default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2003
- Francine F. Abeles:
The Memoria Technica Cipher. Cryptologia 27(3): 217-229 (2003) - Bob Anderson, George McGinnis:
Naval Security Group Command Display. Cryptologia 27(4): 350-360 (2003) - Augusto Buonafalce:
From the Skytale to the Enigma: Book Review. Cryptologia 27(2): 132-134 (2003) - Dorothy Clarkson:
Cypher Machines Maintenance and Restoration Spanning sixty Years. Cryptologia 27(3): 209-216 (2003) - James David:
Soviet Secrets in the ether - Clandestine Radio Stations at the New York and SAN Francisco Consulates in World War II. Cryptologia 27(2): 135-147 (2003) - Ralph Erskine:
From the Archives What the Sinkov Mission Brought to Bletchley Park. Cryptologia 27(2): 111-118 (2003) - Ralph Erskine, Peter Freeman:
Brigadier John Tiltman: One of Britain's finest Cryptologists. Cryptologia 27(4): 289-318 (2003) - Francesco Fabris, Myron Curtis:
A Nomenclator Used by propaganda fide during the Chinese rites Controversy. Cryptologia 27(4): 319-338 (2003) - Niels Faurholt:
Urkryptografen ("the Clock Cryptograph"). Cryptologia 27(3): 206-208 (2003) - Wes Freeman, Geoff Sullivan, Frode Weierud:
Purple Revealed: Simulation and Computer-Aided Cryptanalysis of Angooki Taipu B. Cryptologia 27(1): 1-43 (2003) - Joachim von zur Gathen:
Claude Comiers: the First Arithmetical Cryptography. Cryptologia 27(4): 339-349 (2003) - Lee A. Gladwin:
Alan M. Turing's Critique of Running Short Cribs on the US Navy Bombe. Cryptologia 27(1): 50-54 (2003) - David H. Hamer:
The Enigmas - and Other Recovered Artefacts - of U-85. Cryptologia 27(2): 97-110 (2003) - Philip H. Jacobsen:
Foreknowledge of PEARL Harbor? No!: the Story of the U. S. Navy's Efforts on Jn-25b. Cryptologia 27(3): 193-205 (2003) - Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 27(1): 55-72 (2003) - Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 27(2): 182-191 (2003) - Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 27(3): 230-232 (2003) - Louis Kruh:
Reviews and Things Cryptologic. Cryptologia 27(4): 375-378 (2003) - Louis Kruh:
The Shakespeare-Bacon Controversy Continues on the Stage. Cryptologia 27(4): 379-380 (2003) - Karl de Leeuw:
The Dutch Invention of the Rotor Machine, 1915-1923. Cryptologia 27(1): 73-94 (2003) - Mohammad A. Musa, Edward F. Schaefer, Stephen Wedig:
A Simplified AES Algorithm and its Linear and Differential Cryptanalyses. Cryptologia 27(2): 148-177 (2003) - Raphael Chung-Wei Phan:
Impossible Differential Cryptanalysis of Mini-AES. Cryptologia 27(4): 361-374 (2003) - Rebecca A. Ratcliff:
How Statistics LED the Germans to Believe Enigma Secure and Why They Were Wrong: neglecting the Practical Mathematics of Cipher Machines. Cryptologia 27(2): 119-131 (2003) - Rose Mary Sheldon:
The Sator Rebus: an Unsolved Cryptogram? Cryptologia 27(3): 233-287 (2003) - Alan M. Turing:
Alan M. Turing's Critique of Running Short Cribs on the U. S. Navy Bombe. Cryptologia 27(1): 44-49 (2003) - Brian J. Winkel:
Extraordinary Cryptology Collection. Cryptologia 27(2): 180-181 (2003)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-15 19:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint