Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia6.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/Akritas82,
  author       = {Alkiviadis G. Akritas},
  title        = {Application of Vincent's Theorem in Cryptography or One-Time Pads
                  Made Practical},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {4},
  pages        = {312--318},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857136},
  doi          = {10.1080/0161-118291857136},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Akritas82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Anderson82,
  author       = {Ralph V. Anderson},
  title        = {If {I} Remember},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {40--44},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856803},
  doi          = {10.1080/0161-118291856803},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Anderson82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BarclayB82,
  author       = {Mel L. Barclay and
                  Joshua S. Barclay},
  title        = {Use of microcomputer System for Medical Record Encryption and Decryption
                  Using a Sequential Pseudo-Random Key},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {2},
  pages        = {97--107},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856902},
  doi          = {10.1080/0161-118291856902},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BarclayB82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Berkovits82,
  author       = {Shimshon Berkovits},
  title        = {Factoring via Superencyrption},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {3},
  pages        = {229--237},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857028},
  doi          = {10.1080/0161-118291857028},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Berkovits82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bundy82,
  author       = {William P. Bundy},
  title        = {From the Depths to the Heights: Book Reviews},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {65--74},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856858},
  doi          = {10.1080/0161-118291856858},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bundy82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Davies82,
  author       = {Donald W. Davies},
  title        = {The Siemens and Halske T52e Cipher Machine},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {4},
  pages        = {289--308},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857118},
  doi          = {10.1080/0161-118291857118},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Davies82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours82,
  author       = {Cipher A. Deavours},
  title        = {The Black Chamber},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {34--37},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856777},
  doi          = {10.1080/0161-118291856777},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours82a,
  author       = {Cipher A. Deavours},
  title        = {Konheim's Cryptography-a Primer: a Book Review},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {2},
  pages        = {175--176},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856975},
  doi          = {10.1080/0161-118291856975},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours82a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours82b,
  author       = {Cipher A. Deavours},
  title        = {Helmich and the {KL-7}},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {3},
  pages        = {283--284},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857091},
  doi          = {10.1080/0161-118291857091},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours82b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Fischer82,
  author       = {Elliot Fischer},
  title        = {The Performance of Hellman's Time-Memory Trade-Off against Some Rotor
                  Ciphers},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {2},
  pages        = {108--114},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856911},
  doi          = {10.1080/0161-118291856911},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Fischer82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hardie82,
  author       = {Bradford Hardie},
  title        = {Unraveling the Enigma Story: a Book Review},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {61--64},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856849},
  doi          = {10.1080/0161-118291856849},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hardie82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn82,
  author       = {David Kahn},
  title        = {Why Germany Lost the Code War},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {26--31},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856759},
  doi          = {10.1080/0161-118291856759},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn82a,
  author       = {David Kahn},
  title        = {Churchill Pleads for the Intercepts},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {47--49},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856821},
  doi          = {10.1080/0161-118291856821},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn82a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn82b,
  author       = {David Kahn},
  title        = {Computer Cryptography: a Book Review},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {84},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856876},
  doi          = {10.1080/0161-118291856876},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn82b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn82c,
  author       = {David Kahn},
  title        = {A New Source for historians: Yardley's Seized Manuscript},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {2},
  pages        = {115--119},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856920},
  doi          = {10.1080/0161-118291856920},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn82c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn82d,
  author       = {David Kahn},
  title        = {In Memoriam: Georges-Jean Painvin},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {2},
  pages        = {120--127},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856939},
  doi          = {10.1080/0161-118291856939},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn82d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kaiserling82,
  author       = {M. C. W. Kaiserling},
  title        = {Sirius},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {2},
  pages        = {177--178},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856984},
  doi          = {10.1080/0161-118291856984},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kaiserling82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kaiserling82a,
  author       = {M. C. W. Kaiserling},
  title        = {Solution to {SIRIUS} Music Cipher},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {3},
  pages        = {282},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857082},
  doi          = {10.1080/0161-118291857082},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kaiserling82a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kallis82,
  author       = {Stephen A. Kallis},
  title        = {A Child's Garden of Cryptography},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {4},
  pages        = {368--377},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857181},
  doi          = {10.1080/0161-118291857181},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kallis82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KasparekW82,
  author       = {Christopher Kasparek and
                  Richard A. Woytak},
  title        = {In Memoriam Marian Rejewski},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {19--25},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856740},
  doi          = {10.1080/0161-118291856740},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KasparekW82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kozaczuk82,
  author       = {Wladyslaw Kozaczuk},
  title        = {Enigma Solved},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {32--33},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856768},
  doi          = {10.1080/0161-118291856768},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kozaczuk82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh82,
  author       = {Louis Kruh},
  title        = {Wilderness of Mirrors: a Book Review},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {38},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856786},
  doi          = {10.1080/0161-118291856786},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh82a,
  author       = {Louis Kruh},
  title        = {Beale Society Material: Book Reviews},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {39},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856795},
