default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia6.bht:"
@article{DBLP:journals/cryptologia/Akritas82, author = {Alkiviadis G. Akritas}, title = {Application of Vincent's Theorem in Cryptography or One-Time Pads Made Practical}, journal = {Cryptologia}, volume = {6}, number = {4}, pages = {312--318}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857136}, doi = {10.1080/0161-118291857136}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Akritas82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Anderson82, author = {Ralph V. Anderson}, title = {If {I} Remember}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {40--44}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856803}, doi = {10.1080/0161-118291856803}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Anderson82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BarclayB82, author = {Mel L. Barclay and Joshua S. Barclay}, title = {Use of microcomputer System for Medical Record Encryption and Decryption Using a Sequential Pseudo-Random Key}, journal = {Cryptologia}, volume = {6}, number = {2}, pages = {97--107}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856902}, doi = {10.1080/0161-118291856902}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BarclayB82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Berkovits82, author = {Shimshon Berkovits}, title = {Factoring via Superencyrption}, journal = {Cryptologia}, volume = {6}, number = {3}, pages = {229--237}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857028}, doi = {10.1080/0161-118291857028}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Berkovits82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bundy82, author = {William P. Bundy}, title = {From the Depths to the Heights: Book Reviews}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {65--74}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856858}, doi = {10.1080/0161-118291856858}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bundy82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Davies82, author = {Donald W. Davies}, title = {The Siemens and Halske T52e Cipher Machine}, journal = {Cryptologia}, volume = {6}, number = {4}, pages = {289--308}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857118}, doi = {10.1080/0161-118291857118}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Davies82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours82, author = {Cipher A. Deavours}, title = {The Black Chamber}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {34--37}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856777}, doi = {10.1080/0161-118291856777}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours82a, author = {Cipher A. Deavours}, title = {Konheim's Cryptography-a Primer: a Book Review}, journal = {Cryptologia}, volume = {6}, number = {2}, pages = {175--176}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856975}, doi = {10.1080/0161-118291856975}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours82a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours82b, author = {Cipher A. Deavours}, title = {Helmich and the {KL-7}}, journal = {Cryptologia}, volume = {6}, number = {3}, pages = {283--284}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857091}, doi = {10.1080/0161-118291857091}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours82b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Fischer82, author = {Elliot Fischer}, title = {The Performance of Hellman's Time-Memory Trade-Off against Some Rotor Ciphers}, journal = {Cryptologia}, volume = {6}, number = {2}, pages = {108--114}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856911}, doi = {10.1080/0161-118291856911}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Fischer82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hardie82, author = {Bradford Hardie}, title = {Unraveling the Enigma Story: a Book Review}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {61--64}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856849}, doi = {10.1080/0161-118291856849}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hardie82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn82, author = {David Kahn}, title = {Why Germany Lost the Code War}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {26--31}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856759}, doi = {10.1080/0161-118291856759}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn82a, author = {David Kahn}, title = {Churchill Pleads for the Intercepts}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {47--49}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856821}, doi = {10.1080/0161-118291856821}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn82a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn82b, author = {David Kahn}, title = {Computer Cryptography: a Book Review}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {84}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856876}, doi = {10.1080/0161-118291856876}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn82b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn82c, author = {David Kahn}, title = {A New Source for historians: Yardley's Seized Manuscript}, journal = {Cryptologia}, volume = {6}, number = {2}, pages = {115--119}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856920}, doi = {10.1080/0161-118291856920}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn82c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn82d, author = {David Kahn}, title = {In Memoriam: Georges-Jean Painvin}, journal = {Cryptologia}, volume = {6}, number = {2}, pages = {120--127}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856939}, doi = {10.1080/0161-118291856939}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn82d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kaiserling82, author = {M. C. W. Kaiserling}, title = {Sirius}, journal = {Cryptologia}, volume = {6}, number = {2}, pages = {177--178}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856984}, doi = {10.1080/0161-118291856984}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kaiserling82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kaiserling82a, author = {M. C. W. Kaiserling}, title = {Solution to {SIRIUS} Music Cipher}, journal = {Cryptologia}, volume = {6}, number = {3}, pages = {282}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857082}, doi = {10.1080/0161-118291857082}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kaiserling82a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kallis82, author = {Stephen A. Kallis}, title = {A Child's Garden of Cryptography}, journal = {Cryptologia}, volume = {6}, number = {4}, pages = {368--377}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857181}, doi = {10.1080/0161-118291857181}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kallis82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KasparekW82, author = {Christopher Kasparek and Richard A. Woytak}, title = {In Memoriam Marian Rejewski}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {19--25}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856740}, doi = {10.1080/0161-118291856740}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/KasparekW82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kozaczuk82, author = {Wladyslaw Kozaczuk}, title = {Enigma Solved}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {32--33}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856768}, doi = {10.1080/0161-118291856768}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kozaczuk82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh82, author = {Louis Kruh}, title = {Wilderness of Mirrors: a Book Review}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {38}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856786}, doi = {10.1080/0161-118291856786}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh82a, author = {Louis Kruh}, title = {Beale Society Material: Book Reviews}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {39}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856795}, doi = {10.1080/0161-118291856795}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh82a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh82b, author = {Louis Kruh}, title = {The Navy Cipher Box Mark {II}}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {85--93}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856885}, doi = {10.1080/0161-118291856885}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh82b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh82c, author = {Louis Kruh}, title = {Book Reviews: a Book with a Book Cipher}, journal = {Cryptologia}, volume = {6}, number = {2}, pages = {154--168}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856957}, doi = {10.1080/0161-118291856957}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh82c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh82d, author = {Louis Kruh}, title = {The Mystery of Colonel Decius Wadsworth's Cipher Device}, journal = {Cryptologia}, volume = {6}, number = {3}, pages = {238--247}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857037}, doi = {10.1080/0161-118291857037}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh82d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh82e, author = {Louis Kruh}, title = {A Basic Probe of the Beale Cipher as a Bamboozlement}, journal = {Cryptologia}, volume = {6}, number = {4}, pages = {378--382}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857190}, doi = {10.1080/0161-118291857190}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh82e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MeijerA82, author = {Henk Meijer and Selim G. Akl}, title = {Digital Signature Schemes}, journal = {Cryptologia}, volume = {6}, number = {4}, pages = {329--338}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857154}, doi = {10.1080/0161-118291857154}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MeijerA82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mellen82, author = {Greg E. Mellen}, title = {Cryptanalysts' corner}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {45--46}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856812}, doi = {10.1080/0161-118291856812}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mellen82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mellen82a, author = {Greg E. Mellen}, title = {Cryptanalysts' corner}, journal = {Cryptologia}, volume = {6}, number = {2}, pages = {169--174}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856966}, doi = {10.1080/0161-118291856966}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mellen82a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mellen82b, author = {Greg E. Mellen}, title = {Cryptanalysts' corner}, journal = {Cryptologia}, volume = {6}, number = {3}, pages = {248--252}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857046}, doi = {10.1080/0161-118291857046}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mellen82b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mellen82c, author = {Greg E. Mellen}, title = {Cryptanalysts' corner}, journal = {Cryptologia}, volume = {6}, number = {4}, pages = {309--311}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857127}, doi = {10.1080/0161-118291857127}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mellen82c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Miller82, author = {Donald V. Miller}, title = {Ciphertext only Attack on the Merkle-Hellman Public-Key System under Broadcast Situations}, journal = {Cryptologia}, volume = {6}, number = {3}, pages = {279--281}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857073}, doi = {10.1080/0161-118291857073}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Miller82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Outerbridge82, author = {Richard Outerbridge}, title = {Cryptographic Features of the {UNIX} Operating System}, journal = {Cryptologia}, volume = {6}, number = {3}, pages = {253--257}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857055}, doi = {10.1080/0161-118291857055}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Outerbridge82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Outerbridge82a, author = {Richard Outerbridge}, title = {A Pedagogical Cipher (This paper is the winner of the {CRYPTOLOGIA} First Annual Undergraduate Paper Competition in Cryptology.)}, journal = {Cryptologia}, volume = {6}, number = {4}, pages = {339--345}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857163}, doi = {10.1080/0161-118291857163}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Outerbridge82a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rejewski82, author = {Marian Rejewski}, title = {Mathematical Solution of the Enigma Cipher}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {1--18}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856731}, doi = {10.1080/0161-118291856731}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rejewski82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rejewski82a, author = {Marian Rejewski}, title = {Remarks on Appendix 1 to British Intelligence in the Second World War by F. H. Hinsley}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {75--83}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856867}, doi = {10.1080/0161-118291856867}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Rejewski82a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sloane82, author = {Neil J. A. Sloane}, title = {Error-Correcting Codes and Cryptography Part {I}}, journal = {Cryptologia}, volume = {6}, number = {2}, pages = {128--153}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856948}, doi = {10.1080/0161-118291856948}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sloane82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sloane82a, author = {Neil J. A. Sloane}, title = {Error-Correcting Codes and Cryptography Part {II}}, journal = {Cryptologia}, volume = {6}, number = {3}, pages = {258--278}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857064}, doi = {10.1080/0161-118291857064}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sloane82a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Tucker82, author = {Dundas P. Tucker}, title = {Rhapsody in Purple a New History of Pearl Harbor - {I}}, journal = {Cryptologia}, volume = {6}, number = {3}, pages = {193--228}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857019}, doi = {10.1080/0161-118291857019}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Tucker82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Tucker82a, author = {Dundas P. Tucker}, title = {Rhapsody in Purple: a New History of {PEARL} Harbor Part Two of Two}, journal = {Cryptologia}, volume = {6}, number = {4}, pages = {346--367}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857172}, doi = {10.1080/0161-118291857172}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Tucker82a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/VahleT82, author = {Michael O. Vahle and Lawrence Tolendino}, title = {Breaking a Pseudo Random Number Based Cryptographic Algorithm}, journal = {Cryptologia}, volume = {6}, number = {4}, pages = {319--328}, year = {1982}, url = {https://doi.org/10.1080/0161-118291857145}, doi = {10.1080/0161-118291857145}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/VahleT82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel82, author = {Brian J. Winkel}, title = {There and There - a Column}, journal = {Cryptologia}, volume = {6}, number = {2}, pages = {179--188}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856993}, doi = {10.1080/0161-118291856993}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Woytak82, author = {Richard A. Woytak}, title = {A Conversation with {MARIAN} Rejewski}, journal = {Cryptologia}, volume = {6}, number = {1}, pages = {50--60}, year = {1982}, url = {https://doi.org/10.1080/0161-118291856830}, doi = {10.1080/0161-118291856830}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Woytak82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.