
  doi          = {10.1080/01611194.2021.2003913},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boersma23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boersma23a,
  author       = {Stuart Boersma},
  title        = {Complete examples of encryption systems broken by Elizebeth Smith
                  Friedman: 1923-1934},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {397--418},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.2023235},
  doi          = {10.1080/01611194.2021.2023235},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boersma23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BoersmaL23,
  author       = {Stuart Boersma and
                  Jean Marie Linhart},
  title        = {Review of \emph{The Woman All Spies Fear} by Amy Butler Greenfield
                  and \emph{Code Breaker, Spy Hunter} by Laurie Wallmark, Illustrated
                  by Brooke Smart},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {88--92},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2134753},
  doi          = {10.1080/01611194.2022.2134753},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BoersmaL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bures23,
  author       = {Kenneth J. Bures},
  title        = {Cracking {PURPLE:} the identification of homologs in the cryptanalysis
                  of the \emph{Angooki Taipu B} cipher machine},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {436--448},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2064200},
  doi          = {10.1080/01611194.2022.2064200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bures23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Campanelli23,
  author       = {Leonardo Campanelli},
  title        = {A statistical cryptanalysis of the Beale ciphers},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {466--473},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2116614},
  doi          = {10.1080/01611194.2022.2116614},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Campanelli23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChenNSW23,
  author       = {Zhixiong Chen and
                  Zhihua Niu and
                  Yuqi Sang and
                  Chenhuang Wu},
  title        = {Arithmetic autocorrelation of binary \emph{m}-sequences},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {449--458},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2071116},
  doi          = {10.1080/01611194.2022.2071116},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChenNSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen23,
  author       = {Chris Christensen},
  title        = {Review of \emph{Codebreaker Girls: {A} Secret Life at Bletchley Park}
                  by Jan Slimming},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {93--96},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2026838},
  doi          = {10.1080/01611194.2022.2026838},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen23a,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Rohonc Code: Tracing a Historical Riddle} by Benedek
                  L{\'{a}}ng},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {282--284},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2026841},
  doi          = {10.1080/01611194.2022.2026841},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen23b,
  author       = {Chris Christensen},
  title        = {Genevieve Grotjan's "great discovery"},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {4},
  pages        = {302--317},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2060052},
  doi          = {10.1080/01611194.2022.2060052},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen23c,
  author       = {Chris Christensen},
  title        = {Review of \emph{Parker Hitt: The Father of American Military Cryptology}
                  by Betsy Rohaly Smoot},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {489--492},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2101404},
  doi          = {10.1080/01611194.2022.2101404},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen23c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen23d,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Secret Life of an American Codebreaker: Codebreaker
                  Girls} by Jan SlimmingSlimming, Jan. \emph{The Secret Life of an American
                  Codebreaker: Codebreaker Girls} , South Yorkshire, England: Pen and
                  Sword Books. 2022. 289 + xii pages, Hardcover, {\textsterling}25 ({\textdollar}34.95).
                  {ISBN} 9781526784155},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {6},
  pages        = {584--587},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2105179},
  doi          = {10.1080/01611194.2022.2105179},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen23d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Code23,
  author       = {David L{\o}berg Code},
  title        = {Can musical encryption be both? {A} survey of music-based ciphers},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {4},
  pages        = {318--364},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.2021565},
  doi          = {10.1080/01611194.2021.2021565},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Code23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley23,
  author       = {John F. Dooley},
  title        = {Review of \emph{The Rose Code by Kate Quinn}},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {4},
  pages        = {393--395},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2043488},
  doi          = {10.1080/01611194.2022.2043488},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Foxon23,
  author       = {Floe Foxon},
  title        = {A treatise on the Rilke cryptogram},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {6},
  pages        = {493--510},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2092784},
  doi          = {10.1080/01611194.2022.2092784},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Foxon23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gathen23,
  author       = {Joachim von zur Gathen},
  title        = {Unicity distance of the Zodiac-340 cipher},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {474--488},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2023.2174821},
  doi          = {10.1080/01611194.2023.2174821},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gathen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Holden23,
  author       = {Joshua Holden},
  title        = {Resource guide for teaching post-quantum cryptography},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {459--465},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2078077},
  doi          = {10.1080/01611194.2022.2078077},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Holden23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KumarGG23,
  author       = {Satish Kumar and
                  Indivar Gupta and
                  Ashok Ji Gupta},
  title        = {A study of public key cryptosystems based on quasigroups},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {6},
  pages        = {511--540},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2081824},
  doi          = {10.1080/01611194.2022.2081824},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KumarGG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KumarMO23,
  author       = {Arvind Kumar and
                  Prasanna Raghaw Mishra and
                  Odelu Ojjela},
  title        = {Analysis of rotation and shift based diffusion functions},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {419--435},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2046660},
  doi          = {10.1080/01611194.2022.2046660},
  timestamp    = {Fri, 25 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KumarMO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KumarS23,
  author       = {Santosh Kumar Ravva and
                  Sureddi R. M. Krishna},
  title        = {Cryptanalysis of {RSA} with small difference of primes and two decryption
                  exponents: Jochemsz and May approach},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {6},
  pages        = {570--583},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2109943},
  doi          = {10.1080/01611194.2022.2109943},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KumarS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lasry23,
  author       = {George Lasry},
  title        = {Cracking {SIGABA} in less than 24 hours on a consumer {PC}},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {1--37},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1989522},
  doi          = {10.1080/01611194.2021.1989522},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lasry23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lasry23a,
  author       = {George Lasry},
  title        = {Analysis of a late 19th century french cipher created by Major Josse},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {48--62},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1996484},
  doi          = {10.1080/01611194.2021.1996484},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lasry23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryBT23,
  author       = {George Lasry and
                  Norbert Biermann and
                  Satoshi Tomokiyo},
  title        = {Deciphering Mary Stuart's lost letters from 1578-1584},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {2},
  pages        = {101--202},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2160677},
  doi          = {10.1080/01611194.2022.2160677},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/OstwaldW23,
  author       = {Olaf Ostwald and
                  Frode Weierud},
  title        = {Modern cryptanalysis of the \emph{Truppenschl{\"{u}}ssel}},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {261--281},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1998810},
  doi          = {10.1080/01611194.2021.1998810},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/OstwaldW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Relkin23,
  author       = {Paul W. Relkin},
  title        = {Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition
                  ciphers},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {38--47},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1992686},
  doi          = {10.1080/01611194.2021.1992686},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Relkin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sherman23,
  author       = {David Sherman},
  title        = {\emph{The Codebreakers} war: David Kahn, Macmillan, the government,
                  and the making of a cryptologic history masterpiece},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {205--226},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1998808},
  doi          = {10.1080/01611194.2021.1998808},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sherman23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Teseleanu23,
  author       = {George Teseleanu},
  title        = {Cryptographic symmetric structures based on quasigroups},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {4},
  pages        = {365--392},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.2022035},
  doi          = {10.1080/01611194.2021.2022035},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Teseleanu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}