  doi          = {10.1080/0161-118291856795},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh82a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh82b,
  author       = {Louis Kruh},
  title        = {The Navy Cipher Box Mark {II}},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {85--93},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856885},
  doi          = {10.1080/0161-118291856885},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh82b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh82c,
  author       = {Louis Kruh},
  title        = {Book Reviews: a Book with a Book Cipher},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {2},
  pages        = {154--168},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856957},
  doi          = {10.1080/0161-118291856957},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh82c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh82d,
  author       = {Louis Kruh},
  title        = {The Mystery of Colonel Decius Wadsworth's Cipher Device},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {3},
  pages        = {238--247},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857037},
  doi          = {10.1080/0161-118291857037},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh82d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh82e,
  author       = {Louis Kruh},
  title        = {A Basic Probe of the Beale Cipher as a Bamboozlement},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {4},
  pages        = {378--382},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857190},
  doi          = {10.1080/0161-118291857190},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh82e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MeijerA82,
  author       = {Henk Meijer and
                  Selim G. Akl},
  title        = {Digital Signature Schemes},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {4},
  pages        = {329--338},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857154},
  doi          = {10.1080/0161-118291857154},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MeijerA82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mellen82,
  author       = {Greg E. Mellen},
  title        = {Cryptanalysts' corner},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {45--46},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856812},
  doi          = {10.1080/0161-118291856812},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mellen82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mellen82a,
  author       = {Greg E. Mellen},
  title        = {Cryptanalysts' corner},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {2},
  pages        = {169--174},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856966},
  doi          = {10.1080/0161-118291856966},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mellen82a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mellen82b,
  author       = {Greg E. Mellen},
  title        = {Cryptanalysts' corner},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {3},
  pages        = {248--252},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857046},
  doi          = {10.1080/0161-118291857046},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mellen82b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mellen82c,
  author       = {Greg E. Mellen},
  title        = {Cryptanalysts' corner},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {4},
  pages        = {309--311},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857127},
  doi          = {10.1080/0161-118291857127},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mellen82c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Miller82,
  author       = {Donald V. Miller},
  title        = {Ciphertext only Attack on the Merkle-Hellman Public-Key System under
                  Broadcast Situations},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {3},
  pages        = {279--281},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857073},
  doi          = {10.1080/0161-118291857073},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Miller82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Outerbridge82,
  author       = {Richard Outerbridge},
  title        = {Cryptographic Features of the {UNIX} Operating System},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {3},
  pages        = {253--257},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857055},
  doi          = {10.1080/0161-118291857055},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Outerbridge82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Outerbridge82a,
  author       = {Richard Outerbridge},
  title        = {A Pedagogical Cipher (This paper is the winner of the {CRYPTOLOGIA}
                  First Annual Undergraduate Paper Competition in Cryptology.)},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {4},
  pages        = {339--345},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857163},
  doi          = {10.1080/0161-118291857163},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Outerbridge82a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rejewski82,
  author       = {Marian Rejewski},
  title        = {Mathematical Solution of the Enigma Cipher},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {1--18},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856731},
  doi          = {10.1080/0161-118291856731},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rejewski82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rejewski82a,
  author       = {Marian Rejewski},
  title        = {Remarks on Appendix 1 to British Intelligence in the Second World
                  War by F. H. Hinsley},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {75--83},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856867},
  doi          = {10.1080/0161-118291856867},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rejewski82a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sloane82,
  author       = {Neil J. A. Sloane},
  title        = {Error-Correcting Codes and Cryptography Part {I}},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {2},
  pages        = {128--153},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856948},
  doi          = {10.1080/0161-118291856948},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sloane82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sloane82a,
  author       = {Neil J. A. Sloane},
  title        = {Error-Correcting Codes and Cryptography Part {II}},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {3},
  pages        = {258--278},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857064},
  doi          = {10.1080/0161-118291857064},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sloane82a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Tucker82,
  author       = {Dundas P. Tucker},
  title        = {Rhapsody in Purple a New History of Pearl Harbor - {I}},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {3},
  pages        = {193--228},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857019},
  doi          = {10.1080/0161-118291857019},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Tucker82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Tucker82a,
  author       = {Dundas P. Tucker},
  title        = {Rhapsody in Purple: a New History of {PEARL} Harbor Part Two of Two},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {4},
  pages        = {346--367},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857172},
  doi          = {10.1080/0161-118291857172},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Tucker82a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/VahleT82,
  author       = {Michael O. Vahle and
                  Lawrence Tolendino},
  title        = {Breaking a Pseudo Random Number Based Cryptographic Algorithm},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {4},
  pages        = {319--328},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291857145},
  doi          = {10.1080/0161-118291857145},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/VahleT82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel82,
  author       = {Brian J. Winkel},
  title        = {There and There - a Column},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {2},
  pages        = {179--188},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856993},
  doi          = {10.1080/0161-118291856993},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Woytak82,
  author       = {Richard A. Woytak},
  title        = {A Conversation with {MARIAN} Rejewski},
  journal      = {Cryptologia},
  volume       = {6},
  number       = {1},
  pages        = {50--60},
  year         = {1982},
  url          = {https://doi.org/10.1080/0161-118291856830},
  doi          = {10.1080/0161-118291856830},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Woytak82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}